Kunpeng Wang

Orcid: 0000-0002-3848-6419

According to our database1, Kunpeng Wang authored at least 120 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Key derivable signature and its application in blockchain stealth address.
Cybersecur., December, 2024

Learning Adaptive Fusion Bank for Multi-Modal Salient Object Detection.
IEEE Trans. Circuits Syst. Video Technol., August, 2024

A communication-efficient method for generalized linear regression with ℓ <sub>0</sub> regularization.
Commun. Stat. Simul. Comput., August, 2024

A novel transfer extreme learning machine from multiple sources for intrusion detection.
Peer Peer Netw. Appl., January, 2024

Alignment-Free RGBT Salient Object Detection: Semantics-Guided Asymmetric Correlation Network and a Unified Benchmark.
IEEE Trans. Multim., 2024

Underground Power Cable Fault Detection and Localization Based on the Spectrum of Propagation Functions.
IEEE Trans. Instrum. Meas., 2024

2-D Magnetotelluric Gradient Prediction With the Transformer + Unet Network Based on Transverse Magnetic Polarization.
IEEE Trans. Geosci. Remote. Sens., 2024

CSEM and MT Inversion at the Hontomín CO₂ Storage Site in Burgos, Spain.
IEEE Trans. Geosci. Remote. Sens., 2024

Thunderbird: Efficient Homomorphic Evaluation of Symmetric Ciphers in 3GPP by combining two modes of TFHE.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

Faster NTRU-based Bootstrapping in less than 4 ms.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

Faster Bootstrapping via Modulus Raising and Composite NTT.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

A Robust Space Target Extraction Algorithm Based on Standardized Correlation Space Construction.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2024

A lightweight intrusion detection system for internet of vehicles based on transfer learning and MobileNetV2 with hyper-parameter optimization.
Multim. Tools Appl., 2024

Convolutional long-short term memory network for space debris detection and tracking.
Knowl. Based Syst., 2024

Circuit Bootstrapping: Faster and Smaller.
IACR Cryptol. ePrint Arch., 2024

Unveiling the Limits of Alignment: Multi-modal Dynamic Local Fusion Network and A Benchmark for Unaligned RGBT Video Object Detection.
CoRR, 2024

3-D Magnetotelluric Deep Learning Inversion Guided by Pseudo-Physical Information.
CoRR, 2024

Adapting Segment Anything Model to Multi-modal Salient Object Detection with Semantic Feature Fusion Guidance.
CoRR, 2024

eBiBa: A Post-Quantum Hash-Based Signature With Small Signature Size in the Continuous Communication of Large-Scale Data.
Comput. J., 2024

Bidirectional Alternating Fusion Network for RGB-T Salient Object Detection.
Proceedings of the Pattern Recognition and Computer Vision - 7th Chinese Conference, 2024

Efficient Blind Rotation in FHEW Using Refined Decomposition and NTT.
Proceedings of the Information Security - 27th International Conference, 2024

TFHE Bootstrapping: Faster, Smaller and Time-Space Trade-Offs.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024

A Novel Window τNAF on Koblitz Curves.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024

2023
Time-domain adaptive attention network for single-channel speech separation.
EURASIP J. Audio Speech Music. Process., December, 2023

Security estimation of LWE via BKW algorithms.
Cybersecur., December, 2023

Multi-stage attention network for monaural speech enhancement.
IET Signal Process., March, 2023

Multimodal salient object detection via adversarial learning with collaborative generator.
Eng. Appl. Artif. Intell., March, 2023

A New Measure for Determining the Equivalent Symmetry of Decomposed Subsystems from Large Complex Cyber-Physical Systems.
Symmetry, 2023

Detection Method of Radar Space Target Abnormal Motion via Local Density Peaks and Micro-Motion Feature.
IEEE Geosci. Remote. Sens. Lett., 2023

Underwater image enhancement method based on entropy weight fusion.
Comput. Animat. Virtual Worlds, 2023

Intrusion detection algorithom based on transfer extreme learning machine.
Intell. Data Anal., 2023

Unified-modal Salient Object Detection via Adaptive Prompt Learning.
CoRR, 2023

RecycleGPT: An Autoregressive Language Model with Recyclable Module.
CoRR, 2023

Erasure-based Interaction Network for RGBT Video Object Detection and A Unified Benchmark.
CoRR, 2023

Almost Injective and Invertible Encodings for Jacobi Quartic Curves.
Proceedings of the Science of Cyber Security - 5th International Conference, 2023

Implementation of the Elliptic Curve Method.
Proceedings of the Science of Cyber Security - 5th International Conference, 2023

An Improved BKW Algorithm for Solving LWE with Small Secrets.
Proceedings of the Information Security - 26th International Conference, 2023

Subfield Attack on NTRU by using symmetric function map.
Proceedings of the IEEE International Symposium on Information Theory, 2023

Revisiting Key Switching Techniques with Applications to Light-Key FHE.
Proceedings of the Information Security and Cryptology - ICISC 2023, 2023

Full Domain Functional Bootstrapping with Least Significant Bit Encoding.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

Anomaly Sound Detection of Industrial Equipment Based on Incremental Learning.
Proceedings of the CAA Symposium on Fault Detection, 2023

2022
Space Target Anomaly Detection Based on Gaussian Mixture Model and Micro-Doppler Features.
IEEE Trans. Geosci. Remote. Sens., 2022

A New Pattern for Detection of Streak-Like Space Target From Single Optical Images.
IEEE Trans. Geosci. Remote. Sens., 2022

1-Bit Radar Imaging Based on Adversarial Samples.
IEEE Trans. Geosci. Remote. Sens., 2022

Speech Enhancement Model Synthesis Based on Federal Learning for Industrial CPS in Multiple Noise Conditions.
Symmetry, 2022

Formation optimization of blockchain-assisted swarm robotics systems against failures based on energy balance.
Simul. Model. Pract. Theory, 2022

Mutual prediction learning and mixed viewpoints for unsupervised-domain adaptation person re-identification on blockchain.
Simul. Model. Pract. Theory, 2022

Small Object Detection Method Based on Adaptive Spatial Parallel Convolution and Fast Multi-Scale Fusion.
Remote. Sens., 2022

A Robust Space Target Detection Algorithm Based on Target Characteristics.
IEEE Geosci. Remote. Sens. Lett., 2022

ConGNN: Context-consistent cross-graph neural network for group emotion recognition in the wild.
Inf. Sci., 2022

Hybrid Dual and Meet-LWE Attack.
IACR Cryptol. ePrint Arch., 2022

Hash-based signature revisited.
Cybersecur., 2022

A CT-Based Airway Segmentation Using U<sup>2</sup>-net Trained by the Dice Loss Function.
CoRR, 2022

Efficient Scalar Multiplication on Koblitz Curves with Pre-computation.
Proceedings of the Information Security - 25th International Conference, 2022

Partial Key Exposure Attacks on RSA with Moduli N=p<sup>r</sup>q<sup>s</sup>.
Proceedings of the IEEE International Symposium on Information Theory, 2022

Subfield Attacks on HSVP in Ideal Lattices.
Proceedings of the Information Security and Cryptology - 18th International Conference, 2022

2021
3-D Particle Surface Reconstruction From Multiview 2-D Images With Structure From Motion and Shape From Shading (January 2020).
IEEE Trans. Ind. Electron., 2021

Study on the hydrodynamic behaviour of journal bearing with herringbone grooved sleeve considering cavitation.
Int. J. Comput. Sci. Math., 2021

Co-teaching based pseudo label refinery for cross-domain object detection.
IET Image Process., 2021

Hybrid Dual Attack on LWE with Arbitrary Secrets.
IACR Cryptol. ePrint Arch., 2021

2020
Multi-Modality Medical Image Fusion Using Convolutional Neural Network and Contrast Pyramid.
Sensors, 2020

SecureBP from Homomorphic Encryption.
Secur. Commun. Networks, 2020

Ferrograph Analysis With Improved Particle Segmentation and Classification Methods.
J. Comput. Inf. Sci. Eng., 2020

Real-time Arm Gesture Recognition in Smart Home Scenarios via Millimeter Wave Sensing.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2020

2019
A more efficient leveled strongly-unforgeable fully homomorphic signature scheme.
Inf. Sci., 2019

Fully homomorphic encryption based on the ring learning with rounding problem.
IET Inf. Secur., 2019

PCA-based GRS analysis enhances the effectiveness for genetic correlation detection.
Briefings Bioinform., 2019

The Effects of Walking Speed and Hardness of Terrain on the Foot-Terrain Interaction and Driving Torque for Planar Human Walking.
IEEE Access, 2019

Efficient Leveled (Multi) Identity-Based Fully Homomorphic Encryption Schemes.
IEEE Access, 2019

GPU-based 3D cryo-EM reconstruction with key-value streams: poster.
Proceedings of the 24th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, 2019

Improved Digital Signatures Based on Elliptic Curve Endomorphism Rings.
Proceedings of the Information Security Practice and Experience, 2019

Parallelizing cryo-EM 3D reconstruction on GPU cluster with a partitioned and streamed model.
Proceedings of the ACM International Conference on Supercomputing, 2019

Analysis of Joint Torque under Single Movement Cycle of Underwater Legged Robot.
Proceedings of the 4th IEEE International Conference on Advanced Robotics and Mechatronics, 2019

Design, Development and Testing of a Wearable sEMG Acquisition System.
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019

Large-scale Parallel Design for Cryo-EM Structure Determination on Heterogeneous Many-core Architectures.
Proceedings of the 2019 IEEE International Conference on Bioinformatics and Biomedicine, 2019

Strongly Secure Authenticated Key Exchange from Supersingular Isogenies.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
LWR-Based Fully Homomorphic Encryption, Revisited.
Secur. Commun. Networks, 2018

Preprocess-then-NTT Technique and Its Applications to KYBER and NEWHOPE.
IACR Cryptol. ePrint Arch., 2018

Strongly Secure Authenticated Key Exchange from Supersingular Isogeny.
IACR Cryptol. ePrint Arch., 2018

Cover attacks for elliptic curves with cofactor two.
Des. Codes Cryptogr., 2018

Verifiable Decryption for Fully Homomorphic Encryption.
Proceedings of the Information Security - 21st International Conference, 2018

Leveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with Rounding.
Proceedings of the Information Security Practice and Experience, 2018

Probability Preservation Property with Relative Error and Its Applications.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

2017
A Novel Geometric Dictionary Construction Approach for Sparse Representation Based Image Fusion.
Entropy, 2017

Compact (Targeted Homomorphic) Inner Product Encryption from LWE.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

Hashing into Twisted Jacobi Intersection Curves.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

2016
Management of Machine Room in Power System Based on Intelligent Monitoring.
Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2016

Constructing Isogenies on Extended Jacobi Quartic Curves.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

Deterministic Encoding into Twisted Edwards Curves.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
An Efficient Leveled Identity-Based FHE.
Proceedings of the Network and System Security - 9th International Conference, 2015

LWE-Based FHE with Better Parameters.
Proceedings of the Advances in Information and Computer Security, 2015

Hashing into Jacobi Quartic Curves.
Proceedings of the Information Security - 18th International Conference, 2015

Leveled Strongly-Unforgeable Identity-Based Fully Homomorphic Signatures.
Proceedings of the Information Security - 18th International Conference, 2015

Some Elliptic Subcovers of Genus 3 Hyperelliptic Curves.
Proceedings of the Information Security Practice and Experience, 2015

Models of Curves from GHS Attack in Odd Characteristic.
Proceedings of the Information Security Practice and Experience, 2015

Analysis of Fractional ωmbNAF for Scalar Multiplication.
Proceedings of the Information Security Practice and Experience, 2015

Improved Tripling on Elliptic Curves.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

Hashing into Generalized Huff Curves.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

2014
Fully Homomorphic Encryption with Auxiliary Inputs.
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014

A Note on Diem's Proof.
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014

On the Lossiness of 2 k -th Power and the Instantiability of Rabin-OAEP.
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014

2013
Fast Symmetric Pairing Revisited.
Proceedings of the Pairing-Based Cryptography - Pairing 2013, 2013

Joint Triple-Base Number System for Multi-Scalar Multiplication.
Proceedings of the Information Security Practice and Experience, 2013

About Hash into Montgomery Form Elliptic Curves.
Proceedings of the Information Security Practice and Experience, 2013

Demonstration of a 200 kW/200 kWh energy storage system on an 11kV UK distribution feeder.
Proceedings of the 4th IEEE PES Innovative Smart Grid Technologies Europe, 2013

DIFTSAS: A DIstributed Full Text Search and Analysis System for Big Data.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

Omega Pairing on Hyperelliptic Curves.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

Triple-Base Number System for Scalar Multiplication.
Proceedings of the Progress in Cryptology, 2013

On the Expansion Length Of Triple-Base Number Systems.
Proceedings of the Progress in Cryptology, 2013

2012
On Efficient Pairings on Elliptic Curves over Extension Fields.
IACR Cryptol. ePrint Arch., 2012

An Improved Twisted Ate Pairing over KSS Curves with k = 18.
Proceedings of the Pairing-Based Cryptography - Pairing 2012, 2012

2011
Another Elliptic Curve Model for Faster Pairing Computation.
Proceedings of the Information Security Practice and Experience, 2011

2010
Pairing Computation on Elliptic Curves of Jacobi Quartic Form.
IACR Cryptol. ePrint Arch., 2010

Cubic surface fitting to image by combination.
Sci. China Inf. Sci., 2010

A Deniable Group Key Establishment Protocol in the Standard Model.
Proceedings of the Information Security, 2010

2009
New Greedy Algorithm for Computing Double-Base Chains.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2007
On optimal simultaneous rational approximation to (omega, omega<sup>2</sup>)<sup>tau</sup> with omega being some kind of cubic algebraic function.
J. Approx. Theory, 2007

2006
Implementation of Multi-continued Fraction Algorithm and Application to Multi-sequence Linear Synthesis.
Proceedings of the Sequences and Their Applications, 2006

A Workflow Management System for Dynamic Alliance.
Proceedings of the Knowledge Enterprise: Intelligent Strategies in Product Design, 2006

2005
Computation of Tate Pairing for Supersingular Curves over characteristic 5 and 7.
IACR Cryptol. ePrint Arch., 2005


  Loading...