Articles with public access mandates - Yuanqi ShenLearn more
Available somewhere: 10
Double DIP: Re-evaluating security of logic encryption algorithms
Y Shen, H Zhou
Proceedings of the on Great Lakes Symposium on VLSI 2017, 179-184, 2017
Mandates: US National Science Foundation
Cyclic locking and memristor-based obfuscation against CycSAT and inside foundry attacks
A Rezaei, Y Shen, S Kong, J Gu, H Zhou
2018 Design, Automation & Test in Europe Conference & Exhibition (DATE), 85-90, 2018
Mandates: US National Science Foundation
BeSAT: Behavioral SAT-based attack on cyclic logic encryption
Y Shen, Y Li, A Rezaei, S Kong, D Dlott, H Zhou
Proceedings of the 24th Asia and South Pacific Design Automation Conference …, 2019
Mandates: US National Science Foundation
SAT-based bit-flipping attack on logic encryptions
Y Shen, A Rezaei, H Zhou
2018 Design, Automation & Test in Europe Conference & Exhibition (DATE), 629-632, 2018
Mandates: US National Science Foundation
Resolving the trilemma in logic encryption
H Zhou, A Rezaei, Y Shen
2019 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 1-8, 2019
Mandates: US National Science Foundation
CycSAT-unresolvable cyclic logic encryption using unreachable states
A Rezaei, Y Li, Y Shen, S Kong, H Zhou
Proceedings of the 24th Asia and South Pacific Design Automation Conference …, 2019
Mandates: US National Science Foundation
Rescuing logic encryption in post-SAT era by locking & obfuscation
A Rezaei, Y Shen, H Zhou
2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), 13-18, 2020
Mandates: US National Science Foundation
A comparative investigation of approximate attacks on logic encryptions
Y Shen, A Rezaei, H Zhou
2018 23rd Asia and South Pacific Design Automation Conference (ASP-DAC), 271-276, 2018
Mandates: US National Science Foundation
SigAttack: New high-level SAT-based attack on logic encryptions
Y Shen, Y Li, S Kong, A Rezaei, H Zhou
2019 Design, Automation & Test in Europe Conference & Exhibition (DATE), 940-943, 2019
Mandates: US National Science Foundation
Using security invariant to verify confidentiality in hardware design
S Kong, Y Shen, H Zhou
Proceedings of the on Great Lakes Symposium on VLSI 2017, 487-490, 2017
Mandates: US National Science Foundation
Publication and funding information is determined automatically by a computer program