A subspace pre-learning strategy to break the interpose puf G Li, KT Mursi Electronics 11 (7), 1049, 2022 | 6 | 2022 |
A New Security Boundary of Component Differentially Challenged XOR PUFs Against Machine Learning Modeling Attacks G Li, KT Mursi, AO Aseeri, MS Alkatheiri, Y Zhuang International Journal of Computer Networks & Communications, 2022 | 2 | 2022 |
A Permutation Challenge Input Interface for Arbiter PUF Variants Against Machine Learning Attacks Y Zhuang, G Li, KT Mursi 2022 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 418-421, 2022 | 1 | 2022 |
Bridging the Gap between Source Code and Requirements Using GPT (Student Abstract) R Xu, Z Xu, G Li, VS Sheng Proceedings of the AAAI Conference on Artificial Intelligence 38 (21), 23686 …, 2024 | | 2024 |
Adaptive Clustering-Based Collusion Detection in Crowdsourcing R Xu, G Li, W Jin, A Chen, VS Sheng International Conference on Intelligent Computing, 261-275, 2023 | | 2023 |
ACCD: an adaptive clustering-based collusion detector in crowdsourcing (student abstract) R Xu, G Li, W Jin, A Chen, VS Sheng Proceedings of the AAAI Conference on Artificial Intelligence 37 (13), 16370 …, 2023 | | 2023 |
Lightweight Strategy for XOR PUFs as Security Primitives for Resource-constrained IoT device G Li, KT Mursi, Y Zhuang arXiv preprint arXiv:2210.01749, 2022 | | 2022 |