Follow
Yannan Liu
Yannan Liu
ByteDance
Verified email at bytedance.com - Homepage
Title
Cited by
Cited by
Year
VeriTrust: Verification for hardware trust
J Zhang, F Yuan, L Wei, Z Sun, Q Xu
Proceedings of the 50th Annual Design Automation Conference, 1-8, 2013
3222013
I know what you see: Power side-channel attack on convolutional neural network accelerators
L Wei, B Luo, Y Li, Y Liu, Q Xu
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
2142018
Fault injection attack on deep neural network
Y Liu, L Wei, B Luo, Q Xu
2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 131-138, 2017
2082017
Towards imperceptible and robust adversarial example attacks against neural networks
B Luo, Y Liu, L Wei, Q Xu
Proceedings of the AAAI conference on artificial intelligence 32 (1), 2018
1452018
On code execution tracking via power side-channel
Y Liu, L Wei, Z Zhou, K Zhang, W Xu, Q Xu
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
932016
BoardPUF: Physical unclonable functions for printed circuit board authentication
L Wei, C Song, Y Liu, J Zhang, F Yuan, Q Xu
2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 152-158, 2015
612015
D2NN: a fine-grained dual modular redundancy framework for deep neural networks
Y Li, Y Liu, M Li, Y Tian, B Luo, Q Xu.
Proceedings of the 35th Annual Computer Security Applications Conference, pp …, 2019
212019
Testrank: Bringing order into unlabeled test instances for deep learning tasks
Y Li, M Li, Q Lai, Y Liu, Q Xu
Advances in Neural Information Processing Systems 34, 20874-20886, 2021
182021
Shadow block: Accelerating oram accesses with data duplication
X Zhang, G Sun, P Xie, C Zhang, Y Liu, L Wei, Q Xu, CJ Xue
2018 51st Annual IEEE/ACM International Symposium on Microarchitecture …, 2018
182018
DERA: Yet another differential fault attack on cryptographic devices based on error rate analysis
Y Liu, J Zhang, L Wei, F Yuan, Q Xu
Proceedings of the 52nd Annual Design Automation Conference, 1-6, 2015
142015
On Trojan side channel design and identification
J Zhang, G Su, Y Liu, L Wei, F Yuan, G Bai, Q Xu
2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 278-285, 2014
142014
On testing timing-speculative circuits
F Yuan, Y Liu, WB Jone, Q Xu
Proceedings of the 50th Annual Design Automation Conference, 1-6, 2013
132013
Vulnerability analysis for crypto devices against probing attack
L Wei, J Zhang, F Yuan, Y Liu, J Fan, Q Xu
The 20th Asia and South Pacific Design Automation Conference, 827-832, 2015
42015
Retrodmr: Troubleshooting non-deterministic faults with retrospective DMR
T Wang, Y Liu, Q Xu, Z Zhang, Z Wang, X Gu
Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017 …, 2017
32017
NLabel: An Accurate Familial Clustering Framework for Large-Scale Weakly-Labeled Malware
Y Liu, Y Lai, K Wei, L Gu, Z Yan
2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020
2020
On the Security of Embedded System under Fault Injection and Side-Channel Leaks
Y Liu
PQDT-Global, 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–16