Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Xiaotong Cui
@article{DBLP:journals/entropy/FangZCWD23, author = {Xing Fang and Hongxin Zhang and Xiaotong Cui and Yuanzhen Wang and Linxi Ding}, title = {Efficient Attack Scheme against {SKINNY-64} Based on Algebraic Fault Analysis}, journal = {Entropy}, volume = {25}, number = {6}, pages = {908}, year = {2023}, url = {https://doi.org/10.3390/e25060908}, doi = {10.3390/E25060908}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entropy/FangZCWD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/WangZFCNWFS23, author = {Yuanzhen Wang and Hongxin Zhang and Xing Fang and Xiaotong Cui and Wenxu Ning and Danzhi Wang and Fan Fan and Lei Shu}, title = {Hybrid Threshold Denoising Framework Using Singular Value Decomposition for Side-Channel Analysis Preprocessing}, journal = {Entropy}, volume = {25}, number = {8}, pages = {1133}, year = {2023}, url = {https://doi.org/10.3390/e25081133}, doi = {10.3390/E25081133}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entropy/WangZFCNWFS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaia/LuoWGC23, author = {Changliang Luo and Zhao Wen and Lei Gao and Xiaotong Cui}, title = {Side-Channel Attacks Based on Deep Learning}, booktitle = {Proceedings of the 2023 International Conference on Advances in Artificial Intelligence and Applications, {AAIA} 2023, Wuhan, China, November 18-20, 2023}, pages = {33--37}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3603273.3630505}, doi = {10.1145/3603273.3630505}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aaia/LuoWGC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaia/HeZZC23, author = {Peng He and Qin Zhang and Heng Zhang and Xiaotong Cui}, title = {Power Analysis Attack Based on Hybrid Denoising}, booktitle = {Proceedings of the 2023 International Conference on Advances in Artificial Intelligence and Applications, {AAIA} 2023, Wuhan, China, November 18-20, 2023}, pages = {349--353}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3603273.3630503}, doi = {10.1145/3603273.3630503}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aaia/HeZZC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/ZhangZCFW22, author = {Qingqing Zhang and Hongxing Zhang and Xiaotong Cui and Xing Fang and Xingyang Wang}, title = {Side Channel Analysis of {SPECK} Based on Transfer Learning}, journal = {Sensors}, volume = {22}, number = {13}, pages = {4671}, year = {2022}, url = {https://doi.org/10.3390/s22134671}, doi = {10.3390/S22134671}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/ZhangZCFW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcad/CuiZYZCWW22, author = {Xiaotong Cui and Xing Zhang and Hao Yan and Liang Zhang and Kefei Cheng and Yu Wu and Kaijie Wu}, title = {Toward Building and Optimizing Trustworthy Systems Using Untrusted Components: {A} Graph-Theoretic Perspective}, journal = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.}, volume = {41}, number = {5}, pages = {1386--1399}, year = {2022}, url = {https://doi.org/10.1109/TCAD.2021.3086765}, doi = {10.1109/TCAD.2021.3086765}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcad/CuiZYZCWW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcasII/SunZCDF22, author = {Shaofei Sun and Hongxin Zhang and Xiaotong Cui and Liang Dong and Xing Fang}, title = {Electromagnetic Side-Channel Hardware Trojan Detection Based on Transfer Learning}, journal = {{IEEE} Trans. Circuits Syst. {II} Express Briefs}, volume = {69}, number = {3}, pages = {1742--1746}, year = {2022}, url = {https://doi.org/10.1109/TCSII.2021.3110954}, doi = {10.1109/TCSII.2021.3110954}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcasII/SunZCDF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isvlsi/ZouZCWK22, author = {Minhui Zou and Junlong Zhou and Xiaotong Cui and Wei Wang and Shahar Kvatinsky}, title = {Enhancing Security of Memristor Computing System Through Secure Weight Mapping}, booktitle = {{IEEE} Computer Society Annual Symposium on VLSI, {ISVLSI} 2022, Nicosia, Cyprus, July 4-6, 2022}, pages = {182--187}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ISVLSI54635.2022.00044}, doi = {10.1109/ISVLSI54635.2022.00044}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isvlsi/ZouZCWK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2206-14498, author = {Minhui Zou and Junlong Zhou and Xiaotong Cui and Wei Wang and Shahar Kvatinsky}, title = {Enhancing Security of Memristor Computing System Through Secure Weight Mapping}, journal = {CoRR}, volume = {abs/2206.14498}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2206.14498}, doi = {10.48550/ARXIV.2206.14498}, eprinttype = {arXiv}, eprint = {2206.14498}, timestamp = {Mon, 04 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2206-14498.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/SunZCLDF21, author = {Shaofei Sun and Hongxin Zhang and Xiaotong Cui and Qiang Li and Liang Dong and Xing Fang}, title = {Analysis of Electromagnetic Information Leakage Based on Cryptographic Integrated Circuits}, journal = {Entropy}, volume = {23}, number = {11}, pages = {1508}, year = {2021}, url = {https://doi.org/10.3390/e23111508}, doi = {10.3390/E23111508}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entropy/SunZCLDF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejwcn/ZhangLXZCS20, author = {Hongxin Zhang and Jia Liu and Jun Xu and Fan Zhang and Xiaotong Cui and Shaofei Sun}, title = {Electromagnetic radiation-based {IC} device identification and verification using deep learning}, journal = {{EURASIP} J. Wirel. Commun. Netw.}, volume = {2020}, number = {1}, pages = {206}, year = {2020}, url = {https://doi.org/10.1186/s13638-020-01808-z}, doi = {10.1186/S13638-020-01808-Z}, timestamp = {Sat, 14 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejwcn/ZhangLXZCS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/DongZSZCG20, author = {Liang Dong and Hongxin Zhang and Shaofei Sun and Lei Zhu and Xiaotong Cui and Bablu K. Ghosh}, title = {An Effective Simulation Analysis of Transient Electromagnetic Multiple Faults}, journal = {Sensors}, volume = {20}, number = {7}, pages = {1976}, year = {2020}, url = {https://doi.org/10.3390/s20071976}, doi = {10.3390/S20071976}, timestamp = {Sun, 24 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/DongZSZCG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tetc/CuiSZWWDK20, author = {Xiaotong Cui and Samah Mohamed Saeed and Alwin Zulehner and Robert Wille and Kaijie Wu and Rolf Drechsler and Ramesh Karri}, title = {On the Difficulty of Inserting Trojans in Reversible Computing Architectures}, journal = {{IEEE} Trans. Emerg. Top. Comput.}, volume = {8}, number = {4}, pages = {960--972}, year = {2020}, url = {https://doi.org/10.1109/TETC.2018.2823315}, doi = {10.1109/TETC.2018.2823315}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tetc/CuiSZWWDK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhangCCZ20, author = {Xing Zhang and Xiaotong Cui and Kefei Cheng and Liang Zhang}, title = {A Convolutional Encoder Network for Intrusion Detection in Controller Area Networks}, booktitle = {16th International Conference on Computational Intelligence and Security, {CIS} 2020, Nanning, China, November 27-30, 2020}, pages = {366--369}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CIS52066.2020.00084}, doi = {10.1109/CIS52066.2020.00084}, timestamp = {Wed, 05 May 2021 14:53:25 +0200}, biburl = {https://dblp.org/rec/conf/cis/ZhangCCZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jetc/CuiZWGK19, author = {Xiaotong Cui and Jeff Jun Zhang and Kaijie Wu and Siddharth Garg and Ramesh Karri}, title = {Split Manufacturing-Based Register Transfer-Level Obfuscation}, journal = {{ACM} J. Emerg. Technol. Comput. Syst.}, volume = {15}, number = {1}, pages = {11:1--11:22}, year = {2019}, url = {https://doi.org/10.1145/3289156}, doi = {10.1145/3289156}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jetc/CuiZWGK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/SunZDCCK19, author = {Shaofei Sun and Hongxin Zhang and Liang Dong and Xiaotong Cui and Weijun Cheng and Muhammad Saad Khan}, title = {A Novel Multi-Objective Electromagnetic Analysis Based on Genetic Algorithm}, journal = {Sensors}, volume = {19}, number = {24}, pages = {5542}, year = {2019}, url = {https://doi.org/10.3390/s19245542}, doi = {10.3390/S19245542}, timestamp = {Sat, 30 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/SunZDCCK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LongACL18, author = {Linbo Long and Qing Ai and Xiaotong Cui and Jun Liu}, title = {{TTEC:} Data Allocation Optimization for Morphable Scratchpad Memory in Embedded Systems}, journal = {{IEEE} Access}, volume = {6}, pages = {54701--54712}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2872762}, doi = {10.1109/ACCESS.2018.2872762}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LongACL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jetc/CuiKWK18, author = {Xiaotong Cui and Elnaz Koopahi and Kaijie Wu and Ramesh Karri}, title = {Hardware Trojan Detection Using the Order of Path Delay}, journal = {{ACM} J. Emerg. Technol. Comput. Syst.}, volume = {14}, number = {3}, pages = {33:1--33:23}, year = {2018}, url = {https://doi.org/10.1145/3229050}, doi = {10.1145/3229050}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jetc/CuiKWK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcad/ZouCSW18, author = {Minhui Zou and Xiaotong Cui and Liang Shi and Kaijie Wu}, title = {Potential Trigger Detection for Hardware Trojans}, journal = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.}, volume = {37}, number = {7}, pages = {1384--1395}, year = {2018}, url = {https://doi.org/10.1109/TCAD.2017.2753201}, doi = {10.1109/TCAD.2017.2753201}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcad/ZouCSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ets/Cui0K18, author = {Xiaotong Cui and Kaijie Wu and Ramesh Karri}, title = {Hardware Trojan detection using path delay order encoding with process variation tolerance}, booktitle = {23rd {IEEE} European Test Symposium, {ETS} 2018, Bremen, Germany, May 28 - June 1, 2018}, pages = {1--2}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ETS.2018.8400708}, doi = {10.1109/ETS.2018.8400708}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ets/Cui0K18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccad/SaeedCZWD0K18, author = {Samah Mohamed Saeed and Xiaotong Cui and Alwin Zulehner and Robert Wille and Rolf Drechsler and Kaijie Wu and Ramesh Karri}, editor = {Iris Bahar}, title = {{IC/IP} piracy assessment of reversible logic}, booktitle = {Proceedings of the International Conference on Computer-Aided Design, {ICCAD} 2018, San Diego, CA, USA, November 05-08, 2018}, pages = {5}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3240765.3240817}, doi = {10.1145/3240765.3240817}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccad/SaeedCZWD0K18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mam/CuiSW17, author = {Xiaotong Cui and Liang Shi and Kaijie Wu}, title = {Towards trustworthy storage using SSDs with proprietary {FTL}}, journal = {Microprocess. Microsystems}, volume = {55}, pages = {82--90}, year = {2017}, url = {https://doi.org/10.1016/j.micpro.2017.10.003}, doi = {10.1016/J.MICPRO.2017.10.003}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mam/CuiSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SaeedCWZ0DK17, author = {Samah Mohamed Saeed and Xiaotong Cui and Robert Wille and Alwin Zulehner and Kaijie Wu and Rolf Drechsler and Ramesh Karri}, title = {Towards Reverse Engineering Reversible Logic}, journal = {CoRR}, volume = {abs/1704.08397}, year = {2017}, url = {http://arxiv.org/abs/1704.08397}, eprinttype = {arXiv}, eprint = {1704.08397}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/SaeedCWZ0DK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/CuiSZWD0K17, author = {Xiaotong Cui and Samah Mohamed Saeed and Alwin Zulehner and Robert Wille and Rolf Drechsler and Kaijie Wu and Ramesh Karri}, title = {On the Difficulty of Inserting Trojans in Reversible Computing Architectures}, journal = {CoRR}, volume = {abs/1705.00767}, year = {2017}, url = {http://arxiv.org/abs/1705.00767}, eprinttype = {arXiv}, eprint = {1705.00767}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/CuiSZWD0K17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/CuiWWS16, author = {Xiaotong Cui and Kaijie Wu and Tongquan Wei and Edwin Hsing{-}Mean Sha}, title = {Worst-Case Finish Time Analysis for DAG-Based Applications in the Presence of Transient Faults}, journal = {J. Comput. Sci. Technol.}, volume = {31}, number = {2}, pages = {267--283}, year = {2016}, url = {https://doi.org/10.1007/s11390-016-1626-6}, doi = {10.1007/S11390-016-1626-6}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcst/CuiWWS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dft/Cui0GK16, author = {Xiaotong Cui and Kaijie Wu and Siddharth Garg and Ramesh Karri}, title = {Can flexible, domain specific programmable logic prevent {IP} theft?}, booktitle = {2016 {IEEE} International Symposium on Defect and Fault Tolerance in {VLSI} and Nanotechnology Systems, {DFT} 2016, Storrs, CT, USA, September 19-20, 2016}, pages = {153--157}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/DFT.2016.7684088}, doi = {10.1109/DFT.2016.7684088}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dft/Cui0GK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/CuiZSW15, author = {Xiaotong Cui and Minhui Zou and Liang Shi and Kaijie Wu}, editor = {Wolfgang Nebel and David Atienza}, title = {Towards trustable storage using SSDs with proprietary {FTL}}, booktitle = {Proceedings of the 2015 Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2015, Grenoble, France, March 9-13, 2015}, pages = {1213--1216}, publisher = {{ACM}}, year = {2015}, url = {http://dl.acm.org/citation.cfm?id=2757093}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/date/CuiZSW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aspdac/CuiZWS14, author = {Xiaotong Cui and Jun Zhang and Kaijie Wu and Edwin Hsing{-}Mean Sha}, title = {Efficient feasibility analysis of {DAG} scheduling with real-time constraints in the presence of faults}, booktitle = {19th Asia and South Pacific Design Automation Conference, {ASP-DAC} 2014, Singapore, January 20-23, 2014}, pages = {131--136}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ASPDAC.2014.6742878}, doi = {10.1109/ASPDAC.2014.6742878}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/aspdac/CuiZWS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dac/CuiMSW14, author = {Xiaotong Cui and Kun Ma and Liang Shi and Kaijie Wu}, title = {High-Level Synthesis for Run-Time Hardware Trojan Detection and Recovery}, booktitle = {The 51st Annual Design Automation Conference 2014, {DAC} '14, San Francisco, CA, USA, June 1-5, 2014}, pages = {157:1--157:6}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2593069.2593150}, doi = {10.1145/2593069.2593150}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dac/CuiMSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.