Follow
Fan Yao
Title
Cited by
Cited by
Year
DeepHammer: Depleting the intelligence of deep neural networks through targeted chain of bit flips
F Yao, AS Rakin, D Fan
29th USENIX Security Symposium (USENIX Security 20), 1463-1480, 2020
1252020
Are coherence protocol states vulnerable to information leakage?
F Yao, M Doroslovacki, G Venkataramani
2018 IEEE International Symposium on High Performance Computer Architecture …, 2018
1222018
A comparative analysis of data center network architectures
F Yao, J Wu, G Venkataramani, S Subramaniam
2014 IEEE International Conference on Communications (ICC), 3106-3111, 2014
772014
DeepSteal: Advanced Model Extractions Leveraging Efficient Weight Stealing in Memories
MHI Chowdhuryy, AS Rakin, F Yao, D Fan
2022 IEEE Symposium on Security and Privacy (SP), 1157-1174, 2022
622022
T-BFA: Targeted Bit-Flip Adversarial Weight Attack
AS Rakin, Z He, J Li, F Yao, C Chakrabarti, D Fan
IEEE Transactions on Pattern Analysis and Machine Intelligence 44 (11), 7928 …, 2021
622021
Prefetch-guard: Leveraging hardware prefetches to defend against cache timing channels
H Fang, SS Dayapule, F Yao, M Doroslovački, G Venkataramani
2018 IEEE International Symposium on Hardware Oriented Security and Trust …, 2018
462018
Covert timing channels exploiting non-uniform memory access based architectures
F Yao, G Venkataramani, M Doroslovački
Proceedings of the on Great Lakes Symposium on VLSI 2017, 155-160, 2017
462017
XBFS: eXploring runtime optimizations for breadth-first search on GPUs
A Gaihre, Z Wu, F Yao, H Liu
Proceedings of the 28th International symposium on high-performance parallel …, 2019
452019
Statsym: vulnerable path discovery through statistics-guided symbolic execution
F Yao, Y Li, Y Chen, H Xue, T Lan, G Venkataramani
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
432017
WASP: Workload adaptive energy-latency optimization in server farms using server low-power states
F Yao, J Wu, S Subramaniam, G Venkataramani
2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 171-178, 2017
402017
Jop-alarm: Detecting jump-oriented programming-based anomalies in applications
F Yao, J Chen, G Venkataramani
2013 IEEE 31st International Conference on Computer Design (ICCD), 467-470, 2013
382013
Simber: Eliminating redundant memory bound checks via statistical inference
H Xue, Y Chen, F Yao, Y Li, T Lan, G Venkataramani
ICT Systems Security and Privacy Protection: 32nd IFIP TC 11 International …, 2017
372017
Sarre: semantics-aware rule recommendation and enforcement for event paths on android
Y Li, F Yao, T Lan, G Venkataramani
IEEE Transactions on Information Forensics and Security 11 (12), 2748-2762, 2016
332016
Branchspec: Information leakage attacks exploiting speculative branch instruction executions
MHI Chowdhuryy, H Liu, F Yao
2020 IEEE 38th International Conference on Computer Design (ICCD), 529-536, 2020
252020
Prodact: Prefetch-obfuscator to defend against cache timing channels
H Fang, SS Dayapule, F Yao, M Doroslovački, G Venkataramani
International Journal of Parallel Programming 47, 571-594, 2019
232019
Cotsknight: Practical defense against cache timing channel attacks using cache monitoring and partitioning technologies
F Yao, H Fang, M Doroslovački, G Venkataramani
2019 IEEE International Symposium on Hardware Oriented Security and Trust …, 2019
212019
Covert timing channels exploiting cache coherence hardware: Characterization and defense
F Yao, M Doroslovački, G Venkataramani
International Journal of Parallel Programming 47, 595-620, 2019
202019
Ra-bnn: Constructing robust & accurate binary neural network to simultaneously defend adversarial bit-flip attack and improve accuracy
AS Rakin, L Yang, J Li, F Yao, C Chakrabarti, Y Cao, J Seo, D Fan
arXiv preprint arXiv:2103.13813, 2021
192021
Inter-task cache interference aware partitioned real-time scheduling
Z Guo, K Yang, F Yao, A Awad
Proceedings of the 35th annual ACM symposium on applied computing, 218-226, 2020
182020
Graphics peeping unit: Exploiting em side-channel information of gpus to eavesdrop on your neighbors
Z Zhan, Z Zhang, S Liang, F Yao, X Koutsoukos
2022 IEEE Symposium on Security and Privacy (SP), 1440-1457, 2022
162022
The system can't perform the operation now. Try again later.
Articles 1–20