Gait2Vec: continuous authentication of smartphone users based on gait behavior L He, C Ma, C Tu, Y Zhang 2022 IEEE 25th International Conference on Computer Supported Cooperative …, 2022 | 24 | 2022 |
Low-cost hardware implementation of elliptic curve cryptography for general prime fields Y Ma, Q Zhang, Z Liu, C Tu, J Lin Information and Communications Security: 18th International Conference …, 2016 | 7 | 2016 |
Bignn: A bilateral-branch graph neural network to solve popularity bias in recommendation Y Kou, N Gao, Y Zhang, C Tu, C Ma 2022 IEEE 34th International Conference on Tools with Artificial …, 2022 | 6 | 2022 |
Combination of hardware and software: An efficient aes implementation resistant to side-channel attacks on all programmable soc J Ge, N Gao, C Tu, J Xiang, Z Liu, J Yuan Computer Security: 23rd European Symposium on Research in Computer Security …, 2018 | 6 | 2018 |
Plvcg: A pretraining based model for live video comment generation Z Zeng, N Gao, C Xue, C Tu Pacific-Asia Conference on Knowledge Discovery and Data Mining, 690-702, 2021 | 5 | 2021 |
More secure collaborative apis resistant to flush+ reload and flush+ flush attacks on armv8-a J Ge, N Gao, C Tu, J Xiang, Z Liu 2019 26th Asia-Pacific Software Engineering Conference (APSEC), 410-417, 2019 | 5 | 2019 |
Detecting side channel vulnerabilities in improved rotating S-box masking scheme—Presenting four non-profiled attacks Z Liu, N Gao, C Tu, Y Ma, Z Liu International Conference on Selected Areas in Cryptography, 41-57, 2016 | 5 | 2016 |
Incorporating attributes semantics into knowledge graph embeddings M Li, N Gao, C Tu, J Peng, M Li 2021 IEEE 24th International Conference on Computer Supported Cooperative …, 2021 | 4 | 2021 |
A Hardware/Software Collaborative SM4 Implementation Resistant to Side-channel Attacks on ARM-FPGA Embedded SoC P Peng, C Ma, J Ge, N Gao, C Tu 2020 IEEE Symposium on Computers and Communications (ISCC), 1-7, 2020 | 4 | 2020 |
Secflush: A hardware/software collaborative design for real-time detection and defense against flush-based cache attacks C Tang, Z Liu, C Ma, J Ge, C Tu International Conference on Information and Communications Security, 251-268, 2019 | 4 | 2019 |
AdapTimer: Hardware/Software Collaborative Timer Resistant to Flush-Based Cache Attacks on ARM-FPGA Embedded SoC J Ge, N Gao, C Tu, J Xiang, Z Liu 2019 IEEE 37th International Conference on Computer Design (ICCD), 585-593, 2019 | 4 | 2019 |
Knowledge graph embedding with order information of triplets J Yuan, N Gao, J Xiang, C Tu, J Ge Advances in Knowledge Discovery and Data Mining: 23rd Pacific-Asia …, 2019 | 4 | 2019 |
Qrl: A high performance quadruple-rail logic for resisting dpa on fpga implementations C Tu, J Zhou, N Gao, Z Liu, Y Ma, Z Liu Information and Communications Security: 17th International Conference …, 2016 | 4 | 2016 |
CMVCG: Non-autoregressive Conditional Masked Live Video Comments Generation Model Z Zeng, C Tu, N Gao, C Xue, C Ma, Y Shan 2021 International Joint Conference on Neural Networks (IJCNN), 1-8, 2021 | 3 | 2021 |
Flush-detector: More secure API resistant to flush-based spectre attacks on ARM cortex-A9 M He, C Ma, J Ge, N Gao, C Tu 2020 IEEE Symposium on Computers and Communications (ISCC), 1-6, 2020 | 3 | 2020 |
PrivRec: user-centric differentially private collaborative filtering using LSH and KD Y Zhang, N Gao, J Chen, C Tu, J Wang Neural Information Processing: 27th International Conference, ICONIP 2020 …, 2020 | 3 | 2020 |
A practical chosen message power analysis approach against ciphers with the key whitening layers C Tu, L Zhang, Z Liu, N Gao, Y Ma International Conference on Applied Cryptography and Network Security, 415-434, 2017 | 3 | 2017 |
Leakage Fingerprints: A Non-negligible Vulnerability in Side-Channel Analysis Z Liu, N Gao, C Tu, J Zhou, Y Ma, Y Zhao Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 3 | 2016 |
A Practical Chosen Message Power Analysis Method on the Feistel-SP ciphers with Applications to CLEFIA and Camellia. C Tu, N Gao, Z Liu, L Wang, Z Liu, B Ma IACR Cryptol. ePrint Arch. 2015, 174, 2015 | 3 | 2015 |
A progressive dual-rail routing repair approach for FPGA implementation of Crypto algorithm C Tu, W He, N Gao, E de la Torre, Z Liu, L Liu Information Security Practice and Experience: 10th International Conference …, 2014 | 3 | 2014 |