default search action
Jiaji He
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Ya Gao, Haocheng Ma, Qizhi Zhang, Xintong Song, Yier Jin, Jiaji He, Yiqiang Zhao:
EMSim+: Accelerating Electromagnetic Security Evaluation With Generative Adversarial Network and Transfer Learning. IEEE Trans. Inf. Forensics Secur. 19: 9881-9893 (2024) - [c13]Yiqiang Zhao, Gonsen Qu, Qizhi Zhang, Yao Li, Zhengyang Li, Jiaji He:
Static Gate-Level Information Flow for Hardware Information Security with Bounded Model Checking. VTS 2024: 1-7 - 2023
- [j24]Qiuwei Wang, Mao Ye, Yao Li, Xiaoxiao Zheng, Jiaji He, Jun Du, Yiqiang Zhao:
MOSFET modeling of 0.18μm CMOS technology at 4.2K using BP neural network. Microelectron. J. 132: 105678 (2023) - [j23]Bin Hu, Yiqiang Zhao, Guoqing Zhou, Jiaji He, Changlong Liu, Qiang Liu, Mao Ye, Yao Li:
Coupling Dilated Encoder-Decoder Network for Multi-Channel Airborne LiDAR Bathymetry Full-Waveform Denoising. Remote. Sens. 15(13): 3293 (2023) - [j22]Yiqiang Zhao, Shijian Pan, Haocheng Ma, Ya Gao, Xintong Song, Jiaji He, Yier Jin:
Side Channel Security Oriented Evaluation and Protection on Hardware Implementations of Kyber. IEEE Trans. Circuits Syst. I Regul. Pap. 70(12): 5025-5035 (2023) - [j21]Haocheng Ma, Max Panoff, Jiaji He, Yiqiang Zhao, Yier Jin:
EMSim: A Fast Layout Level Electromagnetic Emanation Simulation Framework for High Accuracy Pre-Silicon Verification. IEEE Trans. Inf. Forensics Secur. 18: 1365-1379 (2023) - [c12]Ya Gao, Haocheng Ma, Mingkai Yan, Jiaji He, Yiqiang Zhao, Yier Jin:
NNLeak: An AI-Oriented DNN Model Extraction Attack through Multi-Stage Side Channel Analysis. AsianHOST 2023: 1-6 - [c11]Ya Gao, Qizhi Zhang, Haocheng Ma, Jiaji He, Yiqiang Zhao:
EO-Shield: A Multi-Function Protection Scheme against Side Channel and Focused Ion Beam Attacks. ASP-DAC 2023: 670-675 - [c10]Ya Gao, Haocheng Ma, Jindi Kong, Jiaji He, Yiqiang Zhao, Yier Jin:
EMSim+: Accelerating Electromagnetic Security Evaluation with Generative Adversarial Network. ICCAD 2023: 1-8 - 2022
- [j20]Chenchen Deng, Min Zhu, Jinjiang Yang, Youyu Wu, Jiaji He, Bohan Yang, Jianfeng Zhu, Shouyi Yin, Shaojun Wei, Leibo Liu:
An energy-efficient dynamically reconfigurable cryptographic engine with improved power/EM-side-channel-attack resistance. Sci. China Inf. Sci. 65(4) (2022) - [j19]Jiaji He, Xiaolong Guo, Mark M. Tehranipoor, Apostol Vassilev, Yier Jin:
EM Side Channels in Hardware Security: Attacks and Defenses. IEEE Des. Test 39(2): 100-111 (2022) - [j18]Jiaji He, Haocheng Ma, Max Panoff, Hanning Wang, Yiqiang Zhao, Leibo Liu, Xiaolong Guo, Yier Jin:
Security Oriented Design Framework for EM Side-Channel Protection in RTL Implementations. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(8): 2421-2434 (2022) - [j17]Yanjiang Liu, Jiaji He, Haocheng Ma, Tongzhou Qu, Zibin Dai:
A Comprehensive Evaluation of Integrated Circuits Side-Channel Resilience Utilizing Three-Independent-Gate Silicon Nanowire Field Effect Transistors-Based Current Mode Logic. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(10): 3228-3238 (2022) - [c9]Haocheng Ma, Shijian Pan, Ya Gao, Jiaji He, Yiqiang Zhao, Yier Jin:
Vulnerable PQC against Side Channel Analysis - A Case Study on Kyber. AsianHOST 2022: 1-6 - [c8]Haocheng Ma, Qizhi Zhang, Ya Gao, Jiaji He, Yiqiang Zhao, Yier Jin:
PathFinder: side channel protection through automatic leaky paths identification and obfuscation. DAC 2022: 79-84 - 2021
- [j16]Haocheng Ma, Jiaji He, Max Panoff, Yier Jin, Yiqiang Zhao:
Automatic On-Chip Clock Network Optimization for Electromagnetic Side-Channel Protection. IEEE J. Emerg. Sel. Topics Circuits Syst. 11(2): 371-382 (2021) - [j15]Haocheng Ma, Jiaji He, Yanjiang Liu, Leibo Liu, Yiqiang Zhao, Yier Jin:
Security-Driven Placement and Routing Tools for Electromagnetic Side-Channel Protection. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 40(6): 1077-1089 (2021) - [j14]Haocheng Ma, Jiaji He, Yanjiang Liu, Jun Kuai, He Li, Leibo Liu, Yiqiang Zhao:
On-Chip Trust Evaluation Utilizing TDC-Based Parameter-Adjustable Security Primitive. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 40(10): 1985-1994 (2021) - [j13]Jiaji He, Haocheng Ma, Yanjiang Liu, Yiqiang Zhao:
Golden Chip-Free Trojan Detection Leveraging Trojan Trigger's Side-Channel Fingerprinting. ACM Trans. Embed. Comput. Syst. 20(1): 6:1-6:18 (2021) - [j12]Zhendong Shi, Haocheng Ma, Qizhi Zhang, Yanjiang Liu, Yiqiang Zhao, Jiaji He:
Test Generation for Hardware Trojan Detection Using Correlation Analysis and Genetic Algorithm. ACM Trans. Embed. Comput. Syst. 20(4): 28:1-28:20 (2021) - 2020
- [j11]Yanjiang Liu, Jiaji He, Haocheng Ma, Yiqiang Zhao:
Golden chip free Trojan detection leveraging probabilistic neural network with genetic algorithm applied in the training phase. Sci. China Inf. Sci. 63(2): 129401 (2020) - [j10]Ruishan Xin, Yidong Yuan, Jiaji He, Shuai Zhen, Yiqiang Zhao:
Random active shield generation based on modified artificial fish-swarm algorithm. Comput. Secur. 88 (2020) - [j9]Yanjiang Liu, Yiqiang Zhao, Jiaji He, Ruishan Xin:
A Statistical Test Generation Based on Mutation Analysis for Improving the Hardware Trojan Detection. J. Circuits Syst. Comput. 29(3): 2050049:1-2050049:19 (2020) - [c7]Jun Kuai, Jiaji He, Haocheng Ma, Yiqiang Zhao, Yumin Hou, Yier Jin:
WaLo: Security Primitive Generator for RT-Level Logic Locking and Watermarking. AsianHOST 2020: 1-6 - [c6]Qizhi Zhang, Jiaji He, Yiqiang Zhao, Xiaolong Guo:
A Formal Framework for Gate- Level Information Leakage Using Z3. AsianHOST 2020: 1-6 - [c5]Jiaji He, Haocheng Ma, Xiaolong Guo, Yiqiang Zhao, Yier Jin:
Design for EM Side-Channel Security through Quantitative Assessment of RTL Implementations. ASP-DAC 2020: 62-67 - [c4]Jiaji He, Xiaolong Guo, Haocheng Ma, Yanjiang Liu, Yiqiang Zhao, Yier Jin:
Runtime Trust Evaluation and Hardware Trojan Detection Using On-Chip EM Sensors. DAC 2020: 1-6
2010 – 2019
- 2019
- [j8]Jiaji He, Daniel Homa, Gary Pickrell, Anbo Wang:
Coupled Mode Analysis for 3D Stress-Free Elastic Acoustic Waveguide. IEEE Access 7: 117796-117803 (2019) - [j7]Ruishan Xin, Yidong Yuan, Jiaji He, Yuehui Li, Yiqiang Zhao:
High-efficient generation algorithm for large random active shield. Sci. China Inf. Sci. 62(3): 39108:1-39108:3 (2019) - [j6]Yanjiang Liu, Jiaji He, Haocheng Ma, Yiqiang Zhao:
Hardware Trojan Detection Leveraging a Novel Golden Layout Model Towards Practical Applications. J. Electron. Test. 35(4): 529-541 (2019) - [j5]Jiaji He, Yanjiang Liu, Yidong Yuan, Kai Hu, Xianzhao Xia, Yiqiang Zhao:
Golden chip free Trojan detection leveraging electromagnetic side channel fingerprinting. IEICE Electron. Express 16(2): 20181065 (2019) - [j4]Xianzhao Xia, Mao Ye, Jiaji He, Kai Hu, Yiqiang Zhao:
A novel TDC/ADC hybrid reconstruction ROIC for LiDAR. IEICE Electron. Express 16(3): 20181076 (2019) - [j3]Jiaji He, Xiaolong Guo, Travis Meade, Raj Gautam Dutta, Yiqiang Zhao, Yier Jin:
SoC interconnection protection through formal verification. Integr. 64: 143-151 (2019) - [c3]Haocheng Ma, Jiaji He, Yanjiang Liu, Yiqiang Zhao, Yier Jin:
CAD4EM-P: Security-Driven Placement Tools for Electromagnetic Side Channel Protection. AsianHOST 2019: 1-6 - [c2]Xiaolong Guo, Raj Gautam Dutta, Jiaji He, Mark M. Tehranipoor, Yier Jin:
QIF-Verilog: Quantitative Information-Flow based Hardware Description Languages for Pre-Silicon Security Assessment. HOST 2019: 91-100 - 2017
- [j2]Jiaji He, Yiqiang Zhao, Xiaolong Guo, Yier Jin:
Hardware Trojan Detection Through Chip-Free Electromagnetic Side-Channel Statistical Analysis. IEEE Trans. Very Large Scale Integr. Syst. 25(10): 2939-2948 (2017) - [c1]Xiaolong Guo, Raj Gautam Dutta, Jiaji He, Yier Jin:
PCH framework for IP runtime security verification. AsianHOST 2017: 79-84 - 2016
- [j1]Runmin Cong, Ping Han, Chongyi Li, Jiaji He, Zaiji Zhang:
Manmade target extraction based on multistage decision and its application for change detection in polarimetric synthetic aperture radar image. J. Electronic Imaging 25(5): 053017 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:26 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint