Xiaoxuan Lou

Orcid: 0000-0002-9510-1300

According to our database1, Xiaoxuan Lou authored at least 15 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Protecting Confidential Virtual Machines from Hardware Performance Counter Side Channels.
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024

2023
Mastering Stock Markets with Efficient Mixture of Diversified Trading Experts.
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023

Clean-image Backdoor: Attacking Multi-label Models with Poisoned Labels Only.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

MERCURY: An Automated Remote Side-channel Attack to Nvidia Deep Learning Accelerator.
Proceedings of the International Conference on Field Programmable Technology, 2023

2022
Ownership Verification of DNN Architectures via Hardware Cache Side Channels.
IEEE Trans. Circuits Syst. Video Technol., 2022

A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks, and Defenses in Cryptography.
ACM Comput. Surv., 2022

ShiftNAS: Towards Automatic Generation of Advanced Mulitplication-Less Neural Networks.
CoRR, 2022

NASPY: Automated Extraction of Automated Machine Learning Models.
Proceedings of the Tenth International Conference on Learning Representations, 2022

2021
When NAS Meets Watermarking: Ownership Verification of DNN Models via Cache Side Channels.
CoRR, 2021

2020
Imperceptible Misclassification Attack on Deep Learning Accelerator by Glitch Injection.
Proceedings of the 57th ACM/IEEE Design Automation Conference, 2020

2019
Understanding Rowhammer Attacks through the Lens of a Unified Reference Framework.
CoRR, 2019

Enhanced Differential Cache Attacks on SM4 with Algebraic Analysis and Error-Tolerance.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

2018
Persistent Fault Analysis on Block Ciphers.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Efficient flush-reload cache attack on scalar multiplication based signature algorithm.
Sci. China Inf. Sci., 2018

Theoretical Round Modification Fault Analysis on AEGIS-128 with Algebraic Techniques.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018


  Loading...