You Li

Orcid: 0000-0003-2632-3804

Affiliations:
  • University of Texas at Austin, UTDA Lab, Austin, TX, USA
  • Northwestern University, ECE Department, Evanston, IL, USA (PhD 2023)
  • Shanghai Jiao Tong University, University of Michigan-Shanghai Jiao Tong University Joint Institute, Shanghai, China (until 2016)


According to our database1, You Li authored at least 20 papers between 2017 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
DE2: SAT-Based Sequential Logic Decryption with a Functional Description.
Proceedings of the Design, Automation & Test in Europe Conference, 2025

RE3: Finding Refinement Relations with Relational Mapping Abstraction.
Proceedings of the 62nd ACM/IEEE Design Automation Conference, 2025

2024
Certifying Global Robustness for Deep Neural Networks.
CoRR, 2024

Property Guided Secure Configuration Space Search.
Proceedings of the Information Security - 27th International Conference, 2024

Evaluating the Security of Logic Locking on Deep Neural Networks.
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024

Multimodal Bayesian Networks for Automatic Skin Disease Diagnosis.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2024

2023
A Combination of DNN and BN for Automatic Skin Disease Diagnosis.
Proceedings of the 20th IEEE International Symposium on Biomedical Imaging, 2023

ObfusLock: An Efficient Obfuscated Locking Framework for Circuit IP Protection<sup>†</sup>.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2023

SE3: Sequential Equivalence Checking for Non-Cycle-Accurate Design Transformations <sup>†</sup>.
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023

2022
Incentivizing Federated Learning.
CoRR, 2022

2021
Discovering emergency call pitfalls for cellular networks with formal methods.
Proceedings of the MobiSys '21: The 19th Annual International Conference on Mobile Systems, Applications, and Services, Virtual Event, Wisconsin, USA, 24 June, 2021

2020
KNN-enhanced Deep Learning Against Noisy Labels.
CoRR, 2020

Network protocol safe configuration search in one shot.
Proceedings of the SIGCOMM '20: ACM SIGCOMM 2020 Conference, 2020

2019
An Efficient Method for Calculating the Error Statistics of Block-Based Approximate Adders.
IEEE Trans. Computers, 2019

A lightweight policy enforcement system for resource protection and management in the SDN-based cloud.
Comput. Networks, 2019

CellScope: Automatically Specifying and Verifying Cellular Network Protocols.
Proceedings of the ACM SIGCOMM 2019 Conference Posters and Demos, 2019

SigAttack: New High-level SAT-based Attack on Logic Encryptions.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2019

BeSAT: behavioral SAT-based attack on cyclic logic encryption.
Proceedings of the 24th Asia and South Pacific Design Automation Conference, 2019

CycSAT-unresolvable cyclic logic encryption using unreachable states.
Proceedings of the 24th Asia and South Pacific Design Automation Conference, 2019

2017
An Accurate and Efficient Method to Calculate the Error Statistics of Block-based Approximate Adders.
CoRR, 2017


  Loading...