Yanbin Li

Orcid: 0000-0001-7151-9270

Affiliations:
  • Shandong University, School of Software, State Key Laboratory of Cryptology, Jinan, China
  • Wuhan University, School of Cyber Science and Engineering, China (PhD 2018)


According to our database1, Yanbin Li authored at least 21 papers between 2018 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

2018
2019
2020
2021
2022
2023
2024
2025
0
1
2
3
4
5
6
7
2
6
1
3
2
1
2
2
1
1

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
B2DFL: Bringing butterfly to decentralized federated learning assisted with blockchain.
J. Parallel Distributed Comput., 2025

Adaptive Chosen-Plaintext Deep-Learning-Based Side-Channel Analysis.
IEEE Internet Things J., 2025

2024
Security and Privacy in Solar Insecticidal Lamps Internet of Things: Requirements and Challenges.
IEEE CAA J. Autom. Sinica, January, 2024

Deep Learning Gradient Visualization-Based Pre-Silicon Side-Channel Leakage Location.
IEEE Trans. Inf. Forensics Secur., 2024

SF-CABD: Secure Byzantine fault tolerance federated learning on Non-IID data.
Knowl. Based Syst., 2024

Secure outsourced decryption for FHE-based privacy-preserving cloud computing.
J. Inf. Secur. Appl., 2024

L<i>π</i>CET: A Logic Security Analysis for Cryptographic Protocols Based on <i>π</i>-Calculus Extension Theory.
IET Inf. Secur., 2024

Secure Outsourced Decryption for HE-based Privacy-preserving Cloud Computing System.
CoRR, 2024

2023
Practical reusable garbled circuits with parallel updates.
Comput. Stand. Interfaces, August, 2023

2022
Single-Trace Side-Channel Attacks on the Toom-Cook: The Case Study of Saber.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

TSCL: A time-space crossing location for side-channel leakage detection.
Comput. Networks, 2022

A gradient deconvolutional network for side-channel attacks.
Comput. Electr. Eng., 2022

An Efficient Soft Analytical Side-Channel Attack on Ascon.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

Recovering the Weights of Convolutional Neural Network via Chosen Pixel Horizontal Power Analysis.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

2021
Analysis of Multiplicative Low Entropy Masking Schemes Against Correlation Power Attack.
IEEE Trans. Inf. Forensics Secur., 2021

An Adaptive Communication-Efficient Federated Learning to Resist Gradient-Based Reconstruction Attacks.
Secur. Commun. Networks, 2021

Adaptive Chosen Plaintext Side-Channel Attacks for Higher-Order Masking Schemes.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

2020
A pre-silicon logic level security verification flow for higher-order masking schemes against glitches on FPGAs.
Integr., 2020

2019
Practical Evaluation Methodology of Higher-Order Maskings at Different Operating Frequencies.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

2018
Leak Point Locating in Hardware Implementations of Higher-Order Masking Schemes.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2018

Several weaknesses of the implementation for the theoretically secure masking schemes under ISW framework.
Integr., 2018


  Loading...