Follow
Xiaolu Hou
Xiaolu Hou
Faculty of Informatics and Information Technologies, Slovak University of Technology, Bratislava
Verified email at stuba.sk - Homepage
Title
Cited by
Cited by
Year
Practical fault attack on deep neural networks
J Breier, X Hou, D Jap, L Ma, S Bhasin, Y Liu
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
732018
A countermeasure against statistical ineffective fault analysis
J Breier, M Khairallah, X Hou, Y Liu
IEEE Transactions on Circuits and Systems II: Express Briefs 67 (12), 3322-3326, 2020
272020
Automated Methods in Cryptographic Fault Analysis
J Breier, X Hou, S Bhasin
Springer International Publishing, 2019
242019
Fault attacks made easy: differential fault analysis automation on assembly code
J Breier, X Hou, Y Liu
IACR Transactions on Cryptographic Hardware and Embedded Systems, 96-122, 2018
242018
Feeding Two Cats with One Bowl: On Designing a Fault and Side-Channel Resistant Software Encoding Scheme
J Breier, X Hou
Cryptographers’ Track at the RSA Conference, 77-94, 2017
21*2017
SNIFF: reverse engineering of neural networks with fault attacks
J Breier, D Jap, X Hou, S Bhasin, Y Liu
IEEE Transactions on Reliability, 2021
192021
On evaluating fault resilient encoding schemes in software
J Breier, X Hou, Y Liu
IEEE Transactions on Dependable and Secure Computing 18 (3), 1065-1079, 2019
142019
Hilbert spaces of entire Dirichlet series and composition operators
X Hou, B Hu, LH Khoi
Journal of Mathematical Analysis and Applications 401 (1), 416-429, 2013
132013
On LCD codes and lattices
X Hou, F Oggier
Information Theory (ISIT), 2016 IEEE International Symposium on, 1501-1505, 2016
122016
SITM: See-In-The-Middle Side-Channel Assisted Middle Round Differential Cryptanalysis on SPN Block Ciphers
S Bhasin, J Breier, X Hou, D Jap, R Poussier, SM Sim
IACR Transactions on Cryptographic Hardware and Embedded Systems, 95-122, 2020
112020
On Side Channel Vulnerabilities of Bit Permutations in Cryptographic Algorithms
J Breier, D Jap, X Hou, S Bhasin
IEEE Transactions on Information Forensics and Security 15, 1072-1085, 2019
112019
Fully Automated Differential Fault Analysis on Software Implementations of Block Ciphers
X Hou, J Breier, F Zhang, Y Liu
IACR Transactions on Cryptographic Hardware and Embedded Systems, 1-29, 2019
112019
Construction and Secrecy Gain of a Family of 5-modular Lattices
X Hou, F Lin, F Oggier
2014 IEEE Information Theory Workshop (ITW 2014), 117-121, 2014
82014
Some properties of composition operators on entire Dirichlet series with real frequencies
X Hou, LH Khoi
Comptes Rendus Mathematique 350 (3), 149-152, 2012
72012
Security Evaluation of Deep Neural Network Resistance Against Laser Fault Injection
X Hou, J Breier, D Jap, L Ma, S Bhasin, Y Liu
2020 IEEE International Symposium on the Physical and Failure Analysis of …, 2020
62020
Experimental Evaluation of Deep Neural Network Resistance Against Fault Injection Attacks.
X Hou, J Breier, D Jap, L Ma, S Bhasin, Y Liu
IACR Cryptol. ePrint Arch. 2019, 461, 2019
62019
Modular Lattices from a Variation of Construction A over Number Fields
X Hou, F Oggier
arXiv preprint arXiv:1604.01583, 2016
62016
Physical security of deep learning on edge devices: Comprehensive evaluation of fault injection attack vectors
X Hou, J Breier, D Jap, L Ma, S Bhasin, Y Liu
Microelectronics Reliability 120, 114116, 2021
52021
Back to the Basics: Seamless Integration of Side-Channel Pre-Processing in Deep Neural Networks
YS Won, X Hou, D Jap, J Breier, S Bhasin
IEEE Transactions on Information Forensics and Security 16, 3215-3227, 2021
52021
Location Proximity Attacks Against Mobile Targets: Analytical Bounds and Attacker Strategies
X Wang, X Hou, R Rios, P Hallgren, NO Tippenhauer, M Ochoa
European Symposium on Research in Computer Security, 373-392, 2018
42018
The system can't perform the operation now. Try again later.
Articles 1–20