default search action
Yinan Kong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j30]Naila Mukhtar, Mohamad Ali Mehrabi, Yinan Kong, Ashiq Anjum:
Edge enhanced deep learning system for IoT edge device security analytics. Concurr. Comput. Pract. Exp. 35(13) (2023) - 2022
- [j29]Afshin Shoeibi, Parisa Moridian, Marjane Khodatars, Navid Ghassemi, Mahboobeh Jafari, Roohallah Alizadehsani, Yinan Kong, Juan Manuel Górriz, Javier Ramírez, Abbas Khosravi, Saeid Nahavandi, U. Rajendra Acharya:
An overview of deep learning techniques for epileptic seizures detection and prediction based on neuroimaging modalities: Methods, challenges, and future works. Comput. Biol. Medicine 149: 106053 (2022) - [c24]Naila Mukhtar, Louiza Papachristodoulou, Apostolos P. Fournaris, Lejla Batina, Yinan Kong:
Machine-Learning Assisted Side-Channel Attacks on RNS ECC Implementations Using Hybrid Feature Engineering. COSADE 2022: 3-28 - [c23]Naila Mukhtar, Lejla Batina, Stjepan Picek, Yinan Kong:
Fake It Till You Make It: Data Augmentation Using Generative Adversarial Networks for All the Crypto You Need on Small Devices. CT-RSA 2022: 297-321 - [i5]Tariq Mahmood Khan, Donald G. Bailey, Yinan Kong:
A fast and accurate iris segmentation method using an LoG filter and its zero-crossings. CoRR abs/2201.06176 (2022) - 2021
- [j28]Marjane Khodatars, Afshin Shoeibi, Delaram Sadeghi, Navid Ghaasemi, Mahboobeh Jafari, Parisa Moridian, Ali Khadem, Roohallah Alizadehsani, Assef Zare, Yinan Kong, Abbas Khosravi, Saeid Nahavandi, Sadiq Hussain, U. Rajendra Acharya, Michael Berk:
Deep learning for neuroimaging-based diagnosis and rehabilitation of Autism Spectrum Disorder: A review. Comput. Biol. Medicine 139: 104949 (2021) - [j27]Afshin Shoeibi, Delaram Sadeghi, Parisa Moridian, Navid Ghassemi, Jónathan Heras, Roohallah Alizadehsani, Ali Khadem, Yinan Kong, Saeid Nahavandi, Yu-Dong Zhang, Juan Manuel Górriz:
Automatic Diagnosis of Schizophrenia in EEG Signals Using CNN-LSTM Models. Frontiers Neuroinformatics 15: 777977 (2021) - [i4]Afshin Shoeibi, Navid Ghassemi, Marjane Khodatars, Mahboobeh Jafari, Parisa Moridian, Roohallah Alizadehsani, Ali Khadem, Yinan Kong, Assef Zare, Juan Manuel Górriz, Javier Ramírez, Maryam Panahiazar, Abbas Khosravi, Saeid Nahavandi:
Applications of Epileptic Seizures Detection in Neuroimaging Modalities Using Deep Learning Techniques: Methods, Challenges, and Future Works. CoRR abs/2105.14278 (2021) - [i3]Afshin Shoeibi, Delaram Sadeghi, Parisa Moridian, Navid Ghassemi, Jónathan Heras, Roohallah Alizadehsani, Ali Khadem, Yinan Kong, Saeid Nahavandi, Juan Manuel Górriz:
Automatic Diagnosis of Schizophrenia using EEG Signals and CNN-LSTM Models. CoRR abs/2109.01120 (2021) - [i2]Naila Mukhtar, Lejla Batina, Stjepan Picek, Yinan Kong:
Fake it till you make it: Data Augmentation using Generative Adversarial Networks for all the crypto you need on small devices. IACR Cryptol. ePrint Arch. 2021: 991 (2021) - 2020
- [j26]Naila Mukhtar, Apostolos P. Fournaris, Tariq Mahmood Khan, Charis Dimopoulos, Yinan Kong:
Improved Hybrid Approach for Side-Channel Analysis Using Efficient Convolutional Neural Network and Dimensionality Reduction. IEEE Access 8: 184298-184311 (2020) - [j25]Tariq Mahmood Khan, Donald G. Bailey, Mohammad A. U. Khan, Yinan Kong:
Real-time iris segmentation and its implementation on FPGA. J. Real Time Image Process. 17(5): 1089-1102 (2020) - [i1]Naila Mukhtar, Louiza Papachristodoulou, Apostolos P. Fournaris, Lejla Batina, Yinan Kong:
Machine-Learning assisted Side-Channel Attacks on RNS-based Elliptic Curve Implementations using Hybrid Feature Engineering. IACR Cryptol. ePrint Arch. 2020: 1065 (2020)
2010 – 2019
- 2019
- [j24]Yinan Kong, Ehsan Saeedi:
The investigation of neural networks performance in side-channel attacks. Artif. Intell. Rev. 52(1): 607-623 (2019) - [j23]Ehsan Saeedi, Md. Selim Hossain, Yinan Kong:
Feed-Forward Back-Propagation Neural Networks in Side-Channel Information Characterization. J. Circuits Syst. Comput. 28(1): 1950003:1-1950003:18 (2019) - [j22]Tariq Mahmood Khan, Donald G. Bailey, Mohammad A. U. Khan, Yinan Kong:
Efficient hardware implementation strategy for local normalization of fingerprint images. J. Real Time Image Process. 16(4): 1263-1275 (2019) - [j21]Vayalil C. Niras, Manoranjan Paul, Yinan Kong:
A Residue Number System Hardware Design of Fast-Search Variable-Motion-Estimation Accelerator for HEVC/H.265. IEEE Trans. Circuits Syst. Video Technol. 29(2): 572-581 (2019) - 2018
- [j20]Shahzad Asif, Oskar Andersson, Joachim Neves Rodrigues, Yinan Kong:
65-nm CMOS low-energy RNS modular multiplier for elliptic-curve cryptography. IET Comput. Digit. Tech. 12(2): 62-67 (2018) - [j19]Abdullah Al Nahid, Yinan Kong:
Histopathological Breast-Image Classification Using Local and Frequency Domains by Convolutional Neural Network. Inf. 9(1): 19 (2018) - [j18]Shahzad Asif, Md. Selim Hossain, Yinan Kong, Wadood Abdul:
A Fully RNS based ECC Processor. Integr. 61: 138-149 (2018) - [c22]Naila Mukhtar, Yinan Kong:
Secret Key Classification Based on Electromagnetic Analysis and Feature Extraction Using Machine-Learning Approach. FNSS 2018: 80-92 - [c21]Yinan Kong, Md. Selim Hossain:
FPGA Implementation of Modular Multiplier in Residue Number System. IOTAIS 2018: 137-140 - 2017
- [j17]Abdullah Al Nahid, Yinan Kong:
Involvement of Machine Learning for Breast Cancer Image Classification: A Survey. Comput. Math. Methods Medicine 2017: 3781951:1-3781951:29 (2017) - [j16]Shahzad Asif, Yinan Kong:
Highly Parallel Modular Multiplier for Elliptic Curve Cryptography in Residue Number System. Circuits Syst. Signal Process. 36(3): 1027-1051 (2017) - [j15]Cheeckottu Vayalil Niras, Yinan Kong:
VLSI Architecture of Full-Search Variable-Block-Size Motion Estimation for HEVC Video Encoding. IET Circuits Devices Syst. 11(6): 543-548 (2017) - [j14]Md. Selim Hossain, Yinan Kong, Ehsan Saeedi, Cheeckottu Vayalil Niras:
High-performance elliptic curve cryptography processor over NIST prime fields. IET Comput. Digit. Tech. 11(1): 33-42 (2017) - [j13]Shahzad Asif, Md. Selim Hossain, Yinan Kong:
High-throughput multi-key elliptic curve cryptosystem based on residue number system. IET Comput. Digit. Tech. 11(5): 165-172 (2017) - [j12]Ehsan Saeedi, Yinan Kong, Md. Selim Hossain:
Side-channel attacks and learning-vector quantization. Frontiers Inf. Technol. Electron. Eng. 18(4): 511-518 (2017) - [j11]Tariq Mahmood Khan, Donald G. Bailey, Mohammad A. U. Khan, Yinan Kong:
Efficient Hardware Implementation For Fingerprint Image Enhancement Using Anisotropic Gaussian Filter. IEEE Trans. Image Process. 26(5): 2116-2126 (2017) - [c20]Abdullah Al Nahid, Yinan Kong:
Local and Global Feature Utilization for Breast Image Classification by Convolutional Neural Network. DICTA 2017: 1-6 - [c19]Cheeckottu Vayalil Niras, Manoranjan Paul, Yinan Kong:
A novel angle-restricted test zone search algorithm for performance improvement of HEVC. ICIP 2017: 6-10 - [c18]Abdullah Al Nahid, Mohamad Ali Mehrabi, Yinan Kong:
Frequency-domain information along with LSTM and GRU methods for histopathological breast-image classification. ISSPIT 2017: 410-415 - 2016
- [j10]Yinan Kong, Shahzad Asif, Mohammad A. U. Khan:
Modular multiplication using the core function in the residue number system. Appl. Algebra Eng. Commun. Comput. 27(1): 1-16 (2016) - [j9]Tariq Mahmood Khan, Mohammad A. U. Khan, Yinan Kong, Omar A. Kittaneh:
Stopping criterion for linear anisotropic image diffusion: a fingerprint image enhancement case. EURASIP J. Image Video Process. 2016: 6 (2016) - [j8]Ehsan Saeedi, Md. Selim Hossain, Yinan Kong:
Side-Channel Information Characterisation Based on Cascade-Forward Back-Propagation Neural Network. J. Electron. Test. 32(3): 345-356 (2016) - [j7]Cheeckottu Vayalil Niras, Yinan Kong:
Fast sign-detection algorithm for residue number system moduli set {2 n - 1, 2 n , 2 n+1 - 1}. IET Comput. Digit. Tech. 10(2): 54-58 (2016) - [j6]Azadeh Safari, Cheeckottu Vayalil Niras, Yinan Kong:
Power-performance enhancement of two-dimensional RNS-based DWT image processor using static voltage scaling. Integr. 53: 145-156 (2016) - [j5]Mohammad A. U. Khan, Tariq Mahmood Khan, Donald G. Bailey, Yinan Kong:
A spatial domain scar removal strategy for fingerprint image enhancement. Pattern Recognit. 60: 258-274 (2016) - [c17]Abdullah Al Nahid, Tariq Mahmood Khan, Yinan Kong:
Breast Image Classification Based on Concatenated Statistical, Structural and Textural Features. EMS 2016: 27-32 - [c16]Abdullah Al Nahid, Tariq Mahmood Khan, Yinan Kong:
Performance Analysis of Integrated Canny and Fuzzy-Logic Based (2-by-2 Cell Block) Edge-Detection Algorithms. EMS 2016: 64-69 - [c15]Cheeckottu Vayalil Niras, Joshua Haddrill, Yinan Kong:
An Efficient ASIC Design of Variable-Length Discrete Cosine Transform for HEVC. EMS 2016: 229-233 - [c14]Md. Selim Hossain, Ehsan Saeedi, Yinan Kong:
High-Performance FPGA Implementation of Elliptic Curve Cryptography Processor over Binary Field GF(2^163). ICISSP 2016: 415-422 - 2015
- [c13]Md. Selim Hossain, Yinan Kong:
High-Performance FPGA Implementation of Modular Inversion over F_256 for Elliptic Curve Cryptography. DSDIS 2015: 169-174 - [c12]Md. Selim Hossain, Ehsan Saeedi, Yinan Kong:
High-Speed, Area-Efficient, FPGA-Based Elliptic Curve Cryptographic Processor over NIST Binary Fields. DSDIS 2015: 175-181 - [c11]Abdullah Al Nahid, Yinan Kong, Md. Selim Hossain:
Performance Analysis of Integrated Canny and Fuzzy Logic Based (3-by-3 Cell Block) Edge Detection Algorithms. DSDIS 2015: 190-195 - [c10]Md. Selim Hossain, Yinan Kong:
FPGA-based efficient modular multiplication for Elliptic Curve Cryptography. ITNAC 2015: 191-195 - [c9]Ehsan Saeedi, Md. Selim Hossain, Yinan Kong:
Multi-class SVMs analysis of side-channel information of elliptic curve cryptosystem. SPECTS@SummerSim 2015: 5:1-5:6 - 2014
- [j4]Shahzad Asif, Yinan Kong:
Low-Area Wallace Multiplier. VLSI Design 2014: 343960:1-343960:6 (2014) - [c8]Davar Kheirandish, Azadeh Safari, Yinan Kong:
A novel approach for improving error detection and correction in WSN. CCECE 2014: 1-4 - [c7]Azadeh Safari, Fujimi Bentley, Yinan Kong:
Operational capability and suitability of image compression methods for different applications. CCECE 2014: 1-6 - [c6]Yinan Kong, Azadeh Safari, Cheeckottu Vayalil Niras:
A low-cost architecture for DWT filter banks in RNS applications. ISIC 2014: 448-451 - 2013
- [c5]Azadeh Safari, James Nugent, Yinan Kong:
Novel implementation of full adder based scaling in Residue Number Systems. MWSCAS 2013: 657-660 - [c4]Yinan Kong, Yufeng Lai:
Low latency modular multiplication for public-key cryptosystems using a scalable array of parallel processing elements. MWSCAS 2013: 1039-1042 - 2012
- [c3]Mishal Ahmed, Yinan Kong, Yufeng Lai, Michael Heimlich:
Digital traffic controller on the Altium NanoBoard. ISCIT 2012: 440-443 - [c2]Yufeng Lai, Yinan Kong:
An implementation of a scaler in the Residue number System. ISCIT 2012: 529-532 - [c1]Azadeh Safari, Yinan Kong:
Four tap Daubechies filter banks based on RNS. ISCIT 2012: 952-955 - 2010
- [j3]Braden J. Phillips, Yinan Kong, Zhining Lim:
Highly parallel modular multiplication in the residue number system using sum of residues reduction. Appl. Algebra Eng. Commun. Comput. 21(3): 249-255 (2010) - [j2]Yinan Kong, Braden Phillips:
Revisiting Sum of Residues Modular Multiplication. J. Electr. Comput. Eng. 2010: 657076:1-657076:9 (2010)
2000 – 2009
- 2009
- [j1]Yinan Kong, Braden Phillips:
Fast Scaling in the Residue Number System. IEEE Trans. Very Large Scale Integr. Syst. 17(3): 443-447 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint