Zeyi Liu

Affiliations:
  • Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China
  • Chinese Academy of Sciences, Data Assurance and Communications Security Research Center, Beijing, China


According to our database1, Zeyi Liu authored at least 15 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
0
1
2
3
4
5
1
1
1
2
1
4
3
1
1

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
CA-GCN: A Confidence-aware uncertain knowledge graph embedding model based on graph convolutional networks.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

Dynamic Graph Embedding via Self-Attention in the Lorentz Space.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

2022
NP-LFA: Non-profiled Leakage Fingerprint Attacks against Improved Rotating S-box Masking Scheme.
Comput. J., 2022

2021
ConvMB: Improving Convolution-Based Knowledge Graph Embeddings by Adopting Multi-Branch 3D Convolution Filters.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

2020
MACM: How to Reduce the Multi-Round SCA to the Single-Round Attack on the Feistel-SP Networks.
IEEE Trans. Inf. Forensics Secur., 2020

2019
Adaptive-Skip-TransE Model: Breaking Relation Ambiguities for Knowledge Graph Embedding.
Proceedings of the Knowledge Science, Engineering and Management, 2019

A Robust Embedding Method for Anomaly Detection on Attributed Networks.
Proceedings of the International Joint Conference on Neural Networks, 2019

AdapTimer: Hardware/Software Collaborative Timer Resistant to Flush-Based Cache Attacks on ARM-FPGA Embedded SoC.
Proceedings of the 37th IEEE International Conference on Computer Design, 2019

More Secure Collaborative APIs Resistant to Flush+Reload and Flush+Flush Attacks on ARMv8-A.
Proceedings of the 26th Asia-Pacific Software Engineering Conference, 2019

2018
Learning from Audience Intelligence: Dynamic Labeled LDA Model for Time-Sync Commented Video Tagging.
Proceedings of the Neural Information Processing - 25th International Conference, 2018

MultNet: An Efficient Network Representation Learning for Large-Scale Social Relation Extraction.
Proceedings of the Neural Information Processing - 25th International Conference, 2018

Combination of Hardware and Software: An Efficient AES Implementation Resistant to Side-Channel Attacks on All Programmable SoC.
Proceedings of the Computer Security, 2018

2016
Leakage Fingerprints: A Non-negligible Vulnerability in Side-Channel Analysis.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
A Practical Chosen Message Power Analysis Method on the Feistel-SP ciphers with Applications to CLEFIA and Camellia.
IACR Cryptol. ePrint Arch., 2015

Recovering a Sum of Two Squares Decomposition Revisited.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015


  Loading...