BibTeX records: Weize Yu

download as .bib file

@article{DBLP:journals/ijcta/ChengLSPSWBWZZY23,
  author       = {Jiafeng Cheng and
                  Wenrui Liu and
                  Nengyuan Sun and
                  Zhaokang Peng and
                  Caiban Sun and
                  Chunyang Wang and
                  Yijian Bi and
                  Yiming Wen and
                  Hongliu Zhang and
                  Pengcheng Zhang and
                  Weize Yu},
  title        = {A low output ripple and high security on-chip voltage regulation based
                  on Fourier transform},
  journal      = {Int. J. Circuit Theory Appl.},
  volume       = {51},
  number       = {6},
  pages        = {2578--2591},
  year         = {2023},
  url          = {https://doi.org/10.1002/cta.3571},
  doi          = {10.1002/CTA.3571},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcta/ChengLSPSWBWZZY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcta/LiuCSPSWWZZY23,
  author       = {Wenrui Liu and
                  Jiafeng Cheng and
                  Nengyuan Sun and
                  Zhaokang Peng and
                  Caiban Sun and
                  Chunyang Wang and
                  Yiming Wen and
                  Hongliu Zhang and
                  Pengcheng Zhang and
                  Weize Yu},
  title        = {A novel hardware authentication primitive against modeling attacks},
  journal      = {Int. J. Circuit Theory Appl.},
  volume       = {51},
  number       = {6},
  pages        = {2993--3001},
  year         = {2023},
  url          = {https://doi.org/10.1002/cta.3566},
  doi          = {10.1002/CTA.3566},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcta/LiuCSPSWWZZY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcta/ChengLSPSWBWZZY23a,
  author       = {Jiafeng Cheng and
                  Wenrui Liu and
                  Nengyuan Sun and
                  Zhaokang Peng and
                  Caiban Sun and
                  Chunyang Wang and
                  Yijian Bi and
                  Yiming Wen and
                  Hongliu Zhang and
                  Pengcheng Zhang and
                  Weize Yu},
  title        = {A machine learning low-dropout regulator-assisted differential power
                  analysis attack countermeasure with voltage scaling},
  journal      = {Int. J. Circuit Theory Appl.},
  volume       = {51},
  number       = {7},
  pages        = {3105--3117},
  year         = {2023},
  url          = {https://doi.org/10.1002/cta.3583},
  doi          = {10.1002/CTA.3583},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcta/ChengLSPSWBWZZY23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcta/SunLCSPSY23,
  author       = {Caiban Sun and
                  Wenrui Liu and
                  Jiafeng Cheng and
                  Nengyuan Sun and
                  Zhaokang Peng and
                  Heng Sha and
                  Weize Yu},
  title        = {A high-speed and low-latency hardware implementation of {RC4} cryptographic
                  algorithm},
  journal      = {Int. J. Circuit Theory Appl.},
  volume       = {51},
  number       = {12},
  pages        = {5980--5996},
  year         = {2023},
  url          = {https://doi.org/10.1002/cta.3769},
  doi          = {10.1002/CTA.3769},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcta/SunLCSPSY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/integration/PengSCLWBSWWWY23,
  author       = {Zhaokang Peng and
                  Nengyuan Sun and
                  Jiafeng Cheng and
                  Wenrui Liu and
                  Chunyang Wang and
                  Yijian Bi and
                  Caiban Sun and
                  Yufei Wang and
                  Yiming Wen and
                  Yubin Wang and
                  Weize Yu},
  title        = {A sequential strong {PUF} architecture based on reconfigurable neural
                  networks (RNNs) against state-of-the-art modeling attacks},
  journal      = {Integr.},
  volume       = {92},
  pages        = {83--90},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.vlsi.2023.05.003},
  doi          = {10.1016/J.VLSI.2023.05.003},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/integration/PengSCLWBSWWWY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/integration/SunCLPSWSWY23,
  author       = {Nengyuan Sun and
                  Jiafeng Cheng and
                  Wenrui Liu and
                  Zhaokang Peng and
                  Caiban Sun and
                  Chunyang Wang and
                  Heng Sha and
                  Yufei Wang and
                  Weize Yu},
  title        = {A novel on-chip linear and switching mixed regulation against power
                  analysis attacks},
  journal      = {Integr.},
  volume       = {93},
  pages        = {102049},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.vlsi.2023.06.003},
  doi          = {10.1016/J.VLSI.2023.06.003},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/integration/SunCLPSWSWY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsc/ChengSLPWSWBWZZKY23,
  author       = {Jiafeng Cheng and
                  Nengyuan Sun and
                  Wenrui Liu and
                  Zhaokang Peng and
                  Chunyang Wang and
                  Caiban Sun and
                  Yufei Wang and
                  Yijian Bi and
                  Yiming Wen and
                  Hongliu Zhang and
                  Pengcheng Zhang and
                  Sel{\c{c}}uk K{\"{o}}se and
                  Weize Yu},
  title        = {Neural Network-Based Entropy: {A} New Metric for Evaluating Side-Channel
                  Attacks},
  journal      = {J. Circuits Syst. Comput.},
  volume       = {32},
  number       = {3},
  pages        = {2320001:1--2320001:12},
  year         = {2023},
  url          = {https://doi.org/10.1142/S0218126623200013},
  doi          = {10.1142/S0218126623200013},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsc/ChengSLPWSWBWZZKY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/integration/Yu22,
  author       = {Weize Yu},
  title        = {Convex optimization of random dynamic voltage and frequency scaling
                  against power attacks},
  journal      = {Integr.},
  volume       = {82},
  pages        = {7--13},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.vlsi.2021.08.013},
  doi          = {10.1016/J.VLSI.2021.08.013},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/integration/Yu22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/esl/WenY21,
  author       = {Yiming Wen and
                  Weize Yu},
  title        = {Combining Thermal Maps With Inception Neural Networks for Hardware
                  Trojan Detection},
  journal      = {{IEEE} Embed. Syst. Lett.},
  volume       = {13},
  number       = {2},
  pages        = {45--48},
  year         = {2021},
  url          = {https://doi.org/10.1109/LES.2020.3000008},
  doi          = {10.1109/LES.2020.3000008},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/esl/WenY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/integration/WenY21,
  author       = {Yiming Wen and
                  Weize Yu},
  title        = {Breaking LPA-resistant cryptographic circuits with principal component
                  analysis},
  journal      = {Integr.},
  volume       = {80},
  pages        = {1--4},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.vlsi.2021.05.002},
  doi          = {10.1016/J.VLSI.2021.05.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/integration/WenY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mj/YuW21,
  author       = {Weize Yu and
                  Yubing Wang},
  title        = {An efficient methodology for hardware Trojan detection based on canonical
                  correlation analysis},
  journal      = {Microelectron. J.},
  volume       = {115},
  pages        = {105162},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.mejo.2021.105162},
  doi          = {10.1016/J.MEJO.2021.105162},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mj/YuW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcas/Yu20,
  author       = {Weize Yu},
  title        = {Optimization of Combined Power and Modeling Attacks on {VR} PUFs With
                  Lagrange Multipliers},
  journal      = {{IEEE} Trans. Circuits Syst.},
  volume       = {67-II},
  number       = {11},
  pages        = {2512--2516},
  year         = {2020},
  url          = {https://doi.org/10.1109/TCSII.2020.2981875},
  doi          = {10.1109/TCSII.2020.2981875},
  timestamp    = {Thu, 17 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcas/Yu20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iri/LiangHHCY20,
  author       = {Zhenhua Liang and
                  Siqi Huang and
                  Xueqing Huang and
                  Rui Cao and
                  Weize Yu},
  title        = {Post-Click Behaviors Enhanced Recommendation System},
  booktitle    = {21st International Conference on Information Reuse and Integration
                  for Data Science, {IRI} 2020, Las Vegas, NV, USA, August 11-13, 2020},
  pages        = {128--135},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/IRI49571.2020.00026},
  doi          = {10.1109/IRI49571.2020.00026},
  timestamp    = {Mon, 21 Sep 2020 16:27:44 +0200},
  biburl       = {https://dblp.org/rec/conf/iri/LiangHHCY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/et/YuW19,
  author       = {Weize Yu and
                  Yiming Wen},
  title        = {Leveraging Balanced Logic Gates as Strong PUFs for Securing IoT Against
                  Malicious Attacks},
  journal      = {J. Electron. Test.},
  volume       = {35},
  number       = {6},
  pages        = {853--865},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10836-019-05833-9},
  doi          = {10.1007/S10836-019-05833-9},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/et/YuW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-cds/Yu19,
  author       = {Weize Yu},
  title        = {Hardware Trojan attacks on voltage scaling-based side-channel attack
                  countermeasure},
  journal      = {{IET} Circuits Devices Syst.},
  volume       = {13},
  number       = {3},
  pages        = {321--326},
  year         = {2019},
  url          = {https://doi.org/10.1049/iet-cds.2018.5087},
  doi          = {10.1049/IET-CDS.2018.5087},
  timestamp    = {Thu, 31 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-cds/Yu19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/natw/WenY19,
  author       = {Yiming Wen and
                  Weize Yu},
  title        = {Convolutional Neural Networks (CNNs)-Assisted Voltage Regulation:
                  {A} New Power Delivery Scheme},
  booktitle    = {28th {IEEE} North Atlantic Test Workshop, {NATW} 2019, Burlington,
                  VT, USA, May 13-15, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/NATW.2019.8758751},
  doi          = {10.1109/NATW.2019.8758751},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/natw/WenY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/natw/YuW19,
  author       = {Weize Yu and
                  Yiming Wen},
  title        = {Malicious Attacks on Physical Unclonable Function Sensors of Internet
                  of Things},
  booktitle    = {28th {IEEE} North Atlantic Test Workshop, {NATW} 2019, Burlington,
                  VT, USA, May 13-15, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/NATW.2019.8758732},
  doi          = {10.1109/NATW.2019.8758732},
  timestamp    = {Tue, 16 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/natw/YuW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/slip/WenAY19,
  author       = {Yiming Wen and
                  Sayyed Farid Ahamed and
                  Weize Yu},
  title        = {A Novel {PUF} Architecture Against Non-Invasive Attacks},
  booktitle    = {21st {ACM/IEEE} International Workshop on System Level Interconnect
                  Prediction, {SLIP} 2019, Las Vegas, NV, USA, June 1-2, 2019},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SLIP.2019.8771329},
  doi          = {10.1109/SLIP.2019.8771329},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/slip/WenAY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/et/YuWKC18,
  author       = {Weize Yu and
                  Yiming Wen and
                  Sel{\c{c}}uk K{\"{o}}se and
                  Jia Chen},
  title        = {Exploiting Multi-Phase On-Chip Voltage Regulators as Strong {PUF}
                  Primitives for Securing IoT},
  journal      = {J. Electron. Test.},
  volume       = {34},
  number       = {5},
  pages        = {587--598},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10836-018-5746-5},
  doi          = {10.1007/S10836-018-5746-5},
  timestamp    = {Sun, 12 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/et/YuWKC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tetc/YuK18,
  author       = {Weize Yu and
                  Sel{\c{c}}uk K{\"{o}}se},
  title        = {Exploiting Voltage Regulators to Enhance Various Power Attack Countermeasures},
  journal      = {{IEEE} Trans. Emerg. Top. Comput.},
  volume       = {6},
  number       = {2},
  pages        = {244--257},
  year         = {2018},
  url          = {https://doi.org/10.1109/TETC.2016.2620382},
  doi          = {10.1109/TETC.2016.2620382},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tetc/YuK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socc/YuW18,
  author       = {Weize Yu and
                  Yiming Wen},
  title        = {Leakage Power Analysis {(LPA)} Attack in Breakdown Mode and Countermeasure},
  booktitle    = {31st {IEEE} International System-on-Chip Conference, {SOCC} 2018,
                  Arlington, VA, USA, September 4-7, 2018},
  pages        = {102--105},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/SOCC.2018.8618551},
  doi          = {10.1109/SOCC.2018.8618551},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/socc/YuW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-07250,
  author       = {Weize Yu and
                  Jia Chen},
  title        = {{PUF-AES-PUF:} a novel {PUF} architecture against non-invasive attacks},
  journal      = {CoRR},
  volume       = {abs/1810.07250},
  year         = {2018},
  url          = {http://arxiv.org/abs/1810.07250},
  eprinttype    = {arXiv},
  eprint       = {1810.07250},
  timestamp    = {Sun, 12 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1810-07250.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcad/YuK17,
  author       = {Weize Yu and
                  Sel{\c{c}}uk K{\"{o}}se},
  title        = {False Key-Controlled Aggressive Voltage Scaling: {A} Countermeasure
                  Against {LPA} Attacks},
  journal      = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.},
  volume       = {36},
  number       = {12},
  pages        = {2149--2153},
  year         = {2017},
  url          = {https://doi.org/10.1109/TCAD.2017.2682113},
  doi          = {10.1109/TCAD.2017.2682113},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcad/YuK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcas/YuK17,
  author       = {Weize Yu and
                  Sel{\c{c}}uk K{\"{o}}se},
  title        = {A Lightweight Masked {AES} Implementation for Securing IoT Against
                  {CPA} Attacks},
  journal      = {{IEEE} Trans. Circuits Syst. {I} Regul. Pap.},
  volume       = {64-I},
  number       = {11},
  pages        = {2934--2944},
  year         = {2017},
  url          = {https://doi.org/10.1109/TCSI.2017.2702098},
  doi          = {10.1109/TCSI.2017.2702098},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcas/YuK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvlsi/YuK17,
  author       = {Weize Yu and
                  Sel{\c{c}}uk K{\"{o}}se},
  title        = {Security-Adaptive Voltage Conversion as a Lightweight Countermeasure
                  Against {LPA} Attacks},
  journal      = {{IEEE} Trans. Very Large Scale Integr. Syst.},
  volume       = {25},
  number       = {7},
  pages        = {2183--2187},
  year         = {2017},
  url          = {https://doi.org/10.1109/TVLSI.2017.2670537},
  doi          = {10.1109/TVLSI.2017.2670537},
  timestamp    = {Wed, 11 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tvlsi/YuK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/YuK17,
  author       = {Weize Yu and
                  Sel{\c{c}}uk K{\"{o}}se},
  title        = {A Lightweight {AES} Implementation Against Bivariate First-Order {DPA}
                  Attacks},
  booktitle    = {Proceedings of the Hardware and Architectural Support for Security
                  and Privacy, HASP@ISCA 2017, Toronto, ON, Canada, June 25, 2017},
  pages        = {1:1--1:7},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3092627.3092628},
  doi          = {10.1145/3092627.3092628},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/YuK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/KhatamifardWYKK17,
  author       = {S. Karen Khatamifard and
                  Longfei Wang and
                  Weize Yu and
                  Sel{\c{c}}uk K{\"{o}}se and
                  Ulya R. Karpuzcu},
  title        = {ThermoGater: Thermally-Aware On-Chip Voltage Regulation},
  booktitle    = {Proceedings of the 44th Annual International Symposium on Computer
                  Architecture, {ISCA} 2017, Toronto, ON, Canada, June 24-28, 2017},
  pages        = {120--132},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3079856.3080250},
  doi          = {10.1145/3079856.3080250},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/KhatamifardWYKK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/YuK17,
  author       = {Weize Yu and
                  Sel{\c{c}}uk K{\"{o}}se},
  title        = {Implications of noise insertion mechanisms of different countermeasures
                  against side-channel attacks},
  booktitle    = {{IEEE} International Symposium on Circuits and Systems, {ISCAS} 2017,
                  Baltimore, MD, USA, May 28-31, 2017},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ISCAS.2017.8050635},
  doi          = {10.1109/ISCAS.2017.8050635},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscas/YuK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcas/YuK16,
  author       = {Weize Yu and
                  Sel{\c{c}}uk K{\"{o}}se},
  title        = {Charge-Withheld Converter-Reshuffling: {A} Countermeasure Against
                  Power Analysis Attacks},
  journal      = {{IEEE} Trans. Circuits Syst. {II} Express Briefs},
  volume       = {63-II},
  number       = {5},
  pages        = {438--442},
  year         = {2016},
  url          = {https://doi.org/10.1109/TCSII.2015.2505261},
  doi          = {10.1109/TCSII.2015.2505261},
  timestamp    = {Wed, 27 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcas/YuK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcas/YuK16a,
  author       = {Weize Yu and
                  Sel{\c{c}}uk K{\"{o}}se},
  title        = {A Voltage Regulator-Assisted Lightweight {AES} Implementation Against
                  {DPA} Attacks},
  journal      = {{IEEE} Trans. Circuits Syst. {I} Regul. Pap.},
  volume       = {63-I},
  number       = {8},
  pages        = {1152--1163},
  year         = {2016},
  url          = {https://doi.org/10.1109/TCSI.2016.2555810},
  doi          = {10.1109/TCSI.2016.2555810},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcas/YuK16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/esl/YuK15,
  author       = {Weize Yu and
                  Sel{\c{c}}uk K{\"{o}}se},
  title        = {Time-Delayed Converter-Reshuffling: An Efficient and Secure Power
                  Delivery Architecture},
  journal      = {{IEEE} Embed. Syst. Lett.},
  volume       = {7},
  number       = {3},
  pages        = {73--76},
  year         = {2015},
  url          = {https://doi.org/10.1109/LES.2015.2433175},
  doi          = {10.1109/LES.2015.2433175},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/esl/YuK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dac/YuUK15,
  author       = {Weize Yu and
                  Orhun Aras Uzun and
                  Sel{\c{c}}uk K{\"{o}}se},
  title        = {Leveraging on-chip voltage regulators as a countermeasure against
                  side-channel attacks},
  booktitle    = {Proceedings of the 52nd Annual Design Automation Conference, San Francisco,
                  CA, USA, June 7-11, 2015},
  pages        = {115:1--115:6},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2744769.2744866},
  doi          = {10.1145/2744769.2744866},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dac/YuUK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics