Author of the publication

Enhanced Correlation Power Analysis by Biasing Power Traces.

, , , , , and . ISC, volume 9866 of Lecture Notes in Computer Science, page 59-72. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Defense Against Adversarial Attacks and Security Evaluation of Deep Learning System., , , and . ML4CS (2), volume 12487 of Lecture Notes in Computer Science, page 592-602. Springer, (2020)A Phase-Locking Analysis of Neuronal Firing Rhythms with Transcranial Magneto-Acoustical Stimulation Based on the Hodgkin-Huxley Neuron Model., , , , and . Frontiers Comput. Neurosci., (2017)Using pretraining and text mining methods to automatically extract the chemical scientific data., , , and . Data Technol. Appl., 56 (2): 205-222 (2022)An Android System Vulnerability Risk Evaluation Method for Heap Overflow., , , and . ES, page 89-96. IEEE Computer Society, (2016)An intensity-based personalized affective model., , , and . ROBIO, page 2212-2215. IEEE, (2007)Collaborative Filtering via Different Preference Structures., , , and . KSEM, volume 10412 of Lecture Notes in Computer Science, page 309-321. Springer, (2017)A Dynamic Credible Factory Reset Mechanism of Personal Data in Android Device., , and . TrustCom/BigDataSE/ISPA (1), page 990-998. IEEE, (2015)Multi-attribute Counterfeiting Tag Identification Protocol in Large-Scale RFID System., , , and . ICICS, volume 10631 of Lecture Notes in Computer Science, page 352-362. Springer, (2017)Transfer Learning for Scientific Data Chain Extraction in Small Chemical Corpus with joint BERT-CRF Model., , , and . BIRNDL@SIGIR, volume 2414 of CEUR Workshop Proceedings, page 28-41. CEUR-WS.org, (2019)Analyzing Customer's Product Preference Using Wireless Signals., , , , , and . KSEM, volume 10412 of Lecture Notes in Computer Science, page 139-148. Springer, (2017)