default search action
Ruize Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j4]Ruize Wang, Kalle Ngo, Joel Gärtner, Elena Dubrova:
Unpacking Needs Protection: A Single-Trace Secret Key Recovery Attack on Dilithium. IACR Commun. Cryptol. 1(3): 12 (2024) - [j3]Chunhui Liao, Ruize Wang, Cheng Lv, Tao Chen, Zhiyang Deng, Xiaochun Song:
Research on Alternating Current Field Measurement Method for Buried Defects of Titanium Alloy Aircraft Skin. Sensors 24(4): 1347 (2024) - [c24]Ruize Wang, Martin Brisfors, Elena Dubrova:
A Side-Channel Attack on a Higher-Order Masked CRYSTALS-Kyber Implementation. ACNS (3) 2024: 301-324 - [c23]Sönke Jendral, Kalle Ngo, Ruize Wang, Elena Dubrova:
Breaking SCA-Protected CRYSTALS-Kyber with a Single Trace. HOST 2024: 70-73 - [c22]Ruize Wang, Hui Xu, Ying Cheng, Qi He, Xing Zhou, Rui Feng, Wei Xu, Lei Huang, Jie Jiang:
ADSNet: Cross-Domain LTV Prediction with an Adaptive Siamese Network in Advertising. KDD 2024: 5872-5881 - [i16]Ruize Wang, Hui Xu, Ying Cheng, Qi He, Xing Zhou, Rui Feng, Wei Xu, Lei Huang, Jie Jiang:
ADSNet: Cross-Domain LTV Prediction with an Adaptive Siamese Network in Advertising. CoRR abs/2406.10517 (2024) - 2023
- [j2]Hangcheng Cao, Hongbo Jiang, Daibo Liu, Ruize Wang, Geyong Min, Jiangchuan Liu, Schahram Dustdar, John C. S. Lui:
LiveProbe: Exploring Continuous Voice Liveness Detection via Phonemic Energy Response Patterns. IEEE Internet Things J. 10(8, April 15): 7215-7228 (2023) - [j1]Hangcheng Cao, Daibo Liu, Hongbo Jiang, Ruize Wang, Zhe Chen, Jie Xiong:
LIPAuth: Hand-dependent Light Intensity Patterns for Resilient User Authentication. ACM Trans. Sens. Networks 19(3): 64:1-64:29 (2023) - [c21]Elena Dubrova, Kalle Ngo, Joel Gärtner, Ruize Wang:
Breaking a Fifth-Order Masked Implementation of CRYSTALS-Kyber by Copy-Paste. APKC@AsiaCCS 2023: 10-20 - [c20]Ruize Wang, Elena Dubrova:
A Side-Channel Secret Key Recovery Attack on CRYSTALS-Kyber Using k Chosen Ciphertexts. C2SI 2023: 109-128 - [c19]Yanning Ji, Ruize Wang, Kalle Ngo, Elena Dubrova, Linus Backlund:
A Side-Channel Attack on a Hardware Implementation of CRYSTALS-Kyber. ETS 2023: 1-5 - [c18]Ruize Wang, Elena Dubrova:
A Shared Key Recovery Attack on a Masked Implementation of CRYSTALS-Kyber's Encapsulation Algorithm. FPS (1) 2023: 424-439 - [c17]Wenjie Lei, Ruize Wang, Tianhao Liang, Qinyuan Ren:
An Autonomous Robot for Collision-Free Person Following through Model Predictive Control. IECON 2023: 1-6 - [c16]Kalle Ngo, Ruize Wang, Elena Dubrova, Nils Paulsrud:
Higher-Order Boolean Masking Does Not Prevent Side-Channel Attacks on LWE/LWR-based PKE/KEMs. ISMVL 2023: 190-195 - [i15]Ruize Wang, Martin Brisfors, Elena Dubrova:
A Side-Channel Attack on a Bitsliced Higher-Order Masked CRYSTALS-Kyber Implementation. IACR Cryptol. ePrint Arch. 2023: 1042 (2023) - [i14]Sönke Jendral, Kalle Ngo, Ruize Wang, Elena Dubrova:
A Single-Trace Message Recovery Attack on a Masked and Shuffled Implementation of CRYSTALS-Kyber. IACR Cryptol. ePrint Arch. 2023: 1587 (2023) - [i13]Ruize Wang, Kalle Ngo, Joel Gärtner, Elena Dubrova:
Single-Trace Side-Channel Attacks on CRYSTALS-Dilithium: Myth or Reality? IACR Cryptol. ePrint Arch. 2023: 1931 (2023) - 2022
- [c15]Ruize Wang, Kalle Ngo, Elena Dubrova:
Side-Channel Analysis of Saber KEM Using Amplitude-Modulated EM Emanations. DSD 2022: 488-495 - [c14]Ruize Wang, Kalle Ngo, Elena Dubrova:
A Message Recovery Attack on LWE/LWR-Based PKE/KEMs Using Amplitude-Modulated EM Emanations. ICISC 2022: 450-471 - [i12]Ruize Wang, Kalle Ngo, Elena Dubrova:
Side-Channel Analysis of Saber KEM Using Amplitude-Modulated EM Emanations. IACR Cryptol. ePrint Arch. 2022: 807 (2022) - [i11]Ruize Wang, Kalle Ngo, Elena Dubrova:
Making Biased DL Models Work: Message and Key Recovery Attacks on Saber Using Amplitude-Modulated EM Emanations. IACR Cryptol. ePrint Arch. 2022: 852 (2022) - [i10]Kalle Ngo, Ruize Wang, Elena Dubrova, Nils Paulsrud:
Side-Channel Attacks on Lattice-Based KEMs Are Not Prevented by Higher-Order Masking. IACR Cryptol. ePrint Arch. 2022: 919 (2022) - [i9]Yanning Ji, Ruize Wang, Kalle Ngo, Elena Dubrova, Linus Backlund:
A Side-Channel Attack on a Hardware Implementation of CRYSTALS-Kyber. IACR Cryptol. ePrint Arch. 2022: 1452 (2022) - 2021
- [c13]Ruize Wang, Duyu Tang, Nan Duan, Zhongyu Wei, Xuanjing Huang, Jianshu Ji, Guihong Cao, Daxin Jiang, Ming Zhou:
K-Adapter: Infusing Knowledge into Pre-Trained Models with Adapters. ACL/IJCNLP (Findings) 2021: 1405-1418 - [c12]Fu Sun, Feng-Lin Li, Ruize Wang, Qianglong Chen, Xingyi Cheng, Ji Zhang:
K-AID: Enhancing Pre-trained Language Models with Domain Knowledge for Question Answering. CIKM 2021: 4125-4134 - [c11]Ruize Wang, Huanyu Wang, Elena Dubrova, Martin Brisfors:
Advanced Far Field EM Side-Channel Attack on AES. CPSS@AsiaCCS 2021: 29-39 - [c10]Zhen Gao, Ruize Wang, Haoyu Du, Pedro Reviriego:
Analysis and Evaluation of the Effects of Single Event Upsets (SEU s) on Memories in Polar Decoders. DFT 2021: 1-6 - [c9]Longkai Zhang, Xingquan Teng, Xuegang Ma, Ruize Wang:
Research on Data Encryption Technology in Computer Network Communication Security Based on Genetic Algorithms. ICISCAE (IEEE) 2021: 330-333 - [c8]Zhihao Fan, Zhongyu Wei, Siyuan Wang, Ruize Wang, Zejun Li, Haijun Shan, Xuanjing Huang:
TCIC: Theme Concepts Learning Cross Language and Vision for Image Captioning. IJCAI 2021: 657-663 - [c7]Ying Cheng, Ruize Wang, Jiashuo Yu, Rui-Wei Zhao, Yuejie Zhang, Rui Feng:
Exploring Logical Reasoning for Referring Expression Comprehension. ACM Multimedia 2021: 5047-5055 - [i8]Zhihao Fan, Zhongyu Wei, Siyuan Wang, Ruize Wang, Zejun Li, Haijun Shan, Xuanjing Huang:
TCIC: Theme Concepts Learning Cross Language and Vision for Image Captioning. CoRR abs/2106.10936 (2021) - [i7]Fu Sun, Feng-Lin Li, Ruize Wang, Qianglong Chen, Xingyi Cheng, Ji Zhang:
K-AID: Enhancing Pre-trained Language Models with Domain Knowledge for Question Answering. CoRR abs/2109.10547 (2021) - 2020
- [c6]Ruize Wang, Zhongyu Wei, Piji Li, Qi Zhang, Xuanjing Huang:
Storytelling from an Image Stream Using Scene Graphs. AAAI 2020: 9185-9192 - [c5]Ruize Wang, Huanyu Wang, Elena Dubrova:
Far Field EM Side-Channel Attack on AES Using Deep Learning. ASHES@CCS 2020: 35-44 - [c4]Ruize Wang, Zhongyu Wei, Ying Cheng, Piji Li, Haijun Shan, Ji Zhang, Qi Zhang, Xuanjing Huang:
Keep it Consistent: Topic-Aware Storytelling from an Image Stream via Iterative Multi-agent Communication. COLING 2020: 2250-2260 - [c3]Wanjun Zhong, Duyu Tang, Zenan Xu, Ruize Wang, Nan Duan, Ming Zhou, Jiahai Wang, Jian Yin:
Neural Deepfake Detection with Factual Structure of Text. EMNLP (1) 2020: 2461-2470 - [c2]Ruize Wang, Duyu Tang, Nan Duan, Wanjun Zhong, Zhongyu Wei, Xuanjing Huang, Daxin Jiang, Ming Zhou:
Leveraging Declarative Knowledge in Text and First-Order Logic for Fine-Grained Propaganda Detection. EMNLP (1) 2020: 3895-3903 - [c1]Ying Cheng, Ruize Wang, Zhihao Pan, Rui Feng, Yuejie Zhang:
Look, Listen, and Attend: Co-Attention Network for Self-Supervised Audio-Visual Representation Learning. ACM Multimedia 2020: 3884-3892 - [i6]Ruize Wang, Duyu Tang, Nan Duan, Zhongyu Wei, Xuanjing Huang, Jianshu Ji, Guihong Cao, Daxin Jiang, Ming Zhou:
K-Adapter: Infusing Knowledge into Pre-Trained Models with Adapters. CoRR abs/2002.01808 (2020) - [i5]Ruize Wang, Duyu Tang, Nan Duan, Wanjun Zhong, Zhongyu Wei, Xuanjing Huang, Daxin Jiang, Ming Zhou:
Leveraging Declarative Knowledge in Text and First-Order Logic for Fine-Grained Propaganda Detection. CoRR abs/2004.14201 (2020) - [i4]Ying Cheng, Ruize Wang, Zhihao Pan, Rui Feng, Yuejie Zhang:
Look, Listen, and Attend: Co-Attention Network for Self-Supervised Audio-Visual Representation Learning. CoRR abs/2008.05789 (2020) - [i3]Wanjun Zhong, Duyu Tang, Zenan Xu, Ruize Wang, Nan Duan, Ming Zhou, Jiahai Wang, Jian Yin:
Neural Deepfake Detection with Factual Structure of Text. CoRR abs/2010.07475 (2020) - [i2]Ruize Wang, Huanyu Wang, Elena Dubrova:
Far Field EM Side-Channel Attack on AES Using Deep Learning. IACR Cryptol. ePrint Arch. 2020: 1096 (2020)
2010 – 2019
- 2019
- [i1]Ruize Wang, Zhongyu Wei, Piji Li, Haijun Shan, Ji Zhang, Qi Zhang, Xuanjing Huang:
Keep it Consistent: Topic-Aware Storytelling from an Image Stream via Iterative Multi-agent Communication. CoRR abs/1911.04192 (2019)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint