Jingyi Feng

Orcid: 0000-0001-9607-6744

According to our database1, Jingyi Feng authored at least 16 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
The Non-Linear Influence of Built Environment on the School Commuting Metro Ridership: The Case in Wuhan, China.
ISPRS Int. J. Geo Inf., 2023

Grid-SD2E: A General Grid-Feedback in a System for Cognitive Learning.
CoRR, 2023

Prototypes-oriented Transductive Few-shot Learning with Conditional Transport.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

2021
Fault Diagnosis of Permanent Magnet Synchronous Motor Based on Stacked Denoising Autoencoder.
Entropy, 2021

ViF-SD2E: A Robust Weakly-Supervised Method for Neural Decoding.
CoRR, 2021

Do multiple infections lead to better security? A new study on CHES 2014 infective countermeasure.
Sci. China Inf. Sci., 2021

2020
A Framework for Evaluation and Analysis on Infection Countermeasures Against Fault Attacks.
IEEE Trans. Inf. Forensics Secur., 2020

Weakly supervised learning in neural encoding for the position of the moving finger of a macaque.
Cogn. Comput., 2020

2018
Lattice-Based Fault Attacks Against ECMQV.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2018

2017
Learning Action Pattern for Activity Recognition.
Proceedings of the 5th International Conference on Enterprise Systems, 2017

2016
Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round.
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016

Improved Fault Analysis on SIMON Block Cipher Family.
Proceedings of the 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2016

Linear Regression Attack with F-test: A New SCARE Technique for Secret Block Ciphers.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

2015
Two Lattice-Based Differential Fault Attacks Against ECDSA with wNAF Algorithm.
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015

Practical Lattice-Based Fault Attack and Countermeasure on SM2 Signature Algorithm.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

2013
Supporting research into sound and speech learning through a configurable computer game.
Proceedings of the 2013 IEEE International Games Innovation Conference, 2013


  Loading...