Weijia Wang

According to our database1, Weijia Wang authored at least 45 papers between 1991 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Efficient and Private Computations with Code-Based Masking.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Spatial Assessment of Health Economic Losses from Exposure to Ambient Pollutants in China.
Remote. Sens., 2020

Unsupervised Meta-Learning through Latent-Space Interpolation in Generative Models.
CoRR, 2020

2019
Provable Order Amplification for Code-Based Masking: How to Avoid Non-Linear Leakages Due to Masked Operations.
IEEE Trans. Information Forensics and Security, 2019

Twisted Weak Orders of Coxeter Groups.
Order, 2019

Trained Biased Number Representation for ReRAM-Based Neural Network Accelerators.
ACM J. Emerg. Technol. Comput. Syst., 2019

Side-Channel Analysis for the Authentication Protocols of CDMA Cellular Networks.
J. Comput. Sci. Technol., 2019

Efficient Side-Channel Secure Message Authentication with Better Bounds.
IACR Cryptol. ePrint Arch., 2019

Optimal Configuration Analysis of AOA Localization and Optimal Heading Angles Generation Method for UAV Swarms.
IEEE Access, 2019

Optimal Sensor Deployment and Velocity Configuration With Hybrid TDOA and FDOA Measurements.
IEEE Access, 2019

Reconnaissance Mission Conducted by UAV Swarms Based on Distributed PSO Path Planning Algorithms.
IEEE Access, 2019

2018
Ridge-Based DPA: Improvement of Differential Power Analysis For Nanoscale Chips.
IEEE Trans. Information Forensics and Security, 2018

Similar operation template attack on RSA-CRT as a case study.
Sci. China Inf. Sci., 2018

Solution and Optimization of Aircraft Swarm Cooperating Anti-Stealth Formation Configuration.
IEEE Access, 2018

Reliable Shortest Path Routing with Applications to Wireless Software-Defined Networking.
Proceedings of the IEEE Global Communications Conference, 2018

2017
Hierarchic Entropy: An Information Theoretic Measure of Evolutionary Robotic Behavioral Diversity.
Int. J. Pattern Recognit. Artif. Intell., 2017

IR-CP-ABE: Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Flexible Secure Group-Based Communication.
IACR Cryptol. ePrint Arch., 2017

A security controller-based software defined security architecture.
Proceedings of the 20th Conference on Innovations in Clouds, Internet and Networks, 2017

Performance analysis for TDOA localization using UAVs with flight disturbances.
Proceedings of the 20th International Conference on Information Fusion, 2017

Ridge-Based Profiled Differential Power Analysis.
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017

Trace Augmentation: What Can Be Done Even Before Preprocessing in a Profiled SCA?
Proceedings of the Smart Card Research and Advanced Applications, 2017

2016
Evaluation and Improvement of Generic-Emulating DPA Attacks.
IACR Cryptol. ePrint Arch., 2016

A data driven orchestration framework in software defined security.
Proceedings of the IEEE International Conference on Network Infrastructure and Digital Content, 2016

Inner Product Masking for Bitslice Ciphers and Security Order Amplification for Linear Leakages.
Proceedings of the Smart Card Research and Advanced Applications, 2016

2015
Autonomous wall cutting with an Atlas humanoid robot.
Proceedings of the 2015 IEEE International Conference on Technologies for Practical Robot Applications, 2015

2014
Multi-objective sequential decision making. (La prise de décisions séquentielles multi-objectif).
PhD thesis, 2014

A Secure and Efficient Handover Authentication Protocol for Wireless Networks.
Sensors, 2014

A generic homomorphic MAC construction for authentication in network coding.
Security and Communication Networks, 2014

Autonomous valve turning with an Atlas humanoid robot.
Proceedings of the 14th IEEE-RAS International Conference on Humanoid Robots, 2014

2013
Hypervolume indicator and dominance reward based multi-objective Monte-Carlo Tree Search.
Mach. Learn., 2013

Minimum cost allocation of quality improvement targets under supplier process disruption.
Eur. J. Oper. Res., 2013

Privacy-Preserving Password-Based Authenticated Key Exchange in the Three-Party Setting.
Proceedings of the Network and System Security - 7th International Conference, 2013

A New Evolutionary Algorithm for Portfolio Optimization and Its Application.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

A Power Analysis on SMS4 Using the Chosen Plaintext Method.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

2012
Multi-objective Monte-Carlo Tree Search.
Proceedings of the 4th Asian Conference on Machine Learning, 2012

Dual-Scaled Method for the Rheology of Non-newtonian Boundary Layer and Its High Performance FEM.
Proceedings of the Information Computing and Applications - Third International Conference, 2012

2011
Weakness in 802.11w and an improved mechanism on protection of management frame.
Proceedings of the 2011 International Conference on Wireless Communications & Signal Processing, 2011

2010
Security Analysis of a Dynamic Program Update Protocol for Wireless Sensor Networks.
IEEE Communications Letters, 2010

How to Construct Secure and Efficient Three-Party Password-Based Authenticated Key Exchange Protocols.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

2007
Privacy-preserving authentication with low computational overhead for RFID systems.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

Storage-Awareness: RFID Private Authentication based on Sparse Tree.
Proceedings of the Third International Workshop on Security, 2007

Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

2006
Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols.
Proceedings of the Progress in Cryptology, 2006

1993
The Christmas-Tree Switch: An Output Queuing Space-Division Fast Packet Switch Based on Inerleaving Distribution and Concentration Functions.
Comput. Networks ISDN Syst., 1993

1991
The Christmas-Tree Switch: An Output Queueing Space-Division Fast Packet Switch Based on Interleaving Distribution and Concentration Functions.
Proceedings of the Proceedings IEEE INFOCOM '91, 1991


  Loading...