default search action
Yongjuan Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Qingjun Yuan, Yuefei Zhu, Gang Xiong, Yongjuan Wang, Wentao Yu, Bin Luo, Gaopeng Gou:
ULDC: Unsupervised Learning-Based Data Cleaning for Malicious Traffic With High Noise. Comput. J. 67(3): 976-987 (2024) - [j18]Xiangbin Wang, Qingjun Yuan, Yongjuan Wang, Gaopeng Gou, Chunxiang Gu, Gang Yu, Gang Xiong:
Combine intra- and inter-flow: A multimodal encrypted traffic classification model driven by diverse features. Comput. Networks 245: 110403 (2024) - [j17]Liujia Cai, Guangying Cai, Siqi Lu, Guangsong Li, Yongjuan Wang:
Observational equivalence and security games: Enhancing the formal analysis of security protocols. Comput. Secur. 140: 103785 (2024) - [j16]Qingjun Yuan, Gaopeng Gou, Yuefei Zhu, Yongjuan Wang:
MMCo: using multimodal deep learning to detect malicious traffic with noisy labels. Frontiers Comput. Sci. 18(1): 181809 (2024) - [j15]Qingjun Yuan, Weina Niu, Yongjuan Wang, Gaopeng Gou, Bin Lu:
Malicious Traffic Detection With Noise Labels Based on Cross-Modal Consistency. IEEE Netw. Lett. 6(2): 148-151 (2024) - [j14]Shaofei Sun, Shijun Ding, An Wang, Yaoling Ding, Congming Wei, Liehuang Zhu, Yongjuan Wang:
An efficient heuristic power analysis framework based on hill-climbing algorithm. Inf. Sci. 662: 120226 (2024) - [j13]Haopeng Fan, Wenhao Wang, Yongjuan Wang, Xiangbin Wang, Yang Gao:
Cache attacks on subkey calculation of Blowfish. J. Comput. Secur. 32(2): 165-191 (2024) - [j12]Qingjun Yuan, Gaopeng Gou, Yanbei Zhu, Yuefei Zhu, Gang Xiong, Yongjuan Wang:
MCRe: A Unified Framework for Handling Malicious Traffic With Noise Labels Based on Multidimensional Constraint Representation. IEEE Trans. Inf. Forensics Secur. 19: 133-147 (2024) - [j11]Haopeng Fan, Hailong Zhang, Yongjuan Wang, Wenhao Wang, Yanbei Zhu, Haojin Zhang, Qingjun Yuan:
Screening Least Square Technique Assisted Multivariate Template Attack Against the Random Polynomial Generation of Dilithium. IEEE Trans. Inf. Forensics Secur. 19: 7118-7132 (2024) - [j10]Zewei Lin, Jiachi Chen, Jiajing Wu, Weizhe Zhang, Yongjuan Wang, Zibin Zheng:
CRPWarner: Warning the Risk of Contract-Related Rug Pull in DeFi Smart Contracts. IEEE Trans. Software Eng. 50(6): 1534-1547 (2024) - [c7]Ya'nan Wang, Yanqiang Wan, Yongjuan Wang, Zhilian Sun, Yaqian Wang:
Research on control strategy of flexible interconnection with multi-source cooperative in various applications. ICCIC 2024 - [i11]Zewei Lin, Jiachi Chen, Zibin Zheng, Jiajing Wu, Weizhe Zhang, Yongjuan Wang:
CRPWarner: Warning the Risk of Contract-related Rug Pull in DeFi Smart Contracts. CoRR abs/2403.01425 (2024) - [i10]Annv Liu, An Wang, Shaofei Sun, Congming Wei, Yaoling Ding, Yongjuan Wang, Liehuang Zhu:
CL-SCA: Leveraging Contrastive Learning for Profiled Side-Channel Analysis. IACR Cryptol. ePrint Arch. 2024: 49 (2024) - 2023
- [j9]Qingjun Yuan, Chang Liu, Wentao Yu, Yuefei Zhu, Gang Xiong, Yongjuan Wang, Gaopeng Gou:
BoAu: Malicious traffic detection with noise labels based on boundary augmentation. Comput. Secur. 131: 103300 (2023) - 2022
- [j8]Siqi Lu, Jianhua Zheng, Zhenfu Cao, Yongjuan Wang, Chunxiang Gu:
A survey on cryptographic techniques for protecting big data security: present and forthcoming. Sci. China Inf. Sci. 65(10) (2022) - [c6]Xiaoqi Zhang, Guangsong Li, Yongjuan Wang:
GAN-based Abnormal Transaction Detection in Bitcoin. SmartCloud 2022: 157-162 - [i9]Guangpu Gao, Weiguo Zhang, Yongjuan Wang:
Composition construction of new bent functions from known dually isomorphic bent functions. IACR Cryptol. ePrint Arch. 2022: 143 (2022) - 2021
- [j7]An Wang, Yuan Li, Yaoling Ding, Liehuang Zhu, Yongjuan Wang:
Efficient Framework for Genetic Algorithm-Based Correlation Power Analysis. IEEE Trans. Inf. Forensics Secur. 16: 4882-4894 (2021) - [j6]Yaoling Ding, Liehuang Zhu, An Wang, Yuan Li, Yongjuan Wang, Siu Ming Yiu, Keke Gai:
A Multiple Sieve Approach Based on Artificial Intelligent Techniques and Correlation Power Analysis. ACM Trans. Multim. Comput. Commun. Appl. 17(2s): 71:1-71:21 (2021) - [i8]An Wang, Yuan Li, Yaoling Ding, Liehuang Zhu, Yongjuan Wang:
Efficient Framework for Genetic-Algorithm-Based Correlation Power Analysis. IACR Cryptol. ePrint Arch. 2021: 179 (2021) - [i7]Haopeng Fan, Wenhao Wang, Yongjuan Wang:
Cache attack on MISTY1. IACR Cryptol. ePrint Arch. 2021: 723 (2021) - 2020
- [j5]Guangpu Gao, Dongdai Lin, Wenfen Liu, Yongjuan Wang:
Composition of Boolean functions: An application to the secondary constructions of bent functions. Discret. Math. 343(3): 111711 (2020) - [j4]Yaoling Ding, Ying Shi, An Wang, Yongjuan Wang, Guoshuang Zhang:
Block-oriented correlation power analysis with bitwise linear leakage: An artificial intelligence approach based on genetic algorithms. Future Gener. Comput. Syst. 106: 34-42 (2020) - [j3]Yongjuan Wang, Peng Zhao:
A Probe into Spoken English Recognition in English Education Based on Computer-Aided Comprehensive Analysis. Int. J. Emerg. Technol. Learn. 15(3): 223-233 (2020) - [c5]Guanghua Yu, Linan Sun, Yongjuan Wang:
Design of Forum Log System Based on Big Data Analysis. GreeNets 2020: 29-35
2010 – 2019
- 2019
- [j2]Yang Gao, Yongjuan Wang, Qing-jun Yuan, Tao Wang, Xiangbin Wang:
Probabilistic Analysis of Differential Fault Attack on MIBS. IEICE Trans. Inf. Syst. 102-D(2): 299-306 (2019) - [j1]Gang Yu, Yongjuan Wang, Zhenfu Cao, Jian Lin, Xiangyu Wang:
Traceable and undeniable ciphertext-policy attribute-based encryption for cloud storage service. Int. J. Distributed Sens. Networks 15(4) (2019) - [c4]Jinhua Fu, Jiaheng Liu, Yongzhong Huang, Xueming Si, Yongjuan Wang, Bin Li:
Aggregate Signature Consensus Scheme Based on FPGA. BlockSys 2019: 92-100 - [c3]Siqi Lu, Haopeng Fan, Yongjuan Wang, Huizhe Mi, Ling Qin:
Manual Audit for BitUnits Contracts. BlockSys 2019: 476-482 - [c2]Yang Gao, Yongjuan Wang, Qing-jun Yuan, Tao Wang, Xiangbin Wang:
Improvement of Differential Fault Attack Based on Lightweight Ciphers with GFN Structure. ICAIS (2) 2019: 549-560 - 2017
- [c1]Shiyi Zhang, Yongjuan Wang, Yang Gao, Tao Wang:
On the Construction of the 4 x 4 Lightest Circulant MDS Matrices. ICCSP 2017: 1-6 - [i6]Shiyi Zhang, Yongjuan Wang, Yang Gao, Tao Wang:
Construction and Filtration of Lightweight Formalized MDS Matrices. IACR Cryptol. ePrint Arch. 2017: 420 (2017) - 2016
- [i5]Shiyi Zhang, Yongjuan Wang, Yang Gao, Tao Wang:
On the Construction of the lightest Circulant MDS Matrices. IACR Cryptol. ePrint Arch. 2016: 1131 (2016) - [i4]Shiyi Zhang, Yongjuan Wang, Guangpu Gao:
New construction of single-cycle T-function families. IACR Cryptol. ePrint Arch. 2016: 1142 (2016) - 2014
- [i3]Liren Ding, Yongjuan Wang, Zhufeng Li:
Linear Extension Cube Attack on Stream Ciphers. IACR Cryptol. ePrint Arch. 2014: 249 (2014) - 2013
- [i2]Yongjuan Wang, Liren Ding, Wenbao Han, Xiangyu Wang:
The Improved Cube Attack on Grain-v1. IACR Cryptol. ePrint Arch. 2013: 417 (2013)
2000 – 2009
- 2008
- [i1]Yongjuan Wang, Shuqin Fan, Wenbao Han:
New construction of Boolean functions with maximun algebraic immunity. IACR Cryptol. ePrint Arch. 2008: 176 (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-04 20:37 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint