Follow
Ge  Li
Title
Cited by
Cited by
Year
Mini-batch serialization: Cnn training with inter-layer data reuse
S Lym, A Behroozi, W Wen, G Li, Y Kwon, M Erez
Proceedings of Machine Learning and Systems 1, 264-275, 2019
272019
Securing AES against localized EM attacks through spatial randomization of dataflow
G Li, V Iyer, M Orshansky
2019 IEEE International Symposium on Hardware Oriented Security and Trust …, 2019
182019
Physical design strategies for mitigating fine-grained electromagnetic side-channel attacks
M Wang, VV Iyer, S Xie, G Li, SK Mathew, R Kumar, M Orshansky, ...
2021 IEEE Custom Integrated Circuits Conference (CICC), 1-2, 2021
102021
A Provably Secure Strong PUF based on LWE: Construction and Implementation
X Xi*, G Li*, Y Wang, M Orshansky (* denotes equal contribution)
IEEE Transactions on Computers, 2022
82022
Galvanically isolated, power and electromagnetic side-channel attack resilient secure AES core with integrated charge pump based power management
M Wang, S Xie, PN Li, A Sayal, G Li, VV Iyer, A Thimmaiah, M Orshansky, ...
2021 IEEE Custom Integrated Circuits Conference (CICC), 1-2, 2021
62021
Power-based Attacks on Spatial DNN Accelerators
G Li, M Tiwari, M Orshansky
ACM Journal on Emerging Technologies in Computing Systems 18 (3), 1–18, 2022
52022
A Provably Secure Strong PUF based on LWE: Construction and Implementation
X Xi*, G Li*, Y Wang, Y Jeon, M Orshansky (* denotes equal contribution)
https://arxiv.org/abs/2303.02802, 2023
2023
Power-based Malware Detection in Linux Boot
G Li, A Cathis, A Lu, S Wei, R Brown, A Liu, M Tiwari, A Gerstlauer, ...
Eighth Annual Industrial Control System Security (ICSS) Workshop, 2022
2022
Physical side channels in embedded hardware security: analysis and defenses
G Li
2022
The system can't perform the operation now. Try again later.
Articles 1–9