Xiaotong Cui

Orcid: 0000-0002-7208-1204

According to our database1, Xiaotong Cui authored at least 27 papers between 2014 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Hybrid Threshold Denoising Framework Using Singular Value Decomposition for Side-Channel Analysis Preprocessing.
Entropy, August, 2023

Efficient Attack Scheme against SKINNY-64 Based on Algebraic Fault Analysis.
Entropy, June, 2023

Side-Channel Attacks Based on Deep Learning.
Proceedings of the 2023 International Conference on Advances in Artificial Intelligence and Applications, 2023

Power Analysis Attack Based on Hybrid Denoising.
Proceedings of the 2023 International Conference on Advances in Artificial Intelligence and Applications, 2023

2022
Electromagnetic Side-Channel Hardware Trojan Detection Based on Transfer Learning.
IEEE Trans. Circuits Syst. II Express Briefs, 2022

Toward Building and Optimizing Trustworthy Systems Using Untrusted Components: A Graph-Theoretic Perspective.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2022

Side Channel Analysis of SPECK Based on Transfer Learning.
Sensors, 2022

Enhancing Security of Memristor Computing System Through Secure Weight Mapping.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2022

2021
Analysis of Electromagnetic Information Leakage Based on Cryptographic Integrated Circuits.
Entropy, 2021

2020
On the Difficulty of Inserting Trojans in Reversible Computing Architectures.
IEEE Trans. Emerg. Top. Comput., 2020

An Effective Simulation Analysis of Transient Electromagnetic Multiple Faults.
Sensors, 2020

Electromagnetic radiation-based IC device identification and verification using deep learning.
EURASIP J. Wirel. Commun. Netw., 2020

A Convolutional Encoder Network for Intrusion Detection in Controller Area Networks.
Proceedings of the 16th International Conference on Computational Intelligence and Security, 2020

2019
A Novel Multi-Objective Electromagnetic Analysis Based on Genetic Algorithm.
Sensors, 2019

Split Manufacturing-Based Register Transfer-Level Obfuscation.
ACM J. Emerg. Technol. Comput. Syst., 2019

2018
Potential Trigger Detection for Hardware Trojans.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2018

Hardware Trojan Detection Using the Order of Path Delay.
ACM J. Emerg. Technol. Comput. Syst., 2018

TTEC: Data Allocation Optimization for Morphable Scratchpad Memory in Embedded Systems.
IEEE Access, 2018

IC/IP piracy assessment of reversible logic.
Proceedings of the International Conference on Computer-Aided Design, 2018

Hardware Trojan detection using path delay order encoding with process variation tolerance.
Proceedings of the 23rd IEEE European Test Symposium, 2018

2017
Towards trustworthy storage using SSDs with proprietary FTL.
Microprocess. Microsystems, 2017

Towards Reverse Engineering Reversible Logic.
CoRR, 2017

2016
Worst-Case Finish Time Analysis for DAG-Based Applications in the Presence of Transient Faults.
J. Comput. Sci. Technol., 2016

Can flexible, domain specific programmable logic prevent IP theft?
Proceedings of the 2016 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, 2016

2015
Towards trustable storage using SSDs with proprietary FTL.
Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, 2015

2014
High-Level Synthesis for Run-Time Hardware Trojan Detection and Recovery.
Proceedings of the 51st Annual Design Automation Conference 2014, 2014

Efficient feasibility analysis of DAG scheduling with real-time constraints in the presence of faults.
Proceedings of the 19th Asia and South Pacific Design Automation Conference, 2014


  Loading...