Author of the publication

Optimal model search for hardware-trojan-based bit-level fault attacks on block ciphers.

, , , and . Sci. China Inf. Sci., 61 (3): 039106:1-039106:3 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Strength-Strength and Strength-Degree Correlation Measures for Directed Weighted Complex Network Analysis., , , and . IEICE Trans. Inf. Syst., 94-D (11): 2284-2287 (2011)A unified semantic description and user's permissions knowledge reasoning for multiple domain cyberspace based on knowledge graph., , , , , , , , and . J. Intell. Fuzzy Syst., 43 (6): 8195-8206 (2022)An Approximate Flow Betweenness Centrality Measure for Complex Network., , , , and . IEICE Trans. Inf. Syst., 96-D (3): 727-730 (2013)Reversible Data Hiding for BTC-Compressed Images Based on Lossless Coding of Mean Tables., , , and . IEICE Trans. Commun., 96-B (2): 624-631 (2013)A DNS Tunnel Sliding Window Differential Detection Method Based on Normal Distribution Reasonable Range Filtering., , , , , , and . CoRR, (2022)An API Semantics-Aware Malware Detection Method Based on Deep Learning., , , , , and . Secur. Commun. Networks, (2019)Deep learning-based personality recognition from text posts of online social networks., , , , , , , and . Appl. Intell., 48 (11): 4232-4246 (2018)A comprehensive study of multiple deductions-based algebraic trace driven cache attacks on AES., , , , , , and . Comput. Secur., (2013)pbSE: Phase-Based Symbolic Execution., , , , , , and . DSN, page 133-144. IEEE Computer Society, (2017)Improved Algebraic Fault Analysis: A Case Study on Piccolo and Applications to Other Lightweight Block Ciphers., , , , and . COSADE, volume 7864 of Lecture Notes in Computer Science, page 62-79. Springer, (2013)