Follow
Xiaolu Hou
Xiaolu Hou
Faculty of Informatics and Information Technologies, Slovak University of Technology, Slovakia
Verified email at stuba.sk - Homepage
Title
Cited by
Cited by
Year
Practical fault attack on deep neural networks
J Breier, X Hou, D Jap, L Ma, S Bhasin, Y Liu
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1472018
SNIFF: reverse engineering of neural networks with fault attacks
J Breier, D Jap, X Hou, S Bhasin, Y Liu
IEEE Transactions on Reliability, 2021
632021
How practical are fault injection attacks, really?
J Breier, X Hou
IEEE Access 10, 113122-113130, 2022
532022
A countermeasure against statistical ineffective fault analysis
J Breier, M Khairallah, X Hou, Y Liu
IEEE Transactions on Circuits and Systems II: Express Briefs 67 (12), 3322-3326, 2020
422020
Fault attacks made easy: differential fault analysis automation on assembly code
J Breier, X Hou, Y Liu
IACR Transactions on Cryptographic Hardware and Embedded Systems, 96-122, 2018
332018
Automated Methods in Cryptographic Fault Analysis
J Breier, X Hou, S Bhasin
Springer International Publishing, 2019
302019
Back to the Basics: Seamless Integration of Side-Channel Pre-Processing in Deep Neural Networks
YS Won, X Hou, D Jap, J Breier, S Bhasin
IEEE Transactions on Information Forensics and Security 16, 3215-3227, 2021
282021
SITM: See-In-The-Middle Side-Channel Assisted Middle Round Differential Cryptanalysis on SPN Block Ciphers
S Bhasin, J Breier, X Hou, D Jap, R Poussier, SM Sim
IACR Transactions on Cryptographic Hardware and Embedded Systems, 95-122, 2020
262020
Feeding two cats with one bowl: On designing a fault and side-channel resistant software encoding scheme
J Breier, X Hou
Topics in Cryptology–CT-RSA 2017: The Cryptographers’ Track at the RSA …, 2017
262017
On Side Channel Vulnerabilities of Bit Permutations in Cryptographic Algorithms
J Breier, D Jap, X Hou, S Bhasin
IEEE Transactions on Information Forensics and Security 15, 1072-1085, 2019
252019
Fully Automated Differential Fault Analysis on Software Implementations of Block Ciphers
X Hou, J Breier, F Zhang, Y Liu
IACR Transactions on Cryptographic Hardware and Embedded Systems, 1-29, 2019
212019
On evaluating fault resilient encoding schemes in software
J Breier, X Hou, Y Liu
IEEE Transactions on Dependable and Secure Computing 18 (3), 1065-1079, 2019
212019
Security Evaluation of Deep Neural Network Resistance Against Laser Fault Injection
X Hou, J Breier, D Jap, L Ma, S Bhasin, Y Liu
2020 IEEE International Symposium on the Physical and Failure Analysis of …, 2020
192020
Physical security of deep learning on edge devices: Comprehensive evaluation of fault injection attack vectors
X Hou, J Breier, D Jap, L Ma, S Bhasin, Y Liu
Microelectronics Reliability 120, 114116, 2021
142021
On LCD codes and lattices
X Hou, F Oggier
Information Theory (ISIT), 2016 IEEE International Symposium on, 1501-1505, 2016
142016
Hilbert spaces of entire Dirichlet series and composition operators
X Hou, B Hu, LH Khoi
Journal of Mathematical Analysis and Applications 401 (1), 416-429, 2013
142013
Foobar: Fault fooling backdoor attack on neural network training
J Breier, X Hou, M Ochoa, J Solano
IEEE Transactions on Dependable and Secure Computing 20 (3), 1895-1908, 2022
132022
SoK: On DFA Vulnerabilities of Substitution-Permutation Networks
M Khairallah, X Hou, Z Najm, J Breier, S Bhasin, T Peyrin
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
102019
A Finer-Grain Analysis of the Leakage (Non) Resilience of OCB
F Berti, S Bhasin, J Breier, X Hou, R Poussier, FX Standaert, B Udvarhelyi
IACR Transactions on Cryptographic Hardware and Embedded Systems, 461-481, 2022
92022
Construction and Secrecy Gain of a Family of 5-modular Lattices
X Hou, F Lin, F Oggier
2014 IEEE Information Theory Workshop (ITW 2014), 117-121, 2014
82014
The system can't perform the operation now. Try again later.
Articles 1–20