default search action
Pei Luo
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j13]Ying Zhang, Ping Liu, Li-Jia Tang, Pei-Min Lin, Run Li, Huai-Rong Luo, Pei Luo:
Basing on the machine learning model to analyse the coronary calcification score and the coronary flow reserve score to evaluate the degree of coronary artery stenosis. Comput. Biol. Medicine 163: 107130 (2023) - [j12]Xiaodan Yin, Xiaorui Wang, Yuquan Li, Jike Wang, Yuwei Wang, Yafeng Deng, Tingjun Hou, Huanxiang Liu, Pei Luo, Xiaojun Yao:
CODD-Pred: A Web Server for Efficient Target Identification and Bioactivity Prediction of Small Molecules. J. Chem. Inf. Model. 63(20): 6169-6176 (2023) - [j11]Qian Ma, Zhijun Yang, Pei Luo, Zhenyu Lei, Qian Guo:
A Rolling-Adaptive Peak Clipping Control Strategy Coordinating RBE Recycling and PV Consumption. IEEE Trans. Intell. Transp. Syst. 24(4): 4348-4363 (2023) - 2021
- [j10]Pei Luo, Qianru Li, Yang Zhou, Qian Ma, Ying Zhang, Yishuang Peng, Jihao Sun:
Multi-Application Strategy Based on Railway Static Power Conditioner With Energy Storage System. IEEE Trans. Intell. Transp. Syst. 22(4): 2140-2152 (2021) - 2020
- [c32]Mincheng Chen, Jingling Yuan, Nana Wang, Yi Luo, Pei Luo:
Two-Sided Matching Scheduling Using Multi-Level Look-Ahead Queue of Supply and Demand. ICSOC 2020: 525-532 - [c31]Yang Zhou, Christian Rehtanz, Stefan Dalhues, Gang Lin, Pei Luo, Yong Li:
An Emergency Collaborative Scheduling Optimization Method based on VSC-HVDC Systems. IECON 2020: 1532-1537 - [c30]Qian Ma, Yishuang Peng, Pei Luo, Qianru Li, Jihao Sun, Hao Wang:
Electrified Railway Traction Load Prediction Based on Deep Learning. IECON 2020: 4679-4684 - [c29]Deming Sheng, Jingling Yuan, Qing Xie, Pei Luo:
MOOCRec: An Attention Meta-path Based Model for Top-K Recommendation in MOOC. KSEM (1) 2020: 280-288
2010 – 2019
- 2019
- [j9]Liwei Zhang, A. Adam Ding, Yunsi Fei, Pei Luo:
Efficient Nonprofiling 2nd-Order Power Analysis on Masked Devices Utilizing Multiple Leakage Points. IEEE Trans. Dependable Secur. Comput. 16(5): 843-855 (2019) - [c28]Yaling Zhang, Pei Luo, Lingyu Qu:
An Improved Differential Privacy Algorithm Using Frequent Pattern Mining. CIS 2019: 419-423 - [c27]Qian Ma, Yuting Wang, Pei Luo:
Performance Improvement of Two-Phase Stationary-Frame-Based Enhanced PLL by Using Multiple Delayed Signal Cancellation Filters. IECON 2019: 2160-2165 - [c26]Pei Luo, Qianru Li, Qian Ma:
Multi-scenario Capacity Optimization Design of Railway Power Conditioner Considering Load Uncertainty. IECON 2019: 2714-2719 - 2018
- [j8]Chao Luo, Yunsi Fei, Liwei Zhang, A. Adam Ding, Pei Luo, Saoni Mukherjee, David R. Kaeli:
Power Analysis Attack of an AES GPU Implementation. J. Hardw. Syst. Secur. 2(1): 69-82 (2018) - [j7]Pei Luo, Konstantinos Athanasiou, Yunsi Fei, Thomas Wahl:
Algebraic Fault Analysis of SHA-3 Under Relaxed Fault Models. IEEE Trans. Inf. Forensics Secur. 13(7): 1752-1761 (2018) - [c25]Pei Luo, Haibin Zhu, Dongning Liu, Baoying Huang, Yan Hou:
Solving the M2M Recommendation Problem via Group Multi-Role Assignment. CSCWD 2018: 606-611 - 2017
- [j6]Pei Luo, Yunsi Fei, Liwei Zhang, A. Adam Ding:
Differential Fault Analysis of SHA-3 Under Relaxed Fault Models. J. Hardw. Syst. Secur. 1(2): 156-172 (2017) - [c24]Xun Sun, Yuanfan Xie, Pei Luo, Liang Wang:
A Dataset for Benchmarking Image-Based Localization. CVPR 2017: 5641-5649 - [c23]Pei Luo, Konstantinos Athanasiou, Yunsi Fei, Thomas Wahl:
Algebraic fault analysis of SHA-3. DATE 2017: 151-156 - [c22]Pei Luo, Konstantinos Athanasiou, Liwei Zhang, Zhen Hang Jiang, Yunsi Fei, A. Adam Ding, Thomas Wahl:
Compiler-Assisted Threshold Implementation against Power Analysis Attacks. ICCD 2017: 541-544 - [c21]Shuai Chen, Bo Ma, Pei Luo:
Generalized pooling pyramid with hierarchical dictionary sparse coding for event and object recognition. ICIP 2017: 2349-2353 - [c20]Kuai Zhang, Xin Xin, Pei Luo, Ping Guo:
Fine-grained news recommendation by fusing matrix factorization, topic analysis and knowledge graph representation. SMC 2017: 918-923 - [c19]Pei Luo, Xin Xin, Kuai Zhang, Ping Guo, Yang Yu, Zichao Wang:
Predicting the number of driving service orders in fine-grained regions by an ensemble multi-view-based model. SMC 2017: 936-941 - [i13]Pei Luo, Konstantinos Athanasiou, Yunsi Fei, Thomas Wahl:
Algebraic Fault Analysis of SHA-3. IACR Cryptol. ePrint Arch. 2017: 113 (2017) - [i12]Pei Luo, Yunsi Fei, Liwei Zhang, A. Adam Ding:
Differential Fault Analysis of SHA-3 under Relaxed Fault Models. IACR Cryptol. ePrint Arch. 2017: 858 (2017) - 2016
- [c18]Pei Luo, Yunsi Fei, Liwei Zhang, A. Adam Ding:
Differential Fault Analysis of SHA3-224 and SHA3-256. FDTC 2016: 4-15 - [c17]Pei Luo, Cheng Li, Yunsi Fei:
Concurrent Error Detection for Reliable SHA-3 Design. ACM Great Lakes Symposium on VLSI 2016: 39-44 - [i11]Pei Luo, Liwei Zhang, Yunsi Fei, A. Adam Ding:
An Improvement of Both Security and Reliability for Keccak Implementations on Smart Card. IACR Cryptol. ePrint Arch. 2016: 214 (2016) - [i10]Liwei Zhang, A. Adam Ding, Yunsi Fei, Pei Luo:
A Unified Metric for Quantifying Information Leakage of Cryptographic Devices under Power Analysis Attacks. IACR Cryptol. ePrint Arch. 2016: 297 (2016) - [i9]Pei Luo, Yunsi Fei, Liwei Zhang, A. Adam Ding:
Differential Fault Analysis of SHA3-224 and SHA3-256. IACR Cryptol. ePrint Arch. 2016: 709 (2016) - [i8]Pei Luo, Yunsi Fei:
Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack. IACR Cryptol. ePrint Arch. 2016: 967 (2016) - [i7]Pei Luo, Chao Luo, Yunsi Fei:
System Clock and Power Supply Cross-Checking for Glitch Detection. IACR Cryptol. ePrint Arch. 2016: 968 (2016) - 2015
- [c16]Pei Luo, Liwei Zhang, Yunsi Fei, A. Adam Ding:
Towards secure cryptographic software implementation against side-channel power analysis attacks. ASAP 2015: 144-148 - [c15]Xin Fang, Pei Luo, Yunsi Fei, Miriam Leeser:
Balance power leakage to fight against side-channel analysis at gate level in FPGAs. ASAP 2015: 154-155 - [c14]Liwei Zhang, A. Adam Ding, Yunsi Fei, Pei Luo:
A Unified Metric for Quantifying Information Leakage of Cryptographic Devices Under Power Analysis Attacks. ASIACRYPT (2) 2015: 338-360 - [c13]Liwei Zhang, A. Adam Ding, Yunsi Fei, Pei Luo:
Efficient 2nd-order power analysis on masked devices utilizing multiple leakage. HOST 2015: 118-123 - [c12]Xin Fang, Pei Luo, Yunsi Fei, Miriam Leeser:
Leakage evaluation on power balance countermeasure against side-channel attack on FPGAs. HPEC 2015: 1-6 - [c11]Chao Luo, Yunsi Fei, Pei Luo, Saoni Mukherjee, David R. Kaeli:
Side-channel power analysis of a GPU AES implementation. ICCD 2015: 281-288 - [c10]Pei Luo, Yunsi Fei, Xin Fang, A. Adam Ding, David R. Kaeli, Miriam Leeser:
Side-channel analysis of MAC-Keccak hardware implementations. HASP@ISCA 2015: 1:1-1:8 - [i6]Pei Luo, Yunsi Fei, Xin Fang, A. Adam Ding, David R. Kaeli, Miriam Leeser:
Side-Channel Analysis of MAC-Keccak Hardware Implementations. IACR Cryptol. ePrint Arch. 2015: 411 (2015) - [i5]Pei Luo, Liwei Zhang, Yunsi Fei, A. Adam Ding:
Towards Secure Cryptographic Software Implementation Against Side-Channel Power Analysis Attacks. IACR Cryptol. ePrint Arch. 2015: 717 (2015) - 2014
- [c9]A. Adam Ding, Liwei Zhang, Yunsi Fei, Pei Luo:
A Statistical Model for Higher Order DPA on Masked Devices. CHES 2014: 147-169 - [c8]Pei Luo, Andy Yu-Lun Lin, Zhen Wang, Mark G. Karpovsky:
Hardware Implementation of Secure Shamir's Secret Sharing Scheme. HASE 2014: 193-200 - [c7]Wenfei Jiang, Tao Luo, Fan Zhang, Jiang Tian, Pei Luo, Kangying Cai:
Generic 2D/3D smoothing via regional variation. ICASSP 2014: 549-553 - [c6]Tushar Swamy, Neel Shah, Pei Luo, Yunsi Fei, David R. Kaeli:
Scalable and efficient implementation of correlation power analysis using graphics processing units (GPUs). HASP@ISCA 2014: 10:1-10:8 - [c5]Pei Luo, Yunsi Fei, Xin Fang, A. Adam Ding, Miriam Leeser, David R. Kaeli:
Power analysis attack on hardware implementation of MAC-Keccak on FPGAs. ReConFig 2014: 1-7 - [c4]Pei Luo, Yunsi Fei, Liwei Zhang, A. Adam Ding:
Side-channel power analysis of different protection schemes against fault attacks on AES. ReConFig 2014: 1-6 - [i4]A. Adam Ding, Liwei Zhang, Yunsi Fei, Pei Luo:
A Statistical Model for Higher Order DPA on Masked Devices. IACR Cryptol. ePrint Arch. 2014: 433 (2014) - [i3]Pei Luo, Yunsi Fei, Xin Fang, A. Adam Ding, Miriam Leeser, David R. Kaeli:
Power Analysis Attack on Hardware Implementation of MAC-Keccak on FPGAs. IACR Cryptol. ePrint Arch. 2014: 854 (2014) - [i2]Pei Luo, Yunsi Fei, Liwei Zhang, A. Adam Ding:
Side-channel Power Analysis of Different Protection Schemes Against Fault Attacks on AES. IACR Cryptol. ePrint Arch. 2014: 875 (2014) - [i1]Pei Luo, Andy Yu-Lun Lin, Zhen Wang, Mark G. Karpovsky:
Hardware Implementation of Secure Shamir's Secret Sharing Scheme. IACR Cryptol. ePrint Arch. 2014: 887 (2014) - 2013
- [j5]Lu Feng, Zhuangzhi Wu, Pei Luo, Teng Ma:
Computational geometry-based scale space for edge-preserving multiscale image decomposition. J. Electronic Imaging 22(1): 013027 (2013) - [j4]Pei Luo, Zhuangzhi Wu, Chunhe Xia, Lu Feng, Teng Ma:
Co-segmentation of 3D shapes via multi-view spectral clustering. Vis. Comput. 29(6-8): 587-597 (2013) - [c3]Shizun Ge, Zhen Wang, Pei Luo, Mark G. Karpovsky:
Secure memories resistant to both random errors and fault injection attacks using nonlinear error correction codes. HASP@ISCA 2013: 5 - 2012
- [j3]Teng Ma, Xiang Long, Lu Feng, Pei Luo, Zhuangzhi Wu:
Visible neighborhood graph of point clouds. Graph. Model. 74(4): 184-196 (2012) - [j2]Shanguo Huang, Weihua Lian, Xian Zhang, Bingli Guo, Pei Luo, Jie Zhang, Wanyi Gu:
A novel method to evaluate clustering algorithms for hierarchical optical networks. Photonic Netw. Commun. 23(2): 183-190 (2012) - 2011
- [j1]Shanguo Huang, Bin Li, Bingli Guo, Jie Zhang, Pei Luo, Daiwei Tan, Wanyi Gu:
Distributed Protocol for Removal of Loop Backs with Asymmetric Digraph Using GMPLS in P-Cycle Based Optical Networks. IEEE Trans. Commun. 59(2): 541-551 (2011) - [c2]Lianxing Hou, Lin Zuo, Pei Luo, Dong Liu:
Collision-safe wavelength assignment scheme for lightpath establishment in WSONs. CCIS 2011: 250-253
2000 – 2009
- 2009
- [c1]Pei Luo, Qian Ma, Hui-xian Huang:
Urban Trunk Road Traffic Signal Coordinated Control Based on Multi-Objective Immune Algorithm. CAR 2009: 72-76
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-26 18:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint