Junfeng Fan

Orcid: 0000-0003-4922-7946

According to our database1, Junfeng Fan authored at least 97 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
From Model to Reality: A Robust Framework for Automatic Generation of Welding Paths.
IEEE Trans. Ind. Electron., December, 2024

Water-MBSL: Underwater Movable Binocular Structured Light-Based High-Precision Dense Reconstruction Framework.
IEEE Trans. Ind. Informatics, April, 2024

WeldNet: A deep learning based method for weld seam type identification and initial point guidance.
Expert Syst. Appl., March, 2024

Structured Light Vision Based Pipeline Tracking and 3D Reconstruction Method for Underwater Vehicle.
IEEE Trans. Intell. Veh., February, 2024

CMBUV: A Composite-Mechanism Bioinspired Underwater Vehicle Integrated With Elasticity and Shear Damping Possesses High-Performance Capability.
IEEE Trans. Intell. Veh., January, 2024

DeepKP: A Robust and Accurate Framework for Weld Seam Keypoint Extraction in Welding Robots.
IEEE Trans. Instrum. Meas., 2024

High Dynamic Range Structured Light 3-D Measurement Based on Region Adaptive Fringe Brightness.
IEEE Trans. Ind. Electron., 2024

Linear Gaussian bounding box representation and ring-shaped rotated convolution for oriented object detection.
Pattern Recognit., 2024

EPRecon: An Efficient Framework for Real-Time Panoptic 3D Reconstruction from Monocular Video.
CoRR, 2024

Energy-storing analysis and fishtail stiffness optimization for a wire-driven elastic robotic fish.
CoRR, 2024

Completely Occluded and Dense Object Instance Segmentation Using Box Prompt-Based Segmentation Foundation Models.
CoRR, 2024

2023
Design and Modeling of a Sperm-Inspired Helical Propulsion Robot.
IEEE Robotics Autom. Lett., December, 2023

An Efficient and Robust Complex Weld Seam Feature Point Extraction Method for Seam Tracking and Posture Adjustment.
IEEE Trans. Ind. Informatics, November, 2023

Development and Testing of Advanced Driver Assistance Systems Through Scenario-Based Systems Engineering.
IEEE Trans. Intell. Veh., August, 2023

Scalable and Conflict-Free NTT Hardware Accelerator Design: Methodology, Proof, and Implementation.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., May, 2023

A pixel-level deep segmentation network for automatic defect detection.
Expert Syst. Appl., April, 2023

DHSA: efficient doubly homomorphic secure aggregation for cross-silo federated learning.
J. Supercomput., 2023

An Underwater Structured Light Vision Calibration Method Considering Unknown Refractive Index Based on Aquila Optimizer.
IEEE Trans. Instrum. Meas., 2023

Binocular Structured Light 3-D Reconstruction System for Low-Light Underwater Environments: Design, Modeling, and Laser-Based Calibration.
IEEE Trans. Instrum. Meas., 2023

Development, Calibration, and Image Processing of Underwater Structured Light Vision System: A Survey.
IEEE Trans. Instrum. Meas., 2023

A Full Lifecycle Authentication Scheme for Large-Scale Smart IoT Applications.
IEEE Trans. Dependable Secur. Comput., 2023

A Wire-driven Elastic Robotic Fish and its Design and CPG-Based Control.
J. Intell. Robotic Syst., 2023

Chosen ciphertext correlation power analysis on Kyber.
Integr., 2023

Development of a Hybrid Vision Sensor and Its Application in Robotic Welding.
Proceedings of the 19th IEEE International Conference on Automation Science and Engineering, 2023

A Template Attack on Reduction Without Reference Device on Kyber.
Proceedings of the 32nd IEEE Asian Test Symposium, 2023

2022
Image Segmentation of Cabin Assembly Scene Based on Improved RGB-D Mask R-CNN.
IEEE Trans. Instrum. Meas., 2022

An Automatic Deep Segmentation Network for Pixel-Level Welding Defect Detection.
IEEE Trans. Instrum. Meas., 2022

Component calibration and configuration planning in assembly automation with a parallel manipulator.
Robotics Comput. Integr. Manuf., 2022

A Robotic End-Effector for Screwing and Unscrewing Bolts From the Side.
IEEE Robotics Autom. Lett., 2022

A light defect detection algorithm of power insulators from aerial images for power inspection.
Neural Comput. Appl., 2022

A nondestructive automatic defect detection method with pixelwise segmentation.
Knowl. Based Syst., 2022

Intent-Slot Correlation Modeling for Joint Intent Prediction and Slot Filling.
J. Comput. Sci. Technol., 2022

SEEK: model extraction attack against hybrid secure inference protocols.
IACR Cryptol. ePrint Arch., 2022

PLE-Net: Automatic power line extraction method using deep learning from aerial images.
Expert Syst. Appl., 2022

IoT Cloud Security Review: A Case Study Approach Using Emerging Consumer-oriented Applications.
ACM Comput. Surv., 2022

Robust and accurate depth estimation by fusing LiDAR and Stereo.
CoRR, 2022

SASH: Efficient secure aggregation based on SHPRG for federated learning.
Proceedings of the Uncertainty in Artificial Intelligence, 2022

A Voltage Template Attack on the Modular Polynomial Subtraction in Kyber.
Proceedings of the 27th Asia and South Pacific Design Automation Conference, 2022

2021
A Vibration Control Method for Hybrid-Structured Flexible Manipulator Based on Sliding Mode Control and Reinforcement Learning.
IEEE Trans. Neural Networks Learn. Syst., 2021

Automatic Detection and Location of Weld Beads With Deep Convolutional Neural Networks.
IEEE Trans. Instrum. Meas., 2021

A Fast and Robust Seam Tracking Method for Spatial Circular Weld Based on Laser Visual Sensor.
IEEE Trans. Instrum. Meas., 2021

Efficient and Accurate Start Point Guiding and Seam Tracking Method for Curve Weld Based on Structure Light.
IEEE Trans. Instrum. Meas., 2021

Seam Feature Point Acquisition Based on Efficient Convolution Operator and Particle Filter in GMAW.
IEEE Trans. Ind. Informatics, 2021

Multilabel Deep Learning-Based Side-Channel Attack.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2021

Efficient Secure Aggregation Based on SHPRG For Federated Learning.
CoRR, 2021

2020
A Review on State-of-the-Art Power Line Inspection Techniques.
IEEE Trans. Instrum. Meas., 2020

An Initial Point Alignment and Seam-Tracking System for Narrow Weld.
IEEE Trans. Ind. Informatics, 2020

Design and implementation of intelligent tracking car based on machine vision.
J. Intell. Fuzzy Syst., 2020

IBRE: An Incremental Bootstrapping Approach for Chinese Appointment and Dismissal Relation Extraction.
Proceedings of the Knowledge Graph and Semantic Computing: Knowledge Graph and Cognitive Intelligence, 2020

2019
Multi-label Deep Learning based Side Channel Attack.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2019

2018
Analysis and Design of an Effective Light Interference Methane Sensor Based on Three-Dimensional Optical Path Model.
J. Sensors, 2018

2017
RAGuard: A Hardware Based Mechanism for Backward-Edge Control-Flow Integrity.
Proceedings of the Computing Frontiers Conference, 2017

2015
Accelerating Scalar Conversion for Koblitz Curve Cryptoprocessors on Hardware Platforms.
IEEE Trans. Very Large Scale Integr. Syst., 2015

A New Model for Error-Tolerant Side-Channel Cube Attacks.
IACR Cryptol. ePrint Arch., 2015

Vulnerability analysis for crypto devices against probing attack.
Proceedings of the 20th Asia and South Pacific Design Automation Conference, 2015

2014
Novel RNS Parameter Selection for Fast Modular Multiplication.
IEEE Trans. Computers, 2014

Error-Tolerant Side-Channel Cube Attack Revisited.
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014

On the Use of Scan Chain to Improve Physical Attacks (Extended Abstract).
Proceedings of the 23rd IEEE Asian Test Symposium, 2014

2013
Signal Processing for Cryptography and Security Applications.
Proceedings of the Handbook of Signal Processing Systems, 2013

IBIHOP: Proper Privacy Preserving Mutual RFID Authentication.
Proceedings of the Radio Frequency Identification System Security, 2013

Low-energy encryption for medical devices: security adds an extra design dimension.
Proceedings of the 50th Annual Design Automation Conference 2013, 2013

2012
Efficient Arithmetic for Embedded Cryptography and Cryptanalysis (Efficiënte aritmetica voor ingebedde cryptografie en cryptanalyse).
PhD thesis, 2012

Fair and Consistent Hardware Evaluation of Fourteen Round Two SHA-3 Candidates.
IEEE Trans. Very Large Scale Integr. Syst., 2012

Efficient Hardware Implementation of Fp-Arithmetic for Pairing-Friendly Curves.
IEEE Trans. Computers, 2012

Somewhat Practical Fully Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2012

Faster Pairing Coprocessor Architecture.
Proceedings of the Pairing-Based Cryptography - Pairing 2012, 2012

A systematic M safe-error detection in hardware implementations of cryptographic algorithms.
Proceedings of the 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, 2012

An Updated Survey on Secure ECC Implementations: Attacks, Countermeasures and Cost.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012

2011
An Easy Rake Receiver for TD-SCDMA Smart Antenna.
Wirel. Pers. Commun., 2011

Tripartite modular multiplication.
Integr., 2011

Design and design methods for unified multiplier and inverter and its application for HECC.
Integr., 2011

A High Speed Pairing Coprocessor Using RNS and Lazy Reduction.
IACR Cryptol. ePrint Arch., 2011

Systematic security evaluation method against C safe-error attacks.
Proceedings of the HOST 2011, 2011

Low-cost fault detection method for ECC using Montgomery powering ladder.
Proceedings of the Design, Automation and Test in Europe, 2011

To Infinity and Beyond: Combined Attack on ECC Using Points of Low Order.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011

FPGA Implementation of Pairings Using Residue Number System and Lazy Reduction.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011

2010
On the claimed privacy of EC-RAC III.
IACR Cryptol. ePrint Arch., 2010

Prototyping Platform for Performance Evaluation of SHA-3 Candidates.
Proceedings of the HOST 2010, 2010

State-of-the-art of Secure ECC Implementations: A Survey on Known Side-channel Attacks and Countermeasures.
Proceedings of the HOST 2010, 2010

Breaking Elliptic Curve Cryptosystems Using Reconfigurable Hardware.
Proceedings of the International Conference on Field Programmable Logic and Applications, 2010

Implementation of binary edwards curves for very-constrained devices.
Proceedings of the 21st IEEE International Conference on Application-specific Systems Architectures and Processors, 2010

Signal Processing for Cryptography and Security Applications.
Proceedings of the Handbook of Signal Processing Systems, 2010

2009
Breaking ECC2K-130.
IACR Cryptol. ePrint Arch., 2009

The Certicom Challenges ECC2-X.
IACR Cryptol. ePrint Arch., 2009

FPGA-based testing strategy for cryptographic chips: A case study on Elliptic Curve Processor for RFID tags.
Proceedings of the 15th IEEE International On-Line Testing Symposium (IOLTS 2009), 2009

Light-weight implementation options for curve-based cryptography: HECC is also ready for RFID.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

Programmable and Parallel ECC Coprocessor Architecture: Tradeoffs between Area, Speed and Security.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009

Faster -Arithmetic for Cryptographic Pairings on Barreto-Naehrig Curves.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009

2008
Elliptic curve cryptography on embedded multicore systems.
Des. Autom. Embed. Syst., 2008

Modular Reduction in GF(2<sup>n</sup>) without Pre-computational Phase.
Proceedings of the Arithmetic of Finite Fields, 2nd International Workshop, 2008

A digit-serial architecture for inversion and multiplication in GF(2<sup>M</sup>).
Proceedings of the IEEE Workshop on Signal Processing Systems, 2008

HECC Goes Embedded: An Area-Efficient Implementation of HECC.
Proceedings of the Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2008

Unified Digit-Serial Multiplier and Inverter in Finite Field GF(2<sup>m</sup>).
Proceedings of the IEEE International Workshop on Hardware-Oriented Security and Trust, 2008

FPGA Design for Algebraic Tori-Based Public-Key Cryptography.
Proceedings of the Design, Automation and Test in Europe, 2008

Low-cost implementations of NTRU for pervasive security.
Proceedings of the 19th IEEE International Conference on Application-Specific Systems, 2008

2007
Montgomery Modular Multiplication Algorithm on Multi-Core Systems.
Proceedings of the IEEE Workshop on Signal Processing Systems, 2007

2006
Efficient Frame Rate Control Algorithm and Its Implementation.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006


  Loading...