Остановите войну!
for scientists:
default search action
Xiaolin Xu
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j47]Qige Song, Yafei Sang, Yongzheng Zhang, Shuhao Li, Xiaolin Xu:
SepBIN: Binary Feature Separation for Better Semantic Comparison and Authorship Verification. IEEE Trans. Inf. Forensics Secur. 19: 1372-1387 (2024) - [j46]Yiming Hei, Renyu Yang, Hao Peng, Lihong Wang, Xiaolin Xu, Jianwei Liu, Hong Liu, Jie Xu, Lichao Sun:
Hawk: Rapid Android Malware Detection Through Heterogeneous Graph Attention Networks. IEEE Trans. Neural Networks Learn. Syst. 35(4): 4703-4717 (2024) - [c91]Nuntipat Narkthong, Shijin Duan, Shaolei Ren, Xiaolin Xu:
MicroVSA: An Ultra-Lightweight Vector Symbolic Architecture-based Classifier Library for Always-On Inference on Tiny Microcontrollers. ASPLOS (2) 2024: 730-745 - [c90]Feifan Wang, Yuan Zong, Jie Zhu, Mengting Wei, Xiaolin Xu, Cheng Lu, Wenming Zheng:
Progressively Learning from Macro-Expressions for Micro-Expression Recognition. ICASSP 2024: 4390-4394 - [c89]Tong Zhou, Shaolei Ren, Xiaolin Xu:
ArchLock: Locking DNN Transferability at the Architecture Level with a Zero-Cost Binary Predictor. ICLR 2024 - [c88]Hanlin Chen, Xiaolin Xu, Jeffrey Sun, Qilin Chen, Yiheng Feng:
Observed the Unobservable: Lane Change Estimation with Following Vehicles' Trajectories only. MOST 2024: 114-125 - [i31]Yejia Liu, Shijin Duan, Xiaolin Xu, Shaolei Ren:
Scheduled Knowledge Acquisition on Lightweight Vector Symbolic Architectures for Brain-Computer Interfaces. CoRR abs/2403.13844 (2024) - [i30]Ziyu Liu, Tong Zhou, Yukui Luo, Xiaolin Xu:
TBNet: A Neural Architectural Defense Framework Facilitating DNN Model Protection in Trusted Execution Environments. CoRR abs/2405.03974 (2024) - [i29]Tong Zhou, Xuandong Zhao, Xiaolin Xu, Shaolei Ren:
Bileve: Securing Text Provenance in Large Language Models Against Spoofing with Bi-level Signature. CoRR abs/2406.01946 (2024) - [i28]Shijin Duan, Chenghong Wang, Hongwu Peng, Yukui Luo, Wujie Wen, Caiwen Ding, Xiaolin Xu:
SSNet: A Lightweight Multi-Party Computation Scheme for Practical Privacy-Preserving Machine Learning Service in the Cloud. CoRR abs/2406.02629 (2024) - [i27]Tong Zhou, Jiahui Zhao, Yukui Luo, Xi Xie, Wujie Wen, Caiwen Ding, Xiaolin Xu:
AdaPI: Facilitating DNN Model Adaptivity for Efficient Private Inference in Edge Computing. CoRR abs/2407.05633 (2024) - 2023
- [c87]Jingrun Ma, Xiaolin Xu, Tianning Zang, Xi Wang, Beibei Feng, Xiang Li:
A Semi-supervised Learning Method for Malware Traffic Classification with Raw Bitmaps. CollaborateCom (2) 2023: 341-356 - [c86]Cheng Gongye, Yukui Luo, Xiaolin Xu, Yunsi Fei:
HammerDodger: A Lightweight Defense Framework against RowHammer Attack on DNNs. DAC 2023: 1-6 - [c85]Hongwu Peng, Shanglin Zhou, Yukui Luo, Nuo Xu, Shijin Duan, Ran Ran, Jiahui Zhao, Chenghong Wang, Tong Geng, Wujie Wen, Xiaolin Xu, Caiwen Ding:
PASNet: Polynomial Architecture Search Framework for Two-party Computation-based Secure Neural Network Deployment. DAC 2023: 1-6 - [c84]Ziyu Liu, Yukui Luo, Shijin Duan, Tong Zhou, Xiaolin Xu:
MirrorNet: A TEE-Friendly Framework for Secure On-Device DNN Inference. ICCAD 2023: 1-9 - [c83]Ruyi Ding, Shijin Duan, Xiaolin Xu, Yunsi Fei:
VertexSerum: Poisoning Graph Neural Networks for Link Inference. ICCV 2023: 4509-4518 - [c82]Hongwu Peng, Shaoyi Huang, Tong Zhou, Yukui Luo, Chenghong Wang, Zigeng Wang, Jiahui Zhao, Xi Xie, Ang Li, Tony Geng, Kaleel Mahmood, Wujie Wen, Xiaolin Xu, Caiwen Ding:
AutoReP: Automatic ReLU Replacement for Fast Private Network Inference. ICCV 2023: 5155-5165 - [c81]Haolin Jiang, Wenming Zheng, Yuan Zong, Xiaolin Xu, Xingxun Jiang, Yunlong Xue:
Geometric Magnification-based Attention Graph Convolutional Network for Skeleton-based Micro-Gesture Recognition. ICIP 2023: 3404-3408 - [c80]Ran Ran, Xinwei Luo, Wei Wang, Tao Liu, Gang Quan, Xiaolin Xu, Caiwen Ding, Wujie Wen:
SpENCNN: Orchestrating Encoding and Sparsity for Fast Homomorphically Encrypted Neural Network Inference. ICML 2023: 28718-28728 - [c79]Tong Zhou, Yukui Luo, Shaolei Ren, Xiaolin Xu:
NNSplitter: An Active Defense Solution for DNN Model via Automated Weight Obfuscation. ICML 2023: 42614-42624 - [c78]Shuhe Liu, Xiaolin Xu, Zhefeng Nan:
Automated Behavior Identification of Home Security Camera Traffic. IJCNN 2023: 1-8 - [c77]Fangfang Yang, Shijin Duan, Xiaolin Xu, Shaolei Ren:
Achieving Certified Robustness for Brain-Inspired Low-Dimensional Computing Classifiers. INFOCOM Workshops 2023: 1-6 - [c76]Xiang Li, Beibei Feng, Tianning Zang, Xiaolin Xu, Shuyuan Zhao, Jingrun Ma:
Facing Unknown: Open-World Encrypted Traffic Classification Based on Contrastive Pre-Training. ISCC 2023: 1255-1260 - [c75]Yukui Luo, Nuo Xu, Hongwu Peng, Chenghong Wang, Shijin Duan, Kaleel Mahmood, Wujie Wen, Caiwen Ding, Xiaolin Xu:
AQ2PNN: Enabling Two-party Privacy-Preserving Deep Neural Network Inference with Adaptive Quantization. MICRO 2023: 628-640 - [c74]Hongwu Peng, Ran Ran, Yukui Luo, Jiahui Zhao, Shaoyi Huang, Kiran Thorat, Tong Geng, Chenghong Wang, Xiaolin Xu, Wujie Wen, Caiwen Ding:
LinGCN: Structural Linearized Graph Convolutional Network for Homomorphically Encrypted Inference. NeurIPS 2023 - [i26]Hongwu Peng, Shanglin Zhou, Yukui Luo, Nuo Xu, Shijin Duan, Ran Ran, Jiahui Zhao, Shaoyi Huang, Xi Xie, Chenghong Wang, Tong Geng, Wujie Wen, Xiaolin Xu, Caiwen Ding:
RRNet: Towards ReLU-Reduced Neural Network for Two-party Computation Based Private Inference. CoRR abs/2302.02292 (2023) - [i25]Yejia Liu, Shijin Duan, Xiaolin Xu, Shaolei Ren:
MetaLDC: Meta Learning of Low-Dimensional Computing Classifiers for Fast On-Device Adaption. CoRR abs/2302.12347 (2023) - [i24]Tong Zhou, Yukui Luo, Shaolei Ren, Xiaolin Xu:
NNSplitter: An Active Defense Solution to DNN Model via Automated Weight Obfuscation. CoRR abs/2305.00097 (2023) - [i23]Hongwu Peng, Shanglin Zhou, Yukui Luo, Nuo Xu, Shijin Duan, Ran Ran, Jiahui Zhao, Chenghong Wang, Tong Geng, Wujie Wen, Xiaolin Xu, Caiwen Ding:
PASNet: Polynomial Architecture Search Framework for Two-party Computation-based Secure Neural Network Deployment. CoRR abs/2306.15513 (2023) - [i22]Ruyi Ding, Shijin Duan, Xiaolin Xu, Yunsi Fei:
VertexSerum: Poisoning Graph Neural Networks for Link Inference. CoRR abs/2308.01469 (2023) - [i21]Hongwu Peng, Shaoyi Huang, Tong Zhou, Yukui Luo, Chenghong Wang, Zigeng Wang, Jiahui Zhao, Xi Xie, Ang Li, Tony Geng, Kaleel Mahmood, Wujie Wen, Xiaolin Xu, Caiwen Ding:
AutoReP: Automatic ReLU Replacement for Fast Private Network Inference. CoRR abs/2308.10134 (2023) - [i20]Hongwu Peng, Ran Ran, Yukui Luo, Jiahui Zhao, Shaoyi Huang, Kiran Thorat, Tong Geng, Chenghong Wang, Xiaolin Xu, Wujie Wen, Caiwen Ding:
LinGCN: Structural Linearized Graph Convolutional Network for Homomorphically Encrypted Inference. CoRR abs/2309.14331 (2023) - [i19]Ziyu Liu, Yukui Luo, Shijin Duan, Tong Zhou, Xiaolin Xu:
MirrorNet: A TEE-Friendly Framework for Secure On-device DNN Inference. CoRR abs/2311.09489 (2023) - 2022
- [j45]Xiaolin Xu, Yuan Zong, Cheng Lu, Xingxun Jiang:
Enhanced Sample Self-Revised Network for Cross-Dataset Facial Expression Recognition. Entropy 24(10): 1475 (2022) - [j44]Ming Hu, Xiaolin Xu, Weili Xue, Yi Yang:
Demand Pooling in Omnichannel Operations. Manag. Sci. 68(2): 883-894 (2022) - [j43]Min Xu, Min Ouyang, Liu Hong, Zijun Mao, Xiaolin Xu:
Resilience-driven repair sequencing decision under uncertainty for critical infrastructure systems. Reliab. Eng. Syst. Saf. 221: 108378 (2022) - [j42]Yupeng Hu, Linjun Wu, Zhuojun Chen, Yun Huang, Xiaolin Xu, Keqin Li, Jiliang Zhang:
STT-MRAM-Based Reliable Weak PUF. IEEE Trans. Computers 71(7): 1564-1574 (2022) - [j41]Linjun Wu, Yupeng Hu, Kehuan Zhang, Wenjia Li, Xiaolin Xu, Wanli Chang:
FLAM-PUF: A Response-Feedback-Based Lightweight Anti-Machine-Learning-Attack PUF. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(11): 4433-4444 (2022) - [j40]Wenhao Wang, Guangyu Hu, Xiaolin Xu, Jiliang Zhang:
CRAlert: Hardware-Assisted Code Reuse Attack Detection. IEEE Trans. Circuits Syst. II Express Briefs 69(3): 1607-1611 (2022) - [j39]Yukui Luo, Shijin Duan, Xiaolin Xu:
FPGAPRO: A Defense Framework Against Crosstalk-Induced Secret Leakage in FPGA. ACM Trans. Design Autom. Electr. Syst. 27(3): 24:1-24:31 (2022) - [c73]Jingrun Ma, Yafei Sang, Yongzheng Zhang, Xiaolin Xu, Beibei Feng, Yuwei Zeng:
An Adaptive Ensembled Neural Network-Based Approach to IoT Device Identification. CollaborateCom (2) 2022: 214-230 - [c72]Shijin Duan, Shaolei Ren, Xiaolin Xu:
HDLock: exploiting privileged encoding to protect hyperdimensional computing models against IP stealing. DAC 2022: 679-684 - [c71]Shijin Duan, Yejia Liu, Shaolei Ren, Xiaolin Xu:
LeHDC: learning-based hyperdimensional computing classifier. DAC 2022: 1111-1116 - [c70]Yukui Luo, Shijin Duan, Cheng Gongye, Yunsi Fei, Xiaolin Xu:
NNReArch: A Tensor Program Scheduling Framework Against Neural Network Architecture Reverse Engineering. FCCM 2022: 1-9 - [c69]Yukui Luo, Yuheng Zhang, Shijin Duan, Xiaolin Xu:
An Integrity Checking Framework for AXI Protocol in Multi-tenant FPGA. FPGA 2022: 155 - [c68]Yukui Luo, Yuheng Zhang, Shijin Duan, Xiaolin Xu:
A Cautionary Note on Building Multi-tenant Cloud-FPGA as a Secure Infrastructure. FPT 2022: 1-6 - [c67]Tong Zhou, Shaolei Ren, Xiaolin Xu:
ObfuNAS: A Neural Architecture Search-Based DNN Obfuscation Approach. ICCAD 2022: 81:1-81:9 - [c66]Shuhe Liu, Xiaolin Xu, Zhefeng Nan:
Device Behavior Identification in Encrypted Home Security Camera Traffic. ICTAI 2022: 881-885 - [c65]Shuhe Liu, Xiaolin Xu, Yongzheng Zhang, Yipeng Wang:
Autonomous Anti - interference Identification of $\text{IoT}$ Device Traffic based on Convolutional Neural Network. IJCNN 2022: 1-8 - [c64]Xiaolin Xu, Wenming Zheng, Yuan Zong, Cheng Lu, Xingxun Jiang:
Sample Self-Revised Network for Cross-Dataset Facial Expression Recognition. IJCNN 2022: 1-8 - [c63]Binglai Wang, Yafei Sang, Yongzheng Zhang, Shuhao Li, Xiaolin Xu:
A longitudinal Measurement and Analysis Study of Mozi, an Evolving P2P IoT Botnet. TrustCom 2022: 117-122 - [c62]Shuhe Liu, Xiaolin Xu, Zhefeng Nan:
CNN-Based Autonomous Traffic Detection on Unknown Home Security Cameras. TrustCom 2022: 843-850 - [i18]Shijin Duan, Xiaolin Xu, Shaolei Ren:
A Brain-Inspired Low-Dimensional Computing Classifier for Inference on Tiny Devices. CoRR abs/2203.04894 (2022) - [i17]Shijin Duan, Yejia Liu, Shaolei Ren, Xiaolin Xu:
LeHDC: Learning-Based Hyperdimensional Computing Classifier. CoRR abs/2203.09680 (2022) - [i16]Shijin Duan, Shaolei Ren, Xiaolin Xu:
HDLock: Exploiting Privileged Encoding to Protect Hyperdimensional Computing Models against IP Stealing. CoRR abs/2203.09681 (2022) - [i15]Yukui Luo, Shijin Duan, Cheng Gongye, Yunsi Fei, Xiaolin Xu:
NNReArch: A Tensor Program Scheduling Framework Against Neural Network Architecture Reverse Engineering. CoRR abs/2203.12046 (2022) - [i14]Tong Zhou, Shaolei Ren, Xiaolin Xu:
ObfuNAS: A Neural Architecture Search-based DNN Obfuscation Approach. CoRR abs/2208.08569 (2022) - [i13]Xiaolin Xu, Yuan Zong, Wenming Zheng, Yang Li, Chuangao Tang, Xingxun Jiang, Haolin Jiang:
SDFE-LV: A Large-Scale, Multi-Source, and Unconstrained Database for Spotting Dynamic Facial Expressions in Long Videos. CoRR abs/2209.08445 (2022) - 2021
- [j38]Chuang Liu, Min Ouyang, Naiyu Wang, Zijun Mao, Xiaolin Xu:
A heuristic method to identify optimum seismic retrofit strategies for critical infrastructure systems. Comput. Aided Civ. Infrastructure Eng. 36(8): 996-1012 (2021) - [c61]Yukui Luo, Cheng Gongye, Yunsi Fei, Xiaolin Xu:
DeepStrike: Remotely-Guided Fault Injection Attacks on DNN Accelerator in Cloud-FPGA. DAC 2021: 295-300 - [c60]Ke Xia, Yukui Luo, Xiaolin Xu, Sheng Wei:
SGX-FPGA: Trusted Execution Environment for CPU-FPGA Heterogeneous Architecture. DAC 2021: 301-306 - [c59]Wenhao Wang, Yukui Luo, Xiaolin Xu:
Constructive Use of Process Variations: Reconfigurable and High-Resolution Delay-Line. DATE 2021: 392-395 - [c58]Juncheng Guo, Yafei Sang, Peng Chang, Xiaolin Xu, Yongzheng Zhang:
MGEL: A Robust Malware Encrypted Traffic Detection Method Based on Ensemble Learning with Multi-grained Features. ICCS (2) 2021: 195-208 - [c57]Shijin Duan, Wenhao Wang, Yukui Luo, Xiaolin Xu:
A Survey of Recent Attacks and Mitigation on FPGA Systems. ISVLSI 2021: 284-289 - [c56]Xiaolin Xu, Jiali Feng:
Improvement on Attribute Weighting in Attribute Coordinate Comprehensive Evaluation Method. KMO 2021: 85-94 - [c55]Shijin Duan, Xiaolin Xu:
HDCOG: A Lightweight Hyperdimensional Computing Framework with Feature Extraction. NANOARCH 2021: 1-6 - [c54]Tong Zhou, Yuheng Zhang, Shijin Duan, Yukui Luo, Xiaolin Xu:
Deep Neural Network Security From a Hardware Perspective. NANOARCH 2021: 1-6 - [c53]Adnan Siraj Rakin, Yukui Luo, Xiaolin Xu, Deliang Fan:
Deep-Dup: An Adversarial Weight Duplication Attack Framework to Crush Deep Neural Network in Multi-Tenant FPGA. USENIX Security Symposium 2021: 1919-1936 - [i12]Yukui Luo, Cheng Gongye, Yunsi Fei, Xiaolin Xu:
DeepStrike: Remotely-Guided Fault Injection Attacks on DNN Accelerator in Cloud-FPGA. CoRR abs/2105.09453 (2021) - [i11]Yiming Hei, Renyu Yang, Hao Peng, Lihong Wang, Xiaolin Xu, Jianwei Liu, Hong Liu, Jie Xu, Lichao Sun:
HAWK: Rapid Android Malware Detection through Heterogeneous Graph Attention Networks. CoRR abs/2108.07548 (2021) - 2020
- [j37]Yidong Chen, Jinming Li, Kun Sheng, Tianbin Yang, Xiaolin Xu, Zhizhong Han, Zhuang Hu:
Many-Criteria Evaluation of Infrastructure Investment Priorities for Distribution Network Planning. IEEE Access 8: 221111-221118 (2020) - [j36]Yangyang Peng, Xiaolin Xu, Xue Liang, Weili Xue:
Mismatch risk allocation in a coproduct supply chain. Ann. Oper. Res. 291(1): 707-730 (2020) - [j35]Xiaolin Xu, Xiaoqiang Cai, Lianmin Zhang:
Optimal Purchasing Policy for Fresh Products from Multiple Supply Sources with Considerations of Random Delivery Times, Risk, and Information. Decis. Sci. 51(6): 1377-1410 (2020) - [j34]Lei Guan, Yongxue Mu, Xiaolin Xu, Lianmin Zhang, Jun Zhuang:
Keep it or give back? Optimal pricing strategy of reward-based crowdfunding with a hybrid mechanism in the sharing economy. Int. J. Prod. Res. 58(22): 6868-6889 (2020) - [j33]Xiaolin Xu, Yidong Li, Yi Jin:
Hierarchical discriminant feature learning for cross-modal face recognition. Multim. Tools Appl. 79(45-46): 33483-33502 (2020) - [j32]Shan Gai, Xiaolin Xu, Bangshu Xiong:
Paper currency defect detection algorithm using quaternion uniform strength. Neural Comput. Appl. 32(16): 12999-13016 (2020) - [j31]Yukui Luo, Wenhao Wang, Scott Best, Yanzhi Wang, Xiaolin Xu:
A High-Performance and Secure TRNG Based on Chaotic Cellular Automata Topology. IEEE Trans. Circuits Syst. 67-I(12): 4970-4983 (2020) - [j30]Bicky Shakya, Xiaolin Xu, Mark M. Tehranipoor, Domenic Forte:
CAS-Lock: A Security-Corruptibility Trade-off Resilient Logic Locking Scheme. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(1): 175-202 (2020) - [c52]Yukui Luo, Xiaolin Xu:
A Dynamic Frequency Scaling Framework Against Reliability and Security Issues in Multi-tenant FPGA. FCCM 2020: 210 - [c51]Yifan Gong, Zheng Zhan, Zhengang Li, Wei Niu, Xiaolong Ma, Wenhao Wang, Bin Ren, Caiwen Ding, Xue Lin, Xiaolin Xu, Yanzhi Wang:
A Privacy-Preserving-Oriented DNN Pruning and Mobile Acceleration Framework. ACM Great Lakes Symposium on VLSI 2020: 119-124 - [c50]Yukui Luo, Xiaolin Xu:
A Quantitative Defense Framework against Power Attacks on Multi-tenant FPGA. ICCAD 2020: 64:1-64:9 - [c49]Yukui Luo, Cheng Gongye, Shaolei Ren, Yunsi Fei, Xiaolin Xu:
Stealthy-Shutdown: Practical Remote Power Attacks in Multi - Tenant FPGAs. ICCD 2020: 545-552 - [c48]Xiaolin Xu, Jiliang Zhang:
Rethinking FPGA Security in the New Era of Artificial Intelligence. ISQED 2020: 46-51 - [i10]Zheng Zhan, Yifan Gong, Zhengang Li, Pu Zhao, Xiaolong Ma, Wei Niu, Xiaolin Xu, Bin Ren, Yanzhi Wang, Xue Lin:
A Privacy-Preserving DNN Pruning and Mobile Acceleration Framework. CoRR abs/2003.06513 (2020) - [i9]Adnan Siraj Rakin, Yukui Luo, Xiaolin Xu, Deliang Fan:
Deep-Dup: An Adversarial Weight Duplication Attack Framework to Crush Deep Neural Network in Multi-Tenant FPGA. CoRR abs/2011.03006 (2020) - [i8]Bicky Shakya, Xiaolin Xu, Mark M. Tehranipoor, Domenic Forte:
Defeating CAS-Unlock. IACR Cryptol. ePrint Arch. 2020: 324 (2020)
2010 – 2019
- 2019
- [j29]Min Xu, Min Ouyang, Zijun Mao, Xiaolin Xu:
Improving repair sequence scheduling methods for postdisaster critical infrastructure systems. Comput. Aided Civ. Infrastructure Eng. 34(6): 506-522 (2019) - [j28]Yanan Miao, Xiaoming Tao, Xiaolin Xu, Jianhua Lu:
Joint 3-D Shape Estimation and Landmark Localization From Monocular Cameras of Intelligent Vehicles. IEEE Internet Things J. 6(1): 15-25 (2019) - [j27]Xiaolin Xu, Fahim Rahman, Bicky Shakya, Apostol Vassilev, Domenic Forte, Mark M. Tehranipoor:
Electronics Supply Chain Integrity Enabled by Blockchain. ACM Trans. Design Autom. Electr. Syst. 24(3): 31:1-31:25 (2019) - [c47]Dingkui Yan, Huilin Zhang, Yipeng Wang, Tianning Zang, Xiaolin Xu, Yuwei Zeng:
Pontus: A Linguistics-Based DGA Detection System. GLOBECOM 2019: 1-6 - [c46]Scott Best, Xiaolin Xu:
An All-Digital True Random Number Generator Based on Chaotic Cellular Automata Topology. ICCAD 2019: 1-8 - [c45]Yukui Luo, Xiaolin Xu:
HILL: A Hardware Isolation Framework Against Information Leakage on Multi-Tenant FPGA Long-Wires. FPT 2019: 331-334 - [c44]Shuo Li, Xiaolin Xu, Wayne P. Burleson:
PVTMC: An All-Digital Sub-Picosecond Timing Measurement Circuit Based on Process Variations. ISVLSI 2019: 574-579 - [c43]Xiaolin Xu, Yan Liu, Jiali Feng:
Improvement on Subjective Weighing Method in Attribute Coordinate Comprehensive Evaluation Model. KMO 2019: 178-186 - [i7]Zimu Guo, Xiaolin Xu, Mark M. Tehranipoor, Domenic Forte:
EOP: An Encryption-Obfuscation Solution for Protecting PCBs Against Tampering and Reverse Engineering. CoRR abs/1904.09516 (2019) - 2018
- [j26]Sarah Amir, Bicky Shakya, Xiaolin Xu, Yier Jin, Swarup Bhunia, Mark M. Tehranipoor, Domenic Forte:
Development and Evaluation of Hardware Obfuscation Benchmarks. J. Hardw. Syst. Secur. 2(2): 142-161 (2018) - [j25]Shahrzad Keshavarz, Cunxi Yu, Samaneh Ghandali, Xiaolin Xu, Daniel E. Holcomb:
Survey on Applications of Formal Methods in Reverse Engineering and Intellectual Property Protection. J. Hardw. Syst. Secur. 2(3): 214-224 (2018) - [j24]Zimu Guo, Xiaolin Xu, Md. Tauhidur Rahman, Mark M. Tehranipoor, Domenic Forte:
SCARe: An SRAM-Based Countermeasure Against IC Recycling. IEEE Trans. Very Large Scale Integr. Syst. 26(4): 744-755 (2018) - [j23]Xiaolin Xu, Shahrzad Keshavarz, Domenic Forte, Mark M. Tehranipoor, Daniel E. Holcomb:
Bimodal Oscillation as a Mechanism for Autonomous Majority Voting in PUFs. IEEE Trans. Very Large Scale Integr. Syst. 26(11): 2431-2442 (2018) - [c42]Jian Wang, Xiaolin Xu, Xiaoming Hu, Wei Wayne Li:
On Forwarding Protocols in Linear Topology Wake-up Wireless Sensor Networks. CSoNet 2018: 380-391 - [c41]Jungmin Park, Xiaolin Xu, Yier Jin, Domenic Forte, Mark M. Tehranipoor:
Power-based side-channel instruction-level disassembler. DAC 2018: 119:1-119:6 - [c40]Xiaolin Xu, Yan Liu, Jiali Feng:
Attribute Coordinate Comprehensive Evaluation Model Combining Principal Component Analysis. IFIP TC12 ICIS 2018: 60-69 - [c39]Jianhua Zhang, Xiaolin Xu, Xuan Liu, Minglu Zhang:
Relative Dynamic Modeling of Dual-Arm Coordination Robot. ROBIO 2018: 2045-2050 - [c38]Xiaolin Xu, Yidong Li, Yi Jin, Congyan Lang, Songhe Feng, Tao Wang:
Hierarchical Discriminant Feature Learning for Heterogeneous Face Recognition. VCIP 2018: 1-4 - [i6]Yansong Gao, Chenglu Jin, Jeeson Kim, Hussein Nili, Xiaolin Xu, Wayne P. Burleson, Omid Kavehei, Marten van Dijk, Damith Chinthana Ranasinghe, Ulrich Rührmair:
Efficient Erasable PUFs from Programmable Logic and Memristors. IACR Cryptol. ePrint Arch. 2018: 358 (2018) - 2017
- [b1]Germano Resconi, Xiaolin Xu, Guanglin Xu:
Introduction to Morphogenetic Computing. Studies in Computational Intelligence 703, Springer 2017, ISBN 978-3-319-57614-5, pp. 1-169 - [j22]Xiaolin Xu, Yu Zhang, Jihua Lu:
Routing Optimization of Small Satellite Networks based on Multi-commodity Flow. EAI Endorsed Trans. Ambient Syst. 4(15): e2 (2017) - [j21]Weili Xue, Jiaojiao Zuo, Xiaolin Xu:
Analysis of market competition and information asymmetry on selling strategies. Ann. Oper. Res. 257(1-2): 395-421 (2017) - [j20]Xiaoming Hu, Jian Wang, Huajie Xu, Yinchun Yang, Xiaolin Xu:
An improved efficient identity-based proxy signature in the standard model. Int. J. Comput. Math. 94(1): 22-38 (2017) - [j19]Guanglin Xu, Xiaolin Xu:
Study on comprehensive evaluation model of attribute coordinate based on evaluation sample selection by K-means. J. Comput. Methods Sci. Eng. 17(3): 463-472 (2017) - [j18]Song Wu, Yihong Wang, Wei Luo, Sheng Di, Haibao Chen, Xiaolin Xu, Ran Zheng, Hai Jin:
ACStor: Optimizing Access Performance of Virtual Disk Images in Clouds. IEEE Trans. Parallel Distributed Syst. 28(9): 2414-2427 (2017) - [j17]Hao-Ting Shen, Fahim Rahman, Bicky Shakya, Xiaolin Xu, Mark M. Tehranipoor, Domenic Forte:
Poly-Si-Based Physical Unclonable Functions. IEEE Trans. Very Large Scale Integr. Syst. 25(11): 3207-3217 (2017) - [j16]Fahim Rahman, Bicky Shakya, Xiaolin Xu, Domenic Forte, Mark M. Tehranipoor:
Security Beyond CMOS: Fundamentals, Applications, and Roadmap. IEEE Trans. Very Large Scale Integr. Syst. 25(12): 3420-3433 (2017) - [c37]Zimu Guo, Xiaolin Xu, Mark M. Tehranipoor, Domenic Forte:
MPA: Model-assisted PCB attestation via board-level RO and temperature compensation. AsianHOST 2017: 25-30 - [c36]Xiaolin Xu, Bicky Shakya, Mark M. Tehranipoor, Domenic Forte:
Novel Bypass Attack and BDD-based Tradeoff Analysis Against All Known Logic Locking Attacks. CHES 2017: 189-210 - [c35]Zimu Guo, Xiaolin Xu, Mark M. Tehranipoor, Domenic Forte:
FFD: A Framework for Fake Flash Detection. DAC 2017: 8:1-8:6 - [c34]Xiaolin Xu, Lin Zhang:
A study of pushing service framework of the personalized learning resources on network learning platform. ICACI 2017: 106-210 - [c33]Xiaolin Xu, Guanglin Xu, Jiali Feng:
Study on Updating Algorithm of Attribute Coordinate Evaluation Model. ICIC (3) 2017: 653-662 - [c32]Jian Wang, Xiumei Wu, Xiaolin Xu, Xiaoming Hu:
Minimum cost deployment of wireless sensors with wake-up radios. ICNSC 2017: 425-428 - [c31]Xueyan Duan, Xiaolin Xu, Jiali Feng:
Research of the Evaluation Index System of Green Port Based on Analysis Approach of Attribute Coordinate. IFIP TC12 ICIS 2017: 372-378 - [c30]Shuo Li, Xiaolin Xu, Wayne P. Burleson:
CCATDC: A Configurable Compact Algorithmic Time-to-Digital Converter. ISVLSI 2017: 501-506 - [c29]Xiaolin Xu, Yu Zhang, Jihua Lu:
Routing Optimization of Small Satellite Networks Based on Multi-commodity Flow. MLICOM (1) 2017: 355-363 - [c28]Boyi Zhang, Xiaolin Xu, Hongwei Xing, Yidong Li:
A Deep Learning Based Framework for Power Demand Forecasting with Deep Belief Networks. PDCAT 2017: 191-195 - [c27]Sreeja Chowdhury, Xiaolin Xu, Mark M. Tehranipoor, Domenic Forte:
Aging resilient RO PUF with increased reliability in FPGA. ReConFig 2017: 1-7 - [i5]Xiaolin Xu, Bicky Shakya, Mark M. Tehranipoor, Domenic Forte:
Novel Bypass Attack and BDD-based Tradeoff Analysis Against all Known Logic Locking Attacks. IACR Cryptol. ePrint Arch. 2017: 621 (2017) - 2016
- [j15]Qiang Chen, Xiaolin Xu, Bolin Cao, Wei Zhang:
Social media policies as responses for social media affordances: The case of China. Gov. Inf. Q. 33(2): 313-324 (2016) - [j14]Cecile Badenhorst, Xiaolin Xu:
Academic Publishing: Making the Implicit Explicit. Publ. 4(3): 24 (2016) - [j13]Wei Zhang, Xiaolin Xu, Chenghan Ming, Zijun Mao, Jing Shi, Yaqian Xiang:
Surviving in the dispute: A bibliometric analysis of global GMF-related research, 1995-2014. Scientometrics 109(1): 359-375 (2016) - [j12]Xiaolin Xu, Germano Resconi, Guanglin Xu:
Dynamic Database by Inconsistency and Morphogenetic Computing. Trans. Comput. Collect. Intell. 22: 189-204 (2016) - [c26]Aibin Yan, Zhengfeng Huang, Xiangsheng Fang, Xiaolin Xu, Huaguo Liang:
Novel Low Cost and Double Node Upset Tolerant Latch Design for Nanoscale CMOS Technology. ATS 2016: 252-256 - [c25]Xiaolin Xu, Daniel E. Holcomb:
Reliable PUF design using failure patterns from time-controlled power gating. DFT 2016: 135-140 - [c24]Xiaolin Xu, Daniel E. Holcomb:
A Clockless Sequential PUF with Autonomous Majority Voting. ACM Great Lakes Symposium on VLSI 2016: 27-32 - [c23]Jian Wang, Xiumei Wu, Xiaoming Hu, Xiaolin Xu:
Event source identification and strength estimation in wireless sensor networks. ICNSC 2016: 1-5 - [c22]Xiaolin Xu, Wayne P. Burleson, Daniel E. Holcomb:
Using Statistical Models to Improve the Reliability of Delay-Based PUFs. ISVLSI 2016: 547-552 - [c21]Shugeng Ding, Yidong Li, Xiaolin Xu, Hongwei Xing, Zhen Wang, Liang Chen, Gang Wang, Yu Meng:
A Learning-Based System for Monitoring Electrical Load in Smart Grid. PDCAT 2016: 346-351 - 2015
- [j11]Lei Xu, Yongjian Li, Kannan Govindan, Xiaolin Xu:
Consumer returns policies with endogenous deadline and supply chain coordination. Eur. J. Oper. Res. 242(1): 88-99 (2015) - [j10]Xiaolin Xu, Hai Jin, Song Wu, Yihong Wang:
Rethink the storage of virtual machine images in clouds. Future Gener. Comput. Syst. 50: 75-86 (2015) - [j9]Zhe Song, Ziyuan Zhang, Xiaolin Xu, Chunlin Liu:
An agent-based model to study the market dynamics of perpetual and subscription licensing. J. Oper. Res. Soc. 66(5): 845-857 (2015) - [j8]Xiaolin Xu, Song Wu, Hai Jin, Chuxiong Yan:
Fairly Sharing the Network for Multitier Applications in Clouds. Int. J. Web Serv. Res. 12(4): 29-47 (2015) - [j7]Jian Wang, Xiaoming Hu, Xiaolin Xu, Yinchun Yang:
A verifiable hierarchical circular shift cipher scheme for P2P chunk exchanges. Peer-to-Peer Netw. Appl. 8(1): 103-110 (2015) - [j6]Xiaolin Xu, Amir Rahmati, Daniel E. Holcomb, Kevin Fu, Wayne P. Burleson:
Reliable Physical Unclonable Functions Using Data Retention Voltage of SRAM Cells. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 34(6): 903-914 (2015) - [c20]Gaochao Li, Xiaolin Xu, Qingshan Li:
LADP: A lightweight authentication and delegation protocol for RFID tags. ICUFN 2015: 860-865 - [c19]Xiaolin Xu, Ulrich Rührmair, Daniel E. Holcomb, Wayne P. Burleson:
Security Evaluation and Enhancement of Bistable Ring PUFs. RFIDSec 2015: 3-16 - [c18]Ulrich Rührmair, J. L. Martinez-Hurtado, Xiaolin Xu, Christian Kraeh, Christian Hilgers, Dima Kononchuk, Jonathan J. Finley, Wayne P. Burleson:
Virtual Proofs of Reality and their Physical Implementation. IEEE Symposium on Security and Privacy 2015: 70-85 - [i4]Xiaolin Xu, Ulrich Rührmair, Daniel E. Holcomb, Wayne P. Burleson:
Security Evaluation and Enhancement of Bistable Ring PUFs. IACR Cryptol. ePrint Arch. 2015: 443 (2015) - [i3]Chenglu Jin, Xiaolin Xu, Wayne P. Burleson, Ulrich Rührmair, Marten van Dijk:
PLayPUF: Programmable Logically Erasable PUFs for Forward and Backward Secure Key Management. IACR Cryptol. ePrint Arch. 2015: 1052 (2015) - 2014
- [j5]Hui Zhang, Xiaolin Xu, Jianying Xiao:
Diffusion of e-government: A literature review and directions for future directions. Gov. Inf. Q. 31(4): 631-636 (2014) - [c17]Ulrich Rührmair, Xiaolin Xu, Jan Sölter, Ahmed Mahmoud, Mehrdad Majzoobi, Farinaz Koushanfar, Wayne P. Burleson:
Efficient Power and Timing Side Channels for Physical Unclonable Functions. CHES 2014: 476-492 - [c16]Jian Wang, Xiaolin Xu, Xiumei Wu, Xiaoming Hu, Yinchun Yang:
Characterizing Patterns of Chinese Yiban Blogging Service. CyberC 2014: 183-186 - [c15]Xiaolin Xu, Wayne P. Burleson:
Hybrid side-channel/machine-learning attacks on PUFs: A new threat? DATE 2014: 1-6 - [c14]Xiaolin Xu, Jiali Feng:
A Quantification Method of Qualitative Indices Based on Inverse Conversion Degree Functions. ES 2014: 261-264 - [c13]Jian Wang, Xiumei Wu, Xiaolin Xu, Yinchun Yang, Xiaoming Hu:
Programming wireless recharging for target-oriented rechargeable sensor networks. ICNSC 2014: 367-371 - [c12]Xiaolin Xu, Vikram B. Suresh, Raghavan Kumar, Wayne P. Burleson:
Post-Silicon Validation and Calibration of Hardware Security Primitives. ISVLSI 2014: 29-34 - [c11]Junxue Liang, Xiaolin Xu, Zhaowen Lin, Yan Ma, Hongjuan Pei, Xiaohong Huang, Jian Li, Hong-Xia Niu:
SDViNet: A software defined virtual network management platform in IaaS cloud. LANMAN 2014: 1-6 - [c10]Qing-Shan Li, Xiaolin Xu, Zhong Chen:
PUF-Based RFID Ownership Transfer Protocol in an Open Environment. PDCAT 2014: 131-137 - [c9]Xiaolin Xu, Yonglin Zhou, Qingshan Li:
Domain Algorithmically Generated Botnet Detection and Analysis. SecureComm (1) 2014: 530-534 - 2013
- [j4]Xiaoming Hu, Huajie Xu, Jian Wang, Yinchun Yang, Xiaolin Xu:
Short Hierarchical Identity-based Encryption in the Selective-ID Model. J. Softw. 8(7): 1613-1619 (2013) - [j3]Ulrich Rührmair, Jan Sölter, Frank Sehnke, Xiaolin Xu, Ahmed Mahmoud, Vera Stoyanova, Gideon Dror, Jürgen Schmidhuber, Wayne P. Burleson, Srinivas Devadas:
PUF Modeling Attacks on Simulated and Silicon Data. IEEE Trans. Inf. Forensics Secur. 8(11): 1876-1891 (2013) - [c8]Jian Wang, Xiaolin Xu, Xiaoming Hu, Yinchun Yang, Xiumei Wu:
Measurement and analysis of Shanghai Xinmin microblog website. GrC 2013: 338-341 - [i2]Ulrich Rührmair, Jan Sölter, Frank Sehnke, Xiaolin Xu, Ahmed Mahmoud, Vera Stoyanova, Gideon Dror, Jürgen Schmidhuber, Wayne P. Burleson, Srinivas Devadas:
PUF Modeling Attacks on Simulated and Silicon Data. IACR Cryptol. ePrint Arch. 2013: 112 (2013) - [i1]Ulrich Rührmair, Xiaolin Xu, Jan Sölter, Ahmed Mahmoud, Farinaz Koushanfar, Wayne P. Burleson:
Power and Timing Side Channels for PUFs and their Efficient Exploitation. IACR Cryptol. ePrint Arch. 2013: 851 (2013) - 2012
- [c7]Xiaolin Xu, Guanglin Xu:
A recommendation ranking model based on credit. GrC 2012: 569-572 - 2011
- [j2]Feng Zhao, Qianqiao Hu, Xiaolin Xu, Runxi Zeng, Yi Lin:
Orientation Mining-Driven Approach to Analyze Web Public Sentiment. J. Softw. 6(8): 1417-1428 (2011) - [c6]Guanglin Xu, Xiaolin Xu, Jiali Feng:
A Ranking Model Based on Credit for Social News Website. WISM (3) 2011: 385-390 - 2010
- [j1]Minghui Xu, Youhua (Frank) Chen, Xiaolin Xu:
The effect of demand uncertainty in a price-setting newsvendor model. Eur. J. Oper. Res. 207(2): 946-957 (2010) - [c5]Xiaolin Xu, Jiali Feng:
Research and Implementation of Image Encryption Algorithm Based on Zigzag Transformation and Inner Product Polarization Vector. GrC 2010: 556-561
2000 – 2009
- 2009
- [c4]Xiaolin Xu, Guanglin Xu, Jiali Feng:
A kind of synthetic evaluation method based on the attribute computing network. GrC 2009: 644-647 - [c3]Yi Zhang, Siwen Yuan, Xiaolin Xu:
An Improved Model of Administrative Decision-making Support System Based on MAS. JCAI 2009: 27-31 - 2007
- [c2]Xiaolin Xu, Xiaoqiang Cai, Chunlin Liu, Chikit To:
Optimal Commodity Distribution for a Vehicle with Fixed Capacity Under Vendor Managed Inventory. ESCAPE 2007: 329-339 - 2004
- [c1]Xiaoqiang Cai, Xiaolin Xu, Xian Zhou:
Optimal production decisions under an uncertain deadline. SMC (7) 2004: 6009-6014
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-17 23:41 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint