Kan Xiao
Orcid: 0009-0003-6852-4548
According to our database1,
Kan Xiao
authored at least 16 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Whole-genome Sequencing Reveals Autooctoploidy in Chinese Sturgeon and Its Evolutionary Trajectories.
Genom. Proteom. Bioinform., 2024
2017
Securing Split Manufactured ICs with Wire Lifting Obfuscated Built-In Self-Authentication.
Proceedings of the on Great Lakes Symposium on VLSI 2017, 2017
2016
ACM Trans. Design Autom. Electr. Syst., 2016
Proceedings of the 53rd Annual Design Automation Conference, 2016
2015
Efficient and secure split manufacturing via obfuscated built-in self-authentication.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2015
Proceedings of the 25th edition on Great Lakes Symposium on VLSI, GLVLSI 2015, Pittsburgh, PA, USA, May 20, 2015
2014
A Novel Built-In Self-Authentication Technique to Prevent Inserting Hardware Trojans.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2014
Proceedings of the 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, 2014
Proceedings of the 51st Annual Design Automation Conference 2014, 2014
Proceedings of the 23rd IEEE Asian Test Symposium, 2014
2013
IEEE Des. Test, 2013
A study on the effectiveness of Trojan detection techniques using a red team blue team approach.
Proceedings of the 31st IEEE VLSI Test Symposium, 2013
Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, 2013
2012
A zero-overhead IC identification technique using clock sweeping and path delay analysis.
Proceedings of the Great Lakes Symposium on VLSI 2012, 2012
Proceedings of the 2012 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, 2012