关注
Chenyang Tu
Chenyang Tu
IIE, CAS
在 iie.ac.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Gait2Vec: continuous authentication of smartphone users based on gait behavior
L He, C Ma, C Tu, Y Zhang
2022 IEEE 25th International Conference on Computer Supported Cooperative …, 2022
242022
Low-cost hardware implementation of elliptic curve cryptography for general prime fields
Y Ma, Q Zhang, Z Liu, C Tu, J Lin
Information and Communications Security: 18th International Conference …, 2016
72016
Bignn: A bilateral-branch graph neural network to solve popularity bias in recommendation
Y Kou, N Gao, Y Zhang, C Tu, C Ma
2022 IEEE 34th International Conference on Tools with Artificial …, 2022
62022
Combination of hardware and software: An efficient aes implementation resistant to side-channel attacks on all programmable soc
J Ge, N Gao, C Tu, J Xiang, Z Liu, J Yuan
Computer Security: 23rd European Symposium on Research in Computer Security …, 2018
62018
Plvcg: A pretraining based model for live video comment generation
Z Zeng, N Gao, C Xue, C Tu
Pacific-Asia Conference on Knowledge Discovery and Data Mining, 690-702, 2021
52021
More secure collaborative apis resistant to flush+ reload and flush+ flush attacks on armv8-a
J Ge, N Gao, C Tu, J Xiang, Z Liu
2019 26th Asia-Pacific Software Engineering Conference (APSEC), 410-417, 2019
52019
Detecting side channel vulnerabilities in improved rotating S-box masking scheme—Presenting four non-profiled attacks
Z Liu, N Gao, C Tu, Y Ma, Z Liu
International Conference on Selected Areas in Cryptography, 41-57, 2016
52016
Incorporating attributes semantics into knowledge graph embeddings
M Li, N Gao, C Tu, J Peng, M Li
2021 IEEE 24th International Conference on Computer Supported Cooperative …, 2021
42021
A Hardware/Software Collaborative SM4 Implementation Resistant to Side-channel Attacks on ARM-FPGA Embedded SoC
P Peng, C Ma, J Ge, N Gao, C Tu
2020 IEEE Symposium on Computers and Communications (ISCC), 1-7, 2020
42020
Secflush: A hardware/software collaborative design for real-time detection and defense against flush-based cache attacks
C Tang, Z Liu, C Ma, J Ge, C Tu
International Conference on Information and Communications Security, 251-268, 2019
42019
AdapTimer: Hardware/Software Collaborative Timer Resistant to Flush-Based Cache Attacks on ARM-FPGA Embedded SoC
J Ge, N Gao, C Tu, J Xiang, Z Liu
2019 IEEE 37th International Conference on Computer Design (ICCD), 585-593, 2019
42019
Knowledge graph embedding with order information of triplets
J Yuan, N Gao, J Xiang, C Tu, J Ge
Advances in Knowledge Discovery and Data Mining: 23rd Pacific-Asia …, 2019
42019
Qrl: A high performance quadruple-rail logic for resisting dpa on fpga implementations
C Tu, J Zhou, N Gao, Z Liu, Y Ma, Z Liu
Information and Communications Security: 17th International Conference …, 2016
42016
CMVCG: Non-autoregressive Conditional Masked Live Video Comments Generation Model
Z Zeng, C Tu, N Gao, C Xue, C Ma, Y Shan
2021 International Joint Conference on Neural Networks (IJCNN), 1-8, 2021
32021
Flush-detector: More secure API resistant to flush-based spectre attacks on ARM cortex-A9
M He, C Ma, J Ge, N Gao, C Tu
2020 IEEE Symposium on Computers and Communications (ISCC), 1-6, 2020
32020
PrivRec: user-centric differentially private collaborative filtering using LSH and KD
Y Zhang, N Gao, J Chen, C Tu, J Wang
Neural Information Processing: 27th International Conference, ICONIP 2020 …, 2020
32020
A practical chosen message power analysis approach against ciphers with the key whitening layers
C Tu, L Zhang, Z Liu, N Gao, Y Ma
International Conference on Applied Cryptography and Network Security, 415-434, 2017
32017
Leakage Fingerprints: A Non-negligible Vulnerability in Side-Channel Analysis
Z Liu, N Gao, C Tu, J Zhou, Y Ma, Y Zhao
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
32016
A Practical Chosen Message Power Analysis Method on the Feistel-SP ciphers with Applications to CLEFIA and Camellia.
C Tu, N Gao, Z Liu, L Wang, Z Liu, B Ma
IACR Cryptol. ePrint Arch. 2015, 174, 2015
32015
A progressive dual-rail routing repair approach for FPGA implementation of Crypto algorithm
C Tu, W He, N Gao, E de la Torre, Z Liu, L Liu
Information Security Practice and Experience: 10th International Conference …, 2014
32014
系统目前无法执行此操作,请稍后再试。
文章 1–20