Follow
Xiaotong Cui
Title
Cited by
Cited by
Year
High-level synthesis for run-time hardware Trojan detection and recovery
X Cui, K Ma, L Shi, K Wu
Proceedings of the 51st Annual Design Automation Conference, 1-6, 2014
702014
Hardware Trojan detection using the order of path delay
X Cui, E Koopahi, K Wu, R Karri
ACM Journal on Emerging Technologies in Computing Systems (JETC) 14 (3), 1-23, 2018
332018
Towards reverse engineering reversible logic
SM Saeed, X Cui, R Wille, A Zulehner, K Wu, R Drechsler, R Karri
arXiv preprint arXiv:1704.08397, 2017
182017
On the difficulty of inserting trojans in reversible computing architectures
X Cui, SM Saeed, A Zulehner, R Wille, K Wu, R Drechsler, R Karri
IEEE Transactions on Emerging Topics in Computing 8 (4), 960-972, 2018
172018
Potential trigger detection for hardware trojans
M Zou, X Cui, L Shi, K Wu
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2017
172017
IC/IP piracy assessment of reversible logic
SM Saeed, X Cui, A Zulehner, R Wille, R Drechsler, K Wu, R Karri
2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 1-8, 2018
102018
A convolutional encoder network for intrusion detection in controller area networks
X Zhang, X Cui, K Cheng, L Zhang
2020 16th International Conference on Computational Intelligence and …, 2020
72020
Split manufacturing-based register transfer-level obfuscation
X Cui, J Zhang, K Wu, S Garg, R Karri
ACM Journal on Emerging Technologies in Computing Systems (JETC) 15 (1), 1-22, 2019
72019
Worst-case finish time analysis for dag-based applications in the presence of transient faults
XT Cui, KJ Wu, TQ Wei, EHM Sha
Journal of Computer Science and Technology 31 (2), 267-283, 2016
72016
Enhancing security of memristor computing system through secure weight mapping
M Zou, J Zhou, X Cui, W Wang, S Kvatinsky
2022 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 182-187, 2022
62022
Identifying Inactive Nets in Function Mode of Circuits
X Cui, M Zou, K Wu
Journal of Computer Research and Development 54 (1), 163-171, 2017
62017
Towards trustable storage using SSDs with proprietary FTL
X Cui, M Zou, L Shi, K Wu
2015 Design, Automation & Test in Europe Conference & Exhibition (DATE …, 2015
62015
Hybrid denoising based correlation power analysis for AES
K Cheng, Z Song, X Cui, L Zhang
2021 IEEE 4th Advanced Information Management, Communicates, Electronic and …, 2021
52021
Hardware Trojan detection using path delay order encoding with process variation tolerance
X Cui, K Wu, R Karri
2018 IEEE 23rd European Test Symposium (ETS), 1-2, 2018
52018
Efficient feasibility analysis of DAG scheduling with real-time constraints in the presence of faults
X Cui, J Zhang, K Wu, E Sha
2014 19th Asia and South Pacific Design Automation Conference (ASP-DAC), 131-136, 2014
52014
Dynamical modeling, analysis, and control of information diffusion over social networks: a deep learning-based recommendation algorithm in social network
K Cheng, X Guo, X Cui, F Shan
Discrete Dynamics in Nature and Society 2020, 1-8, 2020
42020
Can flexible, domain specific programmable logic prevent IP theft?
X Cui, K Wu, S Garg, R Karri
2016 IEEE International Symposium on Defect and Fault Tolerance in VLSI and …, 2016
42016
Fault Detection Method for Wi-Fi-Based Smart Home Devices
K Cheng, J Xu, L Zhang, CX Xu, X Cui
Wireless Communications and Mobile Computing 2022, 2022
32022
Toward Building and Optimizing Trustworthy Systems Using Untrusted Components: A Graph-Theoretic Perspective
X Cui, X Zhang, H Yan, L Zhang, K Cheng, Y Wu, K Wu
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2021
32021
Towards trustworthy storage using SSDs with proprietary FTL
X Cui, L Shi, K Wu
Microprocessors and Microsystems 55, 82-90, 2017
32017
The system can't perform the operation now. Try again later.
Articles 1–20