High-level synthesis for run-time hardware Trojan detection and recovery X Cui, K Ma, L Shi, K Wu Proceedings of the 51st Annual Design Automation Conference, 1-6, 2014 | 70 | 2014 |
Hardware Trojan detection using the order of path delay X Cui, E Koopahi, K Wu, R Karri ACM Journal on Emerging Technologies in Computing Systems (JETC) 14 (3), 1-23, 2018 | 33 | 2018 |
Towards reverse engineering reversible logic SM Saeed, X Cui, R Wille, A Zulehner, K Wu, R Drechsler, R Karri arXiv preprint arXiv:1704.08397, 2017 | 18 | 2017 |
On the difficulty of inserting trojans in reversible computing architectures X Cui, SM Saeed, A Zulehner, R Wille, K Wu, R Drechsler, R Karri IEEE Transactions on Emerging Topics in Computing 8 (4), 960-972, 2018 | 17 | 2018 |
Potential trigger detection for hardware trojans M Zou, X Cui, L Shi, K Wu IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2017 | 17 | 2017 |
IC/IP piracy assessment of reversible logic SM Saeed, X Cui, A Zulehner, R Wille, R Drechsler, K Wu, R Karri 2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 1-8, 2018 | 10 | 2018 |
A convolutional encoder network for intrusion detection in controller area networks X Zhang, X Cui, K Cheng, L Zhang 2020 16th International Conference on Computational Intelligence and …, 2020 | 7 | 2020 |
Split manufacturing-based register transfer-level obfuscation X Cui, J Zhang, K Wu, S Garg, R Karri ACM Journal on Emerging Technologies in Computing Systems (JETC) 15 (1), 1-22, 2019 | 7 | 2019 |
Worst-case finish time analysis for dag-based applications in the presence of transient faults XT Cui, KJ Wu, TQ Wei, EHM Sha Journal of Computer Science and Technology 31 (2), 267-283, 2016 | 7 | 2016 |
Enhancing security of memristor computing system through secure weight mapping M Zou, J Zhou, X Cui, W Wang, S Kvatinsky 2022 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 182-187, 2022 | 6 | 2022 |
Identifying Inactive Nets in Function Mode of Circuits X Cui, M Zou, K Wu Journal of Computer Research and Development 54 (1), 163-171, 2017 | 6 | 2017 |
Towards trustable storage using SSDs with proprietary FTL X Cui, M Zou, L Shi, K Wu 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE …, 2015 | 6 | 2015 |
Hybrid denoising based correlation power analysis for AES K Cheng, Z Song, X Cui, L Zhang 2021 IEEE 4th Advanced Information Management, Communicates, Electronic and …, 2021 | 5 | 2021 |
Hardware Trojan detection using path delay order encoding with process variation tolerance X Cui, K Wu, R Karri 2018 IEEE 23rd European Test Symposium (ETS), 1-2, 2018 | 5 | 2018 |
Efficient feasibility analysis of DAG scheduling with real-time constraints in the presence of faults X Cui, J Zhang, K Wu, E Sha 2014 19th Asia and South Pacific Design Automation Conference (ASP-DAC), 131-136, 2014 | 5 | 2014 |
Dynamical modeling, analysis, and control of information diffusion over social networks: a deep learning-based recommendation algorithm in social network K Cheng, X Guo, X Cui, F Shan Discrete Dynamics in Nature and Society 2020, 1-8, 2020 | 4 | 2020 |
Can flexible, domain specific programmable logic prevent IP theft? X Cui, K Wu, S Garg, R Karri 2016 IEEE International Symposium on Defect and Fault Tolerance in VLSI and …, 2016 | 4 | 2016 |
Fault Detection Method for Wi-Fi-Based Smart Home Devices K Cheng, J Xu, L Zhang, CX Xu, X Cui Wireless Communications and Mobile Computing 2022, 2022 | 3 | 2022 |
Toward Building and Optimizing Trustworthy Systems Using Untrusted Components: A Graph-Theoretic Perspective X Cui, X Zhang, H Yan, L Zhang, K Cheng, Y Wu, K Wu IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2021 | 3 | 2021 |
Towards trustworthy storage using SSDs with proprietary FTL X Cui, L Shi, K Wu Microprocessors and Microsystems 55, 82-90, 2017 | 3 | 2017 |