Follow
Mengmei Ye
Mengmei Ye
Staff Research Scientist, IBM Research
Verified email at ibm.com - Homepage
Title
Cited by
Cited by
Year
Security analysis of internet-of-things: a case study of august smart lock
M Ye, N Jiang, H Yang, Q Yan
2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2017
572017
Surviving information leakage hardware trojan attacks using hardware isolation
N Hu, M Ye, S Wei
IEEE Transactions on Emerging Topics in Computing 7 (2), 253-261, 2017
312017
HybridTEE: Secure Mobile DNN Execution Using Hybrid Trusted Execution Environment
A Gangal, M Ye, S Wei
2020 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), 2020
202020
TZSlicer: Security-aware dynamic program slicing for hardware isolation
M Ye, J Sherman, W Srisa-an, S Wei
2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2018
182018
Towards the Security of Motion Detection-based Video Surveillance on IoT Devices
X Feng, M Ye, V Swaminathan, S Wei
Proceedings of the on Thematic Workshops of ACM Multimedia 2017, 2017
162017
HISA: Hardware isolation-based secure architecture for CPU-FPGA embedded systems
M Ye, X Feng, S Wei
2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 1-8, 2018
102018
Two-way real time multimedia stream authentication using physical unclonable functions
MZ Shahrak, M Ye, V Swaminathan, S Wei
2016 IEEE 18th International Workshop on Multimedia Signal Processing (MMSP), 2016
72016
Remote attestation of confidential VMs using ephemeral vTPMs
V Narayanan, C Carvalho, A Ruocco, G Almasi, J Bottomley, M Ye, ...
Proceedings of the 39th Annual Computer Security Applications Conference …, 2023
4*2023
Runtime fault injection detection for fpga-based dnn execution using siamese path verification
X Feng, M Ye, K Xia, S Wei
2021 Design, Automation & Test in Europe Conference & Exhibition (DATE), 786-789, 2021
42021
Runtime Hardware Security Verification Using Approximate Computing: A Case Study on Video Motion Detection
M Ye, X Feng, S Wei
2019 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), 2019
42019
Lightweight secure sensing using hardware isolation
M Ye, N Hu, S Wei
2016 IEEE SENSORS, 2016
42016
Visual privacy protection in mobile image recognition using protective perturbation
M Ye, Z Tang, H Phan, Y Xie, B Yuan, S Wei
Proceedings of the 13th ACM Multimedia Systems Conference, 164-176, 2022
32022
PUFSec: Protecting physical unclonable functions using hardware isolation-based system security techniques
M Ye, MZ Shahrak, S Wei
2017 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), 2017
32017
EvoIsolator: Evolving Program Slices for Hardware Isolation Based Security
M Ye, MB Cohen, W Srisa-an, S Wei
International Symposium on Search Based Software Engineering, 2018
22018
Workshop on Zero Trust Hardware Architectures (ZTHA)
S Koteshwara, M Ye, H Franke
IEEE/ACM International Conference on Computer-Aided Design, 2023
2023
AccShield: a New Trusted Execution Environment with Machine-Learning Accelerators
W Ren, W Kozlowski, S Koteshwara, M Ye, H Franke, D Chen
2023 60th ACM/IEEE Design Automation Conference (DAC), 1-6, 2023
2023
Free the Turtles: Removing Nested Virtualization for Performance and Confidentiality in the Cloud
M Ye, A Ruocco, D Buono, J Bottomley, H Franke
2023 IEEE 16th International Conference on Cloud Computing (CLOUD), 275-281, 2023
2023
Zero Trust Hardware Architectures: when we “never trust”, what can we do to “always verify?”
M Ye, S Koteshwara
Women in Hardware and Systems Security, 2022
2022
No More Turtles: The SecondaryVM Framework-An Alternative to Nested Virtualization
M Ye, A Ruocco
KVM Forum, 2022
2022
Fake Gradient: A Security and Privacy Protection Framework for DNN-based Image Classification
X Feng, Y Xie, M Ye, Z Tang, B Yuan, S Wei
Proceedings of the 29th ACM International Conference on Multimedia, 5510-5518, 2021
2021
The system can't perform the operation now. Try again later.
Articles 1–20