default search action
Yanbin Li 0001
Person information
- affiliation: Shandong University, School of Software, State Key Laboratory of Cryptology, Jinan, China
- affiliation (PhD 2018): Wuhan University, School of Cyber Science and Engineering, China
Other persons with the same name
- Yanbin Li — disambiguation page
- Yanbin Li 0002 — University of Arkansas Fayetteville, Department of Biological and Agricultural Engineering, AR, USA
- Yanbin Li 0003 — Beihang University, School of Instrumentation and Optoelectronics Engineering, Beijing, China
- Yanbin Li 0004 — Soochow University, School of Architecture, Suzhou, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j16]Yanbin Li, Yuxin Huang, Yikang Guo, Chunpeng Ge, Fanyu Kong, Yongjun Ren:
Adaptive Chosen-Plaintext Deep-Learning-Based Side-Channel Analysis. IEEE Internet Things J. 12(1): 174-185 (2025) - [j15]Hao Wang, Yichen Cai, Yu Tao, Luyao Wang, Yanbin Li, Lu Zhou:
B2DFL: Bringing butterfly to decentralized federated learning assisted with blockchain. J. Parallel Distributed Comput. 195: 104978 (2025) - 2024
- [j14]Qingsong Zhao, Lei Shu, Kailiang Li, Mohamed Amine Ferrag, Ximeng Liu, Yanbin Li:
Security and Privacy in Solar Insecticidal Lamps Internet of Things: Requirements and Challenges. IEEE CAA J. Autom. Sinica 11(1): 58-73 (2024) - [j13]Fusheng Wu, Jinhui Liu, Yanbin Li, Mingtao Ni:
LπCET: A Logic Security Analysis for Cryptographic Protocols Based on π-Calculus Extension Theory. IET Inf. Secur. 2024(1) (2024) - [j12]Xirong Ma, Chuan Li, Yuchang Hu, Yunting Tao, Yali Jiang, Yanbin Li, Fanyu Kong, Chunpeng Ge:
Secure outsourced decryption for FHE-based privacy-preserving cloud computing. J. Inf. Secur. Appl. 86: 103893 (2024) - [j11]Xiaoci Lin, Yanbin Li, Xiaojun Xie, Yu Ding, Xuehui Wu, Chunpeng Ge:
SF-CABD: Secure Byzantine fault tolerance federated learning on Non-IID data. Knowl. Based Syst. 296: 111851 (2024) - [j10]Yanbin Li, Jiajie Zhu, Zhe Liu, Ming Tang, Shougang Ren:
Deep Learning Gradient Visualization-Based Pre-Silicon Side-Channel Leakage Location. IEEE Trans. Inf. Forensics Secur. 19: 2340-2355 (2024) - [i1]Xirong Ma, Chuan Li, Yuchang Hu, Yunting Tao, Yali Jiang, Yanbin Li, Fanyu Kong, Chunpeng Ge:
Secure Outsourced Decryption for HE-based Privacy-preserving Cloud Computing System. CoRR abs/2406.19964 (2024) - 2023
- [j9]Qingsong Zhao, Ximeng Liu, Huanliang Xu, Yanbin Li:
Practical reusable garbled circuits with parallel updates. Comput. Stand. Interfaces 86: 103721 (2023) - 2022
- [j8]Yanbin Li, Yuxin Huang, Fuwei Jia, Qingsong Zhao, Ming Tang, Shougang Ren:
A gradient deconvolutional network for side-channel attacks. Comput. Electr. Eng. 98: 107686 (2022) - [j7]Yanbin Li, Jiajie Zhu, Ming Tang, Shougang Ren, Fusheng Wu:
TSCL: A time-space crossing location for side-channel leakage detection. Comput. Networks 216: 109242 (2022) - [j6]Yanbin Li, Jiajie Zhu, Yuxin Huang, Zhe Liu, Ming Tang:
Single-Trace Side-Channel Attacks on the Toom-Cook: The Case Study of Saber. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(4): 285-310 (2022) - [c4]Sihan He, Weibin Wu, Yanbin Li, Lu Zhou, Liming Fang, Zhe Liu:
Recovering the Weights of Convolutional Neural Network via Chosen Pixel Horizontal Power Analysis. WASA (2) 2022: 93-104 - [c3]Sinian Luo, Weibin Wu, Yanbin Li, Ruyun Zhang, Zhe Liu:
An Efficient Soft Analytical Side-Channel Attack on Ascon. WASA (1) 2022: 389-400 - 2021
- [j5]Yanbin Li, Yue Li, Huanliang Xu, Shougang Ren:
An Adaptive Communication-Efficient Federated Learning to Resist Gradient-Based Reconstruction Attacks. Secur. Commun. Networks 2021: 9919030:1-9919030:16 (2021) - [j4]Yanbin Li, Zhe Liu, Sylvain Guilley, Ming Tang:
Analysis of Multiplicative Low Entropy Masking Schemes Against Correlation Power Attack. IEEE Trans. Inf. Forensics Secur. 16: 4466-4481 (2021) - [c2]Yanbin Li, Yuxin Huang, Ming Tang, Shougang Ren, Huanliang Xu:
Adaptive Chosen Plaintext Side-Channel Attacks for Higher-Order Masking Schemes. WASA (2) 2021: 173-185 - 2020
- [j3]Yanbin Li, Ming Tang, Yuguang Li, Huanguo Zhang:
A pre-silicon logic level security verification flow for higher-order masking schemes against glitches on FPGAs. Integr. 70: 60-69 (2020)
2010 – 2019
- 2019
- [c1]Yuguang Li, Ming Tang, Pengbo Wang, Yanbin Li, Shan Fu:
Practical Evaluation Methodology of Higher-Order Maskings at Different Operating Frequencies. ICICS 2019: 287-304 - 2018
- [j2]Yanbin Li, Ming Tang, Yuguang Li, Huanguo Zhang:
Several weaknesses of the implementation for the theoretically secure masking schemes under ISW framework. Integr. 60: 92-98 (2018) - [j1]Ming Tang, Yanbin Li, Dongyan Zhao, Yuguang Li, Fei Yan, Huanguo Zhang:
Leak Point Locating in Hardware Implementations of Higher-Order Masking Schemes. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 37(12): 3008-3019 (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-27 00:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint