Skip to main content

and
  1. Chapter and Conference Paper

    Combination of Hardware and Software: An Efficient AES Implementation Resistant to Side-Channel Attacks on All Programmable SoC

    With the rapid development of IoT devices in the direction of multifunction and personalization, All Programmable SoC has been used more and more frequently because of its unrivaled levels of system performanc...

    **gquan Ge, Neng Gao, Chenyang Tu, Ji **ang, Zeyi Liu, Jun Yuan in Computer Security (2018)

  2. No Access

    Chapter and Conference Paper

    Knowledge Graph Embedding with Order Information of Triplets

    Knowledge graphs (KGs) are large scale multi-relational directed graph, which comprise a large amount of triplets. Embedding knowledge graphs into continuous vector space is an essential problem in knowledge e...

    Jun Yuan, Neng Gao, Ji **ang, Chenyang Tu in Advances in Knowledge Discovery and Data M… (2019)

  3. No Access

    Chapter and Conference Paper

    SecFlush: A Hardware/Software Collaborative Design for Real-Time Detection and Defense Against Flush-Based Cache Attacks

    In recent years, cache attacks against micro architectures have posed a daunting threat to modern processors such as x86 and ARM. Of the attacks, flush-based cache attacks have attracted increasing attention f...

    Churan Tang, Zongbin Liu, Cunqing Ma in Information and Communications Security (2020)