Follow
Yang Xie
Yang Xie
Verified email at fb.com - Homepage
Title
Cited by
Cited by
Year
Neural trojans
Y Liu, Y Xie, A Srivastava
2017 IEEE International Conference on Computer Design (ICCD), 45-48, 2017
3702017
Mitigating SAT attack on logic locking
Y Xie, A Srivastava
Cryptographic Hardware and Embedded Systems–CHES 2016: 18th International …, 2016
3212016
Anti-SAT: Mitigating SAT attack on logic locking
Y Xie, A Srivastava
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2018
2282018
Delay locking: Security enhancement of logic locking against ic counterfeiting and overproduction
Y Xie, A Srivastava
Proceedings of the 54th Annual Design Automation Conference 2017, 1-6, 2017
1332017
Keynote: A disquisition on logic locking
A Chakraborty, NG Jayasankaran, Y Liu, J Rajendran, O Sinanoglu, ...
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2019
1082019
Security and vulnerability implications of 3D ICs
Y Xie, C Bao, C Serafy, T Lu, A Srivastava, M Tehranipoor
IEEE Transactions on Multi-Scale Computing Systems 2 (2), 108-122, 2016
562016
Security-aware design flow for 2.5 D IC technology
Y Xie, C Bao, A Srivastava
Proceedings of the 5th International Workshop on Trustworthy Embedded …, 2015
562015
Strong anti-SAT: Secure and effective logic locking
Y Liu, M Zuzak, Y Xie, A Chakraborty, A Srivastava
2020 21st International Symposium on Quality Electronic Design (ISQED), 199-205, 2020
512020
Security-aware 2.5 D integrated circuit design flow against hardware IP piracy
Y Xie, C Bao, A Srivastava
Computer 50 (5), 62-71, 2017
362017
A combined optimization-theoretic and side-channel approach for attacking strong physical unclonable functions
Y Liu, Y Xie, C Bao, A Srivastava
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 26 (1), 73-81, 2017
322017
Robust and attack resilient logic locking with a high application-level impact
Y Liu, M Zuzak, Y Xie, A Chakraborty, A Srivastava
ACM Journal on Emerging Technologies in Computing Systems (JETC) 17 (3), 1-22, 2021
202021
2.5 D/3D integration technologies for circuit obfuscation
Y Xie, C Bao, Y Liu, A Srivastava
2016 17th International Workshop on Microprocessor and SOC Test and …, 2016
192016
GPU obfuscation: attack and defense strategies
A Chakraborty, Y Xie, A Srivastava
Proceedings of the 55th Annual Design Automation Conference, 1-6, 2018
182018
3D/2.5 D IC-based obfuscation
Y Xie, C Bao, A Srivastava
Hardware protection through obfuscation, 291-314, 2017
152017
A security-aware design scheme for better hardware Trojan detection sensitivity
C Bao, Y Xie, A Srivastava
2015 IEEE International Symposium on Hardware Oriented Security and Trust …, 2015
152015
Template attack based deobfuscation of integrated circuits
A Chakraborty, Y Xie, A Srivastava
2017 IEEE International Conference on Computer Design (ICCD), 41-44, 2017
142017
Introducing TFUE: The trusted foundry and untrusted employee model in IC supply chain security
Y Liu, C Bao, Y Xie, A Srivastava
2017 IEEE International Symposium on Circuits and Systems (ISCAS), 1-4, 2017
92017
Using AI to Detect COVID-19 Misinformation and Exploitative Content
R Sumbaly, M Miller, H Shah, Y Xie, SC Culatana, T Khatkevich, E Luo, ...
https://ai.facebook.com/blog/using-ai-to-detect-covid-19-misinformation-and …, 2020
82020
An optimization-theoretic approach for attacking physical unclonable functions
Y Liu, Y Xie, C Bao, A Srivastava
2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 1-6, 2016
72016
Secure and effective logic locking for machine learning applications
Y Liu, Y Xie, A Charkraborty, A Srivastava
Cryptology ePrint Archive, 2019
22019
The system can't perform the operation now. Try again later.
Articles 1–20