Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Weize Yu
@article{DBLP:journals/ijcta/ChengLSPSWBWZZY23, author = {Jiafeng Cheng and Wenrui Liu and Nengyuan Sun and Zhaokang Peng and Caiban Sun and Chunyang Wang and Yijian Bi and Yiming Wen and Hongliu Zhang and Pengcheng Zhang and Weize Yu}, title = {A low output ripple and high security on-chip voltage regulation based on Fourier transform}, journal = {Int. J. Circuit Theory Appl.}, volume = {51}, number = {6}, pages = {2578--2591}, year = {2023}, url = {https://doi.org/10.1002/cta.3571}, doi = {10.1002/CTA.3571}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcta/ChengLSPSWBWZZY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcta/LiuCSPSWWZZY23, author = {Wenrui Liu and Jiafeng Cheng and Nengyuan Sun and Zhaokang Peng and Caiban Sun and Chunyang Wang and Yiming Wen and Hongliu Zhang and Pengcheng Zhang and Weize Yu}, title = {A novel hardware authentication primitive against modeling attacks}, journal = {Int. J. Circuit Theory Appl.}, volume = {51}, number = {6}, pages = {2993--3001}, year = {2023}, url = {https://doi.org/10.1002/cta.3566}, doi = {10.1002/CTA.3566}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcta/LiuCSPSWWZZY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcta/ChengLSPSWBWZZY23a, author = {Jiafeng Cheng and Wenrui Liu and Nengyuan Sun and Zhaokang Peng and Caiban Sun and Chunyang Wang and Yijian Bi and Yiming Wen and Hongliu Zhang and Pengcheng Zhang and Weize Yu}, title = {A machine learning low-dropout regulator-assisted differential power analysis attack countermeasure with voltage scaling}, journal = {Int. J. Circuit Theory Appl.}, volume = {51}, number = {7}, pages = {3105--3117}, year = {2023}, url = {https://doi.org/10.1002/cta.3583}, doi = {10.1002/CTA.3583}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcta/ChengLSPSWBWZZY23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcta/SunLCSPSY23, author = {Caiban Sun and Wenrui Liu and Jiafeng Cheng and Nengyuan Sun and Zhaokang Peng and Heng Sha and Weize Yu}, title = {A high-speed and low-latency hardware implementation of {RC4} cryptographic algorithm}, journal = {Int. J. Circuit Theory Appl.}, volume = {51}, number = {12}, pages = {5980--5996}, year = {2023}, url = {https://doi.org/10.1002/cta.3769}, doi = {10.1002/CTA.3769}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcta/SunLCSPSY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/integration/PengSCLWBSWWWY23, author = {Zhaokang Peng and Nengyuan Sun and Jiafeng Cheng and Wenrui Liu and Chunyang Wang and Yijian Bi and Caiban Sun and Yufei Wang and Yiming Wen and Yubin Wang and Weize Yu}, title = {A sequential strong {PUF} architecture based on reconfigurable neural networks (RNNs) against state-of-the-art modeling attacks}, journal = {Integr.}, volume = {92}, pages = {83--90}, year = {2023}, url = {https://doi.org/10.1016/j.vlsi.2023.05.003}, doi = {10.1016/J.VLSI.2023.05.003}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/integration/PengSCLWBSWWWY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/integration/SunCLPSWSWY23, author = {Nengyuan Sun and Jiafeng Cheng and Wenrui Liu and Zhaokang Peng and Caiban Sun and Chunyang Wang and Heng Sha and Yufei Wang and Weize Yu}, title = {A novel on-chip linear and switching mixed regulation against power analysis attacks}, journal = {Integr.}, volume = {93}, pages = {102049}, year = {2023}, url = {https://doi.org/10.1016/j.vlsi.2023.06.003}, doi = {10.1016/J.VLSI.2023.06.003}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/integration/SunCLPSWSWY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsc/ChengSLPWSWBWZZKY23, author = {Jiafeng Cheng and Nengyuan Sun and Wenrui Liu and Zhaokang Peng and Chunyang Wang and Caiban Sun and Yufei Wang and Yijian Bi and Yiming Wen and Hongliu Zhang and Pengcheng Zhang and Sel{\c{c}}uk K{\"{o}}se and Weize Yu}, title = {Neural Network-Based Entropy: {A} New Metric for Evaluating Side-Channel Attacks}, journal = {J. Circuits Syst. Comput.}, volume = {32}, number = {3}, pages = {2320001:1--2320001:12}, year = {2023}, url = {https://doi.org/10.1142/S0218126623200013}, doi = {10.1142/S0218126623200013}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsc/ChengSLPWSWBWZZKY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/integration/Yu22, author = {Weize Yu}, title = {Convex optimization of random dynamic voltage and frequency scaling against power attacks}, journal = {Integr.}, volume = {82}, pages = {7--13}, year = {2022}, url = {https://doi.org/10.1016/j.vlsi.2021.08.013}, doi = {10.1016/J.VLSI.2021.08.013}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/integration/Yu22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/esl/WenY21, author = {Yiming Wen and Weize Yu}, title = {Combining Thermal Maps With Inception Neural Networks for Hardware Trojan Detection}, journal = {{IEEE} Embed. Syst. Lett.}, volume = {13}, number = {2}, pages = {45--48}, year = {2021}, url = {https://doi.org/10.1109/LES.2020.3000008}, doi = {10.1109/LES.2020.3000008}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/esl/WenY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/integration/WenY21, author = {Yiming Wen and Weize Yu}, title = {Breaking LPA-resistant cryptographic circuits with principal component analysis}, journal = {Integr.}, volume = {80}, pages = {1--4}, year = {2021}, url = {https://doi.org/10.1016/j.vlsi.2021.05.002}, doi = {10.1016/J.VLSI.2021.05.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/integration/WenY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mj/YuW21, author = {Weize Yu and Yubing Wang}, title = {An efficient methodology for hardware Trojan detection based on canonical correlation analysis}, journal = {Microelectron. J.}, volume = {115}, pages = {105162}, year = {2021}, url = {https://doi.org/10.1016/j.mejo.2021.105162}, doi = {10.1016/J.MEJO.2021.105162}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mj/YuW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcas/Yu20, author = {Weize Yu}, title = {Optimization of Combined Power and Modeling Attacks on {VR} PUFs With Lagrange Multipliers}, journal = {{IEEE} Trans. Circuits Syst.}, volume = {67-II}, number = {11}, pages = {2512--2516}, year = {2020}, url = {https://doi.org/10.1109/TCSII.2020.2981875}, doi = {10.1109/TCSII.2020.2981875}, timestamp = {Thu, 17 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcas/Yu20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iri/LiangHHCY20, author = {Zhenhua Liang and Siqi Huang and Xueqing Huang and Rui Cao and Weize Yu}, title = {Post-Click Behaviors Enhanced Recommendation System}, booktitle = {21st International Conference on Information Reuse and Integration for Data Science, {IRI} 2020, Las Vegas, NV, USA, August 11-13, 2020}, pages = {128--135}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/IRI49571.2020.00026}, doi = {10.1109/IRI49571.2020.00026}, timestamp = {Mon, 21 Sep 2020 16:27:44 +0200}, biburl = {https://dblp.org/rec/conf/iri/LiangHHCY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/et/YuW19, author = {Weize Yu and Yiming Wen}, title = {Leveraging Balanced Logic Gates as Strong PUFs for Securing IoT Against Malicious Attacks}, journal = {J. Electron. Test.}, volume = {35}, number = {6}, pages = {853--865}, year = {2019}, url = {https://doi.org/10.1007/s10836-019-05833-9}, doi = {10.1007/S10836-019-05833-9}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/et/YuW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-cds/Yu19, author = {Weize Yu}, title = {Hardware Trojan attacks on voltage scaling-based side-channel attack countermeasure}, journal = {{IET} Circuits Devices Syst.}, volume = {13}, number = {3}, pages = {321--326}, year = {2019}, url = {https://doi.org/10.1049/iet-cds.2018.5087}, doi = {10.1049/IET-CDS.2018.5087}, timestamp = {Thu, 31 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-cds/Yu19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/natw/WenY19, author = {Yiming Wen and Weize Yu}, title = {Convolutional Neural Networks (CNNs)-Assisted Voltage Regulation: {A} New Power Delivery Scheme}, booktitle = {28th {IEEE} North Atlantic Test Workshop, {NATW} 2019, Burlington, VT, USA, May 13-15, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/NATW.2019.8758751}, doi = {10.1109/NATW.2019.8758751}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/natw/WenY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/natw/YuW19, author = {Weize Yu and Yiming Wen}, title = {Malicious Attacks on Physical Unclonable Function Sensors of Internet of Things}, booktitle = {28th {IEEE} North Atlantic Test Workshop, {NATW} 2019, Burlington, VT, USA, May 13-15, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/NATW.2019.8758732}, doi = {10.1109/NATW.2019.8758732}, timestamp = {Tue, 16 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/natw/YuW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/slip/WenAY19, author = {Yiming Wen and Sayyed Farid Ahamed and Weize Yu}, title = {A Novel {PUF} Architecture Against Non-Invasive Attacks}, booktitle = {21st {ACM/IEEE} International Workshop on System Level Interconnect Prediction, {SLIP} 2019, Las Vegas, NV, USA, June 1-2, 2019}, pages = {1--5}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SLIP.2019.8771329}, doi = {10.1109/SLIP.2019.8771329}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/slip/WenAY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/et/YuWKC18, author = {Weize Yu and Yiming Wen and Sel{\c{c}}uk K{\"{o}}se and Jia Chen}, title = {Exploiting Multi-Phase On-Chip Voltage Regulators as Strong {PUF} Primitives for Securing IoT}, journal = {J. Electron. Test.}, volume = {34}, number = {5}, pages = {587--598}, year = {2018}, url = {https://doi.org/10.1007/s10836-018-5746-5}, doi = {10.1007/S10836-018-5746-5}, timestamp = {Sun, 12 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/et/YuWKC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tetc/YuK18, author = {Weize Yu and Sel{\c{c}}uk K{\"{o}}se}, title = {Exploiting Voltage Regulators to Enhance Various Power Attack Countermeasures}, journal = {{IEEE} Trans. Emerg. Top. Comput.}, volume = {6}, number = {2}, pages = {244--257}, year = {2018}, url = {https://doi.org/10.1109/TETC.2016.2620382}, doi = {10.1109/TETC.2016.2620382}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tetc/YuK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socc/YuW18, author = {Weize Yu and Yiming Wen}, title = {Leakage Power Analysis {(LPA)} Attack in Breakdown Mode and Countermeasure}, booktitle = {31st {IEEE} International System-on-Chip Conference, {SOCC} 2018, Arlington, VA, USA, September 4-7, 2018}, pages = {102--105}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/SOCC.2018.8618551}, doi = {10.1109/SOCC.2018.8618551}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/socc/YuW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-07250, author = {Weize Yu and Jia Chen}, title = {{PUF-AES-PUF:} a novel {PUF} architecture against non-invasive attacks}, journal = {CoRR}, volume = {abs/1810.07250}, year = {2018}, url = {http://arxiv.org/abs/1810.07250}, eprinttype = {arXiv}, eprint = {1810.07250}, timestamp = {Sun, 12 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-07250.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcad/YuK17, author = {Weize Yu and Sel{\c{c}}uk K{\"{o}}se}, title = {False Key-Controlled Aggressive Voltage Scaling: {A} Countermeasure Against {LPA} Attacks}, journal = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.}, volume = {36}, number = {12}, pages = {2149--2153}, year = {2017}, url = {https://doi.org/10.1109/TCAD.2017.2682113}, doi = {10.1109/TCAD.2017.2682113}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcad/YuK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcas/YuK17, author = {Weize Yu and Sel{\c{c}}uk K{\"{o}}se}, title = {A Lightweight Masked {AES} Implementation for Securing IoT Against {CPA} Attacks}, journal = {{IEEE} Trans. Circuits Syst. {I} Regul. Pap.}, volume = {64-I}, number = {11}, pages = {2934--2944}, year = {2017}, url = {https://doi.org/10.1109/TCSI.2017.2702098}, doi = {10.1109/TCSI.2017.2702098}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcas/YuK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvlsi/YuK17, author = {Weize Yu and Sel{\c{c}}uk K{\"{o}}se}, title = {Security-Adaptive Voltage Conversion as a Lightweight Countermeasure Against {LPA} Attacks}, journal = {{IEEE} Trans. Very Large Scale Integr. Syst.}, volume = {25}, number = {7}, pages = {2183--2187}, year = {2017}, url = {https://doi.org/10.1109/TVLSI.2017.2670537}, doi = {10.1109/TVLSI.2017.2670537}, timestamp = {Wed, 11 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tvlsi/YuK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/YuK17, author = {Weize Yu and Sel{\c{c}}uk K{\"{o}}se}, title = {A Lightweight {AES} Implementation Against Bivariate First-Order {DPA} Attacks}, booktitle = {Proceedings of the Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2017, Toronto, ON, Canada, June 25, 2017}, pages = {1:1--1:7}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3092627.3092628}, doi = {10.1145/3092627.3092628}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/YuK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/KhatamifardWYKK17, author = {S. Karen Khatamifard and Longfei Wang and Weize Yu and Sel{\c{c}}uk K{\"{o}}se and Ulya R. Karpuzcu}, title = {ThermoGater: Thermally-Aware On-Chip Voltage Regulation}, booktitle = {Proceedings of the 44th Annual International Symposium on Computer Architecture, {ISCA} 2017, Toronto, ON, Canada, June 24-28, 2017}, pages = {120--132}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3079856.3080250}, doi = {10.1145/3079856.3080250}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isca/KhatamifardWYKK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/YuK17, author = {Weize Yu and Sel{\c{c}}uk K{\"{o}}se}, title = {Implications of noise insertion mechanisms of different countermeasures against side-channel attacks}, booktitle = {{IEEE} International Symposium on Circuits and Systems, {ISCAS} 2017, Baltimore, MD, USA, May 28-31, 2017}, pages = {1--4}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISCAS.2017.8050635}, doi = {10.1109/ISCAS.2017.8050635}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscas/YuK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcas/YuK16, author = {Weize Yu and Sel{\c{c}}uk K{\"{o}}se}, title = {Charge-Withheld Converter-Reshuffling: {A} Countermeasure Against Power Analysis Attacks}, journal = {{IEEE} Trans. Circuits Syst. {II} Express Briefs}, volume = {63-II}, number = {5}, pages = {438--442}, year = {2016}, url = {https://doi.org/10.1109/TCSII.2015.2505261}, doi = {10.1109/TCSII.2015.2505261}, timestamp = {Wed, 27 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcas/YuK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcas/YuK16a, author = {Weize Yu and Sel{\c{c}}uk K{\"{o}}se}, title = {A Voltage Regulator-Assisted Lightweight {AES} Implementation Against {DPA} Attacks}, journal = {{IEEE} Trans. Circuits Syst. {I} Regul. Pap.}, volume = {63-I}, number = {8}, pages = {1152--1163}, year = {2016}, url = {https://doi.org/10.1109/TCSI.2016.2555810}, doi = {10.1109/TCSI.2016.2555810}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcas/YuK16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/esl/YuK15, author = {Weize Yu and Sel{\c{c}}uk K{\"{o}}se}, title = {Time-Delayed Converter-Reshuffling: An Efficient and Secure Power Delivery Architecture}, journal = {{IEEE} Embed. Syst. Lett.}, volume = {7}, number = {3}, pages = {73--76}, year = {2015}, url = {https://doi.org/10.1109/LES.2015.2433175}, doi = {10.1109/LES.2015.2433175}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/esl/YuK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dac/YuUK15, author = {Weize Yu and Orhun Aras Uzun and Sel{\c{c}}uk K{\"{o}}se}, title = {Leveraging on-chip voltage regulators as a countermeasure against side-channel attacks}, booktitle = {Proceedings of the 52nd Annual Design Automation Conference, San Francisco, CA, USA, June 7-11, 2015}, pages = {115:1--115:6}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2744769.2744866}, doi = {10.1145/2744769.2744866}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dac/YuUK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.