Yongjuan Wang

Orcid: 0000-0001-9819-404X

According to our database1, Yongjuan Wang authored at least 27 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
MMCo: using multimodal deep learning to detect malicious traffic with noisy labels.
Frontiers Comput. Sci., February, 2024

MCRe: A Unified Framework for Handling Malicious Traffic With Noise Labels Based on Multidimensional Constraint Representation.
IEEE Trans. Inf. Forensics Secur., 2024

CL-SCA: Leveraging Contrastive Learning for Profiled Side-Channel Analysis.
IACR Cryptol. ePrint Arch., 2024

CRPWarner: Warning the Risk of Contract-related Rug Pull in DeFi Smart Contracts.
CoRR, 2024

2023
BoAu: Malicious traffic detection with noise labels based on boundary augmentation.
Comput. Secur., 2023

2022
Composition construction of new bent functions from known dually isomorphic bent functions.
IACR Cryptol. ePrint Arch., 2022

A survey on cryptographic techniques for protecting big data security: present and forthcoming.
Sci. China Inf. Sci., 2022

GAN-based Abnormal Transaction Detection in Bitcoin.
Proceedings of the 7th IEEE International Conference on Smart Cloud, SmartCloud 2022, 2022

2021
A Multiple Sieve Approach Based on Artificial Intelligent Techniques and Correlation Power Analysis.
ACM Trans. Multim. Comput. Commun. Appl., 2021

Efficient Framework for Genetic Algorithm-Based Correlation Power Analysis.
IEEE Trans. Inf. Forensics Secur., 2021

Cache attack on MISTY1.
IACR Cryptol. ePrint Arch., 2021

2020
A Probe into Spoken English Recognition in English Education Based on Computer-Aided Comprehensive Analysis.
Int. J. Emerg. Technol. Learn., 2020

Block-oriented correlation power analysis with bitwise linear leakage: An artificial intelligence approach based on genetic algorithms.
Future Gener. Comput. Syst., 2020

Composition of Boolean functions: An application to the secondary constructions of bent functions.
Discret. Math., 2020

Design of Forum Log System Based on Big Data Analysis.
Proceedings of the Green Energy and Networking - 7th EAI International Conference, 2020

2019
Traceable and undeniable ciphertext-policy attribute-based encryption for cloud storage service.
Int. J. Distributed Sens. Networks, 2019

Probabilistic Analysis of Differential Fault Attack on MIBS.
IEICE Trans. Inf. Syst., 2019

Improvement of Differential Fault Attack Based on Lightweight Ciphers with GFN Structure.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Manual Audit for BitUnits Contracts.
Proceedings of the Blockchain and Trustworthy Systems - First International Conference, 2019

Aggregate Signature Consensus Scheme Based on FPGA.
Proceedings of the Blockchain and Trustworthy Systems - First International Conference, 2019

2017
Construction and Filtration of Lightweight Formalized MDS Matrices.
IACR Cryptol. ePrint Arch., 2017

On the Construction of the 4 x 4 Lightest Circulant MDS Matrices.
Proceedings of the 2017 International Conference on Cryptography, Security and Privacy, 2017

2016
On the Construction of the lightest Circulant MDS Matrices.
IACR Cryptol. ePrint Arch., 2016

New construction of single-cycle T-function families.
IACR Cryptol. ePrint Arch., 2016

2014
Linear Extension Cube Attack on Stream Ciphers.
IACR Cryptol. ePrint Arch., 2014

2013
The Improved Cube Attack on Grain-v1.
IACR Cryptol. ePrint Arch., 2013

2008
New construction of Boolean functions with maximun algebraic immunity.
IACR Cryptol. ePrint Arch., 2008


  Loading...