default search action
Chenyang Tu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c29]Jihong Liu, Neng Gao, Chenyang Tu, Yifei Zhang, Yongjuan Sun:
A Pure Hardware Design and Implementation on FPGA of WireGuard-based VPN Gateway. CSCWD 2023: 1220-1225 - 2022
- [c28]Langyue He, Cunqing Ma, Chenyang Tu, Yifei Zhang:
Gait2Vec: Continuous Authentication of Smartphone Users Based on Gait Behavior. CSCWD 2022: 280-285 - [c27]Zhe Kong, Xin Wang, Neng Gao, Yifei Zhang, Yuhan Liu, Chenyang Tu:
Multi-level Fusion of Multi-modal Semantic Embeddings for Zero Shot Learning. ICMI 2022: 310-318 - [c26]Yingshuai Kou, Neng Gao, Yifei Zhang, Chenyang Tu, Cunqing Ma:
BiGNN: A Bilateral-Branch Graph Neural Network to Solve Popularity Bias in Recommendation. ICTAI 2022: 840-847 - 2021
- [c25]Mingyang Li, Neng Gao, Chenyang Tu, Jia Peng, Min Li:
Incorporating Attributes Semantics into Knowledge Graph Embeddings. CSCWD 2021: 620-625 - [c24]Junsha Chen, Neng Gao, Yifei Zhang, Chenyang Tu:
Image-Enhanced Multi-Modal Representation for Local Topic Detection from Social Media. DASFAA (2) 2021: 658-674 - [c23]Zehua Zeng, Chenyang Tu, Neng Gao, Cong Xue, Cunqing Ma, Yiwei Shan:
CMVCG: Non-autoregressive Conditional Masked Live Video Comments Generation Model. IJCNN 2021: 1-8 - [c22]Zehua Zeng, Neng Gao, Cong Xue, Chenyang Tu:
PLVCG: A Pretraining Based Model for Live Video Comment Generation. PAKDD (2) 2021: 690-702 - 2020
- [j1]Chenyang Tu, Zeyi Liu, Neng Gao, Cunqing Ma, Jingquan Ge, Lingchen Zhang:
MACM: How to Reduce the Multi-Round SCA to the Single-Round Attack on the Feistel-SP Networks. IEEE Trans. Inf. Forensics Secur. 15: 3079-3092 (2020) - [c21]Yifei Zhang, Neng Gao, Junsha Chen, Chenyang Tu, Jiong Wang:
PrivRec: User-Centric Differentially Private Collaborative Filtering Using LSH and KD. ICONIP (4) 2020: 113-121 - [c20]Jiong Wang, Yingshuai Kou, Yifei Zhang, Neng Gao, Chenyang Tu:
Leveraging Knowledge Context Information to Enhance Personalized Recommendation. ICONIP (3) 2020: 467-478 - [c19]Yiwen Jiang, Wei Tang, Neng Gao, Chenyang Tu, Jia Peng, Min Li:
SECL: Separated Embedding and Correlation Learning for Demographic Prediction in Ubiquitous Sensor Scenario. IJCNN 2020: 1-10 - [c18]Min He, Cunqing Ma, Jingquan Ge, Neng Gao, Chenyang Tu:
Flush-Detector: More Secure API Resistant to Flush-Based Spectre Attacks on ARM Cortex-A9. ISCC 2020: 1-6 - [c17]Ping Peng, Cunqing Ma, Jingquan Ge, Neng Gao, Chenyang Tu:
A Hardware/Software Collaborative SM4 Implementation Resistant to Side-channel Attacks on ARM-FPGA Embedded SoC. ISCC 2020: 1-7 - [c16]Jiong Wang, Yingshuai Kou, Neng Gao, Chenyang Tu:
User Preference Excitation Network for Sequential Recommendation. ISPA/BDCloud/SocialCom/SustainCom 2020: 433-440 - [c15]Yiwen Jiang, Wei Tang, Neng Gao, Ji Xiang, Chenyang Tu, Min Li:
Multiple Demographic Attributes Prediction in Mobile and Sensor Devices. PAKDD (1) 2020: 857-868
2010 – 2019
- 2019
- [c14]Jingquan Ge, Neng Gao, Chenyang Tu, Ji Xiang, Zeyi Liu:
More Secure Collaborative APIs Resistant to Flush+Reload and Flush+Flush Attacks on ARMv8-A. APSEC 2019: 410-417 - [c13]Junsha Chen, Neng Gao, Cong Xue, Chenyang Tu, Daren Zha:
Perceiving Topic Bubbles: Local Topic Detection in Spatio-Temporal Tweet Stream. DASFAA (2) 2019: 730-747 - [c12]Jingquan Ge, Neng Gao, Chenyang Tu, Ji Xiang, Zeyi Liu:
AdapTimer: Hardware/Software Collaborative Timer Resistant to Flush-Based Cache Attacks on ARM-FPGA Embedded SoC. ICCD 2019: 585-593 - [c11]Churan Tang, Zongbin Liu, Cunqing Ma, Jingquan Ge, Chenyang Tu:
SecFlush: A Hardware/Software Collaborative Design for Real-Time Detection and Defense Against Flush-Based Cache Attacks. ICICS 2019: 251-268 - [c10]Junsha Chen, Neng Gao, Yifei Zhang, Chenyang Tu:
Local Topic Detection Using Word Embedding from Spatio-Temporal Social Media. ICONIP (5) 2019: 629-641 - [c9]Junsha Chen, Neng Gao, Cong Xue, Yifei Zhang, Chenyang Tu, Min Li:
The Application of Network Based Embedding in Local Topic Detection from Social Media. ICTAI 2019: 1311-1319 - [c8]Jun Yuan, Neng Gao, Ji Xiang, Chenyang Tu, Jingquan Ge:
Knowledge Graph Embedding with Order Information of Triplets. PAKDD (3) 2019: 476-488 - 2018
- [c7]Jingquan Ge, Neng Gao, Chenyang Tu, Ji Xiang, Zeyi Liu, Jun Yuan:
Combination of Hardware and Software: An Efficient AES Implementation Resistant to Side-Channel Attacks on All Programmable SoC. ESORICS (1) 2018: 197-217 - 2017
- [c6]Chenyang Tu, Lingchen Zhang, Zeyi Liu, Neng Gao, Yuan Ma:
A Practical Chosen Message Power Analysis Approach Against Ciphers with the Key Whitening Layers. ACNS 2017: 415-434 - 2016
- [c5]Zeyi Liu, Neng Gao, Chenyang Tu, Jian Zhou, Yuan Ma, Yuan Zhao:
Leakage Fingerprints: A Non-negligible Vulnerability in Side-Channel Analysis. AsiaCCS 2016: 807-818 - [c4]Yuan Ma, Qinglong Zhang, Zongbin Liu, Chenyang Tu, Jingqiang Lin:
Low-Cost Hardware Implementation of Elliptic Curve Cryptography for General Prime Fields. ICICS 2016: 292-306 - [c3]Zeyi Liu, Neng Gao, Chenyang Tu, Yuan Ma, Zongbin Liu:
Detecting Side Channel Vulnerabilities in Improved Rotating S-Box Masking Scheme - Presenting Four Non-profiled Attacks. SAC 2016: 41-57 - 2015
- [c2]Chenyang Tu, Jian Zhou, Neng Gao, Zeyi Liu, Yuan Ma, Zongbin Liu:
QRL: A High Performance Quadruple-Rail Logic for Resisting DPA on FPGA Implementations. ICICS 2015: 184-198 - [i1]Chenyang Tu, Neng Gao, Zeyi Liu, Lei Wang, Zongbin Liu, Bingke Ma:
A Practical Chosen Message Power Analysis Method on the Feistel-SP ciphers with Applications to CLEFIA and Camellia. IACR Cryptol. ePrint Arch. 2015: 174 (2015) - 2014
- [c1]Chenyang Tu, Wei He, Neng Gao, Eduardo de la Torre, Zeyi Liu, Limin Liu:
A Progressive Dual-Rail Routing Repair Approach for FPGA Implementation of Crypto Algorithm. ISPEC 2014: 217-231
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:40 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint