Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fault Rate Analysis: Breaking Masked AES Hardware Implementations Efficiently., , , and . IEEE Trans. on Circuits and Systems, 60-II (8): 517-521 (2013)Experimental Investigation and Fault Diagnosis for Buckled Wet Clutch Based on Multi-Speed Hilbert Spectrum Entropy., , , , and . Entropy, 23 (12): 1704 (2021)On WiFi Offloading in Heterogeneous Networks: Various Incentives and Trade-Off Strategies., , , and . IEEE Communications Surveys and Tutorials, 18 (4): 2345-2385 (2016)Security Analysis of Shadowsocks(R) Protocol., , , and . Secur. Commun. Networks, (2022)The Analysis on Multimodal Transport Mode of Cross-border E-commerce with 'the Belt and Road' Strategy Based on Personalized Recommendation., , and . WHICEB, page 55. Association for Information Systems, (2018)Numerical simulation of spreading performance and distribution pattern of centrifugal variable-rate fertilizer applicator based on DEM software., , , , and . Comput. Electron. Agric., (2018)Efficient collision attacks on smart card implementations of masked AES., , , , , , and . SCIENCE CHINA Information Sciences, 58 (5): 1-15 (2015)Transfer Learning in Large-Scale Short Text Analysis., , , , , and . KSEM, volume 9403 of Lecture Notes in Computer Science, page 499-511. Springer, (2015)Overcoming Significant Noise: Correlation-Template-Induction Attack., , , and . ISPEC, volume 7232 of Lecture Notes in Computer Science, page 393-404. Springer, (2012)Proof of principle for epitope-focused vaccine design., , , , , , , , , and 17 other author(s). Nature, 507 (7491): 201-206 (2014)