default search action
Yaoling Ding
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Shaofei Sun, Shijun Ding, An Wang, Yaoling Ding, Congming Wei, Liehuang Zhu, Yongjuan Wang:
An efficient heuristic power analysis framework based on hill-climbing algorithm. Inf. Sci. 662: 120226 (2024) - [j13]Meng Shen, Jing Wang, Hongyang Du, Dusit Niyato, Xiangyun Tang, Jiawen Kang, Yaoling Ding, Liehuang Zhu:
Secure Semantic Communications: Challenges, Approaches, and Opportunities. IEEE Netw. 38(4): 197-206 (2024) - [j12]Shaofei Sun, Hongwei Yu, An Wang, Congming Wei, Yaoling Ding, Liehuang Zhu, Jiazhe Chen:
Dual-Path Hybrid Residual Network for Profiled Side-Channel Analysis. IEEE Trans. Circuits Syst. II Express Briefs 71(8): 3985-3989 (2024) - [j11]Ziyu Wang, Yaoling Ding, An Wang, Yuwei Zhang, Congming Wei, Shaofei Sun, Liehuang Zhu:
SPA-GPT: General Pulse Tailor for Simple Power Analysis Based on Reinforcement Learning. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(4): 40-83 (2024) - [j10]Congming Wei, Guangze Hong, An Wang, Jing Wang, Shaofei Sun, Yaoling Ding, Liehuang Zhu, Wenrui Ma:
Time Is Not Enough: Timing Leakage Analysis on Cryptographic Chips via Plaintext-Ciphertext Correlation in Non-Timing Channel. IEEE Trans. Inf. Forensics Secur. 19: 8544-8558 (2024) - [c6]Xue Yang, Congming Wei, Yaoling Ding, Shaofei Sun, An Wang, Jiazhe Chen:
A Command-Activated Hardware Trojan Detection Method Based on LUNAR Framework. ACNS Workshops (1) 2024: 340-358 - [i6]Annv Liu, An Wang, Shaofei Sun, Congming Wei, Yaoling Ding, Yongjuan Wang, Liehuang Zhu:
CL-SCA: Leveraging Contrastive Learning for Profiled Side-Channel Analysis. IACR Cryptol. ePrint Arch. 2024: 49 (2024) - [i5]Congming Wei, Guangze Hong, An Wang, Jing Wang, Shaofei Sun, Yaoling Ding, Liehuang Zhu, Wenrui Ma:
Time is not enough: Timing Leakage Analysis on Cryptographic Chips via Plaintext-Ciphertext Correlation in Non-timing Channel. IACR Cryptol. ePrint Arch. 2024: 1168 (2024) - 2023
- [i4]Ziyu Wang, Yaoling Ding, An Wang, Yuwei Zhang, Congming Wei, Shaofei Sun, Liehuang Zhu:
SPA-GPT: General Pulse Tailor for Simple Power Analysis Based on Reinforcement Learning. IACR Cryptol. ePrint Arch. 2023: 1625 (2023) - 2022
- [j9]Xin Liu, An Wang, Liehuang Zhu, Yaoling Ding, Zeyuan Lyu, Zongyue Wang:
SCARE and power attack on AES-like block ciphers with secret S-box. Frontiers Comput. Sci. 16(4): 164814 (2022) - [j8]Keke Gai, Yaoling Ding, An Wang, Liehuang Zhu, Kim-Kwang Raymond Choo, Qi Zhang, Zhuping Wang:
Attacking the Edge-of-Things: A Physical Attack Perspective. IEEE Internet Things J. 9(7): 5240-5253 (2022) - [c5]Shijun Ding, An Wang, Shaofei Sun, Yaoling Ding, Xintian Hou, Dong Han:
Correlation Power Analysis and Protected Implementation on Lightweight Block Cipher FESH. BigDataSecurity/HPSC/IDS 2022: 29-34 - [c4]Qi Lei, Zijia Yang, Qin Wang, Yaoling Ding, Zhe Ma, An Wang:
Autoencoder Assist: An Efficient Profiling Attack on High-Dimensional Datasets. ICICS 2022: 324-341 - [c3]An Wang, Shulin He, Congming Wei, Shaofei Sun, Yaoling Ding, Jiayao Wang:
Using Convolutional Neural Network to Redress Outliers in Clustering Based Side-Channel Analysis on Cryptosystem. SmartCom 2022: 360-370 - 2021
- [j7]An Wang, Yuan Li, Yaoling Ding, Liehuang Zhu, Yongjuan Wang:
Efficient Framework for Genetic Algorithm-Based Correlation Power Analysis. IEEE Trans. Inf. Forensics Secur. 16: 4882-4894 (2021) - [j6]Yaoling Ding, Liehuang Zhu, An Wang, Yuan Li, Yongjuan Wang, Siu Ming Yiu, Keke Gai:
A Multiple Sieve Approach Based on Artificial Intelligent Techniques and Correlation Power Analysis. ACM Trans. Multim. Comput. Commun. Appl. 17(2s): 71:1-71:21 (2021) - [c2]Zhixuan Gao, Shuang Wang, Yaoling Ding, An Wang, Qingjun Yuan:
Correlation Power Analysis and Protected Implementation on Block Cipher RainDrop. FCS 2021: 308-323 - [i3]An Wang, Yuan Li, Yaoling Ding, Liehuang Zhu, Yongjuan Wang:
Efficient Framework for Genetic-Algorithm-Based Correlation Power Analysis. IACR Cryptol. ePrint Arch. 2021: 179 (2021) - [i2]Qi Lei, Zijia Yang, Qin Wang, Yaoling Ding, Zhe Ma, An Wang:
Autoencoder Assist: An Efficient Profiling Attack on High-dimensional Datasets. IACR Cryptol. ePrint Arch. 2021: 1418 (2021) - 2020
- [j5]Yaoling Ding, Ying Shi, An Wang, Yongjuan Wang, Guoshuang Zhang:
Block-oriented correlation power analysis with bitwise linear leakage: An artificial intelligence approach based on genetic algorithms. Future Gener. Comput. Syst. 106: 34-42 (2020) - [j4]Ning Shang, An Wang, Yaoling Ding, Keke Gai, Liehuang Zhu, Guoshuang Zhang:
A machine learning based golden-free detection method for command-activated hardware Trojan. Inf. Sci. 540: 292-307 (2020)
2010 – 2019
- 2019
- [j3]Yaoling Ding, Ying Shi, An Wang, Xuexin Zheng, Zongyue Wang, Guoshuang Zhang:
Adaptive Chosen-Plaintext Collision Attack on Masked AES in Edge Computing. IEEE Access 7: 63217-63229 (2019) - [i1]Yaoling Ding, An Wang, Siu-Ming Yiu:
An Intelligent Multiple Sieve Method Based on Genetic Algorithm and Correlation Power Analysis. IACR Cryptol. ePrint Arch. 2019: 189 (2019) - 2018
- [j2]Yaoling Ding, Xiaoyun Wang, Ning Wang, Wei Wang:
Improved automatic search of impossible differentials for camellia with FL/FL -1 layers. Sci. China Inf. Sci. 61(3): 038103:1-038103:3 (2018) - [j1]Zhihui Chu, Huaifeng Chen, Xiaoyun Wang, Lu Li, Xiaoyang Dong, Yaoling Ding, Yonglin Hao:
Improved integral attacks without full codebook. IET Inf. Secur. 12(6): 513-520 (2018) - 2012
- [c1]An Wang, Man Chen, Zongyue Wang, Yaoling Ding:
Overcoming Significant Noise: Correlation-Template-Induction Attack. ISPEC 2012: 393-404
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 19:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint