What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Yier Jin
Google Scholar
ORCID:
0000-0002-8791-0597
40
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
CHLOE: Loop Transformation over Fully Homomorphic Encryption via Multi-Level Vectorization and Control-Path Reduction.
Song Bian
Zian Zhao
Ruiyu Shen
Zhou Zhang
Ran Mao
Dawei Li
Yizhong Liu
Masaki Waga
Kohei Suenaga
Zhenyu Guan
Jiafeng Hua
Yier Jin
Jianwei Liu
2025
conf/uss
Engorgio: An Arbitrary-Precision Unbounded-Size Hybrid Encrypted Database via Quantized Fully Homomorphic Encryption.
Song Bian
Haowen Pan
Jiaqi Hu
Zhou Zhang
Yunhao Fu
Jiafeng Hua
Yunyi Chen
Bo Zhang
Yier Jin
Jin Dong
Zhenyu Guan
2024
journals/tifs
EMSim+: Accelerating Electromagnetic Security Evaluation With Generative Adversarial Network and Transfer Learning.
Ya Gao
Haocheng Ma
Qizhi Zhang
Xintong Song
Yier Jin
Jiaji He
Yiqiang Zhao
2024
conf/ccs
Poster: Enhance Hardware Domain Specific Large Language Model with Reinforcement Learning for Resilience.
Weimin Fu
Yifang Zhao
Yier Jin
Xiaolong Guo
2024
conf/ccs
ArcEDB: An Arbitrary-Precision Encrypted Database via (Amortized) Modular Homomorphic Encryption.
Zhou Zhang
Song Bian
Zian Zhao
Ran Mao
Haoyi Zhou
Jiafeng Hua
Yier Jin
Zhenyu Guan
2024
conf/uss
VoltSchemer: Use Voltage Noise to Manipulate Your Wireless Charger.
Zihao Zhan
Yirui Yang
Haoqi Shan
Hanqiu Wang
Yier Jin
Shuo Wang
2024
conf/host
LightEMU: Hardware Assisted Fuzzing of Trusted Applications.
Haoqi Shan
Sravani Nissankararao
Yujia Liu
Moyao Huang
Shuo Wang
Yier Jin
Dean Sullivan
2024
conf/ndss
HEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation.
Song Bian
Zian Zhao
Zhou Zhang
Ran Mao
Kohei Suenaga
Yier Jin
Zhenyu Guan
Jianwei Liu
2023
journals/tifs
EMSim: A Fast Layout Level Electromagnetic Emanation Simulation Framework for High Accuracy Pre-Silicon Verification.
Haocheng Ma
Max Panoff
Jiaji He
Yiqiang Zhao
Yier Jin
2023
journals/tifs
PDNPulse: Sensing PCB Anomaly With the Intrinsic Power Delivery Network.
Huifeng Zhu
Haoqi Shan
Dean Sullivan
Xiaolong Guo
Yier Jin
Xuan Zhang
2023
conf/ccs
HE3DB: An Efficient and Elastic Encrypted Database Via Arithmetic-And-Logic Fully Homomorphic Encryption.
Song Bian
Zhou Zhang
Haowen Pan
Ran Mao
Zian Zhao
Yier Jin
Zhenyu Guan
2023
conf/host
Dual-Leak: Deep Unsupervised Active Learning for Cross-Device Profiled Side-Channel Leakage Analysis.
Honggang Yu
Shuo Wang
Haoqi Shan
Maximillian Panoff
Michael Lee
Kaichen Yang
Yier Jin
2022
journals/tifs
FineDIFT: Fine-Grained Dynamic Information Flow Tracking for Data-Flow Integrity Using Coprocessor.
Kejun Chen
Orlando Arias
Qingxu Deng
Daniela Oliveira
Xiaolong Guo
Yier Jin
2022
conf/sp
Invisible Finger: Practical Electromagnetic Interference Attack on Touchscreen-based Electronic Devices.
Haoqi Shan
Boyi Zhang
Zihao Zhan
Dean Sullivan
Shuo Wang
Yier Jin
2021
journals/tifs
In Praise of Exact-Functional-Secrecy in Circuit Locking.
Kaveh Shamsi
Yier Jin
2021
conf/host
TRRScope: Understanding Target Row Refresh Mechanism for Modern DDR Protection.
Yichen Jiang
Huifeng Zhu
Haoqi Shan
Xiaolong Guo
Xuan Zhang
Yier Jin
2021
conf/asiaccs
Robust Roadside Physical Adversarial Attack Against Deep Learning in Lidar Perception Modules.
Kaichen Yang
Tzungyu Tsai
Honggang Yu
Max Panoff
Tsung-Yi Ho
Yier Jin
2020
conf/uss
Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks.
Yue Zhang
Jian Weng
Rajib Dey
Yier Jin
Zhiqiang Lin
Xinwen Fu
2020
conf/host
ReGDS: A Reverse Engineering Framework from GDSII to Gate-level Netlist.
Rachel Selina Rajarathnam
Yibo Lin
Yier Jin
David Z. Pan
2020
conf/host
LAHEL: Lightweight Attestation Hardening Embedded Devices using Macrocells.
Orlando Arias
Dean Sullivan
Haoqi Shan
Yier Jin
2020
conf/host
DeepEM: Deep Neural Networks Model Recovery through EM Side-Channel Information Leakage.
Honggang Yu
Haocheng Ma
Kaichen Yang
Yiqiang Zhao
Yier Jin
2020
conf/ndss
CloudLeak: Large-Scale Deep Learning Models Stealing Through Adversarial Examples.
Honggang Yu
Kaichen Yang
Teng Zhang
Yun-Yun Tsai
Tsung-Yi Ho
Yier Jin
2019
journals/tifs
On the Approximation Resiliency of Logic Locking and IC Camouflaging Schemes.
Kaveh Shamsi
Travis Meade
Meng Li
David Z. Pan
Yier Jin
2019
conf/host
On the Impossibility of Approximation-Resilient Circuit Locking.
Kaveh Shamsi
David Z. Pan
Yier Jin
2019
conf/host
QIF-Verilog: Quantitative Information-Flow based Hardware Description Languages for Pre-Silicon Security Assessment.
Xiaolong Guo
Raj Gautam Dutta
Jiaji He
Mark M. Tehranipoor
Yier Jin
2018
conf/host
R2D2: Runtime reassurance and detection of A2 Trojan.
Yumin Hou
Hu He
Kaveh Shamsi
Yier Jin
Dong Wu
Huaqiang Wu
2018
conf/host
SIN<sup>2</sup>: Stealth infection on neural network - A low-cost agile neural Trojan attack methodology.
Tao Liu
Wujie Wen
Yier Jin
2018
conf/ndss
Microarchitectural Minefields: 4K-Aliasing Covert Channel and Multi-Tenant Detection in Iaas Clouds.
Dean Sullivan
Orlando Arias
Travis Meade
Yier Jin
2017
journals/tifs
Data Secrecy Protection Through Information Flow Tracking in Proof-Carrying Hardware IP - Part II: Framework Automation.
Mohammad-Mahdi Bidmeshki
Xiaolong Guo
Raj Gautam Dutta
Yier Jin
Yiorgos Makris
2017
journals/tifs
Data Secrecy Protection Through Information Flow Tracking in Proof-Carrying Hardware IP - Part I: Framework Fundamentals.
Yier Jin
Xiaolong Guo
Raj Gautam Dutta
Mohammad-Mahdi Bidmeshki
Yiorgos Makris
2017
journals/tifs
Eliminating the Hardware-Software Boundary: A Proof-Carrying Approach for Trust Evaluation on Computer Systems.
Xiaolong Guo
Raj Gautam Dutta
Yier Jin
2017
conf/host
AppSAT: Approximately deobfuscating integrated circuits.
Kaveh Shamsi
Meng Li
Travis Meade
Zheng Zhao
David Z. Pan
Yier Jin
2016
conf/host
How secure is split manufacturing in preventing hardware trojan?
Zhang Chen
Pingqiang Zhou
Tsung-Yi Ho
Yier Jin
2016
conf/host
Scalable SoC trust verification using integrated theorem proving and model checking.
Xiaolong Guo
Raj Gautam Dutta
Prabhat Mishra
Yier Jin
2014
conf/ccs
Embedded System Security in Smart Consumer Electronics.
Yier Jin
2013
conf/host
Cycle-accurate information assurance by proof-carrying based signal sensitivity tracing.
Yier Jin
Bo Yang
Yiorgos Makris
2012
journals/tifs
Proof-Carrying Hardware Intellectual Property: A Pathway to Trusted Module Acquisition.
Eric Love
Yier Jin
Yiorgos Makris
2011
conf/host
Enhancing security via provably trustworthy hardware intellectual property.
Eric Love
Yier Jin
Yiorgos Makris
2009
conf/host
Experiences in Hardware Trojan Design and Implementation.
Yier Jin
Nathan Kupp
Yiorgos Makris
2008
conf/host
Hardware Trojan Detection Using Path Delay Fingerprint.
Yier Jin
Yiorgos Makris
Coauthors
Bo Yang
(1)
Bo Zhang
(1)
Boyi Zhang
(1)
Daniela Oliveira
(1)
David Z. Pan
(4)
Dawei Li
(1)
Dean Sullivan
(5)
Dong Wu
(1)
Eric Love
(2)
Hanqiu Wang
(1)
Haocheng Ma
(3)
Haoqi Shan
(7)
Haowen Pan
(2)
Haoyi Zhou
(1)
Honggang Yu
(4)
Hu He
(1)
Huaqiang Wu
(1)
Huifeng Zhu
(2)
Jiafeng Hua
(3)
Jiaji He
(3)
Jian Weng
(1)
Jianwei Liu
(2)
Jiaqi Hu
(1)
Jin Dong
(1)
Kaichen Yang
(4)
Kaveh Shamsi
(5)
Kejun Chen
(1)
Kohei Suenaga
(2)
Mark M. Tehranipoor
(1)
Masaki Waga
(1)
Max Panoff
(2)
Maximillian Panoff
(1)
Meng Li
(2)
Michael Lee
(1)
Mohammad-Mahdi Bidmeshki
(2)
Moyao Huang
(1)
Nathan Kupp
(1)
Orlando Arias
(3)
Pingqiang Zhou
(1)
Prabhat Mishra
(1)
Qingxu Deng
(1)
Qizhi Zhang
(1)
Rachel Selina Rajarathnam
(1)
Raj Gautam Dutta
(5)
Rajib Dey
(1)
Ran Mao
(4)
Ruiyu Shen
(1)
Shuo Wang
(4)
Song Bian
(5)
Sravani Nissankararao
(1)
Tao Liu
(1)
Teng Zhang
(1)
Travis Meade
(3)
Tsung-Yi Ho
(3)
Tzungyu Tsai
(1)
Weimin Fu
(1)
Wujie Wen
(1)
Xiaolong Guo
(9)
Xintong Song
(1)
Xinwen Fu
(1)
Xuan Zhang
(2)
Ya Gao
(1)
Yibo Lin
(1)
Yichen Jiang
(1)
Yier Jin
(40)
Yifang Zhao
(1)
Yiorgos Makris
(7)
Yiqiang Zhao
(3)
Yirui Yang
(1)
Yizhong Liu
(1)
Yue Zhang
(1)
Yujia Liu
(1)
Yumin Hou
(1)
Yun-Yun Tsai
(1)
Yunhao Fu
(1)
Yunyi Chen
(1)
Zhang Chen
(1)
Zheng Zhao
(1)
Zhenyu Guan
(5)
Zhiqiang Lin
(1)
Zhou Zhang
(5)
Zian Zhao
(4)
Zihao Zhan
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to