Lingxiao Wei

According to our database1, Lingxiao Wei authored at least 15 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
E2LLM: Encoder Elongated Large Language Models for Long-Context Understanding and Reasoning.
CoRR, 2024

2023
Correlation Anomaly Detection With Multiple Primary Attributes in Collaborative Device-Edge-Cloud Network.
IEEE Internet Things J., 2023

2022
Energy-Efficient Sensory Data Collection Based on Spatiotemporal Correlation in IoT Networks.
Int. J. Crowd Sci., 2022

2019
On Functional Test Generation for Deep Neural Network IPs.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2019

2018
Shadow Block: Accelerating ORAM Accesses with Data Duplication.
Proceedings of the 51st Annual IEEE/ACM International Symposium on Microarchitecture, 2018

I Know What You See: Power Side-Channel Attack on Convolutional Neural Network Accelerators.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

Towards Imperceptible and Robust Adversarial Example Attacks Against Neural Networks.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
Fault injection attack on deep neural network.
Proceedings of the 2017 IEEE/ACM International Conference on Computer-Aided Design, 2017

2016
On Code Execution Tracking via Power Side-Channel.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
VeriTrust: Verification for Hardware Trust.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2015

BoardPUF: Physical Unclonable Functions for Printed Circuit Board Authentication.
Proceedings of the IEEE/ACM International Conference on Computer-Aided Design, 2015

DERA: yet another differential fault attack on cryptographic devices based on error rate analysis.
Proceedings of the 52nd Annual Design Automation Conference, 2015

Vulnerability analysis for crypto devices against probing attack.
Proceedings of the 20th Asia and South Pacific Design Automation Conference, 2015

2014
On trojan side channel design and identification.
Proceedings of the IEEE/ACM International Conference on Computer-Aided Design, 2014

2013
VeriTrust: verification for hardware trust.
Proceedings of the 50th Annual Design Automation Conference 2013, 2013


  Loading...