Seguir
Shuyu Kong
Título
Citado por
Citado por
Año
CycSAT: SAT-based attack on cyclic logic encryptions
H Zhou, R Jiang, S Kong
2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 49-56, 2017
1662017
Cyclic locking and memristor-based obfuscation against CycSAT and inside foundry attacks
A Rezaei, Y Shen, S Kong, J Gu, H Zhou
2018 Design, Automation & Test in Europe Conference & Exhibition (DATE), 85-90, 2018
612018
BeSAT: Behavioral SAT-based attack on cyclic logic encryption
Y Shen, Y Li, A Rezaei, S Kong, D Dlott, H Zhou
Proceedings of the 24th Asia and South Pacific Design Automation Conference …, 2019
562019
CycSAT-unresolvable cyclic logic encryption using unreachable states
A Rezaei, Y Li, Y Shen, S Kong, H Zhou
Proceedings of the 24th Asia and South Pacific Design Automation Conference …, 2019
372019
SigAttack: New high-level SAT-based attack on logic encryptions
Y Shen, Y Li, S Kong, A Rezaei, H Zhou
2019 Design, Automation & Test in Europe Conference & Exhibition (DATE), 940-943, 2019
232019
Incentivizing federated learning
S Kong, Y Li, H Zhou
arXiv preprint arXiv:2205.10951, 2022
72022
Using security invariant to verify confidentiality in hardware design
S Kong, Y Shen, H Zhou
Proceedings of the on Great Lakes Symposium on VLSI 2017, 487-490, 2017
42017
KNN-enhanced Deep Learning Against Noisy Labels
S Kong, Y Li, J Wang, A Rezaei, H Zhou
arXiv preprint arXiv:2012.04224, 2020
22020
Memristor-based clock design and optimization with in-situ tunability
S Kong, J Gu, H Zhou
2017 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 427-432, 2017
22017
Design and synthesis of self-healing memristive circuits for timing resilient processor design
S Kong, H Zhou, J Gu
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 26 (12 …, 2018
12018
Improving Security and Robustness of Hardware and Learning Systems
S Kong
Northwestern University, 2021
2021
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–11