Seguir
Yier Jin
Título
Citado por
Citado por
Año
Hardware Trojan detection using path delay fingerprint
Y Jin, Y Makris
Hardware-Oriented Security and Trust, 2008. HOST 2008. IEEE International …, 2008
8412008
Hardware trojans: Lessons learned after one decade of research
K Xiao, D Forte, Y Jin, R Karri, S Bhunia, M Tehranipoor
ACM Transactions on Design Automation of Electronic Systems (TODAES) 22 (1 …, 2016
5242016
Privacy and security in internet of things and wearable devices
O Arias, J Wurm, K Hoang, Y Jin
IEEE transactions on multi-scale computing systems 1 (2), 99-109, 2015
4422015
Security analysis on consumer and industrial IoT devices
J Wurm, K Hoang, O Arias, AR Sadeghi, Y Jin
2016 21st Asia and South Pacific design automation conference (ASP-DAC), 519-524, 2016
3582016
AppSAT: Approximately deobfuscating integrated circuits
K Shamsi, M Li, T Meade, Z Zhao, DZ Pan, Y Jin
2017 IEEE International Symposium on Hardware Oriented Security and Trust …, 2017
3412017
Experiences in hardware Trojan design and implementation
Y Jin, N Kupp, Y Makris
2009 IEEE international workshop on hardware-oriented security and trust, 50-57, 2009
3052009
HAFIX: Hardware-assisted flow integrity extension
L Davi, M Hanreich, D Paul, AR Sadeghi, P Koeberl, D Sullivan, O Arias, ...
Proceedings of the 52nd Annual Design Automation Conference, 1-6, 2015
2452015
Smart nest thermostat: A smart spy in your home
G Hernandez, O Arias, D Buentello, Y Jin
Black Hat USA 2015, 2014
2342014
Internet-of-things security and vulnerabilities: Taxonomy, challenges, and practice
K Chen, S Zhang, Z Li, Y Zhang, Q Deng, S Ray, Y Jin
Journal of Hardware and Systems Security 2, 97-110, 2018
2112018
Proof-carrying hardware intellectual property: A pathway to trusted module acquisition
E Love, Y Jin, Y Makris
IEEE Transactions on Information Forensics and Security 7 (1), 25-40, 2011
1992011
Provably secure camouflaging strategy for IC protection
M Li, K Shamsi, T Meade, Z Zhao, B Yu, Y Jin, DZ Pan
IEEE transactions on computer-aided design of integrated circuits and …, 2017
1862017
Cyclic obfuscation for creating SAT-unresolvable circuits
K Shamsi, M Li, T Meade, Z Zhao, DZ Pan, Y Jin
Proceedings of the on Great Lakes Symposium on VLSI 2017, 173-178, 2017
1792017
Hardware trojan detection through chip-free electromagnetic side-channel statistical analysis
J He, Y Zhao, X Guo, Y Jin
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 25 (10 …, 2017
1682017
Hardware Trojans in wireless cryptographic ICs
Y Jin, Y Makris
Design & Test of Computers, IEEE 27 (1), 26-35, 2010
1652010
CloudLeak: Large-Scale Deep Learning Models Stealing Through Adversarial Examples.
H Yu, K Yang, T Zhang, YY Tsai, TY Ho, Y Jin
NDSS 38, 102, 2020
1492020
The changing computing paradigm with internet of things: A tutorial introduction
S Ray, Y Jin, A Raychowdhury
IEEE Design & Test 33 (2), 76-96, 2016
1482016
AVFSM: A framework for identifying and mitigating vulnerabilities in FSMs
A Nahiyan, K Xiao, K Yang, Y Jin, D Forte, M Tehranipoor
Proceedings of the 53rd Annual Design Automation Conference, 1-6, 2016
1192016
Survey of machine learning methods for detecting false data injection attacks in power systems
A Sayghe, Y Hu, I Zografopoulos, XR Liu, RG Dutta, Y Jin, C Konstantinou
IET Smart Grid 3 (5), 581-595, 2020
1132020
Atrium: Runtime attestation resilient under memory attacks
S Zeitouni, G Dessouky, O Arias, D Sullivan, A Ibrahim, Y Jin, AR Sadeghi
2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 384-391, 2017
1132017
Silicon demonstration of hardware Trojan design and detection in wireless cryptographic ICs
Y Liu, Y Jin, A Nosratinia, Y Makris
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 25 (4 …, 2016
1122016
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20