Publications (full list)

Journal (# indicates corresponding author, * indicates co-first author)

[40] Huaibing Peng, Huming Qiu, Hua Ma, Shuo Wang, Anmin Fu, Said F. Al-Sarawi, Derek Abbott, and Yansong Gao#. “On Model Outsourcing Adaptive Attacks to Deep Learning Backdoor Defenses.” IEEE Transactions on Information Forensics and Security (2024). CCF A

[39] Huming Qiu, Hua Ma, Zhi Zhang, Alsharif Abuadbba, Wei Kang, Anmin Fu, and Yansong Gao#. “Towards a critical evaluation of robustness for deep learning backdoor countermeasures.” IEEE Transactions on Information Forensics and Security (2023). CCF A

[38] Yinshan Li, Hua Ma, Zhi Zhang, Yansong Gao#, Alsharif Abuadbba, Minhui Xue, Anmin Fu, Yifeng Zheng, Said F. Al-Sarawi, and Derek Abbott. “NTD: Non-Transferability enabled Deep Learning Backdoor Detection.” IEEE Transactions on Information Forensics and Security (2023). CCF A Code

[37] Hua Ma, Qun Li, Yifeng Zheng, Zhi Zhang, Xiaoning Liu, Yansong Gao#, Said F. Al-Sarawi, and Derek Abbott. “MUD-PQFed: Towards Malicious User Detection in Privacy-Preserving Quantized Federated Learning.” Computers & Security (2023). CCF B

[36] Yifeng Zheng, Shuangqing Xu, Songlei Wang, Yansong Gao, and Zhongyun Hua. “Privet: A Privacy-Preserving Vertical Federated Learning Service for Gradient Boosted Decision Tables.” IEEE Transactions on Services Computing (2023). CCF A

[35] Hua Ma, Huming Qiu, Yansong Gao#, Zhi Zhang, Alsharif Abuadbba, Minhui Xue, Anmin Fu, Zhang Jiliang, Said Al-Sarawi, and Derek Abbott. “Quantization backdoors to deep learning commercial frameworks.” IEEE Transactions on Dependable and Secure Computing (2023). CCF A Code

[34] Ngoc Duy Pham, Alsharif Abuadbba, Yansong Gao, Tran Khoa Phan, and Naveen Chilamkurti. “Binarizing split learning for data privacy enhancement and computation reduction.” IEEE Transactions on Information Forensics and Security (2023). CCF A

[33] Jiliang Zhang, Shuang Peng, Yansong Gao, Zhi Zhang, and Qinghui Hong. “APMSA: Adversarial Perturbation against Model Stealing Attacks.” IEEE Transactions on Information Forensics and Security (2023). CCF A

[32] Yansong Gao, Jianrong Yao, Lihui Pang, Wei Yang, Anmin Fu, Said F. Al-Sarawi, and Derek Abbott. “MLMSA: Multi-Label Multi-Side-Channel-Information enabled Deep Learning Attacks on APUF Variants.” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (2023). CCF A

[31] Wei He, Zhi Zhang, Yueqiang Cheng, Wenhao Wang, Wei Song, Yansong Gao, Qifei Zhang, Kang Li, Dongxi Liu, Surya Nepal. “WhistleBlower: A System-level Empirical Study on RowHammer.” IEEE Transactions on Computers (2023). CCF A

[30] Yansong Gao, Yang Su, Surya Nepal, and Damith C. Ranasinghe. “NoisFre: Noise-tolerant memory fingerprints from commodity devices for security functions.” IEEE Transactions on Dependable and Secure Computing (2022). CCF A. Video Demo

[29] Zhi Zhang, Wei He, Yueqiang Cheng, Wenhao Wang, Yansong Gao#, Dongxi Liu, Kang Li, Surya Nepal, Anmin Fu, Yi Zou. “Implicit Hammer: Cross-Privilege-Boundary Rowhammer through Implicit Accesses”. IEEE Transactions on Dependable and Secure Computing (2022). CCF A

[28] Huming Qiu (Supervised Master Student), Hua Ma, Zhi Zhang, Yansong Gao#, Yifeng Zheng, Anmin Fu, Pan Zhou, Derek Abbott, and Said F. Al-Sarawi. “RBNN: Memory-efficient reconfigurable deep binary neural network with IP protection for internet of things.” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (2022). CCF A

[27] Lei Zhou, Anmin Fu, Guomin Yang, Yansong Gao, Shui Yu, and Robert H. Deng. “Fair Cloud Auditing Based on Blockchain for Resource-Constrained IoT Devices.” IEEE Transactions on Dependable and Secure Computing (2022). CCF A

[26] Boyu Kuang, Anmin Fu, Yansong Gao, Yuqing Zhang, Jianying Zhou, and Robert H. Deng. “FeSA: Automatic Federated Swarm Attestation on Dynamic Large-Scale IoT Devices.” IEEE Transactions on Dependable and Secure Computing (2022). CCF A

[25] Yansong Gao, Qun Li (Supervised Master Student), Yifeng Zheng, Guohong Wang, Jiannan Wei, and Mang Su. “SEDML: Securely and efficiently harnessing distributed knowledge in machine learning.” Computers & Security 121 (2022): 102857. CCF B

[24] Xicheng Wan (Supervised Undergraduate Student), Yifeng Zheng, Qun Li, Anmin Fu, Mang Su, and Yansong Gao. “Towards Privacy-Preserving and Verifiable Federated Matrix Factorization.” Knowledge-Based Systems (2022).

[23] Zhenzhu Chen, Shang Wang, Anmin Fu, Yansong Gao, Shui Yu, Robert H. Deng. “LinkBreaker: Breaking the Backdoor-Trigger Link in DNNs via Neurons Consistency Check.” IEEE Transactions on Information Forensics and Security (2022). CCF A

[22] Yang Su, Michael Chesser, Yansong Gao, Alanson P. Sample, and Damith C. Ranasinghe. “Wisecr: Secure Simultaneous Code Disseminationto Many Batteryless Computational RFID Devices.” IEEE Transactions on Dependable and Secure Computing (2022). CCF A

[21] Jianrong Yao (Supervised Master Student), Lihui Pang, Yang Su, Zhi Zhang, Wei Yang, Anmin Fu, and Yansong Gao#. “Design and Evaluate Recomposited OR-AND-XOR-PUF.” IEEE Transactions on Emerging Topics in Computing (2022).

[20] J. R. Dawson, George Hobbs, Yansong Gao, Seyit Camtepe, Josef Pieprzyk, Yi Feng, Luke Tranfa, Sarah Bradbury, Weiwei Zhu, and Di Li. “Physical Publicly Verifiable Randomness from Pulsars.” Astronomy & Computing (2022).

[19] Yueqiang Cheng, Zhi Zhang, Yansong Gao, Zhaofeng Chen, Shengjian Guo, Qifei Zhang, Rui Mei, Surya Nepal, and Yang Xiang. “Meltdown-type attacks are still feasible in the wall of kernel page-Table isolation.” Computers & Security 113 (2022): 102556. CCF B

[18] Boyu Kuang, Anmin Fu, Willy Susilo, Shui Yu, and Yansong Gao. “A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects.” Computers & Security 112 (2022): 102498. CCF B

[17] Yansong Gao, Minki Kim, Chandra Thapa, Sharif Abuadbba, Zhi Zhang, Seyit A. Camtepe, Hyoungshick Kim, and Surya Nepal. “Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things.” IEEE Transactions on Computers (2021). CCF A Code

[16] Yupeng Yu, Wenxin Kuang, Zheng Qin, Kenli Li, Jiliang Zhang, Yansong Gao, Wenjia Li, and Keqin Li. “Artificial Intelligence Security: Threats and Countermeasures.” ACM Computing Surveys (CSUR) 55, no. 1 (2021): 1-36.

[15] Zhi Zhang, Wei He, Yueqiang Cheng, Wenhao Wang, Yansong Gao#, Minghua Wang, Kang Li, Surya Nepal, and Yang Xiang. “BitMine: An End-to-End Tool for Detecting Rowhammer Vulnerability.” IEEE Transactions on Information Forensics and Security 16 (2021): 5167-5181. CCF A

[14] Yansong Gao, Yeonjae Kim, Bao Gia Doan, Zhi Zhang, Gongxuan Zhang, Surya Nepal, Damith C. Ranasinghe, and Hyoungshick Kim. “Design and evaluation of a multi-domain Trojan detection method on deep neural networks.” IEEE Transactions on Dependable and Secure Computing (2021). CCF A. Code

[13] Anmin Fu, Xianglong Zhang, Naixue Xiong, Yansong Gao, and Huaqun Wang. “VFL: A Verifiable Federated Learning with Privacy-Preserving for Big Data in Industrial IoT”. IEEE Transactions on Industrial Informatics (2020).

[12] Zhi Zhang, Yueqiang Chen, Yansong Gao, Surya Nepal, Dongxi Liu and Yi Zhou. “Detecting hardware assisted virtualization with inconspicuous features.” IEEE Transactions on Information Forensics and Security (2020). CCF A

[11] Yansong Gao, Marten van Dijk, Lei Xu, Wei Yang, Surya Nepal, and Damith C. Ranasinghe. “Treverse: Trial-and-error lightweight secure reverse authentication with simulatable pufs.” IEEE Transactions on Dependable and Secure Computing (2020). CCF A

[10] Yansong Gao, Said F. Al-Sarawi, and Derek Abbott. “Physical unclonable functions.” Nature Electronics 3, no. 2 (2020): 81-91.

[9] Yang Su, Yansong Gao, Michael Chesser, Omid Kavehei, Alanson Sample, and Damith Ranasinghe. “Secucode: Intrinsic puf entangled secure wireless code dissemination for computational RFID devices.” IEEE Transactions on Dependable and Secure Computing (2019). CCF A Code and Video Demo

[8] Yansong Gao, Yang Su, Lei Xu, and Damith C. Ranasinghe. “Lightweight (reverse) fuzzy extractor with multiple reference puf responses.” IEEE Transactions on Information Forensics and Security 14, no. 7 (2019): 1887-1901. CCF A

[7] Lei Xu, Lin Cai, Yansong Gao, Yuwang Yang, and Tianyou Chai. “Security-aware proportional fairness resource allocation for cognitive heterogeneous networks.” IEEE Transactions on Vehicular Technology 67, no. 12 (2018): 11694-11704.

[6] Yansong Gao, Hua Ma, Said F. Al-Sarawi, Derek Abbott, and Damith C. Ranasinghe. “PUF-FSM: a controlled strong PUF.” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 37, no. 5 (2018): 1104-1108. CCF A

[5] Yansong Gao, Hua Ma, Derek Abbott, and Said F. Al-Sarawi. “PUF sensor: Exploiting PUF unreliability for secure wireless sensing.” IEEE Transactions on Circuits and Systems I: Regular Papers 64, no. 9 (2017): 2532-2543.

[4] Yansong Gao, Omid Kavehei, Said F. Al-Sarawi, Damith C. Ranasinghe, and Derek Abbott. “Read operation performance of large selectorless cross-point array with self-rectifying memristive device.” Integration 54 (2016): 56-64. CCF C

[3] Yansong Gao, Damith C. Ranasinghe, Said F. Al-Sarawi, Omid Kavehei, and Derek Abbott. “Emerging physical unclonable functions with nanotechnology.” IEEE access 4 (2016): 61-80.

[2] Yansong Gao, Damith C. Ranasinghe, Said F. Al-Sarawi, Omid Kavehei, and Derek Abbott. “Memristive crypto primitive for building highly secure physical unclonable functions.” Scientific reports 5 (2015): 12785.

[1] Hongbin Zhang, Yanbing Mao, and Yansong Gao. “Exponential stability and asynchronous stabilization of switched systems with stable and unstable subsystems.” Asian Journal of Control 15, no. 5 (2013): 1426-1433.

Conference (# indicates corresponding author, * indicates co-first author)

[22] Zhi Zhang, Decheng Chen, Jiahao Qi, Yueqiang Cheng, Shijie Jiang, Yiyang Lin, Yansong Gao#, Surya Nepal, Yi Zou, Jiliang Zhang, Yang Xiang. “SoK: Rowhammer on Commodity Operating Systems”, ACM ASIA Conference on Computer and Communications Security (AsiaCCS), 2024, To appear.

[21] Hua Ma, Shang Wang, Yansong Gao#, Zhi Zhang, Huming Qiu, Minhui Xue#, Alsharif Abuadbba, Anmin Fu, Nepal Surya, and Derek Abbott. “Watch Out! Simple Horizontal Class Backdoor Can Trivially Evade Defense”, ACM Conference on Computer and Communications Security (CCS), 2024, CCF A, To appear.

[20] Xin Zhang, Zhi Zhang, Qingni Shen, Wenhao Wang, Yansong Gao, Zhuoxi Yang and Zhonghai Wu. “ThermalScope: A Practical Interrupt Side Channel Attack Based on Thermal Event Interrupts”, ACM/IEEE Design Automation Conference (DAC), 2024, CCF A, To appear.

[19] Yansong Gao, Huming Qiu, Zhi Zhang, Binghui Wang, Hua Ma, Alsharif Abuadbba, Minhui Xue, Anmin Fu, and Surya Nepal. “DeepTheft: Stealing DNN Model Architectures through Power Side Channel”, IEEE Symposium on Security and Privacy (Oakland), 2024, CCF A, To appear code and large-scale dataset

[18] Shaofeng Li, Xinyu Wang, Minhui Xue, Haojin Zhu, Zhi Zhang, Yansong Gao, Wen Wu, Xuemin (Sherman) Shen, Yes, One-Bit-Flip Matters! Universal DNN Model Inference Depletion with Runtime Code Fault Injection, USENIX Security Symposium, 2024, CCF A

[17] Xin Zhang, Zhi Zhang, Qingni Shen, Wenhao Wang, Yansong Gao, Zhuoxi Yang, Jiliang Zhang, SegScope: Probing Fine-grained Interrupts via Architectural Footprints, IEEE International Symposium on High-Performance Computer Architecture (HPCA), 2024, CCF A

[16] Park, Seonhye, Alsharif Abuadbba, Shuo Wang, Kristen Moore, Yansong Gao, Hyoungshick Kim, and Surya Nepal. “DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify Proprietary Dataset Use in Deep Neural Networks.” Annual Computer Security Applications Conference (ACSAC), 2023, CCF B, Code.

[15] Hua Ma, Yinshan Li, Yansong Gao#, Zhi Zhang, Alsharif Abuadbba, Anmin Fu, Said F. Al-Sarawi, Nepal Surya, and Derek Abbott. “TransCAB: Transferable Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World.” (SRDS) (2023). CCF B, To appear Natural Trigger based Backdoor Dataset, Video Demo

[14] Shang Wang, Yansong Gao*, Anmin Fu, Zhi Zhang, Yuqing Zhang, Willy Susilo, and Dongxi Liu. “CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences.” ACM ASIA Conference on Computer and Communications Security (AsiaCCS, Distinguished Paper Award) (2023). CCF C

[13] #Chunyi Zhou (Co-Supervised Ph.D Student), Yansong Gao*, Anmin Fu, Kai Chen, Zhiyang Dai, Zhi Zhang, Minhui Xue, and Yuqing Zhang. “PPA: Preference Profiling Attack Against Federated Learning.” The Network and Distributed System Security Symposium (NDSS). 2023, CCF A Code

[12] Zhi Zhang, Yueqiang Cheng, Minghua Wang, Wei He, Wenhao Wang, Nepal Surya, Yansong Gao, Kang Li, Zhe Wang, and Chenggang Wu. “SoftTRR: Protect Page Tables Against RowHammer Attacks using Software-only Target Row Refresh.” USENIX Annual Technical Conference (USENIX ATC ‘22) 2022. (CCF A, AR=16.30%=64/393)

[11] Bedeuro Kim, Alsharif Abuadbba, Yansong Gao, Yifeng Zheng, Muhammad Ejaz Ahmed, Hyoungshick Kim, and Surya Nepal. “Decamouflage: A Framework to Detect Image-Scaling Attacks on CNN.” The 51st IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 2021. (CCF B, AR=16.30%=48/295)

[10] Wei Yang, Hailong Zhang, Yansong Gao, Anmin Fu and Songjie Wei. “Side-Channel Leakage Detection Based on Constant Parameter Channel Model.” The IEEE International Conference on Computer Design (ICCD) 2020. (CCF B) Presentation

[9] Yansong Gao, Minki Kim, Sharif Abuadbba, Yeonjae Kim, Chandra Thapa, Kyuyeon Kim, Seyit A. Camtepe, Hyoungshick Kim, and Surya Nepal. “End-to-End Evaluation of Federated Learning and Split Learning for Internet of Things.” The 39th International Symposium on Reliable Distributed Systems (SRDS) 2020. (CCF B, AR=25.19%=33/131) Code Demo Presentation

[8] Abuadbba, Sharif, Kyuyeon Kim, Minki Kim, Chandra Thapa, Seyit A. Camtepe, Yansong Gao, Hyoungshick Kim, and Surya Nepal. “Can We Use Split Learning on 1D CNN Models for Privacy Preserving Training?.” 15th ACM ASIA Conference on Computer and Communications Security (AsiaCCS) (2020). (CCF C, AR=21.75%=67/308) Code

[7] Yansong Gao, Change Xu, Derui Wang, Shiping Chen, Damith C. Ranasinghe, and Surya Nepal. “Strip: A defence against trojan attacks on deep neural networks.” In Proceedings of the 35th Annual Computer Security Applications Conference (ACSAC), pp. 113-125. 2019. (CCF B, AR=22.6%=60/266) Code

[6] Yansong Gao, Yang Su, Wei Yang, Shiping Chen, Surya Nepal, and Damith C. Ranasinghe. “Building secure SRAM PUF key generators on resource constrained devices.” In 2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 912-917. IEEE, 2019.

[5] Yang Su, Yansong Gao, Omid Kavehei, and Damith C. Ranasinghe. “Hash functions and benchmarks for resource constrained passive devices: A preliminary study.” In 2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 1020-1025. IEEE, 2019.

[4] Hua Ma, Yansong Gao, Omid Kavehei, and Damith C. Ranasinghe. “A PUF sensor: Securing physical measurements.” In 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 648-653. IEEE, 2017.

[3] Yansong Gao, Gefei Li, Hua Ma, Said F. Al-Sarawi, Omid Kavehei, Derek Abbott, and Damith C. Ranasinghe. “Obfuscated challenge-response: A secure lightweight authentication mechanism for PUF-based pervasive devices.” In 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), pp. 1-6. IEEE, 2016.

[2] Yansong Gao, Damith C. Ranasinghe, Said F. Al-Sarawi, Omid Kavehei, and Derek Abbott. “mrPUF: A novel memristive device based physical unclonable function.” In International Conference on Applied Cryptography and Network Security (ACNS), pp. 595-615. Springer, Cham, 2015. (CCF C, AR=21%)

[1] Yansong Gao, Tianpei Chen, and Jin Li. “High linearity and wide-bandwith LFMCW generator for THz radar system.” In 2013 International Conference on Communications, Circuits and Systems (ICCCAS), vol. 1, pp. 301-305. IEEE, 2013.