Fan Yao
Orcid: 0000-0002-0360-5641
According to our database1,
Fan Yao
authored at least 83 papers
between 2013 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Unveiling User Satisfaction and Creator Productivity Trade-Offs in Recommendation Platforms.
CoRR, 2024
CoRR, 2024
CoRR, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
DeepVenom: Persistent DNN Backdoors Exploiting Transient Weight Perturbations in Memories.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
IvLeague: Side Channel-Resistant Secure Architectures Using Isolated Domains of Dynamic Integrity Trees.
Proceedings of the 57th IEEE/ACM International Symposium on Microarchitecture, 2024
Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2024
MetaLeak: Uncovering Side Channels in Secure Processor Architectures Exploiting Metadata.
Proceedings of the 51st ACM/IEEE Annual International Symposium on Computer Architecture, 2024
Proceedings of the Forty-first International Conference on Machine Learning, 2024
Proceedings of the Computer Vision - ECCV 2024, 2024
VITA: ViT Acceleration for Efficient 3D Human Mesh Recovery via Hardware-Algorithm Co-Design.
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024
Special Session: Detecting and Defending Vulnerabilities in Heterogeneous and Monolithic Systems: Current Strategies and Future Directions.
Proceedings of the International Conference on Compilers, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
STREAM: Toward READ-Based In-Memory Computing for Streaming-Based Processing for Data-Intensive Applications.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., November, 2023
IEEE Micro, 2023
CoRR, 2023
Proceedings of the 10th ACM International Conference on Systems for Energy-Efficient Buildings, 2023
Rethinking Incentives in Recommender Systems: Are Monotone Rewards Always Beneficial?
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Proceedings of the IEEE International Symposium on Workload Characterization, 2023
Proceedings of the International Conference on Machine Learning, 2023
BeKnight: Guarding Against Information Leakage in Speculatively Updated Branch Predictors.
Proceedings of the IEEE/ACM International Conference on Computer Aided Design, 2023
D-Shield: Enabling Processor-side Encryption and Integrity Verification for Secure NVMe Drives.
Proceedings of the IEEE International Symposium on High-Performance Computer Architecture, 2023
TunneLs for Bootlegging: Fully Reverse-Engineering GPU TLBs for Challenging Isolation Guarantees of NVIDIA MIG.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
IEEE Trans. Computers, 2022
IEEE Trans. Pattern Anal. Mach. Intell., 2022
Graphics Peeping Unit: Exploiting EM Side-Channel Information of GPUs to Eavesdrop on Your Neighbors.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
DeepSteal: Advanced Model Extractions Leveraging Efficient Weight Stealing in Memories.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Clairvoyance: Exploiting Far-field EM Emanations of GPU to "See" Your DNN Models through Obstacles at a Distance.
Proceedings of the 43rd IEEE Security and Privacy, 2022
Proceedings of the IFIP Networking Conference, 2022
Proceedings of the International Conference on Machine Learning, 2022
On the Feasibility of Training-time Trojan Attacks through Hardware-based Faults in Memory.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2022
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022
Proceedings of the 2022 Design, Automation & Test in Europe Conference & Exhibition, 2022
Multi-Agent Learning for Iterative Dominance Elimination: Formal Barriers and New Algorithms.
Proceedings of the Conference on Learning Theory, 2-5 July 2022, London, UK., 2022
Proceedings of the 27th Asia and South Pacific Design Automation Conference, 2022
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022
2021
RA-BNN: Constructing Robust & Accurate Binary Neural Network to Simultaneously Defend Adversarial Bit-Flip Attack and Improve Accuracy.
CoRR, 2021
CoRR, 2021
Seeds of SEED: R-SAW: New Side Channels Exploiting Read Asymmetry in MLC Phase Change Memories.
Proceedings of the 2021 International Symposium on Secure and Private Execution Environment Design (SEED), 2021
Seeds of SEED: NMT-Stroke: Diverting Neural Machine Translation through Hardware-based Faults.
Proceedings of the 2021 International Symposium on Secure and Private Execution Environment Design (SEED), 2021
LADDER: Architecting Content and Location-aware Writes for Crossbar Resistive Memories.
Proceedings of the MICRO '21: 54th Annual IEEE/ACM International Symposium on Microarchitecture, 2021
Proceedings of the 32nd International Symposium on Algorithms and Computation, 2021
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
2020
Thangka Image Inpainting Algorithm Based on Wavelet Transform and Structural Constraints.
J. Inf. Process. Syst., 2020
J. Hardw. Syst. Secur., 2020
DeepHammer: Depleting the Intelligence of Deep Neural Networks through Targeted Chain of Bit Flips.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020
Proceedings of the 17th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2020
BranchSpec: Information Leakage Attacks Exploiting Speculative Branch Instruction Executions.
Proceedings of the 38th IEEE International Conference on Computer Design, 2020
2019
TS-BatPro: Improving Energy Efficiency in Data Centers by Leveraging Temporal-Spatial Batching.
IEEE Trans. Green Commun. Netw., 2019
Leveraging Cache Management Hardware for Practical Defense Against Cache Timing Channel Attacks.
IEEE Micro, 2019
Covert Timing Channels Exploiting Cache Coherence Hardware: Characterization and Defense.
Int. J. Parallel Program., 2019
Int. J. Parallel Program., 2019
CoRR, 2019
Clust. Comput., 2019
IEEE Comput. Archit. Lett., 2019
Proceedings of the IEEE International Symposium on Workload Characterization, 2019
Negative Correlation, Non-linear Filtering, and Discovering of Repetitiveness for Cache Timing Channel Detection.
Proceedings of the IEEE International Conference on Acoustics, 2019
Proceedings of the 28th International Symposium on High-Performance Parallel and Distributed Computing, 2019
COTSknight: Practical Defense against Cache Timing Channel Attacks using Cache Monitoring and Partitioning Technologies.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2019
PowerStar: Improving Power Efficiency in Heterogenous Processors for Bursty Workloads with Approximate Computing.
Proceedings of the 2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2019
2018
PopCorns: Power Optimization Using a Cooperative Network-Server Approach for Data Centers.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
Proceedings of the IEEE International Symposium on High Performance Computer Architecture, 2018
Prefetch-guard: Leveraging hardware prefetches to defend against cache timing channels.
Proceedings of the 2018 IEEE International Symposium on Hardware Oriented Security and Trust, 2018
Proceedings of the 52nd Asilomar Conference on Signals, Systems, and Computers, 2018
2017
Proceedings of the ICT Systems Security and Privacy Protection, 2017
Proceedings of the on Great Lakes Symposium on VLSI 2017, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
WASP: Workload Adaptive Energy-Latency Optimization in Server Farms Using Server Low-Power States.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017
2016
SARRE: Semantics-Aware Rule Recommendation and Enforcement for Event Paths on Android.
IEEE Trans. Inf. Forensics Secur., 2016
2015
Proceedings of the Security and Privacy in Communication Networks, 2015
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015
2014
Proceedings of the IEEE International Conference on Communications, 2014
2013
Proceedings of the 2013 IEEE 31st International Conference on Computer Design, 2013
Watts-inside: A hardware-software cooperative approach for Multicore Power Debugging.
Proceedings of the 2013 IEEE 31st International Conference on Computer Design, 2013