Follow
Xiaolu Hou
Xiaolu Hou
Faculty of Informatics and Information Technologies, Slovak University of Technology, Slovakia
Verified email at stuba.sk - Homepage
Title
Cited by
Cited by
Year
Practical fault attack on deep neural networks
J Breier, X Hou, D Jap, L Ma, S Bhasin, Y Liu
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1322018
SNIFF: reverse engineering of neural networks with fault attacks
J Breier, D Jap, X Hou, S Bhasin, Y Liu
IEEE Transactions on Reliability, 2021
452021
How practical are fault injection attacks, really?
J Breier, X Hou
IEEE Access 10, 113122-113130, 2022
402022
A countermeasure against statistical ineffective fault analysis
J Breier, M Khairallah, X Hou, Y Liu
IEEE Transactions on Circuits and Systems II: Express Briefs 67 (12), 3322-3326, 2020
362020
Fault attacks made easy: differential fault analysis automation on assembly code
J Breier, X Hou, Y Liu
IACR Transactions on Cryptographic Hardware and Embedded Systems, 96-122, 2018
302018
Automated Methods in Cryptographic Fault Analysis
J Breier, X Hou, S Bhasin
Springer International Publishing, 2019
292019
Feeding two cats with one bowl: On designing a fault and side-channel resistant software encoding scheme
J Breier, X Hou
Topics in Cryptology–CT-RSA 2017: The Cryptographers’ Track at the RSA …, 2017
232017
SITM: See-In-The-Middle Side-Channel Assisted Middle Round Differential Cryptanalysis on SPN Block Ciphers
S Bhasin, J Breier, X Hou, D Jap, R Poussier, SM Sim
IACR Transactions on Cryptographic Hardware and Embedded Systems, 95-122, 2020
222020
Back to the Basics: Seamless Integration of Side-Channel Pre-Processing in Deep Neural Networks
YS Won, X Hou, D Jap, J Breier, S Bhasin
IEEE Transactions on Information Forensics and Security 16, 3215-3227, 2021
212021
On Side Channel Vulnerabilities of Bit Permutations in Cryptographic Algorithms
J Breier, D Jap, X Hou, S Bhasin
IEEE Transactions on Information Forensics and Security 15, 1072-1085, 2019
202019
Fully Automated Differential Fault Analysis on Software Implementations of Block Ciphers
X Hou, J Breier, F Zhang, Y Liu
IACR Transactions on Cryptographic Hardware and Embedded Systems, 1-29, 2019
182019
On evaluating fault resilient encoding schemes in software
J Breier, X Hou, Y Liu
IEEE Transactions on Dependable and Secure Computing 18 (3), 1065-1079, 2019
182019
Security Evaluation of Deep Neural Network Resistance Against Laser Fault Injection
X Hou, J Breier, D Jap, L Ma, S Bhasin, Y Liu
2020 IEEE International Symposium on the Physical and Failure Analysis of …, 2020
142020
Hilbert spaces of entire Dirichlet series and composition operators
X Hou, B Hu, LH Khoi
Journal of Mathematical Analysis and Applications 401 (1), 416-429, 2013
142013
On LCD codes and lattices
X Hou, F Oggier
Information Theory (ISIT), 2016 IEEE International Symposium on, 1501-1505, 2016
122016
Physical security of deep learning on edge devices: Comprehensive evaluation of fault injection attack vectors
X Hou, J Breier, D Jap, L Ma, S Bhasin, Y Liu
Microelectronics Reliability 120, 114116, 2021
102021
A Finer-Grain Analysis of the Leakage (Non) Resilience of OCB
F Berti, S Bhasin, J Breier, X Hou, R Poussier, FX Standaert, B Udvarhelyi
IACR Transactions on Cryptographic Hardware and Embedded Systems, 461-481, 2022
82022
Construction and Secrecy Gain of a Family of 5-modular Lattices
X Hou, F Lin, F Oggier
2014 IEEE Information Theory Workshop (ITW 2014), 117-121, 2014
82014
FooBaR: Fault Fooling Backdoor Attack on Neural Network Training
J Breier, X Hou, M Ochoa, J Solano
IEEE Transactions on Dependable and Secure Computing, 2022
72022
Some properties of composition operators on entire Dirichlet series with real frequencies
X Hou, LH Khoi
Comptes Rendus Mathematique 350 (3), 149-152, 2012
72012
The system can't perform the operation now. Try again later.
Articles 1–20