Ming Tang

ORCID: 0000-0003-2218-0164
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptographic Implementations and Security
  • Chaos-based Image/Signal Encryption
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Coding theory and cryptography
  • Advanced Malware Detection Techniques
  • Security and Verification in Computing
  • Digital Holography and Microscopy
  • Network Security and Intrusion Detection
  • Image Processing Techniques and Applications
  • Adversarial Robustness in Machine Learning
  • Advanced Optical Imaging Technologies
  • VLSI and Analog Circuit Testing
  • Integrated Circuits and Semiconductor Failure Analysis
  • Image Retrieval and Classification Techniques
  • Advanced Memory and Neural Computing
  • Remote-Sensing Image Classification
  • Anomaly Detection Techniques and Applications
  • Advanced Image and Video Retrieval Techniques
  • Electrostatic Discharge in Electronics
  • DNA and Biological Computing
  • Software System Performance and Reliability
  • Wireless Sensor Networks and IoT
  • Network Packet Processing and Optimization
  • Orbital Angular Momentum in Optics
  • Biometric Identification and Security

Wuhan University
2016-2025

Institute of Automation
2008-2025

Chinese Academy of Sciences
2025

State Grid Corporation of China (China)
2024

Tsinghua Sichuan Energy Internet Research Institute
2019-2022

State Key Laboratory of Cryptology
2018-2022

Zhejiang University
2009-2021

Zhejiang University of Science and Technology
2021

Shanghai Normal University
2018-2019

Tsinghua University
2019

Logic locking is a technique that has received significant attention. It protects hardware design netlist from variety of security threats, such as tampering, reverse-engineering, and piracy, stemming untrusted chip foundry end-users. This adds logic inputs to given make sure the locked functional only when key applied new inputs; an incorrect makes produce outputs. The inputs, referred are driven by tamper-proof memory on chip, which stores secret key. Research in this field shown...

10.1109/tifs.2019.2904838 article EN IEEE Transactions on Information Forensics and Security 2019-03-13

With the emergence and proliferation of microarchitectural attacks targeting branch predictors, once-established security boundary in computer systems architectures is facing unprecedented challenges. This paper introduces an innovative predictor modeling methodology that abstractly characterizes 19 states 53 operations aiming to assist hardware designers addressing overlooked concerns during microarchitecture design phase. Building upon this discipline, we develop a symbolic execution-based...

10.1145/3711923 article EN ACM Transactions on Architecture and Code Optimization 2025-01-13

10.1109/icassp49660.2025.10887911 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2025-03-12

Identifying the most influential nodes in spreading process complex networks is crucial many applications, such as accelerating diffusion of information and suppressing spread viruses or rumors. Existing methods for identifying spreaders have their limitations: classical network centrality rely solely on local global topology to predict node influence; traditional machine learning deep are not suitable graph-structured data; existing graph neural network-based neglect dynamic characteristics...

10.7498/aps.74.20250179 article EN Acta Physica Sinica 2025-01-01

Existing Side-Channel Attacks (SCAs) have several limitations and, rather than to be real attack methods, can only considered security evaluation methods. Their are mainly related the sampling conditions, such as trigger signal embedded in source code of encryption device, and acquisition device that serves encryption-device controller. Apart from it being very difficult for an attacker add a into original design before making or control there is big gap capacity existing SCAs pose threats...

10.26599/tst.2018.9010047 article EN Tsinghua Science & Technology 2018-09-17

While side-channel attacks (SCAs) have become a significant threat to cryptographic algorithms, masking is considered as an effective countermeasure against SCAs. On the one hand, securely implementing scheme challenging and error-prone task. It essential detect leakage in complicated circuit. However, traditional method of detection always inaccuracy or time consumption. other deep learning-based power shown their without combining functions. Compared done under provable security framework,...

10.1109/tifs.2024.3350375 article EN IEEE Transactions on Information Forensics and Security 2024-01-01

10.1109/cvpr52733.2024.02167 article EN 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2024-06-16

Though the traditional convolutional neural network has a high recognition rate in cloud classification, it poor robustness classification with occlusion. In this paper, we propose novel scheme for which networks are used feature extraction and weighted sparse representation coding is adopted classification. Three such algorithms proposed. Experiments carried out using multimodal ground-based dataset results show that case of occlusion, accuracy proposed methods can be much improved over...

10.3390/atmos12080999 article EN cc-by Atmosphere 2021-08-03

In this research, a novel optical multiple-image encryption method based on angular-multiplexing holography, quick response (QR) code, and spiral phase keys is proposed. With method, images are transformed into QR codes subsequently encrypted series of holograms using an technique. The can only be decrypted when the hologram illuminated with duplicate reference beam correct fingerprint plate (SPP) keys. multiplexing performance key sensitivity SPP order were both analyzed, showing high...

10.1364/ao.58.0000g6 article EN Applied Optics 2019-08-28

LBS provide users with highly personalised information accessible by means of a variety mobile devices that are able to locate themselves. Nevertheless, the wide deployment can jeopardise privacy their users, so ensuring user is paramount success those services. This article focuses on finding new safe and efficient scheme prevent server or other in group from receive real user's personal info. In this scheme, we adopt ASGKA protocol build design cycle-like structure make member have status.

10.1109/wicom.2009.5302250 article EN 2009-09-01

As the Internet of Things (IoT) continues to evolve, smartphones have become essential components IoT systems. However, with increasing amount personal information stored on smartphones, user privacy is at risk being compromised by malicious attackers. Although malware detection engines are commonly installed against these attacks, attacks that can evade defenses may still emerge. In this paper, we analyze return values system calls Android and find two never-disclosed vulnerable leak...

10.1109/jiot.2023.3298992 article EN IEEE Internet of Things Journal 2023-07-26

SUMMARY The recent cryptanalysis on block ciphers has two major trends. Side channel analysis (SCA) become a new threat to the hardware implementations of encryption algorithms. On other hand, reverse engineering been adopted explore unknown part algorithms, which target cryptanalysis. Some drawbacks have found in existing methods engineering, special structures or utilize flaws parts. disadvantage is that number rounds be analyzed limited, and complexity high. SCAs for depend leakage models...

10.1002/cpe.3068 article EN Concurrency and Computation Practice and Experience 2013-06-20
Coming Soon ...