Follow
Fanliang Hu
Title
Cited by
Cited by
Year
Multi-leak deep-learning side-channel analysis
F Hu, H Wang, J Wang
IEEE Access 10, 22610-22621, 2022
202022
Cross subkey side channel analysis based on small samples
F Hu, H Wang, J Wang
Scientific Reports 12 (1), 6254, 2022
112022
Software implementation of aes-128: Cross-subkey side channel attack
F Hu, J Wang, W Wang, F Ni
Open Access Library Journal 9 (1), 1-15, 2022
72022
Cross-Subkey Deep-Learning Side-Channel Analysis.
F Hu, H Wang, J Wang
IACR Cryptol. ePrint Arch. 2021, 1328, 2021
52021
Software implementation of aes-128: Side channel attacks based on power traces decomposition
F Hu, F Ni
2022 International Conference on Cyber Warfare and Security (ICCWS), 14-21, 2022
42022
SCA-CGAN: A New Side-Channel Attack Method for Imbalanced Small Samples
W Wan, W Jun-Nian, H Fan-Liang, N Feng
Radioengineering 32 (1), 124-135, 2023
32023
Side-Channel Attacks Based on Multi-Loss Regularized Denoising AutoEncoder
F Hu, J Shen, P Vijayakumar
IEEE Transactions on Information Forensics and Security 19, 2051 - 2065, 2023
22023
Deep-learning side-channel attack against STM32 implementation of AES
F Hu, H Wang, J Wang
2021 International Conference on Computational Science and Computational …, 2021
22021
Side-channel attacks based on power trace decomposition
F Hu, H Wang, J Wang
Cryptology ePrint Archive, 2022
12022
DLSCA: Improving Cross-Device Side-Channel Analysis Using Device Discrepancy Correction
F Hu, Y Li, H Tan, S Jiang, Z Xiao
2023 IEEE Smart World Congress (SWC), 1-8, 2023
2023
Emna Baccour
F Hu, F Ni, G Shah, H Akram, J Brickley, J Shamsi, KF Rafat, KA Qureshi, ...
Software Implementation of AES-128 Side Channel Attacks Based on Power Traces
F Hu, F Ni, KF Rafat, M Ahmed, A Qureshi, J Shamsi, M Marvi, MN Ahmed, ...
The system can't perform the operation now. Try again later.
Articles 1–12