发表论文
(1) Group Collision Attack, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 14, NO. 4, APRIL 2019, 2018, 第 3 作者(2) A novel method for specific emitter identification based on singular spectrum analysis., In 2017 IEEE Wireless Communications and Networking Conference, 2017, 第 1 作者(3) Could we beat a new mimicking attack?, In 19th Asia-Pacific Network Operations and Management Symposium, 2017, 第 1 作者(4) Distinguishing flooding distributed denial of service from flash crowds using four data mining approaches, Comput. Sci. Inf. Syst., 14(3), 2017, 第 3 作者(5) Towards easy key enumeration, IACR Cryptology ePrint Archive, 2017, 第 2 作者(6) Profiling good leakage models for masked implementations, IACR Cryptology ePrint Archive, 2017, 第 3 作者(7) A New Method to Recognize Computer through Electromagnetic Radiation, A New Method to Recognize Computer through Electromagnetic Radiation, ]. Asia-Pacific International Symposium on Electromagnetic Compatibility, APEMC 2016, 2016, 第 1 作者(8) Network transmission of hidden data using smartphones based on compromising emanations., Network transmission of hidden data using smartphones based on compromising emanations., Asia-Pacific Intenational Symposium on Electromagnetic Compatibility & Signal Integrity and Technical Exhibition,APEMC 2016., 2016, 第 1 作者(9) Method for detecting information leakage from computer display in electromagnetic radiation, In 2016 IEEE Trustcom/BigDataSE/ISPA, 2016, 第 1 作者(10) Method for detecting text information leakage in electromagnetic radiation from a computer display, IET Information Security, 10(6), 2016, 第 1 作者(11) Group verification based multiple-differential collision attack, In Information and Communications Security - 18th International Conference, 2016, 第 3 作者(12) Power traces clipping and splicing enhanced correlation collision analysis, In 2016 IEEE Trustcom/BigDataSE/ISPA, 2016, 第 3 作者(13) Uncertain? no, it’s very certain! recovering the key from guessing entropy enhanced CPA, In ICT Systems Security and Privacy Protection - 31st IFIP TC 11 International Conference, 2016, 第 3 作者(14) Enhanced correlation power analysis by biasing power traces, In Information Security - 19th International Conference, 2016, 第 3 作者(15) Double-key recovery based correlation power analysis, In 2016 IEEE Trustcom/BigDataSE/ISPA, 2016, 第 2 作者(16) An Improved NPCUSUM Method with Adaptive Sliding Window to Detect DDoS Attacks, An Improved NPCUSUM Method with Adaptive Sliding Window to Detect DDoS Attacks, Information and Communications Security. Springer International Publishing, 2015, 第 1 作者(17) An Efficient and Anti-interference Method of Synchronizing Information Extraction for Video Leaking Signal [J]., An Efficient and Anti-interference Method of Synchronizing Information Extraction for Video Leaking Signal [J]., IET Signal Processing, 2015, 第 1 作者(18) POSTER: using improved singular value decomposition to enhance correlation power analysis, In Security and Privacy in Communication Networks - 11th International Conference, 2015, 第 1 作者(19) 基于访问控制矩阵的移动存储介质安全控制, Classified Removable Storage Medium Control Based on the Access Control Matrix, The 2014 2nd International Conference on Systems and Informatics(ICSAI2014), 2014, 第 1 作者(20) 视频电磁泄漏频率的判断方法, A Low-cost and Efficient Method of Determining the Best Frequency Band for Video Leaking Signal Reconstruction, The 2014 2nd International Conference on Systems and Informatics(ICSAI2014)EI, 2014, 第 1 作者(21) A Low-cost and Efficient Method of Determining the Best Frequency Band for Video Leaking Signal Reconstruction[C], A Low-cost and Efficient Method of Determining the Best Frequency Band for Video Leaking Signal Reconstruction[C], Proc of International Conference on Systems and Informatics. Shanghai: IEEE, 2014., 2014, 第 1 作者(22) 电磁泄漏文本信息检测方法, Method for Determining Whether or Not Text Information is Leaked From Computer Display Through Electromagnetic Radiation, International Conference on Information and Communications Security, 2014, 第 1 作者