2025
Underwater Robot Self-Localization Method Using Tightly Coupled Events, Images, Inertial, and Acoustic Fusion.
IEEE Trans. Ind. Electron., May, 2025
An Underwater, Fault-Tolerant, Laser-Aided Robotic Multi-Modal Dense SLAM System for Continuous Underwater In-Situ Observation.
CoRR, April, 2025
Hybrid-VINS: Underwater Tightly Coupled Hybrid Visual Inertial Dense SLAM for AUV.
IEEE Trans. Ind. Electron., March, 2025
Quantitative Analysis of Fish-Like Propulsion Mechanisms Based on the Discrete Vortex Method.
IEEE Robotics Autom. Lett., March, 2025
Structured Light-Based Underwater Collision-Free Navigation and Dense Mapping System for Refined Exploration in Unknown Dark Environments.
IEEE Trans. Syst. Man Cybern. Syst., January, 2025
Mapping and Localization in Unknown Underwater Electric Field Using Passive Electric Sense System.
IEEE Trans. Instrum. Meas., 2025
Artificial Lateral Line Sensor for Robotic Fish Speed Measurement Based on Surface Flow Field Detection and Turbulence Noise Suppression.
IEEE Trans Autom. Sci. Eng., 2025
APTMRS: Autonomous Prism Target Maintenance Robotic System for FAST.
IEEE Trans Autom. Sci. Eng., 2025
2024
From Model to Reality: A Robust Framework for Automatic Generation of Welding Paths.
IEEE Trans. Ind. Electron., December, 2024
Water-MBSL: Underwater Movable Binocular Structured Light-Based High-Precision Dense Reconstruction Framework.
IEEE Trans. Ind. Informatics, April, 2024
WeldNet: A deep learning based method for weld seam type identification and initial point guidance.
Expert Syst. Appl., March, 2024
Structured Light Vision Based Pipeline Tracking and 3D Reconstruction Method for Underwater Vehicle.
IEEE Trans. Intell. Veh., February, 2024
CMBUV: A Composite-Mechanism Bioinspired Underwater Vehicle Integrated With Elasticity and Shear Damping Possesses High-Performance Capability.
IEEE Trans. Intell. Veh., January, 2024
DeepKP: A Robust and Accurate Framework for Weld Seam Keypoint Extraction in Welding Robots.
IEEE Trans. Instrum. Meas., 2024
High Dynamic Range Structured Light 3-D Measurement Based on Region Adaptive Fringe Brightness.
IEEE Trans. Ind. Electron., 2024
Linear Gaussian bounding box representation and ring-shaped rotated convolution for oriented object detection.
Pattern Recognit., 2024
EPRecon: An Efficient Framework for Real-Time Panoptic 3D Reconstruction from Monocular Video.
CoRR, 2024
Energy-storing analysis and fishtail stiffness optimization for a wire-driven elastic robotic fish.
CoRR, 2024
Completely Occluded and Dense Object Instance Segmentation Using Box Prompt-Based Segmentation Foundation Models.
CoRR, 2024
2023
Design and Modeling of a Sperm-Inspired Helical Propulsion Robot.
IEEE Robotics Autom. Lett., December, 2023
An Efficient and Robust Complex Weld Seam Feature Point Extraction Method for Seam Tracking and Posture Adjustment.
IEEE Trans. Ind. Informatics, November, 2023
Development and Testing of Advanced Driver Assistance Systems Through Scenario-Based Systems Engineering.
IEEE Trans. Intell. Veh., August, 2023
Scalable and Conflict-Free NTT Hardware Accelerator Design: Methodology, Proof, and Implementation.
,
,
,
,
,
,
,
,
,
,
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., May, 2023
A pixel-level deep segmentation network for automatic defect detection.
Expert Syst. Appl., April, 2023
DHSA: efficient doubly homomorphic secure aggregation for cross-silo federated learning.
J. Supercomput., 2023
An Underwater Structured Light Vision Calibration Method Considering Unknown Refractive Index Based on Aquila Optimizer.
IEEE Trans. Instrum. Meas., 2023
Binocular Structured Light 3-D Reconstruction System for Low-Light Underwater Environments: Design, Modeling, and Laser-Based Calibration.
IEEE Trans. Instrum. Meas., 2023
Development, Calibration, and Image Processing of Underwater Structured Light Vision System: A Survey.
IEEE Trans. Instrum. Meas., 2023
A Full Lifecycle Authentication Scheme for Large-Scale Smart IoT Applications.
IEEE Trans. Dependable Secur. Comput., 2023
A Wire-driven Elastic Robotic Fish and its Design and CPG-Based Control.
J. Intell. Robotic Syst., 2023
Chosen ciphertext correlation power analysis on Kyber.
Integr., 2023
Development of a Hybrid Vision Sensor and Its Application in Robotic Welding.
Proceedings of the 19th IEEE International Conference on Automation Science and Engineering, 2023
A Template Attack on Reduction Without Reference Device on Kyber.
Proceedings of the 32nd IEEE Asian Test Symposium, 2023
2022
Image Segmentation of Cabin Assembly Scene Based on Improved RGB-D Mask R-CNN.
IEEE Trans. Instrum. Meas., 2022
An Automatic Deep Segmentation Network for Pixel-Level Welding Defect Detection.
IEEE Trans. Instrum. Meas., 2022
Component calibration and configuration planning in assembly automation with a parallel manipulator.
Robotics Comput. Integr. Manuf., 2022
A Robotic End-Effector for Screwing and Unscrewing Bolts From the Side.
IEEE Robotics Autom. Lett., 2022
A light defect detection algorithm of power insulators from aerial images for power inspection.
Neural Comput. Appl., 2022
A nondestructive automatic defect detection method with pixelwise segmentation.
Knowl. Based Syst., 2022
Intent-Slot Correlation Modeling for Joint Intent Prediction and Slot Filling.
J. Comput. Sci. Technol., 2022
SEEK: model extraction attack against hybrid secure inference protocols.
IACR Cryptol. ePrint Arch., 2022
PLE-Net: Automatic power line extraction method using deep learning from aerial images.
Expert Syst. Appl., 2022
IoT Cloud Security Review: A Case Study Approach Using Emerging Consumer-oriented Applications.
ACM Comput. Surv., 2022
Robust and accurate depth estimation by fusing LiDAR and Stereo.
CoRR, 2022
SASH: Efficient secure aggregation based on SHPRG for federated learning.
Proceedings of the Uncertainty in Artificial Intelligence, 2022
A Voltage Template Attack on the Modular Polynomial Subtraction in Kyber.
Proceedings of the 27th Asia and South Pacific Design Automation Conference, 2022
2021
A Vibration Control Method for Hybrid-Structured Flexible Manipulator Based on Sliding Mode Control and Reinforcement Learning.
IEEE Trans. Neural Networks Learn. Syst., 2021
Automatic Detection and Location of Weld Beads With Deep Convolutional Neural Networks.
IEEE Trans. Instrum. Meas., 2021
A Fast and Robust Seam Tracking Method for Spatial Circular Weld Based on Laser Visual Sensor.
IEEE Trans. Instrum. Meas., 2021
Efficient and Accurate Start Point Guiding and Seam Tracking Method for Curve Weld Based on Structure Light.
IEEE Trans. Instrum. Meas., 2021
Seam Feature Point Acquisition Based on Efficient Convolution Operator and Particle Filter in GMAW.
IEEE Trans. Ind. Informatics, 2021
Multilabel Deep Learning-Based Side-Channel Attack.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2021
Efficient Secure Aggregation Based on SHPRG For Federated Learning.
CoRR, 2021
2020
A Review on State-of-the-Art Power Line Inspection Techniques.
IEEE Trans. Instrum. Meas., 2020
An Initial Point Alignment and Seam-Tracking System for Narrow Weld.
IEEE Trans. Ind. Informatics, 2020
Design and implementation of intelligent tracking car based on machine vision.
J. Intell. Fuzzy Syst., 2020
IBRE: An Incremental Bootstrapping Approach for Chinese Appointment and Dismissal Relation Extraction.
Proceedings of the Knowledge Graph and Semantic Computing: Knowledge Graph and Cognitive Intelligence, 2020
2019
Multi-label Deep Learning based Side Channel Attack.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2019
2018
Analysis and Design of an Effective Light Interference Methane Sensor Based on Three-Dimensional Optical Path Model.
J. Sensors, 2018
2017
RAGuard: A Hardware Based Mechanism for Backward-Edge Control-Flow Integrity.
Proceedings of the Computing Frontiers Conference, 2017
2015
Accelerating Scalar Conversion for Koblitz Curve Cryptoprocessors on Hardware Platforms.
IEEE Trans. Very Large Scale Integr. Syst., 2015
A New Model for Error-Tolerant Side-Channel Cube Attacks.
IACR Cryptol. ePrint Arch., 2015
Vulnerability analysis for crypto devices against probing attack.
Proceedings of the 20th Asia and South Pacific Design Automation Conference, 2015
2014
Novel RNS Parameter Selection for Fast Modular Multiplication.
IEEE Trans. Computers, 2014
Error-Tolerant Side-Channel Cube Attack Revisited.
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014
On the Use of Scan Chain to Improve Physical Attacks (Extended Abstract).
Proceedings of the 23rd IEEE Asian Test Symposium, 2014
2013
Signal Processing for Cryptography and Security Applications.
Proceedings of the Handbook of Signal Processing Systems, 2013
IBIHOP: Proper Privacy Preserving Mutual RFID Authentication.
Proceedings of the Radio Frequency Identification System Security, 2013
Low-energy encryption for medical devices: security adds an extra design dimension.
Proceedings of the 50th Annual Design Automation Conference 2013, 2013
2012
Efficient Arithmetic for Embedded Cryptography and Cryptanalysis (Efficiënte aritmetica voor ingebedde cryptografie en cryptanalyse).
PhD thesis, 2012
Fair and Consistent Hardware Evaluation of Fourteen Round Two SHA-3 Candidates.
,
,
,
,
,
,
,
,
,
,
,
,
,
IEEE Trans. Very Large Scale Integr. Syst., 2012
Efficient Hardware Implementation of Fp-Arithmetic for Pairing-Friendly Curves.
IEEE Trans. Computers, 2012
Somewhat Practical Fully Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2012
Faster Pairing Coprocessor Architecture.
Proceedings of the Pairing-Based Cryptography - Pairing 2012, 2012
A systematic M safe-error detection in hardware implementations of cryptographic algorithms.
Proceedings of the 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, 2012
An Updated Survey on Secure ECC Implementations: Attacks, Countermeasures and Cost.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012
2011
An Easy Rake Receiver for TD-SCDMA Smart Antenna.
Wirel. Pers. Commun., 2011
Tripartite modular multiplication.
Integr., 2011
Design and design methods for unified multiplier and inverter and its application for HECC.
Integr., 2011
A High Speed Pairing Coprocessor Using RNS and Lazy Reduction.
IACR Cryptol. ePrint Arch., 2011
Systematic security evaluation method against C safe-error attacks.
Proceedings of the HOST 2011, 2011
Low-cost fault detection method for ECC using Montgomery powering ladder.
Proceedings of the Design, Automation and Test in Europe, 2011
To Infinity and Beyond: Combined Attack on ECC Using Points of Low Order.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011
FPGA Implementation of Pairings Using Residue Number System and Lazy Reduction.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011
2010
On the claimed privacy of EC-RAC III.
IACR Cryptol. ePrint Arch., 2010
Prototyping Platform for Performance Evaluation of SHA-3 Candidates.
,
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the HOST 2010, 2010
State-of-the-art of Secure ECC Implementations: A Survey on Known Side-channel Attacks and Countermeasures.
Proceedings of the HOST 2010, 2010
Breaking Elliptic Curve Cryptosystems Using Reconfigurable Hardware.
Proceedings of the International Conference on Field Programmable Logic and Applications, 2010
Implementation of binary edwards curves for very-constrained devices.
Proceedings of the 21st IEEE International Conference on Application-specific Systems Architectures and Processors, 2010
Signal Processing for Cryptography and Security Applications.
Proceedings of the Handbook of Signal Processing Systems, 2010
2009
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
IACR Cryptol. ePrint Arch., 2009
The Certicom Challenges ECC2-X.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
IACR Cryptol. ePrint Arch., 2009
FPGA-based testing strategy for cryptographic chips: A case study on Elliptic Curve Processor for RFID tags.
Proceedings of the 15th IEEE International On-Line Testing Symposium (IOLTS 2009), 2009
Light-weight implementation options for curve-based cryptography: HECC is also ready for RFID.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009
Programmable and Parallel ECC Coprocessor Architecture: Tradeoffs between Area, Speed and Security.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009
Faster -Arithmetic for Cryptographic Pairings on Barreto-Naehrig Curves.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009
2008
Elliptic curve cryptography on embedded multicore systems.
Des. Autom. Embed. Syst., 2008
Modular Reduction in GF(2<sup>n</sup>) without Pre-computational Phase.
Proceedings of the Arithmetic of Finite Fields, 2nd International Workshop, 2008
A digit-serial architecture for inversion and multiplication in GF(2<sup>M</sup>).
Proceedings of the IEEE Workshop on Signal Processing Systems, 2008
HECC Goes Embedded: An Area-Efficient Implementation of HECC.
Proceedings of the Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2008
Unified Digit-Serial Multiplier and Inverter in Finite Field GF(2<sup>m</sup>).
Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, 2008
FPGA Design for Algebraic Tori-Based Public-Key Cryptography.
Proceedings of the Design, Automation and Test in Europe, 2008
Low-cost implementations of NTRU for pervasive security.
Proceedings of the 19th IEEE International Conference on Application-Specific Systems, 2008
2007
Montgomery Modular Multiplication Algorithm on Multi-Core Systems.
Proceedings of the IEEE Workshop on Signal Processing Systems, 2007
2006
Efficient Frame Rate Control Algorithm and Its Implementation.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006