Xiaolin Xu

According to our database1, Xiaolin Xu authored at least 69 papers between 2004 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Bimodal Oscillation as a Mechanism for Autonomous Majority Voting in PUFs.
IEEE Trans. VLSI Syst., 2018

SCARe: An SRAM-Based Countermeasure Against IC Recycling.
IEEE Trans. VLSI Syst., 2018

Survey on Applications of Formal Methods in Reverse Engineering and Intellectual Property Protection.
J. Hardware and Systems Security, 2018

Development and Evaluation of Hardware Obfuscation Benchmarks.
J. Hardware and Systems Security, 2018

Efficient Erasable PUFs from Programmable Logic and Memristors.
IACR Cryptology ePrint Archive, 2018

Power-based side-channel instruction-level disassembler.
Proceedings of the 55th Annual Design Automation Conference, 2018

2017
Introduction to Morphogenetic Computing
Studies in Computational Intelligence 703, Springer, ISBN: 978-3-319-57614-5, 2017

Poly-Si-Based Physical Unclonable Functions.
IEEE Trans. VLSI Syst., 2017

Security Beyond CMOS: Fundamentals, Applications, and Roadmap.
IEEE Trans. VLSI Syst., 2017

ACStor: Optimizing Access Performance of Virtual Disk Images in Clouds.
IEEE Trans. Parallel Distrib. Syst., 2017

Study on comprehensive evaluation model of attribute coordinate based on evaluation sample selection by K-means.
J. Comput. Meth. in Science and Engineering, 2017

An improved efficient identity-based proxy signature in the standard model.
Int. J. Comput. Math., 2017

Novel Bypass Attack and BDD-based Tradeoff Analysis Against all Known Logic Locking Attacks.
IACR Cryptology ePrint Archive, 2017

Analysis of market competition and information asymmetry on selling strategies.
Annals OR, 2017

Routing Optimization of Small Satellite Networks based on Multi-commodity Flow.
ICST Trans. Ambient Systems, 2017

Aging resilient RO PUF with increased reliability in FPGA.
Proceedings of the International Conference on ReConFigurable Computing and FPGAs, 2017

A Deep Learning Based Framework for Power Demand Forecasting with Deep Belief Networks.
Proceedings of the 18th International Conference on Parallel and Distributed Computing, 2017

CCATDC: A Configurable Compact Algorithmic Time-to-Digital Converter.
Proceedings of the 2017 IEEE Computer Society Annual Symposium on VLSI, 2017

Research of the Evaluation Index System of Green Port Based on Analysis Approach of Attribute Coordinate.
Proceedings of the Intelligence Science I, 2017

Minimum cost deployment of wireless sensors with wake-up radios.
Proceedings of the 14th IEEE International Conference on Networking, Sensing and Control, 2017

Study on Updating Algorithm of Attribute Coordinate Evaluation Model.
Proceedings of the Intelligent Computing Methodologies - 13th International Conference, 2017

A study of pushing service framework of the personalized learning resources on network learning platform.
Proceedings of the Ninth International Conference on Advanced Computational Intelligence, 2017

FFD: A Framework for Fake Flash Detection.
Proceedings of the 54th Annual Design Automation Conference, 2017

Novel Bypass Attack and BDD-based Tradeoff Analysis Against All Known Logic Locking Attacks.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017

MPA: Model-assisted PCB attestation via board-level RO and temperature compensation.
Proceedings of the 2017 Asian Hardware Oriented Security and Trust Symposium, 2017

2016
Dynamic Database by Inconsistency and Morphogenetic Computing.
Trans. Computational Collective Intelligence, 2016

Surviving in the dispute: A bibliometric analysis of global GMF-related research, 1995-2014.
Scientometrics, 2016

Academic Publishing: Making the Implicit Explicit.
Publications, 2016

Social media policies as responses for social media affordances: The case of China.
Government Information Quarterly, 2016

A Learning-Based System for Monitoring Electrical Load in Smart Grid.
Proceedings of the 17th International Conference on Parallel and Distributed Computing, 2016

Using Statistical Models to Improve the Reliability of Delay-Based PUFs.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2016

Event source identification and strength estimation in wireless sensor networks.
Proceedings of the 13th IEEE International Conference on Networking, Sensing, and Control, 2016

A Clockless Sequential PUF with Autonomous Majority Voting.
Proceedings of the 26th edition on Great Lakes Symposium on VLSI, 2016

Reliable PUF design using failure patterns from time-controlled power gating.
Proceedings of the 2016 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, 2016

Novel Low Cost and Double Node Upset Tolerant Latch Design for Nanoscale CMOS Technology.
Proceedings of the 25th IEEE Asian Test Symposium, 2016

2015
Reliable Physical Unclonable Functions Using Data Retention Voltage of SRAM Cells.
IEEE Trans. on CAD of Integrated Circuits and Systems, 2015

A verifiable hierarchical circular shift cipher scheme for P2P chunk exchanges.
Peer-to-Peer Networking and Applications, 2015

Fairly Sharing the Network for Multitier Applications in Clouds.
Int. J. Web Service Res., 2015

An agent-based model to study the market dynamics of perpetual and subscription licensing.
JORS, 2015

Security Evaluation and Enhancement of Bistable Ring PUFs.
IACR Cryptology ePrint Archive, 2015

PLayPUF: Programmable Logically Erasable PUFs for Forward and Backward Secure Key Management.
IACR Cryptology ePrint Archive, 2015

Rethink the storage of virtual machine images in clouds.
Future Generation Comp. Syst., 2015

Consumer returns policies with endogenous deadline and supply chain coordination.
European Journal of Operational Research, 2015

Virtual Proofs of Reality and their Physical Implementation.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Security Evaluation and Enhancement of Bistable Ring PUFs.
Proceedings of the Radio Frequency Identification. Security and Privacy Issues, 2015

2014
Diffusion of e-government: A literature review and directions for future directions.
Government Information Quarterly, 2014

Domain Algorithmically Generated Botnet Detection and Analysis.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

PUF-Based RFID Ownership Transfer Protocol in an Open Environment.
Proceedings of the 15th International Conference on Parallel and Distributed Computing, 2014

SDViNet: A software defined virtual network management platform in IaaS cloud.
Proceedings of the 20th IEEE International Workshop on Local & Metropolitan Area Networks, 2014

Post-Silicon Validation and Calibration of Hardware Security Primitives.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2014

Programming wireless recharging for target-oriented rechargeable sensor networks.
Proceedings of 11th IEEE International Conference on Networking, Sensing and Control, 2014

A Quantification Method of Qualitative Indices Based on Inverse Conversion Degree Functions.
Proceedings of the Enterprise Systems Conference, 2014

Hybrid side-channel/machine-learning attacks on PUFs: A new threat?
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2014

Characterizing Patterns of Chinese Yiban Blogging Service.
Proceedings of the 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2014

Efficient Power and Timing Side Channels for Physical Unclonable Functions.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014

2013
PUF Modeling Attacks on Simulated and Silicon Data.
IEEE Trans. Information Forensics and Security, 2013

Short Hierarchical Identity-based Encryption in the Selective-ID Model.
JSW, 2013

Power and Timing Side Channels for PUFs and their Efficient Exploitation.
IACR Cryptology ePrint Archive, 2013

PUF Modeling Attacks on Simulated and Silicon Data.
IACR Cryptology ePrint Archive, 2013

Measurement and analysis of Shanghai Xinmin microblog website.
Proceedings of the 2013 IEEE International Conference on Granular Computing, 2013

2012
A recommendation ranking model based on credit.
Proceedings of the 2012 IEEE International Conference on Granular Computing, 2012

2011
Orientation Mining-Driven Approach to Analyze Web Public Sentiment.
JSW, 2011

A Ranking Model Based on Credit for Social News Website.
Proceedings of the Emerging Research in Web Information Systems and Mining, 2011

2010
The effect of demand uncertainty in a price-setting newsvendor model.
European Journal of Operational Research, 2010

Research and Implementation of Image Encryption Algorithm Based on Zigzag Transformation and Inner Product Polarization Vector.
Proceedings of the 2010 IEEE International Conference on Granular Computing, 2010

2009
An Improved Model of Administrative Decision-making Support System Based on MAS.
Proceedings of the First IITA International Joint Conference on Artificial Intelligence, 2009

A kind of synthetic evaluation method based on the attribute computing network.
Proceedings of the 2009 IEEE International Conference on Granular Computing, 2009

2007
Optimal Commodity Distribution for a Vehicle with Fixed Capacity Under Vendor Managed Inventory.
Proceedings of the Combinatorics, 2007

2004
Optimal production decisions under an uncertain deadline.
Proceedings of the IEEE International Conference on Systems, 2004


  Loading...