


Остановите войну!
for scientists:


default search action
Yingjie Lao
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j13]Jianchi Sun
, Nikhilesh Sharma
, Jacob Chakareski
, Nicholas Mastronarde
, Yingjie Lao
:
Hardware Acceleration for Postdecision State Reinforcement Learning in IoT Systems. IEEE Internet Things J. 9(12): 9889-9903 (2022) - [c39]Joseph Clements, Yingjie Lao:
DeepHardMark: Towards Watermarking Neural Network Hardware. AAAI 2022: 4450-4458 - [c38]Bingyin Zhao, Yingjie Lao:
CLPA: Clean-Label Poisoning Availability Attacks Using Generative Adversarial Nets. AAAI 2022: 9162-9170 - [c37]Yingjie Lao, Weijie Zhao
, Peng Yang, Ping Li:
DeepAuth: A DNN Authentication Framework by Model-Unique and Fragile Signature Embedding. AAAI 2022: 9595-9603 - [c36]Antian Wang, Weihang Tan, Keshab K. Parhi, Yingjie Lao:
Integral Sampler and Polynomial Multiplication Architecture for Lattice-based Cryptography. DFT 2022: 1-6 - [c35]Joseph Clements, Yingjie Lao:
In Pursuit of Preserving the Fidelity of Adversarial Images. ICASSP 2022: 2859-2863 - [c34]Yingjie Lao, Peng Yang, Weijie Zhao, Ping Li:
Identification for Deep Neural Network: Simply Adjusting Few Weights! ICDE 2022: 1328-1341 - [c33]Azadeh Famili, Yingjie Lao:
Genetic-based Joint Dynamic Pruning and Learning Algorithm to Boost DNN Performance. ICPR 2022: 2100-2106 - [c32]Weijie Zhao
, Yingjie Lao, Ping Li:
Integrity Authentication in Tree Models. KDD 2022: 2585-2593 - [c31]Bingyin Zhao, Yingjie Lao:
Towards Class-Oriented Poisoning Attacks Against Neural Networks. WACV 2022: 2244-2253 - [i9]Weijie Zhao, Yingjie Lao, Ping Li:
Integrity Authentication in Tree Models. CoRR abs/2205.15444 (2022) - [i8]Khoa D. Doan, Yingjie Lao, Peng Yang, Ping Li:
Defending Backdoor Attacks on Vision Transformer via Patch Processing. CoRR abs/2206.12381 (2022) - [i7]Faysal Hossain Shezan, Yingjie Lao, Minlong Peng, Xin Wang, Mingming Sun, Ping Li:
NL2GDPR: Automatically Develop GDPR Compliant Android Application Features from Natural Language. CoRR abs/2208.13361 (2022) - [i6]Antian Wang, Weihang Tan, Keshab K. Parhi, Yingjie Lao:
Integral Sampler and Polynomial Multiplication Architecture for Lattice-based Cryptography. CoRR abs/2208.14270 (2022) - [i5]Khoa D. Doan, Yingjie Lao, Ping Li:
Marksman Backdoor: Backdoor Attacks with Arbitrary Target Class. CoRR abs/2210.09194 (2022) - 2021
- [j12]Antian Wang
, Weihang Tan
, Yuejiang Wen
, Yingjie Lao
:
NoPUF: A Novel PUF Design Framework Toward Modeling Attack Resistant PUFs. IEEE Trans. Circuits Syst. I Regul. Pap. 68(6): 2508-2521 (2021) - [j11]Weihang Tan
, Benjamin M. Case, Antian Wang
, Shuhong Gao, Yingjie Lao
:
High-Speed Modular Multiplier for Lattice-Based Cryptosystems. IEEE Trans. Circuits Syst. II Express Briefs 68(8): 2927-2931 (2021) - [j10]Weihang Tan, Benjamin M. Case, Gengran Hu, Shuhong Gao, Yingjie Lao
:
An Ultra-Highly Parallel Polynomial Multiplier for the Bootstrapping Algorithm in a Fully Homomorphic Encryption Scheme. J. Signal Process. Syst. 93(6): 643-656 (2021) - [c30]Weihang Tan, Antian Wang, Yingjie Lao, Xinmiao Zhang, Keshab K. Parhi:
Pipelined High-Throughput NTT Architecture for Lattice-Based Cryptography. AsianHOST 2021: 1-4 - [c29]Khoa Doan, Yingjie Lao, Weijie Zhao
, Ping Li:
LIRA: Learnable, Imperceptible and Robust Backdoor Attacks. ICCV 2021: 11946-11956 - [c28]Peng Yang, Yingjie Lao, Ping Li:
Robust Watermarking for Deep Neural Networks via Bi-level Optimization. ICCV 2021: 14821-14830 - [c27]Khoa Doan, Yingjie Lao, Ping Li:
Backdoor Attack with Imperceptible Input and Latent Modification. NeurIPS 2021: 18944-18957 - [c26]Joseph Clements, Yuzhe Yang, Ankur A Sharma, Hongxin Hu, Yingjie Lao:
Rallying Adversarial Techniques against Deep Learning for Network Security. SSCI 2021: 1-8 - [i4]Weihang Tan, Antian Wang, Yingjie Lao, Xinmiao Zhang, Keshab K. Parhi:
Low-Latency VLSI Architectures for Modular Polynomial Multiplication via Fast Filtering and Applications to Lattice-Based Cryptography. CoRR abs/2110.12127 (2021) - 2020
- [j9]Yunhao Xu, Yingjie Lao
, Weiqiang Liu
, Zaichen Zhang
, Xiaohu You
, Chuan Zhang
:
Mathematical Modeling Analysis of Strong Physical Unclonable Functions. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(12): 4426-4438 (2020) - [c25]Weihang Tan, Antian Wang, Yunhao Xu, Yingjie Lao:
Area-Efficient Pipelined VLSI Architecture for Polar Decoder. ISVLSI 2020: 352-357 - [c24]Jianchi Sun, Nikhilesh Sharma, Jacob Chakareski, Nicholas Mastronarde, Yingjie Lao:
Action Evaluation Hardware Accelerator for Next-Generation Real-Time Reinforcement Learning in Emerging IoT Systems. ISVLSI 2020: 428-433 - [i3]Bingyin Zhao, Yingjie Lao:
Class-Oriented Poisoning Attack. CoRR abs/2008.00047 (2020)
2010 – 2019
- 2019
- [j8]Xinmiao Zhang
, Yingjie Lao
:
On the Construction of Composite Finite Fields for Hardware Obfuscation. IEEE Trans. Computers 68(9): 1353-1364 (2019) - [c23]Yunhao Xu, Yingjie Lao, Weiqiang Liu, Chuan Zhang:
Security Analysis and Modeling Attacks on Duty Cycle Multiplexer PUF. ASICON 2019: 1-4 - [c22]Joseph Clements, Yingjie Lao:
Hardware Trojan Design on Neural Networks. ISCAS 2019: 1-5 - [c21]Ankur A Sharma, Xinmiao Zhang, Yingjie Lao:
Hardware Obfuscation Through Reconfiguration Finite Field Arithmetic Units. ISCAS 2019: 1-5 - [c20]Ling Qiu, Ziji Zhang, Jon Calhoun, Yingjie Lao:
Towards Data-Driven Approximate Circuit Design. ISVLSI 2019: 397-402 - [c19]Weihang Tan, Aengran Au, Benjamin Aase, Shuhong Aao, Yingjie Lao:
An Efficient Polynomial Multiplier Architecture for the Bootstrapping Algorithm in a Fully Homomorphic Encryption Scheme. SiPS 2019: 85-90 - [i2]Joseph Clements, Yuzhe Yang, Ankur A Sharma, Hongxin Hu, Yingjie Lao:
Rallying Adversarial Techniques against Deep Learning for Network Security. CoRR abs/1903.11688 (2019) - 2018
- [j7]Yingjie Lao
, Keshab K. Parhi:
Canonic Composite Length Real-Valued FFT. J. Signal Process. Syst. 90(10): 1401-1414 (2018) - [c18]Kai Sun, Yifei Shen, Yingjie Lao, Zaichen Zhang, Xiaohu You, Chuan Zhang:
A New Error Correction Scheme for Physical Unclonable Function. APCCAS 2018: 374-377 - [c17]Joseph Clements, Yingjie Lao:
Backdoor Attacks on Neural Network Operations. GlobalSIP 2018: 1154-1158 - [c16]Ling Qiu, Yingjie Lao:
A Systematic Method for Approximate Circuit Design Using Feature Selection. ISCAS 2018: 1-5 - [c15]Yuejiang Wen
, Yingjie Lao:
PUF Modeling Attack using Active Learning. ISCAS 2018: 1-5 - [c14]Bingyin Zhao, Yingjie Lao:
Resilience of Pruned Neural Network Against Poisoning Attack. MALWARE 2018: 78-83 - [c13]Xiaojia Wang, Yingjie Lao:
Utilizing Inherent Randomness in Stochastic Computing. MWSCAS 2018: 1-4 - [c12]Yuejiang Wen
, Yingjie Lao:
Efficient PUF Error Correction through Response Weighting. MWSCAS 2018: 849-852 - [i1]Joseph Clements, Yingjie Lao:
Hardware Trojan Attacks on Neural Networks. CoRR abs/1806.05768 (2018) - 2017
- [j6]Yingjie Lao, Keshab K. Parhi
:
Canonic FFT flow graphs for real-valued even/odd symmetric inputs. EURASIP J. Adv. Signal Process. 2017: 45 (2017) - [j5]Yingjie Lao
, Bo Yuan, Chris H. Kim, Keshab K. Parhi:
Reliable PUF-Based Local Authentication With Self-Correction. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 36(2): 201-213 (2017) - [c11]Yunhao Xu, Yingjie Lao, Weiqiang Liu, Xiaohu You, Chuan Zhang:
DC MUX PUF: A highly reliable feed-back MUX PUF based on measuring duty cycle. ASICON 2017: 883-886 - [c10]Yuejiang Wen
, Yingjie Lao:
Enhancing PUF reliability by machine learning. ISCAS 2017: 1-4 - [c9]Yuejiang Wen
, Yingjie Lao:
Efficient fuzzy extractor implementations for PUF based authentication. MALWARE 2017: 119-125 - 2016
- [j4]Yingjie Lao, Qianying Tang, Chris H. Kim, Keshab K. Parhi:
Beat Frequency Detector-Based High-Speed True Random Number Generators: Statistical Modeling and Analysis. ACM J. Emerg. Technol. Comput. Syst. 13(1): 9:1-9:25 (2016) - [c8]S. V. Sandeep Avvaru, Chen Zhou, Saroj Satapathy, Yingjie Lao, Chris H. Kim, Keshab K. Parhi:
Estimating delay differences of arbiter PUFs using silicon data. DATE 2016: 543-546 - [c7]Chen Zhou, Saroj Satapathy, Yingjie Lao, Keshab K. Parhi, Chris H. Kim:
Soft Response Generation and Thresholding Strategies for Linear and Feed-Forward MUX PUFs. ISLPED 2016: 124-129 - [c6]Yingjie Lao, Keshab K. Parhi:
Data-Canonic Real FFT Flow-Graphs for Composite Lengths. SiPS 2016: 189-194 - 2015
- [j3]Yingjie Lao, Keshab K. Parhi:
Obfuscating DSP Circuits via High-Level Transformations. IEEE Trans. Very Large Scale Integr. Syst. 23(5): 819-830 (2015) - [c5]Yingjie Lao, Keshab K. Parhi:
Canonic real-valued radix-2n FFT computations. ACSSC 2015: 441-446 - [c4]Goutham N. C. Shanmugam, Yingjie Lao, Keshab K. Parhi:
An obfuscated radix-2 real FFT architecture. ICASSP 2015: 1056-1060 - 2014
- [j2]Yingjie Lao, Keshab K. Parhi:
Statistical Analysis of MUX-Based Physical Unclonable Functions. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 33(5): 649-662 (2014) - [c3]Megha Parhi, Yingjie Lao, Keshab K. Parhi:
Canonic real-valued FFT structures. ACSSC 2014: 1261-1265 - [c2]Qianying Tang, Bongjin Kim, Yingjie Lao, Keshab K. Parhi, Chris H. Kim:
True Random Number Generator circuits based on single- and multi-phase beat frequency detection. CICC 2014: 1-4 - [c1]Yingjie Lao, Keshab K. Parhi:
Protecting DSP circuits through obfuscation. ISCAS 2014: 798-801 - 2013
- [j1]Manohar Ayinala, Yingjie Lao, Keshab K. Parhi:
An In-Place FFT Architecture for Real-Valued Signals. IEEE Trans. Circuits Syst. II Express Briefs 60-II(10): 652-656 (2013)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2022-12-10 02:12 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint