Chenyang Tu

ORCID: 0000-0003-2130-0531
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Cryptographic Implementations and Security
  • Luminescence Properties of Advanced Materials
  • Topic Modeling
  • Security and Verification in Computing
  • Chaos-based Image/Signal Encryption
  • Advanced Graph Neural Networks
  • Recommender Systems and Techniques
  • Coding theory and cryptography
  • Multimodal Machine Learning Applications
  • Solid State Laser Technologies
  • High-pressure geophysics and materials
  • Advanced Malware Detection Techniques
  • Human Mobility and Location-Based Analysis
  • Complex Network Analysis Techniques
  • Advanced Condensed Matter Physics
  • Domain Adaptation and Few-Shot Learning
  • Crystal Structures and Properties
  • Perovskite Materials and Applications
  • Video Analysis and Summarization
  • Enzyme Structure and Function
  • Inorganic Fluorides and Related Compounds
  • X-ray Diffraction in Crystallography
  • User Authentication and Security Systems
  • Advanced Fiber Laser Technologies

Institute of Information Engineering
2015-2024

Chinese Academy of Sciences
2010-2024

Shanghai Electric (China)
2024

Zhejiang University
2021

State Key Laboratory of Information Security
2020

Data Assurance and Communication Security
2016-2019

Zhejiang Sci-Tech University
2018

Fujian Institute of Research on the Structure of Matter
1991-2017

University of Chinese Academy of Sciences
2016

Ca' Foscari University of Venice
2014

The electronic band-structure and band-gap dependence on the $d$ character of ${A}^{2+}$ cation in $A$WO${}_{4}$ wolframite-type oxides is investigated for different compounds ($A$ $=$ Mg, Zn, Cd, Mn) by means optical-absorption spectroscopy first-principles density-functional calculations. High pressure used to tune their properties up 10 GPa changing bonding distances establishing structural correlations. effect unfilled levels found produce changes nature band gap as well its without...

10.1103/physrevb.86.125202 article EN Physical Review B 2012-09-12

The room-temperature Raman scattering was measured in ${\text{ZnWO}}_{4}$ up to 45 GPa. We report the pressure dependence of all Raman-active phonons low-pressure wolframite phase. As increases additional peaks appear at 30.6 GPa due onset a reversible structural phase transition distorted monoclinic $\ensuremath{\beta}$-fergusonite-type and high-pressure phases coexist from 36.5 In addition measurements we also ab initio total-energy lattice-dynamics calculations for two phases. These...

10.1103/physrevb.78.054116 article EN Physical Review B 2008-08-20

We study the effects of pressure on structural, vibrational, and magnetic behavior cuproscheelite. performed powder x-ray diffraction Raman spectroscopy experiments up to 27 GPa as well ab initio total-energy lattice-dynamics calculations. Experiments provide evidence that a structural phase transition takes place at 10 from low-pressure triclinic $(P\overline{1})$ monoclinic wolframite-type structure $(P2/c)$. Calculations confirmed this finding indicate transformation involves change in...

10.1103/physrevb.81.224115 article EN Physical Review B 2010-06-25

Abstract Copper tungstate (CuWO4) crystals grown by the top-seeded solution growth method were characterized X-ray diffraction, Raman scattering, and optical measurements. CuWO4 has a triclinic structure (P 1¯) with = 4.709 Å, b 5.845 c 4.884 α 88.3°, β 92.5°, γ 97.2°. It consists of corner-linked CuO6 WO6 octahedra, former having pseudo-tetragonally elongated geometry caused Cu2+ Jahn–Teller effect. Fifteen out eighteen modes are reported, discussed, compared those other tungstates. We also...

10.1080/08957950802446643 article EN High Pressure Research 2008-12-01

In this work, we have investigated the structural behavior of cuproscheelite up to 33.9 GPa by means high-pressure single-crystal X-ray diffraction (SXRD) and extended absorption fine structure (EXAFS). According EXAFS, beyond 9 a phase transition takes place. On basis SXRD, is from triclinic (P1̅) monoclinic (P2/c) isotypic wolframite. The implies abrupt changes CuO6 WO6 octahedra, but no coordination change. Further, report role played Jahn–Teller distortion octahedra on mechanism as well...

10.1021/cm201592h article EN Chemistry of Materials 2011-08-31

While Retrieval-Augmented Generation (RAG) systems enhance Large Language Models (LLMs) by incorporating external knowledge, they still face persistent challenges in retrieval inefficiency and the inability of LLMs to filter out irrelevant information. We present ParetoRAG, an unsupervised framework that optimizes RAG through sentence-level refinement guided Pareto principle. By decomposing paragraphs into sentences dynamically re-weighting core content while preserving contextual coherence,...

10.48550/arxiv.2502.08178 preprint EN arXiv (Cornell University) 2025-02-12

Since gait is hard to imitate and can be easily collected by smartphone inertial sensors, it applied user authentication. Traditional neural network based methods tend train feature extractor classifier together for each in These are difficult guarantee that the designed specific users suitable other users. The accuracy low when sample size of a legitimate small, time overhead heavy total amount large. Besides, there often strong constraints on sensor position, walking route, speed external...

10.1109/cscwd54268.2022.9776313 article EN 2022 IEEE 25th International Conference on Computer Supported Cooperative Work in Design (CSCWD) 2022-05-04

Traditional recommendation methods aim to recom-mend personalized items by analyzing user's history interaction data. They ignore the fact that data follows a long-tail distribution, which means small number of popular account for most records. This phenomenon causes model recommend more items, resulting in severe popularity bias. In order pay attention and debias bias, we propose Bilateral-Branch Graph Neural Network(BiGNN). long- tail branch, construct separate sub graph eliminating with...

10.1109/ictai56018.2022.00129 article EN 2022-10-01

We have achieved a dual-frequency passively Q-switched Yb3+:GdAl3(BO3)4 solid-state laser at 1042.6 and 1045.0 nm, in which suppressing wavelength time-jittering building pulses both took advantage of the nonlinear loss black phosphorus prepared by liquid phase exfoliation. It shows good frequency stabilization effect (BP) saturable absorber. A 355 ns pulse with energy 0.889 µJ was achieved. This work validates capability BP to convert nonstable multi-wavelength emission into certain stable...

10.1088/1612-202x/aa6c7e article EN Laser Physics Letters 2017-04-25

In the face of rising dangers to internal network due remote cooperation, VPN gateways are an important tool for organisational administrators, and appropriate execution gateway functions is a vital component in safeguarding network. The confronts security risks from underlying cryptographic algorithm library, current operating system, central processor as number attackers grows attack methods evolve. this paper, we propose pure hardware logic address threats CPU by independently...

10.1109/cscwd57460.2023.10152666 article EN 2023-05-24

Since the master key length becomes longer and in ciphers, an adversary often needs to preform multi-round side channel analysis (SCA) order recover by enough round keys. Traditional SCA is launched adaptive manner practice, which means that input of each calculated on-the-fly way based on all keys anterior rounds. However, compared classical single-round SCA, severely limited several practical scenarios, because rounds must be properly recovered before attack against next round. In this...

10.1109/tifs.2019.2959910 article EN IEEE Transactions on Information Forensics and Security 2019-12-17

With the popularity of smart devices such as mobile phones and tablets, security problem widely used ARMv8-A processor has received more attention. Flush+Reload Flush+Flush cache attacks have become two most important threats due to their low noise high resolution. In order resist attacks, researchers proposed many defense methods. However, these existing methods various shortcomings. The runtime using hardware performance counters cannot detect fast enough, effectively or avoid a false...

10.1109/apsec48747.2019.00062 article EN 2019-12-01
Coming Soon ...