
Selected Publications
Lla: Enhancing security and privacy for generative models with logic-locked accelerators.
You Li*, Guannan Zhao*, Yunqi He, and Hai Zhou. (2026)
In AAAI (Oral). [Paper][Slides]
Physical-aware efpga redaction for secure and efficient hardware ip protection.
Yunqi He, You Li^, Ruofan Huang, Guannan Zhao and Hai Zhou. (2026)
In DATE. [Paper][Slides]
Re3: Finding refinement relations with relational mapping abstraction.
You Li*, Guannan Zhao*, Yunqi He, and Hai Zhou. (2025)
In DAC. [Paper][Slides]
De2: SAT-based sequential logic decryption with a functional description.
You Li*, Guannan Zhao*, Yunqi He, and Hai Zhou. (2025)
In DATE. [Paper][Slides]
Evaluating the security of logic locking on deep neural networks.
You Li*, Guannan Zhao*, Yunqi He, and Hai Zhou. (2024)
In DAC. [Paper][Slides]
Property guided secure configuration space search.
You Li*, Kaiyu Hou*, Yunqi He, Yan Chen, and Hai Zhou. (2024)
In ISC.
Se3: Sequential equivalence checking for non-cycle-accurate design transformations.
You Li*, Guannan Zhao*, Yunqi He, and Hai Zhou. (2023)
In DAC. [Paper][Slides]
Obfuslock: An efficient obfuscated locking framework for circuit ip protection.
You Li*, Guannan Zhao*, Yunqi He, and Hai Zhou. (2023)
In DATE. [Paper][Slides]
Discovering emergency call pitfalls for cellular networks with formal methods.
Kaiyu Hou*, You Li*, Yinbo Yu, Yan Chen, and Hai Zhou. (2021)
In MobiSys.
Network protocol safe configuration search in one shot.
You Li*, Kaiyu Hou*, Yan Chen, and Hai Zhou. (2020)
In Sigcomm Posters and Demos.
Sigattack: New high-level SAT-based attack on logic encryptions.
Yuanqi Shen, You Li, Shuyu Kong, Amin Rezaei, and Hai Zhou. (2019)
In DATE.
CycSAT-unresolvable cyclic logic encryption using unreachable states.
Amin Rezaei, You Li, Yuanqi Shen, Shuyu Kong, and Hai Zhou. (2019)
In ASP-DAC.
BeSAT: Behavioral SAT-based attack on cyclic logic encryption.
Yuanqi Shen, You Li, Amin Rezaei, Shuyu Kong, David Dlott, and Hai Zhou. (2019)
In ASP-DAC.
Cellscope: Automatically specifying and verifying cellular network protocols.
Yinbo Yu, You Li, Kaiyu Hou, Yan Chen, Hai Zhou, and Jianfeng Yang. (2019)
In Sigcomm Posters and Demos.
A lightweight policy enforcement system for resource protection and management in the SDN-based cloud.
Xue Leng, Kaiyu Hou, Yan Chen, Kai Bo, Libin Song, and You Li. (2019)
In Computer Networks.
An efficient method for calculating the error statistics of block-based approximate adders.
Yi Wu*, You Li*, Xiangxuan Ge*, Yuan Gao, and Weikang Qian. (2019)
In IEEE Trans. on Computers.