Author of the publication

Efficient collision attacks on smart card implementations of masked AES.

, , , , , , and . Sci. China Inf. Sci., 58 (5): 1-15 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Online field performance evaluation system of a grain combine harvester., , , , and . Comput. Electron. Agric., (2022)Review of Machine Learning Algorithms for Breast Cancer Diagnosis., , , , , and . DMBD (2), volume 2018 of Communications in Computer and Information Science, page 229-243. Springer, (2023)Design and Implementation of Three Level Coordinated Control System of Reactive Power and Voltage in Distribution Networks., , , , , and . CSAE, page 82:1-82:5. ACM, (2020)Efficiency analysis and evaluation of centrifugal variable-rate fertilizer spreading based on real-time spectral information on rice., , , , , and . Comput. Electron. Agric., (2023)The Analysis on Multimodal Transport Mode of Cross-border E-commerce with 'the Belt and Road' Strategy Based on Personalized Recommendation., , and . WHICEB, page 55. Association for Information Systems, (2018)Rock Particle Motion Information Detection Based on Video Instance Segmentation., , , and . Sensors, 21 (12): 4108 (2021)Multi-region radiomics for artificially intelligent diagnosis of breast cancer using multimodal ultrasound., , , and . Comput. Biol. Medicine, (2022)An Improved YOLOv3 Algorithm Combined with Attention Mechanism for Flame and Smoke Detection., , , , , and . ICAIS (1), volume 12736 of Lecture Notes in Computer Science, page 226-238. Springer, (2021)Multimodal deep learning for mapping forest dominant height by fusing GEDI with earth observation data., , , , , , , and . CoRR, (2023)SFPDML: Securer and Faster Privacy-Preserving Distributed Machine Learning Based on MKTFHE., , , , , , , and . MobiSec, volume 2095 of Communications in Computer and Information Science, page 94-108. Springer, (2023)