A. Adam Ding
Orcid: 0000-0003-1397-2442Affiliations:
- Northeastern University, Department of Mathematics
According to our database1,
A. Adam Ding
authored at least 46 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on math.neu.edu
On csauthors.net:
Bibliography
2024
CoRR, 2024
TrustZoneTunnel: A Cross-World Pattern History Table-Based Microarchitectural Side-Channel Attack.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2024
2023
IEEE Trans. Inf. Forensics Secur., 2023
Proceedings of the IEEE/ACM International Conference on Computer Aided Design, 2023
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
2022
Proc. Priv. Enhancing Technol., 2022
Real-time disease prediction with local differential privacy in Internet of Medical Things.
CoRR, 2022
Understanding and Quantifying Adversarial Examples Existence in Linear Classification.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2022
Proceedings of the GLSVLSI '22: Great Lakes Symposium on VLSI 2022, Irvine CA USA, June 6, 2022
Proceedings of the 2022 Design, Automation & Test in Europe Conference & Exhibition, 2022
Proceedings of the International Conference on Artificial Intelligence and Statistics, 2022
2020
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020
J. Priv. Confidentiality, 2020
MemPoline: Mitigating Memory-based Side-Channel Attacks through Memory Access Obfuscation.
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Software Verification - 12th International Conference, 2020
2019
Efficient Nonprofiling 2nd-Order Power Analysis on Masked Devices Utilizing Multiple Leakage Points.
IEEE Trans. Dependable Secur. Comput., 2019
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2019
2018
Proceedings of the International Conference on Computer-Aided Design, 2018
2017
J. Mach. Learn. Res., 2017
J. Hardw. Syst. Secur., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 2017 IEEE International Conference on Computer Design, 2017
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2017
Proceedings of The 9th Asian Conference on Machine Learning, 2017
2016
A Unified Metric for Quantifying Information Leakage of Cryptographic Devices under Power Analysis Attacks.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
An Improvement of Both Security and Reliability for Keccak Implementations on Smart Card.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
SMARP: A Stochastic MAC Protocol with Randomized Power Control for Underwater Sensor Networks.
Proceedings of the 13th Annual IEEE International Conference on Sensing, 2016
Proceedings of the 19th International Conference on Artificial Intelligence and Statistics, 2016
2015
Towards Secure Cryptographic Software Implementation Against Side-Channel Power Analysis Attacks.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2015
2014
Side-channel Power Analysis of Different Protection Schemes Against Fault Attacks on AES.
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
2012
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012
2003
Backpropagation of pseudo-errors: neural networks that are adaptive to heterogeneous noise.
IEEE Trans. Neural Networks, 2003
1999