| Persistent fault analysis on block ciphers F Zhang, X Lou, X Zhao, S Bhasin, W He, R Ding, S Qureshi, K Ren IACR Transactions on Cryptographic Hardware and Embedded Systems, 150-172, 2018 | 152 | 2018 |
| Deep fourier kernel for self-attentive point processes S Zhu, M Zhang, R Ding, Y Xie International conference on artificial intelligence and statistics, 856-864, 2021 | 36 | 2021 |
| Spatio-temporal point processes with attention for traffic congestion event modeling S Zhu, R Ding, M Zhang, P Van Hentenryck, Y Xie IEEE Transactions on Intelligent Transportation Systems 23 (7), 7298-7309, 2021 | 35 | 2021 |
| Emshepherd: Detecting adversarial samples via side-channel leakage R Ding, C Gongye, S Wang, AA Ding, Y Fei Proceedings of the 2023 ACM Asia Conference on Computer and Communications …, 2023 | 11 | 2023 |
| VertexSerum: Poisoning Graph Neural Networks for Link Inference R Ding*, S Duan*, X Xu, Y Fei Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2023 | 11 | 2023 |
| A cross-platform cache timing attack framework via deep learning R Ding, Z Zhang, X Zhang, C Gongye, Y Fei, AA Ding 2022 Design, Automation & Test in Europe Conference & Exhibition (DATE), 676-681, 2022 | 10 | 2022 |
| Neural architecture search for adversarial robustness via learnable pruning Y Li, P Zhao, R Ding, T Zhou, Y Fei, X Xu, X Lin Frontiers in High Performance Computing 2, 1301384, 2024 | 9 | 2024 |
| Ran $ Net: An anti-ransomware methodology based on cache monitoring and deep learning X Zhang, Z Zhang, R Ding, C Gongye, AA Ding, Y Fei Proceedings of the Great Lakes Symposium on VLSI 2022, 487-492, 2022 | 5 | 2022 |
| Non-transferable Pruning R Ding, L Su, AA Ding, Y Fei The 18th European Conference on Computer Vision ECCV 2024, 2024 | 3 | 2024 |
| Probe-Me-Not: Protecting Pre-trained Encoders from Malicious Probing R Ding, T Zhou, L Su, AA Ding, X Xu, Y Fei Network and Distributed System Security (NDSS) Symposium 2025, 2024 | 2 | 2024 |
| TRAFFIC CONGESTION MODELING WITH DEEP ATTENTION HAWKES PROCESS R Ding Master's thesis, Georgia Institute of Technology, 2020 | 2 | 2020 |
| MoEcho: Exploiting Side-Channel Attacks to Compromise User Privacy in Mixture-of-Experts LLMs R Ding, T Xu, X Shen, AA Ding, Y Fei The 32nd ACM Conference on Computer and Communications Security (ACM CCS 2025), 2025 | 1 | 2025 |
| Graph in the Vault: Protecting Edge GNN Inference with Trusted Execution Environment R Ding, T Xu, AA Ding, Y Fei Design Automation Conference (DAC 2025), 2025 | 1 | 2025 |
| MACPruning: Dynamic Operation Pruning to Mitigate Side-Channel DNN Model Extraction R Ding, C Gongye, D Ranney, AA Ding, Y Fei IEEE International Symposium on Hardware Oriented Security and Trust (HOST 2025), 2025 | 1 | 2025 |
| A Content-dependent Watermark for Safeguarding Image Attribution T Zhou, R Ding, G Liu, C Fleming, RR Kompella, Y Fei, X Xu, S Ren arXiv preprint arXiv:2509.10766, 2025 | | 2025 |
| A Low-Power Differential Temperature Sensor with Chopped Cascode Transistors and Switched-Capacitor Integration J Yang, T Gourousis, M Yan, R Ding, A Mittal, M Zhang, F Restuccia, ... Electronics 14 (12), 2381, 2025 | | 2025 |
| Towards Robust and Secure Deep Learning: From Training Through Deployment to Inference R Ding Northeastern University, 2025 | | 2025 |
| GraphCroc: Cross-Correlation Autoencoder for Graph Structural Reconstruction S Duan*, R Ding*, J He, AA Ding, Y Fei, X Xu The Thirty-Eighth Annual Conference on Neural Information Processing Systems, 2024 | | 2024 |