default search action
Haocheng Ma
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Ya Gao, Haocheng Ma, Qizhi Zhang, Xintong Song, Yier Jin, Jiaji He, Yiqiang Zhao:
EMSim+: Accelerating Electromagnetic Security Evaluation With Generative Adversarial Network and Transfer Learning. IEEE Trans. Inf. Forensics Secur. 19: 9881-9893 (2024) - [c15]Weimin Fu, Shijie Li, Yifang Zhao, Haocheng Ma, Raj Gautam Dutta, Xuan Zhang, Kaichen Yang, Yier Jin, Xiaolong Guo:
Hardware Phi-1.5B: A Large Language Model Encodes Hardware Domain Specific Knowledge. ASPDAC 2024: 349-354 - [i1]Weimin Fu, Shijie Li, Yifang Zhao, Haocheng Ma, Raj Gautam Dutta, Xuan Zhang, Kaichen Yang, Yier Jin, Xiaolong Guo:
Hardware Phi-1.5B: A Large Language Model Encodes Hardware Domain Specific Knowledge. CoRR abs/2402.01728 (2024) - 2023
- [j13]Si-Yuan Liao, Qi Chen, Haocheng Ma, Jingwei Huang, Junyang Sui, Haifeng Zhang:
A Liquid Crystal-Modulated Metastructure Sensor for Biosensing. Sensors 23(16): 7122 (2023) - [j12]Yiqiang Zhao, Shijian Pan, Haocheng Ma, Ya Gao, Xintong Song, Jiaji He, Yier Jin:
Side Channel Security Oriented Evaluation and Protection on Hardware Implementations of Kyber. IEEE Trans. Circuits Syst. I Regul. Pap. 70(12): 5025-5035 (2023) - [j11]Haocheng Ma, Max Panoff, Jiaji He, Yiqiang Zhao, Yier Jin:
EMSim: A Fast Layout Level Electromagnetic Emanation Simulation Framework for High Accuracy Pre-Silicon Verification. IEEE Trans. Inf. Forensics Secur. 18: 1365-1379 (2023) - [c14]Ya Gao, Haocheng Ma, Mingkai Yan, Jiaji He, Yiqiang Zhao, Yier Jin:
NNLeak: An AI-Oriented DNN Model Extraction Attack through Multi-Stage Side Channel Analysis. AsianHOST 2023: 1-6 - [c13]Ya Gao, Qizhi Zhang, Haocheng Ma, Jiaji He, Yiqiang Zhao:
EO-Shield: A Multi-Function Protection Scheme against Side Channel and Focused Ion Beam Attacks. ASP-DAC 2023: 670-675 - [c12]Ya Gao, Haocheng Ma, Jindi Kong, Jiaji He, Yiqiang Zhao, Yier Jin:
EMSim+: Accelerating Electromagnetic Security Evaluation with Generative Adversarial Network. ICCAD 2023: 1-8 - 2022
- [j10]Jiaji He, Haocheng Ma, Max Panoff, Hanning Wang, Yiqiang Zhao, Leibo Liu, Xiaolong Guo, Yier Jin:
Security Oriented Design Framework for EM Side-Channel Protection in RTL Implementations. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(8): 2421-2434 (2022) - [j9]Yanjiang Liu, Jiaji He, Haocheng Ma, Tongzhou Qu, Zibin Dai:
A Comprehensive Evaluation of Integrated Circuits Side-Channel Resilience Utilizing Three-Independent-Gate Silicon Nanowire Field Effect Transistors-Based Current Mode Logic. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(10): 3228-3238 (2022) - [c11]Haocheng Ma, Shijian Pan, Ya Gao, Jiaji He, Yiqiang Zhao, Yier Jin:
Vulnerable PQC against Side Channel Analysis - A Case Study on Kyber. AsianHOST 2022: 1-6 - [c10]Haocheng Ma, Qizhi Zhang, Ya Gao, Jiaji He, Yiqiang Zhao, Yier Jin:
PathFinder: side channel protection through automatic leaky paths identification and obfuscation. DAC 2022: 79-84 - 2021
- [j8]Haocheng Ma, Jiaji He, Max Panoff, Yier Jin, Yiqiang Zhao:
Automatic On-Chip Clock Network Optimization for Electromagnetic Side-Channel Protection. IEEE J. Emerg. Sel. Topics Circuits Syst. 11(2): 371-382 (2021) - [j7]Haocheng Ma, Jiaji He, Yanjiang Liu, Leibo Liu, Yiqiang Zhao, Yier Jin:
Security-Driven Placement and Routing Tools for Electromagnetic Side-Channel Protection. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 40(6): 1077-1089 (2021) - [j6]Haocheng Ma, Jiaji He, Yanjiang Liu, Jun Kuai, He Li, Leibo Liu, Yiqiang Zhao:
On-Chip Trust Evaluation Utilizing TDC-Based Parameter-Adjustable Security Primitive. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 40(10): 1985-1994 (2021) - [j5]Jiaji He, Haocheng Ma, Yanjiang Liu, Yiqiang Zhao:
Golden Chip-Free Trojan Detection Leveraging Trojan Trigger's Side-Channel Fingerprinting. ACM Trans. Embed. Comput. Syst. 20(1): 6:1-6:18 (2021) - [j4]Zhendong Shi, Haocheng Ma, Qizhi Zhang, Yanjiang Liu, Yiqiang Zhao, Jiaji He:
Test Generation for Hardware Trojan Detection Using Correlation Analysis and Genetic Algorithm. ACM Trans. Embed. Comput. Syst. 20(4): 28:1-28:20 (2021) - 2020
- [j3]Yanjiang Liu, Jiaji He, Haocheng Ma, Yiqiang Zhao:
Golden chip free Trojan detection leveraging probabilistic neural network with genetic algorithm applied in the training phase. Sci. China Inf. Sci. 63(2): 129401 (2020) - [c9]Jun Kuai, Jiaji He, Haocheng Ma, Yiqiang Zhao, Yumin Hou, Yier Jin:
WaLo: Security Primitive Generator for RT-Level Logic Locking and Watermarking. AsianHOST 2020: 1-6 - [c8]Jiaji He, Haocheng Ma, Xiaolong Guo, Yiqiang Zhao, Yier Jin:
Design for EM Side-Channel Security through Quantitative Assessment of RTL Implementations. ASP-DAC 2020: 62-67 - [c7]Jiaji He, Xiaolong Guo, Haocheng Ma, Yanjiang Liu, Yiqiang Zhao, Yier Jin:
Runtime Trust Evaluation and Hardware Trojan Detection Using On-Chip EM Sensors. DAC 2020: 1-6 - [c6]Honggang Yu, Haocheng Ma, Kaichen Yang, Yiqiang Zhao, Yier Jin:
DeepEM: Deep Neural Networks Model Recovery through EM Side-Channel Information Leakage. HOST 2020: 209-218
2010 – 2019
- 2019
- [j2]Yanjiang Liu, Jiaji He, Haocheng Ma, Yiqiang Zhao:
Hardware Trojan Detection Leveraging a Novel Golden Layout Model Towards Practical Applications. J. Electron. Test. 35(4): 529-541 (2019) - [c5]Haocheng Ma, Jiaji He, Yanjiang Liu, Yiqiang Zhao, Yier Jin:
CAD4EM-P: Security-Driven Placement Tools for Electromagnetic Side Channel Protection. AsianHOST 2019: 1-6 - [c4]Haocheng Ma, Lihui Peng:
Vision Based Liquid Level Detection and Bubble Area Segmentation in Liquor Distillation. IST 2019: 1-6 - [c3]Jin Zheng, Haocheng Ma, Lihui Peng:
A CNN-Based Image Reconstruction for Electrical Capacitance Tomography. IST 2019: 1-6 - 2018
- [j1]Xiang Gao, Yiqiang Zhao, Haocheng Ma:
Fringing Electric Field Sensors for Anti-Attack at System-Level Protection. Sensors 18(9): 3034 (2018) - [c2]Binglu Liu, Haocheng Ma, Xiaoping Zheng, Lihui Peng, Anshan Xiao:
Monitoring and Detection of Combustible Gas Leakage by Using Infrared Imaging. IST 2018: 1-6 - [c1]Zhan Ou, Hua Geng, Xiaoping Zheng, Haocheng Ma, Yang Yu:
Segmentation of Concealed Objects in Active Terahertz Images. IST 2018: 1-5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint