Author of the publication

An Efficient SCA Leakage Model Construction Method Under Predictable Evaluation.

, , , , , , and . IEEE Trans. Inf. Forensics Secur., 13 (12): 3008-3018 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generalized projective synchronization of fractional order chaotic systems, , and . Physica A: Statistical Mechanics and its Applications, 387 (14): 3738--3746 (Jun 1, 2008)Computation of universal unfolding of the double zero bifurcation in the Z2-symmetric system., and . Int. J. Comput. Math., 91 (3): 461-479 (2014)Research on WEBGIS real-time distribution system of port navigation-supporting information., , , , and . IGARSS, page 3. IEEE, (2005)An Efficient SCA Leakage Model Construction Method Under Predictable Evaluation., , , , , , and . IEEE Trans. Inf. Forensics Secur., 13 (12): 3008-3018 (2018)Towards Transparent and Stealthy Android OS Sandboxing via Customizable Container-Based Virtualization., , , , , , and . CCS, page 2858-2874. ACM, (2021)JTaint: Finding Privacy-Leakage in Chrome Extensions., , , , and . ACISP, volume 12248 of Lecture Notes in Computer Science, page 563-583. Springer, (2020)Research on 3D Simulation Technology Applied in Navigation-Aid Management., , and . CW, page 597-600. IEEE Computer Society, (2008)Further Research of RFID Applying on Exhibition Logistics., , and . CW, page 631-634. IEEE Computer Society, (2008)VAHunt: Warding Off New Repackaged Android Malware in App-Virtualization's Clothing., , , , , , and . CCS, page 535-549. ACM, (2020)Deep Learning-Based Anomaly Detection in Cyber-Physical Systems: Progress and Opportunities., , , , and . CoRR, (2020)