default search action
Wenjie Xiong 0001
Person information
- affiliation: Virginia Tech, Department of Electrical and Computer Engineering, Blacksburg, VA, USA
- affiliation: Meta AI
- affiliation (former): Yale University, Department of Electrical Engineering, New Haven, CT, USA
Other persons with the same name
- Wenjie Xiong 0002 — Beijing Institute of Technology, School of Computer Science and Technology, China
- Wenjie Xiong 0003 — Wuhan Business University, China (and 1 more)
- Wenjie Xiong 0004 — Qionglai Municipal Bureau of Planning and Natural Resources, China
- Wenjie Xiong 0005 — Chengdu University of Technology, College of Computer Science and Cyber Security, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Shuwen Deng, Wenjie Xiong, Jakub Szefer:
Designing Secure TLBs. IEEE Des. Test 41(2): 39-46 (2024) - [c26]Florian Frank, Martin Schmid, Felix Klement, Purushothaman Palani, Andreas Weber, Elif Bilge Kavun, Wenjie Xiong, Tolga Arul, Stefan Katzenbeisser:
Secure Data-Binding in FPGA-based Hardware Architectures utilizing PUFs. AsiaCCS 2024 - [c25]Maximilian Lam, Jeff Johnson, Wenjie Xiong, Kiwan Maeng, Udit Gupta, Yang Li, Liangzhen Lai, Ilias Leontiadis, Minsoo Rhu, Hsien-Hsin S. Lee, Vijay Janapa Reddi, Gu-Yeon Wei, David Brooks, G. Edward Suh:
GPU-based Private Information Retrieval for On-Device Machine Learning Inference. ASPLOS (1) 2024: 197-214 - [c24]Mohannad Ismail, Christopher Jelesnianski, Yeongjin Jang, Changwoo Min, Wenjie Xiong:
Enforcing C/C++ Type and Scope at Runtime for Control-Flow and Data-Flow Integrity. ASPLOS (3) 2024: 283-300 - [c23]Xin Wang, Jagadish Kotra, Alex Jones, Wenjie Xiong, Xun Jian:
Counter-light Memory Encryption. ISCA 2024: 724-738 - [c22]Yilun Wu, Byounguk Min, Mohannad Ismail, Wenjie Xiong, Changhee Jung, Dongyoon Lee:
IntOS: Persistent Embedded Operating System and Language Support for Multi-threaded Intermittent Computing. OSDI 2024: 425-443 - [c21]Trishita Tiwari, Suchin Gururangan, Chuan Guo, Weizhe Hua, Sanjay Kariyappa, Udit Gupta, Wenjie Xiong, Kiwan Maeng, Hsien-Hsin S. Lee, G. Edward Suh:
Information Flow Control in Machine Learning through Modular Model Architecture. USENIX Security Symposium 2024 - [i19]Ferhat Erata, Tinghung Chiu, Anthony Etim, Srilalith Nampally, Tejas Raju, Rajashree Ramu, Ruzica Piskac, Timos Antonopoulos, Wenjie Xiong, Jakub Szefer:
Systematic Use of Random Self-Reducibility against Physical Attacks. CoRR abs/2405.05193 (2024) - [i18]Jun Ji, Zichen Xi, Bernadeta R. Srijanto, Ivan I. Kravchenko, Ming Jin, Wenjie Xiong, Linbo Shao:
Frequency-domain Parallel Computing Using Single On-Chip Nonlinear Acoustic-wave Device. CoRR abs/2409.02689 (2024) - 2023
- [j11]Ferhat Erata, Shuwen Deng, Faisal Zaghloul, Wenjie Xiong, Onur Demir, Jakub Szefer:
Survey of Approaches and Techniques for Security Verification of Computer Systems. ACM J. Emerg. Technol. Comput. Syst. 19(1): 6:1-6:34 (2023) - [j10]Florian Frank, Wenjie Xiong, Nikolaos Athanasios Anagnostopoulos, André Schaller, Tolga Arul, Farinaz Koushanfar, Stefan Katzenbeisser, Ulrich Rührmair, Jakub Szefer:
Abusing Commodity DRAMs in IoT Devices to Remotely Spy on Temperature. IEEE Trans. Inf. Forensics Secur. 18: 2991-3005 (2023) - [c20]Tinghung Chiu, Wenjie Xiong:
SoK: Fault Injection Attacks on Cryptosystems. HASP@MICRO 2023: 64-72 - [c19]Mulong Luo, Wenjie Xiong, Geunbae Lee, Yueying Li, Xiaomeng Yang, Amy Zhang, Yuandong Tian, Hsien-Hsin S. Lee, G. Edward Suh:
AutoCAT: Reinforcement Learning for Automated Exploration of Cache-Timing Attacks. HPCA 2023: 317-332 - [c18]Wenxuan Zeng, Meng Li, Wenjie Xiong, Tong Tong, Wen-Jie Lu, Jin Tan, Runsheng Wang, Ru Huang:
MPCViT: Searching for Accurate and Efficient MPC-Friendly Vision Transformer with Heterogeneous Attention. ICCV 2023: 5029-5040 - [c17]Jiaxun Cui, Xiaomeng Yang, Mulong Luo, Geunbae Lee, Peter Stone, Hsien-Hsin S. Lee, Benjamin Lee, G. Edward Suh, Wenjie Xiong, Yuandong Tian:
MACTA: A Multi-agent Reinforcement Learning Approach for Cache Timing Attacks and Detection. ICLR 2023 - [c16]Sanjay Kariyappa, Chuan Guo, Kiwan Maeng, Wenjie Xiong, G. Edward Suh, Moinuddin K. Qureshi, Hsien-Hsin S. Lee:
Cocktail Party Attack: Breaking Aggregation-Based Privacy in Federated Learning Using Independent Component Analysis. ICML 2023: 15884-15899 - [i17]Maximilian Lam, Jeff Johnson, Wenjie Xiong, Kiwan Maeng, Udit Gupta, Yang Li, Liangzhen Lai, Ilias Leontiadis, Minsoo Rhu, Hsien-Hsin S. Lee, Vijay Janapa Reddi, Gu-Yeon Wei, David Brooks, G. Edward Suh:
GPU-based Private Information Retrieval for On-Device Machine Learning Inference. CoRR abs/2301.10904 (2023) - [i16]Trishita Tiwari, Suchin Gururangan, Chuan Guo, Weizhe Hua, Sanjay Kariyappa, Udit Gupta, Wenjie Xiong, Kiwan Maeng, Hsien-Hsin S. Lee, G. Edward Suh:
Information Flow Control in Machine Learning through Modular Model Architecture. CoRR abs/2306.03235 (2023) - 2022
- [j9]Wenjie Xiong, Jakub Szefer:
Survey of Transient Execution Attacks and Their Mitigations. ACM Comput. Surv. 54(3): 54:1-54:36 (2022) - [j8]Shuwen Deng, Nikolay Matyunin, Wenjie Xiong, Stefan Katzenbeisser, Jakub Szefer:
Evaluation of Cache Attacks on Arm Processors and Secure Caches. IEEE Trans. Computers 71(9): 2248-2262 (2022) - [c15]Wenjie Xiong, Liu Ke, Dimitrije Jankov, Michael Kounavis, Xiaochen Wang, Eric Northup, Jie Amy Yang, Bilge Acun, Carole-Jean Wu, Ping Tak Peter Tang, G. Edward Suh, Xuan Zhang, Hsien-Hsin S. Lee:
SecNDP: Secure Near-Data Processing with Untrusted Memory. HPCA 2022: 244-258 - [c14]Yongqin Wang, G. Edward Suh, Wenjie Xiong, Benjamin Lefaudeux, Brian Knott, Murali Annavaram, Hsien-Hsin S. Lee:
Characterization of MPC-based Private Inference for Transformer-based Models. ISPASS 2022: 187-197 - [c13]Yuan Liang, Xing Gao, Kun Sun, Wenjie Xiong, Haining Wang:
An Investigation on Data Center Cooling Systems Using FPGA-based Temperature Side Channels. SRDS 2022: 46-57 - [i15]Florian Frank, Wenjie Xiong, Nikolaos Athanasios Anagnostopoulos, André Schaller, Tolga Arul, Farinaz Koushanfar, Stefan Katzenbeisser, Ulrich Rührmair, Jakub Szefer:
Abusing Commodity DRAMs in IoT Devices to Remotely Spy on Temperature. CoRR abs/2208.02125 (2022) - [i14]Mulong Luo, Wenjie Xiong, Geunbae Lee, Yueying Li, Xiaomeng Yang, Amy Zhang, Yuandong Tian, Hsien-Hsin S. Lee, G. Edward Suh:
AutoCAT: Reinforcement Learning for Automated Exploration of Cache Timing-Channel Attacks. CoRR abs/2208.08025 (2022) - [i13]Sanjay Kariyappa, Chuan Guo, Kiwan Maeng, Wenjie Xiong, G. Edward Suh, Moinuddin K. Qureshi, Hsien-Hsin S. Lee:
Cocktail Party Attack: Breaking Aggregation-Based Privacy in Federated Learning using Independent Component Analysis. CoRR abs/2209.05578 (2022) - [i12]Wenxuan Zeng, Meng Li, Wenjie Xiong, Wenjie Lu, Jin Tan, Runsheng Wang, Ru Huang:
MPCViT: Searching for MPC-friendly Vision Transformer with Heterogeneous Attention. CoRR abs/2211.13955 (2022) - [i11]Hanieh Hashemi, Wenjie Xiong, Liu Ke, Kiwan Maeng, Murali Annavaram, G. Edward Suh, Hsien-Hsin S. Lee:
Data Leakage via Access Patterns of Sparse Features in Deep Learning-based Recommendation Systems. CoRR abs/2212.06264 (2022) - 2021
- [j7]Wenjie Xiong, André Schaller, Nikolaos Athanasios Anagnostopoulos, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser, Jakub Szefer:
DRAM PUFs in Commodity Devices. IEEE Des. Test 38(3): 76-83 (2021) - [j6]Shuwen Deng, Wenjie Xiong, Jakub Szefer:
Understanding the Insecurity of Processor Caches Due to Cache Timing-Based Vulnerabilities. IEEE Secur. Priv. 19(3): 42-49 (2021) - [j5]Wenjie Xiong, Stefan Katzenbeisser, Jakub Szefer:
Leaking Information Through Cache LRU States in Commercial Processors and Secure Caches. IEEE Trans. Computers 70(4): 511-523 (2021) - [c12]Shanquan Tian, Ilias Giechaskiel, Wenjie Xiong, Jakub Szefer:
Cloud FPGA Cartography using PCIe Contention. FCCM 2021: 224-232 - [i10]Shuwen Deng, Nikolay Matyunin, Wenjie Xiong, Stefan Katzenbeisser, Jakub Szefer:
Evaluation of Cache Attacks on Arm Processors and Secure Caches. CoRR abs/2106.14054 (2021) - [i9]Wenjie Xiong, Liu Ke, Dimitrije Jankov, Michael Kounavis, Xiaochen Wang, Eric Northup, Jie Amy Yang, Bilge Acun, Carole-Jean Wu, Ping Tak Peter Tang, G. Edward Suh, Xuan Zhang, Hsien-Hsin S. Lee:
SecNDP: Secure Near-Data Processing with Untrusted Memory. IACR Cryptol. ePrint Arch. 2021: 1642 (2021) - 2020
- [j4]Wenjie Xiong, André Schaller, Stefan Katzenbeisser, Jakub Szefer:
Software Protection Using Dynamic PUFs. IEEE Trans. Inf. Forensics Secur. 15: 2053-2068 (2020) - [c11]Shuwen Deng, Wenjie Xiong, Jakub Szefer:
A Benchmark Suite for Evaluating Caches' Vulnerability to Timing Attacks. ASPLOS 2020: 683-697 - [c10]Shanquan Tian, Wenjie Xiong, Ilias Giechaskiel, Kasper Rasmussen, Jakub Szefer:
Fingerprinting Cloud FPGA Infrastructures. FPGA 2020: 58-64 - [c9]Wenjie Xiong, Jakub Szefer:
Leaking Information Through Cache LRU States. HPCA 2020: 139-152 - [i8]Wenjie Xiong, Jakub Szefer:
Survey of Transient Execution Attacks. CoRR abs/2005.13435 (2020)
2010 – 2019
- 2019
- [j3]Shuwen Deng, Wenjie Xiong, Jakub Szefer:
Analysis of Secure Caches Using a Three-Step Model for Timing-Based Attacks. J. Hardw. Syst. Secur. 3(4): 397-425 (2019) - [j2]André Schaller, Wenjie Xiong, Nikolaos Athanasios Anagnostopoulos, Muhammad Umair Saleem, Sebastian Gabmeyer, Boris Skoric, Stefan Katzenbeisser, Jakub Szefer:
Decay-Based DRAM PUFs in Commodity Devices. IEEE Trans. Dependable Secur. Comput. 16(3): 462-475 (2019) - [c8]Wenjie Xiong, Nikolaos Athanasios Anagnostopoulos, André Schaller, Stefan Katzenbeisser, Jakub Szefer:
Spying on Temperature using DRAM. DATE 2019: 13-18 - [c7]Wenjie Xiong, André Schaller, Stefan Katzenbeisser, Jakub Szefer:
Dynamic Physically Unclonable Functions. ACM Great Lakes Symposium on VLSI 2019: 311-314 - [c6]Shuwen Deng, Doguhan Gümüsoglu, Wenjie Xiong, Sercan Sari, Y. Serhan Gener, Corine Lu, Onur Demir, Jakub Szefer:
SecChisel Framework for Security Verification of Secure Processor Architectures. HASP@ISCA 2019: 7:1-7:8 - [c5]Shuwen Deng, Wenjie Xiong, Jakub Szefer:
Secure TLBs. ISCA 2019: 346-359 - [c4]Shuai Chen, Wenjie Xiong, Yehan Xu, Bing Li, Jakub Szefer:
Thermal Covert Channels Leveraging Package-on-Package DRAM. TrustCom/BigDataSE 2019: 319-326 - [i7]André Schaller, Wenjie Xiong, Nikolaos Athanasios Anagnostopoulos, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser, Jakub Szefer:
Intrinsic Rowhammer PUFs: Leveraging the Rowhammer Effect for Improved Security. CoRR abs/1902.04444 (2019) - [i6]Wenjie Xiong, Jakub Szefer:
Leaking Information Through Cache LRU States. CoRR abs/1905.08348 (2019) - [i5]Shuwen Deng, Wenjie Xiong, Jakub Szefer:
A Benchmark Suite for Evaluating Caches' Vulnerability to Timing Attacks. CoRR abs/1911.08619 (2019) - [i4]Shuwen Deng, Wenjie Xiong, Jakub Szefer:
Analysis of Secure Caches and Timing-Based Side-Channel Attacks. IACR Cryptol. ePrint Arch. 2019: 167 (2019) - 2018
- [j1]Nikolaos Athanasios Anagnostopoulos, Tolga Arul, Yufan Fan, Christian Hatzfeld, André Schaller, Wenjie Xiong, Manishkumar Jain, Muhammad Umair Saleem, Jan Lotichius, Sebastian Gabmeyer, Jakub Szefer, Stefan Katzenbeisser:
Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security †. Cryptogr. 2(3): 13 (2018) - [c3]Shuwen Deng, Wenjie Xiong, Jakub Szefer:
Cache timing side-channel vulnerability checking with computation tree logic. HASP@ISCA 2018: 2:1-2:8 - 2017
- [c2]André Schaller, Wenjie Xiong, Nikolaos Athanasios Anagnostopoulos, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser, Jakub Szefer:
Intrinsic Rowhammer PUFs: Leveraging the Rowhammer effect for improved security. HOST 2017: 1-7 - [i3]Shuwen Deng, Doguhan Gümüsoglu, Wenjie Xiong, Y. Serhan Gener, Onur Demir, Jakub Szefer:
SecChisel: Language and Tool for Practical and Scalable Security Verification of Security-Aware Hardware Architectures. IACR Cryptol. ePrint Arch. 2017: 193 (2017) - 2016
- [c1]Wenjie Xiong, André Schaller, Nikolaos A. Anagnostopoulos, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser, Jakub Szefer:
Run-Time Accessible DRAM PUFs in Commodity Devices. CHES 2016: 432-453 - [i2]Wenjie Xiong, André Schaller, Nikolaos A. Anagnostopoulos, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser, Jakub Szefer:
Practical DRAM PUFs in Commodity Devices. IACR Cryptol. ePrint Arch. 2016: 253 (2016) - [i1]Onur Demir, Wenjie Xiong, Faisal Zaghloul, Jakub Szefer:
Survey of Approaches for Security Verification of Hardware/Software Systems. IACR Cryptol. ePrint Arch. 2016: 846 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-24 20:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint