default search action
Yuntao Liu 0001
Person information
- affiliation: University of Maryland, College Park, MD, USA
Other persons with the same name
- Yuntao Liu — disambiguation page
- Yuntao Liu 0002 — Guangdong Provincial Hospital of TCM, Guangzhou, China
- Yuntao Liu 0003 — Inner Mongolia University of Technology, Hohhot, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Yuntao Liu, Daniel Xing, Isaac McDaniel, Olsan Ozbay, Abir Akib, Mumtahina Islam Sukanya, Sanjay Rekhi, Ankur Srivastava:
Security Advantages and Challenges of 3D Heterogeneous Integration. Computer 57(3): 107-112 (2024) - [j7]Md. Moshiur Rahman, Jim Geist, Daniel Xing, Yuntao Liu, Ankur Srivastava, Travis Meade, Yier Jin, Swarup Bhunia:
Security Evaluation of State Space Obfuscation of Hardware IP through a Red Team-Blue Team Practice. ACM Trans. Design Autom. Electr. Syst. 29(3): 50:1-50:18 (2024) - [c16]Daniel Xing, Abir Akib, Yuntao Liu, Ankur Srivastava:
Co-Design for Heterogeneous Integration: High Level Decisions to the Rescue. MWSCAS 2024: 870-872 - 2023
- [j6]Michael Zuzak, Yuntao Liu, Ankur Srivastava:
Security-Aware Resource Binding to Enhance Logic Obfuscation. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 42(12): 4528-4540 (2023) - [c15]Priya Mittu, Yuntao Liu, Ankur Srivastava:
TimingCamouflage+ Decamouflaged. ACM Great Lakes Symposium on VLSI 2023: 575-580 - [c14]Daniel Xing, Yuntao Liu, Ankur Srivastava:
Low Power Logic Obfuscation Through System Level Clock Gating. ISLPED 2023: 1-6 - [i8]Yuntao Liu, Aruna Jayasena, Prabhat Mishra, Ankur Srivastava:
Logic Locking based Trojans: A Friend Turns Foe. CoRR abs/2309.15067 (2023) - 2022
- [c13]Yuntao Liu, Michael Zuzak, Daniel Xing, Isaac McDaniel, Priya Mittu, Olsan Ozbay, Abir Akib, Ankur Srivastava:
A Survey on Side-Channel-based Reverse Engineering Attacks on Deep Neural Networks. AICAS 2022: 312-315 - [c12]Michael Zuzak, Yuntao Liu, Isaac McDaniel, Ankur Srivastava:
A Combined Logical and Physical Attack on Logic Obfuscation. ICCAD 2022: 68:1-68:9 - [i7]Abhishek Chakraborty, Daniel Xing, Yuntao Liu, Ankur Srivastava:
DynaMarks: Defending Against Deep Learning Model Extraction Using Dynamic Watermarking. CoRR abs/2207.13321 (2022) - 2021
- [j5]Yuntao Liu, Michael Zuzak, Yang Xie, Abhishek Chakraborty, Ankur Srivastava:
Robust and Attack Resilient Logic Locking with a High Application-Level Impact. ACM J. Emerg. Technol. Comput. Syst. 17(3): 37:1-37:22 (2021) - [j4]Abhishek Chakraborty, Yuntao Liu, Ankur Srivastava:
Evaluating the Security of Delay-Locked Circuits. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 40(4): 608-619 (2021) - [j3]Michael Zuzak, Yuntao Liu, Ankur Srivastava:
Trace Logic Locking: Improving the Parametric Space of Logic Locking. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 40(8): 1531-1544 (2021) - [c11]Michael Zuzak, Yuntao Liu, Ankur Srivastava:
A Resource Binding Approach to Logic Obfuscation. DAC 2021: 235-240 - [c10]Benjamin Tan, Siddharth Garg, Ramesh Karri, Yuntao Liu, Michael Zuzak, Abhisek Chakraborty, Ankur Srivastava, Omid Aramoon, Qian Xu, Gang Qu, Adam A. Porter, Jeno Szep, Warren Savage:
Invited: Independent Verification and Validation of Security-Aware EDA Tools and IP. DAC 2021: 1299-1302 - [i6]Yuntao Liu, Michael Zuzak, Yang Xie, Abhishek Chakraborty, Ankur Srivastava:
Robust and Attack Resilient Logic Locking with a High Application-Level Impact. CoRR abs/2101.02577 (2021) - [i5]Michael Zuzak, Yuntao Liu, Ankur Srivastava:
A Resource Binding Approach to Logic Obfuscation. IACR Cryptol. ePrint Arch. 2021: 252 (2021) - 2020
- [b1]Yuntao Liu:
Emerging Opportunities and Challenges in Hardware Security. University of Maryland, College Park, MD, USA, 2020 - [j2]Abhishek Chakraborty, Nithyashankari Gummidipoondi Jayasankaran, Yuntao Liu, Jeyavijayan Rajendran, Ozgur Sinanoglu, Ankur Srivastava, Yang Xie, Muhammad Yasin, Michael Zuzak:
Keynote: A Disquisition on Logic Locking. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(10): 1952-1972 (2020) - [c9]Yuntao Liu, Ankur Srivastava:
GANRED: GAN-based Reverse Engineering of DNNs via Cache Side-Channel. CCSW 2020: 41-52 - [c8]Yuntao Liu, Ankit Mondal, Abhishek Chakraborty, Michael Zuzak, Nina Jacobsen, Daniel Xing, Ankur Srivastava:
A Survey on Neural Trojans. ISQED 2020: 33-39 - [c7]Yuntao Liu, Michael Zuzak, Yang Xie, Abhishek Chakraborty, Ankur Srivastava:
Strong Anti-SAT: Secure and Effective Logic Locking. ISQED 2020: 199-205 - [i4]Yuntao Liu, Ankit Mondal, Abhishek Chakraborty, Michael Zuzak, Nina Jacobsen, Daniel Xing, Ankur Srivastava:
A Survey on Neural Trojans. IACR Cryptol. ePrint Arch. 2020: 201 (2020) - [i3]Yuntao Liu, Michael Zuzak, Yang Xie, Abhishek Chakraborty, Ankur Srivastava:
Strong Anti-SAT: Secure and Effective Logic Locking. IACR Cryptol. ePrint Arch. 2020: 202 (2020) - [i2]Yuntao Liu, Ankur Srivastava:
GANRED: GAN-based Reverse Engineering of DNNs via Cache Side-Channel. IACR Cryptol. ePrint Arch. 2020: 1014 (2020)
2010 – 2019
- 2019
- [c6]Yuntao Liu, Dana Dachman-Soled, Ankur Srivastava:
Mitigating Reverse Engineering Attacks on Deep Neural Networks. ISVLSI 2019: 657-662 - 2018
- [j1]Yuntao Liu, Yang Xie, Chongxi Bao, Ankur Srivastava:
A Combined Optimization-Theoretic and Side- Channel Approach for Attacking Strong Physical Unclonable Functions. IEEE Trans. Very Large Scale Integr. Syst. 26(1): 73-81 (2018) - [c5]Abhishek Chakraborty, Yuntao Liu, Ankur Srivastava:
TimingSAT: timing profile embedded SAT attack. ICCAD 2018: 6 - 2017
- [c4]Yuntao Liu, Yang Xie, Ankur Srivastava:
Neural Trojans. ICCD 2017: 45-48 - [c3]Yuntao Liu, Chongxi Bao, Yang Xie, Ankur Srivastava:
Introducing TFUE: The trusted foundry and untrusted employee model in IC supply chain security. ISCAS 2017: 1-4 - [i1]Yuntao Liu, Yang Xie, Ankur Srivastava:
Neural Trojans. CoRR abs/1710.00942 (2017) - 2016
- [c2]Yuntao Liu, Yang Xie, Chongxi Bao, Ankur Srivastava:
An optimization-theoretic approach for attacking physical unclonable functions. ICCAD 2016: 45 - [c1]Yang Xie, Chongxi Bao, Yuntao Liu, Ankur Srivastava:
2.5D/3D Integration Technologies for Circuit Obfuscation. MTV 2016: 39-44
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint