Peinan Li

Orcid: 0000-0001-5109-3495

According to our database1, Peinan Li authored at least 18 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Data-driven prediction for curved pipe jacking performance during underwater excavation of ancient shipwreck using an attention-based graph convolutional network approach.
Expert Syst. Appl., February, 2024

2023
A Multi-Level Auto-Adaptive Noise-Filtering Algorithm for Land ICESat-2 Photon-Counting Data.
Remote. Sens., November, 2023

Dynamic prediction for attitude and position of shield machine in tunneling: A hybrid deep learning method considering dual attention.
Adv. Eng. Informatics, August, 2023

HE-Booster: An Efficient Polynomial Arithmetic Acceleration on GPUs for Fully Homomorphic Encryption.
IEEE Trans. Parallel Distributed Syst., April, 2023

Architecting the Autocuckoo Filter to Defend Against Cross-Core Cache Attacks.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., April, 2023

NTTFusion: Efficient Number Theoretic Transform Acceleration on GPUs.
Proceedings of the 41st IEEE International Conference on Computer Design, 2023

ChaosINTC: A Secure Interrupt Management Mechanism against Interrupt-based Attacks on TEE.
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023

2022
A Sea Ice Concentration Estimation Methodology Utilizing ICESat-2 Photon-Counting Laser Altimeter in the Arctic.
Remote. Sens., 2022

Remapped Cache Layout: Thwarting Cache-Based Side-Channel Attacks with a Hardware Defense.
CoRR, 2022

HyBP: Hybrid Isolation-Randomization Secure Branch Predictor.
Proceedings of the IEEE International Symposium on High-Performance Computer Architecture, 2022

Conditional address propagation: an efficient defense mechanism against transient execution attacks.
Proceedings of the DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10, 2022

2021
Exploiting Security Dependence for Conditional Speculation Against Spectre Attacks.
IEEE Trans. Computers, 2021

A Novel Probabilistic Saturating Counter Design for Secure Branch Predictor.
J. Comput. Sci. Technol., 2021

PiPoMonitor: Mitigating Cross-core Cache Attacks Using the Auto-Cuckoo Filter.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2021

A Lightweight Isolation Mechanism for Secure Branch Predictors.
Proceedings of the 58th ACM/IEEE Design Automation Conference, 2021

2019
Enabling Privacy-Preserving, Compute- and Data-Intensive Computing using Heterogeneous Trusted Execution Environment.
CoRR, 2019

Conditional Speculation: An Effective Approach to Safeguard Out-of-Order Execution Against Spectre Attacks.
Proceedings of the 25th IEEE International Symposium on High Performance Computer Architecture, 2019

2012
Pricing Analysis on Internet Paid Sharing of Digital Products.
Proceedings of the Fifth International Conference on Business Intelligence and Financial Engineering, 2012


  Loading...