Chenyang Tu

Orcid: 0000-0003-2130-0531

According to our database1, Chenyang Tu authored at least 31 papers between 2014 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Pure Hardware Design and Implementation on FPGA of WireGuard-based VPN Gateway.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

2022
BiGNN: A Bilateral-Branch Graph Neural Network to Solve Popularity Bias in Recommendation.
Proceedings of the 34th IEEE International Conference on Tools with Artificial Intelligence, 2022

Multi-level Fusion of Multi-modal Semantic Embeddings for Zero Shot Learning.
Proceedings of the International Conference on Multimodal Interaction, 2022

Gait2Vec: Continuous Authentication of Smartphone Users Based on Gait Behavior.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

2021
PLVCG: A Pretraining Based Model for Live Video Comment Generation.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2021

CMVCG: Non-autoregressive Conditional Masked Live Video Comments Generation Model.
Proceedings of the International Joint Conference on Neural Networks, 2021

Image-Enhanced Multi-Modal Representation for Local Topic Detection from Social Media.
Proceedings of the Database Systems for Advanced Applications, 2021

Incorporating Attributes Semantics into Knowledge Graph Embeddings.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

2020
MACM: How to Reduce the Multi-Round SCA to the Single-Round Attack on the Feistel-SP Networks.
IEEE Trans. Inf. Forensics Secur., 2020

Multiple Demographic Attributes Prediction in Mobile and Sensor Devices.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2020

User Preference Excitation Network for Sequential Recommendation.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020

A Hardware/Software Collaborative SM4 Implementation Resistant to Side-channel Attacks on ARM-FPGA Embedded SoC.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

Flush-Detector: More Secure API Resistant to Flush-Based Spectre Attacks on ARM Cortex-A9.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

SECL: Separated Embedding and Correlation Learning for Demographic Prediction in Ubiquitous Sensor Scenario.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

PrivRec: User-Centric Differentially Private Collaborative Filtering Using LSH and KD.
Proceedings of the Neural Information Processing - 27th International Conference, 2020

Leveraging Knowledge Context Information to Enhance Personalized Recommendation.
Proceedings of the Neural Information Processing - 27th International Conference, 2020

2019
Knowledge Graph Embedding with Order Information of Triplets.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2019

The Application of Network Based Embedding in Local Topic Detection from Social Media.
Proceedings of the 31st IEEE International Conference on Tools with Artificial Intelligence, 2019

Local Topic Detection Using Word Embedding from Spatio-Temporal Social Media.
Proceedings of the Neural Information Processing - 26th International Conference, 2019

SecFlush: A Hardware/Software Collaborative Design for Real-Time Detection and Defense Against Flush-Based Cache Attacks.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

AdapTimer: Hardware/Software Collaborative Timer Resistant to Flush-Based Cache Attacks on ARM-FPGA Embedded SoC.
Proceedings of the 37th IEEE International Conference on Computer Design, 2019

Perceiving Topic Bubbles: Local Topic Detection in Spatio-Temporal Tweet Stream.
Proceedings of the Database Systems for Advanced Applications, 2019

More Secure Collaborative APIs Resistant to Flush+Reload and Flush+Flush Attacks on ARMv8-A.
Proceedings of the 26th Asia-Pacific Software Engineering Conference, 2019

2018
Combination of Hardware and Software: An Efficient AES Implementation Resistant to Side-Channel Attacks on All Programmable SoC.
Proceedings of the Computer Security, 2018

2017
A Practical Chosen Message Power Analysis Approach Against Ciphers with the Key Whitening Layers.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
Detecting Side Channel Vulnerabilities in Improved Rotating S-Box Masking Scheme - Presenting Four Non-profiled Attacks.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016

Low-Cost Hardware Implementation of Elliptic Curve Cryptography for General Prime Fields.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

Leakage Fingerprints: A Non-negligible Vulnerability in Side-Channel Analysis.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
A Practical Chosen Message Power Analysis Method on the Feistel-SP ciphers with Applications to CLEFIA and Camellia.
IACR Cryptol. ePrint Arch., 2015

QRL: A High Performance Quadruple-Rail Logic for Resisting DPA on FPGA Implementations.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

2014
A Progressive Dual-Rail Routing Repair Approach for FPGA Implementation of Crypto Algorithm.
Proceedings of the Information Security Practice and Experience, 2014


  Loading...