default search action
BibTeX records: Lingxiao Wei
@article{DBLP:journals/iotj/TangWLZG23, author = {Jine Tang and Lingxiao Wei and Weijing Liu and Zhangbing Zhou and Junhua Gu}, title = {Correlation Anomaly Detection With Multiple Primary Attributes in Collaborative Device-Edge-Cloud Network}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {6, March 15}, pages = {4922--4936}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2022.3221086}, doi = {10.1109/JIOT.2022.3221086}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/TangWLZG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcrowdsci/TangWWLQZG22, author = {Jine Tang and Shuang Wu and Lingxiao Wei and Weijing Liu and Taishan Qin and Zhangbing Zhou and Junhua Gu}, title = {Energy-Efficient Sensory Data Collection Based on Spatiotemporal Correlation in IoT Networks}, journal = {Int. J. Crowd Sci.}, volume = {6}, number = {1}, pages = {34--43}, year = {2022}, url = {https://doi.org/10.26599/ijcs.2022.9100007}, doi = {10.26599/IJCS.2022.9100007}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcrowdsci/TangWWLQZG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/LuoLW019, author = {Bo Luo and Yu Li and Lingxiao Wei and Qiang Xu}, editor = {J{\"{u}}rgen Teich and Franco Fummi}, title = {On Functional Test Generation for Deep Neural Network IPs}, booktitle = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2019, Florence, Italy, March 25-29, 2019}, pages = {1010--1015}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.23919/DATE.2019.8715042}, doi = {10.23919/DATE.2019.8715042}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/date/LuoLW019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1911-11550, author = {Bo Luo and Yu Li and Lingxiao Wei and Qiang Xu}, title = {On Functional Test Generation for Deep Neural Network IPs}, journal = {CoRR}, volume = {abs/1911.11550}, year = {2019}, url = {http://arxiv.org/abs/1911.11550}, eprinttype = {arXiv}, eprint = {1911.11550}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1911-11550.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/LuoLWX18, author = {Bo Luo and Yannan Liu and Lingxiao Wei and Qiang Xu}, editor = {Sheila A. McIlraith and Kilian Q. Weinberger}, title = {Towards Imperceptible and Robust Adversarial Example Attacks Against Neural Networks}, booktitle = {Proceedings of the Thirty-Second {AAAI} Conference on Artificial Intelligence, (AAAI-18), the 30th innovative Applications of Artificial Intelligence (IAAI-18), and the 8th {AAAI} Symposium on Educational Advances in Artificial Intelligence (EAAI-18), New Orleans, Louisiana, USA, February 2-7, 2018}, pages = {1652--1659}, publisher = {{AAAI} Press}, year = {2018}, url = {https://doi.org/10.1609/aaai.v32i1.11499}, doi = {10.1609/AAAI.V32I1.11499}, timestamp = {Mon, 04 Sep 2023 12:29:24 +0200}, biburl = {https://dblp.org/rec/conf/aaai/LuoLWX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WeiLLL018, author = {Lingxiao Wei and Bo Luo and Yu Li and Yannan Liu and Qiang Xu}, title = {I Know What You See: Power Side-Channel Attack on Convolutional Neural Network Accelerators}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {393--406}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274696}, doi = {10.1145/3274694.3274696}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/WeiLLL018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/micro/ZhangSXZLW0X18, author = {Xian Zhang and Guangyu Sun and Peichen Xie and Chao Zhang and Yannan Liu and Lingxiao Wei and Qiang Xu and Chun Jason Xue}, title = {Shadow Block: Accelerating {ORAM} Accesses with Data Duplication}, booktitle = {51st Annual {IEEE/ACM} International Symposium on Microarchitecture, {MICRO} 2018, Fukuoka, Japan, October 20-24, 2018}, pages = {961--973}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/MICRO.2018.00082}, doi = {10.1109/MICRO.2018.00082}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/micro/ZhangSXZLW0X18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1801-04693, author = {Bo Luo and Yannan Liu and Lingxiao Wei and Qiang Xu}, title = {Towards Imperceptible and Robust Adversarial Example Attacks against Neural Networks}, journal = {CoRR}, volume = {abs/1801.04693}, year = {2018}, url = {http://arxiv.org/abs/1801.04693}, eprinttype = {arXiv}, eprint = {1801.04693}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1801-04693.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1803-05847, author = {Lingxiao Wei and Yannan Liu and Bo Luo and Yu Li and Qiang Xu}, title = {I Know What You See: Power Side-Channel Attack on Convolutional Neural Network Accelerators}, journal = {CoRR}, volume = {abs/1803.05847}, year = {2018}, url = {http://arxiv.org/abs/1803.05847}, eprinttype = {arXiv}, eprint = {1803.05847}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1803-05847.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccad/LiuWLX17, author = {Yannan Liu and Lingxiao Wei and Bo Luo and Qiang Xu}, editor = {Sri Parameswaran}, title = {Fault injection attack on deep neural network}, booktitle = {2017 {IEEE/ACM} International Conference on Computer-Aided Design, {ICCAD} 2017, Irvine, CA, USA, November 13-16, 2017}, pages = {131--138}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ICCAD.2017.8203770}, doi = {10.1109/ICCAD.2017.8203770}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccad/LiuWLX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiuWZZXX16, author = {Yannan Liu and Lingxiao Wei and Zhe Zhou and Kehuan Zhang and Wenyuan Xu and Qiang Xu}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {On Code Execution Tracking via Power Side-Channel}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {1019--1031}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978299}, doi = {10.1145/2976749.2978299}, timestamp = {Wed, 10 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LiuWZZXX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcad/ZhangYWLX15, author = {Jie Zhang and Feng Yuan and Lingxiao Wei and Yannan Liu and Qiang Xu}, title = {VeriTrust: Verification for Hardware Trust}, journal = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.}, volume = {34}, number = {7}, pages = {1148--1161}, year = {2015}, url = {https://doi.org/10.1109/TCAD.2015.2422836}, doi = {10.1109/TCAD.2015.2422836}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcad/ZhangYWLX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aspdac/WeiZYLFX15, author = {Lingxiao Wei and Jie Zhang and Feng Yuan and Yannan Liu and Junfeng Fan and Qiang Xu}, title = {Vulnerability analysis for crypto devices against probing attack}, booktitle = {The 20th Asia and South Pacific Design Automation Conference, {ASP-DAC} 2015, Chiba, Japan, January 19-22, 2015}, pages = {827--832}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ASPDAC.2015.7059113}, doi = {10.1109/ASPDAC.2015.7059113}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aspdac/WeiZYLFX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dac/LiuZWYX15, author = {Yannan Liu and Jie Zhang and Lingxiao Wei and Feng Yuan and Qiang Xu}, title = {{DERA:} yet another differential fault attack on cryptographic devices based on error rate analysis}, booktitle = {Proceedings of the 52nd Annual Design Automation Conference, San Francisco, CA, USA, June 7-11, 2015}, pages = {31:1--31:6}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2744769.2744816}, doi = {10.1145/2744769.2744816}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dac/LiuZWYX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccad/WeiSLZYX15, author = {Lingxiao Wei and Chaosheng Song and Yannan Liu and Jie Zhang and Feng Yuan and Qiang Xu}, editor = {Diana Marculescu and Frank Liu}, title = {BoardPUF: Physical Unclonable Functions for Printed Circuit Board Authentication}, booktitle = {Proceedings of the {IEEE/ACM} International Conference on Computer-Aided Design, {ICCAD} 2015, Austin, TX, USA, November 2-6, 2015}, pages = {152--158}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICCAD.2015.7372563}, doi = {10.1109/ICCAD.2015.7372563}, timestamp = {Mon, 26 Jun 2023 16:43:56 +0200}, biburl = {https://dblp.org/rec/conf/iccad/WeiSLZYX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccad/ZhangSLWYBX14, author = {Jie Zhang and Guantong Su and Yannan Liu and Lingxiao Wei and Feng Yuan and Guoqiang Bai and Qiang Xu}, editor = {Yao{-}Wen Chang}, title = {On trojan side channel design and identification}, booktitle = {The {IEEE/ACM} International Conference on Computer-Aided Design, {ICCAD} 2014, San Jose, CA, USA, November 3-6, 2014}, pages = {278--285}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICCAD.2014.7001363}, doi = {10.1109/ICCAD.2014.7001363}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccad/ZhangSLWYBX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dac/ZhangYWSX13, author = {Jie Zhang and Feng Yuan and Lingxiao Wei and Zelong Sun and Qiang Xu}, title = {VeriTrust: verification for hardware trust}, booktitle = {The 50th Annual Design Automation Conference 2013, {DAC} '13, Austin, TX, USA, May 29 - June 07, 2013}, pages = {61:1--61:8}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2463209.2488808}, doi = {10.1145/2463209.2488808}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dac/ZhangYWSX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.