D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Electronics and Electrical Engineering D-index 35 Citations 5,759 147 World Ranking 3693 National Ranking 1422
Computer Science D-index 35 Citations 5,965 178 World Ranking 7592 National Ranking 3567

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Computer security
  • Software

Yier Jin mainly focuses on Computer security, Embedded system, Hardware Trojan, Cloud computing security and Cryptography. The various areas that Yier Jin examines in his Computer security study include Software deployment, Logic gate, Power management, Smart grid and Web of Things. His Embedded system study integrates concerns from other disciplines, such as Domain, Formal equivalence checking, Emerging technologies, Hardware security module and Overhead.

His work carried out in the field of Hardware Trojan brings together such families of science as Field-programmable gate array, Computer hardware and Encryption. The Encryption study combines topics in areas such as Register-transfer level and Pre-play attack. His research in Cryptography intersects with topics in Integrated circuit design, Internet security, Wearable technology and Design flow.

His most cited work include:

  • Hardware Trojan detection using path delay fingerprint (500 citations)
  • Hardware Trojans: Lessons Learned after One Decade of Research (183 citations)
  • Experiences in Hardware Trojan design and implementation (170 citations)

What are the main themes of his work throughout his whole career to date?

Yier Jin mostly deals with Embedded system, Computer security, Cryptography, Hardware security module and Hardware Trojan. His biological study spans a wide range of topics, including Trojan, Integrated circuit, Register-transfer level, Side channel attack and Formal verification. His Integrated circuit research integrates issues from Digital electronics, Reverse engineering, Chip and Logic gate.

Encryption is the focus of his Computer security research. The study incorporates disciplines such as Integrated circuit design and Wireless in addition to Cryptography. His work deals with themes such as Computer hardware and Key, which intersect with Hardware Trojan.

He most often published in these fields:

  • Embedded system (35.43%)
  • Computer security (30.29%)
  • Cryptography (14.86%)

What were the highlights of his more recent work (between 2019-2021)?

  • Embedded system (35.43%)
  • Artificial intelligence (6.29%)
  • Side channel attack (7.43%)

In recent papers he was focusing on the following fields of study:

His scientific interests lie mostly in Embedded system, Artificial intelligence, Side channel attack, Adversarial system and Distributed computing. Yier Jin has included themes like Hardware Trojan, Software, Reverse engineering and Code in his Embedded system study. Hardware Trojan is the subject of his research, which falls under Trojan.

His studies deal with areas such as Machine learning, Electric power system, State and State variable as well as Artificial intelligence. His Side channel attack research is within the category of Cryptography. His Cryptography research focuses on subjects like Integrated circuit design, which are linked to Hardware security module.

Between 2019 and 2021, his most popular works were:

  • Robust Adversarial Objects against Deep Learning Models (18 citations)
  • Survey of machine learning methods for detecting false data injection attacks in power systems (12 citations)
  • DeepEM: Deep Neural Networks Model Recovery through EM Side-Channel Information Leakage (9 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Computer security
  • Software

Artificial intelligence, Embedded system, Deep learning, Adversarial system and Artificial neural network are his primary areas of study. His studies in Artificial intelligence integrate themes in fields like Network topology, Machine learning, Residual and State variable. His Machine learning research includes themes of Process, State and Electric power system.

His Embedded system study combines topics from a wide range of disciplines, such as Trojan, Hardware Trojan, Measure and Component. His Deep learning research is multidisciplinary, incorporating perspectives in Point cloud and Data science. His work investigates the relationship between Artificial neural network and topics such as Masking that intersect with problems in Side channel attack.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Hardware Trojan detection using path delay fingerprint

Yier Jin;Y. Makris.
hardware oriented security and trust (2008)

754 Citations

Hardware Trojans: Lessons Learned after One Decade of Research

K. Xiao;D. Forte;Y. Jin;R. Karri.
ACM Transactions on Design Automation of Electronic Systems (2016)

358 Citations

Privacy and Security in Internet of Things and Wearable Devices

Orlando Arias;Jacob Wurm;Khoa Hoang;Yier Jin.
IEEE Transactions on Multi-Scale Computing Systems (2015)

347 Citations

Experiences in Hardware Trojan design and implementation

Yier Jin;Nathan Kupp;Yiorgos Makris.
hardware oriented security and trust (2009)

272 Citations

Security analysis on consumer and industrial IoT devices

Jacob Wurm;Khoa Hoang;Orlando Arias;Ahmad-Reza Sadeghi.
asia and south pacific design automation conference (2016)

262 Citations

AppSAT: Approximately deobfuscating integrated circuits

Kaveh Shamsi;Meng Li;Travis Meade;Zheng Zhao.
hardware oriented security and trust (2017)

253 Citations

Provably Secure Camouflaging Strategy for IC Protection

Meng Li;Kaveh Shamsi;Travis Meade;Zheng Zhao.
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (2019)

233 Citations

HAFIX: hardware-assisted flow integrity extension

Lucas Davi;Matthias Hanreich;Debayan Paul;Ahmad-Reza Sadeghi.
design automation conference (2015)

200 Citations

Proof-Carrying Hardware Intellectual Property: A Pathway to Trusted Module Acquisition

Eric Love;Yier Jin;Yiorgos Makris.
IEEE Transactions on Information Forensics and Security (2012)

177 Citations

Hardware Trojans in Wireless Cryptographic ICs

Y. Jin;Y. Makris.
IEEE Design & Test of Computers (2010)

146 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Yier Jin

Ozgur Sinanoglu

Ozgur Sinanoglu

New York University Abu Dhabi

Publications: 67

Swarup Bhunia

Swarup Bhunia

University of Florida

Publications: 60

Ramesh Karri

Ramesh Karri

New York University

Publications: 56

Jeyavijayan Rajendran

Jeyavijayan Rajendran

Texas A&M University

Publications: 49

Prabhat Mishra

Prabhat Mishra

University of Florida

Publications: 29

Gang Qu

Gang Qu

University of Maryland, College Park

Publications: 24

Ankur Srivastava

Ankur Srivastava

University of Maryland, College Park

Publications: 22

Christof Paar

Christof Paar

Max Planck Institute for Security and Privacy

Publications: 21

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

Technical University of Darmstadt

Publications: 20

Mark M. Tehranipoor

Mark M. Tehranipoor

University of Florida

Publications: 16

Debdeep Mukhopadhyay

Debdeep Mukhopadhyay

Indian Institute of Technology Kharagpur

Publications: 15

Sylvain Guilley

Sylvain Guilley

Télécom ParisTech

Publications: 13

Farinaz Koushanfar

Farinaz Koushanfar

University of California, San Diego

Publications: 13

Rainer Leupers

Rainer Leupers

RWTH Aachen University

Publications: 12

Wei Hu

Wei Hu

Nanjing University

Publications: 12

Muhammad Shafique

Muhammad Shafique

New York University Abu Dhabi

Publications: 12

Trending Scientists

Wei-Ping Zhu

Wei-Ping Zhu

Concordia University

Rolf Frischknecht

Rolf Frischknecht

ETH Zurich

Enrica Verne

Enrica Verne

Polytechnic University of Turin

Lisa A. Donovan

Lisa A. Donovan

University of Georgia

Thomas Girke

Thomas Girke

University of California, Riverside

Rebecca A. Woodgate

Rebecca A. Woodgate

University of Washington

Sylvain Moreno

Sylvain Moreno

Simon Fraser University

Oscar A. Barbarin

Oscar A. Barbarin

University of Maryland, College Park

Yuko Munakata

Yuko Munakata

University of California, Davis

Roger S. Blumenthal

Roger S. Blumenthal

Johns Hopkins University

Richard C. Semelka

Richard C. Semelka

University of North Carolina at Chapel Hill

Robert T. Trousdale

Robert T. Trousdale

Mayo Clinic

Lawrence H. Cohn

Lawrence H. Cohn

Brigham and Women's Hospital

Lieven De Winter

Lieven De Winter

Université Catholique de Louvain

Daniel Esteve

Daniel Esteve

University of Paris-Saclay

Umran S. Inan

Umran S. Inan

Stanford University

Something went wrong. Please try again later.