default search action
Neng Gao
Publications
- 2021
- [c69]Xiaobo Guo, Fali Wang, Neng Gao, Zeyi Liu, Kai Liu:
ConvMB: Improving Convolution-Based Knowledge Graph Embeddings by Adopting Multi-Branch 3D Convolution Filters. ISPA/BDCloud/SocialCom/SustainCom 2021: 382-389 - [c65]Zhuoxiang Shen, Neng Gao, Zeyi Liu, Min Li, Chuanyin Wang:
Using Chinese Natural Language to Configure Authorization Policies in Attribute-Based Access Control System. SciSec 2021: 110-125 - 2020
- [j5]Chenyang Tu, Zeyi Liu, Neng Gao, Cunqing Ma, Jingquan Ge, Lingchen Zhang:
MACM: How to Reduce the Multi-Round SCA to the Single-Round Attack on the Feistel-SP Networks. IEEE Trans. Inf. Forensics Secur. 15: 3079-3092 (2020) - 2019
- [c47]Jingquan Ge, Neng Gao, Chenyang Tu, Ji Xiang, Zeyi Liu:
More Secure Collaborative APIs Resistant to Flush+Reload and Flush+Flush Attacks on ARMv8-A. APSEC 2019: 410-417 - [c43]Jingquan Ge, Neng Gao, Chenyang Tu, Ji Xiang, Zeyi Liu:
AdapTimer: Hardware/Software Collaborative Timer Resistant to Flush-Based Cache Attacks on ARM-FPGA Embedded SoC. ICCD 2019: 585-593 - 2018
- [c26]Jingquan Ge, Neng Gao, Chenyang Tu, Ji Xiang, Zeyi Liu, Jun Yuan:
Combination of Hardware and Software: An Efficient AES Implementation Resistant to Side-Channel Attacks on All Programmable SoC. ESORICS (1) 2018: 197-217 - [c22]Jun Yuan, Neng Gao, Lei Wang, Zeyi Liu:
MultNet: An Efficient Network Representation Learning for Large-Scale Social Relation Extraction. ICONIP (3) 2018: 515-524 - [c21]Zehua Zeng, Cong Xue, Neng Gao, Lei Wang, Zeyi Liu:
Learning from Audience Intelligence: Dynamic Labeled LDA Model for Time-Sync Commented Video Tagging. ICONIP (3) 2018: 546-559 - 2017
- [c16]Chenyang Tu, Lingchen Zhang, Zeyi Liu, Neng Gao, Yuan Ma:
A Practical Chosen Message Power Analysis Approach Against Ciphers with the Key Whitening Layers. ACNS 2017: 415-434 - 2016
- [c14]Zeyi Liu, Neng Gao, Chenyang Tu, Jian Zhou, Yuan Ma, Yuan Zhao:
Leakage Fingerprints: A Non-negligible Vulnerability in Side-Channel Analysis. AsiaCCS 2016: 807-818 - [c12]Zeyi Liu, Neng Gao, Chenyang Tu, Yuan Ma, Zongbin Liu:
Detecting Side Channel Vulnerabilities in Improved Rotating S-Box Masking Scheme - Presenting Four Non-profiled Attacks. SAC 2016: 41-57 - 2015
- [c10]Chenyang Tu, Jian Zhou, Neng Gao, Zeyi Liu, Yuan Ma, Zongbin Liu:
QRL: A High Performance Quadruple-Rail Logic for Resisting DPA on FPGA Implementations. ICICS 2015: 184-198 - [i2]Chenyang Tu, Neng Gao, Zeyi Liu, Lei Wang, Zongbin Liu, Bingke Ma:
A Practical Chosen Message Power Analysis Method on the Feistel-SP ciphers with Applications to CLEFIA and Camellia. IACR Cryptol. ePrint Arch. 2015: 174 (2015) - 2014
- [c8]Chenyang Tu, Wei He, Neng Gao, Eduardo de la Torre, Zeyi Liu, Limin Liu:
A Progressive Dual-Rail Routing Repair Approach for FPGA Implementation of Crypto Algorithm. ISPEC 2014: 217-231
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-23 18:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint