Junrong Liu

According to our database1, Junrong Liu authored at least 30 papers between 2010 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
The evolution of a clogging sidewalk caused by a dockless bicycle-sharing system: A stochastic particles model.
Math. Comput. Simul., 2020

Evaluating and Improving Linear Regression Based Profiling: On the Selection of Its Regularization.
J. Comput. Sci. Technol., 2020

Filtering and smoothing formulas of AR(p)-modulated Poisson processes.
Commun. Stat. Simul. Comput., 2020

Malicious Domain Detection Based on K-means and SMOTE.
Proceedings of the Computational Science - ICCS 2020, 2020

2019
Side-Channel Analysis for the Authentication Protocols of CDMA Cellular Networks.
J. Comput. Sci. Technol., 2019

Side channel attack of multiplication in GF(<i>q</i>)-application to secure RSA-CRT.
Sci. China Inf. Sci., 2019

isAnon: Flow-Based Anonymity Network Traffic Identification Using Extreme Gradient Boosting.
Proceedings of the International Joint Conference on Neural Networks, 2019

2018
Ridge-Based DPA: Improvement of Differential Power Analysis For Nanoscale Chips.
IEEE Trans. Inf. Forensics Secur., 2018

Similar operation template attack on RSA-CRT as a case study.
Sci. China Inf. Sci., 2018

EOD Edge Sampling for Visualizing Dynamic Network via Massive Sequence View.
IEEE Access, 2018

Hierarchical Clustering Based Network Traffic Data Reduction for Improving Suspicious Flow Detection.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A Novel Approach for Identifying Lateral Movement Attacks Based on Network Embedding.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

2017
Practical Partial-Nonce-Exposure Attack on ECC Algorithm.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

Efficient and Constant Time Modular Inversions Over Prime Fields.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

Boolean Matrix Masking for SM4 Block Cipher Algorithm.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

An Implementation of Trojan Side-Channel with a Masking Scheme.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

Trace Augmentation: What Can Be Done Even Before Preprocessing in a Profiled SCA?
Proceedings of the Smart Card Research and Advanced Applications, 2017

2016
Modelling a Bathtub-Shaped Failure Rate by a Coxian Distribution.
IEEE Trans. Reliab., 2016

Evaluation and Improvement of Generic-Emulating DPA Attacks.
IACR Cryptol. ePrint Arch., 2016

Inner Product Masking for Bitslice Ciphers and Security Order Amplification for Linear Leakages.
Proceedings of the Smart Card Research and Advanced Applications, 2016

2015
A first step to implement Gillespie's algorithm with rejection sampling.
Stat. Methods Appl., 2015

Small Tweaks Do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards.
Proceedings of the Computer Security - ESORICS 2015, 2015

A Circuit Design of SMS4 against Chosen Plaintext Attack.
Proceedings of the 11th International Conference on Computational Intelligence and Security, 2015

2014
Parameter Estimation for a <i>k</i>-out-of-<i>n</i>: F System.
Commun. Stat. Simul. Comput., 2014

An Improved Side-Channel Attack Based on Support Vector Machine.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

2013
Multisensor Acquirement System of Electrokinetic in Multiphase Flow.
J. Networks, 2013

Differential power analysis of stream ciphers with LFSRs.
Comput. Math. Appl., 2013

A Power Analysis on SMS4 Using the Chosen Plaintext Method.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

2012
Differential Fault Analysis on Lightweight Blockciphers with Statistical Cryptanalysis Techniques.
Proceedings of the 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2012

2010
Correlation Power Analysis Against Stream Cipher MICKEY v2.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010


  Loading...