Gang Qu
University of Maryland
H-index: 52
North America-United States
Top articles of Gang Qu
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Efficient Approximate Floating-Point Multiplier With Runtime Reconfigurable Frequency and Precision | IEEE Transactions on Circuits and Systems II: Express Briefs | Zhenhao Li Zhaojun Lu Wei Jia Runze Yu Haichun Zhang | 2024/2/12 |
Towards Finding the Sources of Polymorphism in Polymorphic Gates | Timothy Dunlap Zelin Lu Gang Qu | 2024/1/22 | |
Fooling Decision-Based Black-Box Automotive Vision Perception Systems in Physical World | IEEE Transactions on Intelligent Transportation Systems | Wei Jia Zhaojun Lu Runze Yu Liaoyuan Li Haichun Zhang | 2024/1/11 |
APACHE: A Processing-Near-Memory Architecture for Multi-Scheme Fully Homomorphic Encryption | arXiv preprint arXiv:2404.15819 | Lin Ding Song Bian Penggao He Yan Xu Gang Qu | 2024/4/24 |
Meta-federated learning | Omid Aramoon Pin-Yu Chen Gang Qu Yuan Tian | 2024/1/1 | |
Uncovering and Exploiting AMD Speculative Memory Access Predictors for Fun and Profit | Chang Liu Dongsheng Wang Yongqiang Lyu Pengfei Qiu Yu Jin | 2024/3/2 | |
Special Issue on the 2021 Workshop on Top Picks in Hardware and Embedded Security | IEEE Design & Test | Gang Qu | 2024/2/21 |
Timing the Transient Execution: A New Side-Channel Attack on Intel CPUs | arXiv preprint arXiv:2304.10877 | Yu Jin Pengfei Qiu Chunlu Wang Yihao Yang Dongsheng Wang | 2023/4/21 |
Leaky MDU: ARM Memory Disambiguation Unit Uncovered and Vulnerabilities Exposed | Chang Liu Yongqiang Lyu Haixia Wang Pengfei Qiu Dapeng Ju | 2023/7/9 | |
Lightning: Leveraging DVFS-induced Transient Fault Injection to Attack Deep Learning Accelerator of GPUs | ACM Transactions on Design Automation of Electronic Systems | Rihui Sun Pengfei Qiu Yongqiang Lyu Jian Dong Haixia Wang | 2023/11/15 |
A Lightweight Authentication Scheme with PE-Based Unclonable Label | Renchao Li Zhen Weng Aijiao Cui Gang Qu | 2023/12/13 | |
A Low-overhead PUF-based Secure Scan Design | Wei Zhou Aijiao Cui Cassi Chen Gang Qu | 2023/4/5 | |
MES-attacks: Software-controlled covert channels based on mutual exclusion and synchronization | Chaoqun Shen Jiliang Zhang Gang Qu | 2023/7/9 | |
An Anti-Removal-Attack Hardware Watermarking Method Based on Polymorphic Gates | Yongliang Chen Xiaole Cui Pengyuan Yang Gang Qu | 2023/10/28 | |
Overtake: Achieving Meltdown-type Attacks with One Instruction | Yu Jin Pengfei Qiu Chunlu Wang Yihao Yang Dongsheng Wang | 2023/12/13 | |
MagView++: Data Exfiltration via CPU Magnetic Signals Under Video Decoding | IEEE Transactions on Mobile Computing | Xiaoyu Ji Juchuan Zhang Shan Zou Yichao Chen Gang Qu | 2023/3/28 |
Mex+ Sync: Software Covert Channels Exploiting Mutual Exclusion and Synchronization | IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems | Jiliang Zhang Chaoqun Shen Gang Qu | 2023/7/3 |
Exploration and Exploitation of Hidden PMU Events | Yihao Yang Pengfei Qiu Chunlu Wang Yu Jin Qiang Gao | 2023/10/28 | |
LLM4SecHW: Leveraging domain-specific large language model for hardware debugging | Weimin Fu Kaichen Yang Raj Gautam Dutta Xiaolong Guo Gang Qu | 2023/12/13 | |
PMU-Leaker: Performance monitor unit-based realization of cache side-channel attacks | Pengfei Qiu Qiang Gao Dongsheng Wang Yongqiang Lyu Chunlu Wang | 2023/1/16 |