2025
Tensor Nuclear Norm-Based Multi-Channel Atomic Representation for Robust Face Recognition.
IEEE Trans. Image Process., 2025
Some bivariate options pricing in a regime-switching stochastic volatility jump-diffusion model with stochastic intensity, stochastic interest and dependent jump.
Math. Comput. Simul., 2025
Semantic segmentation-based conservation tillage corn straw return cover type recognition.
Comput. Electron. Agric., 2025
2024
TIHN: Tensor Improved Huber Norm for low-rank tensor recovery.
Int. J. Wavelets Multiresolution Inf. Process., September, 2024
Double graphs regularized multi-view subspace clustering.
Int. J. Wavelets Multiresolution Inf. Process., January, 2024
Exact boundary controllability of nodal profile for the system of one-dimensional adiabatic flow.
Syst. Control. Lett., 2024
2023
Study on the Nonlinear Stability and Parametric Analysis of a Tensile-Beam Cable Dome.
Symmetry, September, 2023
Attention reweighted sparse subspace clustering.
Pattern Recognit., July, 2023
Exact Boundary Controllability of Nodal Profile for Quasilinear Hyperbolic Systems and Its Asymptotic Stability.
SIAM J. Control. Optim., February, 2023
Research on Ground-Airborne Frequency-Domain Electromagnetic Rapid Imaging Method Based on Space Magnetic Gradient Anomaly.
IEEE Trans. Geosci. Remote. Sens., 2023
A digital twin approach for tunnel construction safety early warning and management.
Comput. Ind., 2023
2022
Double Graphs Regularized Multi-view Subspace Clustering.
CoRR, 2022
Global Weighted Tensor Nuclear Norm for Tensor Robust Principal Component Analysis.
CoRR, 2022
2021
Probabilistic Assessment Approach of the Aerostatic Instability of Long-Span Symmetry Cable-Stayed Bridges.
Symmetry, 2021
Optimized Power Control in Internet of Vehicles Based on Serial Interference Cancellation and User Matching.
IEEE Access, 2021
2020
Cryptanalysis of certificateless authenticated key agreement protocols.
Int. J. Ad Hoc Ubiquitous Comput., 2020
Tightly-secure two-pass authenticated key exchange protocol using twin Diffie-Hellman problem.
IET Inf. Secur., 2020
Asymmetrical Vertical Federated Learning.
CoRR, 2020
2018
Transcriptome profilling analysis characterized the gene expression patterns responded to combined drought and heat stresses in soybean.
Comput. Biol. Chem., 2018
Research on Collaborative Filtering Recommendation of Learning Resource Based on Knowledge Association.
Proceedings of the Innovative Technologies and Learning - First International Conference, 2018
2016
Application of CCG Sensors to a High-Temperature Structure Subjected to Thermo-Mechanical Load.
Sensors, 2016
Aerodynamic Drag Analysis of 3-DOF Flex-Gimbal GyroWheel System in the Sense of Ground Test.
Sensors, 2016
Unified security model of authenticated key exchange with specific adversarial capabilities.
IET Inf. Secur., 2016
2014
Ordinal Feature Selection for Iris and Palmprint Recognition.
IEEE Trans. Image Process., 2014
One-Round Deniable Key Exchange with Perfect Forward Security.
IACR Cryptol. ePrint Arch., 2014
A Brief Survey on Recent Progress in Iris Recognition.
Proceedings of the Biometric Recognition - 9th Chinese Conference, 2014
2013
Cryptanalysis of Reduced-Round DASH.
J. Comput. Sci. Technol., 2013
A feature-level solution to off-angle iris recognition.
Proceedings of the International Conference on Biometrics, 2013
Adaptive Feature Selection via Boosting-Like Sparsity Regularization.
Proceedings of the 2nd IAPR Asian Conference on Pattern Recognition, 2013
2012
One-round identity-based key exchange with Perfect Forward Security.
Inf. Process. Lett., 2012
Robust regularized feature selection for iris recognition via linear programming.
Proceedings of the 21st International Conference on Pattern Recognition, 2012
Improved Related-Key Differential Attacks on Reduced-Round LBlock.
Proceedings of the Information and Communications Security - 14th International Conference, 2012
2011
TMQV: A Strongly eCK-secure Diffie-Hellman Protocol without Gap Assumption.
J. Internet Serv. Inf. Secur., 2011
Improved Related-Key Boomerang Distinguishing Attack of Threefish-256.
IACR Cryptol. ePrint Arch., 2011
Analysis and Improvement of an Authenticated Key Exchange Protocol.
Proceedings of the Information Security Practice and Experience, 2011
2010
Security Enhancement and Modular Treatment towards Authenticated Key Exchange.
Proceedings of the Information and Communications Security - 12th International Conference, 2010