Chongxi Bao

Orcid: 0000-0002-9146-3515

According to our database1, Chongxi Bao authored at least 18 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Learning to bid and rank together in recommendation systems.
Mach. Learn., May, 2024

Correction to: Learning to bid and rank together in recommendation systems.
Mach. Learn., 2024

2019
Reducing Timing Side-Channel Information Leakage Using 3D Integration.
IEEE Trans. Dependable Secur. Comput., 2019

2018
A Combined Optimization-Theoretic and Side- Channel Approach for Attacking Strong Physical Unclonable Functions.
IEEE Trans. Very Large Scale Integr. Syst., 2018

2017
Security-Aware 2.5D Integrated Circuit Design Flow Against Hardware IP Piracy.
Computer, 2017

Introducing TFUE: The trusted foundry and untrusted employee model in IC supply chain security.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2017

Exploring timing side-channel attacks on path-ORAMs.
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017

2016
Security and Vulnerability Implications of 3D ICs.
IEEE Trans. Multi Scale Comput. Syst., 2016

On Reverse Engineering-Based Hardware Trojan Detection.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2016

2.5D/3D Integration Technologies for Circuit Obfuscation.
Proceedings of the 17th International Workshop on Microprocessor and SOC Test and Verification, 2016

An optimization-theoretic approach for attacking physical unclonable functions.
Proceedings of the 35th International Conference on Computer-Aided Design, 2016

2015
Temperature Tracking: Toward Robust Run-Time Detection of Hardware Trojans.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2015

3D Integration: New opportunities in defense against cache-timing side-channel attacks.
Proceedings of the 33rd IEEE International Conference on Computer Design, 2015

A security-aware design scheme for better hardware Trojan detection sensitivity.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2015

Security-Aware Design Flow for 2.5D IC Technology.
Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, 2015

2014
On application of one-class SVM to reverse engineering-based hardware Trojan detection.
Proceedings of the Fifteenth International Symposium on Quality Electronic Design, 2014

A Secure Algorithm for Task Scheduling against Side-channel Attacks.
Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, 2014

2013
Temperature tracking: an innovative run-time approach for hardware Trojan detection.
Proceedings of the IEEE/ACM International Conference on Computer-Aided Design, 2013


  Loading...