- Cryptographic Implementations and Security
- Chaos-based Image/Signal Encryption
- Physical Unclonable Functions (PUFs) and Hardware Security
- Coding theory and cryptography
- Advanced Malware Detection Techniques
- Security and Verification in Computing
- Digital Holography and Microscopy
- Network Security and Intrusion Detection
- Image Processing Techniques and Applications
- Adversarial Robustness in Machine Learning
- Advanced Optical Imaging Technologies
- VLSI and Analog Circuit Testing
- Integrated Circuits and Semiconductor Failure Analysis
- Image Retrieval and Classification Techniques
- Advanced Memory and Neural Computing
- Remote-Sensing Image Classification
- Anomaly Detection Techniques and Applications
- Advanced Image and Video Retrieval Techniques
- Electrostatic Discharge in Electronics
- DNA and Biological Computing
- Software System Performance and Reliability
- Wireless Sensor Networks and IoT
- Network Packet Processing and Optimization
- Orbital Angular Momentum in Optics
- Biometric Identification and Security
Wuhan University
2016-2025
Institute of Automation
2008-2025
Chinese Academy of Sciences
2025
State Grid Corporation of China (China)
2024
Tsinghua Sichuan Energy Internet Research Institute
2019-2022
State Key Laboratory of Cryptology
2018-2022
Zhejiang University
2009-2021
Zhejiang University of Science and Technology
2021
Shanghai Normal University
2018-2019
Tsinghua University
2019
Logic locking is a technique that has received significant attention. It protects hardware design netlist from variety of security threats, such as tampering, reverse-engineering, and piracy, stemming untrusted chip foundry end-users. This adds logic inputs to given make sure the locked functional only when key applied new inputs; an incorrect makes produce outputs. The inputs, referred are driven by tamper-proof memory on chip, which stores secret key. Research in this field shown...
With the emergence and proliferation of microarchitectural attacks targeting branch predictors, once-established security boundary in computer systems architectures is facing unprecedented challenges. This paper introduces an innovative predictor modeling methodology that abstractly characterizes 19 states 53 operations aiming to assist hardware designers addressing overlooked concerns during microarchitecture design phase. Building upon this discipline, we develop a symbolic execution-based...
Identifying the most influential nodes in spreading process complex networks is crucial many applications, such as accelerating diffusion of information and suppressing spread viruses or rumors. Existing methods for identifying spreaders have their limitations: classical network centrality rely solely on local global topology to predict node influence; traditional machine learning deep are not suitable graph-structured data; existing graph neural network-based neglect dynamic characteristics...
Existing Side-Channel Attacks (SCAs) have several limitations and, rather than to be real attack methods, can only considered security evaluation methods. Their are mainly related the sampling conditions, such as trigger signal embedded in source code of encryption device, and acquisition device that serves encryption-device controller. Apart from it being very difficult for an attacker add a into original design before making or control there is big gap capacity existing SCAs pose threats...
While side-channel attacks (SCAs) have become a significant threat to cryptographic algorithms, masking is considered as an effective countermeasure against SCAs. On the one hand, securely implementing scheme challenging and error-prone task. It essential detect leakage in complicated circuit. However, traditional method of detection always inaccuracy or time consumption. other deep learning-based power shown their without combining functions. Compared done under provable security framework,...
Though the traditional convolutional neural network has a high recognition rate in cloud classification, it poor robustness classification with occlusion. In this paper, we propose novel scheme for which networks are used feature extraction and weighted sparse representation coding is adopted classification. Three such algorithms proposed. Experiments carried out using multimodal ground-based dataset results show that case of occlusion, accuracy proposed methods can be much improved over...
In this research, a novel optical multiple-image encryption method based on angular-multiplexing holography, quick response (QR) code, and spiral phase keys is proposed. With method, images are transformed into QR codes subsequently encrypted series of holograms using an technique. The can only be decrypted when the hologram illuminated with duplicate reference beam correct fingerprint plate (SPP) keys. multiplexing performance key sensitivity SPP order were both analyzed, showing high...
LBS provide users with highly personalised information accessible by means of a variety mobile devices that are able to locate themselves. Nevertheless, the wide deployment can jeopardise privacy their users, so ensuring user is paramount success those services. This article focuses on finding new safe and efficient scheme prevent server or other in group from receive real user's personal info. In this scheme, we adopt ASGKA protocol build design cycle-like structure make member have status.
As the Internet of Things (IoT) continues to evolve, smartphones have become essential components IoT systems. However, with increasing amount personal information stored on smartphones, user privacy is at risk being compromised by malicious attackers. Although malware detection engines are commonly installed against these attacks, attacks that can evade defenses may still emerge. In this paper, we analyze return values system calls Android and find two never-disclosed vulnerable leak...
SUMMARY The recent cryptanalysis on block ciphers has two major trends. Side channel analysis (SCA) become a new threat to the hardware implementations of encryption algorithms. On other hand, reverse engineering been adopted explore unknown part algorithms, which target cryptanalysis. Some drawbacks have found in existing methods engineering, special structures or utilize flaws parts. disadvantage is that number rounds be analyzed limited, and complexity high. SCAs for depend leakage models...