Neural trojans Y Liu, Y Xie, A Srivastava 2017 IEEE International Conference on Computer Design (ICCD), 45-48, 2017 | 356 | 2017 |
Mitigating SAT attack on logic locking Y Xie, A Srivastava Cryptographic Hardware and Embedded Systems–CHES 2016: 18th International …, 2016 | 318 | 2016 |
Anti-SAT: Mitigating SAT attack on logic locking Y Xie, A Srivastava IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2018 | 221 | 2018 |
Delay locking: Security enhancement of logic locking against ic counterfeiting and overproduction Y Xie, A Srivastava Proceedings of the 54th Annual Design Automation Conference 2017, 1-6, 2017 | 131 | 2017 |
Keynote: A disquisition on logic locking A Chakraborty, NG Jayasankaran, Y Liu, J Rajendran, O Sinanoglu, ... IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2019 | 107 | 2019 |
Security-aware design flow for 2.5 D IC technology Y Xie, C Bao, A Srivastava Proceedings of the 5th International Workshop on Trustworthy Embedded …, 2015 | 56 | 2015 |
Security and vulnerability implications of 3D ICs Y Xie, C Bao, C Serafy, T Lu, A Srivastava, M Tehranipoor IEEE Transactions on Multi-Scale Computing Systems 2 (2), 108-122, 2016 | 54 | 2016 |
Strong anti-SAT: Secure and effective logic locking Y Liu, M Zuzak, Y Xie, A Chakraborty, A Srivastava 2020 21st International Symposium on Quality Electronic Design (ISQED), 199-205, 2020 | 49 | 2020 |
Security-aware 2.5 D integrated circuit design flow against hardware IP piracy Y Xie, C Bao, A Srivastava Computer 50 (5), 62-71, 2017 | 36 | 2017 |
A combined optimization-theoretic and side-channel approach for attacking strong physical unclonable functions Y Liu, Y Xie, C Bao, A Srivastava IEEE Transactions on Very Large Scale Integration (VLSI) Systems 26 (1), 73-81, 2017 | 32 | 2017 |
Robust and attack resilient logic locking with a high application-level impact Y Liu, M Zuzak, Y Xie, A Chakraborty, A Srivastava ACM Journal on Emerging Technologies in Computing Systems (JETC) 17 (3), 1-22, 2021 | 19 | 2021 |
2.5 D/3D integration technologies for circuit obfuscation Y Xie, C Bao, Y Liu, A Srivastava 2016 17th International Workshop on Microprocessor and SOC Test and …, 2016 | 19 | 2016 |
GPU obfuscation: attack and defense strategies A Chakraborty, Y Xie, A Srivastava Proceedings of the 55th Annual Design Automation Conference, 1-6, 2018 | 18 | 2018 |
3D/2.5 D IC-based obfuscation Y Xie, C Bao, A Srivastava Hardware protection through obfuscation, 291-314, 2017 | 15 | 2017 |
A security-aware design scheme for better hardware Trojan detection sensitivity C Bao, Y Xie, A Srivastava 2015 IEEE International Symposium on Hardware Oriented Security and Trust …, 2015 | 15 | 2015 |
Template attack based deobfuscation of integrated circuits A Chakraborty, Y Xie, A Srivastava 2017 IEEE International Conference on Computer Design (ICCD), 41-44, 2017 | 14 | 2017 |
Using AI to Detect COVID-19 Misinformation and Exploitative Content R Sumbaly, M Miller, H Shah, Y Xie, SC Culatana, T Khatkevich, E Luo, ... https://ai.facebook.com/blog/using-ai-to-detect-covid-19-misinformation-and …, 2020 | 8 | 2020 |
Introducing TFUE: The trusted foundry and untrusted employee model in IC supply chain security Y Liu, C Bao, Y Xie, A Srivastava 2017 IEEE International Symposium on Circuits and Systems (ISCAS), 1-4, 2017 | 8 | 2017 |
An optimization-theoretic approach for attacking physical unclonable functions Y Liu, Y Xie, C Bao, A Srivastava 2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 1-6, 2016 | 7 | 2016 |
Secure and effective logic locking for machine learning applications Y Liu, Y Xie, A Charkraborty, A Srivastava Cryptology ePrint Archive, 2019 | 2 | 2019 |