Yier Jin
Orcid: 0000-0002-8791-0597Affiliations:
- University of Florida, Gainesville, FL, USA
According to our database1,
Yier Jin
authored at least 200 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Invisible Finger: Practical Electromagnetic Interference Attack on Touchscreen-based Electronic Devices.
CoRR, 2024
Hardware Phi-1.5B: A Large Language Model Encodes Hardware Domain Specific Knowledge.
CoRR, 2024
2023
Side Channel Security Oriented Evaluation and Protection on Hardware Implementations of Kyber.
IEEE Trans. Circuits Syst. I Regul. Pap., December, 2023
IEEE Trans Autom. Sci. Eng., October, 2023
J. Hardw. Syst. Secur., September, 2023
IEEE Trans. Inf. Forensics Secur., 2023
EMSim: A Fast Layout Level Electromagnetic Emanation Simulation Framework for High Accuracy Pre-Silicon Verification.
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2023
IEEE Internet Things J., 2023
HEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation.
IACR Cryptol. ePrint Arch., 2023
HE<sup>3</sup>DB: An Efficient and Elastic Encrypted Database Via Arithmetic-And-Logic Fully Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2023
Challenges and Opportunities for Practical and Effective Dynamic Information Flow Tracking.
ACM Comput. Surv., 2023
Improving FSM State Enumeration Performance for Hardware Security with RECUT and REFSM-SAT.
CoRR, 2023
CoRR, 2023
Proceedings of the 24th International Symposium on Quality Electronic Design, 2023
Energy Efficient Real-Time Scheduling on Heterogeneous Architectures with Self-Suspension.
Proceedings of the IEEE/ACM International Symposium on Low Power Electronics and Design, 2023
THE-V: Verifiable Privacy-Preserving Neural Network via Trusted Homomorphic Execution.
Proceedings of the IEEE/ACM International Conference on Computer Aided Design, 2023
EMSim+: Accelerating Electromagnetic Security Evaluation with Generative Adversarial Network.
Proceedings of the IEEE/ACM International Conference on Computer Aided Design, 2023
Dual-Leak: Deep Unsupervised Active Learning for Cross-Device Profiled Side-Channel Leakage Analysis.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2023
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2023
HE3DB: An Efficient and Elastic Encrypted Database Via Arithmetic-And-Logic Fully Homomorphic Encryption.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
NNLeak: An AI-Oriented DNN Model Extraction Attack through Multi-Stage Side Channel Analysis.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2023
2022
Design and Analysis of Secure Distributed Estimator for Vehicular Platooning in Adversarial Environment.
IEEE Trans. Intell. Transp. Syst., 2022
FineDIFT: Fine-Grained Dynamic Information Flow Tracking for Data-Flow Integrity Using Coprocessor.
IEEE Trans. Inf. Forensics Secur., 2022
Security Oriented Design Framework for EM Side-Channel Protection in RTL Implementations.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2022
A 22-nm 1-Mb 1024-b Read Data-Protected STT-MRAM Macro With Near-Memory Shift-and-Rotate Functionality and 42.6-GB/s Read Bandwidth for Security-Aware Mobile Device.
IEEE J. Solid State Circuits, 2022
ACM J. Emerg. Technol. Comput. Syst., 2022
Invisible Finger: Practical Electromagnetic Interference Attack on Touchscreen-based Electronic Devices.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
SHAPE: Scheduling of Fixed-Priority Tasks on Heterogeneous Architectures with Multiple CPUs and Many PEs.
Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design, 2022
Graph Neural Network based Hardware Trojan Detection at Intermediate Representative for SoC Platforms.
Proceedings of the GLSVLSI '22: Great Lakes Symposium on VLSI 2022, Irvine CA USA, June 6, 2022
Proceedings of the 2022 Design, Automation & Test in Europe Conference & Exhibition, 2022
Proceedings of the 2022 Design, Automation & Test in Europe Conference & Exhibition, 2022
PathFinder: side channel protection through automatic leaky paths identification and obfuscation.
Proceedings of the DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10, 2022
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2022
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
Security-Driven Placement and Routing Tools for Electromagnetic Side-Channel Protection.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2021
Automatic On-Chip Clock Network Optimization for Electromagnetic Side-Channel Protection.
IEEE J. Emerg. Sel. Topics Circuits Syst., 2021
Exploring Adversarial Examples for Efficient Active Learning in Machine Learning Classifiers.
CoRR, 2021
CHIMERA: A Hybrid Estimation Approach to Limit the Effects of False Data Injection Attacks.
Proceedings of the IEEE International Conference on Communications, 2021
Proceedings of the IEEE/ACM International Symposium on Nanoscale Architectures, 2021
RADM: a risk-aware DER management framework with real-time DER trustworthiness evaluation.
Proceedings of the ICCPS '21: ACM/IEEE 12th International Conference on Cyber-Physical Systems, 2021
Proceedings of the IEEE/ACM International Conference On Computer Aided Design, 2021
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2021
Proceedings of the EMSOFT '21: Proceedings of the 2021 International Conference on Embedded Software, Virtual Event, October 8, 2021
Proceedings of the 58th ACM/IEEE Design Automation Conference, 2021
3D-Adv: Black-Box Adversarial Attacks against Deep Learning Models through 3D Sensors.
Proceedings of the 58th ACM/IEEE Design Automation Conference, 2021
Proceedings of the 58th ACM/IEEE Design Automation Conference, 2021
Proceedings of the ASPDAC '21: 26th Asia and South Pacific Design Automation Conference, 2021
Robust Roadside Physical Adversarial Attack Against Deep Learning in Lidar Perception Modules.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
2020
ACM Trans. Design Autom. Electr. Syst., 2020
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2020
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2020
A Survey of Machine Learning Methods for Detecting False Data Injection Attacks in Power Systems.
CoRR, 2020
Proceedings of the 2020 International Symposium on VLSI Design, Automation and Test, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
MITOS: Optimal Decisioning for the Indirect Flow Propagation Dilemma in Dynamic Information Flow Tracking Systems.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020
Special Issue: Resilient Distributed Estimator with Information Consensus for CPS Security.
Proceedings of the 38th IEEE International Conference on Computer Design, 2020
DeepEM: Deep Neural Networks Model Recovery through EM Side-Channel Information Leakage.
Proceedings of the 2020 IEEE International Symposium on Hardware Oriented Security and Trust, 2020
Proceedings of the 2020 IEEE International Symposium on Hardware Oriented Security and Trust, 2020
Proceedings of the 2020 IEEE International Symposium on Hardware Oriented Security and Trust, 2020
A Novel TIGFET-based DFF Design for Improved Resilience to Power Side-Channel Attacks.
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020
Proceedings of the 57th ACM/IEEE Design Automation Conference, 2020
Proceedings of the 57th ACM/IEEE Design Automation Conference, 2020
Design for EM Side-Channel Security through Quantitative Assessment of RTL Implementations.
Proceedings of the 25th Asia and South Pacific Design Automation Conference, 2020
Proceedings of the 25th Asia and South Pacific Design Automation Conference, 2020
PowerScout: A Security-Oriented Power Delivery Network Modeling Framework for Cross-Domain Side-Channel Analysis.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2020
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2020
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2020
Beyond Digital Domain: Fooling Deep Learning Based Recognition System in Physical World.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020
2019
IP Protection and Supply Chain Security through Logic Obfuscation: A Systematic Overview.
ACM Trans. Design Autom. Electr. Syst., 2019
IEEE Trans. Inf. Forensics Secur., 2019
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2019
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2019
CoRR, 2019
Proceedings of the 37th IEEE VLSI Test Symposium, 2019
Proceedings of the 20th International Workshop on Microprocessor/SoC Test, 2019
Proceedings of the 2019 IEEE Computer Society Annual Symposium on VLSI, 2019
Proceedings of the Internet of Things. A Confluence of Many Disciplines, 2019
Proceedings of the International Conference on Computer-Aided Design, 2019
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2019
QIF-Verilog: Quantitative Information-Flow based Hardware Description Languages for Pre-Silicon Security Assessment.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2019
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2019
When Capacitors Attack: Formal Method Driven Design and Detection of Charge-Domain Trojans.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2019
Proceedings of the 24th Asia and South Pacific Design Automation Conference, 2019
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2019
CAD4EM-P: Security-Driven Placement Tools for Electromagnetic Side Channel Protection.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2019
Resilient Distributed Filter for State Estimation of Cyber-Physical Systems Under Attack.
Proceedings of the 2019 American Control Conference, 2019
2018
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2018
J. Hardw. Syst. Secur., 2018
J. Hardw. Syst. Secur., 2018
J. Hardw. Syst. Secur., 2018
Microarchitectural Minefields: 4K-Aliasing Covert Channel and Multi-Tenant Detection in Iaas Clouds.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 3rd IEEE International Verification and Security Workshop, 2018
Proceedings of the IEEE International Test Conference, 2018
Proceedings of the International Conference on Computer-Aided Design, 2018
SIN<sup>2</sup>: Stealth infection on neural network - A low-cost agile neural Trojan attack methodology.
Proceedings of the 2018 IEEE International Symposium on Hardware Oriented Security and Trust, 2018
Proceedings of the 2018 IEEE International Symposium on Hardware Oriented Security and Trust, 2018
Proceedings of the 2018 on Great Lakes Symposium on VLSI, 2018
Proceedings of the 2018 Design, Automation & Test in Europe Conference & Exhibition, 2018
Proceedings of the 55th Annual Design Automation Conference, 2018
Security analysis and enhancement of model compressed deep learning systems under adversarial attacks.
Proceedings of the 23rd Asia and South Pacific Design Automation Conference, 2018
PT-spike: A precise-time-dependent single spike neuromorphic architecture with efficient supervised learning.
Proceedings of the 23rd Asia and South Pacific Design Automation Conference, 2018
Proceedings of the Continuing Arms Race: Code-Reuse Attacks and Defenses, 2018
2017
Silicon Demonstration of Hardware Trojan Design and Detection in Wireless Cryptographic ICs.
IEEE Trans. Very Large Scale Integr. Syst., 2017
Hardware Trojan Detection Through Chip-Free Electromagnetic Side-Channel Statistical Analysis.
IEEE Trans. Very Large Scale Integr. Syst., 2017
IEEE Trans. Very Large Scale Integr. Syst., 2017
IEEE Trans. Multi Scale Comput. Syst., 2017
Data Secrecy Protection Through Information Flow Tracking in Proof-Carrying Hardware IP - Part I: Framework Fundamentals.
IEEE Trans. Inf. Forensics Secur., 2017
Eliminating the Hardware-Software Boundary: A Proof-Carrying Approach for Trust Evaluation on Computer Systems.
IEEE Trans. Inf. Forensics Secur., 2017
Data Secrecy Protection Through Information Flow Tracking in Proof-Carrying Hardware IP - Part II: Framework Automation.
IEEE Trans. Inf. Forensics Secur., 2017
IEEE Trans. Emerg. Top. Comput., 2017
Wolf in Sheep's Clothing - The Downscaling Attack Against Deep Learning Applications.
CoRR, 2017
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017
Proceedings of the 18th International Workshop on Microprocessor and SOC Test and Verification, 2017
Proceedings of the IEEE International Symposium on Circuits and Systems, 2017
Proceedings of the Hardware and Architectural Support for Security and Privacy, 2017
Proceedings of the 2017 International Conference on Computing, 2017
Proceedings of the 2017 IEEE/ACM International Conference on Computer-Aided Design, 2017
MT-spike: A multilayer time-based spiking neuromorphic architecture with temporal error backpropagation.
Proceedings of the 2017 IEEE/ACM International Conference on Computer-Aided Design, 2017
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017
Proceedings of the on Great Lakes Symposium on VLSI 2017, 2017
Proceedings of the on Great Lakes Symposium on VLSI 2017, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017
Proceedings of the 54th Annual Design Automation Conference, 2017
Proceedings of the 22nd Asia and South Pacific Design Automation Conference, 2017
Proceedings of the 2017 Asian Hardware Oriented Security and Trust Symposium, 2017
2016
ACM Trans. Design Autom. Electr. Syst., 2016
Guest Editorial: Hardware/Software Cross-Layer Technologies for Trustworthy and Secure Computing.
IEEE Trans. Multi Scale Comput. Syst., 2016
ACM J. Emerg. Technol. Comput. Syst., 2016
IEEE Des. Test, 2016
Proceedings of the 34th IEEE VLSI Test Symposium, 2016
Proceedings of the 34th IEEE VLSI Test Symposium, 2016
Proceedings of the 29th IEEE International System-on-Chip Conference, 2016
Panel Security and Privacy in the Age of Internet of Things: Opportunities and Challenges.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016
Proceedings of the 17th International Workshop on Microprocessor and SOC Test and Verification, 2016
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2016
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2016
Gate-level netlist reverse engineering for hardware security: Control logic register identification.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2016
Emerging challenges in cyber-physical systems: A balance of performance, correctness, and security.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016
Voting system design pitfalls: Vulnerability analysis and exploitation of a model platform.
Proceedings of the 34th IEEE International Conference on Computer Design, 2016
Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust, 2016
Proceedings of the 2016 IEEE Asian Hardware-Oriented Security and Trust, 2016
Proceedings of the 26th edition on Great Lakes Symposium on VLSI, 2016
Proceedings of the 2016 Design, Automation & Test in Europe Conference & Exhibition, 2016
Proceedings of the 2016 Design, Automation & Test in Europe Conference & Exhibition, 2016
Proceedings of the 53rd Annual Design Automation Conference, 2016
Proceedings of the 53rd Annual Design Automation Conference, 2016
Proceedings of the 53rd Annual Design Automation Conference, 2016
Proceedings of the 21st Asia and South Pacific Design Automation Conference, 2016
Proceedings of the 21st Asia and South Pacific Design Automation Conference, 2016
2015
IEEE Trans. Multi Scale Comput. Syst., 2015
Proceedings of the 16th International Workshop on Microprocessor and SOC Test and Verification, 2015
Proceedings of the 34th IEEE Military Communications Conference, 2015
Reliable and high performance STT-MRAM architectures based on controllable-polarity devices.
Proceedings of the 33rd IEEE International Conference on Computer Design, 2015
Proceedings of the IEEE/ACM International Conference on Computer-Aided Design, 2015
Proceedings of the 20th IEEE European Test Symposium, 2015
Proceedings of the 52nd Annual Design Automation Conference, 2015
Proceedings of the 52nd Annual Design Automation Conference, 2015
Proceedings of the 52nd Annual Design Automation Conference, 2015
Proceedings of the 14th International Conference on Computer-Aided Design and Computer Graphics, 2015
2014
Design-for-Security vs. Design-for-Testability: A Case Study on DFT Chain in Cryptographic Circuits.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2014
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2014
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2014
Proceedings of the 51st Annual Design Automation Conference 2014, 2014
Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, 2014
Leveraging Emerging Technology for Hardware Security - Case Study on Silicon Nanowire FETs and Graphene SymFETs.
Proceedings of the 23rd IEEE Asian Test Symposium, 2014
2013
Proceedings of the 2013 IEEE 19th International On-Line Testing Symposium (IOLTS), 2013
Hardware Trojans in wireless cryptographic ICs: silicon demonstration & detection method evaluation.
Proceedings of the IEEE/ACM International Conference on Computer-Aided Design, 2013
Proceedings of the IEEE/ACM International Conference on Computer-Aided Design, 2013
Cycle-accurate information assurance by proof-carrying based signal sensitivity tracing.
Proceedings of the 2013 IEEE International Symposium on Hardware-Oriented Security and Trust, 2013
Proceedings of the 18th IEEE European Test Symposium, 2013
2012
Proof-Carrying Hardware Intellectual Property: A Pathway to Trusted Module Acquisition.
IEEE Trans. Inf. Forensics Secur., 2012
Proof carrying-based information flow tracking for data secrecy protection and hardware trust.
Proceedings of the 30th IEEE VLSI Test Symposium, 2012
Proceedings of the 30th International IEEE Conference on Computer Design, 2012
Proceedings of the 2012 Design, Automation & Test in Europe Conference & Exhibition, 2012
2011
Proceedings of the 18th IEEE International Conference on Electronics, Circuits and Systems, 2011
Proceedings of the IEEE 29th International Conference on Computer Design, 2011
Proceedings of the HOST 2011, 2011
2010
Proceedings of the 17th IEEE International Conference on Electronics, 2010
2009
Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, 2009
2008
Low complexity bit parallel multiplier for GF(2<sup>m</sup>) generated by equally-spaced trinomials.
Inf. Process. Lett., 2008
Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, 2008
2007
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2007
2006
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006
Proceedings of the Embedded and Ubiquitous Computing, International Conference, 2006