2024
Research on Alternating Current Field Measurement Method for Buried Defects of Titanium Alloy Aircraft Skin.
Sensors, February, 2024
Decompressing Dilithium's Public Key with Fewer Signatures Using Side Channel Analysis.
IACR Cryptol. ePrint Arch., 2024
Unpacking Needs Protection: A Single-Trace Secret Key Recovery Attack on Dilithium.
IACR Commun. Cryptol., 2024
ADSNet: Cross-Domain LTV Prediction with an Adaptive Siamese Network in Advertising.
Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2024
Breaking SCA-Protected CRYSTALS-Kyber with a Single Trace.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2024
A Side-Channel Attack on a Higher-Order Masked CRYSTALS-Kyber Implementation.
Proceedings of the Applied Cryptography and Network Security, 2024
2023
<i>LIPAuth</i>: Hand-dependent Light Intensity Patterns for Resilient User Authentication.
ACM Trans. Sens. Networks, August, 2023
LiveProbe: Exploring Continuous Voice Liveness Detection via Phonemic Energy Response Patterns.
IEEE Internet Things J., 2023
Single-Trace Side-Channel Attacks on CRYSTALS-Dilithium: Myth or Reality?
IACR Cryptol. ePrint Arch., 2023
A Side-Channel Attack on a Bitsliced Higher-Order Masked CRYSTALS-Kyber Implementation.
IACR Cryptol. ePrint Arch., 2023
A Single-Trace Message Recovery Attack on a Masked and Shuffled Implementation of CRYSTALS-Kyber.
IACR Cryptol. ePrint Arch., 2023
Higher-Order Boolean Masking Does Not Prevent Side-Channel Attacks on LWE/LWR-based PKE/KEMs.
Proceedings of the 53rd IEEE International Symposium on Multiple-Valued Logic, 2023
An Autonomous Robot for Collision-Free Person Following through Model Predictive Control.
Proceedings of the 49th Annual Conference of the IEEE Industrial Electronics Society, 2023
A Shared Key Recovery Attack on a Masked Implementation of CRYSTALS-Kyber's Encapsulation Algorithm.
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023
A Side-Channel Secret Key Recovery Attack on CRYSTALS-Kyber Using k Chosen Ciphertexts.
Proceedings of the Codes, Cryptology and Information Security, 2023
Breaking a Fifth-Order Masked Implementation of CRYSTALS-Kyber by Copy-Paste.
Proceedings of the 10th ACM Asia Public-Key Cryptography Workshop, 2023
2022
Making Biased DL Models Work: Message and Key Recovery Attacks on Saber Using Amplitude-Modulated EM Emanations.
IACR Cryptol. ePrint Arch., 2022
Side-Channel Analysis of Saber KEM Using Amplitude-Modulated EM Emanations.
IACR Cryptol. ePrint Arch., 2022
Side-Channel Attacks on Lattice-Based KEMs Are Not Prevented by Higher-Order Masking.
IACR Cryptol. ePrint Arch., 2022
A Side-Channel Attack on a Hardware Implementation of CRYSTALS-Kyber.
IACR Cryptol. ePrint Arch., 2022
A Message Recovery Attack on LWE/LWR-Based PKE/KEMs Using Amplitude-Modulated EM Emanations.
Proceedings of the Information Security and Cryptology - ICISC 2022, 2022
2021
Exploring Logical Reasoning for Referring Expression Comprehension.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021
TCIC: Theme Concepts Learning Cross Language and Vision for Image Captioning.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021
Research on Data Encryption Technology in Computer Network Communication Security Based on Genetic Algorithms.
Proceedings of the 4th International Conference on Information Systems and Computer Aided Education, 2021
Analysis and Evaluation of the Effects of Single Event Upsets (SEU s) on Memories in Polar Decoders.
Proceedings of the 36th IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, 2021
Advanced Far Field EM Side-Channel Attack on AES.
Proceedings of the 7th ACM on Cyber-Physical System Security Workshop, 2021
K-AID: Enhancing Pre-trained Language Models with Domain Knowledge for Question Answering.
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021
K-Adapter: Infusing Knowledge into Pre-Trained Models with Adapters.
Proceedings of the Findings of the Association for Computational Linguistics: ACL/IJCNLP 2021, 2021
2020
Far Field EM Side-Channel Attack on AES Using Deep Learning.
IACR Cryptol. ePrint Arch., 2020
Look, Listen, and Attend: Co-Attention Network for Self-Supervised Audio-Visual Representation Learning.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020
Neural Deepfake Detection with Factual Structure of Text.
Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing, 2020
Leveraging Declarative Knowledge in Text and First-Order Logic for Fine-Grained Propaganda Detection.
Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing, 2020
Keep it Consistent: Topic-Aware Storytelling from an Image Stream via Iterative Multi-agent Communication.
Proceedings of the 28th International Conference on Computational Linguistics, 2020
Storytelling from an Image Stream Using Scene Graphs.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020
2019
Keep it Consistent: Topic-Aware Storytelling from an Image Stream via Iterative Multi-agent Communication.
CoRR, 2019