Zobrazeno 1 - 10
of 27
pro vyhledávání: '"XIAOXUAN LOU"'
Autor:
Fan Zhang, Xiaoxuan Lou, Xinjie Zhao, Shivam Bhasin, Wei He, Ruyi Ding, Samiya Qureshi, Kui Ren
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2018, Iss 3 (2018)
Persistence is an intrinsic nature for many errors yet has not been caught enough attractions for years. In this paper, the feature of persistence is applied to fault attacks, and the persistent fault attack is proposed. Different from traditional fa
Externí odkaz:
https://doaj.org/article/224b4006407341fe8dbb0a1da058e06a
Publikováno v:
Energies, Vol 7, Iss 8, Pp 5425-5443 (2014)
The influence of electric vehicle charging stations on power grid harmonics is becoming increasingly significant as their presence continues to grow. This paper studies the operational principles of the charging current in the continuous and disconti
Externí odkaz:
https://doaj.org/article/10c24e1d47de46e185bad0676313a487
Publikováno v:
The Scientific World Journal, Vol 2014 (2014)
Unbalanced grid faults will lead to several drawbacks in the output power quality of photovoltaic generation (PV) converters, such as power fluctuation, current amplitude swell, and a large quantity of harmonics. The aim of this paper is to propose a
Externí odkaz:
https://doaj.org/article/9e4ea319240946a794945d59ac106cdc
Publikováno v:
Energies, Vol 9, Iss 4, p 277 (2016)
This paper presents an improved current source equivalent model method to determine the short-circuit current of a distribution system with multiple fixed-speed and variable-speed induction generators (IGs). The correlation coefficients of flux compo
Externí odkaz:
https://doaj.org/article/4f6fce1591f94d34b2f35aab7da1bb78
Autor:
XIAOXUAN LOU1 XIAOXUAN001@e.ntu.edu.sg, TIANWEI ZHANG1 tianwei.zhang@ntu.edu.sg, JUN JIANG2 jiangcj@pathsec.org, YINQIAN ZHANG3 yinqianz@acm.org
Publikováno v:
ACM Computing Surveys. Jul2022, Vol. 54 Issue 6, p1-37. 37p.
Publikováno v:
IEEE Transactions on Circuits and Systems for Video Technology. 32:8078-8093
Deep Neural Networks (DNN) are gaining higher commercial values in computer vision applications, e.g., image classification, video analytics, etc. This calls for urgent demands of the intellectual property (IP) protection of DNN models. In this paper
Side-channel attacks have become a severe threat to the confidentiality of computer applications and systems. One popular type of such attacks is the microarchitectural attack, where the adversary exploits the hardware features to break the protectio
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5873e6cb60a5412fe6936355bd4901c3
http://arxiv.org/abs/2103.14244
http://arxiv.org/abs/2103.14244
Autor:
Xinjie Zhao, Xiaoxuan Lou, Shivam Bhasin, Shize Guo, Bolin Yang, Guorui Xu, Kui Ren, Fan Zhang
Publikováno v:
Frontiers in Hardware Security and Trust; Theory, design and practice ISBN: 9781785619274
Persistence is an intrinsic nature of many errors yet has not been caught enough attractions for years. In this chapter, the feature of persistence is applied to fault attacks (FAs), and the persistent FA is proposed. Different from traditional FAs,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f996e16c80d0036582211ce2f1510e32
https://doi.org/10.1049/pbcs066e_ch2
https://doi.org/10.1049/pbcs066e_ch2
Publikováno v:
DAC
The convergence of edge computing and deep learning empowers endpoint hardwares or edge devices to perform inferences locally with the help of deep neural network (DNN) accelerator. This trend of edge intelligence invites new attack vectors, which ar
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4ad23c475e932edb7772f39651671221
https://hdl.handle.net/10356/145856
https://hdl.handle.net/10356/145856
Publikováno v:
Information Security and Cryptology ISBN: 9783030429201
Inscrypt
Inscrypt
Block ciphers with Feistel structures are vulnerable to a specific type of cache attacks named differential cache attacks. The attacks leverage side-channel leakages from cache and differential property of cipher component to reveal the master key of
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ac934c32e674503c67fe227e3035d468
https://doi.org/10.1007/978-3-030-42921-8_29
https://doi.org/10.1007/978-3-030-42921-8_29