default search action
Huiyun Li
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j33]Zujia Miao, Cuiping Shao, Huiyun Li, Yunduan Cui, Zhimin Tang:
Adaptive sensor attack detection and defense framework for autonomous vehicles based on density. Comput. Secur. 148: 104149 (2025) - 2024
- [j32]Le Sun, Huiyun Li, Ghulam Muhammad:
A Metaverse text recognition model based on character-level contrastive learning. Appl. Soft Comput. 149(Part A): 110969 (2024) - [j31]Le Sun, Huiyun Li, Ghulam Muhammad:
Randomized attention and dual-path system for electrocardiogram identity recognition. Eng. Appl. Artif. Intell. 132: 107883 (2024) - [j30]Le Sun, Yueyuan Wang, Huiyun Li, Ghulam Muhammad:
Fine-grained vulnerability detection for medical sensor systems. Internet Things 28: 101362 (2024) - [j29]Cuiping Shao, Dongyan Zhao, Huiyun Li, Song Cheng, Shunxian Gao, Liuqing Yang:
Detection of security vulnerabilities in cryptographic ICs against fault injection attacks based on compressed sensing and basis pursuit. J. Cryptogr. Eng. 14(1): 57-70 (2024) - [j28]Qingyi Liang, Jia Liu, Zhengmin Jiang, Jianwen Yin, Kun Xu, Huiyun Li:
Limited Information Aggregation for Collaborative Driving in Multi-Agent Autonomous Vehicles. IEEE Robotics Autom. Lett. 9(7): 6624-6631 (2024) - [j27]Jia Liu, Jianwen Yin, Zhengmin Jiang, Qingyi Liang, Huiyun Li:
Attention-Based Distributional Reinforcement Learning for Safe and Efficient Autonomous Driving. IEEE Robotics Autom. Lett. 9(9): 7477-7484 (2024) - [j26]Yunduan Cui, Wenbo Shi, Huan Yang, Cuiping Shao, Lei Peng, Huiyun Li:
Probabilistic Model-Based Reinforcement Learning Unmanned Surface Vehicles Using Local Update Sparse Spectrum Approximation. IEEE Trans. Ind. Informatics 20(2): 1283-1293 (2024) - [j25]Zhengmin Jiang, Jia Liu, Peng Sun, Ming Sang, Huiyun Li, Yi Pan:
Generation of Risky Scenarios for Testing Automated Driving Visual Perception Based on Causal Analysis. IEEE Trans. Intell. Transp. Syst. 25(11): 15991-16004 (2024) - [j24]Jia Liu, Yunduan Cui, Jianghua Duan, Zhengmin Jiang, Zhongming Pan, Kun Xu, Huiyun Li:
Reinforcement Learning-Based High-Speed Path Following Control for Autonomous Vehicles. IEEE Trans. Veh. Technol. 73(6): 7603-7615 (2024) - [c62]Zhengmin Jiang, Jia Liu, Ming Sang, Huiyun Li, Yi Pan:
Critical Test Cases Generalization for Autonomous Driving Object Detection Algorithms. IV 2024: 1149-1156 - [c61]Qingyi Liang, Zhengmin Jiang, Jianwen Yin, Lei Peng, Jia Liu, Huiyun Li:
Efficient Collaborative Multi-Agent Driving via Cross-Attention and Concise Communication. IV 2024: 2391-2396 - [c60]Zhengmin Jiang, Jia Liu, Huiyun Li, Yi Pan:
Efficient and Unbiased Safety Test for Autonomous Driving Systems. IV 2024: 3156 - 2023
- [j23]Renxing Li, Zhiwei Shang, Chunhua Zheng, Huiyun Li, Qing Liang, Yunduan Cui:
Efficient distributional reinforcement learning with Kullback-Leibler divergence regularization. Appl. Intell. 53(21): 24847-24863 (2023) - [j22]Shah Saud, Abdul Haseeb, Songsheng Chen, Huiyun Li:
The role of information and communication technology and financial development in shaping a low-carbon environment: a Belt and Road journey toward development. Inf. Technol. Dev. 29(1): 83-102 (2023) - [j21]Jia Liu, Huiyun Li, Zhiheng Yang, Shaobo Dang, Zhejun Huang:
Deep Dense Network-Based Curriculum Reinforcement Learning for High-Speed Overtaking. IEEE Intell. Transp. Syst. Mag. 15(1): 453-466 (2023) - [j20]Dan Wang, Huiyun Li, Xin-Wei Liu:
A Robust Fixed-Time Piecewise Dynamic Network for Convex Programming. Neural Process. Lett. 55(8): 11541-11558 (2023) - [j19]Zhengmin Jiang, Wenbo Pan, Jia Liu, Shaobo Dang, Zhiheng Yang, Huiyun Li, Yi Pan:
Efficient and Unbiased Safety Test for Autonomous Driving Systems. IEEE Trans. Intell. Veh. 8(5): 3336-3348 (2023) - [c59]Jianwen Yin, Zhengmin Jiang, Qingyi Liang, Wenfei Li, Zhongming Pan, Huiyun Li, Jia Liu:
Efficient-Enhanced Reinforcement Learning for Autonomous Driving in Urban Traffic Scenarios. ITSC 2023: 887-893 - [i5]Zhiheng Ma, Xiaopeng Hong, Beinan Liu, Yabin Wang, Pinyue Guo, Huiyun Li:
Remind of the Past: Incremental Learning with Analogical Prompts. CoRR abs/2303.13898 (2023) - [i4]Wenjun Huang, Yunduan Cui, Huiyun Li, Xinyu Wu:
Practical Probabilistic Model-based Deep Reinforcement Learning by Integrating Dropout Uncertainty and Trajectory Sampling. CoRR abs/2309.11089 (2023) - [i3]Chenyang Miao, Yunduan Cui, Huiyun Li, Xinyu Wu:
Effective Multi-Agent Deep Reinforcement Learning Control with Relative Entropy Regularization. CoRR abs/2309.14727 (2023) - 2022
- [j18]Cuiping Shao, Huiyun Li, Guanghua Du, Jinlong Guo, Zujia Miao, Hongmei Zhu:
Fault Tolerance Method for Memory Based on Inner Product Similarity and Experimental Study on Heavy Ion Irradiation. J. Circuits Syst. Comput. 31(18): 2240006:1-2240006:21 (2022) - [j17]Yunduan Cui, Lei Peng, Huiyun Li:
Filtered Probabilistic Model Predictive Control-Based Reinforcement Learning for Unmanned Surface Vehicles. IEEE Trans. Ind. Informatics 18(10): 6950-6961 (2022) - [c58]Cuiping Shao, Zujia Miao, Beizhang Chen, Yunduan Cui, Huiyun Li, Hongfeng Shu:
An Attack Detection Method Based on Spatiotemporal Correlation for Autonomous Vehicles Sensors. ITSC 2022: 2187-2193 - [c57]Lei Xia, Cuiping Shao, Huiyun Li, Yunduan Cui:
Robust Model-based Reinforcement Learning USV System Guided by Lyapunov Neural Networks. ROBIO 2022: 1976-1981 - [c56]Mei Yang, Chong Liu, Huiyun Li, Cuiping Shao:
Efficient SM2 Hardware Design for Digital Signature of Internet of Vehicles. TrustCom 2022: 890-896 - 2021
- [j16]Wenfei Li, Huiyun Li, Kun Xu, Zhejun Huang, Ke Li, Haiping Du:
Estimation of Vehicle Dynamic Parameters Based on the Two-Stage Estimation Method. Sensors 21(11): 3711 (2021) - [j15]Zhejun Huang, Huiyun Li, Wenfei Li, Jia Liu, Chao Huang, Zhiheng Yang, Wenqi Fang:
A New Trajectory Tracking Algorithm for Autonomous Vehicles Based on Model Predictive Control. Sensors 21(21): 7165 (2021) - [j14]Haichao Zhou, Huiyun Li, Qingyun Chen, Lingxin Zhang:
Evaluation of Shear Stress Transport, Large Eddy Simulation and Detached Eddy Simulation for the Flow around a Statically Loaded Tire. Symmetry 13(8): 1319 (2021) - [c55]Naitian Deng, Yunduan Cui, Shitian Zhang, Huiyun Li:
Autonomous Vehicle Motion Planning using Kernelized Movement Primitives. ISNCC 2021: 1-6 - [c54]Zhaonan Yang, Huiyun Li:
Task Ordering Matters for Incremental Learning. ISNCC 2021: 1-6 - [c53]Shitian Zhang, Yunduan Cui, Naitian Deng, Huiyun Li:
Model Predictive Control of Autonomous Driving using Unscented Kalman Filter with Sparse Spectrum Gaussian Processes. ISNCC 2021: 1-6 - [c52]Xiaoxu Cao, Huiyun Li, Chunxiao Liu, Cong Qiu:
Vehicle Longitudinal and Lateral Dynamics Modeling by Deep Neural Network. RCAR 2021: 7-13 - [c51]Jia Liu, Zhiheng Yang, Zhejun Huang, Wenfei Li, Shaobo Dang, Huiyun Li:
Simulation Performance Evaluation of Pure Pursuit, Stanley, LQR, MPC Controller for Autonomous Vehicles. RCAR 2021: 1444-1449 - [c50]Zhiwei Shang, Huiyun Li, Yunduan Cui:
Shiftable Dynamic Policy Programming for Efficient and Robust Reinforcement Learning Control. ROBIO 2021: 1688-1693 - [i2]Xiaoyu Yang, Huiyun Li:
IA Planner: Motion Planning Using Instantaneous Analysis for Autonomous Vehicle in the Dense Dynamic Scenarios on Highways. CoRR abs/2103.10909 (2021) - 2020
- [j13]Hui Huang, Huiyun Li, Cuiping Shao, Tianfu Sun, Wenqi Fang, Shaobo Dang:
Data Redundancy Mitigation in V2X Based Collective Perceptions. IEEE Access 8: 13405-13418 (2020) - [j12]Lutao Chu, Huiyun Li, Zhiheng Yang:
Accurate scale estimation for visual tracking with significant deformation. IET Comput. Vis. 14(5): 278-287 (2020) - [c49]Xiwei Bai, Bo Zhang, Weisong Wen, Li-Ta Hsu, Huiyun Li:
Perception-aided Visual-Inertial Integrated Positioning in Dynamic Urban Areas. PLANS 2020: 1563-1571 - [c48]Beizhang Chen, Panwei Li, Huiyun Li:
Fast Loop Closures Detection Method for Geomagnetic Signal and Lidar Fusion. VTC Spring 2020: 1-6 - [c47]Panwei Li, Huiyun Li, Beizhang Chen:
A method of Monocular Visual Odometry Combining Feature points and Pixel Gradient for Dynamic Scene. VTC Spring 2020: 1-5 - [c46]Xiaoyu Yang, Huiyun Li:
Model Predictive Motion Planning for Autonomous Vehicle in Mid-high Overtaking Scene. VTC Spring 2020: 1-5 - [i1]Wenqi Fang, Huiyun Li, Hui Huang, Shaobo Dang, Zhejun Huang, Zheng Wang:
Sparse Gaussian Process Based On Hat Basis Functions. CoRR abs/2006.08117 (2020)
2010 – 2019
- 2019
- [j11]Huiyun Li, Cuiping Shao, Zheng Wang:
Detecting Fault Injection Attacks Based on Compressed Sensing and Integer Linear Programming. IEEE Trans. Dependable Secur. Comput. 16(3): 476-483 (2019) - [j10]Cuiping Shao, Huiyun Li, Jiayan Fang, Qihua Deng:
An Error Location and Correction Method for Memory Based on Data Similarity Analysis. IEEE Trans. Very Large Scale Integr. Syst. 27(10): 2354-2364 (2019) - [c45]Wenqi Fang, Huiyun Li, Shaobo Dang, Hui Huang, Lei Peng, Li-Ta Hsu, Weisong Wen:
Combining Deep Gaussian Process and Rule-Based Method for Decision-Making in Self-Driving Simulation with Small Data. CIS 2019: 267-271 - [c44]Lutao Chu, Huiyun Li:
Regressive Scale Estimation for Visual Tracking. ICIT 2019: 893-898 - [c43]Hui Huang, Wenqi Fang, Huiyun Li:
Performance Modelling of V2V based Collective Perceptions in Connected and Autonomous Vehicles. LCN 2019: 356-363 - [c42]Weixing Xiao, Jie Zou, Huiyun Li, Kun Xu:
Smooth Trajectory Tracking Using Longitudinal Distance Constraint for A 4WS4WD Unmanned Ground Vehicle. ROBIO 2019: 2105-2110 - [c41]Hao Sun, Huiyun Li, Yudong Li, Zhibin Song, Kun Xu:
Accelerating the Validation of Motion Control for a 4WD4WS Ground Vehicle Using a Hierarchical Controller Hardware-in-the-loop System∗. ROBIO 2019: 2396-2401 - 2018
- [j9]Cuiping Shao, Huiyun Li:
Identifying Single-Event Transient Location Based on Compressed Sensing. IEEE Trans. Very Large Scale Integr. Syst. 26(4): 768-777 (2018) - [c40]Wenda Li, Xianjie Meng, Zheng Wang, Wenqi Fang, Jie Zou, Huiyun Li, Tianfu Sun, Jianing Liang:
Low-cost vector map assisted navigation strategy for autonomous vehicle. APCCAS 2018: 536-539 - [c39]Matej Kristan, Ales Leonardis, Jiri Matas, Michael Felsberg, Roman P. Pflugfelder, Luka Cehovin Zajc, Tomás Vojír, Goutam Bhat, Alan Lukezic, Abdelrahman Eldesokey, Gustavo Fernández, Álvaro García-Martín, Álvaro Iglesias-Arias, A. Aydin Alatan, Abel González-García, Alfredo Petrosino, Alireza Memarmoghadam, Andrea Vedaldi, Andrej Muhic, Anfeng He, Arnold W. M. Smeulders, Asanka G. Perera, Bo Li, Boyu Chen, Changick Kim, Changsheng Xu, Changzhen Xiong, Cheng Tian, Chong Luo, Chong Sun, Cong Hao, Daijin Kim, Deepak Mishra, Deming Chen, Dong Wang, Dongyoon Wee, Efstratios Gavves, Erhan Gundogdu, Erik Velasco-Salido, Fahad Shahbaz Khan, Fan Yang, Fei Zhao, Feng Li, Francesco Battistone, George De Ath, Gorthi R. K. Sai Subrahmanyam, Guilherme Sousa Bastos, Haibin Ling, Hamed Kiani Galoogahi, Hankyeol Lee, Haojie Li, Haojie Zhao, Heng Fan, Honggang Zhang, Horst Possegger, Houqiang Li, Huchuan Lu, Hui Zhi, Huiyun Li, Hyemin Lee, Hyung Jin Chang, Isabela Drummond, Jack Valmadre, Jaime Spencer Martin, Javaan Singh Chahl, Jin Young Choi, Jing Li, Jinqiao Wang, Jinqing Qi, Jinyoung Sung, Joakim Johnander, João F. Henriques, Jongwon Choi, Joost van de Weijer, Jorge Rodríguez Herranz, José M. Martínez, Josef Kittler, Junfei Zhuang, Junyu Gao, Klemen Grm, Lichao Zhang, Lijun Wang, Lingxiao Yang, Litu Rout, Liu Si, Luca Bertinetto, Lutao Chu, Manqiang Che, Mario Edoardo Maresca, Martin Danelljan, Ming-Hsuan Yang, Mohamed H. Abdelpakey, Mohamed S. Shehata, Myunggu Kang, Namhoon Lee, Ning Wang, Ondrej Miksik, Payman Moallem, Pablo Vicente-Moñivar, Pedro Senna, Peixia Li, Philip H. S. Torr, Priya Mariam Raju, Ruihe Qian, Qiang Wang, Qin Zhou, Qing Guo, Rafael Martin Nieto, Rama Krishna Sai Subrahmanyam Gorthi, Ran Tao, Richard Bowden, Richard M. Everson, Runling Wang, Sangdoo Yun, Seokeon Choi, Sergio Vivas, Shuai Bai, Shuangping Huang, Sihang Wu, Simon Hadfield, Siwen Wang, Stuart Golodetz, Ming Tang, Tianyang Xu, Tianzhu Zhang, Tobias Fischer, Vincenzo Santopietro, Vitomir Struc, Wei Wang, Wangmeng Zuo, Wei Feng, Wei Wu, Wei Zou, Weiming Hu, Wengang Zhou, Wenjun Zeng, Xiaofan Zhang, Xiaohe Wu, Xiao-Jun Wu, Xinmei Tian, Yan Li, Yan Lu, Yee Wei Law, Yi Wu, Yiannis Demiris, Yicai Yang, Yifan Jiao, Yuhong Li, Yunhua Zhang, Yuxuan Sun, Zheng Zhang, Zheng Zhu, Zhen-Hua Feng, Zhihui Wang, Zhiqun He:
The Sixth Visual Object Tracking VOT2018 Challenge Results. ECCV Workshops (1) 2018: 3-53 - [c38]Huiyun Li, Jing Shi, Shaoyan Fu:
Institutional investors and information disclosure: empirical evidence from china. ICBDT 2018: 125-129 - [c37]Huiyun Li, Shaoyan Fu, Di Liu, Jing Shi:
Voluntary disclosure and cost of equity capital: the impact of marketization. ICBDT 2018: 130-135 - [c36]Wan Zou, Huacheng Zhang, Lei Peng, Huiyun Li:
Application of DCGAN in Data Repair of Parking Lots. ICIA 2018: 127-132 - [c35]Shi Dong, Mingsong Chen, Lei Peng, Huiyun Li:
Parking rank: A novel method of parking lots sorting and recommendation based on public information. ICIT 2018: 1381-1386 - [c34]Xiangyan Fang, Rong Xiang, Lei Peng, Huiyun Li, Yuqiang Sun:
SAW: A Hybrid Prediction Model for Parking Occupancy Under the Environment of Lacking Real-Time Data. IECON 2018: 3134-3137 - [c33]Junta Wu, Huiyun Li:
Aggregated Multi-deep Deterministic Policy Gradient for Self-driving Policy. IOV 2018: 179-192 - [c32]Yuqiang Sun, Lei Peng, Huiyun Li, Min Sun:
Exploration on Spatiotemporal Data Repairing of Parking Lots Based on Recurrent GANs. ITSC 2018: 467-472 - [c31]Min Sun, Zhongmin Li, Lei Peng, Huiyun Li, Xiangyan Fang:
FLOPS: An Efficient and High-precision Prediction on Available Parking Spaces in a Long Time-span. ITSC 2018: 2937-2942 - [c30]Zhiheng Yang, Jun Li, Huiyun Li:
Real-time Pedestrian and Vehicle Detection for Autonomous Driving. Intelligent Vehicles Symposium 2018: 179-184 - [c29]Cuiping Shao, Huiyun Li, Zhiheng Yang, Jiayan Fang:
Adaptive Balance of Quality-resources of Neural Networks with Principle Component Analysis. TENCON 2018: 2253-2258 - 2017
- [j8]Cuiping Shao, Huiyun Li, Jianbin Zhou:
Fast and automatic security test on cryptographic ICs against fault injection attacks based on design for security test. IET Inf. Secur. 11(6): 312-318 (2017) - [c28]Xinling Zhou, Mingsong Chen, Lei Peng, Huiyun Li:
ACPP: An effective privacy preserving scheme for precise location sharing in internet of vehicles. ICIA 2017: 883-887 - [c27]Hongwei Zhu, Jianming Liu, Lei Peng, Huiyun Li:
Real-Time parking guidance model based on stackelberg game. ICIA 2017: 888-893 - [c26]Cuiping Shao, Huiyun Li:
Detection of Single Event Transients Based on Compressed Sensing. TrustCom/BigDataSE/ICESS 2017: 83-88 - 2016
- [j7]Wei Zhang, Huiyun Li, Zhaohai Li, Qizhai Li:
A two-phase procedure for non-normal quantitative trait genetic association study. BMC Bioinform. 17: 52 (2016) - [c25]Huiyun Li, Xin Qian, Wei Li:
Image Semantic Segmentation Based on Fully Convolutional Neural Network and CRF. GRMSE (1) 2016: 245-250 - [c24]Baopu Li, Haoyang Jin, Qi Zhang, Wei Xia, Huiyun Li:
Indoor human detection using RGB-D images. ICIA 2016: 1354-1360 - [c23]Wei Xia, Huiyun Li, Baopu Li:
A Control Strategy of Autonomous Vehicles Based on Deep Reinforcement Learning. ISCID (2) 2016: 198-201 - [c22]Lei Peng, Huiyun Li:
Searching parking spaces in urban environments based on non-stationary Poisson process analysis. ITSC 2016: 1951-1956 - 2015
- [j6]Chunjie Zhou, Shuang Huang, Naixue Xiong, Shuang-Hua Yang, Huiyun Li, Yuanqing Qin, Xuan Li:
Design and Analysis of Multimodel-Based Anomaly Intrusion Detection Systems in Industrial Process Automation. IEEE Trans. Syst. Man Cybern. Syst. 45(10): 1345-1360 (2015) - [j5]Xiaolong Zhang, Huiyun Li, Li Jiang, Qiang Xu:
A Low-Cost TSV Test and Diagnosis Scheme Based on Binary Search Method. IEEE Trans. Very Large Scale Integr. Syst. 23(11): 2639-2647 (2015) - [c21]Li Jiang, Xiangwei Huang, Hongfeng Xie, Qiang Xu, Chao Li, Xiaoyao Liang, Huiyun Li:
A novel TSV probing technique with adhesive test interposer. ICCD 2015: 597-604 - [c20]Hongfeng Xie, Huiyun Li, Guoqing Xu:
Hardware Trojan prevention based on Fully Homomorphic Encryption. ICIA 2015: 1104-1109 - [c19]Ye Tang, Huiyun Li, Guoqing Xu:
Cache Side-Channel Attack to Recover Plaintext against Datagram TLS. ICITCS 2015: 1-6 - 2014
- [c18]Liang Dai, Huiyun Li, Guoqing Xu, Liying Xiong:
A Statistical Model to Predict Success Rate of Ion Fault Injection Attacks for Cryptographic ICs. CIS 2014: 430-434 - [c17]Huiyun Li, Lin Zhang, Wenchao Lv:
A Study of the Status of Chinese Listed Companies' Voluntary Disclosure. ES 2014: 155-159 - [c16]Cuiping Shao, Huiyun Li, Guoqing Xu, Xiaobo Hu:
Design for security test on cryptographic ICs for design-time security evaluation. IDT 2014: 1-6 - [c15]Can Ye, Huiyun Li, Guoqing Xu:
An early warning model of traffic accidents based on fractal theory. ITSC 2014: 2280-2285 - [c14]Shaobo Su, Huiyun Li, Guoqing Xu:
Through-silicon via placement with shuffled frog leap algorithm. ROBIO 2014: 2036-2042 - 2013
- [c13]Peng Luo, Huiyun Li, Guoqing Xu, Lei Peng:
Threat on Physical Layer Security: Side Channel vs. Wiretap Channel. CSE 2013 - 2012
- [j4]Huiyun Li, Hai Yuan:
Dependability evaluation of integrated circuits at design time against laser fault injection. Secur. Commun. Networks 5(5): 450-461 (2012) - [j3]Keke Wu, Huiyun Li, Dingju Zhu:
Fast and scalable parallel processing of scalar multiplication in elliptic curve cryptosystems. Secur. Commun. Networks 5(6): 648-657 (2012) - [c12]Qiang Xu, Li Jiang, Huiyun Li, Bill Eklow:
Yield enhancement for 3D-stacked ICs: Recent advances and challenges. ASP-DAC 2012: 731-737 - 2011
- [j2]Huiyun Li, Keke Wu, Fengqi Yu:
Enhanced correlation power analysis attack against trusted systems. Secur. Commun. Networks 4(1): 3-10 (2011) - [c11]Keke Wu, Huiyun Li, XuCheng Yin, Guoqing Xu:
Elliptic Curve Isogenies to Resist Differential Side-Channel Analysis Attacks. CIS 2011: 939-943 - [c10]Huiyun Li, Qi Zhang, Hai Yuan:
Channel state information based key generation vs. side-channel analysis key information leakage. NSS 2011: 264-268 - [c9]Huiyun Li, Keke Wu, Guoqing Xu, Hai Yuan, Peng Luo:
Simple power analysis attacks using chosen message against ECC hardware implementations. WorldCIS 2011: 68-72 - 2010
- [j1]Keke Wu, Huiyun Li, Fengqi Yu:
Retrieving Lost Efficiency of Scalar Multiplications for Resisting against Side-Channel Attacks. J. Comput. 5(12): 1878-1884 (2010) - [c8]Huiyun Li, Keke Wu, Fengqi Yu, Hai Yuan:
Evaluation Metrics of Physical Non-invasive Security. WISTP 2010: 60-75
2000 – 2009
- 2009
- [c7]Keke Wu, Dawei Li, Huiyun Li, Tingding Chen, Fengqi Yu:
Partitioned Computation to Accelerate Scalar Multiplication for Elliptic Curve Cryptosystems. ICPADS 2009: 551-555 - 2008
- [c6]Keke Wu, Huiyun Li, Bo Peng, Fengqi Yu:
Correlation Power Analysis Attack against Synchronous Stream Ciphers. ICYCS 2008: 2067-2072 - [c5]Huiyun Li, Keke Wu, Bo Peng, Yiwei Zhang, Xinjian Zheng, Fengqi Yu:
Enhanced Correlation Power Analysis Attack on Smart Card. ICYCS 2008: 2143-2148 - 2006
- [b1]Huiyun Li:
Security evaluation at design time for cryptographic hardware. University of Cambridge, UK, 2006 - 2005
- [c4]Huiyun Li, A. Theodore Markettos, Simon W. Moore:
Security Evaluation Against Electromagnetic Analysis at Design Time. CHES 2005: 280-292 - [c3]Huiyun Li, A. Theodore Markettos, Simon W. Moore:
Security evaluation against electromagnetic analysis at design time. HLDVT 2005: 211-218 - 2003
- [c2]Jacques J. A. Fournier, Simon W. Moore, Huiyun Li, Robert D. Mullins, George S. Taylor:
Security Evaluation of Asynchronous Circuits. CHES 2003: 137-151 - 2001
- [c1]Huiyun Li, Bah-Hwee Gwee, Joseph Sylvester Chang:
A digital Class D amplifier design embodying a novel sampling process and pulse generator. ISCAS (4) 2001: 826-829
Coauthor Index
aka: Rama Krishna Sai Subrahmanyam Gorthi
aka: Gorthi R. K. Sai Subrahmanyam
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 20:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint