Junwei Wang

ORCID: 0000-0002-8478-5065
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptographic Implementations and Security
  • Advanced Malware Detection Techniques
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Chaos-based Image/Signal Encryption
  • Natural Language Processing Techniques
  • Topic Modeling
  • Chinese history and philosophy
  • Quantum Mechanics and Applications
  • Security and Verification in Computing
  • Quantum Information and Cryptography
  • Advanced Computational Techniques and Applications
  • Service-Oriented Architecture and Web Services
  • Quantum Computing Algorithms and Architecture
  • Software Engineering Research
  • Solar Radiation and Photovoltaics
  • Meteorological Phenomena and Simulations
  • Target Tracking and Data Fusion in Sensor Networks
  • Spam and Phishing Detection
  • Advanced Computing and Algorithms
  • GNSS positioning and interference
  • Network Security and Intrusion Detection
  • Air Quality Monitoring and Forecasting
  • Sentiment Analysis and Opinion Mining
  • Inertial Sensor and Navigation
  • Digital Marketing and Social Media

Southeast University
2022

Chaoyang University of Technology
2018-2021

CryptoExperts (France)
2018-2020

University of Luxembourg
2015-2020

Université Paris 8
2019-2020

Institute for Information Industry
2018

Shandong University
2004-2015

Weihai Science and Technology Bureau
2004

White-box cryptography is the last security barrier for a cryptographic software implementation deployed in an untrusted environment. The principle of internal encodings commonly used white-box technique to protect block cipher implementations. It consists representing as network look-up tables which are then encoded using randomly generated bijections (the encodings). When this approach implemented based on nibble (i.e. 4-bit wide) encodings, protected has been shown be vulnerable...

10.46586/tches.v2019.i2.225-255 article EN cc-by IACR Transactions on Cryptographic Hardware and Embedded Systems 2019-02-28

Quantum key distribution (QKD) is theoretically secure using the principle of quantum mechanics; therefore, QKD a promising solution for future communication. Although several experimental demonstrations have been reported, they not considered polarization-dependent loss in state preparation key-rate estimation. In this study, we experimentally characterized realistic state-preparation devices and verified that considerable exists fiber- silicon-based polarization modulators. Hence, security...

10.1103/physreva.105.012421 article EN Physical review. A/Physical review, A 2022-01-24

The goal of white-box cryptography is to protect secret keys embedded in a cryptographic software deployed an untrusted environment. In this article, we revisit state-of-the-art countermeasures employed cryptography, and discuss possible ways combine them. Then analyze the different gray-box attack paths study their performances terms required traces computation time. Afterward, propose new paradigm for against which exploits data-dependency target implementation. We demonstrate that our...

10.46586/tches.v2020.i3.454-482 article EN cc-by IACR Transactions on Cryptographic Hardware and Embedded Systems 2020-06-19

White-box cryptography is the last security barrier for a cryptographic software implementation deployed in an untrusted environment. The principle of internal encodings commonly used white-box technique to protect block cipher implementations. It consists representing as network look-up tables which are then encoded using randomly generated bijections (the encodings). When this approach implemented based on nibble (i.e. 4-bit wide) encodings, protected has been shown be vulnerable...

10.13154/tches.v2019.i2.225-255 article EN DOAJ (DOAJ: Directory of Open Access Journals) 2019-02-01

Before purchasing a product online, customers often read the reviews posted by people who also brought product. Customer provide opinions and relevant information such as comparisons among similar products or usage experiences about Previous studies addressed on prediction of helpfulness customer to predict voting results. However, result an online review is not constant over time; predicting based analysis text practical. Therefore, we collect results same time, observe whether number votes...

10.1145/3341161.3344825 article EN 2019-08-27

Code generation, as a very hot application area of deep learning models for text, consists two different fields: code-to-code and text-to-code. A recent approach, GraphCodeBERT uses code graph, which is called data flow, showed good performance improvement. The base model architecture it bidirectional encoder representations from transformers (BERT), the part transformer. On other hand, generative pre-trained transformer (GPT)—another multiple architecture—uses decoder shows great in...

10.3390/electronics10212706 article EN Electronics 2021-11-05

The outlier measurement affects the accurate estimation effect of tightly coupled global navigation satellite system (GNSS) and strapdown inertial (SINS) integrated parameters under GNSS-challenged environment. To improve convergence speed robustness nonlinear filter used in GNSS/INS environment, an iterated cubature Kalman (CKF) based on improved robust method is proposed. Firstly, mind least squares regression included into CKF framework, multiple iterations are to error compensation...

10.1109/iccais56082.2022.9990513 article EN 2022 11th International Conference on Control, Automation and Information Sciences (ICCAIS) 2022-11-21

This paper reports how we build a Chinese Grammatical Error Diagnosis system in the NLPTEA-2018 CGED shared task. In 2018, sent three runs with different approaches. The first one is pattern-based approach by frequent error pattern matching. second sequential labelling conditional random fields (CRF). third rewriting sequence to (seq2seq) model. approaches have properties that aim optimize performance metrics and formal run results show differences as expected.

10.18653/v1/w18-3729 article EN cc-by 2018-01-01

In order to meet the requirements of integrated management electronic lock with high security and convenience in application scenarios such as data center network cabinet, a control system based on biometric technology is designed, which integrates lock, controller, collector platform. Platform used for integration. By constructing dual MCU ESP32-C3FH4 controller CH32V307VCT6, integrating into adopts modular design different functional requirements. The lock-control realizes face fingerprint...

10.1109/icdsca59871.2023.10393429 article EN 2023-10-27
Coming Soon ...