default search action
Yukui Luo
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c24]Yukui Luo, Adnan Siraj Rakin, Deliang Fan, Xiaolin Xu:
DeepShuffle: A Lightweight Defense Framework against Adversarial Fault Injection Attacks on Deep Neural Networks in Multi-Tenant Cloud-FPGA. SP 2024: 3293-3310 - [c23]Cheng Gongye, Yukui Luo, Xiaolin Xu, Yunsi Fei:
Side-Channel-Assisted Reverse-Engineering of Encrypted DNN Hardware Accelerator IP and Attack Surface Exploration. SP 2024: 4678-4695 - [i13]Chenghong Wang, Lina Qiu, Johes Bater, Yukui Luo:
SPECIAL: Synopsis Assisted Secure Collaborative Analytics. CoRR abs/2404.18388 (2024) - [i12]Ziyu Liu, Tong Zhou, Yukui Luo, Xiaolin Xu:
TBNet: A Neural Architectural Defense Framework Facilitating DNN Model Protection in Trusted Execution Environments. CoRR abs/2405.03974 (2024) - [i11]Shijin Duan, Chenghong Wang, Hongwu Peng, Yukui Luo, Wujie Wen, Caiwen Ding, Xiaolin Xu:
SSNet: A Lightweight Multi-Party Computation Scheme for Practical Privacy-Preserving Machine Learning Service in the Cloud. CoRR abs/2406.02629 (2024) - [i10]Tong Zhou, Jiahui Zhao, Yukui Luo, Xi Xie, Wujie Wen, Caiwen Ding, Xiaolin Xu:
AdaPI: Facilitating DNN Model Adaptivity for Efficient Private Inference in Edge Computing. CoRR abs/2407.05633 (2024) - 2023
- [c22]Cheng Gongye, Yukui Luo, Xiaolin Xu, Yunsi Fei:
HammerDodger: A Lightweight Defense Framework against RowHammer Attack on DNNs. DAC 2023: 1-6 - [c21]Hongwu Peng, Shanglin Zhou, Yukui Luo, Nuo Xu, Shijin Duan, Ran Ran, Jiahui Zhao, Chenghong Wang, Tong Geng, Wujie Wen, Xiaolin Xu, Caiwen Ding:
PASNet: Polynomial Architecture Search Framework for Two-party Computation-based Secure Neural Network Deployment. DAC 2023: 1-6 - [c20]Ziyu Liu, Yukui Luo, Shijin Duan, Tong Zhou, Xiaolin Xu:
MirrorNet: A TEE-Friendly Framework for Secure On-Device DNN Inference. ICCAD 2023: 1-9 - [c19]Hongwu Peng, Shaoyi Huang, Tong Zhou, Yukui Luo, Chenghong Wang, Zigeng Wang, Jiahui Zhao, Xi Xie, Ang Li, Tony Geng, Kaleel Mahmood, Wujie Wen, Xiaolin Xu, Caiwen Ding:
AutoReP: Automatic ReLU Replacement for Fast Private Network Inference. ICCV 2023: 5155-5165 - [c18]Tong Zhou, Yukui Luo, Shaolei Ren, Xiaolin Xu:
NNSplitter: An Active Defense Solution for DNN Model via Automated Weight Obfuscation. ICML 2023: 42614-42624 - [c17]Yukui Luo, Nuo Xu, Hongwu Peng, Chenghong Wang, Shijin Duan, Kaleel Mahmood, Wujie Wen, Caiwen Ding, Xiaolin Xu:
AQ2PNN: Enabling Two-party Privacy-Preserving Deep Neural Network Inference with Adaptive Quantization. MICRO 2023: 628-640 - [c16]Hongwu Peng, Ran Ran, Yukui Luo, Jiahui Zhao, Shaoyi Huang, Kiran Thorat, Tong Geng, Chenghong Wang, Xiaolin Xu, Wujie Wen, Caiwen Ding:
LinGCN: Structural Linearized Graph Convolutional Network for Homomorphically Encrypted Inference. NeurIPS 2023 - [i9]Hongwu Peng, Shanglin Zhou, Yukui Luo, Nuo Xu, Shijin Duan, Ran Ran, Jiahui Zhao, Shaoyi Huang, Xi Xie, Chenghong Wang, Tong Geng, Wujie Wen, Xiaolin Xu, Caiwen Ding:
RRNet: Towards ReLU-Reduced Neural Network for Two-party Computation Based Private Inference. CoRR abs/2302.02292 (2023) - [i8]Tong Zhou, Yukui Luo, Shaolei Ren, Xiaolin Xu:
NNSplitter: An Active Defense Solution to DNN Model via Automated Weight Obfuscation. CoRR abs/2305.00097 (2023) - [i7]Hongwu Peng, Shanglin Zhou, Yukui Luo, Nuo Xu, Shijin Duan, Ran Ran, Jiahui Zhao, Chenghong Wang, Tong Geng, Wujie Wen, Xiaolin Xu, Caiwen Ding:
PASNet: Polynomial Architecture Search Framework for Two-party Computation-based Secure Neural Network Deployment. CoRR abs/2306.15513 (2023) - [i6]Hongwu Peng, Shaoyi Huang, Tong Zhou, Yukui Luo, Chenghong Wang, Zigeng Wang, Jiahui Zhao, Xi Xie, Ang Li, Tony Geng, Kaleel Mahmood, Wujie Wen, Xiaolin Xu, Caiwen Ding:
AutoReP: Automatic ReLU Replacement for Fast Private Network Inference. CoRR abs/2308.10134 (2023) - [i5]Hongwu Peng, Ran Ran, Yukui Luo, Jiahui Zhao, Shaoyi Huang, Kiran Thorat, Tong Geng, Chenghong Wang, Xiaolin Xu, Wujie Wen, Caiwen Ding:
LinGCN: Structural Linearized Graph Convolutional Network for Homomorphically Encrypted Inference. CoRR abs/2309.14331 (2023) - [i4]Ziyu Liu, Yukui Luo, Shijin Duan, Tong Zhou, Xiaolin Xu:
MirrorNet: A TEE-Friendly Framework for Secure On-device DNN Inference. CoRR abs/2311.09489 (2023) - 2022
- [j3]Yukui Luo, Shijin Duan, Xiaolin Xu:
FPGAPRO: A Defense Framework Against Crosstalk-Induced Secret Leakage in FPGA. ACM Trans. Design Autom. Electr. Syst. 27(3): 24:1-24:31 (2022) - [c15]Yukui Luo, Shijin Duan, Cheng Gongye, Yunsi Fei, Xiaolin Xu:
NNReArch: A Tensor Program Scheduling Framework Against Neural Network Architecture Reverse Engineering. FCCM 2022: 1-9 - [c14]Yukui Luo, Yuheng Zhang, Shijin Duan, Xiaolin Xu:
An Integrity Checking Framework for AXI Protocol in Multi-tenant FPGA. FPGA 2022: 155 - [c13]Yukui Luo, Yuheng Zhang, Shijin Duan, Xiaolin Xu:
A Cautionary Note on Building Multi-tenant Cloud-FPGA as a Secure Infrastructure. FPT 2022: 1-6 - [i3]Yukui Luo, Shijin Duan, Cheng Gongye, Yunsi Fei, Xiaolin Xu:
NNReArch: A Tensor Program Scheduling Framework Against Neural Network Architecture Reverse Engineering. CoRR abs/2203.12046 (2022) - 2021
- [c12]Yukui Luo, Cheng Gongye, Yunsi Fei, Xiaolin Xu:
DeepStrike: Remotely-Guided Fault Injection Attacks on DNN Accelerator in Cloud-FPGA. DAC 2021: 295-300 - [c11]Ke Xia, Yukui Luo, Xiaolin Xu, Sheng Wei:
SGX-FPGA: Trusted Execution Environment for CPU-FPGA Heterogeneous Architecture. DAC 2021: 301-306 - [c10]Wenhao Wang, Yukui Luo, Xiaolin Xu:
Constructive Use of Process Variations: Reconfigurable and High-Resolution Delay-Line. DATE 2021: 392-395 - [c9]Shijin Duan, Wenhao Wang, Yukui Luo, Xiaolin Xu:
A Survey of Recent Attacks and Mitigation on FPGA Systems. ISVLSI 2021: 284-289 - [c8]Tong Zhou, Yuheng Zhang, Shijin Duan, Yukui Luo, Xiaolin Xu:
Deep Neural Network Security From a Hardware Perspective. NANOARCH 2021: 1-6 - [c7]Adnan Siraj Rakin, Yukui Luo, Xiaolin Xu, Deliang Fan:
Deep-Dup: An Adversarial Weight Duplication Attack Framework to Crush Deep Neural Network in Multi-Tenant FPGA. USENIX Security Symposium 2021: 1919-1936 - [i2]Yukui Luo, Cheng Gongye, Yunsi Fei, Xiaolin Xu:
DeepStrike: Remotely-Guided Fault Injection Attacks on DNN Accelerator in Cloud-FPGA. CoRR abs/2105.09453 (2021) - 2020
- [j2]Shuai Li, Yukui Luo, Kuangyuan Sun, Nandakishor Yadav, Kyuwon Ken Choi:
A Novel FPGA Accelerator Design for Real-Time and Ultra-Low Power Deep Convolutional Neural Networks Compared With Titan X GPU. IEEE Access 8: 105455-105471 (2020) - [j1]Yukui Luo, Wenhao Wang, Scott Best, Yanzhi Wang, Xiaolin Xu:
A High-Performance and Secure TRNG Based on Chaotic Cellular Automata Topology. IEEE Trans. Circuits Syst. 67-I(12): 4970-4983 (2020) - [c6]Yukui Luo, Xiaolin Xu:
A Dynamic Frequency Scaling Framework Against Reliability and Security Issues in Multi-tenant FPGA. FCCM 2020: 210 - [c5]Yukui Luo, Xiaolin Xu:
A Quantitative Defense Framework against Power Attacks on Multi-tenant FPGA. ICCAD 2020: 64:1-64:9 - [c4]Yukui Luo, Cheng Gongye, Shaolei Ren, Yunsi Fei, Xiaolin Xu:
Stealthy-Shutdown: Practical Remote Power Attacks in Multi - Tenant FPGAs. ICCD 2020: 545-552 - [i1]Adnan Siraj Rakin, Yukui Luo, Xiaolin Xu, Deliang Fan:
Deep-Dup: An Adversarial Weight Duplication Attack Framework to Crush Deep Neural Network in Multi-Tenant FPGA. CoRR abs/2011.03006 (2020)
2010 – 2019
- 2019
- [c3]Yukui Luo, Xiaolin Xu:
HILL: A Hardware Isolation Framework Against Information Leakage on Multi-Tenant FPGA Long-Wires. FPT 2019: 331-334 - 2017
- [c2]Yukui Luo, Shuai Li, Kuangyuan Sun, Raul Renteria, Ken Choi:
Implementation of deep learning neural network for real-time object recognition in OpenCL framework. ISOCC 2017: 298-299 - [c1]Kuangyuan Sun, Shuai Li, Yukui Luo, Raul Renteria, Ken Choi:
Highly-efficient parallel convolution acceleration by using multiple GPUs. ISOCC 2017: 300-301
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 21:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint