Fan Yao

Orcid: 0000-0002-0360-5641

According to our database1, Fan Yao authored at least 70 papers between 2013 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Human vs. Generative AI in Content Creation Competition: Symbiosis or Conflict?
CoRR, 2024

2023
STREAM: Toward READ-Based In-Memory Computing for Streaming-Based Processing for Data-Intensive Applications.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., November, 2023

Understanding and Characterizing Side Channels Exploiting Phase-Change Memories.
IEEE Micro, 2023

PAC-learning for Strategic Classification.
J. Mach. Learn. Res., 2023

Preference Elicitation with Soft Attributes in Interactive Recommendation.
CoRR, 2023

An End-to-End Solution for Spatial Inference in Smart Buildings.
Proceedings of the 10th ACM International Conference on Systems for Energy-Efficient Buildings, 2023

Rethinking Incentives in Recommender Systems: Are Monotone Rewards Always Beneficial?
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Decepticon: Attacking Secrets of Transformers.
Proceedings of the IEEE International Symposium on Workload Characterization, 2023

How Bad is Top-K Recommendation under Competing Content Creators?
Proceedings of the International Conference on Machine Learning, 2023

BeKnight: Guarding Against Information Leakage in Speculatively Updated Branch Predictors.
Proceedings of the IEEE/ACM International Conference on Computer Aided Design, 2023

D-Shield: Enabling Processor-side Encryption and Integrity Verification for Secure NVMe Drives.
Proceedings of the IEEE International Symposium on High-Performance Computer Architecture, 2023

TunneLs for Bootlegging: Fully Reverse-Engineering GPU TLBs for Challenging Isolation Guarantees of NVIDIA MIG.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Leaking Secrets Through Modern Branch Predictors in the Speculative World.
IEEE Trans. Computers, 2022

T-BFA: Targeted Bit-Flip Adversarial Weight Attack.
IEEE Trans. Pattern Anal. Mach. Intell., 2022

Graphics Peeping Unit: Exploiting EM Side-Channel Information of GPUs to Eavesdrop on Your Neighbors.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

DeepSteal: Advanced Model Extractions Leveraging Efficient Weight Stealing in Memories.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Clairvoyance: Exploiting Far-field EM Emanations of GPU to "See" Your DNN Models through Obstacles at a Distance.
Proceedings of the 43rd IEEE Security and Privacy, 2022

Query-Efficient and Imperceptible Attacks on Multivariate Time Series DNN Models.
Proceedings of the IFIP Networking Conference, 2022

Learning from a Learning User for Optimal Recommendations.
Proceedings of the International Conference on Machine Learning, 2022

On the Feasibility of Training-time Trojan Attacks through Hardware-based Faults in Memory.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2022

LockedDown: Exploiting Contention on Host-GPU PCIe Bus for Fun and Profit.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

Hybrid Digital-Digital In-Memory Computing.
Proceedings of the 2022 Design, Automation & Test in Europe Conference & Exhibition, 2022

Multi-Agent Learning for Iterative Dominance Elimination: Formal Barriers and New Algorithms.
Proceedings of the Conference on Learning Theory, 2-5 July 2022, London, UK., 2022

STREAM: Towards READ-based In-Memory Computing for Streaming based Data Processing.
Proceedings of the 27th Asia and South Pacific Design Automation Conference, 2022

Learning the Optimal Recommendation from Explorative Users.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Defeating Cache Timing Channels with Hardware Prefetchers.
IEEE Des. Test, 2021

Leaking Secrets through Modern Branch Predictor in the Speculative World.
CoRR, 2021

RA-BNN: Constructing Robust & Accurate Binary Neural Network to Simultaneously Defend Adversarial Bit-Flip Attack and Improve Accuracy.
CoRR, 2021

Reversible Action Design for Combinatorial Optimization with Reinforcement Learning.
CoRR, 2021

Seeds of SEED: R-SAW: New Side Channels Exploiting Read Asymmetry in MLC Phase Change Memories.
Proceedings of the 2021 International Symposium on Secure and Private Execution Environment Design (SEED), 2021

Seeds of SEED: NMT-Stroke: Diverting Neural Machine Translation through Hardware-based Faults.
Proceedings of the 2021 International Symposium on Secure and Private Execution Environment Design (SEED), 2021

LADDER: Architecting Content and Location-aware Writes for Crossbar Resistive Memories.
Proceedings of the MICRO '21: 54th Annual IEEE/ACM International Symposium on Microarchitecture, 2021

Augmenting Graphs to Minimize the Radius.
Proceedings of the 32nd International Symposium on Algorithms and Computation, 2021

Red Alert for Power Leakage: Exploiting Intel RAPL-Induced Side Channels.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
Thangka Image Inpainting Algorithm Based on Wavelet Transform and Structural Constraints.
J. Inf. Process. Syst., 2020

Cache-Zoomer: On-demand High-resolution Cache Monitoring for Security.
J. Hardw. Syst. Secur., 2020

DeepHammer: Depleting the Intelligence of Deep Neural Networks through Targeted Chain of Bit Flips.
Proceedings of the 29th USENIX Security Symposium, 2020

Inter-task cache interference aware partitioned real-time scheduling.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

Deep Learning Based Prediction Towards Designing A Smart Building Assistant System.
Proceedings of the 17th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2020

BranchSpec: Information Leakage Attacks Exploiting Speculative Branch Instruction Executions.
Proceedings of the 38th IEEE International Conference on Computer Design, 2020

2019
TS-BatPro: Improving Energy Efficiency in Data Centers by Leveraging Temporal-Spatial Batching.
IEEE Trans. Green Commun. Netw., 2019

Leveraging Cache Management Hardware for Practical Defense Against Cache Timing Channel Attacks.
IEEE Micro, 2019

Covert Timing Channels Exploiting Cache Coherence Hardware: Characterization and Defense.
Int. J. Parallel Program., 2019

PrODACT: Prefetch-Obfuscator to Defend Against Cache Timing Channels.
Int. J. Parallel Program., 2019

HolDCSim: A Holistic Simulator for Data Centers.
CoRR, 2019

Towards a Better Indicator for Cache Timing Channels.
CoRR, 2019

Architecting Non-Volatile Main Memory to Guard Against Persistence-based Attacks.
CoRR, 2019

Damaged region filling by improved criminisi image inpainting algorithm for thangka.
Clust. Comput., 2019

Are Crossbar Memories Secure? New Security Vulnerabilities in Crossbar Memories.
IEEE Comput. Archit. Lett., 2019

HolDCSim: A Holistic Simulator for Data Centers.
Proceedings of the IEEE International Symposium on Workload Characterization, 2019

Negative Correlation, Non-linear Filtering, and Discovering of Repetitiveness for Cache Timing Channel Detection.
Proceedings of the IEEE International Conference on Acoustics, 2019

XBFS: eXploring Runtime Optimizations for Breadth-First Search on GPUs.
Proceedings of the 28th International Symposium on High-Performance Parallel and Distributed Computing, 2019

COTSknight: Practical Defense against Cache Timing Channel Attacks using Cache Monitoring and Partitioning Technologies.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2019

PowerStar: Improving Power Efficiency in Heterogenous Processors for Bursty Workloads with Approximate Computing.
Proceedings of the 2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2019

2018
PopCorns: Power Optimization Using a Cooperative Network-Server Approach for Data Centers.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Are Coherence Protocol States Vulnerable to Information Leakage?
Proceedings of the IEEE International Symposium on High Performance Computer Architecture, 2018

Prefetch-guard: Leveraging hardware prefetches to defend against cache timing channels.
Proceedings of the 2018 IEEE International Symposium on Hardware Oriented Security and Trust, 2018

A Noise-resilient Detection Method against Advanced Cache Timing Channel Attack.
Proceedings of the 52nd Asilomar Conference on Signals, Systems, and Computers, 2018

2017
SIMBER: Eliminating Redundant Memory Bound Checks via Statistical Inference.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

Covert Timing Channels Exploiting Non-Uniform Memory Access based Architectures.
Proceedings of the on Great Lakes Symposium on VLSI 2017, 2017

TS-Bat: Leveraging Temporal-Spatial Batching for Data Center Energy Optimization.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

StatSym: Vulnerable Path Discovery through Statistics-Guided Symbolic Execution.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

WASP: Workload Adaptive Energy-Latency Optimization in Server Farms Using Server Low-Power States.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
SARRE: Semantics-Aware Rule Recommendation and Enforcement for Event Paths on Android.
IEEE Trans. Inf. Forensics Secur., 2016

Greedy Step Averaging: A parameter-free stochastic optimization method.
CoRR, 2016

2015
POSTER: Semantics-Aware Rule Recommendation and Enforcement for Event Paths.
Proceedings of the Security and Privacy in Communication Networks, 2015

A Dual Delay Timer Strategy for Optimizing Server Farm Energy.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015

2014
A comparative analysis of data center network architectures.
Proceedings of the IEEE International Conference on Communications, 2014

2013
JOP-alarm: Detecting jump-oriented programming-based anomalies in applications.
Proceedings of the 2013 IEEE 31st International Conference on Computer Design, 2013

Watts-inside: A hardware-software cooperative approach for Multicore Power Debugging.
Proceedings of the 2013 IEEE 31st International Conference on Computer Design, 2013


  Loading...