Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    V-Curve25519: Efficient Implementation of Curve25519 on RISC-V Architecture

    Internet of Everything technology has greatly promoted the development of intelligent Internet of Vehicles (IoV) system. Similar to the Internet of Things system, the Internet of Vehicles also faces the proble...

    Qingguan Gao, Kaisheng Sun, Jiankuo Dong in Information Security and Cryptology (2024)

  2. No Access

    Chapter and Conference Paper

    JWTKey: Automatic Cryptographic Vulnerability Detection in JWT Applications

    JSON Web Token (JWT) has been widely adopted to increase the security of authentication and authorization scenarios. However, how to manage the JWT key during its lifecycle is rarely mentioned in the standards...

    Bowen Xu, Shijie Jia, **gqiang Lin, Fangyu Zheng in Computer Security – ESORICS 2023 (2024)

  3. No Access

    Chapter and Conference Paper

    MagicBatch: An Energy-Aware Scheduling Framework for DNN Inference on Heterogeneous Edge Servers in Space-Air-Ground Computation

    With the fast development of space-air-ground computing scenarios, large UAVs, airships or HAPS (high altitude platform station), and satellites, are in the trend to have more powerful computation resources (e...

    Di Liu, Zimo Ma, Aolin Zhang, Kuangyu Zheng in Big Data Intelligence and Computing (2023)

  4. No Access

    Chapter and Conference Paper

    SPath: An Energy-Efficient DAG Task Offloading Scheme with Space-Ground Cooperative Computing

    The fast improvement of satellites in both computation ability and numbers in the network, makes them possible to form as promising edge computing nodes for space-ground cooperative computing. These satellite ...

    Tianqi Zhao, Mingyue Zhao, Yue Shi, Kuangyu Zheng in Big Data Intelligence and Computing (2023)

  5. No Access

    Chapter and Conference Paper

    Protecting Private Keys of Dilithium Using Hardware Transactional Memory

    The confidentiality of cryptography keys is necessary in cryptographic implementations. In order to resist memory disclosure attacks that steal sensitive variables such as private keys, various schemes are pro...

    Lingjia Meng, Yu Fu, Fangyu Zheng, Ziqiang Ma, Mingyu Wang in Information Security (2023)

  6. No Access

    Chapter and Conference Paper

    3D Point Cloud Map** Based on Intensity Feature

    A 3D LIDAR simultaneous localization and map** scheme with intensity information corrected point clouds is proposed for the traditional simultaneous localization and map** (slam) methods. Four modules are ...

    **angyu Zheng, Haiyun Gan, **nchao Liu, Weiwen Lin in Artificial Intelligence in China (2022)

  7. No Access

    Chapter and Conference Paper

    Black-Box Testing of Cryptographic Algorithms Based on Data Characteristics

    Serving communications security, identity authentication, etc., cryptographic algorithms constitute the cornerstone of cyberspace security. During the past decades, cryptanalysts have proved that many once pre...

    Haoling Fan, Lingjia Meng, Fangyu Zheng in Applied Cryptography in Computer and Commu… (2022)

  8. No Access

    Chapter and Conference Paper

    A Novel High-Performance Implementation of CRYSTALS-Kyber with AI Accelerator

    Public-key cryptography, including conventional cryptosystems and post-quantum cryptography, involves computation-intensive workloads. With noticing the extraordinary computing power of AI accelerators, in thi...

    Lipeng Wan, Fangyu Zheng, Guang Fan, Rong Wei, Lili Gao in Computer Security – ESORICS 2022 (2022)

  9. No Access

    Chapter and Conference Paper

    TX-RSA: A High Performance RSA Implementation Scheme on NVIDIA Tegra X2

    Driven by computer vision and autopilot industries, embedded graphics processing units (GPUs) are now rapidly achieving extraordinary computing power, such NVIDIA Tegra K1/X1/X2, which are widely used in embed...

    Jiankuo Dong, Guang Fan, Fangyu Zheng in Wireless Algorithms, Systems, and Applicat… (2021)

  10. No Access

    Chapter and Conference Paper

    TESLAC: Accelerating Lattice-Based Cryptography with AI Accelerator

    In this paper, we exploit AI accelerator to implement cryptographic algorithms. To the best of our knowledge, it is the first attempt to implement quantum-safe Lattice-Based Cryptography (LBC) with AI accelera...

    Lipeng Wan, Fangyu Zheng, **gqiang Lin in Security and Privacy in Communication Networks (2021)

  11. No Access

    Chapter and Conference Paper

    SECCEG: A Secure and Efficient Cryptographic Co-processor Based on Embedded GPU System

    With the rise of IoT, e-commerce, and 5G, the demands of secure communications and identity authentications dramatically increase, which largely rely on high-volume cryptographic computing. Meanwhile, driven b...

    Guang Fan, Fangyu Zheng, Jiankuo Dong in Wireless Algorithms, Systems, and Applicat… (2021)

  12. No Access

    Article

    Adaptive sliding mode control for high-order system with mismatched disturbances

    Jianguo Guo, **angyu Zheng, Jun Zhou in Science China Information Sciences (2020)

  13. No Access

    Article

    Incorporating geographical location for team formation in social coding sites

    With the proliferation of open source software and community, more and more developers from different background (e.g., culture, language, location, skill) prefer to work collaboratively and release their work...

    Liang Chen, Yongjian Ye, Angyu Zheng, Fenfang **e, Zibin Zheng in World Wide Web (2020)

  14. No Access

    Chapter and Conference Paper

    Keep You from Leaving: Churn Prediction in Online Games

    Customer retention is a crucial problem for game companies since the revenue is heavily influenced by the size of their user bases. Previous studies have reached a consensus that the cost of attracting a new p...

    Angyu Zheng, Liang Chen, Fenfang **e in Database Systems for Advanced Applications (2020)

  15. Chapter and Conference Paper

    Software Service Recommendation Base on Collaborative Filtering Neural Network Model

    With broad application of Web service technology, many users look for applicable Web services to construct their target application quickly or do some further research. Github, as a treasury including a variet...

    Liang Chen, Angyu Zheng, Yinglan Feng, Fenfang **e in Service-Oriented Computing (2018)

  16. Chapter and Conference Paper

    High-Performance Symmetric Cryptography Server with GPU Acceleration

    With more and more sensitive and private data transferred on the Internet, various security protocols have been developed to secure end-to-end communication. However, in practical situations, applying these pr...

    Wangzhao Cheng, Fangyu Zheng, Wuqiong Pan in Information and Communications Security (2018)

  17. No Access

    Chapter and Conference Paper

    Secure and Efficient Outsourcing of Large-Scale Matrix Inverse Computation

    Matrix inverse computation (MIC) is one of the fundamental mathematical tasks in linear algebra, and finds applications in many areas of science and engineering. In practice, MIC tasks often involve large-scal...

    Shiran Pan, Qiongxiao Wang, Fangyu Zheng in Wireless Algorithms, Systems, and Applicat… (2018)

  18. No Access

    Chapter and Conference Paper

    Building Your Private Cloud Storage on Public Cloud Service Using Embedded GPUs

    When the public cloud provides infrastructure as a service (IaaS), the customer can outsource its data to the public cloud and release itself from the burden of storing data locally. At this point, the custome...

    Wangzhao Cheng, Fangyu Zheng, Wuqiong Pan in Security and Privacy in Communication Netw… (2018)

  19. Chapter and Conference Paper

    Utilizing GPU Virtualization to Protect the Private Keys of GPU Cryptographic Computation

    Nowadays graphics processing units (GPUs) have become popular parallel computing platforms known as General-Purpose GPU (GPGPU) computing. GPUs thereby are chosen by some security researchers as cryptographic ...

    Ziyang Wang, Fangyu Zheng, **gqiang Lin in Information and Communications Security (2018)

  20. Chapter and Conference Paper

    PhiRSA: Exploiting the Computing Power of Vector Instructions on Intel Xeon Phi for RSA

    Efficient implementations of public-key cryptographic algorithms on general-purpose computing devices, facilitate the applications of cryptography in communication security. Existing solutions work in two diff...

    Yuan Zhao, Wuqiong Pan, **gqiang Lin in Selected Areas in Cryptography – SAC 2016 (2017)

previous disabled Page of 2