Yongqiang Lyu

Orcid: 0000-0003-2573-963X

Affiliations:
  • Tsinghua University, Beijing National Research Center for Information Science and Technology, Beijing, China
  • Synopsys, Inc. (2006 - 2009)
  • Tsinghua University, Department of Computer Science and Technology, Beijing, China (PhD 2006)


According to our database1, Yongqiang Lyu authored at least 90 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Lightning: Leveraging DVFS-induced Transient Fault Injection to Attack Deep Learning Accelerator of GPUs.
ACM Trans. Design Autom. Electr. Syst., January, 2024

Touchscreens Can Reveal User Identity: Capacitive Plethysmogram-Based Biometrics.
IEEE Trans. Mob. Comput., January, 2024

SCAFinder: Formal Verification of Cache Fine-Grained Features for Side Channel Detection.
IEEE Trans. Inf. Forensics Secur., 2024

Uncovering and Exploiting AMD Speculative Memory Access Predictors for Fun and Profit.
Proceedings of the IEEE International Symposium on High-Performance Computer Architecture, 2024

Whisper: Timing the Transient Execution to Leak Secrets and Break KASLR.
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024

2023
PMU-Spill: A New Side Channel for Transient Execution Attacks.
IEEE Trans. Circuits Syst. I Regul. Pap., December, 2023

OA-Cache: Oracle Approximation-Based Cache Replacement at the Network Edge.
IEEE Trans. Netw. Serv. Manag., September, 2023

An explainable attention-based TCN heartbeats classification model for arrhythmia detection.
Biomed. Signal Process. Control., 2023

Processor Vulnerability Discovery.
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023

Leaky MDU: ARM Memory Disambiguation Unit Uncovered and Vulnerabilities Exposed.
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023

PMU-Leaker: Performance Monitor Unit-Based Realization of Cache Side-Channel Attacks.
Proceedings of the 28th Asia and South Pacific Design Automation Conference, 2023

2022
JOSP: Joint Optimization of Flow Path Scheduling and Virtual Network Function Placement for Delay-Sensitive Applications.
Mob. Networks Appl., 2022

DynaComm: Accelerating Distributed CNN Training Between Edges and Clouds Through Dynamic Communication Scheduling.
IEEE J. Sel. Areas Commun., 2022

Internet of light: Technologies and applications.
Intell. Converged Networks, 2022

PMUSpill: The Counters in Performance Monitor Unit that Leak SGX-Protected Secrets.
CoRR, 2022

Model Checking for Microarchitectural Data Sampling Security.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

CacheGuard: A Behavior Model Checker for Cache Timing Side-Channel Security: (Invited Paper).
Proceedings of the 27th Asia and South Pacific Design Automation Conference, 2022

DVFSspy: Using Dynamic Voltage and Frequency Scaling as a Covert Channel for Multiple Procedures.
Proceedings of the 27th Asia and South Pacific Design Automation Conference, 2022

PMU-Spill: Performance Monitor Unit Counters Leak Secrets in Transient Executions.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2022

2021
Towards Optimal Request Mapping and Response Routing for Content Delivery Networks.
IEEE Trans. Serv. Comput., 2021

VoltJockey: A New Dynamic Voltage Scaling-Based Fault Injection Attack on Intel SGX.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2021

Lightning: Striking the Secure Isolation on GPU Clouds with Transient Hardware Faults.
CoRR, 2021

2020
VoltJockey: Abusing the Processor Voltage to Break Arm TrustZone.
GetMobile Mob. Comput. Commun., 2020

Mitigating Adversarial Attacks for Deep Neural Networks by Input Deformation and Augmentation.
Proceedings of the 25th Asia and South Pacific Design Automation Conference, 2020

2019
Constructing Novel Block Layouts for Webpage Analysis.
ACM Trans. Internet Techn., 2019

Photoplethysmogram-based Cognitive Load Assessment Using Multi-Feature Fusion Model.
ACM Trans. Appl. Percept., 2019

QGAN: Quantized Generative Adversarial Networks.
CoRR, 2019

Content and Network Aware Replication and Scheduling Mechanism for User Generated Content Videos.
Proceedings of the 2019 IEEE SmartWorld, 2019

Caching Salon: From Classical to Learning-Based Approaches.
Proceedings of the 13th IEEE International Conference on Service-Oriented System Engineering, 2019

Looking Into Online Gaming From Measurement Perspective.
Proceedings of the 13th IEEE International Conference on Service-Oriented System Engineering, 2019

Resource Reservation and Request Routing for a Cloud-Based Content Delivery Network.
Proceedings of the 13th IEEE International Conference on Service-Oriented System Engineering, 2019

LEAP: A Lightweight Encryption and Authentication Protocol for In-Vehicle Communications.
Proceedings of the 2019 IEEE Intelligent Transportation Systems Conference, 2019

VoltJockey: Breaching TrustZone by Software-Controlled Voltage Manipulation over Multi-core Frequencies.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

VoltJockey: Breaking SGX by Software-Controlled Voltage-Induced Hardware Faults.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2019

2018
Control Flow Integrity Based on Lightweight Encryption Architecture.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2018

Non-Invasive Measurement of Cognitive Load and Stress Based on the Reflected Stress-Induced Vascular Response Index.
ACM Trans. Appl. Percept., 2018

Hyperconnected Network: A Decentralized Trusted Computing and Networking Paradigm.
IEEE Netw., 2018

A Dataflow-Oriented Programming Interface for Named Data Networking.
J. Comput. Sci. Technol., 2018

An Automatic and Scalable Application Crawler for Large-Scale Mobile Internet Content Retrieval.
KSII Trans. Internet Inf. Syst., 2018

Touch Sense: Touch Screen Based Mental Stress Sense.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018

Evaluating Photoplethysmogram as a Real-Time Cognitive Load Assessment during Game Playing.
Int. J. Hum. Comput. Interact., 2018

Video delivery networks: Challenges, solutions and future directions.
Comput. Electr. Eng., 2018

What Makes a Great Mobile App? A Quantitative Study Using a New Mobile Crawler.
Proceedings of the IEEE Symposium on Service-Oriented System Engineering, 2018

Optimal Schedule of Mobile Edge Computing Under Imperfect CSI.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

InterestFence: Countering Interest Flooding Attacks by Using Hash-Based Security Labels.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Naxos: A Named Data Networking Consensus Protocol.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

Computation Offloading for Multi-user Mobile Edge Computing.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

SNrram: an efficient sparse neural network computation architecture based on resistive random-access memory.
Proceedings of the 55th Annual Design Automation Conference, 2018

Biometric Authentication via Finger Photoplethysmogram.
Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence, 2018

2017
UMCR: User Interaction-Driven Mobile Content Retrieval.
ACM Trans. Intell. Syst. Technol., 2017

TAM: A Transparent Agent Architecture for Measuring Mobile Applications.
Comput. Sci. Eng., 2017

Approximate Computing for Low Power and Security in the Internet of Things.
Computer, 2017

True Random Number Generator Based on Ring Oscillator PUFs.
Proceedings of the 2nd International Conference on Multimedia Systems and Signal Processing, 2017

UCPR: User Classification and Influence Analysis in Social Network.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017

Protecting Outsourced Data in Semi-Trustworthy Cloud: A Hierarchical System.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017

Heterogeneous Malware Spread Process in Star Network.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017

2016
Techniques for Design and Implementation of an FPGA-Specific Physical Unclonable Function.
J. Comput. Sci. Technol., 2016

Physical unclonable functions-based linear encryption against code reuse attacks.
Proceedings of the 53rd Annual Design Automation Conference, 2016

2015
A PUF-FSM Binding Scheme for FPGA IP Protection and Pay-Per-Device Licensing.
IEEE Trans. Inf. Forensics Secur., 2015

High-performance scheduling model for multisensor gateway of cloud sensor system-based smart-living.
Inf. Fusion, 2015

Dynamic evaluation model of coronary heart disease for ubiquitous healthcare.
Comput. Ind., 2015

Mitigating Code-Reuse Attacks on CISC Architectures in a Hardware Approach.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Measuring Photoplethysmogram-Based Stress-Induced Vascular Response Index to Assess Cognitive Load and Stress.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

A Survey of Hardware Trojan Detection, Diagnosis and Prevention.
Proceedings of the 14th International Conference on Computer-Aided Design and Computer Graphics, 2015

2014
A Survey on Silicon PUFs and Recent Advances in Ring Oscillator PUFs.
J. Comput. Sci. Technol., 2014

Trusted Integrated Circuits: The Problem and Challenges.
J. Comput. Sci. Technol., 2014

Quantitative Analysis of Mental Effort Investment using Photoplethysmogram.
Proceedings of the HEALTHINF 2014, 2014

2013
A Scalable and Privacy-Aware Location-Sensing Model for Ephemeral Social Network Service.
Int. J. Distributed Sens. Networks, 2013

Android Power Management and Analyses of Power Consumption in an Android Smartphone.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

Linear time-invariant system based assessment model for coronary heart disease.
Proceedings of the IEEE 15th International Conference on e-Health Networking, 2013

A multi-communication-fusion based mobile monitoring system for maternal and fetal information.
Proceedings of the IEEE 15th International Conference on e-Health Networking, 2013

FPGA IP protection by binding Finite State Machine to Physical Unclonable Function.
Proceedings of the 23rd International Conference on Field programmable Logic and Applications, 2013

Binding Hardware IPs to Specific FPGA Device via Inter-twining the PUF Response with the FSM of Sequential Circuits.
Proceedings of the 21st IEEE Annual International Symposium on Field-Programmable Custom Computing Machines, 2013

Design and Implementation of a Delay-Based PUF for FPGA IP Protection.
Proceedings of the 2013 International Conference on Computer-Aided Design and Computer Graphics, 2013

2012
TimFastPlace: Critical-path based timing driven FastPlace.
IEICE Electron. Express, 2012

Efficient verification of IP watermarks in FPGA designs through lookup table content extracting.
IEICE Electron. Express, 2012

Enhanced ALOHA Algorithm for Chirp Spread Spectrum Positioning.
Proceedings of the Pervasive Computing and the Networked World, 2012

UE-based optimization for self-service community healthcare kiosk.
Proceedings of the IEEE 14th International Conference on e-Health Networking, 2012

2011
A timing-perspective study on the wire model in placement.
Proceedings of the 2011 IEEE 9th International Conference on ASIC, 2011

2010
A Low-Cost Ubiquitous Family Healthcare Framework.
Proceedings of the Ubiquitous Intelligence and Computing - 7th International Conference, 2010

Useful clock skew optimization under a multi-corner multi-mode design framework.
Proceedings of the 11th International Symposium on Quality of Electronic Design (ISQED 2010), 2010

A low power clock network placement framework.
Proceedings of the 11th International Symposium on Quality of Electronic Design (ISQED 2010), 2010

2008
An innovative Steiner tree based approach for polygon partitioning.
Proceedings of the 13th Asia South Pacific Design Automation Conference, 2008

2007
An efficient quadratic placement based on search space traversing technology.
Integr., 2007

2005
Navigating Register Placement for Low Power Clock Network Design.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

Navigating registers in placement for clock network minimization.
Proceedings of the 42nd Design Automation Conference, 2005

Register placement for low power clock network.
Proceedings of the 2005 Conference on Asia South Pacific Design Automation, 2005

Clock network minimization methodology based on incremental placement.
Proceedings of the 2005 Conference on Asia South Pacific Design Automation, 2005

2004
Recursively combine floorplan and Q-place in mixed mode placement based on circuit's variety of block configuration.
Proceedings of the 2004 International Symposium on Circuits and Systems, 2004

2003
Combining clustering and partitioning in quadratic placement.
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003


  Loading...