Följ
Yier Jin
Titel
Citeras av
Citeras av
År
Hardware Trojan detection using path delay fingerprint
Y Jin, Y Makris
Hardware-Oriented Security and Trust, 2008. HOST 2008. IEEE International …, 2008
8592008
Hardware trojans: Lessons learned after one decade of research
K Xiao, D Forte, Y Jin, R Karri, S Bhunia, M Tehranipoor
ACM Transactions on Design Automation of Electronic Systems (TODAES) 22 (1 …, 2016
5702016
Privacy and security in internet of things and wearable devices
O Arias, J Wurm, K Hoang, Y Jin
IEEE transactions on multi-scale computing systems 1 (2), 99-109, 2015
4682015
Security analysis on consumer and industrial IoT devices
J Wurm, K Hoang, O Arias, AR Sadeghi, Y Jin
2016 21st Asia and South Pacific design automation conference (ASP-DAC), 519-524, 2016
3832016
AppSAT: Approximately deobfuscating integrated circuits
K Shamsi, M Li, T Meade, Z Zhao, DZ Pan, Y Jin
2017 IEEE International Symposium on Hardware Oriented Security and Trust …, 2017
3652017
Experiences in hardware Trojan design and implementation
Y Jin, N Kupp, Y Makris
2009 IEEE international workshop on hardware-oriented security and trust, 50-57, 2009
3142009
HAFIX: Hardware-assisted flow integrity extension
L Davi, M Hanreich, D Paul, AR Sadeghi, P Koeberl, D Sullivan, O Arias, ...
Proceedings of the 52nd Annual Design Automation Conference, 1-6, 2015
2562015
Smart nest thermostat: A smart spy in your home
G Hernandez, O Arias, D Buentello, Y Jin
Black Hat USA 1550, 2014
2452014
Internet-of-things security and vulnerabilities: Taxonomy, challenges, and practice
K Chen, S Zhang, Z Li, Y Zhang, Q Deng, S Ray, Y Jin
Journal of Hardware and Systems Security 2, 97-110, 2018
2412018
Provably secure camouflaging strategy for IC protection
M Li, K Shamsi, T Meade, Z Zhao, B Yu, Y Jin, DZ Pan
IEEE transactions on computer-aided design of integrated circuits and …, 2017
2022017
Proof-carrying hardware intellectual property: A pathway to trusted module acquisition
E Love, Y Jin, Y Makris
IEEE Transactions on Information Forensics and Security 7 (1), 25-40, 2011
2022011
Cyclic obfuscation for creating SAT-unresolvable circuits
K Shamsi, M Li, T Meade, Z Zhao, DZ Pan, Y Jin
Proceedings of the Great Lakes Symposium on VLSI 2017, 173-178, 2017
1932017
CloudLeak: Large-Scale Deep Learning Models Stealing Through Adversarial Examples.
H Yu, K Yang, T Zhang, YY Tsai, TY Ho, Y Jin
NDSS 38, 102, 2020
1842020
Hardware trojan detection through chip-free electromagnetic side-channel statistical analysis
J He, Y Zhao, X Guo, Y Jin
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 25 (10 …, 2017
1762017
Hardware Trojans in wireless cryptographic ICs
Y Jin, Y Makris
Design & Test of Computers, IEEE 27 (1), 26-35, 2010
1602010
The changing computing paradigm with internet of things: A tutorial introduction
S Ray, Y Jin, A Raychowdhury
IEEE Design & Test 33 (2), 76-96, 2016
1572016
Survey of machine learning methods for detecting false data injection attacks in power systems
A Sayghe, Y Hu, I Zografopoulos, XR Liu, RG Dutta, Y Jin, C Konstantinou
IET Smart Grid 3 (5), 581-595, 2020
1432020
AVFSM: A framework for identifying and mitigating vulnerabilities in FSMs
A Nahiyan, K Xiao, K Yang, Y Jin, D Forte, M Tehranipoor
Proceedings of the 53rd Annual Design Automation Conference, 1-6, 2016
1322016
Atrium: Runtime attestation resilient under memory attacks
S Zeitouni, G Dessouky, O Arias, D Sullivan, A Ibrahim, Y Jin, AR Sadeghi
2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 384-391, 2017
1282017
Robust adversarial objects against deep learning models
T Tsai, K Yang, TY Ho, Y Jin
Proceedings of the AAAI Conference on Artificial Intelligence 34 (01), 954-962, 2020
1222020
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20