Haoting Shen

Orcid: 0000-0002-0244-9157

According to our database1, Haoting Shen authored at least 23 papers between 2016 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Unified and Fully Automated Framework for Wavelet-Based Attacks on Random Delay.
IEEE Trans. Computers, September, 2024

2022
Integrating blockchain into supply chain safeguarded by PUF-enabled RFID.
Internet Things, 2022

Adversarial Analysis of the Differentially-Private Federated Learning in Cyber-Physical Critical Infrastructures.
CoRR, 2022

DEAN: A Lightweight and Resource-efficient Blockchain Protocol for Reliable Edge Computing.
Proceedings of the 2022 IEEE International Parallel and Distributed Processing Symposium, 2022

DARPT: defense against remote physical attack based on TDC in multi-tenant scenario.
Proceedings of the DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10, 2022

2021
PoRCH: A Novel Consensus Mechanism for Blockchain-Enabled Future SCADA Systems in Smart Grids and Industry 4.0.
CoRR, 2021

DeSMP: Differential Privacy-exploited Stealthy Model Poisoning Attacks in Federated Learning.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

3D Unclonable Optical Identity for Universal Product Verification.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2021

Privacy, Security, and Utility Analysis of Differentially Private CPES Data.
Proceedings of the IEEE Conference on Communications and Network Security, 2021

2020
Reflector: a fine-grained I/O tracker for HPC systems.
Proceedings of the PPoPP '20: 25th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, 2020

2019
Covert Gates: Protecting Integrated Circuits with Undetectable Camouflaging.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

Aging Analysis of Low Dropout Regulator for Universal Recycled IC Detection.
Proceedings of the 2019 IEEE Computer Society Annual Symposium on VLSI, 2019

Golden Gates: A New Hybrid Approach for Rapid Hardware Trojan Detection using Testing and Imaging.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2019

LPN-based Device Authentication Using Resistive Memory.
Proceedings of the 2019 on Great Lakes Symposium on VLSI, 2019

Contact-to-Silicide Probing Attacks on Integrated Circuits and Countermeasures.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2019

2018
Hardware-Enabled Pharmaceutical Supply Chain Security.
ACM Trans. Design Autom. Electr. Syst., 2018

UCR: An Unclonable Environmentally Sensitive Chipless RFID Tag For Protecting Supply Chain.
ACM Trans. Design Autom. Electr. Syst., 2018

Detecting Hardware Trojans Inserted by Untrusted Foundry Using Physical Inspection and Advanced Image Processing.
J. Hardw. Syst. Secur., 2018

Physical Inspection & Attacks: New Frontier in Hardware Security.
Proceedings of the 3rd IEEE International Verification and Security Workshop, 2018

EMFORCED: EM-based Fingerprinting Framework for Counterfeit Detection with Demonstration on Remarked and Cloned ICs.
Proceedings of the IEEE International Test Conference, 2018

2017
Poly-Si-Based Physical Unclonable Functions.
IEEE Trans. Very Large Scale Integr. Syst., 2017

A split manufacturing approach for unclonable chipless RFIDs for pharmaceutical supply chain security.
Proceedings of the 2017 Asian Hardware Oriented Security and Trust Symposium, 2017

2016
Selective Enhancement of Randomness at the Materials Level: Poly-Si Based Physical Unclonable Functions (PUFs).
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2016


  Loading...