Shuyu Kong

Orcid: 0000-0003-0782-6852

According to our database1, Shuyu Kong authored at least 13 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Effective Integration of KAN for Keyword Spotting.
CoRR, 2024

Query-by-Example Keyword Spotting Using Spectral-Temporal Graph Attentive Pooling and Multi-Task Learning.
CoRR, 2024

Certifying Global Robustness for Deep Neural Networks.
CoRR, 2024

2022
Incentivizing Federated Learning.
CoRR, 2022

2020
KNN-enhanced Deep Learning Against Noisy Labels.
CoRR, 2020

2019
BeSAT: Behavioral SAT-based Attack on Cyclic Logic Encryption.
IACR Cryptol. ePrint Arch., 2019

SigAttack: New High-level SAT-based Attack on Logic Encryptions.
IACR Cryptol. ePrint Arch., 2019

CycSAT-Unresolvable Cyclic Logic Encryption Using Unreachable States.
IACR Cryptol. ePrint Arch., 2019

2018
Design and Synthesis of Self-Healing Memristive Circuits for Timing Resilient Processor Design.
IEEE Trans. Very Large Scale Integr. Syst., 2018

2017
CycSAT: SAT-Based Attack on Cyclic Logic Encryptions.
IACR Cryptol. ePrint Arch., 2017

Cyclic Locking and Memristor-based Obfuscation Against CycSAT and Inside Foundry Attacks.
IACR Cryptol. ePrint Arch., 2017

Memristor-Based Clock Design and Optimization with In-Situ Tunability.
Proceedings of the 2017 IEEE Computer Society Annual Symposium on VLSI, 2017

Using Security Invariant To Verify Confidentiality in Hardware Design.
Proceedings of the on Great Lakes Symposium on VLSI 2017, 2017


  Loading...