Author of the publication

Deep Learning-based Side Channel Attack on HMAC SM3.

, , , and . Int. J. Interact. Multim. Artif. Intell., 6 (4): 113-120 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A block upper triangular preconditioner with two parameters for saddle-point problems., and . Comput. Math. Appl., (2024)The Research of Matrix Converter Space Vector Modulation., , , and . ICICA (2), volume 308 of Communications in Computer and Information Science, page 812-820. Springer, (2012)Verifying web services composition based on hierarchical colored petri nets., , and . IHIS, page 47-54. ACM, (2005)Making Power-Efficient Data Value Predictions., , and . Asia-Pacific Computer Systems Architecture Conference, volume 3740 of Lecture Notes in Computer Science, page 310-322. Springer, (2005)On Modeling and Optimizing LTE/Wi-Fi Coexistence with Prioritized Traffic Classes., , and . DySPAN, page 1-10. IEEE, (2018)Strategic Network Infrastructure Sharing through Backup Reservation in a Competitive Environment., , , , and . SECON, page 1-9. IEEE, (2019)Driving in the Fog: Latency Measurement, Modeling, and Optimization of LTE-based Fog Computing for Smart Vehicles., , , and . SECON, page 1-9. IEEE, (2019)A code-matched interleaver design based on the parity-check weight low-bound of component codes for turbo codes., , , , , and . WCSP, page 1-6. IEEE, (2010)Building segmentation and modeling from airborne LiDAR data., , , , , , and . Int. J. Digit. Earth, 8 (9): 694-709 (2015)Towards Ubiquitous AI in 6G with Federated Learning., , and . CoRR, (2020)