18 results on '"Chongxi Bao"'
Search Results
2. Correction to: Learning to bid and rank together in recommendation systems.
3. Reducing Timing Side-Channel Information Leakage Using 3D Integration.
4. Exploring timing side-channel attacks on path-ORAMs.
5. Introducing TFUE: The trusted foundry and untrusted employee model in IC supply chain security.
6. A Combined Optimization-Theoretic and Side- Channel Approach for Attacking Strong Physical Unclonable Functions.
7. 2.5D/3D Integration Technologies for Circuit Obfuscation.
8. Security-Aware 2.5D Integrated Circuit Design Flow Against Hardware IP Piracy.
9. A security-aware design scheme for better hardware Trojan detection sensitivity.
10. 3D Integration: New opportunities in defense against cache-timing side-channel attacks.
11. Security-Aware Design Flow for 2.5D IC Technology.
12. Security and Vulnerability Implications of 3D ICs.
13. On Reverse Engineering-Based Hardware Trojan Detection.
14. A Secure Algorithm for Task Scheduling against Side-channel Attacks.
15. On application of one-class SVM to reverse engineering-based hardware Trojan detection.
16. Temperature tracking: an innovative run-time approach for hardware Trojan detection.
17. Temperature Tracking: Toward Robust Run-Time Detection of Hardware Trojans.
18. An optimization-theoretic approach for attacking physical unclonable functions.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.