Pei Luo

Orcid: 0000-0001-9484-827X

According to our database1, Pei Luo authored at least 48 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
CODD-Pred: A Web Server for Efficient Target Identification and Bioactivity Prediction of Small Molecules.
J. Chem. Inf. Model., October, 2023

Basing on the machine learning model to analyse the coronary calcification score and the coronary flow reserve score to evaluate the degree of coronary artery stenosis.
Comput. Biol. Medicine, September, 2023

A Rolling-Adaptive Peak Clipping Control Strategy Coordinating RBE Recycling and PV Consumption.
IEEE Trans. Intell. Transp. Syst., April, 2023

2021
Multi-Application Strategy Based on Railway Static Power Conditioner With Energy Storage System.
IEEE Trans. Intell. Transp. Syst., 2021

2020
MOOCRec: An Attention Meta-path Based Model for Top-K Recommendation in MOOC.
Proceedings of the Knowledge Science, Engineering and Management, 2020

An Emergency Collaborative Scheduling Optimization Method based on VSC-HVDC Systems.
Proceedings of the 46th Annual Conference of the IEEE Industrial Electronics Society, 2020

Electrified Railway Traction Load Prediction Based on Deep Learning.
Proceedings of the 46th Annual Conference of the IEEE Industrial Electronics Society, 2020

Two-Sided Matching Scheduling Using Multi-Level Look-Ahead Queue of Supply and Demand.
Proceedings of the Service-Oriented Computing - 18th International Conference, 2020

2019
Efficient Nonprofiling 2nd-Order Power Analysis on Masked Devices Utilizing Multiple Leakage Points.
IEEE Trans. Dependable Secur. Comput., 2019

Performance Improvement of Two-Phase Stationary-Frame-Based Enhanced PLL by Using Multiple Delayed Signal Cancellation Filters.
Proceedings of the IECON 2019, 2019

Multi-scenario Capacity Optimization Design of Railway Power Conditioner Considering Load Uncertainty.
Proceedings of the IECON 2019, 2019

An Improved Differential Privacy Algorithm Using Frequent Pattern Mining.
Proceedings of the 15th International Conference on Computational Intelligence and Security, 2019

2018
Algebraic Fault Analysis of SHA-3 Under Relaxed Fault Models.
IEEE Trans. Inf. Forensics Secur., 2018

Power Analysis Attack of an AES GPU Implementation.
J. Hardw. Syst. Secur., 2018

Solving the M2M Recommendation Problem via Group Multi-Role Assignment.
Proceedings of the 22nd IEEE International Conference on Computer Supported Cooperative Work in Design, 2018

2017
Differential Fault Analysis of SHA-3 Under Relaxed Fault Models.
J. Hardw. Syst. Secur., 2017

Algebraic Fault Analysis of SHA-3.
IACR Cryptol. ePrint Arch., 2017

Fine-grained news recommendation by fusing matrix factorization, topic analysis and knowledge graph representation.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

Predicting the number of driving service orders in fine-grained regions by an ensemble multi-view-based model.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

Generalized pooling pyramid with hierarchical dictionary sparse coding for event and object recognition.
Proceedings of the 2017 IEEE International Conference on Image Processing, 2017

Compiler-Assisted Threshold Implementation against Power Analysis Attacks.
Proceedings of the 2017 IEEE International Conference on Computer Design, 2017

A Dataset for Benchmarking Image-Based Localization.
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition, 2017

2016
A Unified Metric for Quantifying Information Leakage of Cryptographic Devices under Power Analysis Attacks.
IACR Cryptol. ePrint Arch., 2016

An Improvement of Both Security and Reliability for Keccak Implementations on Smart Card.
IACR Cryptol. ePrint Arch., 2016

System Clock and Power Supply Cross-Checking for Glitch Detection.
IACR Cryptol. ePrint Arch., 2016

Differential Fault Analysis of SHA3-224 and SHA3-256.
IACR Cryptol. ePrint Arch., 2016

Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack.
IACR Cryptol. ePrint Arch., 2016

Concurrent Error Detection for Reliable SHA-3 Design.
Proceedings of the 26th edition on Great Lakes Symposium on VLSI, 2016

2015
Towards Secure Cryptographic Software Implementation Against Side-Channel Power Analysis Attacks.
IACR Cryptol. ePrint Arch., 2015

Side-Channel Analysis of MAC-Keccak Hardware Implementations.
IACR Cryptol. ePrint Arch., 2015

Side-channel power analysis of a GPU AES implementation.
Proceedings of the 33rd IEEE International Conference on Computer Design, 2015

Leakage evaluation on power balance countermeasure against side-channel attack on FPGAs.
Proceedings of the 2015 IEEE High Performance Extreme Computing Conference, 2015

Efficient 2nd-order power analysis on masked devices utilizing multiple leakage.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2015

Balance power leakage to fight against side-channel analysis at gate level in FPGAs.
Proceedings of the 26th IEEE International Conference on Application-specific Systems, 2015

2014
Hardware Implementation of Secure Shamir's Secret Sharing Scheme.
IACR Cryptol. ePrint Arch., 2014

Side-channel Power Analysis of Different Protection Schemes Against Fault Attacks on AES.
IACR Cryptol. ePrint Arch., 2014

Power Analysis Attack on Hardware Implementation of MAC-Keccak on FPGAs.
IACR Cryptol. ePrint Arch., 2014

A Statistical Model for Higher Order DPA on Masked Devices.
IACR Cryptol. ePrint Arch., 2014

Scalable and efficient implementation of correlation power analysis using graphics processing units (GPUs).
Proceedings of the HASP 2014, 2014

Generic 2D/3D smoothing via regional variation.
Proceedings of the IEEE International Conference on Acoustics, 2014

2013
Co-segmentation of 3D shapes via multi-view spectral clustering.
Vis. Comput., 2013

Computational geometry-based scale space for edge-preserving multiscale image decomposition.
J. Electronic Imaging, 2013

Secure memories resistant to both random errors and fault injection attacks using nonlinear error correction codes.
Proceedings of the HASP 2013, 2013

2012
A novel method to evaluate clustering algorithms for hierarchical optical networks.
Photonic Netw. Commun., 2012

Visible neighborhood graph of point clouds.
Graph. Model., 2012

2011
Distributed Protocol for Removal of Loop Backs with Asymmetric Digraph Using GMPLS in P-Cycle Based Optical Networks.
IEEE Trans. Commun., 2011

Collision-safe wavelength assignment scheme for lightpath establishment in WSONs.
Proceedings of the 2011 IEEE International Conference on Cloud Computing and Intelligence Systems, 2011

2009
Urban Trunk Road Traffic Signal Coordinated Control Based on Multi-Objective Immune Algorithm.
Proceedings of the 2009 International Asia Conference on Informatics in Control, 2009


  Loading...