IIPS: Infrastructure IP for secure SoC design X Wang, Y Zheng, A Basak, S Bhunia IEEE Transactions on Computers 64 (8), 2226-2238, 2014 | 72 | 2014 |
ScanPUF: Robust ultralow-overhead PUF using scan chain Y Zheng, AR Krishna, S Bhunia 2013 18th Asia and South Pacific Design Automation Conference (ASP-DAC), 626-631, 2013 | 64 | 2013 |
Role of power grid in side channel attack and power-grid-aware secure design X Wang, W Yueh, DB Roy, S Narasimhan, Y Zheng, S Mukhopadhyay, ... Proceedings of the 50th Annual Design Automation Conference, 1-9, 2013 | 61 | 2013 |
CACI: Dynamic current analysis towards robust recycled chip identification Y Zheng, A Basak, S Bhunia Proceedings of the 51st Annual Design Automation Conference, 1-6, 2014 | 50 | 2014 |
SeMIA: Self-similarity-based IC integrity analysis Y Zheng, S Yang, S Bhunia IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2015 | 45 | 2015 |
RESP: A robust physical unclonable function retrofitted into embedded SRAM array Y Zheng, MS Hashemian, S Bhunia Proceedings of the 50th Annual Design Automation Conference, 1-9, 2013 | 44 | 2013 |
DScanPUF: A delay-based physical unclonable function built into scan chain Y Zheng, F Zhang, S Bhunia IEEE Transactions on Very Large Scale Integration (VLSI) Systems 24 (3 …, 2015 | 40 | 2015 |
JTAG-based robust PCB authentication for protection against counterfeiting attacks A Hennessy, Y Zheng, S Bhunia 2016 21st asia and south pacific design automation conference (asp-dac), 56-61, 2016 | 34 | 2016 |
SACCI: Scan-based characterization through clock phase sweep for counterfeit chip detection Y Zheng, X Wang, S Bhunia IEEE Transactions on Very Large Scale Integration (VLSI) Systems 23 (5), 831-841, 2014 | 32 | 2014 |
Pcb authentication and counterfeit detection S Bhunia, F Zhang, Y Zheng, A Hennessy US Patent App. 14/828,305, 2016 | 20 | 2016 |
Active defense against counterfeiting attacks through robust antifuse-based on-chip locks A Basak, Y Zheng, S Bhunia 2014 IEEE 32nd VLSI Test Symposium (VTS), 1-6, 2014 | 19 | 2014 |
Defense against counterfeiting using antifuses S Bhunia, A Basak, Y Zheng US Patent 9,685,958, 2017 | 15 | 2017 |
Systematically re-encoded algebraic soft-decision Reed–Solomon decoder X Zhang, Y Zheng IEEE Transactions on Circuits and Systems II: Express Briefs 59 (6), 376-380, 2012 | 12 | 2012 |
Generalized backward interpolation for algebraic soft-decision decoding of Reed-Solomon codes X Zhang, Y Zheng IEEE transactions on communications 61 (1), 13-23, 2012 | 9 | 2012 |
A chase-type Koetter-Vardy algorithm for soft-decision Reed-Solomon decoding X Zhang, Y Zheng, Y Wu 2012 International Conference on Computing, Networking and Communications …, 2012 | 8 | 2012 |
Novel interpolation and polynomial selection for low-complexity chase soft-decision Reed-Solomon decoding X Zhang, Y Wu, J Zhu, Y Zheng IEEE transactions on very large scale integration (VLSI) systems 20 (7 …, 2011 | 7 | 2011 |
TMR sensitive equalization for electronic servoing in array-reader-based hard disk drives Y Zheng, G Mathew, T Oenning, R Rauschmayer, B Wilson, W Hanson IEEE Transactions on Magnetics 52 (2), 1-7, 2015 | 6 | 2015 |
Efficient codeword recovery architecture for low-complexity Chase Reed-Solomon decoding X Zhang, Y Zheng 2011 Information Theory and Applications Workshop, 1-4, 2011 | 4 | 2011 |
Low-cost and robust countermeasures against counterfeit integrated circuits Y Zheng Case Western Reserve University, 2015 | 3 | 2015 |
Obfuscation-based secure SoC design for protection against piracy and Trojan attacks RS Chakraborty, Y Zheng, S Bhunia Secure System Design and Trustable Computing, 269-299, 2016 | 2 | 2016 |