Author of the publication

An Efficient SCA Leakage Model Construction Method Under Predictable Evaluation.

, , , , , , and . IEEE Trans. Inf. Forensics Secur., 13 (12): 3008-3018 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimizations and Economics of Crowdsourced Mobile Streaming., , , , and . IEEE Commun. Mag., 55 (4): 21-27 (2017)Improving Information Freshness via Backbone-Assisted Cooperative Access Points., , , , , and . IEEE Internet Things J., 10 (5): 4592-4604 (March 2023)A modified weak Galerkin method for H(curl)-elliptic problem., , and . Comput. Math. Appl., (June 2023)Kalman Filtering-based Traffic Prediction for Software Defined Intra-data Center Networks., , , , and . KSII Trans. Internet Inf. Syst., 13 (6): 2964-2985 (2019)A robust and secure watermarking algorithm based on DWT and SVD in the fractional order fourier transform domain., and . Array, (2022)Continual Instruction Tuning for Large Multimodal Models., , , and . CoRR, (2023)Design and Implementation of Electromagnetic Spectrum Sensing Load Based on Software Radio., , , , and . Autom. Control. Comput. Sci., 57 (3): 317-325 (June 2023)Griffon: Spelling out All Object Locations at Any Granularity with Large Language Models., , , , , and . CoRR, (2023)An Overview of Interval Analysis Techniques and Their Fuzzy Extensions in Multi-Criteria Decision-Making: What's Going on and What's Next?, , , and . Int. J. Fuzzy Syst., 25 (5): 2081-2108 (2023)Differential Power Analysis on ZUC Algorithm., , and . IACR Cryptol. ePrint Arch., (2012)