计算机科学家王安,王安_北京理工大学计算机学院

代表性学术成果

[1] Yanting Ren, An Wang*, Liji Wu. Transient-Steady Effect Attack on Block Ciphers. 2015 Workshop on Cryptographic Hardware and Embedded Systems (CHES 2015), LNCS, vol. 9293, pp. 433–450, Springer, Heidelberg, 2015. (信息安全硬件顶级国际会议,召开17年来中国大陆第5篇,EI)

[2] Yongchuan Niu, Jiawei Zhang*, An Wang*, Caisen Chen. An Efficient Collision Power Attack on AES Encryption in Edge Computing. IEEE Access, 7, pp. 18734-18748, 2019. (SCI)

[3] Rixin Xu, Liehuang Zhu, An Wang*, Xiaojiang Du, Kim-Kwang Raymond Choo, Guoshuang Zhang, Keke Gai. Side-Channel Attack on a Protected RFID Card. IEEE Access, 6, pp. 58395-58404, 2018. (SCI)

[4] An Wang, Man Chen, Zongyue Wang, Xiaoyun Wang. Fault Rate Analysis: Breaking Masked AES Hardware Implementations Efficiently. IEEE Transactions on Circuits and Systems II: Express Briefs, 60 (8), pp. 517-521, 2013. (SCI)

[5] An Wang, Zheng Li*, Xianwen Yang, Yanyan Yu. New Attacks and Security Model of the Secure Flash Disk. Mathematical and Computer Modelling, 57 (11-12), pp. 2605-2612, 2013. (SCI)

[6] An Wang, Liji Wu*, Zongyue Wang, Xuexin Zheng, Man Chen, Jing Ma. Two Improved Multiple-Differential Collision Attacks. Mathematical Problems in Engineering, vol. 2014, Article ID 209692, pp. 1-11, 2014. (SCI)

[7] An Wang*, Ce Wang, Xuexin Zheng*, Weina Tian, Rixin Xu, Guoshuang Zhang. Random Key Rotation: Side-Channel Countermeasure of NTRU Cryptosystem for Resource-Limited Devices. Computers and Electrical Engineering, 63, pp. 220-231, 2017. (SCI)

[8] An Wang, Yu Zhang, Weina Tian, Qian Wang, Guoshuang Zhang, Liehuang Zhu*. Right or Wrong Collision Rate Analysis without Profiling: Full-Automatic Collision Fault Attack. SCIENCE CHINA Information Sciences, 61 (3), 032101, pp. 1-11, 2018. (SCI)

[9] An Wang, Wenjing Hu, Weina Tian, Guoshuang Zhang, Liehuang Zhu*. Practical Two-Dimensional Correlation Power Analysis and Its Backward Fault-Tolerance. SCIENCE CHINA Information Sciences, 60 (6): 068101, pp. 1-3, 2017. (SCI)

[10] An Wang, Zongyue Wang, Xuexin Zheng, Xiaomei Wang, Man Chen, Guoshuang Zhang, Liji Wu*. Efficient Collision Attacks on Smart Card Implementations of Masked AES. SCIENCE CHINA Information Sciences, 58 (5): 052107, pp. 1-15, 2015. (SCI)

[11] An Wang, Yu Zhang, Liehuang Zhu*, Weina Tian, Rixin Xu, Guoshuang Zhang. RFA: R-Squared Fitting Analysis Model for Power Attack. Security and Communication Networks, vol. 2017, Article ID 5098626, pp. 1-8, 2017. (SCI)

[12] An Wang*, Xuexin Zheng, Zongyue Wang. Power Analysis Attacks and Countermeasures on NTRU-Based Wireless Body Area Networks. KSII Transactions on Internet and Information Systems, 7 (5), pp. 1094-1107, 2013. (SCI)

[13] Qi Zhang, An Wang*, Yongchuan Niu, Ning Shang, Guoshuang Zhang, Liehuang Zhu. Side-Channel Attacks and Countermeasures for Identity-Based Cryptographic Algorithm SM9. Security and Communication Networks, vol. 2018, Article ID 9701756, pp. 1-14, 2018. (SCI)

[14] Xuexin Zheng, An Wang*, Wei Wei. First-Order Collision Attack on Protected NTRU Cryptosystem and Its Countermeasures. Microprocessors and Microsystems, 37 (6-7), pp.601-609, 2013. (SCI)

[15] Qian Wang, An Wang*, Liji Wu, Jiliang Zhang. A New Zero Value Attack Combined Fault Sensitivity Analysis on Masked AES. Microprocessors and Microsystems, 45 (2016), Part B, pp. 355-362, 2016. (SCI)

[16] Danhui Wang, An Wang*. Bitwise Collision Attack Based on Second-Order Distance. KSII Transactions on Internet and Information Systems, 11 (3), pp. 1802-1819, 2017. (SCI)

[17] Yanting Ren, Liji Wu, An Wang*. Double Sieve Collision Attack Based on Bitwise Detection. KSII Transactions on Internet and Information Systems, 9 (1), pp. 296-308, 2015. (SCI)

[18] Xiaowei Han, Beibei Wang, Liji Wu*, An Wang*. A High-Performance Elliptic Curve Cryptographic Coprocessor with Side Channel Analysis Countermeasures For Smart IC Card. IEICE Electronics Express, 12 (20), pp. 1-12, 2015. (SCI)

[19] An Wang*, Man Chen, Zongyue Wang, Yaoling Ding. Overcoming Significant Noise: Correlation-Template-Induction Attack. 8th Information Security Practice and Experience Conference (ISPEC 2012), LNCS, vol. 7232, pp. 393-404. Springer, Heidelberg, 2012. (EI)

[20] An Wang, Zheng Li*, Xianwen Yang, Yanyan Yu. A New Security Proof of Practical Cryptographic Devices Based on Hardware, Software and Protocols. 7th Information Security Practice and Experience Conference (ISPEC 2011), LNCS, vol. 6672, pp. 386-400, Springer, Heidelberg, 2011. (EI)

[21] Danhui Wang, An Wang*, Xuexin Zheng. Fault-Tolerant Linear Collision Attack: A Combination with Correlation Power Analysis. 10th Information Security Practice and Experience Conference (ISPEC 2014), LNCS, vol. 8434, pp. 232–246, Springer, Heidelberg, 2014. (EI)

[22] 刘明洁, 王安*. 全同态加密研究动态及其应用概述. 计算机研究与发展, 51 (12), pp. 2593-2603, 2014. (EI)

### 如何在 Android Studio 中下载并配置 Gradle #### 使用国内镜像站点加速下载 为了提高下载速度,建议使用国内提供的 Gradle 加速服务。目前推荐的两个主要渠道分别是阿里云和腾讯云。 - **阿里云** 访问阿里云提供的 Gradle 镜像链接[^1],选择所需版本进行下载。 - **腾讯云** 同样可以通过腾讯云提供的 Gradle 下载页面获取相应版本。 下载完成后需手动放置至本地缓存目录: ```plaintext 进入Settings -> Build, Execution, Deployment -> Build Tools -> Gradle -> Gradle User Home ``` 此路径即为用户的 Gradle 存放位置,在其中进一步导航到 `wrapper\dists` 文件夹并将所下载的 Gradle 版本放入此处即可。 #### 查阅项目所需的 Gradle 版本 对于不确定具体应下载哪个版本的情况,可通过查阅项目的 `gradle/wrapper/gradle-wrapper.properties` 文件确认需求版本号。 #### 替代方案:全局安装 Gradle 并设置环境变量 另一种做法是直接从官方源下载特定版本的 Gradle,并将其作为系统的全局工具来管理。这一步骤涉及以下几个方面的工作: - 前往 [Gradle 官方分发页](https://services.gradle.org/distributions/) 获取目标版本; - 解压缩已下载的文件包; - 设置系统级别的环境变量以便命令行能够识别新安装的 Gradle 实例; 验证安装是否成功的简单方法是在终端执行 `gradle -v` 来查看返回的信息中是否有预期的版本描述[^2]。 此外,还需指定一个自定义的依赖项仓库路径给 Gradle 使用,例如 `D:\software\gradle-repository`,从而避免重复下载相同的库资源。 #### 处理潜在兼容性问题 有时即使完成了上述操作,仍可能遇到由于 IDE 或 JDK 不匹配而导致的问题。此时应当考虑升级 Android Studio 至最新稳定版以及确保选用合适的 Java Development Kit (JDK) 版本来支持当前开发环境的需求[^3]。
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值