default search action
A. Adam Ding
Person information
- affiliation: Northeastern University, Department of Mathematics
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c26]Ruyi Ding, Lili Su, Aidong Adam Ding, Yunsi Fei:
Non-transferable Pruning. ECCV (86) 2024: 375-393 - [c25]Tianhong Xu, Aidong Adam Ding, Yunsi Fei:
TrustZoneTunnel: A Cross-World Pattern History Table-Based Microarchitectural Side-Channel Attack. HOST 2024: 1-11 - [i22]Shijin Duan, Ruyi Ding, Jiaxing He, Aidong Adam Ding, Yunsi Fei, Xiaolin Xu:
GraphCroc: Cross-Correlation Autoencoder for Graph Structural Reconstruction. CoRR abs/2410.03396 (2024) - [i21]Ruyi Ding, Lili Su, Aidong Adam Ding, Yunsi Fei:
Non-transferable Pruning. CoRR abs/2410.08015 (2024) - 2023
- [j12]Ziyue Zhang, A. Adam Ding, Yunsi Fei:
A Guessing Entropy-Based Framework for Deep Learning-Assisted Side-Channel Analysis. IEEE Trans. Inf. Forensics Secur. 18: 3018-3030 (2023) - [c24]Ruyi Ding, Cheng Gongye, Siyue Wang, A. Adam Ding, Yunsi Fei:
EMShepherd: Detecting Adversarial Samples via Side-channel Leakage. AsiaCCS 2023: 300-313 - [c23]Xiang Zhang, Aidong Adam Ding, Yunsi Fei:
Deep-Learning Model Extraction Through Software-Based Power Side-Channel. ICCAD 2023: 1-9 - [i20]Ruyi Ding, Cheng Gongye, Siyue Wang, Aidong Adam Ding, Yunsi Fei:
EMShepherd: Detecting Adversarial Samples via Side-channel Leakage. CoRR abs/2303.15571 (2023) - 2022
- [j11]Konstantinos Athanasiou, Thomas Wahl, A. Adam Ding, Yunsi Fei:
Masking Feedforward Neural Networks Against Power Analysis Attacks. Proc. Priv. Enhancing Technol. 2022(1): 501-521 (2022) - [c22]Xupeng Shi, Pengfei Zheng, A. Adam Ding, Yuan Gao, Weizhong Zhang:
Finding Dynamics Preserving Adversarial Winning Tickets. AISTATS 2022: 510-528 - [c21]Ruyi Ding, Ziyue Zhang, Xiang Zhang, Cheng Gongye, Yunsi Fei, Aidong Adam Ding:
A Cross-Platform Cache Timing Attack Framework via Deep Learning. DATE 2022: 676-681 - [c20]Xiang Zhang, Ziyue Zhang, Ruyi Ding, Cheng Gongye, Aidong Adam Ding, Yunsi Fei:
Ran$Net: An Anti-Ransomware Methodology based on Cache Monitoring and Deep Learning. ACM Great Lakes Symposium on VLSI 2022: 487-492 - [c19]Xupeng Shi, A. Adam Ding:
Understanding and Quantifying Adversarial Examples Existence in Linear Classification. ICMLC 2022: 138-143 - [i19]A. Adam Ding, Samuel S. Wu, Guanhong Miao, Shigang Chen:
Achieving Differential Privacy with Matrix Masking in Big Data. CoRR abs/2201.04211 (2022) - [i18]Guanhong Miao, A. Adam Ding, Samuel S. Wu:
Linear Model with Local Differential Privacy. CoRR abs/2202.02448 (2022) - [i17]Guanhong Miao, A. Adam Ding, Samuel S. Wu:
Real-time disease prediction with local differential privacy in Internet of Medical Things. CoRR abs/2202.03652 (2022) - [i16]Xupeng Shi, Pengfei Zheng, A. Adam Ding, Yuan Gao, Weizhong Zhang:
Finding Dynamics Preserving Adversarial Winning Tickets. CoRR abs/2202.06488 (2022) - 2020
- [j10]Aidong Adam Ding, Guanhong Miao, Samuel Shangwu Wu:
On the Privacy and Utility Properties of Triple Matrix-Masking. J. Priv. Confidentiality 10(2) (2020) - [j9]Ziyue Zhang, A. Adam Ding, Yunsi Fei:
A Fast and Accurate Guessing Entropy Estimation Algorithm for Full-key Recovery. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(2): 26-48 (2020) - [c18]Konstantinos Athanasiou, Thomas Wahl, A. Adam Ding, Yunsi Fei:
Automatic Detection and Repair of Transition- Based Leakage in Software Binaries. VSTTE 2020: 50-67 - [i15]Zhen Hang Jiang, Yunsi Fei, Aidong Adam Ding, Thomas Wahl:
MemPoline: Mitigating Memory-based Side-Channel Attacks through Memory Access Obfuscation. IACR Cryptol. ePrint Arch. 2020: 653 (2020)
2010 – 2019
- 2019
- [j8]Chao Luo, Yunsi Fei, Aidong Adam Ding, Pau Closas:
Comprehensive Side-Channel Power Analysis of XTS-AES. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 38(12): 2191-2200 (2019) - [j7]Liwei Zhang, A. Adam Ding, Yunsi Fei, Pei Luo:
Efficient Nonprofiling 2nd-Order Power Analysis on Masked Devices Utilizing Multiple Leakage Points. IEEE Trans. Dependable Secur. Comput. 16(5): 843-855 (2019) - [i14]Xupeng Shi, A. Adam Ding:
Understanding and Quantifying Adversarial Examples Existence in Linear Classification. CoRR abs/1910.12163 (2019) - 2018
- [j6]Chao Luo, Yunsi Fei, Liwei Zhang, A. Adam Ding, Pei Luo, Saoni Mukherjee, David R. Kaeli:
Power Analysis Attack of an AES GPU Implementation. J. Hardw. Syst. Secur. 2(1): 69-82 (2018) - [c17]Majid Sabbagh, Yunsi Fei, Thomas Wahl, A. Adam Ding:
SCADET: a side-channel attack detection tool for tracking prime+probe. ICCAD 2018: 107 - 2017
- [j5]Pei Luo, Yunsi Fei, Liwei Zhang, A. Adam Ding:
Differential Fault Analysis of SHA-3 Under Relaxed Fault Models. J. Hardw. Syst. Secur. 1(2): 156-172 (2017) - [j4]A. Adam Ding, Jennifer G. Dy, Yi Li, Yale Chang:
A Robust-Equitable Measure for Feature Ranking and Selection. J. Mach. Learn. Res. 18: 71:1-71:46 (2017) - [c16]Yi Li, Aidong Adam Ding, Jennifer G. Dy:
Rate Optimal Estimation for High Dimensional Spatial Covariance Matrices. ACML 2017: 208-223 - [c15]A. Adam Ding, Liwei Zhang, François Durvaux, François-Xavier Standaert, Yunsi Fei:
Towards Sound and Optimal Leakage Detection Procedure. CARDIS 2017: 105-122 - [c14]Chao Luo, Yunsi Fei, A. Adam Ding:
Side-channel power analysis of XTS-AES. DATE 2017: 1330-1335 - [c13]Pei Luo, Konstantinos Athanasiou, Liwei Zhang, Zhen Hang Jiang, Yunsi Fei, A. Adam Ding, Thomas Wahl:
Compiler-Assisted Threshold Implementation against Power Analysis Attacks. ICCD 2017: 541-544 - [i13]Liwei Zhang, A. Adam Ding, François Durvaux, François-Xavier Standaert, Yunsi Fei:
Towards Sound and Optimal Leakage Detection Procedure. IACR Cryptol. ePrint Arch. 2017: 287 (2017) - [i12]Pei Luo, Yunsi Fei, Liwei Zhang, A. Adam Ding:
Differential Fault Analysis of SHA-3 under Relaxed Fault Models. IACR Cryptol. ePrint Arch. 2017: 858 (2017) - 2016
- [c12]Yale Chang, Yi Li, A. Adam Ding, Jennifer G. Dy:
A Robust-Equitable Copula Dependence Measure for Feature Selection. AISTATS 2016: 84-92 - [c11]A. Adam Ding, Cong Chen, Thomas Eisenbarth:
Simpler, Faster, and More Robust T-Test Based Leakage Detection. COSADE 2016: 163-183 - [c10]Pei Luo, Yunsi Fei, Liwei Zhang, A. Adam Ding:
Differential Fault Analysis of SHA3-224 and SHA3-256. FDTC 2016: 4-15 - [c9]Yu Han, Yunsi Fei, A. Adam Ding:
SMARP: A Stochastic MAC Protocol with Randomized Power Control for Underwater Sensor Networks. SECON 2016: 1-9 - [i11]Pei Luo, Liwei Zhang, Yunsi Fei, A. Adam Ding:
An Improvement of Both Security and Reliability for Keccak Implementations on Smart Card. IACR Cryptol. ePrint Arch. 2016: 214 (2016) - [i10]Liwei Zhang, A. Adam Ding, Yunsi Fei, Pei Luo:
A Unified Metric for Quantifying Information Leakage of Cryptographic Devices under Power Analysis Attacks. IACR Cryptol. ePrint Arch. 2016: 297 (2016) - [i9]Pei Luo, Yunsi Fei, Liwei Zhang, A. Adam Ding:
Differential Fault Analysis of SHA3-224 and SHA3-256. IACR Cryptol. ePrint Arch. 2016: 709 (2016) - [i8]Liwei Zhang, A. Adam Ding, Yunsi Fei, Zhen Hang Jiang:
Statistical Analysis for Access-Driven Cache Attacks Against AES. IACR Cryptol. ePrint Arch. 2016: 970 (2016) - 2015
- [j3]Yunsi Fei, A. Adam Ding, Jian Lao, Liwei Zhang:
A statistics-based success rate model for DPA and CPA. J. Cryptogr. Eng. 5(4): 227-243 (2015) - [c8]Pei Luo, Liwei Zhang, Yunsi Fei, A. Adam Ding:
Towards secure cryptographic software implementation against side-channel power analysis attacks. ASAP 2015: 144-148 - [c7]Liwei Zhang, A. Adam Ding, Yunsi Fei, Pei Luo:
A Unified Metric for Quantifying Information Leakage of Cryptographic Devices Under Power Analysis Attacks. ASIACRYPT (2) 2015: 338-360 - [c6]Liwei Zhang, A. Adam Ding, Yunsi Fei, Pei Luo:
Efficient 2nd-order power analysis on masked devices utilizing multiple leakage. HOST 2015: 118-123 - [c5]Pei Luo, Yunsi Fei, Xin Fang, A. Adam Ding, David R. Kaeli, Miriam Leeser:
Side-channel analysis of MAC-Keccak hardware implementations. HASP@ISCA 2015: 1:1-1:8 - [i7]Pei Luo, Yunsi Fei, Xin Fang, A. Adam Ding, David R. Kaeli, Miriam Leeser:
Side-Channel Analysis of MAC-Keccak Hardware Implementations. IACR Cryptol. ePrint Arch. 2015: 411 (2015) - [i6]Pei Luo, Liwei Zhang, Yunsi Fei, A. Adam Ding:
Towards Secure Cryptographic Software Implementation Against Side-Channel Power Analysis Attacks. IACR Cryptol. ePrint Arch. 2015: 717 (2015) - [i5]A. Adam Ding, Cong Chen, Thomas Eisenbarth:
Simpler, Faster, and More Robust T-test Based Leakage Detection. IACR Cryptol. ePrint Arch. 2015: 1215 (2015) - 2014
- [c4]A. Adam Ding, Liwei Zhang, Yunsi Fei, Pei Luo:
A Statistical Model for Higher Order DPA on Masked Devices. CHES 2014: 147-169 - [c3]Pei Luo, Yunsi Fei, Xin Fang, A. Adam Ding, Miriam Leeser, David R. Kaeli:
Power analysis attack on hardware implementation of MAC-Keccak on FPGAs. ReConFig 2014: 1-7 - [c2]Pei Luo, Yunsi Fei, Liwei Zhang, A. Adam Ding:
Side-channel power analysis of different protection schemes against fault attacks on AES. ReConFig 2014: 1-6 - [i4]Yunsi Fei, A. Adam Ding, Jian Lao, Liwei Zhang:
A Statistics-based Fundamental Model for Side-channel Attack Analysis. IACR Cryptol. ePrint Arch. 2014: 152 (2014) - [i3]A. Adam Ding, Liwei Zhang, Yunsi Fei, Pei Luo:
A Statistical Model for Higher Order DPA on Masked Devices. IACR Cryptol. ePrint Arch. 2014: 433 (2014) - [i2]Pei Luo, Yunsi Fei, Xin Fang, A. Adam Ding, Miriam Leeser, David R. Kaeli:
Power Analysis Attack on Hardware Implementation of MAC-Keccak on FPGAs. IACR Cryptol. ePrint Arch. 2014: 854 (2014) - [i1]Pei Luo, Yunsi Fei, Liwei Zhang, A. Adam Ding:
Side-channel Power Analysis of Different Protection Schemes Against Fault Attacks on AES. IACR Cryptol. ePrint Arch. 2014: 875 (2014) - 2012
- [c1]Yunsi Fei, Qiasi Luo, A. Adam Ding:
A Statistical Model for DPA with Novel Algorithmic Confusion Analysis. CHES 2012: 233-250
2000 – 2009
- 2003
- [j2]Aidong Adam Ding, Xiali He:
Backpropagation of pseudo-errors: neural networks that are adaptive to heterogeneous noise. IEEE Trans. Neural Networks 14(2): 253-262 (2003)
1990 – 1999
- 1999
- [j1]Aidong Adam Ding:
Neural-network prediction with noisy predictors. IEEE Trans. Neural Networks 10(5): 1196-1203 (1999)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint