CycSAT: SAT-based attack on cyclic logic encryptions H Zhou, R Jiang, S Kong 2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 49-56, 2017 | 169 | 2017 |
Cyclic locking and memristor-based obfuscation against CycSAT and inside foundry attacks A Rezaei, Y Shen, S Kong, J Gu, H Zhou 2018 Design, Automation & Test in Europe Conference & Exhibition (DATE), 85-90, 2018 | 62 | 2018 |
BeSAT: Behavioral SAT-based attack on cyclic logic encryption Y Shen, Y Li, A Rezaei, S Kong, D Dlott, H Zhou Proceedings of the 24th Asia and South Pacific Design Automation Conference …, 2019 | 57 | 2019 |
CycSAT-unresolvable cyclic logic encryption using unreachable states A Rezaei, Y Li, Y Shen, S Kong, H Zhou Proceedings of the 24th Asia and South Pacific Design Automation Conference …, 2019 | 38 | 2019 |
SigAttack: New high-level SAT-based attack on logic encryptions Y Shen, Y Li, S Kong, A Rezaei, H Zhou 2019 Design, Automation & Test in Europe Conference & Exhibition (DATE), 940-943, 2019 | 23 | 2019 |
Incentivizing federated learning S Kong, Y Li, H Zhou arXiv preprint arXiv:2205.10951, 2022 | 7 | 2022 |
Using security invariant to verify confidentiality in hardware design S Kong, Y Shen, H Zhou Proceedings of the on Great Lakes Symposium on VLSI 2017, 487-490, 2017 | 4 | 2017 |
KNN-enhanced Deep Learning Against Noisy Labels S Kong, Y Li, J Wang, A Rezaei, H Zhou arXiv preprint arXiv:2012.04224, 2020 | 2 | 2020 |
Memristor-based clock design and optimization with in-situ tunability S Kong, J Gu, H Zhou 2017 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 427-432, 2017 | 2 | 2017 |
Design and synthesis of self-healing memristive circuits for timing resilient processor design S Kong, H Zhou, J Gu IEEE Transactions on Very Large Scale Integration (VLSI) Systems 26 (12 …, 2018 | 1 | 2018 |
Improving Security and Robustness of Hardware and Learning Systems S Kong Northwestern University, 2021 | | 2021 |