Mingfu Xue

According to our database1, Mingfu Xue authored at least 16 papers between 2012 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


On csauthors.net:


DPAEG: A Dependency Parse-Based Adversarial Examples Generation Method for Intelligent Q&A Robots.
Secur. Commun. Networks, 2020

Machine Learning Security: Threats, Countermeasures, and Evaluations.
IEEE Access, 2020

SSL: A Novel Image Hashing Technique Using SIFT Keypoints with Saliency Detection and LBP Feature Extraction against Combinatorial Manipulations.
Secur. Commun. Networks, 2019

Building an accurate hardware Trojan detection technique from inaccurate simulation models and unlabelled ICs.
IET Comput. Digit. Tech., 2019

Defeating Untrustworthy Testing Parties: A Novel Hybrid Clustering Ensemble Based Golden Models-Free Hardware Trojan Detection Method.
IEEE Access, 2019

A Co-training Based Hardware Trojan Detection Technique by Exploiting Unlabeled ICs and Inaccurate Simulation Models.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Building Trusted Golden Models-Free Hardware Trojan Detection Framework Against Untrustworthy Testing Parties Using a Novel Clustering Ensemble Technique.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A Novel Golden Models-Free Hardware Trojan Detection Technique Using Unsupervised Clustering Analysis.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

面向敏感值的层次化多源数据融合隐私保护 (Hierarchical Privacy Protection of Multi-source Data Fusion for Sensitive Value).
计算机科学, 2017

Automated Vulnerability Modeling and Verification for Penetration Testing Using Petri Nets.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

An enhanced classification-based golden chips-free hardware Trojan detection technique.
Proceedings of the 2016 IEEE Asian Hardware-Oriented Security and Trust, 2016

Security Against Hardware Trojan Attacks Through a Novel Chaos FSM and Delay Chains Array PUF Based Design Obfuscation Scheme.
Proceedings of the Cloud Computing and Security - First International Conference, 2015

An Integer Time Delay Estimation Algorithm Based on Zadoff-Chu Sequence in OFDM Systems.
IEEE Trans. Veh. Technol., 2014

Detecting Hardware Trojan through Time Domain Constrained Estimator Based Unified Subspace Technique.
IEICE Trans. Inf. Syst., 2014

Monte Carlo Based Test Pattern Generation for Hardware Trojan Detection.
Proceedings of the IEEE 11th International Conference on Dependable, 2013

Application-Oriented Confidentiality and Integrity Dynamic Union Security Model Based on MLS Policy.
IEICE Trans. Inf. Syst., 2012