default search action
Changhai Ou
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Kexin Qiao, Zehan Wu, Junjie Cheng, Changhai Ou, An Wang, Liehuang Zhu:
Bitwise Mixture Differential Cryptanalysis and Its Application to SIMON. IEEE Internet Things J. 11(13): 23398-23409 (2024) - [j18]Jiangshan Long, Changhai Ou, Chenxu Wang, Zhu Wang, Yongbin Zhou:
What Is Now Possible? Security Evaluation on Univariate DPA Attacks With Inaccurate Leakage Models. IEEE Trans. Inf. Forensics Secur. 19: 8441-8456 (2024) - [i19]Xinyao Li, Xiwen Ren, Ling Ning, Changhai Ou:
Fusion Channel Attack with POI Learning Encoder. IACR Cryptol. ePrint Arch. 2024: 1092 (2024) - [i18]Jiawei Zhang, Jiangshan Long, Changhai Ou, Kexin Qiao, Fan Zhang, Shi Yan:
Less Effort, More Success: Efficient Genetic Algorithm-Based Framework for Side-channel Collision Attacks. IACR Cryptol. ePrint Arch. 2024: 1214 (2024) - [i17]Jiangshan Long, Changhai Ou, Zhu Wang, Fan Zhang:
The Mysteries of LRA: Roots and Progresses in Side-channel Applications. IACR Cryptol. ePrint Arch. 2024: 1735 (2024) - 2023
- [j17]Shihui Zheng, Ruihao Xing, Junlong Lai, Junkai Liu, Haofeng Wang, Changhai Ou:
Breaking Fault Attack Countermeasures With Side-Channel Information. IEEE Trans. Computers 72(5): 1396-1408 (2023) - [j16]Changhai Ou, Debiao He, Kexin Qiao, Shihui Zheng, Siew-Kei Lam, Fan Zhang:
CoTree: A Side-Channel Collision Tool to Push the Limits of Conquerable Space. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 42(12): 4505-4517 (2023) - [i16]Yukun Cheng, Changhai Ou, Fan Zhang, Shihui Zheng:
DLPFA: Deep Learning based Persistent Fault Analysis against Block Ciphers. IACR Cryptol. ePrint Arch. 2023: 21 (2023) - [i15]Jianye Gao, Xinyao Li, Changhai Ou, Zhu Wang, Fei Yan:
Manifold Learning Side-Channel Attacks against Masked Cryptographic Implementations. IACR Cryptol. ePrint Arch. 2023: 1604 (2023) - 2022
- [j15]Guiyuan Jiang, Siew-Kei Lam, Peilan He, Changhai Ou, Dihao Ai:
A Multi-Scale Attributes Attention Model for Transport Mode Identification. IEEE Trans. Intell. Transp. Syst. 23(1): 152-164 (2022) - [i14]Jiangshan Long, Changhai Ou, Yajun Ma, Yifan Fan, Hua Chen, Shihui Zheng:
How to Launch a Powerful Side-Channel Collision Attack? IACR Cryptol. ePrint Arch. 2022: 174 (2022) - [i13]Jiangshan Long, Changhai Ou, Zhu Wang, Shihui Zheng, Fei Yan, Fan Zhang, Siew-Kei Lam:
Snowball: Another View on Side-Channel Key Recovery Tools. IACR Cryptol. ePrint Arch. 2022: 728 (2022) - [i12]Jiangshan Long, Chenxu Wang, Changhai Ou, Zhu Wang, Yongbin Zhou, Ming Tang:
One for All, All for One: A Unified Evaluation Framework for Univariate DPA Attacks. IACR Cryptol. ePrint Arch. 2022: 1360 (2022) - 2021
- [j14]Qu Wang, Haiyong Luo, Hao Xiong, Aidong Men, Fang Zhao, Ming Xia, Changhai Ou:
Pedestrian Dead Reckoning Based on Walking Pattern Recognition and Online Magnetic Fingerprint Trajectory Calibration. IEEE Internet Things J. 8(3): 2011-2026 (2021) - [j13]Fangxin Ning, Guiyuan Jiang, Siew-Kei Lam, Changhai Ou, Peilan He, Yidan Sun:
Passenger-centric vehicle routing for first-mile transportation considering request uncertainty. Inf. Sci. 570: 241-261 (2021) - [j12]Changhai Ou, Siew-Kei Lam, Degang Sun, Xinping Zhou, Kexin Qiao, Qu Wang:
SNR-Centric Power Trace Extractors for Side-Channel Attacks. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 40(4): 620-632 (2021) - [j11]Changhai Ou, Siew-Kei Lam, Guiyuan Jiang:
The Science of Guessing in Collision-Optimized Divide-and-Conquer Attacks. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 40(6): 1039-1051 (2021) - [j10]Changhai Ou, Xinping Zhou, Siew-Kei Lam, Chengju Zhou, Fangxin Ning:
Information Entropy-Based Leakage Profiling. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 40(6): 1052-1062 (2021) - [j9]Shihui Zheng, Xudong Liu, Shoujin Zang, Yihao Deng, Dongqi Huang, Changhai Ou:
A Persistent Fault-Based Collision Analysis Against the Advanced Encryption Standard. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 40(6): 1117-1129 (2021) - [j8]Changhai Ou, Chengju Zhou, Siew-Kei Lam, Guiyuan Jiang:
Multiple-Differential Mechanism for Collision-Optimized Divide-and-Conquer Attacks. IEEE Trans. Inf. Forensics Secur. 16: 418-430 (2021) - [i11]Changhai Ou, Debiao He, Zhu Wang, Kexin Qiao, Shihui Zheng, Siew-Kei Lam:
CoTree: Push the Limits of Conquerable Space in Collision-Optimized Side-Channel Attacks. IACR Cryptol. ePrint Arch. 2021: 1582 (2021) - 2020
- [j7]Qu Wang, Haiyong Luo, Langlang Ye, Aidong Men, Fang Zhao, Yan Huang, Changhai Ou:
Personalized Stride-Length Estimation Based on Active Online Learning. IEEE Internet Things J. 7(6): 4885-4897 (2020) - [j6]Changhai Ou, Siew-Kei Lam, Chengju Zhou, Guiyuan Jiang, Fan Zhang:
A Lightweight Detection Algorithm For Collision-Optimized Divide-and-Conquer Attacks. IEEE Trans. Computers 69(11): 1694-1706 (2020) - [j5]Changhai Ou, Chengju Zhou, Siew-Kei Lam:
A First Study of Compressive Sensing for Side-Channel Leakage Sampling. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(10): 2166-2177 (2020)
2010 – 2019
- 2019
- [j4]Qu Wang, Haiyong Luo, Langlang Ye, Aidong Men, Fang Zhao, Yan Huang, Changhai Ou:
Pedestrian Heading Estimation Based on Spatial Transformer Networks and Hierarchical LSTM. IEEE Access 7: 162309-162322 (2019) - [j3]Qu Wang, Langlang Ye, Haiyong Luo, Aidong Men, Fang Zhao, Changhai Ou:
Pedestrian Walking Distance Estimation Based on Smartphone Mode Recognition. Remote. Sens. 11(9): 1140 (2019) - [j2]Changhai Ou, Zhu Wang, Degang Sun, Xinping Zhou:
Group Collision Attack. IEEE Trans. Inf. Forensics Secur. 14(4): 939-953 (2019) - [j1]Saru Vig, Rohan Juneja, Guiyuan Jiang, Siew-Kei Lam, Changhai Ou:
Framework for Fast Memory Authentication Using Dynamically Skewed Integrity Tree. IEEE Trans. Very Large Scale Integr. Syst. 27(10): 2331-2343 (2019) - [i10]Changhai Ou, Siew-Kei Lam:
Full Collision Attack: Pushing the Limits of Exhaustible Key Spaces. IACR Cryptol. ePrint Arch. 2019: 13 (2019) - [i9]Changhai Ou, Siew-Kei Lam, Guiyuan Jiang:
The Art of Guessing in Combined Side-Channel Collision Attacks. IACR Cryptol. ePrint Arch. 2019: 690 (2019) - [i8]Xinping Zhou, Kexin Qiao, Changhai Ou:
Leakage Detection with Kolmogorov-Smirnov Test. IACR Cryptol. ePrint Arch. 2019: 1478 (2019) - [i7]Changhai Ou, Degang Sun, Siew-Kei Lam, Xinping Zhou, Kexin Qiao, Qu Wang:
SNR-Centric Power Trace Extractors for Side-Channel Attacks. IACR Cryptol. ePrint Arch. 2019: 1487 (2019) - 2018
- [i6]Changhai Ou, Xinping Zhou, Siew-Kei Lam:
Information Entropy Based Leakage Certification. IACR Cryptol. ePrint Arch. 2018: 959 (2018) - [i5]Changhai Ou, Chengju Zhou, Siew-Kei Lam:
Compressive Sensing based Leakage Sampling and Reconstruction: A First Study. IACR Cryptol. ePrint Arch. 2018: 1149 (2018) - 2017
- [c10]Na Pang, Dali Zhu, Kaiwen Xue, Wenjing Rong, Yinlong Liu, Changhai Ou:
Analyzing Customer's Product Preference Using Wireless Signals. KSEM 2017: 139-148 - [i4]Changhai Ou, Degang Sun, Zhu Wang, Xinping Zhou, Juan Ai:
Towards Easy Key Enumeration. IACR Cryptol. ePrint Arch. 2017: 254 (2017) - [i3]Changhai Ou, Zhu Wang, Degang Sun, Xinping Zhou:
Profiling Good Leakage Models For Masked Implementations. IACR Cryptol. ePrint Arch. 2017: 660 (2017) - [i2]Changhai Ou, Degang Sun, Zhu Wang, Xinping Zhou:
Towards Optimal Pre-processing in Leakage Detection. IACR Cryptol. ePrint Arch. 2017: 939 (2017) - [i1]Changhai Ou, Degang Sun, Zhu Wang, Xinping Zhou, Wei Cheng:
Manifold Learning Towards Masking Implementations: A First Study. IACR Cryptol. ePrint Arch. 2017: 1112 (2017) - 2016
- [c9]Changhai Ou, Zhu Wang, Juan Ai, Xinping Zhou, Degang Sun, Victor E. DeBrunner:
Error Tolerance based Single Interesting Point Side Channel CPA Distinguisher. AsiaCCS 2016: 819-827 - [c8]Changhai Ou, Zhu Wang, Degang Sun, Xinping Zhou, Juan Ai:
Group Verification Based Multiple-Differential Collision Attack. ICICS 2016: 145-156 - [c7]Changhai Ou, Zhu Wang, Degang Sun, Xinping Zhou, Juan Ai, Na Pang:
Enhanced Correlation Power Analysis by Biasing Power Traces. ISC 2016: 59-72 - [c6]Changhai Ou, Zhu Wang, Degang Sun, Xinping Zhou, Juan Ai:
Uncertain? No, It's Very Certain! - Recovering the Key from Guessing Entropy Enhanced CPA. SEC 2016: 308-320 - [c5]Juan Ai, Zhu Wang, Xinping Zhou, Changhai Ou:
POSTER: A Novel Wavelet Denoising Method Based on Robust Principal Component Analysis in Side Channel Attacks. SecureComm 2016: 766-769 - [c4]Changhai Ou, Zhu Wang, Degang Sun, Xinping Zhou, Juan Ai:
Power Traces Clipping and Splicing Enhanced Correlation Collision Analysis. Trustcom/BigDataSE/ISPA 2016: 989-995 - [c3]Xinping Zhou, Degang Sun, Zhu Wang, Changhai Ou, Juan Ai:
Double-Key Recovery Based Correlation Power Analysis. Trustcom/BigDataSE/ISPA 2016: 1016-1022 - 2015
- [c2]Dali Zhu, Na Pang, Zheming Fan, Changhai Ou:
Trusted access in wireless network on mutual interactive authentication mechanism. ChinaCom 2015: 776-781 - [c1]Degang Sun, Xinping Zhou, Zhu Wang, Changhai Ou, Wei-qing Huang, Juan Ai:
POSTER: Using Improved Singular Value Decomposition to Enhance Correlation Power Analysis. SecureComm 2015: 598-601
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 22:22 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint