Jingyi Feng
Orcid: 0000-0001-9607-6744
According to our database1,
Jingyi Feng
authored at least 20 papers
between 2013 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
The Insecurity of SHA2 under the Differential Fault Characteristic of Boolean Functions.
IACR Cryptol. ePrint Arch., 2024
LiDAR-based HD Map Localization using Semantic Generalized ICP with Road Marking Detection.
CoRR, 2024
YOLOv7-PE: A Precise and Efficient Enhancement of YOLOv7 for Underwater Target Detection.
IEEE Access, 2024
2023
The Non-Linear Influence of Built Environment on the School Commuting Metro Ridership: The Case in Wuhan, China.
ISPRS Int. J. Geo Inf., 2023
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
2021
Fault Diagnosis of Permanent Magnet Synchronous Motor Based on Stacked Denoising Autoencoder.
Entropy, 2021
Do multiple infections lead to better security? A new study on CHES 2014 infective countermeasure.
Sci. China Inf. Sci., 2021
2020
A Framework for Evaluation and Analysis on Infection Countermeasures Against Fault Attacks.
IEEE Trans. Inf. Forensics Secur., 2020
Weakly supervised learning in neural encoding for the position of the moving finger of a macaque.
Cogn. Comput., 2020
2018
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2018
2017
Proceedings of the 5th International Conference on Enterprise Systems, 2017
2016
Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round.
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016
Proceedings of the 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2016
Linear Regression Attack with F-test: A New SCARE Technique for Secret Block Ciphers.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016
2015
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015
Proceedings of the Information and Communications Security - 17th International Conference, 2015
2013
Supporting research into sound and speech learning through a configurable computer game.
Proceedings of the 2013 IEEE International Games Innovation Conference, 2013