Detection of SQL injection based on artificial neural network P Tang, W Qiu, Z Huang, H Lian, G Liu
Knowledge-Based Systems 190, 105528, 2020
102 2020 Security analysis of SKINNY under related-tweakey settings G Liu, M Ghosh, L Song
Cryptology ePrint Archive, 2016
78 2016 Practical collision attacks against round-reduced SHA-3 J Guo, G Liao, G Liu, M Liu, K Qiao, L Song
Journal of Cryptology 33, 228-270, 2020
51 2020 SQL injection behavior mining based deep learning P Tang, W Qiu, Z Huang, H Lian, G Liu
Advanced Data Mining and Applications: 14th International Conference, ADMA …, 2018
17 2018 Exploring SAT for cryptanalysis:(quantum) collision attacks against 6-round SHA-3 J Guo, G Liu, L Song, Y Tu
International Conference on the Theory and Application of Cryptology and …, 2022
13 2022 Preimage attacks against lightweight scheme Xoodyak based on deep learning G Liu, J Lu, H Li, P Tang, W Qiu
Advances in Information and Communication: Proceedings of the 2021 Future of …, 2021
11 2021 Optimized password recovery for SHA-512 on GPUs C Ge, L Xu, W Qiu, Z Huang, J Guo, G Liu, Z Gong
2017 IEEE International Conference on Computational Science and Engineering …, 2017
11 2017 New techniques for searching differential trails in Keccak G Liu, W Qiu, Y Tu
IACR Transactions on Symmetric Cryptology, 2020
7 2020 AlgSAT---a SAT Method for Search and Verification of Differential Characteristics from Algebraic Perspective H Li, H Zhang, G Liu, K Hu, J Guo, W Qiu
Cryptology ePrint Archive, 2022
3 2022 Exploring SAT for Cryptanalysis:(Quantum) Collision Attacks against 6-Round SHA-3 (Full Version) J Guo, G Liu, L Song, Y Tu
Cryptology ePrint Archive, 2022
1 2022 Automatic Search of Linear Structure: Applications to Keccak and Ascon H Li, G Liu, H Zhang, P Tang, W Qiu
International Conference on Information Security and Cryptology, 172-192, 2023
2023 Rebound Attacks on Hashing with Automatic Tools S Li, G Liu, P Pham
International Conference on Network and System Security, 649-666, 2022
2022 SQL Injection Behavior Mining Based Deep Learning G Liu
Advanced Data Mining and Applications: 14th International Conference, ADMA …, 2018
2018 Protecting lightweight block cipher implementation in mobile big data computing: A GPU-based approach W Qiu, B Liu, C Ge, L Xu, X Tang, G Liu
Peer-to-Peer Networking and Applications 11, 252-264, 2018
2018