Yu Tai

Orcid: 0000-0002-6920-9801

According to our database1, Yu Tai authored at least 33 papers between 2015 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
RE-Specter: Examining the Architectural Features of Configurable CNN With Power Side-Channel.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., October, 2024

Topic-aware Masked Attentive Network for Information Cascade Prediction.
ACM Trans. Asian Low Resour. Lang. Inf. Process., August, 2024

Decentralized and Fault-Tolerant Task Offloading for Enabling Network Edge Intelligence.
IEEE Syst. J., June, 2024

SAE+: One-Round Provably Secure Asymmetric SAE Protocol for Client-Server Model.
IEEE Trans. Inf. Forensics Secur., 2024

Towards Bridging the Cross-modal Semantic Gap for Multi-modal Recommendation.
CoRR, 2024

How to Bridge Graph and Sequence Patterns in Session-Based Recommendation? A Self-Supervised Method.
Proceedings of the IEEE International Conference on Acoustics, 2024

2023
Predicting information diffusion using the inter- and intra-path of influence transitivity.
Inf. Sci., December, 2023

PDA-GNN: propagation-depth-aware graph neural networks for recommendation.
World Wide Web (WWW), September, 2023

Multi-behavior Enhanced Graph Neural Networks for Social Recommendation.
Proceedings of the Pattern Recognition and Computer Vision - 6th Chinese Conference, 2023

Multi-modal Graph and Sequence Fusion Learning for Recommendation.
Proceedings of the Pattern Recognition and Computer Vision - 6th Chinese Conference, 2023

A Representation Learning Link Prediction Approach Using Line Graph Neural Networks.
Proceedings of the Pattern Recognition and Computer Vision - 6th Chinese Conference, 2023

A Diffusion Simulation User Behavior Perception Attention Network for Information Diffusion Prediction.
Proceedings of the Pattern Recognition and Computer Vision - 6th Chinese Conference, 2023

Automated Hardware Trojan Detection at LUT Using Explainable Graph Neural Networks.
Proceedings of the IEEE/ACM International Conference on Computer Aided Design, 2023

Security Verification of RISC-V System Based on ISA Level Information Flow Tracking.
Proceedings of the 32nd IEEE Asian Test Symposium, 2023

2022
UAV Target Roundup Strategy Based on Wolf Pack Hunting Behavior.
Proceedings of the Computer Supported Cooperative Work and Social Computing, 2022

2021
Developing Formal Models for Measuring Fault Effects Using Functional EDA Tools.
Proceedings of the IEEE International Test Conference in Asia, 2021

2020
Memory-Based High-Level Synthesis Optimizations Security Exploration on the Power Side-Channel.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2020

Machine-Learning-Based Side-Channel Leakage Detection in Electronic System-Level Synthesis.
IEEE Netw., 2020

Research on Short-Circuit Characteristics of Subway DC Traction Power Supply System.
Proceedings of the 46th Annual Conference of the IEEE Industrial Electronics Society, 2020

A Unified Formal Model for Proving Security and Reliability Properties.
Proceedings of the 29th IEEE Asian Test Symposium, 2020

2018
Quantitative Analysis of Timing Channel Security in Cryptographic Hardware Design.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2018

Towards Quantified Data Analysis of Information Flow Tracking for Secure System Design.
IEEE Access, 2018

Property Based Formal Security Verification for Hardware Trojan Detection.
Proceedings of the 3rd IEEE International Verification and Security Workshop, 2018

A SiC-Based Dual-Input Buck-Boost Converter with Independent MPPT For Photovoltaic Power Systems.
Proceedings of the IECON 2018, 2018

Automatic Generation of Review Content in Specific Domain of Social Network Based on RNN.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Examining the consequences of high-level synthesis optimizations on power side-channel.
Proceedings of the 2018 Design, Automation & Test in Europe Conference & Exhibition, 2018

2017
Image watermarking based on discrete fractional fourier transforms with multiple parameters.
Proceedings of the 13th International Conference on Natural Computation, 2017

Why you should care about don't cares: Exploiting internal don't care conditions for hardware Trojans.
Proceedings of the 2017 IEEE/ACM International Conference on Computer-Aided Design, 2017

Arbitrary Precision and Complexity Tradeoffs for Gate-Level Information Flow Tracking.
Proceedings of the 54th Annual Design Automation Conference, 2017

A Simplifying Logic Approach for Gate Level Information Flow Tracking.
Proceedings of the Communications and Networking, 2017

2016
Generating optimized gate level information flow tracking logic for enforcing multilevel security.
Autom. Control. Comput. Sci., 2016

Imprecise security: quality and complexity tradeoffs for hardware information flow tracking.
Proceedings of the 35th International Conference on Computer-Aided Design, 2016

2015
Explore New Technology Application of the Medical Classroom Teaching.
Proceedings of the Seventh International Symposium on Parallel Architectures, 2015


  Loading...