Kaichen Yang

Orcid: 0000-0003-1027-6708

According to our database1, Kaichen Yang authored at least 15 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Hardware Phi-1.5B: A Large Language Model Encodes Hardware Domain Specific Knowledge.
Proceedings of the 29th Asia and South Pacific Design Automation Conference, 2024

2023
Energy-efficient underwater acoustic communication based on Dyna-Q with an adaptive action space.
Phys. Commun., December, 2023

Dual-Leak: Deep Unsupervised Active Learning for Cross-Device Profiled Side-Channel Leakage Analysis.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2023

LLM4SecHW: Leveraging Domain-Specific Large Language Model for Hardware Debugging.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2023

2022
Graph Neural Network based Hardware Trojan Detection at Intermediate Representative for SoC Platforms.
Proceedings of the GLSVLSI '22: Great Lakes Symposium on VLSI 2022, Irvine CA USA, June 6, 2022

2021
On Sensor Security in the Era of IoT and CPS.
SN Comput. Sci., 2021

3D-Adv: Black-Box Adversarial Attacks against Deep Learning Models through 3D Sensors.
Proceedings of the 58th ACM/IEEE Design Automation Conference, 2021

Robust Roadside Physical Adversarial Attack Against Deep Learning in Lidar Perception Modules.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
CloudLeak: Large-Scale Deep Learning Models Stealing Through Adversarial Examples.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

DeepEM: Deep Neural Networks Model Recovery through EM Side-Channel Information Leakage.
Proceedings of the 2020 IEEE International Symposium on Hardware Oriented Security and Trust, 2020

Beyond Digital Domain: Fooling Deep Learning Based Recognition System in Physical World.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

Robust Adversarial Objects against Deep Learning Models.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2018
Adversarial Examples Against the Deep Learning Based Network Intrusion Detection Systems.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

2015
Economic Costs of Multi-sever Private Information Retrieval in Cloud Computing.
Proceedings of the International Conference on Cloud Computing and Big Data, 2015

2014
Practical private information retrieval supporting keyword search in the cloud.
Proceedings of the Sixth International Conference on Wireless Communications and Signal Processing, 2014


  Loading...