Wei Li
Orcid: 0000-0003-0887-3116Affiliations:
- Donghua University, School of Computer Science and Technology, Shanghai, China
- Shanghai Jiao Tong University, China (PhD 2009)
According to our database1,
Wei Li
authored at least 44 papers
between 2007 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2023
Statistical Differential Fault Analysis of the Saturnin Lightweight Cryptosystem in the Mobile Wireless Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2023
Two-stage natural scene image classification with noise discovering and label-correlation mining.
Knowl. Based Syst., 2023
2022
Sci. China Inf. Sci., 2022
2021
Statistical Fault Analysis of the Simeck Lightweight Cipher in the Ubiquitous Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2021
Proceedings of the Design Studies and Intelligence Engineering, 2021
2020
Sci. China Inf. Sci., 2020
2019
Ciphertext-Only Fault Analysis on the LED Lightweight Cryptosystem in the Internet of Things.
IEEE Trans. Dependable Secur. Comput., 2019
KSII Trans. Internet Inf. Syst., 2019
Comput. J., 2019
Sci. China Inf. Sci., 2019
2018
Security Analysis of the Khudra Lightweight Cryptosystem in the Vehicular Ad-hoc Networks.
KSII Trans. Internet Inf. Syst., 2018
Security Analysis of the PHOTON Lightweight Cryptosystem in the Wireless Body Area Network.
KSII Trans. Internet Inf. Syst., 2018
Sci. China Inf. Sci., 2018
Impossible meet-in-the-middle fault analysis on the LED lightweight cipher in VANETs.
Sci. China Inf. Sci., 2018
2017
KSII Trans. Internet Inf. Syst., 2017
2016
Impossible Differential Fault Analysis on the LED Lightweight Cryptosystem in the Vehicular Ad-Hoc Networks.
IEEE Trans. Dependable Secur. Comput., 2016
Improved impossible differential attack on reduced version of Camellia with <i>FL</i>/<i>FL</i> <sup>-1</sup> functions.
IET Inf. Secur., 2016
Proceedings of the 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2016
2015
Meet-in-the-middle fault analysis on word-oriented substitution-permutation network block ciphers.
Secur. Commun. Networks, 2015
KSII Trans. Internet Inf. Syst., 2015
2013
Proceedings of the Complex Adaptive Systems 2013 Conference, 2013
2012
Improved results on impossible differential cryptanalysis of reduced-round Camellia-192/256.
J. Syst. Softw., 2012
J. Networks, 2012
Single Byte Differential Fault Analysis on the LED Lightweight Cipher in the Wireless Sensor Network.
Int. J. Comput. Intell. Syst., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Information Security Practice and Experience, 2012
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012
Proceedings of the Applied Cryptography and Network Security, 2012
2011
J. Comput., 2011
Improved Results on Impossible Differential Cryptanalysis of Reduced-Round Camellia-192/256.
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Trusted Systems - Third International Conference, 2011
Proceedings of the Information and Communications Security - 13th International Conference, 2011
2010
2009
Differential fault analysis on the contracting UFN structure, with application to SMS4 and MacGuffin.
J. Syst. Softw., 2009
Proceedings of the Third International Conference on Network and System Security, 2009
Network Intrusion Detection with Workflow Feature Definition Using BP Neural Network.
Proceedings of the Advances in Neural Networks, 2009
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009
2008
2007
An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security.
Proceedings of the Provable Security, 2007