default search action
Huanyu Wang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j22]Dalin He, Huanyu Wang, Tuo Deng, Jishi Liu, Junnian Wang:
Improving IIoT security: Unveiling threats through advanced side-channel analysis. Comput. Secur. 148: 104135 (2025) - 2024
- [j21]Zitian Huang, Huanyu Wang, Bijia Cao, Dalin He, Junnian Wang:
A comprehensive side-channel leakage assessment of CRYSTALS-Kyber in IIoT. Internet Things 27: 101331 (2024) - [j20]Huanyu Wang:
Amplitude-modulated EM side-channel attack on provably secure masked AES. J. Cryptogr. Eng. 14(3): 537-549 (2024) - [j19]Jishi Liu, Huanyu Wang, Junnian Wang, Dalin He, Ruihan Xu, Xiongfeng Tang:
Thermal infrared action recognition with two-stream shift Graph Convolutional Network. Mach. Vis. Appl. 35(4): 65 (2024) - [i17]Bingnan Ni, Huanyu Wang, Dongfeng Bai, Minghe Weng, Dexin Qi, Weichao Qiu, Bingbing Liu:
Neural Radiance Fields with Torch Units. CoRR abs/2404.02617 (2024) - [i16]Sicheng Yu, Chengkai Jin, Huanyu Wang, Zhenghao Chen, Sheng Jin, Zhongrong Zuo, Xiaolei Xu, Zhenbang Sun, Bingni Zhang, Jiawei Wu, Hao Zhang, Qianru Sun:
Frame-Voyager: Learning to Query Frames for Video Large Language Models. CoRR abs/2410.03226 (2024) - 2023
- [b1]Huanyu Wang:
Deep Learning Side-Channel Attacks on Advanced Encryption Standard. Royal Institute of Technology, Stockholm, Sweden, 2023 - [j18]Huanyu Wang, Lina Huang, Yutong Liu, Zhenyuan Xu, Lu Zhang, Tuming Zhang, Yuxiang Feng, Qing Hua:
Highly Integrated DBC-Based IPM with Ultra-Compact Size for Low Power Motor Drive Applications. IEICE Trans. Electron. 106(8): 442-445 (2023) - [j17]Xintian Wu, Huanyu Wang, Yiming Wu, Xi Li:
D3T-GAN: Data-Dependent Domain Transfer GANs for Image Generation with Limited Data. ACM Trans. Multim. Comput. Commun. Appl. 19(4): 146:1-146:20 (2023) - [c20]Shihao Su, Jianyun Xu, Huanyu Wang, Zhenwei Miao, Xin Zhan, Dayang Hao, Xi Li:
PUPS: Point Cloud Unified Panoptic Segmentation. AAAI 2023: 2339-2347 - [i15]Shihao Su, Jianyun Xu, Huanyu Wang, Zhenwei Miao, Xin Zhan, Dayang Hao, Xi Li:
PUPS: Point Cloud Unified Panoptic Segmentation. CoRR abs/2302.06185 (2023) - 2022
- [j16]Fanliang Hu, Huanyu Wang, Junnian Wang:
Multi-Leak Deep-Learning Side-Channel Analysis. IEEE Access 10: 22610-22621 (2022) - [j15]Huanyu Wang, Zequn Qin, Songyuan Li, Xi Li:
CoDiNet: Path Distribution Modeling With Consistency and Diversity for Dynamic Routing. IEEE Trans. Pattern Anal. Mach. Intell. 44(10): 6011-6023 (2022) - [j14]Huanyu Wang, Yongshun Zhang, Jianxin Wu:
Versatile, full-spectrum, and swift network sampling for model generation. Pattern Recognit. 129: 108729 (2022) - [j13]Huanyu Wang, Henian Li, Fahim Rahman, Mark M. Tehranipoor, Farimah Farahmandi:
SoFI: Security Property-Driven Vulnerability Assessments of ICs Against Fault-Injection Attacks. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(3): 452-465 (2022) - [j12]Andrew Stern, Huanyu Wang, Fahim Rahman, Farimah Farahmandi, Mark M. Tehranipoor:
ACED-IT: Assuring Confidential Electronic Design Against Insider Threats in a Zero-Trust Environment. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(10): 3202-3215 (2022) - [c19]Qing Hua, Zhenyuan Xu, Lina Huang, Huanyu Wang, Lu Zhang, Yuxiang Feng:
IPM Modeling Approach for Dynamic Simulation. AIIPCC 2022: 32-36 - [c18]Huanyu Wang, Junjie Liu, Xin Ma, Yang Yong, Zhenhua Chai, Jianxin Wu:
Compressing Models with Few Samples: Mimicking then Replacing. CVPR 2022: 691-700 - [c17]Huanyu Wang, Wenhu Zhang, Shihao Su, Hui Wang, Zhenwei Miao, Xin Zhan, Xi Li:
SP-Net: Slowly Progressing Dynamic Inference Networks. ECCV (11) 2022: 223-240 - [c16]Wenhu Zhang, Liangli Zheng, Huanyu Wang, Xintian Wu, Xi Li:
Saliency Hierarchy Modeling via Generative Kernels for Salient Object Detection. ECCV (28) 2022: 570-587 - [i14]Huanyu Wang, Junjie Liu, Xin Ma, Yang Yong, Zhenhua Chai, Jianxin Wu:
Compressing Models with Few Samples: Mimicking then Replacing. CoRR abs/2201.02620 (2022) - [i13]Xintian Wu, Huanyu Wang, Yiming Wu, Xi Li:
D3T-GAN: Data-Dependent Domain Transfer GANs for Few-shot Image Generation. CoRR abs/2205.06032 (2022) - [i12]Xintian Wu, Qihang Zhang, Yiming Wu, Huanyu Wang, Songyuan Li, Lingyun Sun, Xi Li:
F3A-GAN: Facial Flow for Face Animation with Generative Adversarial Networks. CoRR abs/2205.06204 (2022) - 2021
- [j11]Huanyu Wang, Elena Dubrova:
Tandem Deep Learning Side-Channel Attack on FPGA Implementation of AES. SN Comput. Sci. 2(5): 373 (2021) - [j10]Xintian Wu, Qihang Zhang, Yiming Wu, Huanyu Wang, Songyuan Li, Lingyun Sun, Xi Li:
F³A-GAN: Facial Flow for Face Animation With Generative Adversarial Networks. IEEE Trans. Image Process. 30: 8658-8670 (2021) - [c15]Ruize Wang, Huanyu Wang, Elena Dubrova, Martin Brisfors:
Advanced Far Field EM Side-Channel Attack on AES. CPSS@AsiaCCS 2021: 29-39 - [c14]Fanliang Hu, Huanyu Wang, Junnian Wang:
Deep-Learning Side-Channel Attack Against STM32 Implementation of AES. CSCI 2021: 844-847 - [c13]Peng Sun, Wenhu Zhang, Huanyu Wang, Songyuan Li, Xi Li:
Deep RGB-D Saliency Detection With Depth-Sensitive Attention and Automatic Multi-Modal Fusion. CVPR 2021: 1407-1417 - [c12]Huanyu Wang, Songyuan Li, Shihao Su, Zequn Qin, Xi Li:
RDI-Net: Relational Dynamic Inference Networks. ICCV 2021: 4601-4610 - [c11]Hao Yu, Huanyu Wang, Jianxin Wu:
Mixup Without Hesitation. ICIG (2) 2021: 143-154 - [i11]Hao Yu, Huanyu Wang, Jianxin Wu:
Mixup Without Hesitation. CoRR abs/2101.04342 (2021) - [i10]Peng Sun, Wenhu Zhang, Huanyu Wang, Songyuan Li, Xi Li:
Deep RGB-D Saliency Detection with Depth-Sensitive Attention and Automatic Multi-Modal Fusion. CoRR abs/2103.11832 (2021) - [i9]Fanliang Hu, Huanyu Wang, Junnian Wang:
Multi-Leak Deep-Learning Side-Channel Analysis. IACR Cryptol. ePrint Arch. 2021: 1107 (2021) - [i8]Fanliang Hu, Huanyu Wang, Junnian Wang:
Cross-Subkey Deep-Learning Side-Channel Analysis. IACR Cryptol. ePrint Arch. 2021: 1328 (2021) - 2020
- [j9]M. Tanjidur Rahman, M. Sazadur Rahman, Huanyu Wang, Shahin Tajik, Waleed Khalil, Farimah Farahmandi, Domenic Forte, Navid Asadizanjani, Mark M. Tehranipoor:
Defense-in-depth: A recipe for logic locking to prevail. Integr. 72: 39-57 (2020) - [j8]Huanyu Wang, Qihang Shi, Adib Nahiyan, Domenic Forte, Mark M. Tehranipoor:
A Physical Design Flow Against Front-Side Probing Attacks by Internal Shielding. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(10): 2152-2165 (2020) - [c10]Ruize Wang, Huanyu Wang, Elena Dubrova:
Far Field EM Side-Channel Attack on AES Using Deep Learning. ASHES@CCS 2020: 35-44 - [c9]Zequn Qin, Huanyu Wang, Xi Li:
Ultra Fast Structure-Aware Deep Lane Detection. ECCV (24) 2020: 276-291 - [c8]Huanyu Wang, Elena Dubrova:
Federated Learning in Side-Channel Analysis. ICISC 2020: 257-272 - [c7]Huanyu Wang, Elena Dubrova:
Tandem Deep Learning Side-Channel Attack Against FPGA Implementation of AES. iSES 2020: 147-150 - [c6]Huanyu Wang, Sebastian Forsmark, Martin Brisfors, Elena Dubrova:
Multi-Source Training Deep-Learning Side-Channel Attacks. ISMVL 2020: 58-63 - [i7]Zequn Qin, Huanyu Wang, Xi Li:
Ultra Fast Structure-aware Deep Lane Detection. CoRR abs/2004.11757 (2020) - [i6]Huanyu Wang, Zequn Qin, Xi Li:
Dynamic Routing with Path Diversity and Consistency for Compact Network Learning. CoRR abs/2005.14439 (2020) - [i5]Huanyu Wang, Elena Dubrova:
Tandem Deep Learning Side-Channel Attack Against FPGA Implementation of AES. IACR Cryptol. ePrint Arch. 2020: 373 (2020) - [i4]Huanyu Wang, Elena Dubrova:
Federated Learning in Side-Channel Analysis. IACR Cryptol. ePrint Arch. 2020: 902 (2020) - [i3]Ruize Wang, Huanyu Wang, Elena Dubrova:
Far Field EM Side-Channel Attack on AES Using Deep Learning. IACR Cryptol. ePrint Arch. 2020: 1096 (2020)
2010 – 2019
- 2019
- [j7]Bo Gu, Cheng Zhang, Huanyu Wang, Yang Yao, Xiaojun Tan:
Power Control for Cognitive M2M Communications Underlaying Cellular With Fairness Concerns. IEEE Access 7: 80789-80799 (2019) - [j6]Huanyu Wang, Qihang Shi, Domenic Forte, Mark M. Tehranipoor:
Probing Assessment Framework and Evaluation of Antiprobing Solutions. IEEE Trans. Very Large Scale Integr. Syst. 27(6): 1239-1252 (2019) - [c5]Huanyu Wang, Martin Brisfors, Sebastian Forsmark, Elena Dubrova:
How Diversity Affects Deep-Learning Side-Channel Attacks. NORCAS 2019: 1-7 - [i2]M. Tanjidur Rahman, M. Sazadur Rahman, Huanyu Wang, Shahin Tajik, Waleed Khalil, Farimah Farahmandi, Domenic Forte, Navid Asadizanjani, Mark M. Tehranipoor:
Defense-in-Depth: A Recipe for Logic Locking to Prevail. CoRR abs/1907.08863 (2019) - [i1]Huanyu Wang, Martin Brisfors, Sebastian Forsmark, Elena Dubrova:
How Diversity Affects Deep-Learning Side-Channel Attacks. IACR Cryptol. ePrint Arch. 2019: 664 (2019) - 2018
- [j5]Zhengyu Chen, Huanyu Wang, Geng Xie, Jie Gu:
A Comprehensive Stochastic Design Methodology for Hold-Timing Resiliency in Voltage-Scalable Design. IEEE Trans. Very Large Scale Integr. Syst. 26(10): 2118-2131 (2018) - [c4]Qihang Shi, Huanyu Wang, Navid Asadizanjani, Mark M. Tehranipoor, Domenic Forte:
A Comprehensive Analysis on Vulnerability of Active Shields to Tilted Microprobing Attacks. AsianHOST 2018: 98-103 - 2017
- [j4]Huanyu Wang, Domenic Forte, Mark M. Tehranipoor, Qihang Shi:
Probing Attacks on Integrated Circuits: Challenges and Research Opportunities. IEEE Des. Test 34(5): 63-71 (2017) - 2016
- [c3]Huanyu Wang, Geng Xie, Jie Gu:
Comprehensive Analysis, Modeling and Design for Hold-Timing Resiliency in Voltage Scalable Design. ISLPED 2016: 22-27 - 2014
- [j3]Jihua Wang, Huanyu Wang:
Product Design Ontology System Based on FBS-API. J. Comput. 9(3): 543-550 (2014) - 2013
- [j2]Bin Liu, Hao Hu, Huanyu Wang, Kaizhi Wang, Xingzhao Liu, Wenxian Yu:
Superpixel-Based Classification With an Adaptive Number of Classes for Polarimetric SAR Images. IEEE Trans. Geosci. Remote. Sens. 51(2): 907-924 (2013) - 2012
- [c2]Huanyu Wang, Zhiming Tan, Akihiro Higashi:
Detection and removal of adherent noises in video from a moving camera. SMC 2012: 2545-2550 - 2011
- [j1]Bin Liu, Huanyu Wang, Kaizhi Wang, Xingzhao Liu, Wenxian Yu:
A Foreground/Background Separation Framework for Interpreting Polarimetric SAR Images. IEEE Geosci. Remote. Sens. Lett. 8(2): 288-292 (2011) - [c1]Bin Liu, Huanyu Wang, Kaizhi Wang, Xingzhao Liu, Wenxian Yu:
Scene interpretation for SAR images using supervised topic models. IGARSS 2011: 3807-3810
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-13 23:53 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint