A. Adam Ding

Orcid: 0000-0003-1397-2442

Affiliations:
  • Northeastern University, Department of Mathematics


According to our database1, A. Adam Ding authored at least 46 papers between 1999 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
GraphCroc: Cross-Correlation Autoencoder for Graph Structural Reconstruction.
CoRR, 2024

TrustZoneTunnel: A Cross-World Pattern History Table-Based Microarchitectural Side-Channel Attack.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2024

Non-transferable Pruning.
Proceedings of the Computer Vision - ECCV 2024, 2024

2023
A Guessing Entropy-Based Framework for Deep Learning-Assisted Side-Channel Analysis.
IEEE Trans. Inf. Forensics Secur., 2023

Deep-Learning Model Extraction Through Software-Based Power Side-Channel.
Proceedings of the IEEE/ACM International Conference on Computer Aided Design, 2023

EMShepherd: Detecting Adversarial Samples via Side-channel Leakage.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
Masking Feedforward Neural Networks Against Power Analysis Attacks.
Proc. Priv. Enhancing Technol., 2022

Real-time disease prediction with local differential privacy in Internet of Medical Things.
CoRR, 2022

Linear Model with Local Differential Privacy.
CoRR, 2022

Achieving Differential Privacy with Matrix Masking in Big Data.
CoRR, 2022

Understanding and Quantifying Adversarial Examples Existence in Linear Classification.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2022

Ran$Net: An Anti-Ransomware Methodology based on Cache Monitoring and Deep Learning.
Proceedings of the GLSVLSI '22: Great Lakes Symposium on VLSI 2022, Irvine CA USA, June 6, 2022

A Cross-Platform Cache Timing Attack Framework via Deep Learning.
Proceedings of the 2022 Design, Automation & Test in Europe Conference & Exhibition, 2022

Finding Dynamics Preserving Adversarial Winning Tickets.
Proceedings of the International Conference on Artificial Intelligence and Statistics, 2022

2020
A Fast and Accurate Guessing Entropy Estimation Algorithm for Full-key Recovery.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

On the Privacy and Utility Properties of Triple Matrix-Masking.
J. Priv. Confidentiality, 2020

MemPoline: Mitigating Memory-based Side-Channel Attacks through Memory Access Obfuscation.
IACR Cryptol. ePrint Arch., 2020

Automatic Detection and Repair of Transition- Based Leakage in Software Binaries.
Proceedings of the Software Verification - 12th International Conference, 2020

2019
Efficient Nonprofiling 2nd-Order Power Analysis on Masked Devices Utilizing Multiple Leakage Points.
IEEE Trans. Dependable Secur. Comput., 2019

Comprehensive Side-Channel Power Analysis of XTS-AES.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2019

2018
Power Analysis Attack of an AES GPU Implementation.
J. Hardw. Syst. Secur., 2018

SCADET: a side-channel attack detection tool for tracking prime+probe.
Proceedings of the International Conference on Computer-Aided Design, 2018

2017
A Robust-Equitable Measure for Feature Ranking and Selection.
J. Mach. Learn. Res., 2017

Differential Fault Analysis of SHA-3 Under Relaxed Fault Models.
J. Hardw. Syst. Secur., 2017

Towards Sound and Optimal Leakage Detection Procedure.
IACR Cryptol. ePrint Arch., 2017

Compiler-Assisted Threshold Implementation against Power Analysis Attacks.
Proceedings of the 2017 IEEE International Conference on Computer Design, 2017

Side-channel power analysis of XTS-AES.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2017

Rate Optimal Estimation for High Dimensional Spatial Covariance Matrices.
Proceedings of The 9th Asian Conference on Machine Learning, 2017

2016
A Unified Metric for Quantifying Information Leakage of Cryptographic Devices under Power Analysis Attacks.
IACR Cryptol. ePrint Arch., 2016

Statistical Analysis for Access-Driven Cache Attacks Against AES.
IACR Cryptol. ePrint Arch., 2016

An Improvement of Both Security and Reliability for Keccak Implementations on Smart Card.
IACR Cryptol. ePrint Arch., 2016

Differential Fault Analysis of SHA3-224 and SHA3-256.
IACR Cryptol. ePrint Arch., 2016

SMARP: A Stochastic MAC Protocol with Randomized Power Control for Underwater Sensor Networks.
Proceedings of the 13th Annual IEEE International Conference on Sensing, 2016

A Robust-Equitable Copula Dependence Measure for Feature Selection.
Proceedings of the 19th International Conference on Artificial Intelligence and Statistics, 2016

2015
A statistics-based success rate model for DPA and CPA.
J. Cryptogr. Eng., 2015

Towards Secure Cryptographic Software Implementation Against Side-Channel Power Analysis Attacks.
IACR Cryptol. ePrint Arch., 2015

Side-Channel Analysis of MAC-Keccak Hardware Implementations.
IACR Cryptol. ePrint Arch., 2015

Simpler, Faster, and More Robust T-test Based Leakage Detection.
IACR Cryptol. ePrint Arch., 2015

Efficient 2nd-order power analysis on masked devices utilizing multiple leakage.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2015

2014
Side-channel Power Analysis of Different Protection Schemes Against Fault Attacks on AES.
IACR Cryptol. ePrint Arch., 2014

Power Analysis Attack on Hardware Implementation of MAC-Keccak on FPGAs.
IACR Cryptol. ePrint Arch., 2014

A Statistics-based Fundamental Model for Side-channel Attack Analysis.
IACR Cryptol. ePrint Arch., 2014

A Statistical Model for Higher Order DPA on Masked Devices.
IACR Cryptol. ePrint Arch., 2014

2012
A Statistical Model for DPA with Novel Algorithmic Confusion Analysis.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

2003
Backpropagation of pseudo-errors: neural networks that are adaptive to heterogeneous noise.
IEEE Trans. Neural Networks, 2003

1999
Neural-network prediction with noisy predictors.
IEEE Trans. Neural Networks, 1999


  Loading...