Huiyun Li

According to our database1, Huiyun Li authored at least 43 papers between 2001 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
An Error Location and Correction Method for Memory Based on Data Similarity Analysis.
IEEE Trans. VLSI Syst., 2019

Detecting Fault Injection Attacks Based on Compressed Sensing and Integer Linear Programming.
IEEE Trans. Dependable Sec. Comput., 2019

Regressive Scale Estimation for Visual Tracking.
Proceedings of the IEEE International Conference on Industrial Technology, 2019

2018
Identifying Single-Event Transient Location Based on Compressed Sensing.
IEEE Trans. VLSI Syst., 2018

Adaptive Balance of Quality-resources of Neural Networks with Principle Component Analysis.
Proceedings of the TENCON 2018, 2018

Real-time Pedestrian and Vehicle Detection for Autonomous Driving.
Proceedings of the 2018 IEEE Intelligent Vehicles Symposium, 2018

Exploration on Spatiotemporal Data Repairing of Parking Lots Based on Recurrent GANs.
Proceedings of the 21st International Conference on Intelligent Transportation Systems, 2018

FLOPS: An Efficient and High-precision Prediction on Available Parking Spaces in a Long Time-span.
Proceedings of the 21st International Conference on Intelligent Transportation Systems, 2018

Aggregated Multi-deep Deterministic Policy Gradient for Self-driving Policy.
Proceedings of the Internet of Vehicles. Technologies and Services Towards Smart City, 2018

SAW: A Hybrid Prediction Model for Parking Occupancy Under the Environment of Lacking Real-Time Data.
Proceedings of the IECON 2018, 2018

Parking rank: A novel method of parking lots sorting and recommendation based on public information.
Proceedings of the IEEE International Conference on Industrial Technology, 2018

The Sixth Visual Object Tracking VOT2018 Challenge Results.
, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
Proceedings of the Computer Vision - ECCV 2018 Workshops, 2018

Low-cost vector map assisted navigation strategy for autonomous vehicle.
Proceedings of the 2018 IEEE Asia Pacific Conference on Circuits and Systems, 2018

2017
Fast and automatic security test on cryptographic ICs against fault injection attacks based on design for security test.
IET Information Security, 2017

Detection of Single Event Transients Based on Compressed Sensing.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

2016
A two-phase procedure for non-normal quantitative trait genetic association study.
BMC Bioinformatics, 2016

Searching parking spaces in urban environments based on non-stationary Poisson process analysis.
Proceedings of the 19th IEEE International Conference on Intelligent Transportation Systems, 2016

Image Semantic Segmentation Based on Fully Convolutional Neural Network and CRF.
Proceedings of the Geo-Spatial Knowledge and Intelligence, 2016

2015
A Low-Cost TSV Test and Diagnosis Scheme Based on Binary Search Method.
IEEE Trans. VLSI Syst., 2015

Design and Analysis of Multimodel-Based Anomaly Intrusion Detection Systems in Industrial Process Automation.
IEEE Trans. Systems, Man, and Cybernetics: Systems, 2015

Cache Side-Channel Attack to Recover Plaintext against Datagram TLS.
Proceedings of the 5th International Conference on IT Convergence and Security, 2015

A novel TSV probing technique with adhesive test interposer.
Proceedings of the 33rd IEEE International Conference on Computer Design, 2015

2014
Through-silicon via placement with shuffled frog leap algorithm.
Proceedings of the 2014 IEEE International Conference on Robotics and Biomimetics, 2014

An early warning model of traffic accidents based on fractal theory.
Proceedings of the 17th International IEEE Conference on Intelligent Transportation Systems, 2014

Design for security test on cryptographic ICs for design-time security evaluation.
Proceedings of the 9th International Design and Test Symposium, 2014

A Study of the Status of Chinese Listed Companies' Voluntary Disclosure.
Proceedings of the Enterprise Systems Conference, 2014

A Statistical Model to Predict Success Rate of Ion Fault Injection Attacks for Cryptographic ICs.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

2013
Threat on Physical Layer Security: Side Channel vs. Wiretap Channel.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

2012
Fast and scalable parallel processing of scalar multiplication in elliptic curve cryptosystems.
Security and Communication Networks, 2012

Dependability evaluation of integrated circuits at design time against laser fault injection.
Security and Communication Networks, 2012

Yield enhancement for 3D-stacked ICs: Recent advances and challenges.
Proceedings of the 17th Asia and South Pacific Design Automation Conference, 2012

2011
Enhanced correlation power analysis attack against trusted systems.
Security and Communication Networks, 2011

Simple power analysis attacks using chosen message against ECC hardware implementations.
Proceedings of the 2011 World Congress on Internet Security, 2011

Channel state information based key generation vs. side-channel analysis key information leakage.
Proceedings of the 5th International Conference on Network and System Security, 2011

Elliptic Curve Isogenies to Resist Differential Side-Channel Analysis Attacks.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
Retrieving Lost Efficiency of Scalar Multiplications for Resisting against Side-Channel Attacks.
JCP, 2010

Evaluation Metrics of Physical Non-invasive Security.
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010

2009
Partitioned Computation to Accelerate Scalar Multiplication for Elliptic Curve Cryptosystems.
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009

2008
Correlation Power Analysis Attack against Synchronous Stream Ciphers.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Enhanced Correlation Power Analysis Attack on Smart Card.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

2005
Security Evaluation Against Electromagnetic Analysis at Design Time.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29, 2005

2003
Security Evaluation of Asynchronous Circuits.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003

2001
A digital Class D amplifier design embodying a novel sampling process and pulse generator.
Proceedings of the 2001 International Symposium on Circuits and Systems, 2001


  Loading...