default search action
Yunsi Fei
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j39]Ankit Mittal, Milin Zhang, Thomas Gourousis, Ziyue Zhang, Yunsi Fei, Marvin Onabajo, Francesco Restuccia, Aatmesh Shrivastava:
Sub-6-GHz Energy-Detection-Based Fast On-Chip Analog Spectrum Sensing With Learning-Driven Signal Classification. IEEE Internet Things J. 11(14): 25033-25046 (2024) - [j38]Saurav Maji, Kyungmi Lee, Cheng Gongye, Yunsi Fei, Anantha P. Chandrakasan:
An Energy-Efficient Neural Network Accelerator With Improved Resilience Against Fault Attacks. IEEE J. Solid State Circuits 59(9): 3106-3116 (2024) - [j37]Nikita Mirchandani, Majid Sabbagh, Yunsi Fei, Aatmesh Shrivastava:
A High-Efficiency Power Obfuscation Switched-Capacitor DC-DC Converter Architecture. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 43(10): 2868-2873 (2024) - [c96]Ruyi Ding, Lili Su, Aidong Adam Ding, Yunsi Fei:
Non-transferable Pruning. ECCV (86) 2024: 375-393 - [c95]Tianhong Xu, Aidong Adam Ding, Yunsi Fei:
TrustZoneTunnel: A Cross-World Pattern History Table-Based Microarchitectural Side-Channel Attack. HOST 2024: 1-11 - [c94]Cheng Gongye, Yunsi Fei:
One Flip Away from Chaos: Unraveling Single Points of Failure in Quantized DNN s. HOST 2024: 332-342 - [c93]Cheng Gongye, Yukui Luo, Xiaolin Xu, Yunsi Fei:
Side-Channel-Assisted Reverse-Engineering of Encrypted DNN Hardware Accelerator IP and Attack Surface Exploration. SP 2024: 4678-4695 - [i26]Shijin Duan, Ruyi Ding, Jiaxing He, Aidong Adam Ding, Yunsi Fei, Xiaolin Xu:
GraphCroc: Cross-Correlation Autoencoder for Graph Structural Reconstruction. CoRR abs/2410.03396 (2024) - [i25]Ruyi Ding, Lili Su, Aidong Adam Ding, Yunsi Fei:
Non-transferable Pruning. CoRR abs/2410.08015 (2024) - 2023
- [j36]Ziyue Zhang, A. Adam Ding, Yunsi Fei:
A Guessing Entropy-Based Framework for Deep Learning-Assisted Side-Channel Analysis. IEEE Trans. Inf. Forensics Secur. 18: 3018-3030 (2023) - [c92]Ruyi Ding, Cheng Gongye, Siyue Wang, A. Adam Ding, Yunsi Fei:
EMShepherd: Detecting Adversarial Samples via Side-channel Leakage. AsiaCCS 2023: 300-313 - [c91]Cheng Gongye, Yukui Luo, Xiaolin Xu, Yunsi Fei:
HammerDodger: A Lightweight Defense Framework against RowHammer Attack on DNNs. DAC 2023: 1-6 - [c90]Saurav Maji, Kyungmi Lee, Cheng Gongye, Yunsi Fei, Anantha P. Chandrakasan:
An Energy-Efficient Neural Network Accelerator with Improved Protections Against Fault-Attacks. ESSCIRC 2023: 233-236 - [c89]Xiang Zhang, Aidong Adam Ding, Yunsi Fei:
Deep-Learning Model Extraction Through Software-Based Power Side-Channel. ICCAD 2023: 1-9 - [c88]Ruyi Ding, Shijin Duan, Xiaolin Xu, Yunsi Fei:
VertexSerum: Poisoning Graph Neural Networks for Link Inference. ICCV 2023: 4509-4518 - [c87]Thomas Gourousis, Ziyue Zhang, Mengting Yan, Milin Zhang, Ankit Mittal, Aatmesh Shrivastava, Francesco Restuccia, Yunsi Fei, Marvin Onabajo:
Identification of Stealthy Hardware Trojans through On-Chip Temperature Sensing and an Autoencoder-Based Machine Learning Algorithm. MWSCAS 2023: 30-34 - [i24]Ruyi Ding, Cheng Gongye, Siyue Wang, Aidong Adam Ding, Yunsi Fei:
EMShepherd: Detecting Adversarial Samples via Side-channel Leakage. CoRR abs/2303.15571 (2023) - [i23]Ruyi Ding, Shijin Duan, Xiaolin Xu, Yunsi Fei:
VertexSerum: Poisoning Graph Neural Networks for Link Inference. CoRR abs/2308.01469 (2023) - 2022
- [j35]Konstantinos Athanasiou, Thomas Wahl, A. Adam Ding, Yunsi Fei:
Masking Feedforward Neural Networks Against Power Analysis Attacks. Proc. Priv. Enhancing Technol. 2022(1): 501-521 (2022) - [c86]Ruyi Ding, Ziyue Zhang, Xiang Zhang, Cheng Gongye, Yunsi Fei, Aidong Adam Ding:
A Cross-Platform Cache Timing Attack Framework via Deep Learning. DATE 2022: 676-681 - [c85]Yukui Luo, Shijin Duan, Cheng Gongye, Yunsi Fei, Xiaolin Xu:
NNReArch: A Tensor Program Scheduling Framework Against Neural Network Architecture Reverse Engineering. FCCM 2022: 1-9 - [c84]Tianhong Xu, Cheng Gongye, Yunsi Fei:
Protected ECC Still Leaks: A Novel Differential-Bit Side-channel Power Attack on ECDH and Countermeasures. ACM Great Lakes Symposium on VLSI 2022: 9-14 - [c83]Xiang Zhang, Ziyue Zhang, Ruyi Ding, Cheng Gongye, Aidong Adam Ding, Yunsi Fei:
Ran$Net: An Anti-Ransomware Methodology based on Cache Monitoring and Deep Learning. ACM Great Lakes Symposium on VLSI 2022: 487-492 - [c82]Mostafa Abedi, Tiancheng Yang, Yunsi Fei, Aatmesh Shrivastava:
High-Precision Nano-Amp Current Sensor and Obfuscation based Analog Trojan Detection Circuit. ISCAS 2022: 3324-3328 - [i22]Yukui Luo, Shijin Duan, Cheng Gongye, Yunsi Fei, Xiaolin Xu:
NNReArch: A Tensor Program Scheduling Framework Against Neural Network Architecture Reverse Engineering. CoRR abs/2203.12046 (2022) - 2021
- [j34]Domenic Forte, Debdeep Mukhopadhyay, Ilia Polian, Yunsi Fei, Rosario Cammarota:
Introduction to the Special Issue on Emerging Challenges and Solutions in Hardware Security. ACM J. Emerg. Technol. Comput. Syst. 17(3): 29:1-29:4 (2021) - [j33]Tiancheng Yang, Ankit Mittal, Yunsi Fei, Aatmesh Shrivastava:
Large Delay Analog Trojans: A Silent Fabrication-Time Attack Exploiting Analog Modalities. IEEE Trans. Very Large Scale Integr. Syst. 29(1): 124-135 (2021) - [c81]Siyue Wang, Pu Zhao, Xiao Wang, Sang Chin, Thomas Wahl, Yunsi Fei, Qi Alfred Chen, Xue Lin:
Intrinsic Examples: Robust Fingerprinting of Deep Neural Networks. BMVC 2021: 46 - [c80]Yukui Luo, Cheng Gongye, Yunsi Fei, Xiaolin Xu:
DeepStrike: Remotely-Guided Fault Injection Attacks on DNN Accelerator in Cloud-FPGA. DAC 2021: 295-300 - [c79]Majid Sabbagh, Yunsi Fei, David R. Kaeli:
Overdrive Fault Attacks on GPUs. DSN (Supplements) 2021: 68-69 - [c78]Jaeguk Ahn, Cheolgyu Jin, Jiho Kim, Minsoo Rhu, Yunsi Fei, David R. Kaeli, John Kim:
Trident: A Hybrid Correlation-Collision GPU Cache Timing Attack for AES Key Recovery. HPCA 2021: 332-344 - [c77]Majid Sabbagh, Yunsi Fei, David R. Kaeli:
GPU Overdrive Fault Attacks on Neural Networks. ICCAD 2021: 1-8 - [c76]Amel Nestor Docena, Thomas Wahl, Trevor Pearce, Yunsi Fei:
Sensitive Samples Revisited: Detecting Neural Network Attacks Using Constraint Solvers. SCSS 2021: 35-48 - [i21]Yukui Luo, Cheng Gongye, Yunsi Fei, Xiaolin Xu:
DeepStrike: Remotely-Guided Fault Injection Attacks on DNN Accelerator in Cloud-FPGA. CoRR abs/2105.09453 (2021) - 2020
- [j32]Zhen Hang Jiang, Yunsi Fei, David R. Kaeli:
Exploiting Bank Conflict-based Side-channel Timing Leakage of GPUs. ACM Trans. Archit. Code Optim. 16(4): 42:1-42:24 (2020) - [j31]Ziyue Zhang, A. Adam Ding, Yunsi Fei:
A Fast and Accurate Guessing Entropy Estimation Algorithm for Full-key Recovery. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(2): 26-48 (2020) - [j30]Mohammad Khavari Tavana, Yunsi Fei, David R. Kaeli:
Nacre**Nacre, or mother-of-pearl, is one of nature's remarkable examples of a durable and break-resistant structure.: Durable, Secure and Energy-Efficient Non-Volatile Memory Utilizing Data Versioning. IEEE Trans. Emerg. Top. Comput. 8(4): 897-906 (2020) - [c75]Cheng Gongye, Yunsi Fei, Thomas Wahl:
Reverse-Engineering Deep Neural Networks Using Floating-Point Timing Side-Channels. DAC 2020: 1-6 - [c74]Majid Sabbagh, Yunsi Fei, David R. Kaeli:
A Novel GPU Overdrive Fault Attack. DAC 2020: 1-6 - [c73]Johann Knechtel, Elif Bilge Kavun, Francesco Regazzoni, Annelie Heuser, Anupam Chattopadhyay, Debdeep Mukhopadhyay, Soumyajit Dey, Yunsi Fei, Yaacov Belenky, Itamar Levi, Tim Güneysu, Patrick Schaumont, Ilia Polian:
Towards Secure Composition of Integrated Circuits and Electronic Systems: On the Role of EDA. DATE 2020: 508-513 - [c72]Elmira Karimi, Yunsi Fei, David R. Kaeli:
Hardware/Software Obfuscation against Timing Side-channel Attack on a GPU. HOST 2020: 122-131 - [c71]Cheng Gongye, Hongjia Li, Xiang Zhang, Majid Sabbagh, Geng Yuan, Xue Lin, Thomas Wahl, Yunsi Fei:
New Passive and Active Attacks on Deep Neural Networks in Medical Applications. ICCAD 2020: 39:1-39:9 - [c70]Yukui Luo, Cheng Gongye, Shaolei Ren, Yunsi Fei, Xiaolin Xu:
Stealthy-Shutdown: Practical Remote Power Attacks in Multi - Tenant FPGAs. ICCD 2020: 545-552 - [c69]Nikita Mirchandani, Nasim Shafiee, Yunsi Fei, Aatmesh Shrivastava:
An Ultra-low Power and Lower Area Current-Mode based Physically Unclonable Function with less than 100nW Power Consumption and a Native Instability of 0.6875% for IoT Applications. MWSCAS 2020: 273-276 - [c68]Yunsi Fei, Guang Gong, Cheng Gongye, Kalikinkar Mandal, Raghvendra Rohit, Tianhong Xu, Yunjie Yi, Nusa Zidaric:
Correlation Power Analysis and Higher-Order Masking Implementation of WAGE. SAC 2020: 593-614 - [c67]Konstantinos Athanasiou, Thomas Wahl, A. Adam Ding, Yunsi Fei:
Automatic Detection and Repair of Transition- Based Leakage in Software Binaries. VSTTE 2020: 50-67 - [i20]Johann Knechtel, Elif Bilge Kavun, Francesco Regazzoni, Annelie Heuser, Anupam Chattopadhyay, Debdeep Mukhopadhyay, Soumyajit Dey, Yunsi Fei, Yaacov Belenky, Itamar Levi, Tim Güneysu, Patrick Schaumont, Ilia Polian:
Towards Secure Composition of Integrated Circuits and Electronic Systems: On the Role of EDA. CoRR abs/2001.09672 (2020) - [i19]Elmira Karimi, Yunsi Fei, David R. Kaeli:
Hardware/Software Obfuscation against Timing Side-channel Attack on a GPU. CoRR abs/2007.16175 (2020) - [i18]Zhen Hang Jiang, Yunsi Fei, Aidong Adam Ding, Thomas Wahl:
MemPoline: Mitigating Memory-based Side-Channel Attacks through Memory Access Obfuscation. IACR Cryptol. ePrint Arch. 2020: 653 (2020) - [i17]Yunsi Fei, Guang Gong, Cheng Gongye, Kalikinkar Mandal, Raghvendra Rohit, Tianhong Xu, Yunjie Yi, Nusa Zidaric:
Correlation Power Analysis and Higher-order Masking Implementation of WAGE. IACR Cryptol. ePrint Arch. 2020: 1202 (2020)
2010 – 2019
- 2019
- [j29]Michael Vai, Yunsi Fei, Roger Khazan:
Guest Editorial: Special Issue on Hardware Solutions for Cyber Security. J. Hardw. Syst. Secur. 3(3): 199 (2019) - [j28]Chao Luo, Yunsi Fei, David R. Kaeli:
Side-channel Timing Attack of RSA on a GPU. ACM Trans. Archit. Code Optim. 16(3): 32:1-32:18 (2019) - [j27]Chao Luo, Yunsi Fei, Aidong Adam Ding, Pau Closas:
Comprehensive Side-Channel Power Analysis of XTS-AES. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 38(12): 2191-2200 (2019) - [j26]Liwei Zhang, A. Adam Ding, Yunsi Fei, Pei Luo:
Efficient Nonprofiling 2nd-Order Power Analysis on Masked Devices Utilizing Multiple Leakage Points. IEEE Trans. Dependable Secur. Comput. 16(5): 843-855 (2019) - [c66]Pu Zhao, Siyue Wang, Cheng Gongye, Yanzhi Wang, Yunsi Fei, Xue Lin:
Fault Sneaking Attack: a Stealthy Framework for Misleading Deep Neural Networks. DAC 2019: 165 - [c65]Majid Sabbagh, Cheng Gongye, Yunsi Fei, Yanzhi Wang:
Evaluating Fault Resiliency of Compressed Deep Neural Networks. ICESS 2019: 1-7 - [i16]Pu Zhao, Siyue Wang, Cheng Gongye, Yanzhi Wang, Yunsi Fei, Xue Lin:
Fault Sneaking Attack: a Stealthy Framework for Misleading Deep Neural Networks. CoRR abs/1905.12032 (2019) - 2018
- [j25]Chao Luo, Yunsi Fei, Liwei Zhang, A. Adam Ding, Pei Luo, Saoni Mukherjee, David R. Kaeli:
Power Analysis Attack of an AES GPU Implementation. J. Hardw. Syst. Secur. 2(1): 69-82 (2018) - [j24]Pei Luo, Konstantinos Athanasiou, Yunsi Fei, Thomas Wahl:
Algebraic Fault Analysis of SHA-3 Under Relaxed Fault Models. IEEE Trans. Inf. Forensics Secur. 13(7): 1752-1761 (2018) - [c64]Majid Sabbagh, Yunsi Fei, Thomas Wahl, A. Adam Ding:
SCADET: a side-channel attack detection tool for tracking prime+probe. ICCAD 2018: 107 - [c63]Chao Luo, Yunsi Fei, David R. Kaeli:
GPU acceleration of RSA is vulnerable to side-channel timing attacks. ICCAD 2018: 113 - [c62]Chao Luo, Yunsi Fei, David R. Kaeli:
Effective simple-power analysis attacks of elliptic curve cryptography on embedded systems. ICCAD 2018: 115 - [c61]Elmira Karimi, Zhen Hang Jiang, Yunsi Fei, David R. Kaeli:
A Timing Side-Channel Attack on a Mobile GPU. ICCD 2018: 67-74 - [c60]Michael Vai, David Whelihan, Jacob Leemaster, Haley Whitman, Willahelm Wan, Yunsi Fei, Roger Khazan, Ilia A. Lebedev, Kyle Hogan, Srinivas Devadas:
Mission Assurance: Beyond Secure Processing. QRS Companion 2018: 593-598 - 2017
- [j23]Pei Luo, Yunsi Fei, Liwei Zhang, A. Adam Ding:
Differential Fault Analysis of SHA-3 Under Relaxed Fault Models. J. Hardw. Syst. Secur. 1(2): 156-172 (2017) - [j22]Kim-Kwang Raymond Choo, Yunsi Fei, Yang Xiang, Yu Yu:
Embedded Device Forensics and Security. ACM Trans. Embed. Comput. Syst. 16(2): 50:1-50:5 (2017) - [j21]Bingnan Jiang, Yunsi Fei:
Vehicle Speed Prediction by Two-Level Data Driven Models in Vehicular Networks. IEEE Trans. Intell. Transp. Syst. 18(7): 1793-1801 (2017) - [j20]Yu Han, Yunsi Fei:
TARS: A Traffic-Adaptive Receiver-Synchronized MAC Protocol for Underwater Sensor Networks. ACM Trans. Sens. Networks 13(4): 27:1-27:25 (2017) - [j19]Bingnan Jiang, Yunsi Fei:
A PHEV Power Management Cyber-Physical System for On-Road Applications. IEEE Trans. Veh. Technol. 66(7): 5797-5807 (2017) - [c59]A. Adam Ding, Liwei Zhang, François Durvaux, François-Xavier Standaert, Yunsi Fei:
Towards Sound and Optimal Leakage Detection Procedure. CARDIS 2017: 105-122 - [c58]Pei Luo, Konstantinos Athanasiou, Yunsi Fei, Thomas Wahl:
Algebraic fault analysis of SHA-3. DATE 2017: 151-156 - [c57]Chao Luo, Yunsi Fei, A. Adam Ding:
Side-channel power analysis of XTS-AES. DATE 2017: 1330-1335 - [c56]Zhen Hang Jiang, Yunsi Fei, David R. Kaeli:
A Novel Side-Channel Timing Attack on GPUs. ACM Great Lakes Symposium on VLSI 2017: 167-172 - [c55]Zhen Hang Jiang, Yunsi Fei:
A novel cache bank timing attack. ICCAD 2017: 139-146 - [c54]Pei Luo, Konstantinos Athanasiou, Liwei Zhang, Zhen Hang Jiang, Yunsi Fei, A. Adam Ding, Thomas Wahl:
Compiler-Assisted Threshold Implementation against Power Analysis Attacks. ICCD 2017: 541-544 - [i15]Pei Luo, Konstantinos Athanasiou, Yunsi Fei, Thomas Wahl:
Algebraic Fault Analysis of SHA-3. IACR Cryptol. ePrint Arch. 2017: 113 (2017) - [i14]Liwei Zhang, A. Adam Ding, François Durvaux, François-Xavier Standaert, Yunsi Fei:
Towards Sound and Optimal Leakage Detection Procedure. IACR Cryptol. ePrint Arch. 2017: 287 (2017) - [i13]Pei Luo, Yunsi Fei, Liwei Zhang, A. Adam Ding:
Differential Fault Analysis of SHA-3 under Relaxed Fault Models. IACR Cryptol. ePrint Arch. 2017: 858 (2017) - 2016
- [j18]Yu Han, Yunsi Fei:
DAP-MAC: A delay-aware probability-based MAC protocol for underwater acoustic sensor networks. Ad Hoc Networks 48: 80-92 (2016) - [c53]Pei Luo, Yunsi Fei, Liwei Zhang, A. Adam Ding:
Differential Fault Analysis of SHA3-224 and SHA3-256. FDTC 2016: 4-15 - [c52]Pei Luo, Cheng Li, Yunsi Fei:
Concurrent Error Detection for Reliable SHA-3 Design. ACM Great Lakes Symposium on VLSI 2016: 39-44 - [c51]Zhen Hang Jiang, Yunsi Fei, David R. Kaeli:
A complete key recovery timing attack on a GPU. HPCA 2016: 394-405 - [c50]Yu Han, Yunsi Fei, A. Adam Ding:
SMARP: A Stochastic MAC Protocol with Randomized Power Control for Underwater Sensor Networks. SECON 2016: 1-9 - [i12]Pei Luo, Liwei Zhang, Yunsi Fei, A. Adam Ding:
An Improvement of Both Security and Reliability for Keccak Implementations on Smart Card. IACR Cryptol. ePrint Arch. 2016: 214 (2016) - [i11]Liwei Zhang, A. Adam Ding, Yunsi Fei, Pei Luo:
A Unified Metric for Quantifying Information Leakage of Cryptographic Devices under Power Analysis Attacks. IACR Cryptol. ePrint Arch. 2016: 297 (2016) - [i10]Pei Luo, Yunsi Fei, Liwei Zhang, A. Adam Ding:
Differential Fault Analysis of SHA3-224 and SHA3-256. IACR Cryptol. ePrint Arch. 2016: 709 (2016) - [i9]Pei Luo, Yunsi Fei:
Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack. IACR Cryptol. ePrint Arch. 2016: 967 (2016) - [i8]Pei Luo, Chao Luo, Yunsi Fei:
System Clock and Power Supply Cross-Checking for Glitch Detection. IACR Cryptol. ePrint Arch. 2016: 968 (2016) - [i7]Liwei Zhang, A. Adam Ding, Yunsi Fei, Zhen Hang Jiang:
Statistical Analysis for Access-Driven Cache Attacks Against AES. IACR Cryptol. ePrint Arch. 2016: 970 (2016) - 2015
- [j17]Yunsi Fei, Thomas Eisenbarth, Dimitrios Serpanos:
Guest Editorial: Special Section on Embedded System Security. IEEE Embed. Syst. Lett. 7(1): 1-2 (2015) - [j16]Yunsi Fei, A. Adam Ding, Jian Lao, Liwei Zhang:
A statistics-based success rate model for DPA and CPA. J. Cryptogr. Eng. 5(4): 227-243 (2015) - [j15]Bingnan Jiang, Yunsi Fei:
Smart Home in Smart Microgrid: A Cost-Effective Energy Ecosystem With Intelligent Hierarchical Agents. IEEE Trans. Smart Grid 6(1): 3-13 (2015) - [c49]Pei Luo, Liwei Zhang, Yunsi Fei, A. Adam Ding:
Towards secure cryptographic software implementation against side-channel power analysis attacks. ASAP 2015: 144-148 - [c48]Xin Fang, Pei Luo, Yunsi Fei, Miriam Leeser:
Balance power leakage to fight against side-channel analysis at gate level in FPGAs. ASAP 2015: 154-155 - [c47]Liwei Zhang, A. Adam Ding, Yunsi Fei, Pei Luo:
A Unified Metric for Quantifying Information Leakage of Cryptographic Devices Under Power Analysis Attacks. ASIACRYPT (2) 2015: 338-360 - [c46]Liwei Zhang, A. Adam Ding, Yunsi Fei, Pei Luo:
Efficient 2nd-order power analysis on masked devices utilizing multiple leakage. HOST 2015: 118-123 - [c45]Xin Fang, Pei Luo, Yunsi Fei, Miriam Leeser:
Leakage evaluation on power balance countermeasure against side-channel attack on FPGAs. HPEC 2015: 1-6 - [c44]Chao Luo, Yunsi Fei, Pei Luo, Saoni Mukherjee, David R. Kaeli:
Side-channel power analysis of a GPU AES implementation. ICCD 2015: 281-288 - [c43]Yu Han, Yunsi Fei:
A delay-aware probability-based MAC protocol for underwater acoustic sensor networks. ICNC 2015: 938-944 - [c42]Pei Luo, Yunsi Fei, Xin Fang, A. Adam Ding, David R. Kaeli, Miriam Leeser:
Side-channel analysis of MAC-Keccak hardware implementations. HASP@ISCA 2015: 1:1-1:8 - [c41]Bingnan Jiang, Yunsi Fei:
Traffic and vehicle speed prediction with neural network and Hidden Markov model in vehicular networks. Intelligent Vehicles Symposium 2015: 1082-1087 - [c40]Yu Han, Yunsi Fei:
TARS: A Traffic-Adaptive Receiver-Synchronized MAC Protocol for Underwater Sensor Networks. MASCOTS 2015: 1-10 - [i6]Pei Luo, Yunsi Fei, Xin Fang, A. Adam Ding, David R. Kaeli, Miriam Leeser:
Side-Channel Analysis of MAC-Keccak Hardware Implementations. IACR Cryptol. ePrint Arch. 2015: 411 (2015) - [i5]Pei Luo, Liwei Zhang, Yunsi Fei, A. Adam Ding:
Towards Secure Cryptographic Software Implementation Against Side-Channel Power Analysis Attacks. IACR Cryptol. ePrint Arch. 2015: 717 (2015) - 2014
- [c39]A. Adam Ding, Liwei Zhang, Yunsi Fei, Pei Luo:
A Statistical Model for Higher Order DPA on Masked Devices. CHES 2014: 147-169 - [c38]Juan Carlos Martínez Santos, Yunsi Fei:
HATI: Hardware Assisted Thread Isolation for Concurrent C/C++ Programs. IPDPS Workshops 2014: 322-331 - [c37]Tushar Swamy, Neel Shah, Pei Luo, Yunsi Fei, David R. Kaeli:
Scalable and efficient implementation of correlation power analysis using graphics processing units (GPUs). HASP@ISCA 2014: 10:1-10:8 - [c36]Bingnan Jiang, Yunsi Fei:
On-road PHEV power management with hierarchical strategies in vehicular networks. Intelligent Vehicles Symposium 2014: 1077-1084 - [c35]Pei Luo, Yunsi Fei, Xin Fang, A. Adam Ding, Miriam Leeser, David R. Kaeli:
Power analysis attack on hardware implementation of MAC-Keccak on FPGAs. ReConFig 2014: 1-7 - [c34]Pei Luo, Yunsi Fei, Liwei Zhang, A. Adam Ding:
Side-channel power analysis of different protection schemes against fault attacks on AES. ReConFig 2014: 1-6 - [c33]Mansour Shafaei, Yunsi Fei:
HiTS: A High Throughput Memory Scheduling Scheme to Mitigate Denial-of-Service Attacks in Multi-core Systems. SBAC-PAD 2014: 206-213 - [i4]Yunsi Fei, A. Adam Ding, Jian Lao, Liwei Zhang:
A Statistics-based Fundamental Model for Side-channel Attack Analysis. IACR Cryptol. ePrint Arch. 2014: 152 (2014) - [i3]A. Adam Ding, Liwei Zhang, Yunsi Fei, Pei Luo:
A Statistical Model for Higher Order DPA on Masked Devices. IACR Cryptol. ePrint Arch. 2014: 433 (2014) - [i2]Pei Luo, Yunsi Fei, Xin Fang, A. Adam Ding, Miriam Leeser, David R. Kaeli:
Power Analysis Attack on Hardware Implementation of MAC-Keccak on FPGAs. IACR Cryptol. ePrint Arch. 2014: 854 (2014) - [i1]Pei Luo, Yunsi Fei, Liwei Zhang, A. Adam Ding:
Side-channel Power Analysis of Different Protection Schemes Against Fault Attacks on AES. IACR Cryptol. ePrint Arch. 2014: 875 (2014) - 2013
- [j14]Juan Carlos Martínez Santos, Yunsi Fei:
Leveraging speculative architectures for runtime program validation. ACM Trans. Embed. Comput. Syst. 13(1): 3:1-3:18 (2013) - [c32]Tiansi Hu, Yunsi Fei:
An adaptive routing protocol based on connectivity prediction for underwater disruption tolerant networks. GLOBECOM 2013: 65-71 - [c31]Juan Carlos Martínez Santos, Yunsi Fei:
Micro-architectural support for metadata coherence in multi-core dynamic information flow tracking. HASP@ISCA 2013: 6 - [c30]Bingnan Jiang, Yunsi Fei:
Decentralized scheduling of PEV on-street parking and charging for smart grid reactive power compensation. ISGT 2013: 1-6 - [c29]Tiansi Hu, Yunsi Fei:
DSH-MAC: Medium Access Control based on Decoupled and Suppressed Handshaking for long-delay Underwater Acoustic Sensor Networks. LCN 2013: 523-531 - 2012
- [j13]Hai Lin, Yunsi Fei:
Resource Sharing of Pipelined Custom Hardware Extension for Energy-Efficient Application-Specific Instruction Set Processor Design. ACM Trans. Design Autom. Electr. Syst. 17(4): 39:1-39:20 (2012) - [j12]Hai Lin, Tiansi Hu, Yunsi Fei:
A Hardware/Software Cooperative Custom Register Binding Approach for Register Spill Elimination in Application-Specific Instruction Set Processors. ACM Trans. Design Autom. Electr. Syst. 17(4): 40:1-40:19 (2012) - [j11]Xuan Guan, Yunsi Fei, Hai Lin:
Hierarchical Design of an Application-Specific Instruction Set Processor for High-Throughput and Scalable FFT Processing. IEEE Trans. Very Large Scale Integr. Syst. 20(3): 551-563 (2012) - [c28]Juan Carlos Martínez Santos, Yunsi Fei, Zhijie Jerry Shi:
Static secure page allocation for light-weight dynamic information flow tracking. CASES 2012: 27-36 - [c27]Yunsi Fei, Qiasi Luo, A. Adam Ding:
A Statistical Model for DPA with Novel Algorithmic Confusion Analysis. CHES 2012: 233-250 - [c26]Juan Carlos Martínez Santos, Yunsi Fei:
Designing and implementing a Malicious 8051 processor. DFT 2012: 63-66 - [c25]Tiansi Hu, Yunsi Fei:
MURAO: A multi-level routing protocol for acoustic-optical hybrid underwater wireless sensor networks. SECON 2012: 218-226 - 2011
- [c24]Xuan Guan, Yunsi Fei:
Adaptive Extended Min-Sum Algorithm for Nonbinary LDPC Decoding. GLOBECOM 2011: 1-6 - [c23]Qiasi Luo, Yunsi Fei:
Algorithmic collision analysis for evaluating cryptographic systems and side-channel attacks. HOST 2011: 75-80 - 2010
- [j10]Tiansi Hu, Yunsi Fei:
QELAR: A Machine-Learning-Based Adaptive Routing Protocol for Energy-Efficient and Lifetime-Extended Underwater Sensor Networks. IEEE Trans. Mob. Comput. 9(6): 796-809 (2010) - [j9]Xuan Guan, Yunsi Fei:
Register file partitioning and recompilation for register file power reduction. ACM Trans. Design Autom. Electr. Syst. 15(3): 24:1-24:30 (2010) - [j8]Xuan Guan, Yunsi Fei:
Register File Partitioning and Compiler Support for Reducing Embedded Processor Power Consumption. IEEE Trans. Very Large Scale Integr. Syst. 18(8): 1248-1252 (2010) - [j7]Hai Lin, Yunsi Fei, Xuan Guan, Zhijie Jerry Shi:
Architectural Enhancement and System Software Support for Program Code Integrity Monitoring in Application-Specific Instruction-Set Processors. IEEE Trans. Very Large Scale Integr. Syst. 18(11): 1519-1532 (2010) - [c22]Hai Lin, Yunsi Fei:
A novel multi-objective instruction synthesis flow for application-specific instruction set processors. ACM Great Lakes Symposium on VLSI 2010: 409-412 - [c21]Hai Lin, Yunsi Fei:
Exploring custom instruction synthesis for application-specific instruction set processors with multiple design objectives. ISLPED 2010: 141-146 - [c20]Tiansi Hu, Yunsi Fei:
An Adaptive and Energy-efficient Routing Protocol Based on Machine Learning for Underwater Delay Tolerant Networks. MASCOTS 2010: 381-384
2000 – 2009
- 2009
- [j6]Hai Lin, Yunsi Fei:
Orchestrating Horizontal Parallelism and Vertical Instruction Packing of Programs to Improve System Overall Efficiency. IEEE Trans. Computers 58(9): 1211-1220 (2009) - [c19]Juan Carlos Martínez Santos, Yunsi Fei, Zhijie Jerry Shi:
PIFT: efficient dynamic information flow tracking using secure page allocation. WESS 2009 - [c18]Xuan Guan, Hai Lin, Yunsi Fei:
Design of an application-specific instruction set processor for high-throughput and scalable FFT. DATE 2009: 1302-1307 - [c17]Hai Lin, Yunsi Fei:
Resource sharing of pipelined custom hardware extension for energy-efficient application-specific instruction set processor design. ICCD 2009: 158-165 - [c16]Xuan Guan, Yunsi Fei, Hai Lin:
A Hierarchical Design of an Application-specific Instruction Set Processor for High-throughput FFT. ISCAS 2009: 2513-2516 - 2008
- [j5]Yunsi Fei, Lin Zhong, Niraj K. Jha:
An energy-aware framework for dynamic software management in mobile computing systems. ACM Trans. Embed. Comput. Syst. 7(3): 27:1-27:31 (2008) - [c15]Vamsi Kundeti, Yunsi Fei, Sanguthevar Rajasekaran:
An efficient digital circuit for implementing Sequence Alignment algorithm in an extended processor. ASAP 2008: 156-161 - [c14]Xuan Guan, Yunsi Fei:
Reducing power consumption of embedded processors through register file partitioning and compiler support. ASAP 2008: 269-274 - [c13]Hai Lin, Yunsi Fei:
Harnessing Horizontal Parallelism and Vertical Instruction Packing of Programs to Improve System Overall Efficiency. DATE 2008: 758-763 - [c12]Juan Carlos Martínez Santos, Yunsi Fei:
Leveraging speculative architectures for run-time program validation. ICCD 2008: 498-505 - [c11]Tiansi Hu, Yunsi Fei:
QELAR: A Q-learning-based Energy-Efficient and Lifetime-Aware Routing Protocol for Underwater Sensor Networks. IPCCC 2008: 247-255 - [c10]Hai Lin, Guangyu Sun, Yunsi Fei, Yuan Xie, Anand Sivasubramaniam:
Thermal-aware Design Considerations for Application-Specific Instruction Set Processor. SASP 2008: 63-68 - 2007
- [j4]Yunsi Fei, Srivaths Ravi, Anand Raghunathan, Niraj K. Jha:
Energy-optimizing source code transformations for operating system-driven embedded software. ACM Trans. Embed. Comput. Syst. 7(1): 2:1-2:26 (2007) - [c9]Yunsi Fei, Zhijie Jerry Shi:
Microarchitectural support for program code integrity monitoring in application-specific instruction set processors. DATE 2007: 815-820 - [c8]Hai Lin, Yunsi Fei:
Utilizing custom registers in application-specific instruction set processors for register spills elimination. ACM Great Lakes Symposium on VLSI 2007: 323-328 - [c7]Hai Lin, Xuan Guan, Yunsi Fei, Zhijie Jerry Shi:
Compiler-assisted architectural support for program code integrity monitoring in application-specific instruction set processors. ICCD 2007: 187-193 - 2005
- [j3]Yunsi Fei, Niraj K. Jha:
Integrated functional partitioning and synthesis for low power distributed systems of systems-on-a-chip. Int. J. Embed. Syst. 1(1/2): 2-13 (2005) - 2004
- [j2]Yunsi Fei, Srivaths Ravi, Anand Raghunathan, Niraj K. Jha:
A hybrid energy-estimation technique for extensible processors. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 23(5): 652-664 (2004) - [j1]Jiong Luo, Lin Zhong, Yunsi Fei, Niraj K. Jha:
Register binding-based RTL power management for control-flow intensive designs. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 23(8): 1175-1183 (2004) - [c6]Yunsi Fei, Lin Zhong, Niraj K. Jha:
An Energy-Aware Framework for Coordinated Dynamic Software Management in Mobile Computers. MASCOTS 2004: 306-317 - [c5]Yunsi Fei, Srivaths Ravi, Anand Raghunathan, Niraj K. Jha:
Energy-Optimizing Source Code Transformations for OS-driven Embedded Software. VLSI Design 2004: 261-266 - 2003
- [c4]Yunsi Fei, Srivaths Ravi, Anand Raghunathan, Niraj K. Jha:
Energy Estimation for Extensible Processors. DATE 2003: 10682-10687 - [c3]Weidong Wang, Tat Kee Tan, Jiong Luo, Yunsi Fei, Li Shang, Keith S. Vallerio, Lin Zhong, Anand Raghunathan, Niraj K. Jha:
A comprehensive high-level synthesis system for control-flow intensive behaviors. ACM Great Lakes Symposium on VLSI 2003: 11-14 - 2002
- [c2]Lin Zhong, Jiong Luo, Yunsi Fei, Niraj K. Jha:
Register Binding Based Power Management for High-level Synthesis of Control-Flow Intensive Behaviors. ICCD 2002: 391-394 - [c1]Yunsi Fei, Niraj K. Jha:
Functional Partitioning for Low Power Distributed Systems of Systems-on-a-Chip. ASP-DAC/VLSI Design 2002: 274-281
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 20:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint