Si Gao

Orcid: 0000-0002-5588-0813

According to our database1, Si Gao authored at least 47 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Semi-supervised Video Semantic Segmentation Using Unreliable Pseudo Labels for PVUW2024.
CoRR, 2024

2nd Place Solution for PVUW Challenge 2024: Video Panoptic Segmentation.
CoRR, 2024

Real-Time 4K Super-Resolution of Compressed AVIF Images. AIS 2024 Challenge Survey.
CoRR, 2024

2023
Spatio-Temporal Variability Analysis of Vegetation Dynamics in China from 2000 to 2022 Based on Leaf Area Index: A Multi-Temporal Image Classification Perspective.
Remote. Sens., June, 2023

Improving the Quality of MODIS LAI Products by Exploiting Spatiotemporal Correlation Information.
IEEE Trans. Geosci. Remote. Sens., 2023

Association between brain similarity to severe mental illnesses and comorbid cerebral, physical, and cognitive impairments.
NeuroImage, 2023

2022
Evaluation of the Vegetation-Index-Based Dimidiate Pixel Model for Fractional Vegetation Cover Estimation.
IEEE Trans. Geosci. Remote. Sens., 2022

Revisit the Performance of MODIS and VIIRS Leaf Area Index Products from the Perspective of Time-Series Stability.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2022

Phenological Responses to Snow Seasonality in the Qilian Mountains Is a Function of Both Elevation and Vegetation Types.
Remote. Sens., 2022

A Novel Framework for Explainable Leakage Assessment.
IACR Cryptol. ePrint Arch., 2022

NTIRE 2022 Challenge on Super-Resolution and Quality Enhancement of Compressed Video: Dataset, Methods and Results.
CoRR, 2022

Towards Micro-architectural Leakage Simulators: Reverse Engineering Micro-architectural Leakage Features Is Practical.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

A Novel Completeness Test for Leakage Models and Its Application to Side Channel Attacks and Responsibly Engineered Simulators.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022


RCBSR: Re-parameterization Convolution Block for Super-Resolution.
Proceedings of the Computer Vision - ECCV 2022 Workshops, 2022


2021
Neyman's Smoothness Test: A Trade-Off Between Moment-Based and Distribution-Based Leakage Detections.
IEEE Trans. Inf. Forensics Secur., 2021

An Instruction Set Extension to Support Software-Based Masking.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

Comparing empirical kinship derived heritability for imaging genetics traits in the UK biobank and human connectome project.
NeuroImage, 2021

Animating explosion with exploding sound and rigid-body sound.
Comput. Animat. Virtual Worlds, 2021

Reverse Engineering the Micro-Architectural Leakage Features of a Commercial Processor.
IACR Cryptol. ePrint Arch., 2021

A Novel Completeness Test and its Application to Side Channel Attacks and Simulators.
IACR Cryptol. ePrint Arch., 2021

Real-Time Video Super-Resolution on Smartphones with Deep Learning, Mobile AI 2021 Challenge: Report.
CoRR, 2021

Safety Helmet Detection Based On YOLOV3N.
Proceedings of the 14th International Congress on Image and Signal Processing, 2021

2020
Automatic synthesis of explosion sound synchronized with animation.
Virtual Real., 2020

FENL: an ISE to mitigate analogue micro-architectural leakage.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Share-slicing: Friend or Foe?
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

A model based on CT radiomic features for predicting RT-PCR becoming negative in coronavirus disease 2019 (COVID-19) patients.
BMC Medical Imaging, 2020

2019
Sub-Image Blocks Based Joint Sparse Reconstruction Algorithm for Multi-Pass SAR Images Feature Enhancement.
Proceedings of the 2019 IEEE International Geoscience and Remote Sensing Symposium, 2019

2018
Constructing TI-friendly Substitution Boxes using Shift-Invariant Permutations.
IACR Cryptol. ePrint Arch., 2018

Non-profiled Mask Recovery: the impact of Independent Component Analysis.
IACR Cryptol. ePrint Arch., 2018

A complete list of exact solutions for one-dimensional elastic-perfectly plastic solid Riemann problem without vacuum.
Commun. Nonlinear Sci. Numer. Simul., 2018

2017
Direct Construction of Optimal Rotational-XOR Diffusion Primitives.
IACR Trans. Symmetric Cryptol., 2017

2016
My traces learn what you did in the dark: recovering secret signals without key guesses.
IACR Cryptol. ePrint Arch., 2016

Improved Fault Analysis on the Block Cipher SPECK by Injecting Faults in the Same Round.
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016

Linear Regression Attack with F-test: A New SCARE Technique for Secret Block Ciphers.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

2015
Constructing Lightweight Optimal Diffusion Primitives with Feistel Structure.
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015

An Iris Recognition Method Based on Annule-energy Feature.
Proceedings of the Biometric Recognition - 10th Chinese Conference, 2015

2014
An Effective Iris Recognition Method Based on Scale Invariant Feature Transformation.
Proceedings of the Biometric Recognition - 9th Chinese Conference, 2014

2013
A General Method to Evaluate the Correlation of Randomness Tests.
Proceedings of the Information Security Applications - 14th International Workshop, 2013

On Design of Nonlinear Operations and Round Functions of Block Ciphers with Resistance to ASCAs.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Padding Oracle Attack on PKCS#1 v1.5: Can Non-standard Implementation Act as a Shelter?
Proceedings of the Cryptology and Network Security - 12th International Conference, 2013

2012
Evolutionary ciphers against differential power analysis and differential fault analysis.
Sci. China Inf. Sci., 2012

Polar differential power attacks and evaluation.
Sci. China Inf. Sci., 2012

2011
DPA Leakage Evaluation and Countermeasure Plug-in.
IACR Cryptol. ePrint Arch., 2011

2010
Evolution Cipher against Differential Power Attack.
J. Digit. Content Technol. its Appl., 2010

Evolutionary Cipher against Differential Power Attack.
IACR Cryptol. ePrint Arch., 2010


  Loading...