Chi Cheng

This page is a disambiguation page, it actually contains multiple papers from persons of the same or a similar name.

Bibliography

2026
A Physics-Informed Deep Learning Method for Quantitative Evaluation of Artificial Precipitation Enhancement Effects.
Int. J. Intell. Syst., 2026

2025
Hybrid generative adversarial network based on frequency and spatial domain for histopathological image synthesis.
BMC Bioinform., December, 2025

LinguaFluid: Language Guided Fluid Control via Semantic Rewards in Reinforcement Learning.
CoRR, August, 2025

An Efficient and Reconfigurable Post-Quantum Crypto-Processor for SPHINCS+.
IEEE Trans. Circuits Syst. I Regul. Pap., May, 2025

CatPoison: Category-Oriented Knowledge Poisoning Attacks in Retrieval-Augmented Generation Systems.
Proceedings of the 24th IEEE International Conference on Trust, 2025

Multi-Scale Attention Prediction and Multi-Path Fusion Attention For Compressed Video Quality Enhancement.
Proceedings of the 7th ACM International Conference on Multimedia in Asia, 2025

Grafted Trees Bear Better Fruit: An Improved Multiple-Valued Plaintext-Checking Side-Channel Attack Against Kyber.
Proceedings of the Design, Automation & Test in Europe Conference, 2025

A Novel Checking Scheme for Parallel Key Recovery Side-Channel Attack Against Kyber.
Proceedings of the Information Security and Cryptology - 21st International Conference, 2025

2024
Hints from Hertz: Dynamic Frequency Scaling Side-Channel Analysis of Number Theoretic Transform in Lattice-Based KEMs.
IACR Cryptol. ePrint Arch., 2024

An Improved Practical Key Mismatch Attack Against NTRU.
Proceedings of the Post-Quantum Cryptography - 15th International Workshop, 2024

An Efficient and Configurable Hardware Architecture of Polynomial Modular Operation for CRYSTALS-Kyber and Dilithium.
Proceedings of the 67th IEEE International Midwest Symposium on Circuits and Systems, 2024

Enhancing Portability in Deep Learning-Based Side-Channel Attacks Against Kyber.
Proceedings of the Information Security Practice and Experience, 2024

2022
Revisiting group oriented secret sharing schemes.
Inf. Sci., 2022

Find the Bad Apples: An efficient method for perfect key recovery under imperfect SCA oracles â€" A case study of Kyber.
IACR Cryptol. ePrint Arch., 2022

Light the Signal: Optimization of Signal Leakage Attacks Against LWE-Based Key Exchange.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
Small Leaks Sink a Great Ship: An Evaluation of Key Reuse Resilience of PQC Third Round Finalist NTRU-HRSS.
IACR Cryptol. ePrint Arch., 2021

A Systematic Approach and Analysis of Key Mismatch Attacks on CPA-Secure Lattice-Based NIST Candidate KEMs.
IACR Cryptol. ePrint Arch., 2021

Small Leaks Sink a Great Ship: An Evaluation of Key Reuse Resilience of PQC Third Round Finalist NTRU-HRSS.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

Multi-Objective Optimization of Feature Selection Procedure for Human Activity Recognition.
Proceedings of the ICAIIS 2021: 2021 2nd International Conference on Artificial Intelligence and Information Systems, Chongqing, China, May 28, 2021

A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
Research on the Thermal-Electric Coupling Behavior Under Compound AC-DC Voltage Within Saddle-Like Electric-Stress Dependence.
IEEE Access, 2020

2019
An Efficient Key Mismatch Attack on the NIST Second Round Candidate Kyber.
IACR Cryptol. ePrint Arch., 2019

A Simple Key Reuse Attack on LWE and Ring LWE Encryption Schemes as Key Encapsulation Mechanisms (KEMs).
IACR Cryptol. ePrint Arch., 2019

NSIIC: A Novel Framework for Nodes' Smart Connection Oriented to Collaborative IoT.
Proceedings of the ICIT 2019, 2019

A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHope.
Proceedings of the Computer Security - ESORICS 2019, 2019

2016
Anchor-Aided Joint Localization and Synchronization Using SOOP: Theory and Experiments.
IEEE Trans. Wirel. Commun., 2016

F2AC: A Lightweight, Fine-Grained, and Flexible Access Control Scheme for File Storage in Mobile Cloud Computing.
Mob. Inf. Syst., 2016

2015
Localization of a moving non-cooperative RF target in NLOS environment using RSS and AOA measurements.
Proceedings of the 2015 IEEE International Conference on Acoustics, 2015

2014
Physical-layer secret key generation with untrusted relays.
Proceedings of the 2014 IEEE GLOBECOM Workshops, Austin, TX, USA, December 8-12, 2014, 2014

2012
Extreme learning machines for intrusion detection.
Proceedings of the 2012 International Joint Conference on Neural Networks (IJCNN), 2012

1994
Performance analysis of MUSIC and Pencil-MUSIC algorithms for diversely-polarized array.
Proceedings of ICASSP '94: IEEE International Conference on Acoustics, 1994


  Loading...