default search action
Fan Yao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c53]Md Hafizul Islam Chowdhuryy, Zhenkai Zhang, Fan Yao:
PowSpectre: Powering Up Speculation Attacks with TSX-based Replay. AsiaCCS 2024 - [c52]Fan Yao, Chuanhao Li, Denis Nekipelov, Hongning Wang, Haifeng Xu:
Human vs. Generative AI in Content Creation Competition: Symbiosis or Conflict? ICML 2024 - [c51]Md Hafizul Islam Chowdhuryy, Hao Zheng, Fan Yao:
MetaLeak: Uncovering Side Channels in Secure Processor Architectures Exploiting Metadata. ISCA 2024: 693-707 - [c50]Fan Yao, Yiming Liao, Mingzhe Wu, Chuanhao Li, Yan Zhu, James Yang, Jingzhou Liu, Qifan Wang, Haifeng Xu, Hongning Wang:
User Welfare Optimization in Recommender Systems with Competing Content Creators. KDD 2024: 3874-3885 - [c49]Kunbei Cai, Md Hafizul Islam Chowdhuryy, Zhenkai Zhang, Fan Yao:
DeepVenom: Persistent DNN Backdoors Exploiting Transient Weight Perturbations in Memories. SP 2024: 2067-2085 - [c48]Zhenkai Zhang, Kunbei Cai, Yanan Guo, Fan Yao, Xing Gao:
Invalidate+Compare: A Timer-Free GPU Cache Attack Primitive. USENIX Security Symposium 2024 - [i20]Fan Yao, Chuanhao Li, Denis Nekipelov, Hongning Wang, Haifeng Xu:
Human vs. Generative AI in Content Creation Competition: Symbiosis or Conflict? CoRR abs/2402.15467 (2024) - [i19]Fan Yao, Yiming Liao, Mingzhe Wu, Chuanhao Li, Yan Zhu, James Yang, Qifan Wang, Haifeng Xu, Hongning Wang:
User Welfare Optimization in Recommender Systems with Competing Content Creators. CoRR abs/2404.18319 (2024) - [i18]Yuwei Cheng, Fan Yao, Xuefeng Liu, Haifeng Xu:
Learning from Imperfect Human Feedback: a Tale from Corruption-Robust Dueling. CoRR abs/2405.11204 (2024) - 2023
- [j15]Ravi Sundaram, Anil Vullikanti, Haifeng Xu, Fan Yao:
PAC-learning for Strategic Classification. J. Mach. Learn. Res. 24: 192:1-192:38 (2023) - [j14]Md Hafizul Islam Chowdhuryy, Rickard Ewetz, Amro Awad, Fan Yao:
Understanding and Characterizing Side Channels Exploiting Phase-Change Memories. IEEE Micro 43(5): 8-15 (2023) - [j13]Muhammad Rashedul Haq Rashed, Sven Thijssen, Sumit Kumar Jha, Fan Yao, Rickard Ewetz:
STREAM: Toward READ-Based In-Memory Computing for Streaming-Based Processing for Data-Intensive Applications. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 42(11): 3854-3867 (2023) - [c47]Zhenkai Zhang, Tyler N. Allen, Fan Yao, Xing Gao, Rong Ge:
TunneLs for Bootlegging: Fully Reverse-Engineering GPU TLBs for Challenging Isolation Guarantees of NVIDIA MIG. CCS 2023: 960-974 - [c46]Md Hafizul Islam Chowdhuryy, Myoungsoo Jung, Fan Yao, Amro Awad:
D-Shield: Enabling Processor-side Encryption and Integrity Verification for Secure NVMe Drives. HPCA 2023: 908-921 - [c45]Md Hafizul Islam Chowdhuryy, Zhenkai Zhang, Fan Yao:
BeKnight: Guarding Against Information Leakage in Speculatively Updated Branch Predictors. ICCAD 2023: 1-9 - [c44]Fan Yao, Chuanhao Li, Denis Nekipelov, Hongning Wang, Haifeng Xu:
How Bad is Top-K Recommendation under Competing Content Creators? ICML 2023: 39674-39701 - [c43]Mujahid Al Rafi, Yuan Feng, Fan Yao, Meng Tang, Hyeran Jeon:
Decepticon: Attacking Secrets of Transformers. IISWC 2023: 128-139 - [c42]Fan Yao, Chuanhao Li, Karthik Abinav Sankararaman, Yiming Liao, Yan Zhu, Qifan Wang, Hongning Wang, Haifeng Xu:
Rethinking Incentives in Recommender Systems: Are Monotone Rewards Always Beneficial? NeurIPS 2023 - [c41]Mingzhe Wu, Fan Yao, Hongning Wang:
An End-to-End Solution for Spatial Inference in Smart Buildings. BuildSys@SenSys 2023: 110-119 - [i17]Fan Yao, Chuanhao Li, Denis Nekipelov, Hongning Wang, Haifeng Xu:
How Bad is Top-K Recommendation under Competing Content Creators? CoRR abs/2302.01971 (2023) - [i16]Fan Yao, Chuanhao Li, Karthik Abinav Sankararaman, Yiming Liao, Yan Zhu, Qifan Wang, Hongning Wang, Haifeng Xu:
Rethinking Incentives in Recommender Systems: Are Monotone Rewards Always Beneficial? CoRR abs/2306.07893 (2023) - [i15]Erdem Biyik, Fan Yao, Yinlam Chow, Alex Haig, Chih-Wei Hsu, Mohammad Ghavamzadeh, Craig Boutilier:
Preference Elicitation with Soft Attributes in Interactive Recommendation. CoRR abs/2311.02085 (2023) - 2022
- [j12]Adnan Siraj Rakin, Zhezhi He, Jingtao Li, Fan Yao, Chaitali Chakrabarti, Deliang Fan:
T-BFA: Targeted Bit-Flip Adversarial Weight Attack. IEEE Trans. Pattern Anal. Mach. Intell. 44(11): 7928-7939 (2022) - [j11]Md Hafizul Islam Chowdhuryy, Fan Yao:
Leaking Secrets Through Modern Branch Predictors in the Speculative World. IEEE Trans. Computers 71(9): 2059-2072 (2022) - [c40]Fan Yao, Chuanhao Li, Denis Nekipelov, Hongning Wang, Haifeng Xu:
Learning the Optimal Recommendation from Explorative Users. AAAI 2022: 9457-9465 - [c39]Muhammad Rashedul Haq Rashed, Sven Thijssen, Sumit Kumar Jha, Fan Yao, Rickard Ewetz:
STREAM: Towards READ-based In-Memory Computing for Streaming based Data Processing. ASP-DAC 2022: 690-695 - [c38]Jibang Wu, Haifeng Xu, Fan Yao:
Multi-Agent Learning for Iterative Dominance Elimination: Formal Barriers and New Algorithms. COLT 2022: 543 - [c37]Muhammad Rashedul Haq Rashed, Sumit Kumar Jha, Fan Yao, Rickard Ewetz:
Hybrid Digital-Digital In-Memory Computing. DATE 2022: 1177-1180 - [c36]Mert Side, Fan Yao, Zhenkai Zhang:
LockedDown: Exploiting Contention on Host-GPU PCIe Bus for Fun and Profit. EuroS&P 2022: 270-285 - [c35]Kunbei Cai, Zhenkai Zhang, Fan Yao:
On the Feasibility of Training-time Trojan Attacks through Hardware-based Faults in Memory. HOST 2022: 133-136 - [c34]Fan Yao, Chuanhao Li, Denis Nekipelov, Hongning Wang, Haifeng Xu:
Learning from a Learning User for Optimal Recommendations. ICML 2022: 25382-25406 - [c33]Haiying Shen, Fan Yao, Tanmoy Sen, Gustavo Moreira, Ankur Sarker:
Query-Efficient and Imperceptible Attacks on Multivariate Time Series DNN Models. IFIP Networking 2022: 1-9 - [c32]Sisheng Liang, Zihao Zhan, Fan Yao, Long Cheng, Zhenkai Zhang:
Clairvoyance: Exploiting Far-field EM Emanations of GPU to "See" Your DNN Models through Obstacles at a Distance. SP (Workshops) 2022: 312-322 - [c31]Adnan Siraj Rakin, Md Hafizul Islam Chowdhuryy, Fan Yao, Deliang Fan:
DeepSteal: Advanced Model Extractions Leveraging Efficient Weight Stealing in Memories. SP 2022: 1157-1174 - [c30]Zihao Zhan, Zhenkai Zhang, Sisheng Liang, Fan Yao, Xenofon D. Koutsoukos:
Graphics Peeping Unit: Exploiting EM Side-Channel Information of GPUs to Eavesdrop on Your Neighbors. SP 2022: 1440-1457 - [i14]Fan Yao, Chuanhao Li, Denis Nekipelov, Hongning Wang, Haifeng Xu:
Learning from a Learning User for Optimal Recommendations. CoRR abs/2202.01879 (2022) - 2021
- [j10]Hongyu Fang, Sai Santosh Dayapule, Fan Yao, Milos Doroslovacki, Guru Venkataramani:
Defeating Cache Timing Channels with Hardware Prefetchers. IEEE Des. Test 38(3): 7-14 (2021) - [c29]Zhenkai Zhang, Sisheng Liang, Fan Yao, Xing Gao:
Red Alert for Power Leakage: Exploiting Intel RAPL-Induced Side Channels. AsiaCCS 2021: 162-175 - [c28]Ravi Sundaram, Anil Vullikanti, Haifeng Xu, Fan Yao:
PAC-Learning for Strategic Classification. ICML 2021: 9978-9988 - [c27]Joachim Gudmundsson, Yuan Sha, Fan Yao:
Augmenting Graphs to Minimize the Radius. ISAAC 2021: 45:1-45:20 - [c26]Md Hafizul Islam Chowdhuryy, Muhammad Rashedul Haq Rashed, Amro Awad, Rickard Ewetz, Fan Yao:
LADDER: Architecting Content and Location-aware Writes for Crossbar Resistive Memories. MICRO 2021: 117-130 - [c25]Md Hafizul Islam Chowdhuryy, Rickard Ewetz, Amro Awad, Fan Yao:
Seeds of SEED: R-SAW: New Side Channels Exploiting Read Asymmetry in MLC Phase Change Memories. SEED 2021: 22-28 - [c24]Kunbei Cai, Md Hafizul Islam Chowdhuryy, Zhenkai Zhang, Fan Yao:
Seeds of SEED: NMT-Stroke: Diverting Neural Machine Translation through Hardware-based Faults. SEED 2021: 76-82 - [i13]Fan Yao, Renqin Cai, Hongning Wang:
Reversible Action Design for Combinatorial Optimization with Reinforcement Learning. CoRR abs/2102.07210 (2021) - [i12]Adnan Siraj Rakin, Li Yang, Jingtao Li, Fan Yao, Chaitali Chakrabarti, Yu Cao, Jae-sun Seo, Deliang Fan:
RA-BNN: Constructing Robust & Accurate Binary Neural Network to Simultaneously Defend Adversarial Bit-Flip Attack and Improve Accuracy. CoRR abs/2103.13813 (2021) - [i11]Md Hafizul Islam Chowdhuryy, Fan Yao:
Leaking Secrets through Modern Branch Predictor in the Speculative World. CoRR abs/2107.09833 (2021) - [i10]Fan Yao, Chuanhao Li, Denis Nekipelov, Hongning Wang, Haifeng Xu:
Learning the Optimal Recommendation from Explorative Users. CoRR abs/2110.03068 (2021) - [i9]Adnan Siraj Rakin, Md Hafizul Islam Chowdhuryy, Fan Yao, Deliang Fan:
DeepSteal: Advanced Model Extractions Leveraging Efficient Weight Stealing in Memories. CoRR abs/2111.04625 (2021) - [i8]Jibang Wu, Haifeng Xu, Fan Yao:
Multi-Agent Learning for Iterative Dominance Elimination: Formal Barriers and New Algorithms. CoRR abs/2111.05486 (2021) - 2020
- [j9]Hongyu Fang, Sai Santosh Dayapule, Fan Yao, Milos Doroslovacki, Guru Venkataramani:
Cache-Zoomer: On-demand High-resolution Cache Monitoring for Security. J. Hardw. Syst. Secur. 4(3): 180-195 (2020) - [j8]Fan Yao:
Thangka Image Inpainting Algorithm Based on Wavelet Transform and Structural Constraints. J. Inf. Process. Syst. 16(5): 1129-1144 (2020) - [c23]Md Hafizul Islam Chowdhuryy, Hang Liu, Fan Yao:
BranchSpec: Information Leakage Attacks Exploiting Speculative Branch Instruction Executions. ICCD 2020: 529-536 - [c22]Ankur Sarker, Fan Yao, Haiying Shen, Huiying Zhao, Haoran Zhu, Haroon Lone, Laura Barnes, Brad Campbell, Mitchel Rosen:
Deep Learning Based Prediction Towards Designing A Smart Building Assistant System. MASS 2020: 202-210 - [c21]Zhishan Guo, Kecheng Yang, Fan Yao, Amro Awad:
Inter-task cache interference aware partitioned real-time scheduling. SAC 2020: 218-226 - [c20]Fan Yao, Adnan Siraj Rakin, Deliang Fan:
DeepHammer: Depleting the Intelligence of Deep Neural Networks through Targeted Chain of Bit Flips. USENIX Security Symposium 2020: 1463-1480 - [i7]Fan Yao, Adnan Siraj Rakin, Deliang Fan:
DeepHammer: Depleting the Intelligence of Deep Neural Networks through Targeted Chain of Bit Flips. CoRR abs/2003.13746 (2020) - [i6]Adnan Siraj Rakin, Zhezhi He, Jingtao Li, Fan Yao, Chaitali Chakrabarti, Deliang Fan:
T-BFA: Targeted Bit-Flip Adversarial Weight Attack. CoRR abs/2007.12336 (2020) - [i5]Ravi Sundaram, Anil Vullikanti, Haifeng Xu, Fan Yao:
PAC-Learning for Strategic Classification. CoRR abs/2012.03310 (2020)
2010 – 2019
- 2019
- [j7]Vamsee Reddy Kommareddy, Baogang Zhang, Fan Yao, Rickard Ewetz, Amro Awad:
Are Crossbar Memories Secure? New Security Vulnerabilities in Crossbar Memories. IEEE Comput. Archit. Lett. 18(2): 174-177 (2019) - [j6]Fan Yao:
Damaged region filling by improved criminisi image inpainting algorithm for thangka. Clust. Comput. 22(6): 13683-13691 (2019) - [j5]Hongyu Fang, Sai Santosh Dayapule, Fan Yao, Milos Doroslovacki, Guru Venkataramani:
PrODACT: Prefetch-Obfuscator to Defend Against Cache Timing Channels. Int. J. Parallel Program. 47(4): 571-594 (2019) - [j4]Fan Yao, Milos Doroslovacki, Guru Venkataramani:
Covert Timing Channels Exploiting Cache Coherence Hardware: Characterization and Defense. Int. J. Parallel Program. 47(4): 595-620 (2019) - [j3]Fan Yao, Hongyu Fang, Milos Doroslovacki, Guru Venkataramani:
Leveraging Cache Management Hardware for Practical Defense Against Cache Timing Channel Attacks. IEEE Micro 39(4): 8-16 (2019) - [j2]Fan Yao, Jingxin Wu, Guru Venkataramani, Suresh Subramaniam:
TS-BatPro: Improving Energy Efficiency in Data Centers by Leveraging Temporal-Spatial Batching. IEEE Trans. Green Commun. Netw. 3(1): 236-249 (2019) - [c19]Sai Santosh Dayapule, Fan Yao, Guru Venkataramani:
PowerStar: Improving Power Efficiency in Heterogenous Processors for Bursty Workloads with Approximate Computing. CloudCom 2019: 175-182 - [c18]Fan Yao, Hongyu Fang, Milos Doroslovacki, Guru Venkataramani:
COTSknight: Practical Defense against Cache Timing Channel Attacks using Cache Monitoring and Partitioning Technologies. HOST 2019: 121-130 - [c17]Anil Gaihre, Zhenlin Wu, Fan Yao, Hang Liu:
XBFS: eXploring Runtime Optimizations for Breadth-First Search on GPUs. HPDC 2019: 121-131 - [c16]Hongyu Fang, Fan Yao, Milos Doroslovacki, Guru Venkataramani:
Negative Correlation, Non-linear Filtering, and Discovering of Repetitiveness for Cache Timing Channel Detection. ICASSP 2019: 2522-2526 - [c15]Fan Yao, Kathy Ngyugen, Sai Santosh Dayapule, Jingxin Wu, Bingqian Lu, Suresh Subramaniam, Guru Venkataramani:
HolDCSim: A Holistic Simulator for Data Centers. IISWC 2019: 239-242 - [i4]Fan Yao, Guru Venkataramani:
Architecting Non-Volatile Main Memory to Guard Against Persistence-based Attacks. CoRR abs/1902.03518 (2019) - [i3]Fan Yao, Hongyu Fang, Milos Doroslovacki, Guru Venkataramani:
Towards a Better Indicator for Cache Timing Channels. CoRR abs/1902.04711 (2019) - [i2]Fan Yao, Kathy Ngyugen, Sai Santosh Dayapule, Jingxin Wu, Bingqian Liu, Suresh Subramaniam, Guru Venkataramani:
HolDCSim: A Holistic Simulator for Data Centers. CoRR abs/1909.13548 (2019) - 2018
- [c14]Hongyu Fang, Sai Santosh Dayapule, Fan Yao, Milos Doroslovacki, Guru Venkataramani:
A Noise-resilient Detection Method against Advanced Cache Timing Channel Attack. ACSSC 2018: 237-241 - [c13]Hongyu Fang, Sai Santosh Dayapule, Fan Yao, Milos Doroslovacki, Guru Venkataramani:
Prefetch-guard: Leveraging hardware prefetches to defend against cache timing channels. HOST 2018: 187-190 - [c12]Fan Yao, Milos Doroslovacki, Guru Venkataramani:
Are Coherence Protocol States Vulnerable to Information Leakage? HPCA 2018: 168-179 - [c11]Bingqian Lu, Sai Santosh Dayapule, Fan Yao, Jingxin Wu, Guru Venkataramani, Suresh Subramaniam:
PopCorns: Power Optimization Using a Cooperative Network-Server Approach for Data Centers. ICCCN 2018: 1-9 - 2017
- [c10]Fan Yao, Jingxin Wu, Suresh Subramaniam, Guru Venkataramani:
WASP: Workload Adaptive Energy-Latency Optimization in Server Farms Using Server Low-Power States. CLOUD 2017: 171-178 - [c9]Fan Yao, Yongbo Li, Yurong Chen, Hongfa Xue, Tian Lan, Guru Venkataramani:
StatSym: Vulnerable Path Discovery through Statistics-Guided Symbolic Execution. DSN 2017: 109-120 - [c8]Fan Yao, Jingxin Wu, Guru Venkataramani, Suresh Subramaniam:
TS-Bat: Leveraging Temporal-Spatial Batching for Data Center Energy Optimization. GLOBECOM 2017: 1-6 - [c7]Fan Yao, Guru Venkataramani, Milos Doroslovacki:
Covert Timing Channels Exploiting Non-Uniform Memory Access based Architectures. ACM Great Lakes Symposium on VLSI 2017: 155-160 - [c6]Hongfa Xue, Yurong Chen, Fan Yao, Yongbo Li, Tian Lan, Guru Venkataramani:
SIMBER: Eliminating Redundant Memory Bound Checks via Statistical Inference. SEC 2017: 413-426 - 2016
- [j1]Yongbo Li, Fan Yao, Tian Lan, Guru Venkataramani:
SARRE: Semantics-Aware Rule Recommendation and Enforcement for Event Paths on Android. IEEE Trans. Inf. Forensics Secur. 11(12): 2748-2762 (2016) - [i1]Xiatian Zhang, Fan Yao, Yongjun Tian:
Greedy Step Averaging: A parameter-free stochastic optimization method. CoRR abs/1611.03608 (2016) - 2015
- [c5]Fan Yao, Jingxin Wu, Guru Venkataramani, Suresh Subramaniam:
A Dual Delay Timer Strategy for Optimizing Server Farm Energy. CloudCom 2015: 258-265 - [c4]Yongbo Li, Fan Yao, Tian Lan, Guru Venkataramani:
POSTER: Semantics-Aware Rule Recommendation and Enforcement for Event Paths. SecureComm 2015: 572-576 - 2014
- [c3]Fan Yao, Jingxin Wu, Guru Venkataramani, Suresh Subramaniam:
A comparative analysis of data center network architectures. ICC 2014: 3106-3111 - 2013
- [c2]Jie Chen, Fan Yao, Guru Venkataramani:
Watts-inside: A hardware-software cooperative approach for Multicore Power Debugging. ICCD 2013: 335-342 - [c1]Fan Yao, Jie Chen, Guru Venkataramani:
JOP-alarm: Detecting jump-oriented programming-based anomalies in applications. ICCD 2013: 467-470
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint