Xiaolu Hou

Orcid: 0000-0002-4512-6921

According to our database1, Xiaolu Hou authored at least 38 papers between 2014 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Another Look at Side-Channel-Resistant Encoding Schemes.
IEEE Trans. Very Large Scale Integr. Syst., August, 2024

DL-SITM: Deep Learning-Based See-in-the-Middle Attack on AES.
IACR Cryptol. ePrint Arch., 2024

MedAide: Towards an Omni Medical Aide via Specialized LLM-based Multi-Agent Collaboration.
CoRR, 2024

DeepBaR: Fault Backdoor Attack on Deep Neural Network Layers.
CoRR, 2024

Side-Channel Analysis of OpenVINO-based Neural Network Models.
CoRR, 2024

Detecting and Evaluating Medical Hallucinations in Large Vision Language Models.
CoRR, 2024

DeepNcode: Encoding-Based Protection against Bit-Flip Attacks on Neural Networks.
CoRR, 2024

Efficiency in Focus: LayerNorm as a Catalyst for Fine-tuning Medical Visual Language Pre-trained Models.
CoRR, 2024

Efficiency in Focus: LayerNorm as a Catalyst for Fine-tuning Medical Visual Language Models.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

2023
FooBaR: Fault Fooling Backdoor Attack on Neural Network Training.
IEEE Trans. Dependable Secur. Comput., 2023

New Results on Machine Learning-Based Distinguishers.
IEEE Access, 2023

A Desynchronization-Based Countermeasure Against Side-Channel Analysis of Neural Networks.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023

2022
On Implementation-Level Security of Edge-Based Machine Learning Models.
Security and Artificial Intelligence, 2022

SNIFF: Reverse Engineering of Neural Networks With Fault Attacks.
IEEE Trans. Reliab., 2022

Constrained Proximity Attacks on Mobile Targets.
ACM Trans. Priv. Secur., 2022

SBCMA: Semi-Blind Combined Middle-Round Attack on Bit-Permutation Ciphers With Application to AEAD Schemes.
IEEE Trans. Inf. Forensics Secur., 2022

A Finer-Grain Analysis of the Leakage (Non) Resilience of OCB.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

How Practical Are Fault Injection Attacks, Really?
IEEE Access, 2022

2021
Back to the Basics: Seamless Integration of Side-Channel Pre-Processing in Deep Neural Networks.
IEEE Trans. Inf. Forensics Secur., 2021

On Evaluating Fault Resilient Encoding Schemes in Software.
IEEE Trans. Dependable Secur. Comput., 2021

2020
On Side Channel Vulnerabilities of Bit Permutations in Cryptographic Algorithms.
IEEE Trans. Inf. Forensics Secur., 2020

SITM: See-In-The-Middle Side-Channel Assisted Middle Round Differential Cryptanalysis on SPN Block Ciphers.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

A Countermeasure Against Statistical Ineffective Fault Analysis.
IEEE Trans. Circuits Syst., 2020

DNFA: Differential No-Fault Analysis of Bit Permutation Based Ciphers Assisted by Side-Channel.
IACR Cryptol. ePrint Arch., 2020

2019
Fully Automated Differential Fault Analysis on Software Implementations of Block Ciphers.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

SoK : On DFA Vulnerabilities of Substitution-Permutation Networks.
IACR Cryptol. ePrint Arch., 2019

Experimental Evaluation of Deep Neural Network Resistance Against Fault Injection Attacks.
IACR Cryptol. ePrint Arch., 2019

2018
Fault Attacks Made Easy: Differential Fault Analysis Automation on Assembly Code.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Fully Automated Differential Fault Analysis on Software Implementations of Cryptographic Algorithms.
IACR Cryptol. ePrint Arch., 2018

On Side-Channel Vulnerabilities of Bit Permutations: Key Recovery and Reverse Engineering.
IACR Cryptol. ePrint Arch., 2018

Fault Resilient Encoding Schemes in Software: How Far Can We Go?
IACR Cryptol. ePrint Arch., 2018

Location Proximity Attacks Against Mobile Targets: Analytical Bounds and Attacker Strategies.
Proceedings of the Computer Security, 2018

Practical Fault Attack on Deep Neural Networks.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Fault Attacks Made Easy: Differential Fault Analysis Automation on Assembly Code.
IACR Cryptol. ePrint Arch., 2017

Modular lattices from a variation of construction a over number fields.
Adv. Math. Commun., 2017

2016
Feeding Two Cats with One Bowl: On Designing a Fault and Side-Channel Resistant Software Encoding Scheme.
IACR Cryptol. ePrint Arch., 2016

On LCD codes and lattices.
Proceedings of the IEEE International Symposium on Information Theory, 2016

2014
Construction and secrecy gain of a family of 5-modular lattices.
Proceedings of the 2014 IEEE Information Theory Workshop, 2014


  Loading...