Ruize Wang

Orcid: 0000-0001-6281-4091

According to our database1, Ruize Wang authored at least 34 papers between 2019 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Research on Alternating Current Field Measurement Method for Buried Defects of Titanium Alloy Aircraft Skin.
Sensors, February, 2024

Unpacking Needs Protection: A Single-Trace Secret Key Recovery Attack on Dilithium.
IACR Commun. Cryptol., 2024

ADSNet: Cross-Domain LTV Prediction with an Adaptive Siamese Network in Advertising.
Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2024

Breaking SCA-Protected CRYSTALS-Kyber with a Single Trace.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2024

A Side-Channel Attack on a Higher-Order Masked CRYSTALS-Kyber Implementation.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
<i>LIPAuth</i>: Hand-dependent Light Intensity Patterns for Resilient User Authentication.
ACM Trans. Sens. Networks, August, 2023

LiveProbe: Exploring Continuous Voice Liveness Detection via Phonemic Energy Response Patterns.
IEEE Internet Things J., 2023

Single-Trace Side-Channel Attacks on CRYSTALS-Dilithium: Myth or Reality?
IACR Cryptol. ePrint Arch., 2023

A Side-Channel Attack on a Bitsliced Higher-Order Masked CRYSTALS-Kyber Implementation.
IACR Cryptol. ePrint Arch., 2023

A Single-Trace Message Recovery Attack on a Masked and Shuffled Implementation of CRYSTALS-Kyber.
IACR Cryptol. ePrint Arch., 2023

Higher-Order Boolean Masking Does Not Prevent Side-Channel Attacks on LWE/LWR-based PKE/KEMs.
Proceedings of the 53rd IEEE International Symposium on Multiple-Valued Logic, 2023

An Autonomous Robot for Collision-Free Person Following through Model Predictive Control.
Proceedings of the 49th Annual Conference of the IEEE Industrial Electronics Society, 2023

A Shared Key Recovery Attack on a Masked Implementation of CRYSTALS-Kyber's Encapsulation Algorithm.
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023

A Side-Channel Secret Key Recovery Attack on CRYSTALS-Kyber Using k Chosen Ciphertexts.
Proceedings of the Codes, Cryptology and Information Security, 2023

Breaking a Fifth-Order Masked Implementation of CRYSTALS-Kyber by Copy-Paste.
Proceedings of the 10th ACM Asia Public-Key Cryptography Workshop, 2023

2022
Making Biased DL Models Work: Message and Key Recovery Attacks on Saber Using Amplitude-Modulated EM Emanations.
IACR Cryptol. ePrint Arch., 2022

Side-Channel Analysis of Saber KEM Using Amplitude-Modulated EM Emanations.
IACR Cryptol. ePrint Arch., 2022

Side-Channel Attacks on Lattice-Based KEMs Are Not Prevented by Higher-Order Masking.
IACR Cryptol. ePrint Arch., 2022

A Side-Channel Attack on a Hardware Implementation of CRYSTALS-Kyber.
IACR Cryptol. ePrint Arch., 2022

A Message Recovery Attack on LWE/LWR-Based PKE/KEMs Using Amplitude-Modulated EM Emanations.
Proceedings of the Information Security and Cryptology - ICISC 2022, 2022

2021
Exploring Logical Reasoning for Referring Expression Comprehension.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

TCIC: Theme Concepts Learning Cross Language and Vision for Image Captioning.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021

Research on Data Encryption Technology in Computer Network Communication Security Based on Genetic Algorithms.
Proceedings of the 4th International Conference on Information Systems and Computer Aided Education, 2021

Analysis and Evaluation of the Effects of Single Event Upsets (SEU s) on Memories in Polar Decoders.
Proceedings of the 36th IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, 2021

Advanced Far Field EM Side-Channel Attack on AES.
Proceedings of the 7th ACM on Cyber-Physical System Security Workshop, 2021

K-AID: Enhancing Pre-trained Language Models with Domain Knowledge for Question Answering.
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021

K-Adapter: Infusing Knowledge into Pre-Trained Models with Adapters.
Proceedings of the Findings of the Association for Computational Linguistics: ACL/IJCNLP 2021, 2021

2020
Far Field EM Side-Channel Attack on AES Using Deep Learning.
IACR Cryptol. ePrint Arch., 2020

Look, Listen, and Attend: Co-Attention Network for Self-Supervised Audio-Visual Representation Learning.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

Neural Deepfake Detection with Factual Structure of Text.
Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing, 2020

Leveraging Declarative Knowledge in Text and First-Order Logic for Fine-Grained Propaganda Detection.
Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing, 2020

Keep it Consistent: Topic-Aware Storytelling from an Image Stream via Iterative Multi-agent Communication.
Proceedings of the 28th International Conference on Computational Linguistics, 2020

Storytelling from an Image Stream Using Scene Graphs.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Keep it Consistent: Topic-Aware Storytelling from an Image Stream via Iterative Multi-agent Communication.
CoRR, 2019


  Loading...