Author of the publication

An Efficient SCA Leakage Model Construction Method Under Predictable Evaluation.

, , , , , , and . IEEE Trans. Inf. Forensics Secur., 13 (12): 3008-3018 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Foldingnet-Based Geometry Compression of Point Cloud with Multi Descriptions., , , and . ICME Workshops, page 1-6. IEEE, (2022)An Exploratory Data Analysis of the Network Behavior of Hive Home Devices., , , and . IOTSMS, page 1-8. IEEE, (2021)Trust-based Approaches Towards Enhancing IoT Security: A Systematic Literature Review., , , and . CoRR, (2023)Deep Gaussian Denoiser Epistemic Uncertainty and Decoupled Dual-Attention Fusion., , , and . ICIP, page 1629-1633. IEEE, (2021)Scene Matters: Model-based Deep Video Compression., , , and . ICCV, page 12447-12457. IEEE, (2023)Uniform convergence of optimal order of a local discontinuous Galerkin method on a Shishkin mesh under a balanced norm., , and . CoRR, (2023)Supercloseness of the NIPG method for a singularly perturbed convection diffusion problem on Shishkin mesh in 2D., and . Comput. Math. Appl., (December 2023)An Agent Based Education Resource Purvey System., , , , , and . CIS (1), volume 3801 of Lecture Notes in Computer Science, page 381-386. Springer, (2005)Detection of DDoS Attack on Smart Home Infrastructure Using Artificial Intelligence Models., , , , and . CyberC, page 12-18. IEEE, (2022)Dynamic point cloud compression with spatio-temporal transformer-style modeling., , , , , and . DCC, page 53-62. IEEE, (2024)