Yier Jin mainly focuses on Computer security, Embedded system, Hardware Trojan, Cloud computing security and Cryptography. The various areas that Yier Jin examines in his Computer security study include Software deployment, Logic gate, Power management, Smart grid and Web of Things. His Embedded system study integrates concerns from other disciplines, such as Domain, Formal equivalence checking, Emerging technologies, Hardware security module and Overhead.
His work carried out in the field of Hardware Trojan brings together such families of science as Field-programmable gate array, Computer hardware and Encryption. The Encryption study combines topics in areas such as Register-transfer level and Pre-play attack. His research in Cryptography intersects with topics in Integrated circuit design, Internet security, Wearable technology and Design flow.
Yier Jin mostly deals with Embedded system, Computer security, Cryptography, Hardware security module and Hardware Trojan. His biological study spans a wide range of topics, including Trojan, Integrated circuit, Register-transfer level, Side channel attack and Formal verification. His Integrated circuit research integrates issues from Digital electronics, Reverse engineering, Chip and Logic gate.
Encryption is the focus of his Computer security research. The study incorporates disciplines such as Integrated circuit design and Wireless in addition to Cryptography. His work deals with themes such as Computer hardware and Key, which intersect with Hardware Trojan.
His scientific interests lie mostly in Embedded system, Artificial intelligence, Side channel attack, Adversarial system and Distributed computing. Yier Jin has included themes like Hardware Trojan, Software, Reverse engineering and Code in his Embedded system study. Hardware Trojan is the subject of his research, which falls under Trojan.
His studies deal with areas such as Machine learning, Electric power system, State and State variable as well as Artificial intelligence. His Side channel attack research is within the category of Cryptography. His Cryptography research focuses on subjects like Integrated circuit design, which are linked to Hardware security module.
Artificial intelligence, Embedded system, Deep learning, Adversarial system and Artificial neural network are his primary areas of study. His studies in Artificial intelligence integrate themes in fields like Network topology, Machine learning, Residual and State variable. His Machine learning research includes themes of Process, State and Electric power system.
His Embedded system study combines topics from a wide range of disciplines, such as Trojan, Hardware Trojan, Measure and Component. His Deep learning research is multidisciplinary, incorporating perspectives in Point cloud and Data science. His work investigates the relationship between Artificial neural network and topics such as Masking that intersect with problems in Side channel attack.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Hardware Trojan detection using path delay fingerprint
Yier Jin;Y. Makris.
hardware oriented security and trust (2008)
Privacy and Security in Internet of Things and Wearable Devices
Orlando Arias;Jacob Wurm;Khoa Hoang;Yier Jin.
IEEE Transactions on Multi-Scale Computing Systems (2015)
Hardware Trojans: Lessons Learned after One Decade of Research
K. Xiao;D. Forte;Y. Jin;R. Karri.
ACM Transactions on Design Automation of Electronic Systems (2016)
Experiences in Hardware Trojan design and implementation
Yier Jin;Nathan Kupp;Yiorgos Makris.
hardware oriented security and trust (2009)
Security analysis on consumer and industrial IoT devices
Jacob Wurm;Khoa Hoang;Orlando Arias;Ahmad-Reza Sadeghi.
asia and south pacific design automation conference (2016)
HAFIX: hardware-assisted flow integrity extension
Lucas Davi;Matthias Hanreich;Debayan Paul;Ahmad-Reza Sadeghi.
design automation conference (2015)
AppSAT: Approximately deobfuscating integrated circuits
Kaveh Shamsi;Meng Li;Travis Meade;Zheng Zhao.
hardware oriented security and trust (2017)
Proof-Carrying Hardware Intellectual Property: A Pathway to Trusted Module Acquisition
Eric Love;Yier Jin;Yiorgos Makris.
IEEE Transactions on Information Forensics and Security (2012)
Hardware Trojans in Wireless Cryptographic ICs
Y. Jin;Y. Makris.
IEEE Design & Test of Computers (2010)
Provably Secure Camouflaging Strategy for IC Protection
Meng Li;Kaveh Shamsi;Travis Meade;Zheng Zhao.
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (2019)
Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking d-index is inferred from publications deemed to belong to the considered discipline.
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: