Follow
Yongqiang Lyu
Yongqiang Lyu
Associate Professor, Tsinghua University
Verified email at tsinghua.edu.cn
Title
Cited by
Cited by
Year
A PUF-FSM binding scheme for FPGA IP protection and pay-per-device licensing
J Zhang, Y Lin, Y Lyu, G Qu
IEEE Transactions on Information Forensics and Security 10 (6), 1137-1150, 2015
1822015
Voltjockey: Breaching trustzone by software-controlled voltage manipulation over multi-core frequencies
P Qiu, D Wang, Y Lyu, G Qu
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
1482019
SNrram: An efficient sparse neural network computation architecture based on resistive random-access memory
P Wang, Y Ji, C Hong, Y Lyu, D Wang, Y Xie
Proceedings of the 55th Annual Design Automation Conference, 1-6, 2018
1032018
Hyperconnected network: A decentralized trusted computing and networking paradigm
H Yin, D Guo, K Wang, Z Jiang, Y Lyu, J Xing
IEEE Network 32 (1), 112-117, 2018
1022018
Approximate computing for low power and security in the internet of things
M Gao, Q Wang, MT Arafin, Y Lyu, G Qu
Computer 50 (6), 27-34, 2017
852017
VoltJockey: Breaking SGX by software-controlled voltage-induced hardware faults
P Qiu, D Wang, Y Lyu, G Qu
2019 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), 1-6, 2019
632019
Measuring photoplethysmogram-based stress-induced vascular response index to assess cognitive load and stress
Y Lyu, X Luo, J Zhou, C Yu, C Miao, T Wang, Y Shi, K Kameyama
Proceedings of the 33rd annual ACM conference on human factors in computing …, 2015
622015
Navigating registers in placement for clock network minimization
Y Lu, CN Sze, X Hong, Q Zhou, Y Cai, L Huang, J Hu
Proceedings of the 42nd annual Design Automation Conference, 176-181, 2005
512005
A survey of hardware trojan detection, diagnosis and prevention
H Li, Q Liu, J Zhang, Y Lyu
2015 14th International Conference on Computer-Aided Design and Computer …, 2015
472015
Design and implementation of a delay-based PUF for FPGA IP protection
J Zhang, Q Wu, Y Lyu, Q Zhou, Y Cai, Y Lin, G Qu
2013 International Conference on Computer-Aided Design and Computer Graphics …, 2013
442013
LEAP: A lightweight encryption and authentication protocol for in-vehicle communications
Z Lu, Q Wang, X Chen, G Qu, Y Lyu, Z Liu
2019 IEEE Intelligent Transportation Systems Conference (ITSC), 1158-1164, 2019
432019
Control flow integrity based on lightweight encryption architecture
P Qiu, Y Lyu, J Zhang, D Wang, G Qu
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2017
432017
An android-based emergency alarm and healthcare management system
Y Du, Y Chen, D Wang, J Liu, Y Lu
2011 IEEE International Symposium on IT in Medicine and Education 1, 375-379, 2011
362011
Video delivery networks: Challenges, solutions and future directions
Q Fan, H Yin, G Min, P Yang, Y Luo, Y Lyu, H Huang, L Jiao
Computers & Electrical Engineering 66, 332-341, 2018
352018
High-performance scheduling model for multisensor gateway of cloud sensor system-based smart-living
Y Lyu, F Yan, Y Chen, D Wang, Y Shi, N Agoulmine
Information Fusion 21, 42-56, 2015
352015
A parasitic extraction method of VLSI interconnects for pre-route timing analysis
W Gong, W Yu, Y Lü, Q Tang, Q Zhou, Y Cai
2010 International Conference on Communications, Circuits and Systems …, 2010
342010
Cloud storage security assessment through equilibrium analysis
Y Wu, Y Lyu, Y Shi
Tsinghua Science and Technology 24 (6), 738-749, 2019
332019
QGAN: Quantized generative adversarial networks
P Wang, D Wang, Y Ji, X Xie, H Song, XX Liu, Y Lyu, Y Xie
arXiv preprint arXiv:1901.08263, 2019
312019
FPGA IP protection by binding finite state machine to physical unclonable function
J Zhang, Y Lin, Y Lyu, G Qu, RCC Cheung, W Che, Q Zhou, J Bian
2013 23rd International Conference on Field programmable Logic and …, 2013
292013
Physical unclonable functions-based linear encryption against code reuse attacks
P Qiu, Y Lyu, J Zhang, X Wang, D Zhai, D Wang, G Qu
Proceedings of the 53rd Annual Design Automation Conference, 1-6, 2016
282016
The system can't perform the operation now. Try again later.
Articles 1–20