FPGA-based 40.9-Gbits/s masked AES with area optimization for storage area network Y Wang, Y Ha IEEE Transactions on Circuits and Systems II: Express Briefs 60 (1), 36-40, 2013 | 114 | 2013 |
FPGA implementations of the AES masked against power analysis attacks F Regazzoni, Y Wang, FX Standaert Proceedings of COSADE 2011, 56-66, 2011 | 69 | 2011 |
FPGA based optimization for masked AES implementation Z Yuan, Y Wang, J Li, R Li, W Zhao 2011 IEEE 54th International Midwest Symposium on Circuits and Systems …, 2011 | 44 | 2011 |
An improved ridge features extraction algorithm for distorted fingerprints matching TH Nguyen, Y Wang, R Li Journal of Information Security and Applications 18 (4), 206-214, 2013 | 43 | 2013 |
On the security of in-vehicle hybrid network: Status and challenges T Huang, J Zhou, Y Wang, A Cheng Information Security Practice and Experience: 13th International Conference …, 2017 | 30 | 2017 |
Improved chaff point generation for vault scheme in bio‐cryptosystems TH Nguyen, Y Wang, Y Ha, R Li IET biometrics 2 (2), 48-55, 2013 | 30 | 2013 |
A3GAN: Attribute-Aware Anonymization Networks for Face De-identification L Zhai, Q Guo, X Xie, L Ma, YE Wang, Y Liu Proceedings of the 30th ACM international conference on multimedia, 5303-5313, 2022 | 27 | 2022 |
A fingerprint fuzzy vault scheme using a fast chaff point generation algorithm TH Nguyen, Y Wang, TN Nguyen, R Li 2013 IEEE International Conference on Signal Processing, Communication and …, 2013 | 26 | 2013 |
A unified architecture for a public key cryptographic coprocessor Y Wang, DL Maskell, J Leiwo Journal of Systems Architecture 54 (10), 1004-1016, 2008 | 25 | 2008 |
A performance and area efficient ASIP for higher-order DPA-resistant AES Y Wang, Y Ha IEEE journal on emerging and selected topics in circuits and systems 4 (2 …, 2014 | 24 | 2014 |
High throughput and resource efficient AES encryption/decryption for SANs Y Wang, Y Ha 2016 IEEE International Symposium on Circuits and Systems (ISCAS), 1166-1169, 2016 | 23 | 2016 |
Performance and security‐enhanced fuzzy vault scheme based on ridge features for distorted fingerprints TH Nguyen, Y Wang, Y Ha, R Li IET Biometrics 4 (1), 29-39, 2015 | 22 | 2015 |
FPGA-based SHA-3 acceleration on a 32-bit processor via instruction set extension Y Wang, Y Shi, C Wang, Y Ha 2015 IEEE International Conference on Electron Devices and Solid-State …, 2015 | 18 | 2015 |
Reconfiguring three-dimensional processor arrays for fault-tolerance: Hardness and heuristic algorithms G Jiang, J Wu, Y Ha, Y Wang, J Sun IEEE Transactions on Computers 64 (10), 2926-2939, 2015 | 18 | 2015 |
A unified architecture for supporting operations of AES and ECC Y Wang, R Li 2011 Fourth International Symposium on Parallel Architectures, Algorithms …, 2011 | 17 | 2011 |
Improvement on masked S-box hardware implementation J Zeng, Y Wang, C Xu, R Li 2012 International Conference on Innovations in Information Technology (IIT …, 2012 | 15 | 2012 |
An efficient algorithm for DPA-resistent RSA Y Wang, J Leiwo, T Srikanthan, L Jianwen APCCAS 2006-2006 IEEE Asia Pacific Conference on Circuits and Systems, 1659-1662, 2006 | 15 | 2006 |
A highly efficient side channel attack with profiling through relevance-learning on physical leakage information AA Pammu, KS Chong, Y Wang, BH Gwee IEEE Transactions on Dependable and Secure Computing 16 (3), 376-387, 2018 | 14 | 2018 |
Vulnerability of deep learning model based anomaly detection in vehicle network Y Wang, DWM Chia, Y Ha 2020 IEEE 63rd International Midwest Symposium on Circuits and Systems …, 2020 | 13 | 2020 |
Ori: A greybox fuzzer for SOME/IP protocols in automotive Ethernet Y Li, H Chen, C Zhang, S Xiong, C Liu, Y Wang 2020 27th Asia-Pacific Software Engineering Conference (APSEC), 495-499, 2020 | 11 | 2020 |