default search action
Yingjie Lao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Jianchi Sun, Yingjie Lao:
Efficient Data Extraction Circuit for Posit Number System: LDD-Based Posit Decoder. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 43(6): 1919-1923 (2024) - [j18]Weihang Tan, Sin-Wei Chiu, Antian Wang, Yingjie Lao, Keshab K. Parhi:
PaReNTT: Low-Latency Parallel Residue Number System and NTT-Based Long Polynomial Modular Multiplication for Homomorphic Encryption. IEEE Trans. Inf. Forensics Secur. 19: 1646-1659 (2024) - [j17]Joseph Franklin Clements, Yingjie Lao:
Reliable Hardware Watermarks for Deep Learning Systems. IEEE Trans. Very Large Scale Integr. Syst. 32(4): 752-762 (2024) - [c52]Joseph Clements, Yingjie Lao:
Resource Efficient Deep Learning Hardware Watermarks with Signature Alignment. AAAI 2024: 11651-11659 - [c51]Nguyen Hung-Quang, Yingjie Lao, Tung Pham, Kok-Seng Wong, Khoa D. Doan:
Understanding the Robustness of Randomized Feature Defense Against Query-Based Adversarial Attacks. ICLR 2024 - [c50]Weihang Tan, Yingjie Lao, Keshab K. Parhi:
Area-Efficient Matrix-Vector Polynomial Multiplication Architecture for ML-KEM Using Interleaving and Folding Transformation. ISCAS 2024: 1-5 - [i15]Bingyin Zhao, Zhiding Yu, Shiyi Lan, Yutao Cheng, Anima Anandkumar, Yingjie Lao, José M. Álvarez:
Fully Attentional Networks with Self-emerging Token Labeling. CoRR abs/2401.03844 (2024) - [i14]Duy C. Hoang, Hung T. Q. Le, Rui Chu, Ping Li, Weijie Zhao, Yingjie Lao, Khoa D. Doan:
Less is More: Sparse Watermarking in LLMs with Enhanced Text Quality. CoRR abs/2407.13803 (2024) - 2023
- [j16]Azadeh Famili, Yingjie Lao:
Deep Neural Network Quantization Framework for Effective Defense against Membership Inference Attacks. Sensors 23(18): 7722 (2023) - [j15]Weihang Tan, Antian Wang, Xinmiao Zhang, Yingjie Lao, Keshab K. Parhi:
High-Speed VLSI Architectures for Modular Polynomial Multiplication via Fast Filtering and Applications to Lattice-Based Cryptography. IEEE Trans. Computers 72(9): 2454-2466 (2023) - [j14]Bingyin Zhao, Ling Qiu, Yingjie Lao:
Data-Driven Feature Selection Framework for Approximate Circuit Design. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 42(11): 3519-3531 (2023) - [c49]Khoa D. Doan, Yingjie Lao, Peng Yang, Ping Li:
Defending Backdoor Attacks on Vision Transformer via Patch Processing. AAAI 2023: 506-515 - [c48]Antian Wang, Yingjie Lao:
Homomorphic Evaluation Friendly Vision Transformer Design. ACSSC 2023: 7-10 - [c47]Jinwei Liu, Yingjie Lao, Ying Mao, Rajkumar Buyya:
Sailfish: A Dependency-Aware and Resource Efficient Scheduling for Low Latency in Clouds. IEEE Big Data 2023: 237-246 - [c46]Antian Wang, Bingyin Zhao, Weihang Tan, Yingjie Lao:
NNTesting: Neural Network Fault Attacks Detection Using Gradient-Based Test Vector Generation. DAC 2023: 1-6 - [c45]Weihang Tan, Yingjie Lao, Keshab K. Parhi:
KyberMat: Efficient Accelerator for Matrix-Vector Polynomial Multiplication in CRYSTALS-Kyber Scheme via NTT and Polyphase Decomposition. ICCAD 2023: 1-9 - [c44]Bingyin Zhao, Zhiding Yu, Shiyi Lan, Yutao Cheng, Anima Anandkumar, Yingjie Lao, José M. Álvarez:
Fully Attentional Networks with Self-emerging Token Labeling. ICCV 2023: 5562-5572 - [c43]Huawei Lin, Jun Woo Chung, Yingjie Lao, Weijie Zhao:
Machine Unlearning in Gradient Boosting Decision Trees. KDD 2023: 1374-1383 - [i13]Weihang Tan, Sin-Wei Chiu, Antian Wang, Yingjie Lao, Keshab K. Parhi:
PaReNTT: Low-Latency Parallel Residue Number System and NTT-Based Long Polynomial Modular Multiplication for Homomorphic Encryption. CoRR abs/2303.02237 (2023) - [i12]Quang H. Nguyen, Yingjie Lao, Tung Pham, Kok-Seng Wong, Khoa D. Doan:
Understanding the Robustness of Randomized Feature Defense Against Query-Based Adversarial Attacks. CoRR abs/2310.00567 (2023) - [i11]Weihang Tan, Yingjie Lao, Keshab K. Parhi:
KyberMat: Efficient Accelerator for Matrix-Vector Polynomial Multiplication in CRYSTALS-Kyber Scheme via NTT and Polyphase Decomposition. CoRR abs/2310.04618 (2023) - [i10]Bingyin Zhao, Yingjie Lao:
UltraClean: A Simple Framework to Train Robust Neural Networks against Backdoor Attacks. CoRR abs/2312.10657 (2023) - 2022
- [j13]Jianchi Sun, Nikhilesh Sharma, Jacob Chakareski, Nicholas Mastronarde, Yingjie Lao:
Hardware Acceleration for Postdecision State Reinforcement Learning in IoT Systems. IEEE Internet Things J. 9(12): 9889-9903 (2022) - [c42]Joseph Clements, Yingjie Lao:
DeepHardMark: Towards Watermarking Neural Network Hardware. AAAI 2022: 4450-4458 - [c41]Bingyin Zhao, Yingjie Lao:
CLPA: Clean-Label Poisoning Availability Attacks Using Generative Adversarial Nets. AAAI 2022: 9162-9170 - [c40]Yingjie Lao, Weijie Zhao, Peng Yang, Ping Li:
DeepAuth: A DNN Authentication Framework by Model-Unique and Fragile Signature Embedding. AAAI 2022: 9595-9603 - [c39]Faysal Hossain Shezan, Yingjie Lao, Minlong Peng, Xin Wang, Mingming Sun, Ping Li:
NL2GDPR: Automatically Develop GDPR Compliant Android Application Features from Natural Language. CNS 2022: 1-9 - [c38]Antian Wang, Weihang Tan, Keshab K. Parhi, Yingjie Lao:
Integral Sampler and Polynomial Multiplication Architecture for Lattice-based Cryptography. DFT 2022: 1-6 - [c37]Joseph Clements, Yingjie Lao:
In Pursuit of Preserving the Fidelity of Adversarial Images. ICASSP 2022: 2859-2863 - [c36]Yingjie Lao, Peng Yang, Weijie Zhao, Ping Li:
Identification for Deep Neural Network: Simply Adjusting Few Weights! ICDE 2022: 1328-1341 - [c35]Charles Kowalski, Azadeh Famili, Yingjie Lao:
Towards Model Quantization on the Resilience Against Membership Inference Attacks. ICIP 2022: 3646-3650 - [c34]Azadeh Famili, Yingjie Lao:
Genetic-based Joint Dynamic Pruning and Learning Algorithm to Boost DNN Performance. ICPR 2022: 2100-2106 - [c33]Weijie Zhao, Yingjie Lao, Ping Li:
Integrity Authentication in Tree Models. KDD 2022: 2585-2593 - [c32]Khoa D. Doan, Yingjie Lao, Ping Li:
Marksman Backdoor: Backdoor Attacks with Arbitrary Target Class. NeurIPS 2022 - [c31]Bingyin Zhao, Yingjie Lao:
Towards Class-Oriented Poisoning Attacks Against Neural Networks. WACV 2022: 2244-2253 - [i9]Weijie Zhao, Yingjie Lao, Ping Li:
Integrity Authentication in Tree Models. CoRR abs/2205.15444 (2022) - [i8]Khoa D. Doan, Yingjie Lao, Peng Yang, Ping Li:
Defending Backdoor Attacks on Vision Transformer via Patch Processing. CoRR abs/2206.12381 (2022) - [i7]Faysal Hossain Shezan, Yingjie Lao, Minlong Peng, Xin Wang, Mingming Sun, Ping Li:
NL2GDPR: Automatically Develop GDPR Compliant Android Application Features from Natural Language. CoRR abs/2208.13361 (2022) - [i6]Antian Wang, Weihang Tan, Keshab K. Parhi, Yingjie Lao:
Integral Sampler and Polynomial Multiplication Architecture for Lattice-based Cryptography. CoRR abs/2208.14270 (2022) - [i5]Khoa D. Doan, Yingjie Lao, Ping Li:
Marksman Backdoor: Backdoor Attacks with Arbitrary Target Class. CoRR abs/2210.09194 (2022) - 2021
- [j12]Antian Wang, Weihang Tan, Yuejiang Wen, Yingjie Lao:
NoPUF: A Novel PUF Design Framework Toward Modeling Attack Resistant PUFs. IEEE Trans. Circuits Syst. I Regul. Pap. 68(6): 2508-2521 (2021) - [j11]Weihang Tan, Benjamin M. Case, Antian Wang, Shuhong Gao, Yingjie Lao:
High-Speed Modular Multiplier for Lattice-Based Cryptosystems. IEEE Trans. Circuits Syst. II Express Briefs 68(8): 2927-2931 (2021) - [j10]Weihang Tan, Benjamin M. Case, Gengran Hu, Shuhong Gao, Yingjie Lao:
An Ultra-Highly Parallel Polynomial Multiplier for the Bootstrapping Algorithm in a Fully Homomorphic Encryption Scheme. J. Signal Process. Syst. 93(6): 643-656 (2021) - [c30]Weihang Tan, Antian Wang, Yingjie Lao, Xinmiao Zhang, Keshab K. Parhi:
Pipelined High-Throughput NTT Architecture for Lattice-Based Cryptography. AsianHOST 2021: 1-4 - [c29]Khoa D. Doan, Yingjie Lao, Weijie Zhao, Ping Li:
LIRA: Learnable, Imperceptible and Robust Backdoor Attacks. ICCV 2021: 11946-11956 - [c28]Peng Yang, Yingjie Lao, Ping Li:
Robust Watermarking for Deep Neural Networks via Bi-level Optimization. ICCV 2021: 14821-14830 - [c27]Khoa D. Doan, Yingjie Lao, Ping Li:
Backdoor Attack with Imperceptible Input and Latent Modification. NeurIPS 2021: 18944-18957 - [c26]Joseph Clements, Yuzhe Yang, Ankur A Sharma, Hongxin Hu, Yingjie Lao:
Rallying Adversarial Techniques against Deep Learning for Network Security. SSCI 2021: 1-8 - [i4]Weihang Tan, Antian Wang, Yingjie Lao, Xinmiao Zhang, Keshab K. Parhi:
Low-Latency VLSI Architectures for Modular Polynomial Multiplication via Fast Filtering and Applications to Lattice-Based Cryptography. CoRR abs/2110.12127 (2021) - 2020
- [j9]Yunhao Xu, Yingjie Lao, Weiqiang Liu, Zaichen Zhang, Xiaohu You, Chuan Zhang:
Mathematical Modeling Analysis of Strong Physical Unclonable Functions. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(12): 4426-4438 (2020) - [c25]Weihang Tan, Antian Wang, Yunhao Xu, Yingjie Lao:
Area-Efficient Pipelined VLSI Architecture for Polar Decoder. ISVLSI 2020: 352-357 - [c24]Jianchi Sun, Nikhilesh Sharma, Jacob Chakareski, Nicholas Mastronarde, Yingjie Lao:
Action Evaluation Hardware Accelerator for Next-Generation Real-Time Reinforcement Learning in Emerging IoT Systems. ISVLSI 2020: 428-433 - [i3]Bingyin Zhao, Yingjie Lao:
Class-Oriented Poisoning Attack. CoRR abs/2008.00047 (2020)
2010 – 2019
- 2019
- [j8]Xinmiao Zhang, Yingjie Lao:
On the Construction of Composite Finite Fields for Hardware Obfuscation. IEEE Trans. Computers 68(9): 1353-1364 (2019) - [c23]Yunhao Xu, Yingjie Lao, Weiqiang Liu, Chuan Zhang:
Security Analysis and Modeling Attacks on Duty Cycle Multiplexer PUF. ASICON 2019: 1-4 - [c22]Joseph Clements, Yingjie Lao:
Hardware Trojan Design on Neural Networks. ISCAS 2019: 1-5 - [c21]Ankur A Sharma, Xinmiao Zhang, Yingjie Lao:
Hardware Obfuscation Through Reconfiguration Finite Field Arithmetic Units. ISCAS 2019: 1-5 - [c20]Ling Qiu, Ziji Zhang, Jon Calhoun, Yingjie Lao:
Towards Data-Driven Approximate Circuit Design. ISVLSI 2019: 397-402 - [c19]Weihang Tan, Aengran Au, Benjamin Aase, Shuhong Aao, Yingjie Lao:
An Efficient Polynomial Multiplier Architecture for the Bootstrapping Algorithm in a Fully Homomorphic Encryption Scheme. SiPS 2019: 85-90 - [i2]Joseph Clements, Yuzhe Yang, Ankur A Sharma, Hongxin Hu, Yingjie Lao:
Rallying Adversarial Techniques against Deep Learning for Network Security. CoRR abs/1903.11688 (2019) - 2018
- [j7]Yingjie Lao, Keshab K. Parhi:
Canonic Composite Length Real-Valued FFT. J. Signal Process. Syst. 90(10): 1401-1414 (2018) - [c18]Kai Sun, Yifei Shen, Yingjie Lao, Zaichen Zhang, Xiaohu You, Chuan Zhang:
A New Error Correction Scheme for Physical Unclonable Function. APCCAS 2018: 374-377 - [c17]Joseph Clements, Yingjie Lao:
Backdoor Attacks on Neural Network Operations. GlobalSIP 2018: 1154-1158 - [c16]Ling Qiu, Yingjie Lao:
A Systematic Method for Approximate Circuit Design Using Feature Selection. ISCAS 2018: 1-5 - [c15]Yuejiang Wen, Yingjie Lao:
PUF Modeling Attack using Active Learning. ISCAS 2018: 1-5 - [c14]Bingyin Zhao, Yingjie Lao:
Resilience of Pruned Neural Network Against Poisoning Attack. MALWARE 2018: 78-83 - [c13]Xiaojia Wang, Yingjie Lao:
Utilizing Inherent Randomness in Stochastic Computing. MWSCAS 2018: 1-4 - [c12]Yuejiang Wen, Yingjie Lao:
Efficient PUF Error Correction through Response Weighting. MWSCAS 2018: 849-852 - [i1]Joseph Clements, Yingjie Lao:
Hardware Trojan Attacks on Neural Networks. CoRR abs/1806.05768 (2018) - 2017
- [j6]Yingjie Lao, Keshab K. Parhi:
Canonic FFT flow graphs for real-valued even/odd symmetric inputs. EURASIP J. Adv. Signal Process. 2017: 45 (2017) - [j5]Yingjie Lao, Bo Yuan, Chris H. Kim, Keshab K. Parhi:
Reliable PUF-Based Local Authentication With Self-Correction. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 36(2): 201-213 (2017) - [c11]Yunhao Xu, Yingjie Lao, Weiqiang Liu, Xiaohu You, Chuan Zhang:
DC MUX PUF: A highly reliable feed-back MUX PUF based on measuring duty cycle. ASICON 2017: 883-886 - [c10]Yuejiang Wen, Yingjie Lao:
Enhancing PUF reliability by machine learning. ISCAS 2017: 1-4 - [c9]Yuejiang Wen, Yingjie Lao:
Efficient fuzzy extractor implementations for PUF based authentication. MALWARE 2017: 119-125 - 2016
- [j4]Yingjie Lao, Qianying Tang, Chris H. Kim, Keshab K. Parhi:
Beat Frequency Detector-Based High-Speed True Random Number Generators: Statistical Modeling and Analysis. ACM J. Emerg. Technol. Comput. Syst. 13(1): 9:1-9:25 (2016) - [c8]S. V. Sandeep Avvaru, Chen Zhou, Saroj Satapathy, Yingjie Lao, Chris H. Kim, Keshab K. Parhi:
Estimating delay differences of arbiter PUFs using silicon data. DATE 2016: 543-546 - [c7]Chen Zhou, Saroj Satapathy, Yingjie Lao, Keshab K. Parhi, Chris H. Kim:
Soft Response Generation and Thresholding Strategies for Linear and Feed-Forward MUX PUFs. ISLPED 2016: 124-129 - [c6]Yingjie Lao, Keshab K. Parhi:
Data-Canonic Real FFT Flow-Graphs for Composite Lengths. SiPS 2016: 189-194 - 2015
- [j3]Yingjie Lao, Keshab K. Parhi:
Obfuscating DSP Circuits via High-Level Transformations. IEEE Trans. Very Large Scale Integr. Syst. 23(5): 819-830 (2015) - [c5]Yingjie Lao, Keshab K. Parhi:
Canonic real-valued radix-2n FFT computations. ACSSC 2015: 441-446 - [c4]Goutham N. C. Shanmugam, Yingjie Lao, Keshab K. Parhi:
An obfuscated radix-2 real FFT architecture. ICASSP 2015: 1056-1060 - 2014
- [j2]Yingjie Lao, Keshab K. Parhi:
Statistical Analysis of MUX-Based Physical Unclonable Functions. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 33(5): 649-662 (2014) - [c3]Megha Parhi, Yingjie Lao, Keshab K. Parhi:
Canonic real-valued FFT structures. ACSSC 2014: 1261-1265 - [c2]Qianying Tang, Bongjin Kim, Yingjie Lao, Keshab K. Parhi, Chris H. Kim:
True Random Number Generator circuits based on single- and multi-phase beat frequency detection. CICC 2014: 1-4 - [c1]Yingjie Lao, Keshab K. Parhi:
Protecting DSP circuits through obfuscation. ISCAS 2014: 798-801 - 2013
- [j1]Manohar Ayinala, Yingjie Lao, Keshab K. Parhi:
An In-Place FFT Architecture for Real-Valued Signals. IEEE Trans. Circuits Syst. II Express Briefs 60-II(10): 652-656 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-14 00:53 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint