- Cryptographic Implementations and Security
- Advanced Malware Detection Techniques
- Physical Unclonable Functions (PUFs) and Hardware Security
- Chaos-based Image/Signal Encryption
- Natural Language Processing Techniques
- Topic Modeling
- Chinese history and philosophy
- Quantum Mechanics and Applications
- Security and Verification in Computing
- Quantum Information and Cryptography
- Advanced Computational Techniques and Applications
- Service-Oriented Architecture and Web Services
- Quantum Computing Algorithms and Architecture
- Software Engineering Research
- Solar Radiation and Photovoltaics
- Meteorological Phenomena and Simulations
- Target Tracking and Data Fusion in Sensor Networks
- Spam and Phishing Detection
- Advanced Computing and Algorithms
- GNSS positioning and interference
- Network Security and Intrusion Detection
- Air Quality Monitoring and Forecasting
- Sentiment Analysis and Opinion Mining
- Inertial Sensor and Navigation
- Digital Marketing and Social Media
Southeast University
2022
Chaoyang University of Technology
2018-2021
CryptoExperts (France)
2018-2020
University of Luxembourg
2015-2020
Université Paris 8
2019-2020
Institute for Information Industry
2018
Shandong University
2004-2015
Weihai Science and Technology Bureau
2004
White-box cryptography is the last security barrier for a cryptographic software implementation deployed in an untrusted environment. The principle of internal encodings commonly used white-box technique to protect block cipher implementations. It consists representing as network look-up tables which are then encoded using randomly generated bijections (the encodings). When this approach implemented based on nibble (i.e. 4-bit wide) encodings, protected has been shown be vulnerable...
Quantum key distribution (QKD) is theoretically secure using the principle of quantum mechanics; therefore, QKD a promising solution for future communication. Although several experimental demonstrations have been reported, they not considered polarization-dependent loss in state preparation key-rate estimation. In this study, we experimentally characterized realistic state-preparation devices and verified that considerable exists fiber- silicon-based polarization modulators. Hence, security...
The goal of white-box cryptography is to protect secret keys embedded in a cryptographic software deployed an untrusted environment. In this article, we revisit state-of-the-art countermeasures employed cryptography, and discuss possible ways combine them. Then analyze the different gray-box attack paths study their performances terms required traces computation time. Afterward, propose new paradigm for against which exploits data-dependency target implementation. We demonstrate that our...
White-box cryptography is the last security barrier for a cryptographic software implementation deployed in an untrusted environment. The principle of internal encodings commonly used white-box technique to protect block cipher implementations. It consists representing as network look-up tables which are then encoded using randomly generated bijections (the encodings). When this approach implemented based on nibble (i.e. 4-bit wide) encodings, protected has been shown be vulnerable...
Before purchasing a product online, customers often read the reviews posted by people who also brought product. Customer provide opinions and relevant information such as comparisons among similar products or usage experiences about Previous studies addressed on prediction of helpfulness customer to predict voting results. However, result an online review is not constant over time; predicting based analysis text practical. Therefore, we collect results same time, observe whether number votes...
Code generation, as a very hot application area of deep learning models for text, consists two different fields: code-to-code and text-to-code. A recent approach, GraphCodeBERT uses code graph, which is called data flow, showed good performance improvement. The base model architecture it bidirectional encoder representations from transformers (BERT), the part transformer. On other hand, generative pre-trained transformer (GPT)—another multiple architecture—uses decoder shows great in...
The outlier measurement affects the accurate estimation effect of tightly coupled global navigation satellite system (GNSS) and strapdown inertial (SINS) integrated parameters under GNSS-challenged environment. To improve convergence speed robustness nonlinear filter used in GNSS/INS environment, an iterated cubature Kalman (CKF) based on improved robust method is proposed. Firstly, mind least squares regression included into CKF framework, multiple iterations are to error compensation...
This paper reports how we build a Chinese Grammatical Error Diagnosis system in the NLPTEA-2018 CGED shared task. In 2018, sent three runs with different approaches. The first one is pattern-based approach by frequent error pattern matching. second sequential labelling conditional random fields (CRF). third rewriting sequence to (seq2seq) model. approaches have properties that aim optimize performance metrics and formal run results show differences as expected.
In order to meet the requirements of integrated management electronic lock with high security and convenience in application scenarios such as data center network cabinet, a control system based on biometric technology is designed, which integrates lock, controller, collector platform. Platform used for integration. By constructing dual MCU ESP32-C3FH4 controller CH32V307VCT6, integrating into adopts modular design different functional requirements. The lock-control realizes face fingerprint...