Author of the publication

Improving DFA attacks on AES with unknown and random faults.

, , , , , and . Sci. China Inf. Sci., 60 (4): 42401 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Differential conductance and spin current in hybrid quantum dot-topological superconducting nanowire., , and . Quantum Inf. Process., 20 (5): 177 (2021)Quality Utilization Aware Based Data Gathering for Vehicular Communication Networks., , , , and . Wirel. Commun. Mob. Comput., (2018)A Top-K Query Scheme With Privacy Preservation for Intelligent Vehicle Network in Mobile IoT., , , , and . IEEE Access, (2020)A Unified Trustworthy Environment Establishment Based on Edge Computing in Industrial IoT., , , , , and . IEEE Trans. Ind. Informatics, 16 (9): 6083-6091 (2020)Efficient iceberg join processing in wireless sensor networks., , , and . Int. J. Embed. Syst., 9 (4): 365-378 (2017)A Natural Scene Recognition Learning Based on Label Correlation., , and . IEEE Trans. Emerg. Top. Comput. Intell., 6 (1): 150-158 (2022)An intelligent big data collection technology based on micro mobile data centers for crowdsensing vehicular sensor network., , , and . Pers. Ubiquitous Comput., 27 (3): 563-579 (2023)Landscape Ecological Risk and Ecological Security Pattern Construction in World Natural Heritage Sites: A Case Study of Bayinbuluke, Xinjiang, China., , , and . ISPRS Int. J. Geo Inf., 11 (6): 328 (2022)Maximizing real-time streaming services based on a multi-servers networking framework., , , , , , , and . Comput. Networks, (2015)Sustainable and Efficient Data Collection from WSNs to Cloud., , , , , and . IEEE Trans. Sustain. Comput., 4 (2): 252-262 (2019)