Ming Tang
Orcid: 0000-0003-2218-0164Affiliations:
- Wuhan University, School of Cyber Science and Engineering, China
- Wuhan University, School of Computer, China (PhD 2007)
According to our database1,
Ming Tang
authored at least 49 papers
between 2009 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
IEEE Trans. Inf. Forensics Secur., 2025
2024
Int. J. Inf. Sec., August, 2024
IEEE Internet Things J., February, 2024
Deep Learning Gradient Visualization-Based Pre-Silicon Side-Channel Leakage Location.
IEEE Trans. Inf. Forensics Secur., 2024
IET Inf. Secur., 2024
Proceedings of the IEEE International Symposium on High-Performance Computer Architecture, 2024
Modeling, Derivation, and Automated Analysis of Branch Predictor Security Vulnerabilities.
Proceedings of the IEEE International Symposium on High-Performance Computer Architecture, 2024
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2024
2023
One more set: Mitigating conflict-based cache side-channel attacks by extending cache set.
J. Syst. Archit., November, 2023
IEEE Trans. Computers, February, 2023
Exploiting the microarchitectural leakage of prefetching activities for side-channel attacks.
J. Syst. Archit., 2023
BandwidthBreach: Unleashing Covert and Side Channels through Cache Bandwidth Exploitation.
CoRR, 2023
BackCache: Mitigating Contention-Based Cache Timing Attacks by Hiding Cache Line Evictions.
CoRR, 2023
2022
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
Gap between Prediction and Truth: A Case Study of False-Positives in Leakage Detection.
Secur. Commun. Networks, 2022
Comput. Networks, 2022
Comput. Electr. Eng., 2022
2021
Analysis of Multiplicative Low Entropy Masking Schemes Against Correlation Power Attack.
IEEE Trans. Inf. Forensics Secur., 2021
Process Variation-Resistant Golden-Free Hardware Trojan Detection through a Power Side Channel.
Secur. Commun. Networks, 2021
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
2020
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2020
A pre-silicon logic level security verification flow for higher-order masking schemes against glitches on FPGAs.
Integr., 2020
2019
Stripped Functionality Logic Locking With Hamming Distance-Based Restore Unit (SFLL-hd) - Unlocked.
IEEE Trans. Inf. Forensics Secur., 2019
Practical Evaluation Methodology of Higher-Order Maskings at Different Operating Frequencies.
Proceedings of the Information and Communications Security - 21st International Conference, 2019
2018
IEEE Trans. Inf. Forensics Secur., 2018
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2018
Several weaknesses of the implementation for the theoretically secure masking schemes under ISW framework.
Integr., 2018
Proceedings of the Cyber-Physical Systems Security., 2018
2017
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2017
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2017
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2017
2016
Secur. Commun. Networks, 2016
2015
IEEE Trans. Inf. Forensics Secur., 2015
2014
Power analysis based reverse engineering on the secret round function of block ciphers.
Concurr. Comput. Pract. Exp., 2014
Sci. China Inf. Sci., 2014
2013
On Design of Nonlinear Operations and Round Functions of Block Ciphers with Resistance to ASCAs.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
2012
Evolutionary ciphers against differential power analysis and differential fault analysis.
Sci. China Inf. Sci., 2012
Power Analysis Based Reverse Engineering on the Secret Round Function of Block Ciphers.
Proceedings of the Data and Knowledge Engineering - Third International Conference, 2012
2011
Sci. China Inf. Sci., 2011
Sci. China Inf. Sci., 2011
Sci. China Inf. Sci., 2011
2010
J. Digit. Content Technol. its Appl., 2010
IACR Cryptol. ePrint Arch., 2010
2009
Proceedings of the 2009 Second International Symposium on Computational Intelligence and Design, 2009