Multi-leak deep-learning side-channel analysis F Hu, H Wang, J Wang IEEE Access 10, 22610-22621, 2022 | 20 | 2022 |
Cross subkey side channel analysis based on small samples F Hu, H Wang, J Wang Scientific Reports 12 (1), 6254, 2022 | 11 | 2022 |
Software implementation of aes-128: Cross-subkey side channel attack F Hu, J Wang, W Wang, F Ni Open Access Library Journal 9 (1), 1-15, 2022 | 7 | 2022 |
Cross-Subkey Deep-Learning Side-Channel Analysis. F Hu, H Wang, J Wang IACR Cryptol. ePrint Arch. 2021, 1328, 2021 | 5 | 2021 |
Software implementation of aes-128: Side channel attacks based on power traces decomposition F Hu, F Ni 2022 International Conference on Cyber Warfare and Security (ICCWS), 14-21, 2022 | 4 | 2022 |
SCA-CGAN: A New Side-Channel Attack Method for Imbalanced Small Samples W Wan, W Jun-Nian, H Fan-Liang, N Feng Radioengineering 32 (1), 124-135, 2023 | 3 | 2023 |
Side-Channel Attacks Based on Multi-Loss Regularized Denoising AutoEncoder F Hu, J Shen, P Vijayakumar IEEE Transactions on Information Forensics and Security 19, 2051 - 2065, 2023 | 2 | 2023 |
Deep-learning side-channel attack against STM32 implementation of AES F Hu, H Wang, J Wang 2021 International Conference on Computational Science and Computational …, 2021 | 2 | 2021 |
Side-channel attacks based on power trace decomposition F Hu, H Wang, J Wang Cryptology ePrint Archive, 2022 | 1 | 2022 |
DLSCA: Improving Cross-Device Side-Channel Analysis Using Device Discrepancy Correction F Hu, Y Li, H Tan, S Jiang, Z Xiao 2023 IEEE Smart World Congress (SWC), 1-8, 2023 | | 2023 |
Emna Baccour F Hu, F Ni, G Shah, H Akram, J Brickley, J Shamsi, KF Rafat, KA Qureshi, ... | | |
Software Implementation of AES-128 Side Channel Attacks Based on Power Traces F Hu, F Ni, KF Rafat, M Ahmed, A Qureshi, J Shamsi, M Marvi, MN Ahmed, ... | | |