Huimin Li

Orcid: 0000-0003-3984-1272

Affiliations:
  • Delft University of Technology, Netherlands


According to our database1, Huimin Li authored at least 13 papers between 2020 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
GenHuzz: An Efficient Generative Hardware Fuzzer.
Proceedings of the 34th USENIX Security Symposium, 2025

HFL: Hardware Fuzzing Loop with Reinforcement Learning.
Proceedings of the Design, Automation & Test in Europe Conference, 2025

2024
A systematic study of data augmentation for protected AES implementations.
J. Cryptogr. Eng., November, 2024

HW/SW Co-Design for Security Systems and the Investigation of Deep Learning-based Side-channel Analysis.
PhD thesis, 2024

Fuzzerfly Effect: Hardware Fuzzing for Memory Safety.
IEEE Secur. Priv., 2024

2023
Label Correlation in Deep Learning-Based Side-Channel Analysis.
IEEE Trans. Inf. Forensics Secur., 2023

FLAIRS: FPGA-Accelerated Inference-Resistant & Secure Federated Learning.
Proceedings of the 33rd International Conference on Field-Programmable Logic and Applications, 2023

Maximizing the Potential of Custom RISC-V Vector Extensions for Speeding up SHA-3 Hash Functions.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2023

2022
Deep Learning on Side-Channel Analysis.
Security and Artificial Intelligence, 2022

AGE Is Not Just a Number: Label Distribution in Deep Learning-based Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2022

A scalable SIMD RISC-V based processor with customized vector extensions for CRYSTALS-kyber.
Proceedings of the DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10, 2022

2020
Everything is Connected: From Model Learnability to Guessing Entropy.
IACR Cryptol. ePrint Arch., 2020

A Comparison of Weight Initializers in Deep Learning-Based Side-Channel Analysis.
Proceedings of the Applied Cryptography and Network Security Workshops, 2020


  Loading...