Follow
Wenjie Xiong
Title
Cited by
Cited by
Year
Run-time accessible DRAM PUFs in commodity devices
W Xiong, A Schaller, NA Anagnostopoulos, MU Saleem, S Gabmeyer, ...
Cryptographic Hardware and Embedded Systems–CHES 2016: 18th International …, 2016
952016
Intrinsic rowhammer PUFs: Leveraging the rowhammer effect for improved security
A Schaller, W Xiong, NA Anagnostopoulos, MU Saleem, S Gabmeyer, ...
2017 IEEE International Symposium on Hardware Oriented Security and Trust …, 2017
822017
Leaking information through cache LRU states
W Xiong, J Szefer
2020 IEEE International Symposium on High Performance Computer Architecture …, 2020
812020
Decay-based DRAM PUFs in commodity devices
A Schaller, W Xiong, NA Anagnostopoulos, MU Saleem, S Gabmeyer, ...
IEEE Transactions on Dependable and Secure Computing 16 (3), 462-475, 2018
662018
Survey of transient execution attacks and their mitigations
W Xiong, J Szefer
ACM Computing Surveys (CSUR) 54 (3), 1-36, 2021
652021
A parylene self-locking cuff electrode for peripheral nerve stimulation and recording
H Yu, W Xiong, H Zhang, W Wang, Z Li
Journal of Microelectromechanical Systems 23 (5), 1025-1035, 2014
642014
Secure tlbs
S Deng, W Xiong, J Szefer
Proceedings of the 46th International Symposium on Computer Architecture …, 2019
482019
Fingerprinting cloud FPGA infrastructures
S Tian, W Xiong, I Giechaskiel, K Rasmussen, J Szefer
Proceedings of the 2020 ACM/SIGDA International Symposium on Field …, 2020
442020
Analysis of secure caches using a three-step model for timing-based attacks
S Deng, W Xiong, J Szefer
Journal of Hardware and Systems Security 3 (4), 397-425, 2019
332019
Cache timing side-channel vulnerability checking with computation tree logic
S Deng, W Xiong, J Szefer
Proceedings of the 7th International Workshop on Hardware and Architectural …, 2018
272018
Characterization of mpc-based private inference for transformer-based models
Y Wang, GE Suh, W Xiong, B Lefaudeux, B Knott, M Annavaram, ...
2022 IEEE International Symposium on Performance Analysis of Systems and …, 2022
252022
A benchmark suite for evaluating caches' vulnerability to timing attacks
S Deng, W Xiong, J Szefer
Proceedings of the Twenty-Fifth International Conference on Architectural …, 2020
252020
Survey of transient execution attacks
W Xiong, J Szefer
arXiv preprint arXiv:2005.13435, 2020
242020
Cocktail party attack: Breaking aggregation-based privacy in federated learning using independent component analysis
S Kariyappa, C Guo, K Maeng, W Xiong, GE Suh, MK Qureshi, HHS Lee
International Conference on Machine Learning, 15884-15899, 2023
222023
Intrinsic run-time row hammer PUFs: Leveraging the row hammer effect for run-time cryptography and improved security
NA Anagnostopoulos, T Arul, Y Fan, C Hatzfeld, A Schaller, W Xiong, ...
Cryptography 2 (3), 13, 2018
222018
Cloud FPGA cartography using PCIe contention
S Tian, I Giechaskiel, W Xiong, J Szefer
2021 IEEE 29th Annual International Symposium on Field-Programmable Custom …, 2021
212021
Ultrahigh-Q, largely deformed microcavities coupled by a free-space laser beam
L Shao, L Wang, W Xiong, XF Jiang, QF Yang, YF Xiao
Applied Physics Letters 103 (12), 2013
212013
SecChisel framework for security verification of secure processor architectures
S Deng, D Gümüşoğlu, W Xiong, S Sari, YS Gener, C Lu, O Demir, ...
Proceedings of the 8th International Workshop on Hardware and Architectural …, 2019
202019
Survey of Approaches for Security Verification of Hardware/Software Systems.
O Demir, W Xiong, F Zaghloul, J Szefer
IACR Cryptol. ePrint Arch. 2016, 846, 2016
202016
Mpcvit: Searching for accurate and efficient mpc-friendly vision transformer with heterogeneous attention
W Zeng, M Li, W Xiong, T Tong, W Lu, J Tan, R Wang, R Huang
Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2023
192023
The system can't perform the operation now. Try again later.
Articles 1–20