Qiaoyan Yu
University of New Hampshire
H-index: 22
North America-United States
Top articles of Qiaoyan Yu
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
A Hybrid Neural Network for Simultaneous Multi-Attack Detection in Sensor Networks | Nishanth Chennagouni Mohammad Monjur Wei Lu Qiaoyan Yu | 2023/12/13 | |
WIP: Interdisciplinary Teaching via Hands-on Practice in Cybersecurity | Qiaoyan Yu Dean Sullivan Diliang Chen Dongpeng Xu Karen Jin | 2023/3/11 | |
INEAD: Intermediate Node Evaluation-based Attack Detection for Secure Approximate Computing Systems | IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems | Pruthvy Yellu Nishanth Chennagouni Qiaoyan Yu | 2023/11/2 |
Fpga security: Security threats from untrusted fpga cad toolchain | Sandeep Sunkavilli Zhiming Zhang Qiaoyan Yu | 2023/1/12 | |
Detecting DDoS Attacks in the Internet of Medical Things Through Machine Learning-Based Classification | Brandon Peddle Wei Lu Qiaoyan Yu | 2023/10/11 | |
Hardware Security Risks and Threat Analyses in Advanced Manufacturing Industry | ACM Transactions on Design Automation of Electronic Systems | Mohammad Monjur Joshua Calzadillas Qiaoyan Yu | 2023/9/9 |
A Circuit-Level Solution for Secure Temperature Sensor | Sensors | Mashrafi Alam Kajol Mohammad Mezanur Rahman Monjur Qiaoyan Yu | 2023/6/18 |
AHD-LAM: A New Mitigation Method against Voltage-Drop Attacks in Multi-tenant FPGAs | Mashrafi Alam Kajol Sandeep Sunkavilli Qiaoyan Yu | 2023/12/13 | |
Attack-Resilient Temperature Sensor Design | Mashrafi Alam Kajol Qiaoyan Yu | 2023/5/21 | |
Hardware security in advanced manufacturing | Mohammad Monjur Joshua Calzadillas Mashrafi Kajol Qiaoyan Yu | 2022/6/6 | |
Hardware security in sensor and its networks | Frontiers in Sensors | Mohammad Mezanur Rahman Monjur Joseph Heacock Joshua Calzadillas MD Shaad Mahmud John Roth | 2022/5/4 |
Securing approximate computing systems via obfuscating approximate-precise boundary | IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems | Pruthvy Yellu Qiaoyan Yu | 2022/4/19 |
Leveraging Intermediate Node Evaluation to Secure Approximate Computing for AI Applications | Pruthvy Yellu Nishanth Chennagouni Qiaoyan Yu | 2022/11/14 | |
Challenges of securing low-power LoRaWAN devices deployed in advanced manufacturing | Mohammad Monjur Joseph Heacock Joshua Calzadillas Rui Sun Qiaoyan Yu | 2022/4/6 | |
Dpredo: Dynamic partial reconfiguration enabled design obfuscation for fpga security | Sandeep Sunkavilli Nishanth Goud Chennagouni Qiaoyan Yu | 2022/9/5 | |
Security threats and countermeasure deployment using partial reconfiguration in fpga cad tools | Sandeep Sunkavilli Qiaoyan Yu | 2022/6/27 | |
Analysis of attack surfaces and practical attack examples in open source fpga cad tools | Sandeep Sunkavilli Zhiming Zhang Qiaoyan Yu | 2021/4/7 | |
New security threats on fpgas: From fpga design tools perspective | Sandeep Sunkavilli Zhiming Zhang Qiaoyan Yu | 2021/7/7 | |
Towards Enhancing Power-Analysis Attack Resilience for Logic Locking Techniques | Zhiming Zhang Ivan Miketic Emre Salman Qiaoyan Yu | 2021/7/7 | |
Assessing correlation power analysis (CPA) attack resilience of transistor-level logic locking | Zhiming Zhang Ivan Miketic Emre Salman Qiaoyan Yu | 2021/6/22 |