Pengfei Qiu

Orcid: 0009-0009-4043-2119

According to our database1, Pengfei Qiu authored at least 30 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Lightning: Leveraging DVFS-induced Transient Fault Injection to Attack Deep Learning Accelerator of GPUs.
ACM Trans. Design Autom. Electr. Syst., January, 2024

SCAFinder: Formal Verification of Cache Fine-Grained Features for Side Channel Detection.
IEEE Trans. Inf. Forensics Secur., 2024

Domain-Knowledge Enhanced GANs for High-Quality Trajectory Generation.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024

Uncovering and Exploiting AMD Speculative Memory Access Predictors for Fun and Profit.
Proceedings of the IEEE International Symposium on High-Performance Computer Architecture, 2024

Whisper: Timing the Transient Execution to Leak Secrets and Break KASLR.
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024

2023
PMU-Spill: A New Side Channel for Transient Execution Attacks.
IEEE Trans. Circuits Syst. I Regul. Pap., December, 2023

Directional Residual Frame: Turns the motion information into a static RGB frame.
J. Vis. Lang. Comput., 2023

Exploration and Exploitation of Hidden PMU Events.
CoRR, 2023

Timing the Transient Execution: A New Side-Channel Attack on Intel CPUs.
CoRR, 2023

Exploration and Exploitation of Hidden PMU Events.
Proceedings of the IEEE/ACM International Conference on Computer Aided Design, 2023

An AdamW-Based Deep Neural Network Using Feature Selection and Data Oversampling for Intrusion Detection.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023

Directional Residual Frame: Turns the motion information into a static RGB frame (S).
Proceedings of the 29th International DMS Conference on Visualization and Visual Languages, 2023

Leaky MDU: ARM Memory Disambiguation Unit Uncovered and Vulnerabilities Exposed.
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023

PMU-Leaker: Performance Monitor Unit-Based Realization of Cache Side-Channel Attacks.
Proceedings of the 28th Asia and South Pacific Design Automation Conference, 2023

Overtake: Achieving Meltdown-type Attacks with One Instruction.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2023

2022
PMUSpill: The Counters in Performance Monitor Unit that Leak SGX-Protected Secrets.
CoRR, 2022

Robust Spatio-Temporal Trajectory Modeling Based on Auto-Gated Recurrent Unit.
Proceedings of the IEEE Smartworld, 2022

Auto-Encoding GAN for Reducing Mode Collapse and Enhancing Feature Representation.
Proceedings of the 34th International Conference on Software Engineering and Knowledge Engineering, 2022

DVFSspy: Using Dynamic Voltage and Frequency Scaling as a Covert Channel for Multiple Procedures.
Proceedings of the 27th Asia and South Pacific Design Automation Conference, 2022

PMU-Spill: Performance Monitor Unit Counters Leak Secrets in Transient Executions.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2022

2021
VoltJockey: A New Dynamic Voltage Scaling-Based Fault Injection Attack on Intel SGX.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2021

2020
VoltJockey: Abusing the Processor Voltage to Break Arm TrustZone.
GetMobile Mob. Comput. Commun., 2020

Efficient Transfer Learning on Modeling Physical Unclonable Functions.
Proceedings of the 21st International Symposium on Quality Electronic Design, 2020

Mitigating Adversarial Attacks for Deep Neural Networks by Input Deformation and Augmentation.
Proceedings of the 25th Asia and South Pacific Design Automation Conference, 2020

2019
Photoplethysmogram-based Cognitive Load Assessment Using Multi-Feature Fusion Model.
ACM Trans. Appl. Percept., 2019

VoltJockey: Breaching TrustZone by Software-Controlled Voltage Manipulation over Multi-core Frequencies.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

VoltJockey: Breaking SGX by Software-Controlled Voltage-Induced Hardware Faults.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2019

2018
Control Flow Integrity Based on Lightweight Encryption Architecture.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2018

2016
Physical unclonable functions-based linear encryption against code reuse attacks.
Proceedings of the 53rd Annual Design Automation Conference, 2016

2015
Insect Trapping Method Based on Progressive Star Network.
Int. J. Online Eng., 2015


  Loading...