default search action
Chi Cheng
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j30]Chi Cheng, Bingshen Chen, Ziting Xiao, Raymond S. T. Lee:
Quantum Finance and Fuzzy Reinforcement Learning-Based Multi-agent Trading System. Int. J. Fuzzy Syst. 26(7): 2224-2245 (2024) - [j29]Tianrun Yu, Chi Cheng, Zilong Yang, Yingchen Wang, Yanbin Pan, Jian Weng:
Hints from Hertz: Dynamic Frequency Scaling Side-Channel Analysis of Number Theoretic Transform in Lattice-Based KEMs. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(3): 200-223 (2024) - [c13]Peng Chen, Chi Cheng, Jinnuo Li, Tianqing Zhu:
Enhancing Portability in Deep Learning-Based Side-Channel Attacks Against Kyber. ISPEC 2024: 151-167 - [c12]Jiahao Lu, Jiaming Zhang, Zhixiang Luo, Aobo Li, Tianze Huang, Dongsheng Liu, Chi Cheng:
An Efficient and Configurable Hardware Architecture of Polynomial Modular Operation for CRYSTALS-Kyber and Dilithium. MWSCAS 2024: 29-32 - [c11]Zhen Liu, Vishakha, Jintai Ding, Chi Cheng, Yanbin Pan:
An Improved Practical Key Mismatch Attack Against NTRU. PQCrypto (1) 2024: 322-342 - [i10]Tianrun Yu, Chi Cheng, Zilong Yang, Yingchen Wang, Yanbin Pan, Jian Weng:
Hints from Hertz: Dynamic Frequency Scaling Side-Channel Analysis of Number Theoretic Transform in Lattice-Based KEMs. IACR Cryptol. ePrint Arch. 2024: 70 (2024) - [i9]Jinnuo Li, Chi Cheng, Muyan Shen, Peng Chen, Qian Guo, Dongsheng Liu, Liji Wu, Jian Weng:
Grafted Trees Bear Better Fruit: An Improved Multiple-Valued Plaintext-Checking Side-Channel Attack against Kyber. IACR Cryptol. ePrint Arch. 2024: 1174 (2024) - 2023
- [j28]Musarrat Hussain, Chi Cheng, Rui Xu, Muhammad Afzal:
CNN-Fusion: An effective and lightweight phishing detection method based on multi-variant ConvNet. Inf. Sci. 631: 328-345 (2023) - [j27]Muyan Shen, Chi Cheng, Xiaohan Zhang, Qian Guo, Tao Jiang:
Find the Bad Apples: An efficient method for perfect key recovery under imperfect SCA oracles - A case study of Kyber. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(1): 89-112 (2023) - [j26]Qingxuan Wang, Ding Wang, Chi Cheng, Debiao He:
Quantum2FA: Efficient Quantum-Resistant Two-Factor Authentication Scheme for Mobile Devices. IEEE Trans. Dependable Secur. Comput. 20(1): 193-208 (2023) - 2022
- [j25]Rui Xu, Xu Wang, Kirill Morozov, Chi Cheng, Jintai Ding:
Revisiting group oriented secret sharing schemes. Inf. Sci. 589: 751-769 (2022) - [j24]Ruoyu Ding, Chi Cheng, Yue Qin:
Further Analysis and Improvements of a Lattice-Based Anonymous PAKE Scheme. IEEE Syst. J. 16(3): 5035-5043 (2022) - [j23]Ling Zuo, Yinghan Xu, Chi Cheng, Kim-Kwang Raymond Choo:
A Privacy-Preserving Semisupervised Algorithm Under Maximum Correntropy Criterion. IEEE Trans. Neural Networks Learn. Syst. 33(11): 6817-6830 (2022) - [j22]Qingxuan Wang, Chi Cheng, Rui Xu, Jintai Ding, Zhe Liu:
Analysis and Enhancement of a Lattice-Based Data Outsourcing Scheme With Public Integrity Verification. IEEE Trans. Serv. Comput. 15(4): 2226-2231 (2022) - [c10]Yue Qin, Ruoyu Ding, Chi Cheng, Nina Bindel, Yanbin Pan, Jintai Ding:
Light the Signal: Optimization of Signal Leakage Attacks Against LWE-Based Key Exchange. ESORICS (1) 2022: 677-697 - [i8]Yue Qin, Ruoyu Ding, Chi Cheng, Nina Bindel, Yanbin Pan, Jintai Ding:
Light the Signal: Optimization of Signal Leakage Attacks against LWE-Based Key Exchange. IACR Cryptol. ePrint Arch. 2022: 131 (2022) - [i7]Muyan Shen, Chi Cheng, Xiaohan Zhang, Qian Guo, Tao Jiang:
Find the Bad Apples: An efficient method for perfect key recovery under imperfect SCA oracles â" A case study of Kyber. IACR Cryptol. ePrint Arch. 2022: 563 (2022) - 2021
- [c9]Yue Qin, Chi Cheng, Xiaohan Zhang, Yanbin Pan, Lei Hu, Jintai Ding:
A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs. ASIACRYPT (4) 2021: 92-121 - [c8]Chi Cheng, Sheng Zhang:
Multi-Objective Optimization of Feature Selection Procedure for Human Activity Recognition. ICAIIS 2021: 76:1-76:5 - [c7]Xiaohan Zhang, Chi Cheng, Ruoyu Ding:
Small Leaks Sink a Great Ship: An Evaluation of Key Reuse Resilience of PQC Third Round Finalist NTRU-HRSS. ICICS (2) 2021: 283-300 - [i6]Yue Qin, Chi Cheng, Xiaohan Zhang, Yanbin Pan, Lei Hu, Jintai Ding:
A Systematic Approach and Analysis of Key Mismatch Attacks on CPA-Secure Lattice-Based NIST Candidate KEMs. IACR Cryptol. ePrint Arch. 2021: 123 (2021) - [i5]Xiaohan Zhang, Chi Cheng, Yue Qin, Ruoyu Ding:
Small Leaks Sink a Great Ship: An Evaluation of Key Reuse Resilience of PQC Third Round Finalist NTRU-HRSS. IACR Cryptol. ePrint Arch. 2021: 168 (2021) - 2020
- [j21]Duan Pan, Gao Bing, Chi Cheng, Yang Fan, Luo Ping:
Research on the Thermal-Electric Coupling Behavior Under Compound AC-DC Voltage Within Saddle-Like Electric-Stress Dependence. IEEE Access 8: 107442-107451 (2020)
2010 – 2019
- 2019
- [j20]Pan Bo, Chi Cheng, He Yongqiang, Zhang Shuyang, Zhang Puzhen, Zhang Donghua, Chi Guanxin:
Performance Prediction of Hatch Cover Drive Assembly in Space Environment. IEEE Access 7: 156129-156135 (2019) - [j19]Qingxuan Wang, Chi Cheng, Ling Zuo:
Analysis and Improvement of a NTRU-Based Handover Authentication Scheme. IEEE Commun. Lett. 23(10): 1692-1695 (2019) - [j18]Feng Zhang, Victor E. Lee, Ruoming Jin, Saurabh Garg, Kim-Kwang Raymond Choo, Michele Maasberg, Lijun Dong, Chi Cheng:
Privacy-aware smart city: A case study in collaborative filtering recommender systems. J. Parallel Distributed Comput. 127: 145-159 (2019) - [j17]Yi-Ning Liu, Wei Guo, Chun-I Fan, Liang Chang, Chi Cheng:
A Practical Privacy-Preserving Data Aggregation (3PDA) Scheme for Smart Grid. IEEE Trans. Ind. Informatics 15(3): 1767-1774 (2019) - [j16]Chi Cheng, Yue Qin, Rongxing Lu, Tao Jiang, Tsuyoshi Takagi:
Batten Down the Hatches: Securing Neighborhood Area Networks of Smart Grid in the Quantum Era. IEEE Trans. Smart Grid 10(6): 6386-6395 (2019) - [c6]Yue Qin, Chi Cheng, Jintai Ding:
A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHope. ESORICS (2) 2019: 504-520 - [c5]Wentong Zhang, Chi Cheng, Sheng Zhang:
NSIIC: A Novel Framework for Nodes' Smart Connection Oriented to Collaborative IoT. ICIT 2019: 334-337 - [i4]Jintai Ding, Chi Cheng, Yue Qin:
A Simple Key Reuse Attack on LWE and Ring LWE Encryption Schemes as Key Encapsulation Mechanisms (KEMs). IACR Cryptol. ePrint Arch. 2019: 271 (2019) - [i3]Yue Qin, Chi Cheng, Jintai Ding:
A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHope. IACR Cryptol. ePrint Arch. 2019: 435 (2019) - [i2]Yue Qin, Chi Cheng, Jintai Ding:
An Efficient Key Mismatch Attack on the NIST Second Round Candidate Kyber. IACR Cryptol. ePrint Arch. 2019: 1343 (2019) - 2018
- [i1]Rui Xu, Chi Cheng, Yue Qin, Tao Jiang:
Lighting the Way to a Smart World: Lattice-Based Cryptography for Internet of Things. CoRR abs/1805.04880 (2018) - 2017
- [j15]Chi Cheng, Rongxing Lu, Albrecht Petzoldt, Tsuyoshi Takagi:
Securing the Internet of Things in a Quantum World. IEEE Commun. Mag. 55(2): 116-120 (2017) - [j14]Yi-Ning Liu, Qi Zhong, Liang Chang, Zhe Xia, Debiao He, Chi Cheng:
A secure data backup scheme using multi-factor authentication. IET Inf. Secur. 11(5): 250-255 (2017) - 2016
- [j13]Yi-Ning Liu, Chi Cheng, Tao Jiang, Chin-Chen Chang:
A practical lottery using oblivious transfer. Int. J. Commun. Syst. 29(2): 277-282 (2016) - [j12]Yi-Ning Liu, Gao Liu, Chi Cheng, Zhe Xia, Jian Shen:
A Privacy-Preserving Health Data Aggregation Scheme. KSII Trans. Internet Inf. Syst. 10(8): 3852-3864 (2016) - [j11]Yining Liu, Wei Guo, Chi Cheng, Ching-Fang Hsu, Junyan Qian, Changlu Lin:
A Robust Electronic Voting Scheme Against Side Channel Attack. J. Inf. Sci. Eng. 32(6): 1471-1486 (2016) - [j10]Wei Ren, Lingling Zeng, Ran Liu, Chi Cheng:
F2AC: A Lightweight, Fine-Grained, and Flexible Access Control Scheme for File Storage in Mobile Cloud Computing. Mob. Inf. Syst. 2016: 5232846:1-5232846:9 (2016) - [j9]Chi Cheng, Jemin Lee, Tao Jiang, Tsuyoshi Takagi:
Security Analysis and Improvements on Two Homomorphic Authentication Schemes for Network Coding. IEEE Trans. Inf. Forensics Secur. 11(5): 993-1002 (2016) - [j8]Mei Leng, François Quitin, Wee-Peng Tay, Chi Cheng, Sirajudeen Gulam Razul, Chong Meng Samson See:
Anchor-Aided Joint Localization and Synchronization Using SOOP: Theory and Experiments. IEEE Trans. Wirel. Commun. 15(11): 7670-7685 (2016) - 2015
- [j7]Chi Cheng, Tao Jiang, Yining Liu, Mingwu Zhang:
Security analysis of a homomorphic signature scheme for network coding. Secur. Commun. Networks 8(18): 4053-4060 (2015) - [c4]Chi Cheng, Wuhua Hu, Wee Peng Tay:
Localization of a moving non-cooperative RF target in NLOS environment using RSS and AOA measurements. ICASSP 2015: 3581-3585 - 2014
- [j6]Yi-Ning Liu, D. Lin, Chi Cheng, H. Chen, Tao Jiang:
An improved t-out-of-n e-lottery protocol. Int. J. Commun. Syst. 27(11): 3223-3231 (2014) - [c3]Chan Dai Truyen Thai, Jemin Lee, Chi Cheng, Tony Q. S. Quek:
Physical-layer secret key generation with untrusted relays. GLOBECOM Workshops 2014: 1385-1390 - 2013
- [j5]Chi Cheng, Tao Jiang, Qian Zhang:
TESLA-Based Homomorphic MAC for Authentication in P2P System for Live Streaming with Network Coding. IEEE J. Sel. Areas Commun. 31(9-Supplement): 291-298 (2013) - [j4]Chi Cheng, Tao Jiang:
An Efficient Homomorphic MAC with Small Key Size for Authentication in Network Coding. IEEE Trans. Computers 62(10): 2096-2100 (2013) - [j3]Yi-Ning Liu, Chi Cheng, Jianyu Cao, Tao Jiang:
An Improved Authenticated Group Key Transfer Protocol Based on Secret Sharing. IEEE Trans. Computers 62(11): 2335-2336 (2013) - 2012
- [c2]Chi Cheng, Wee Peng Tay, Guang-Bin Huang:
Extreme learning machines for intrusion detection. IJCNN 2012: 1-8 - 2011
- [j2]Chi Cheng, Tao Jiang:
A Novel Homomorphic MAC Scheme for Authentication in Network Coding. IEEE Commun. Lett. 15(11): 1228-1230 (2011) - 2010
- [j1]Chi Cheng, Tao Jiang, Yi-Ning Liu:
A Novel Class of 2-D Binary Sequences With Zero Correlation Zone. IEEE Signal Process. Lett. 17(3): 301-304 (2010)
1990 – 1999
- 1994
- [c1]Chi Cheng, Yingbo Hua:
Performance analysis of MUSIC and Pencil-MUSIC algorithms for diversely-polarized array. ICASSP (4) 1994: 213-216
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 21:10 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint