Login / Signup
Weize Yu
ORCID
Publication Activity (10 Years)
Years Active: 2015-2024
Publications (10 Years): 34
Top Topics
Countermeasures
Convolutional Neural Networks
Lagrange Multipliers
Power Analysis
Top Venues
Int. J. Circuit Theory Appl.
Integr.
IEEE Trans. Circuits Syst. I Regul. Pap.
NATW
</>
Publications
</>
Wenrui Liu
,
Jiafeng Cheng
,
Nengyuan Sun
,
Heng Sha
,
Ming Jin
,
Hongyang Zhao
,
Zhiyuan Pan
,
Jinghe Wang
,
Selçuk Köse
,
Weize Yu
A low-overhead and high-reliability physical unclonable function (PUF) for cryptography.
Integr.
96 (2024)
Guoyang Liu
,
Lan Tian
,
Yiming Wen
,
Weize Yu
,
Weidong Zhou
Cosine convolutional neural network and its application for seizure detection.
Neural Networks
174 (2024)
Nengyuan Sun
,
Wenrui Liu
,
Jiafeng Cheng
,
Zhaokang Peng
,
Chunyang Wang
,
Caiban Sun
,
Heng Sha
,
Zhiyuan Pan
,
Ming Jin
,
Hongyang Zhao
,
Jinghe Wang
,
Yiming Wen
,
Pengliang Kong
,
Yunfeng Zhao
,
Yaoqiang Wang
,
Selçuk Köse
,
Weize Yu
A novel SM4 cryptographic architecture against higher order power analysis attacks.
Int. J. Circuit Theory Appl.
52 (8) (2024)
Wenrui Liu
,
Jiafeng Cheng
,
Nengyuan Sun
,
Heng Sha
,
Zunxian Fu
,
Zhaokang Peng
,
Chunyang Wang
,
Caiban Sun
,
Pengliang Kong
,
Yunfeng Zhao
,
Yaoqiang Wang
,
Weize Yu
A 128-Gbps Pipelined SM4 Circuit With Dual DPA Attack Countermeasures.
IEEE Trans. Very Large Scale Integr. Syst.
32 (6) (2024)
Wenrui Liu
,
Jiafeng Cheng
,
Nengyuan Sun
,
Zhaokang Peng
,
Caiban Sun
,
Chunyang Wang
,
Yiming Wen
,
Hongliu Zhang
,
Pengcheng Zhang
,
Weize Yu
A novel hardware authentication primitive against modeling attacks.
Int. J. Circuit Theory Appl.
51 (6) (2023)
Jiafeng Cheng
,
Nengyuan Sun
,
Wenrui Liu
,
Zhaokang Peng
,
Chunyang Wang
,
Caiban Sun
,
Yufei Wang
,
Yijian Bi
,
Yiming Wen
,
Hongliu Zhang
,
Pengcheng Zhang
,
Selçuk Köse
,
Weize Yu
Neural Network-Based Entropy: A New Metric for Evaluating Side-Channel Attacks.
J. Circuits Syst. Comput.
32 (3) (2023)
Zhaokang Peng
,
Nengyuan Sun
,
Jiafeng Cheng
,
Wenrui Liu
,
Chunyang Wang
,
Yijian Bi
,
Caiban Sun
,
Yufei Wang
,
Yiming Wen
,
Yubin Wang
,
Weize Yu
A sequential strong PUF architecture based on reconfigurable neural networks (RNNs) against state-of-the-art modeling attacks.
Integr.
92 (2023)
Caiban Sun
,
Wenrui Liu
,
Jiafeng Cheng
,
Nengyuan Sun
,
Zhaokang Peng
,
Heng Sha
,
Weize Yu
A high-speed and low-latency hardware implementation of RC4 cryptographic algorithm.
Int. J. Circuit Theory Appl.
51 (12) (2023)
Nengyuan Sun
,
Jiafeng Cheng
,
Wenrui Liu
,
Zhaokang Peng
,
Caiban Sun
,
Chunyang Wang
,
Heng Sha
,
Yufei Wang
,
Weize Yu
A novel on-chip linear and switching mixed regulation against power analysis attacks.
Integr.
93 (2023)
Jiafeng Cheng
,
Wenrui Liu
,
Nengyuan Sun
,
Zhaokang Peng
,
Caiban Sun
,
Chunyang Wang
,
Yijian Bi
,
Yiming Wen
,
Hongliu Zhang
,
Pengcheng Zhang
,
Weize Yu
A low output ripple and high security on-chip voltage regulation based on Fourier transform.
Int. J. Circuit Theory Appl.
51 (6) (2023)
Jiafeng Cheng
,
Wenrui Liu
,
Nengyuan Sun
,
Zhaokang Peng
,
Caiban Sun
,
Chunyang Wang
,
Yijian Bi
,
Yiming Wen
,
Hongliu Zhang
,
Pengcheng Zhang
,
Weize Yu
A machine learning low-dropout regulator-assisted differential power analysis attack countermeasure with voltage scaling.
Int. J. Circuit Theory Appl.
51 (7) (2023)
Weize Yu
Convex optimization of random dynamic voltage and frequency scaling against power attacks.
Integr.
82 (2022)
Yiming Wen
,
Weize Yu
Combining Thermal Maps With Inception Neural Networks for Hardware Trojan Detection.
IEEE Embed. Syst. Lett.
13 (2) (2021)
Weize Yu
,
Yubing Wang
An efficient methodology for hardware Trojan detection based on canonical correlation analysis.
Microelectron. J.
115 (2021)
Yiming Wen
,
Weize Yu
Breaking LPA-resistant cryptographic circuits with principal component analysis.
Integr.
80 (2021)
Weize Yu
Optimization of Combined Power and Modeling Attacks on VR PUFs With Lagrange Multipliers.
IEEE Trans. Circuits Syst.
(11) (2020)
Zhenhua Liang
,
Siqi Huang
,
Xueqing Huang
,
Rui Cao
,
Weize Yu
Post-Click Behaviors Enhanced Recommendation System.
IRI
(2020)
Weize Yu
Hardware Trojan attacks on voltage scaling-based side-channel attack countermeasure.
IET Circuits Devices Syst.
13 (3) (2019)
Yiming Wen
,
Sayyed Farid Ahamed
,
Weize Yu
A Novel PUF Architecture Against Non-Invasive Attacks.
SLIP
(2019)
Yiming Wen
,
Weize Yu
Convolutional Neural Networks (CNNs)-Assisted Voltage Regulation: A New Power Delivery Scheme.
NATW
(2019)
Weize Yu
,
Yiming Wen
Leveraging Balanced Logic Gates as Strong PUFs for Securing IoT Against Malicious Attacks.
J. Electron. Test.
35 (6) (2019)
Weize Yu
,
Yiming Wen
Malicious Attacks on Physical Unclonable Function Sensors of Internet of Things.
NATW
(2019)
Weize Yu
,
Yiming Wen
,
Selçuk Köse
,
Jia Chen
Exploiting Multi-Phase On-Chip Voltage Regulators as Strong PUF Primitives for Securing IoT.
J. Electron. Test.
34 (5) (2018)
Weize Yu
,
Selçuk Köse
Exploiting Voltage Regulators to Enhance Various Power Attack Countermeasures.
IEEE Trans. Emerg. Top. Comput.
6 (2) (2018)
Weize Yu
,
Jia Chen
PUF-AES-PUF: a novel PUF architecture against non-invasive attacks.
CoRR
(2018)
Weize Yu
,
Yiming Wen
Leakage Power Analysis (LPA) Attack in Breakdown Mode and Countermeasure.
SoCC
(2018)
Weize Yu
,
Selçuk Köse
A Lightweight Masked AES Implementation for Securing IoT Against CPA Attacks.
IEEE Trans. Circuits Syst. I Regul. Pap.
(11) (2017)
S. Karen Khatamifard
,
Longfei Wang
,
Weize Yu
,
Selçuk Köse
,
Ulya R. Karpuzcu
ThermoGater: Thermally-Aware On-Chip Voltage Regulation.
ISCA
(2017)
Weize Yu
,
Selçuk Köse
Security-Adaptive Voltage Conversion as a Lightweight Countermeasure Against LPA Attacks.
IEEE Trans. Very Large Scale Integr. Syst.
25 (7) (2017)
Weize Yu
,
Selçuk Köse
Implications of noise insertion mechanisms of different countermeasures against side-channel attacks.
ISCAS
(2017)
Weize Yu
,
Selçuk Köse
False Key-Controlled Aggressive Voltage Scaling: A Countermeasure Against LPA Attacks.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst.
36 (12) (2017)
Weize Yu
,
Selçuk Köse
A Lightweight AES Implementation Against Bivariate First-Order DPA Attacks.
HASP@ISCA
(2017)
Weize Yu
,
Selçuk Köse
A Voltage Regulator-Assisted Lightweight AES Implementation Against DPA Attacks.
IEEE Trans. Circuits Syst. I Regul. Pap.
(8) (2016)
Weize Yu
,
Selçuk Köse
Charge-Withheld Converter-Reshuffling: A Countermeasure Against Power Analysis Attacks.
IEEE Trans. Circuits Syst. II Express Briefs
(5) (2016)
Weize Yu
,
Selçuk Köse
Time-Delayed Converter-Reshuffling: An Efficient and Secure Power Delivery Architecture.
IEEE Embed. Syst. Lett.
7 (3) (2015)
Weize Yu
,
Orhun Aras Uzun
,
Selçuk Köse
Leveraging on-chip voltage regulators as a countermeasure against side-channel attacks.
DAC
(2015)