Chenyang Tu
Orcid: 0000-0003-2130-0531
According to our database1,
Chenyang Tu
authored at least 31 papers
between 2014 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
2022
BiGNN: A Bilateral-Branch Graph Neural Network to Solve Popularity Bias in Recommendation.
Proceedings of the 34th IEEE International Conference on Tools with Artificial Intelligence, 2022
Proceedings of the International Conference on Multimodal Interaction, 2022
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022
2021
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2021
Proceedings of the International Joint Conference on Neural Networks, 2021
Image-Enhanced Multi-Modal Representation for Local Topic Detection from Social Media.
Proceedings of the Database Systems for Advanced Applications, 2021
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021
2020
MACM: How to Reduce the Multi-Round SCA to the Single-Round Attack on the Feistel-SP Networks.
IEEE Trans. Inf. Forensics Secur., 2020
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2020
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020
A Hardware/Software Collaborative SM4 Implementation Resistant to Side-channel Attacks on ARM-FPGA Embedded SoC.
Proceedings of the IEEE Symposium on Computers and Communications, 2020
Flush-Detector: More Secure API Resistant to Flush-Based Spectre Attacks on ARM Cortex-A9.
Proceedings of the IEEE Symposium on Computers and Communications, 2020
SECL: Separated Embedding and Correlation Learning for Demographic Prediction in Ubiquitous Sensor Scenario.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020
PrivRec: User-Centric Differentially Private Collaborative Filtering Using LSH and KD.
Proceedings of the Neural Information Processing - 27th International Conference, 2020
Proceedings of the Neural Information Processing - 27th International Conference, 2020
2019
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2019
The Application of Network Based Embedding in Local Topic Detection from Social Media.
Proceedings of the 31st IEEE International Conference on Tools with Artificial Intelligence, 2019
Proceedings of the Neural Information Processing - 26th International Conference, 2019
SecFlush: A Hardware/Software Collaborative Design for Real-Time Detection and Defense Against Flush-Based Cache Attacks.
Proceedings of the Information and Communications Security - 21st International Conference, 2019
AdapTimer: Hardware/Software Collaborative Timer Resistant to Flush-Based Cache Attacks on ARM-FPGA Embedded SoC.
Proceedings of the 37th IEEE International Conference on Computer Design, 2019
Proceedings of the Database Systems for Advanced Applications, 2019
More Secure Collaborative APIs Resistant to Flush+Reload and Flush+Flush Attacks on ARMv8-A.
Proceedings of the 26th Asia-Pacific Software Engineering Conference, 2019
2018
Combination of Hardware and Software: An Efficient AES Implementation Resistant to Side-Channel Attacks on All Programmable SoC.
Proceedings of the Computer Security, 2018
2017
A Practical Chosen Message Power Analysis Approach Against Ciphers with the Key Whitening Layers.
Proceedings of the Applied Cryptography and Network Security, 2017
2016
Detecting Side Channel Vulnerabilities in Improved Rotating S-Box Masking Scheme - Presenting Four Non-profiled Attacks.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016
Low-Cost Hardware Implementation of Elliptic Curve Cryptography for General Prime Fields.
Proceedings of the Information and Communications Security - 18th International Conference, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
A Practical Chosen Message Power Analysis Method on the Feistel-SP ciphers with Applications to CLEFIA and Camellia.
IACR Cryptol. ePrint Arch., 2015
QRL: A High Performance Quadruple-Rail Logic for Resisting DPA on FPGA Implementations.
Proceedings of the Information and Communications Security - 17th International Conference, 2015
2014
A Progressive Dual-Rail Routing Repair Approach for FPGA Implementation of Crypto Algorithm.
Proceedings of the Information Security Practice and Experience, 2014