Guozhen Liu

Orcid: 0000-0002-0556-6404

According to our database1, Guozhen Liu authored at least 22 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Engineering Strategies for Advancing Optical Signal Outputs in Smartphone-Enabled Point-of-Care Diagnostics.
Adv. Intell. Syst., June, 2023

Automatic Search of Linear Structure: Applications to Keccak and Ascon.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

2022
AlgSAT - a SAT Method for Search and Verification of Differential Characteristics from Algebraic Perspective.
IACR Cryptol. ePrint Arch., 2022

Exploring SAT for Cryptanalysis: (Quantum) Collision Attacks against 6-Round SHA-3.
IACR Cryptol. ePrint Arch., 2022

Rebound Attacks on SKINNY Hashing with Automatic Tools.
IACR Cryptol. ePrint Arch., 2022

Rebound Attacks on sfSKINNY Hashing with Automatic Tools.
Proceedings of the Network and System Security - 16th International Conference, 2022

2020
Detection of SQL injection based on artificial neural network.
Knowl. Based Syst., 2020

Practical Collision Attacks against Round-Reduced SHA-3.
J. Cryptol., 2020

2019
New Techniques for Searching Differential Trails in Keccak.
IACR Trans. Symmetric Cryptol., 2019

Interdigital sensing system for detection of levels of creatinine from the samples.
Proceedings of the 13th International Conference on Sensing Technology, 2019

Highly selective Molecularly Imprinted Polymer for creatinine detection.
Proceedings of the 13th International Conference on Sensing Technology, 2019

2018
Protecting lightweight block cipher implementation in mobile big data computing - A GPU-based approach.
Peer-to-Peer Netw. Appl., 2018

SQL Injection Behavior Mining Based Deep Learning.
Proceedings of the Advanced Data Mining and Applications - 14th International Conference, 2018

2017
Security Analysis of SKINNY under Related-Tweakey Settings (Long Paper).
IACR Trans. Symmetric Cryptol., 2017

Performance analysis of V-OFDM for acoustic communication along drill strings.
IET Commun., 2017

Optimized Password Recovery for SHA-512 on GPUs.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

2016
Security Analysis of SKINNY under Related-Tweakey Settings.
IACR Cryptol. ePrint Arch., 2016

2011
Poster: Distinguishing scientific abbreviations and genes in bio-medical literature mining.
Proceedings of the IEEE 1st International Conference on Computational Advances in Bio and Medical Sciences, 2011

2009
Human Tissue Classification: an In Silico Approach.
Proceedings of the International Conference on Bioinformatics & Computational Biology, 2009

gSpider: a New Tool for Data Integration and Visualization.
Proceedings of the International Conference on Bioinformatics & Computational Biology, 2009

2007
OCPAT: an online codon-preserved alignment tool for evolutionary genomic analysis of protein coding sequences.
Source Code Biol. Medicine, 2007

2006
A database and tool, IM Browser, for exploring and integrating emerging gene and protein interaction data for <i>Drosophila</i>.
BMC Bioinform., 2006


  Loading...