Seguir
Yier Jin
Título
Citado por
Citado por
Año
Hardware Trojan detection using path delay fingerprint
Y Jin, Y Makris
Hardware-Oriented Security and Trust, 2008. HOST 2008. IEEE International …, 2008
8392008
Hardware trojans: Lessons learned after one decade of research
K Xiao, D Forte, Y Jin, R Karri, S Bhunia, M Tehranipoor
ACM Transactions on Design Automation of Electronic Systems (TODAES) 22 (1 …, 2016
5222016
Privacy and security in internet of things and wearable devices
O Arias, J Wurm, K Hoang, Y Jin
IEEE transactions on multi-scale computing systems 1 (2), 99-109, 2015
4372015
Security analysis on consumer and industrial IoT devices
J Wurm, K Hoang, O Arias, AR Sadeghi, Y Jin
2016 21st Asia and South Pacific design automation conference (ASP-DAC), 519-524, 2016
3542016
AppSAT: Approximately deobfuscating integrated circuits
K Shamsi, M Li, T Meade, Z Zhao, DZ Pan, Y Jin
2017 IEEE International Symposium on Hardware Oriented Security and Trust …, 2017
3382017
Experiences in hardware Trojan design and implementation
Y Jin, N Kupp, Y Makris
2009 IEEE international workshop on hardware-oriented security and trust, 50-57, 2009
3052009
HAFIX: Hardware-assisted flow integrity extension
L Davi, M Hanreich, D Paul, AR Sadeghi, P Koeberl, D Sullivan, O Arias, ...
Proceedings of the 52nd Annual Design Automation Conference, 1-6, 2015
2432015
Smart nest thermostat: A smart spy in your home
G Hernandez, O Arias, D Buentello, Y Jin
Black Hat USA 2015, 2014
2332014
Internet-of-things security and vulnerabilities: Taxonomy, challenges, and practice
K Chen, S Zhang, Z Li, Y Zhang, Q Deng, S Ray, Y Jin
Journal of Hardware and Systems Security 2, 97-110, 2018
2092018
Proof-carrying hardware intellectual property: A pathway to trusted module acquisition
E Love, Y Jin, Y Makris
IEEE Transactions on Information Forensics and Security 7 (1), 25-40, 2011
1972011
Provably secure camouflaging strategy for IC protection
M Li, K Shamsi, T Meade, Z Zhao, B Yu, Y Jin, DZ Pan
IEEE transactions on computer-aided design of integrated circuits and …, 2017
1832017
Cyclic obfuscation for creating SAT-unresolvable circuits
K Shamsi, M Li, T Meade, Z Zhao, DZ Pan, Y Jin
Proceedings of the on Great Lakes Symposium on VLSI 2017, 173-178, 2017
1762017
Hardware trojan detection through chip-free electromagnetic side-channel statistical analysis
J He, Y Zhao, X Guo, Y Jin
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 25 (10 …, 2017
1652017
Hardware Trojans in wireless cryptographic ICs
Y Jin, Y Makris
Design & Test of Computers, IEEE 27 (1), 26-35, 2010
1632010
The changing computing paradigm with internet of things: A tutorial introduction
S Ray, Y Jin, A Raychowdhury
IEEE Design & Test 33 (2), 76-96, 2016
1482016
CloudLeak: Large-Scale Deep Learning Models Stealing Through Adversarial Examples.
H Yu, K Yang, T Zhang, YY Tsai, TY Ho, Y Jin
NDSS 38, 102, 2020
1442020
AVFSM: A framework for identifying and mitigating vulnerabilities in FSMs
A Nahiyan, K Xiao, K Yang, Y Jin, D Forte, M Tehranipoor
Proceedings of the 53rd Annual Design Automation Conference, 1-6, 2016
1182016
Atrium: Runtime attestation resilient under memory attacks
S Zeitouni, G Dessouky, O Arias, D Sullivan, A Ibrahim, Y Jin, AR Sadeghi
2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 384-391, 2017
1122017
Survey of machine learning methods for detecting false data injection attacks in power systems
A Sayghe, Y Hu, I Zografopoulos, XR Liu, RG Dutta, Y Jin, C Konstantinou
IET Smart Grid 3 (5), 581-595, 2020
1112020
Silicon demonstration of hardware Trojan design and detection in wireless cryptographic ICs
Y Liu, Y Jin, A Nosratinia, Y Makris
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 25 (4 …, 2016
1112016
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20