Остановите войну!
for scientists:
default search action
Zhu Wang 0005
Person information
- affiliation: Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China
Other persons with the same name
- Zhu Wang — disambiguation page
- Zhu Wang 0001 — Northwestern Polytechnical University, School of Computer Science, Xian, China
- Zhu Wang 0002 — State University of New York at Oneonta, Department of Mathematics, USA (and 1 more)
- Zhu Wang 0003 — University of South Carolina, Department of Mathematics, Columbia, SC, USA
- Zhu Wang 0004 — Data Communication Technology Research Institute, Beijing, China
- Zhu Wang 0006 — Beijing Institute of Technology, School of Aerospace Engineering, Beijing, China
- Zhu Wang 0007 — Sichuan University, Law School, Chengdu, China
- Zhu Wang 0008 — Harbin Institute of Technology, School of Computer Science and Technology, Weihai, China
- Zhu Wang 0009 — Siemens Corporate Technology, Princeton, NJ, USA (and 1 more)
- Zhu Wang 0010 — Dalian University of Technology, School of Control Science and Engineering, Key Laboratory of Intelligent Control and Optimization for Industrial Equipment, Dalian, China
- Zhu Wang 0011 — Oklahoma State University, Computer Science Department, Stillwater, OK, USA
- Zhu Wang 0012 — China University of Petroleum, Department of Automation, Qingdao, China
- Zhu Wang 0013 — New York University, Courant Institute, NY, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c13]Fanfan Hao, Zhu Wang, Yaobing Xu, Siyuan Leng, Liang Fang, Fenghua Li:
Missing Data Completion for Network Traffic with Continuous Mutation Based on Tensor Ring Decomposition. CSCWD 2024: 151-156 - 2023
- [i10]Jianye Gao, Xinyao Li, Changhai Ou, Zhu Wang, Fei Yan:
Manifold Learning Side-Channel Attacks against Masked Cryptographic Implementations. IACR Cryptol. ePrint Arch. 2023: 1604 (2023) - 2022
- [c12]Mengyao Shi, Zhu Wang, Tingting Peng, Fenghua Li:
Message Recovery Attack of Kyber Based on Information Leakage in Decoding Operation. SecureComm 2022: 630-647 - [c11]Fanfan Hao, Zhu Wang, Mengyao Shi, Tingting Peng, Liang Fang, Fenghua Li:
Inferring Attack Paths in Networks with Periodic Topology Changes. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 724-731 - [i9]Jiangshan Long, Changhai Ou, Zhu Wang, Shihui Zheng, Fei Yan, Fan Zhang, Siew-Kei Lam:
Snowball: Another View on Side-Channel Key Recovery Tools. IACR Cryptol. ePrint Arch. 2022: 728 (2022) - [i8]Jiangshan Long, Chenxu Wang, Changhai Ou, Zhu Wang, Yongbin Zhou, Ming Tang:
One for All, All for One: A Unified Evaluation Framework for Univariate DPA Attacks. IACR Cryptol. ePrint Arch. 2022: 1360 (2022) - 2021
- [i7]Changhai Ou, Debiao He, Zhu Wang, Kexin Qiao, Shihui Zheng, Siew-Kei Lam:
CoTree: Push the Limits of Conquerable Space in Collision-Optimized Side-Channel Attacks. IACR Cryptol. ePrint Arch. 2021: 1582 (2021)
2010 – 2019
- 2019
- [j1]Changhai Ou, Zhu Wang, Degang Sun, Xinping Zhou:
Group Collision Attack. IEEE Trans. Inf. Forensics Secur. 14(4): 939-953 (2019) - 2017
- [c10]Xinping Zhou, Carolyn Whitnall, Elisabeth Oswald, Degang Sun, Zhu Wang:
A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel Distinguisher. CARDIS 2017: 70-87 - [c9]Xinping Zhou, Carolyn Whitnall, Elisabeth Oswald, Degang Sun, Zhu Wang:
Categorising and Comparing Cluster-Based DPA Distinguishers. SAC 2017: 442-458 - [i6]Changhai Ou, Degang Sun, Zhu Wang, Xinping Zhou, Juan Ai:
Towards Easy Key Enumeration. IACR Cryptol. ePrint Arch. 2017: 254 (2017) - [i5]Changhai Ou, Zhu Wang, Degang Sun, Xinping Zhou:
Profiling Good Leakage Models For Masked Implementations. IACR Cryptol. ePrint Arch. 2017: 660 (2017) - [i4]Xinping Zhou, Carolyn Whitnall, Elisabeth Oswald, Degang Sun, Zhu Wang:
Categorising and Comparing Cluster-Based DPA Distinguishers. IACR Cryptol. ePrint Arch. 2017: 764 (2017) - [i3]Changhai Ou, Degang Sun, Zhu Wang, Xinping Zhou:
Towards Optimal Pre-processing in Leakage Detection. IACR Cryptol. ePrint Arch. 2017: 939 (2017) - [i2]Xinping Zhou, Carolyn Whitnall, Elisabeth Oswald, Degang Sun, Zhu Wang:
A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel Distinguisher. IACR Cryptol. ePrint Arch. 2017: 1051 (2017) - [i1]Changhai Ou, Degang Sun, Zhu Wang, Xinping Zhou, Wei Cheng:
Manifold Learning Towards Masking Implementations: A First Study. IACR Cryptol. ePrint Arch. 2017: 1112 (2017) - 2016
- [c8]Changhai Ou, Zhu Wang, Juan Ai, Xinping Zhou, Degang Sun, Victor E. DeBrunner:
Error Tolerance based Single Interesting Point Side Channel CPA Distinguisher. AsiaCCS 2016: 819-827 - [c7]Changhai Ou, Zhu Wang, Degang Sun, Xinping Zhou, Juan Ai:
Group Verification Based Multiple-Differential Collision Attack. ICICS 2016: 145-156 - [c6]Changhai Ou, Zhu Wang, Degang Sun, Xinping Zhou, Juan Ai, Na Pang:
Enhanced Correlation Power Analysis by Biasing Power Traces. ISC 2016: 59-72 - [c5]Changhai Ou, Zhu Wang, Degang Sun, Xinping Zhou, Juan Ai:
Uncertain? No, It's Very Certain! - Recovering the Key from Guessing Entropy Enhanced CPA. SEC 2016: 308-320 - [c4]Juan Ai, Zhu Wang, Xinping Zhou, Changhai Ou:
POSTER: A Novel Wavelet Denoising Method Based on Robust Principal Component Analysis in Side Channel Attacks. SecureComm 2016: 766-769 - [c3]Changhai Ou, Zhu Wang, Degang Sun, Xinping Zhou, Juan Ai:
Power Traces Clipping and Splicing Enhanced Correlation Collision Analysis. Trustcom/BigDataSE/ISPA 2016: 989-995 - [c2]Xinping Zhou, Degang Sun, Zhu Wang, Changhai Ou, Juan Ai:
Double-Key Recovery Based Correlation Power Analysis. Trustcom/BigDataSE/ISPA 2016: 1016-1022 - 2015
- [c1]Degang Sun, Xinping Zhou, Zhu Wang, Changhai Ou, Wei-qing Huang, Juan Ai:
POSTER: Using Improved Singular Value Decomposition to Enhance Correlation Power Analysis. SecureComm 2015: 598-601
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-20 20:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint