Lei Hu
Orcid: 0000-0002-9920-5342
According to our database1,
Lei Hu
authored at least 450 papers
between 1997 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Managing flexible linguistic expressions with subjective preferences and objective information in group decision-making: A perspective based on personalized individual semantics.
Inf. Fusion, 2025
2024
Integration of texture analysis based on DCE-MRI K<sup>trans</sup> map and metabolomics of early bone marrow microvascular changes in alloxan-induced diabetic rabbits.
BMC Medical Imaging, December, 2024
Des. Codes Cryptogr., November, 2024
Motion planning and contact force distribution for heavy-duty hexapod robots walking on unknown rugged terrains.
J. Field Robotics, September, 2024
IEEE Trans. Vis. Comput. Graph., August, 2024
DePNR: A DeBERTa-based deep learning model with complete position embedding for place name recognition from geographical literature.
Trans. GIS, August, 2024
Protecting Prostate Cancer Classification From Rectal Artifacts via Targeted Adversarial Training.
IEEE J. Biomed. Health Informatics, July, 2024
Hierarchical Evolving Fuzzy System: A Method for Multidimensional Chaotic Time Series Online Prediction.
IEEE Trans. Fuzzy Syst., June, 2024
Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery.
J. Cryptol., June, 2024
A Synchrosqueezed Transform Method Based on Fast Kurtogram and Demodulation and Piecewise Aggregate Approximation for Bearing Fault Diagnosis.
Sensors, April, 2024
Reconfigurable Intelligent Surface-Assisted Secret Key Generation in Spatially Correlated Channels.
IEEE Trans. Wirel. Commun., March, 2024
ASPP+-LANet: A Multi-Scale Context Extraction Network for Semantic Segmentation of High-Resolution Remote Sensing Images.
Remote. Sens., March, 2024
Exploiting Malicious RIS for Secret Key Acquisition in Physical-Layer Key Generation.
IEEE Wirel. Commun. Lett., February, 2024
Biomed. Signal Process. Control., February, 2024
A time series continuous missing values imputation method based on generative adversarial networks.
Knowl. Based Syst., January, 2024
GeoTPE: A neural network model for geographical topic phrases extraction from literature based on BERT enhanced with relative position embedding.
Expert Syst. Appl., January, 2024
IACR Trans. Symmetric Cryptol., 2024
SemiPSENet: A Novel Semi-Supervised Change Detection Network for Remote Sensing Images.
IEEE Trans. Geosci. Remote. Sens., 2024
Diffraction and Interaction of Interfacial Solitons in a Two-Layer Fluid of Great Depth.
SIAM J. Appl. Math., 2024
IACR Cryptol. ePrint Arch., 2024
Probabilistic Extensions: A One-Step Framework for Finding Rectangle Attacks and Beyond.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Generalized Impossible Differential Attacks on Block Ciphers: Application to SKINNY and ForkSKINNY.
IACR Cryptol. ePrint Arch., 2024
Finite Fields Their Appl., 2024
CoRR, 2024
On-the-fly Learning to Transfer Motion Style with Diffusion Models: A Semantic Guidance Approach.
CoRR, 2024
CoRR, 2024
An Intuitionistic Fuzzy SWARA-AROMAN Decision-Making Framework for Sports Event Management.
IEEE Access, 2024
IEEE Access, 2024
Cross Modal Few Shot Learning for Tree Species Classification Using Airborne Hyperspectral Images.
Proceedings of the IGARSS 2024, 2024
Proceedings of the Pattern Recognition - 27th International Conference, 2024
Proceedings of the 7th ACM SIGSPATIAL International Workshop on AI for Geographic Knowledge Discovery, 2024
Proceedings of the Computer Security - ESORICS 2024, 2024
Generalized Few-Shot Meets Remote Sensing: Discovering Novel Classes in Land Cover Mapping via Hybrid Semantic Segmentation Framework.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024
Proceedings of the 2024 4th International Conference on Artificial Intelligence, 2024
2023
Comput. J., December, 2023
Reconfigurable Intelligent Surface-Aided Secret Key Generation in Multi-Cell Systems.
IEEE Trans. Commun., November, 2023
RTV-SIFT: Harnessing Structure Information for Robust Optical and SAR Image Registration.
Remote. Sens., September, 2023
TTNet: A Temporal-Transform Network for Semantic Change Detection Based on Bi-Temporal Remote Sensing Images.
Remote. Sens., September, 2023
CAAI Trans. Intell. Technol., September, 2023
IEEE Trans. Inf. Theory, August, 2023
An interoperable and service-oriented approach for real-time environmental simulation by coupling OGC WPS and SensorThings API.
Environ. Model. Softw., July, 2023
MSRA-G: Combination of multi-scale residual attention network and generative adversarial networks for hyperspectral image classification.
Eng. Appl. Artif. Intell., May, 2023
Two-rank multi-attribute group decision-making with linguistic distribution assessments: An optimization-based integrated approach.
Eng. Appl. Artif. Intell., May, 2023
Des. Codes Cryptogr., May, 2023
A New Method To Find All The High-Probability Word-Oriented Truncated Differentials: Application To <tt>Midori</tt>, <tt>SKINNY</tt> And <tt>CRAFT</tt>.
Comput. J., May, 2023
Remote. Sens., April, 2023
Examining the Spatially Varying Relationships between Landslide Susceptibility and Conditioning Factors Using a Geographical Random Forest Approach: A Case Study in Liangshan, China.
Remote. Sens., March, 2023
IACR Trans. Symmetric Cryptol., 2023
Cross-Domain Meta-Learning Under Dual-Adjustment Mode for Few-Shot Hyperspectral Image Classification.
IEEE Trans. Geosci. Remote. Sens., 2023
Implementation of the expansion of sensor information storage based on the Internet of Things and cloud computing.
Secur. Priv., 2023
Boosting question answering over knowledge graph with reward integration and policy evaluation under weak supervision.
Inf. Process. Manag., 2023
A Spine Segmentation Method under an Arbitrary Field of View Based on 3D Swin Transformer.
Int. J. Intell. Syst., 2023
STP-Net: A Signal Prediction Method of Laminar Decompression Robot Based on Swin Transformer.
Int. J. Intell. Syst., 2023
Searching the space of tower field implementations of the 픽<sub>2<sup>8</sup></sub> inverter - with applications to AES, Camellia and SM4.
Int. J. Inf. Comput. Secur., 2023
Exploiting Non-Full Key Additions: Full-Fledged Automatic Demirci-Selcuk Meet-in-the-Middle Cryptanalysis of SKINNY.
IACR Cryptol. ePrint Arch., 2023
Signal Leakage Attack Meets Depth First Search: an Improved Approach on DXL Key Exchange Protocol.
IACR Cryptol. ePrint Arch., 2023
Automatic laminectomy cutting plane planning based on artificial intelligence in robot assisted laminectomy surgery.
CoRR, 2023
Evaluation Method of Electric Vehicle Charging Station Operation Based on Contrastive Learning.
Big Data Cogn. Comput., 2023
Multi-Objective Matched Synchrosqueezing Chirplet Transform for Fault Feature Extraction From Marine Turbochargers.
IEEE Access, 2023
Proceedings of the 98th IEEE Vehicular Technology Conference, 2023
Proceedings of the Advances in Information and Computer Security, 2023
AttT2M: Text-Driven Human Motion Generation with Multi-Perspective Attention Mechanism.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
Towards Time-Series Key Points Detection Through Self-supervised Learning and Probability Compensation.
Proceedings of the Database Systems for Advanced Applications, 2023
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023
2022
Neural3Points: Learning to Generate Physically Realistic Full-body Motion for Virtual Reality Users.
Comput. Graph. Forum, December, 2022
Reconfigurable Intelligent Surface for Physical Layer Key Generation: Constructive or Destructive?
IEEE Wirel. Commun., 2022
IACR Trans. Symmetric Cryptol., 2022
WRICNet: A Weighted Rich-Scale Inception Coder Network for Remote Sensing Image Change Detection.
IEEE Trans. Geosci. Remote. Sens., 2022
Multitask Multigranularity Aggregation With Global-Guided Attention for Video Person Re-Identification.
IEEE Trans. Circuits Syst. Video Technol., 2022
Theor. Comput. Sci., 2022
Discriminative Context-Aware Network for Target Extraction in Remote Sensing Imagery.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2022
Bearing Fault Diagnosis Using Piecewise Aggregate Approximation and Complete Ensemble Empirical Mode Decomposition with Adaptive Noise.
Sensors, 2022
New Era for Geo-Parsing to Obtain Actual Locations: A Novel Toponym Correction Method Based on Remote Sensing Images.
Remote. Sens., 2022
IRA-MRSNet: A Network Model for Change Detection in High-Resolution Remote Sensing Images.
Remote. Sens., 2022
Facilitating Typhoon-Triggered Flood Disaster-Ready Information Delivery Using SDI Services Approach - A Case Study in Hainan.
Remote. Sens., 2022
Neurocomputing, 2022
IEICE Electron. Express, 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
LMS-SM3 and HSS-SM3: Instantiating Hash-based Post-Quantum Signature Schemes with SM3.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Int. J. Geogr. Inf. Sci., 2022
Int. J. Geogr. Inf. Sci., 2022
Discret. Appl. Math., 2022
Sci. China Inf. Sci., 2022
A domain adaptation neural network for change detection with heterogeneous optical and SAR remote sensing images.
Int. J. Appl. Earth Obs. Geoinformation, 2022
Proceedings of the 96th Vehicular Technology Conference, 2022
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the Information and Communications Security - 24th International Conference, 2022
A High Dynamic Range Phase Modulated Analog Photonic Link Based on IMD3 and IMD5 Suppression.
Proceedings of the 14th IEEE International Conference on Advanced Infocomm Technology, 2022
Proceedings of the IEEE Global Communications Conference, 2022
Proceedings of the Computer Vision - ECCV 2022, 2022
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022
Proceedings of the Information Security and Cryptology - 18th International Conference, 2022
Proceedings of the Computing in Cardiology, 2022
CASA-Net: A Context-Aware Correlation Convolutional Network for Scale-Adaptive Crack Detection.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022
2021
Int. J. Interact. Mob. Technol., July, 2021
Super-Resolution Network with Information Distillation and Multi-Scale Attention for Medical CT Image.
Sensors, 2021
Remote. Sens., 2021
Characterizing Spatial Patterns of Pine Wood Nematode Outbreaks in Subtropical Zone in China.
Remote. Sens., 2021
MRA-SNet: Siamese Networks of Multiscale Residual and Attention for Change Detection in High-Resolution Remote Sensing Images.
Remote. Sens., 2021
The Integration of Linguistic and Geospatial Features Using Global Context Embedding for Automated Text Geocoding.
ISPRS Int. J. Geo Inf., 2021
Geospatial Semantics Analysis of the Qinghai-Tibetan Plateau Based on Microblog Short Texts.
ISPRS Int. J. Geo Inf., 2021
Influential Factor Detection for Tourism on the Qinghai-Tibet Plateau Based on Social Media Data.
ISPRS Int. J. Geo Inf., 2021
A Systematic Approach and Analysis of Key Mismatch Attacks on CPA-Secure Lattice-Based NIST Candidate KEMs.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Automatic Classical and Quantum Rebound Attacks on AES-like Hashing by Exploiting Related-key Differentials.
IACR Cryptol. ePrint Arch., 2021
Meet-in-the-Middle Attacks Revisited: Focusing on Key-recovery and Collision Attacks.
IACR Cryptol. ePrint Arch., 2021
Some classes of power functions with low c-differential uniformity over finite fields.
Des. Codes Cryptogr., 2021
WRICNet: A Weighted Rich-scale Inception Coder Network for Multi-Resolution Remote Sensing Image Change Detection.
CoRR, 2021
Intelligent Reflecting Surface-Assisted Secret Key Generation In Multi-antenna Network.
CoRR, 2021
On the Existence of Coupled Fractional Jerk Equations with Multi-Point Boundary Conditions.
Axioms, 2021
A secure distributed machine learning protocol against static semi-honest adversaries.
Appl. Soft Comput., 2021
A combination method of stacked autoencoder and 3D deep residual network for hyperspectral image classification.
Int. J. Appl. Earth Obs. Geoinformation, 2021
IEEE Access, 2021
Force Perception and Bone Recognition of Vertebral Lamina Milling by Robot-Assisted Ultrasonic Bone Scalpel Based on Backpropagation Neural Network.
IEEE Access, 2021
Development and Test of One Commercial Megawatt Superconducting DC Induction Heater With Extra High Energy Efficiency.
IEEE Access, 2021
Proceedings of the 94th IEEE Vehicular Technology Conference, 2021
On the RIS Manipulating Attack and Its Countermeasures in Physical-layer Key Generation.
Proceedings of the 94th IEEE Vehicular Technology Conference, 2021
Proceedings of the 2021 IEEE International Conference on Systems, Man, and Cybernetics, 2021
Proceedings of the Post-Quantum Cryptography - 12th International Workshop, 2021
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021
Proceedings of the Information Security - 24th International Conference, 2021
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021
Proceedings of the ICRSA 2021: 4th International Conference on Robot Systems and Applications, Chengdu, China, April 9, 2021
Research on Intelligent Assignment Method of Radar Jamming Task in Electronic Air Defense Operation.
Proceedings of the ICCAI '21: 2021 7th International Conference on Computing and Artificial Intelligence, Tianjin China, April 23, 2021
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
Developing Geospatial Web Services for Automatic Flood Mapping using Sentinel-1 Images.
Proceedings of the 9th International Conference on Agro-Geoinformatics, 2021
2020
Weakly Supervised Adversarial Learning for 3D Human Pose Estimation from Point Clouds.
IEEE Trans. Vis. Comput. Graph., 2020
IACR Trans. Symmetric Cryptol., 2020
A study on the relationship between the rank of input data and the performance of random weight neural network.
Neural Comput. Appl., 2020
IACR Cryptol. ePrint Arch., 2020
Quantum Collision Attacks on AES-like Hashing with Low Quantum Random Access Memories.
IACR Cryptol. ePrint Arch., 2020
Finite Fields Their Appl., 2020
Des. Codes Cryptogr., 2020
Ad Hoc Networks, 2020
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2020, 2020
2019
IACR Trans. Symmetric Cryptol., 2019
IACR Trans. Symmetric Cryptol., 2019
IACR Trans. Symmetric Cryptol., 2019
Moth and Ant Inspired Routing in Hierarchical Airborne Networks with Multi-Beam Antennas.
IEEE Trans. Mob. Comput., 2019
IEEE Trans. Aerosp. Electron. Syst., 2019
New Calibrator with Points Distributed Conical Helically for Online Calibration of C-Arm.
Sensors, 2019
移动边缘计算中的计算卸载策略研究综述 (Survey of Research on Computation Unloading Strategy in Mobile Edge Computing).
计算机科学, 2019
Deep Image Similarity Measurement Based on the Improved Triplet Network with Spatial Pyramid Pooling.
Inf., 2019
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator.
IACR Cryptol. ePrint Arch., 2019
Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
An efficient dynamic volume rendering for large-scale meteorological data in a virtual globe.
Comput. Geosci., 2019
Future Gener. Comput. Syst., 2019
Bilinear forms, modulational instability and dark solitons for a fifth-order variable-coefficient nonlinear Schrödinger equation in an inhomogeneous optical fiber.
Appl. Math. Comput., 2019
Prediction of Axis Attitude Deviation and Deviation Correction Method Based on Data Driven During Shield Tunneling.
IEEE Access, 2019
The Boomerang Uniformity of Power Permutations x<sup>2</sup><sup>k</sup><sup>-1</sup> over F2<sup>n</sup>.
Proceedings of the Ninth International Workshop on Signal Design and its Applications in Communications, 2019
Revisiting Approximate Polynomial Common Divisor Problem and Noisy Multipolynomial Reconstruction.
Proceedings of the Progress in Cryptology - INDOCRYPT 2019, 2019
Proceedings of the Twelfth International Conference on Machine Vision, 2019
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
Proceedings of the Information and Communications Security - 21st International Conference, 2019
Proceedings of the Information and Communications Security - 21st International Conference, 2019
Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full \mathsf MORUS.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
2018
Outsourcing Set Intersection Computation Based on Bloom Filter for Privacy Preservation in Multimedia Processing.
Secur. Commun. Networks, 2018
Secur. Commun. Networks, 2018
基于稀疏恢复与优化的显著性目标检测算法 (Salient Object Detection Algorithm Based on Sparse Recovery and Optimization).
计算机科学, 2018
基于似物性和空时协方差特征的行人检测算法 (Pedestrian Detection Based on Objectness and Sapce-Time Covariance Features).
计算机科学, 2018
J. Syst. Sci. Complex., 2018
Int. J. Digit. Multim. Broadcast., 2018
Revisiting Orthogonal Lattice Attacks on Approximate Common Divisor Problems and their Applications.
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Finite Fields Their Appl., 2018
Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator.
Des. Codes Cryptogr., 2018
New results on permutation polynomials of the form (x p m - x + δ) s + x p m + x over 𝔽 p<sup>2m</sup>.
Cryptogr. Commun., 2018
Breather-to-soliton transition for a sixth-order nonlinear Schrödinger equation in an optical fiber.
Appl. Math. Lett., 2018
An Automated Calibration Method of Ultrasonic Probe Based on Coherent Point Drift Algorithm.
IEEE Access, 2018
Proceedings of the 10th International Conference on Wireless Communications and Signal Processing, 2018
Visual Tracking via Detecting and Removing Outliers Based on Block Sparse Representation.
Proceedings of the 10th International Conference on Wireless Communications and Signal Processing, 2018
Anterior Cruciate Ligament Reconstruction Surgery Navigation and Robotic Positioning System Under X-Rays.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2018
Proceedings of the Information Security - 21st International Conference, 2018
An Investigation of Errors in Fluoroscopic Navigation for Robot-Assisted Orthopedic Surgery.
Proceedings of the 8th International Conference on Bioscience, 2018
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
IACR Trans. Symmetric Cryptol., 2017
Events detection and community partition based on probabilistic snapshot for evolutionary social network.
Peer-to-Peer Netw. Appl., 2017
基于压缩域编码长度的视频显著性检测 (Video Saliency Detection Based on Compressed Domain Coding Length).
计算机科学, 2017
计算机科学, 2017
面向主观质量的视频传输编码参数的选择 (Choice of Coding Parameters in Video Transmission for Perceptual Quality).
计算机科学, 2017
KSII Trans. Internet Inf. Syst., 2017
Int. J. Found. Comput. Sci., 2017
Further results on permutation trinomials over finite fields with even characteristic.
Finite Fields Their Appl., 2017
Sci. China Inf. Sci., 2017
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017
Proceedings of the 10th International Symposium on Computational Intelligence and Design, 2017
Proceedings of the 2017 IEEE International Geoscience and Remote Sensing Symposium, 2017
Integrating OGC Web Processing Service with cloud computing environment for Earth Observation data.
Proceedings of the 2017 6th International Conference on Agro-Geoinformatics, 2017
Performance improvement on a Web Geospatial service for the remote sensing flood-induced crop loss assessment web application using vector tiling.
Proceedings of the 2017 6th International Conference on Agro-Geoinformatics, 2017
Crop Fraction Layer (CFL) datasets derived through MODIS and LandSat for the continental US from year 2000-2016.
Proceedings of the 2017 6th International Conference on Agro-Geoinformatics, 2017
Agriculture flood mapping with Soil Moisture Active Passive (SMAP) data: A case of 2016 Louisiana flood.
Proceedings of the 2017 6th International Conference on Agro-Geoinformatics, 2017
Developing a Web service based application for demographic information modeling and analyzing.
Proceedings of the 2017 6th International Conference on Agro-Geoinformatics, 2017
Proceedings of the 2017 6th International Conference on Agro-Geoinformatics, 2017
Proceedings of the 2017 6th International Conference on Agro-Geoinformatics, 2017
2016
Salient object detection based on discriminative boundary and multiple cues integration.
J. Electronic Imaging, 2016
IACR Cryptol. ePrint Arch., 2016
Mixed Integer Programming Models for Finite Automaton and Its Application to Additive Differential Patterns of Exclusive-Or.
IACR Cryptol. ePrint Arch., 2016
MILP-Based Automatic Search Algorithms for Diff erential and Linear Trails for Speck.
IACR Cryptol. ePrint Arch., 2016
Some classes of permutation polynomials of the form (x<sup>p<sup>m</sup></sup>-x+δ)<sup>s</sup>+x over F<sub>p<sup>2m</sup></sub>.
Finite Fields Their Appl., 2016
Proceedings of the Smart Computing and Communication, 2016
Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR.
Proceedings of the Network and System Security - 10th International Conference, 2016
Cryptanalysis and Improved Construction of a Group Key Agreement for Secure Group Communication.
Proceedings of the Information Security - 19th International Conference, 2016
Proceedings of the Information Security - 19th International Conference, 2016
Web service-based SMAP soil moisture data visualization, dissemination and analytics based on vegscape framwork.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016
Proceedings of the 12th International Conference on Natural Computation, 2016
Proceedings of the Information Systems Security and Privacy, 2016
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016
Proceedings of the 15th International Conference on Frontiers in Handwriting Recognition, 2016
Line-of-Sight Stroke Graphs and Parzen Shape Context Features for Handwritten Math Formula Representation and Symbol Segmentation.
Proceedings of the 15th International Conference on Frontiers in Handwriting Recognition, 2016
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016
2015
IEEE Trans. Inf. Theory, 2015
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2015
Int. J. Found. Comput. Sci., 2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
IACR Cryptol. ePrint Arch., 2015
Constructing Mixed-integer Programming Models whose Feasible Region is Exactly the Set of All Valid Differential Characteristics of SIMON.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Constructing permutations and complete permutations over finite fields via subfield-valued polynomials.
Finite Fields Their Appl., 2015
Finite Fields Their Appl., 2015
Earth Sci. Informatics, 2015
Des. Codes Cryptogr., 2015
Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks.
Des. Codes Cryptogr., 2015
Further results on differentially 4-uniform permutations over F<sub>2<sup>2m</sup></sub>.
CoRR, 2015
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015
Improvement on the Method for Automatic Differential Analysis and Its Application to Two Lightweight Block Ciphers DESL and LBlock-s.
Proceedings of the Advances in Information and Computer Security, 2015
Proceedings of the Advances in Information and Computer Security, 2015
Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis.
Proceedings of the Information Security - 18th International Conference, 2015
Proceedings of the Information Security Practice and Experience, 2015
Proceedings of the Progress in Cryptology - INDOCRYPT 2015, 2015
Building change detection for high-resolution remotely sensed images based on a semantic dependency.
Proceedings of the 2015 IEEE International Geoscience and Remote Sensing Symposium, 2015
Proceedings of the 2015 IEEE International Geoscience and Remote Sensing Symposium, 2015
Proceedings of the 2015 IEEE International Geoscience and Remote Sensing Symposium, 2015
Registration for long-term multi-temporal remote sensing images under spatial constraints from historical data.
Proceedings of the 2015 IEEE International Geoscience and Remote Sensing Symposium, 2015
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015
Proceedings of the 2015 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2015
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015
2014
The Properties of a Class of Linear FSRs and Their Applications to the Construction of Nonlinear FSRs.
IEEE Trans. Inf. Theory, 2014
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2014
Sensors, 2014
Secur. Commun. Networks, 2014
J. Syst. Sci. Complex., 2014
IET Commun., 2014
IET Commun., 2014
IACR Cryptol. ePrint Arch., 2014
Finding Small Solutions of a Class of Simultaneous Modular Equations and Applications to Modular Inversion Hidden Number Problem and Inversive Congruential Generator.
IACR Cryptol. ePrint Arch., 2014
Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties and Its Applications.
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Finite Fields Their Appl., 2014
Finite Fields Their Appl., 2014
Finite Fields Their Appl., 2014
Projective interpolation of polynomial vectors and improved key recovery attack on SFLASH.
Des. Codes Cryptogr., 2014
Cryptographic properties of nested functions and algebraic immunity of the Boolean function in Hitag2 stream cipher.
Cryptogr. Commun., 2014
Appl. Algebra Eng. Commun. Comput., 2014
Proceedings of the Network and System Security - 8th International Conference, 2014
Proceedings of the 10th International Conference on Mobile Ad-hoc and Sensor Networks, 2014
Proceedings of the Lightweight Cryptography for Security and Privacy, 2014
Proceedings of the Information Security Practice and Experience, 2014
Proceedings of the IEEE International Conference on Information and Automation, 2014
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014
Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014
Proceedings of the Applied Cryptography and Network Security, 2014
2013
A Fast and Accurate Reconstruction Algorithm for Compressed Sensing of Complex Sinusoids.
IEEE Trans. Signal Process., 2013
GeoPWProv: Interleaving Map and Faceted Metadata for Provenance Visualization and Navigation.
IEEE Trans. Geosci. Remote. Sens., 2013
Int. J. Found. Comput. Sci., 2013
New Optimal frequency Hopping sequence Sets from Balanced Nested difference Packings of Partition-Type.
Int. J. Found. Comput. Sci., 2013
Automatic Security Evaluation for Bit-oriented Block Ciphers in Related-key Model: Application to PRESENT-80, LBlock and Others.
IACR Cryptol. ePrint Arch., 2013
Automatic Security Evaluation of Block Ciphers with S-bP Structures against Related-key Differential Attacks.
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Int. J. Digit. Earth, 2013
Sci. China Inf. Sci., 2013
Comput. Biol. Medicine, 2013
Appl. Algebra Eng. Commun. Comput., 2013
Privacy-Preserving Password-Based Authenticated Key Exchange in the Three-Party Setting.
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the Information Security Practice and Experience, 2013
Segmenting Handwritten Math Symbols Using AdaBoost and Multi-scale Shape Context Features.
Proceedings of the 12th International Conference on Document Analysis and Recognition, 2013
Rotation-robust math symbol recognition and retrieval using outer contours and image subsampling.
Proceedings of the Document Recognition and Retrieval XX, 2013
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013
Proceedings of the Advanced Parallel Processing Technologies, 2013
2012
IEEE Trans. Signal Process., 2012
A Task Ontology Driven Approach for Live Geoprocessing in a Service-Oriented Environment.
Trans. GIS, 2012
J. Syst. Sci. Complex., 2012
J. Comput. Sci. Technol., 2012
Linear complexity of binary sequences derived from Euler quotients with prime-power modulus.
Inf. Process. Lett., 2012
Int. J. Distributed Sens. Networks, 2012
Finite Fields Their Appl., 2012
A triple-error-correcting cyclic code from the Gold and Kasami-Welch APN power functions.
Finite Fields Their Appl., 2012
Des. Codes Cryptogr., 2012
3D navigation and monitoring for spinal milling operation based on registration between multiplanar fluoroscopy and CT images.
Comput. Methods Programs Biomed., 2012
Comput. Math. Appl., 2012
Proceedings of the 20th Pacific Conference on Computer Graphics and Applications, 2012
Proceedings of the 21st International Conference on Pattern Recognition, 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012
Measurement of fundus vessel diameter based on fundus fluorescence angiography image.
Proceedings of the 5th International Conference on BioMedical Engineering and Informatics, 2012
2011
IEEE Trans. Signal Process., 2011
More Balanced Boolean Functions With Optimal Algebraic Immunity and Good Nonlinearity and Resistance to Fast Algebraic Attacks.
IEEE Trans. Inf. Theory, 2011
On the Correlation Distributions of the Optimal Quaternary Sequence Family <i>U</i> and the Optimal Binary Sequence Family <i>V</i>.
IEEE Trans. Inf. Theory, 2011
Int. J. Comput. Math., 2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
Finite Fields Their Appl., 2011
Appl. Algebra Eng. Commun. Comput., 2011
Appl. Algebra Eng. Commun. Comput., 2011
Proceedings of the Web-Age Information Management - 12th International Conference, 2011
Proceedings of the 10th International Conference on Virtual Reality Continuum and its Applications in Industry, 2011
Proceedings of the Information Security Practice and Experience, 2011
Proceedings of the 2011 IEEE International Geoscience and Remote Sensing Symposium, 2011
Bridge extraction based on on constrained Delaunay triangulation for panchromatic image.
Proceedings of the 2011 IEEE International Geoscience and Remote Sensing Symposium, 2011
HMM-Based Recognition of Online Handwritten Mathematical Symbols Using Segmental K-Means Initialization and a Modified Pen-Up/Down Feature.
Proceedings of the 2011 International Conference on Document Analysis and Recognition, 2011
Proceedings of the Computational Logistics - Second International Conference, 2011
Proceedings of the Coding and Cryptology - Third International Workshop, 2011
Concurrent Non-Malleable Witness Indistinguishable Argument from Any One-Way Function.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011
Proceedings of the 4th International Conference on Biomedical Engineering and Informatics, 2011
Proceedings of the 4th International Conference on Biomedical Engineering and Informatics, 2011
2010
IEEE Commun. Lett., 2010
IACR Cryptol. ePrint Arch., 2010
Balanced Boolean Functions with (Almost) Optimal Algebraic Immunity and Very High Nonlinearity.
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Finite Fields Their Appl., 2010
Two new permutation polynomials with the form (<i>x</i><sup>2<sup><i>k</i></sup></sup>+<i>x</i>+d)<sup><i>s</i></sup>+<i>x</i> over <i>F</i><sub>2<sup><i>n</i></sup></sub>.
Appl. Algebra Eng. Commun. Comput., 2010
Further crosscorrelation properties of sequences with the decimation factor <i>d</i>=(<i>p</i><sup><i>n</i></sup>+1)/(<i>p</i>+1)-(<i>p</i><sup><i>n</i></sup>-1)/2.
Appl. Algebra Eng. Commun. Comput., 2010
Appl. Algebra Eng. Commun. Comput., 2010
Design and improvement of KPI system for materials management in power group enterprise.
Proceedings of 2010 IEEE International Conference on Service Operations and Logistics, 2010
Proceedings of the Post-Quantum Cryptography, Third International Workshop, 2010
Proceedings of the Advances in Multimedia Information Processing - PCM 2010, 2010
On the Kipnis-Shamir Method Solving the MinRank Problem.
Proceedings of the Advances in Information and Computer Security, 2010
How to Construct Secure and Efficient Three-Party Password-Based Authenticated Key Exchange Protocols.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010
2009
IEEE Trans. Inf. Theory, 2009
IEEE Trans. Inf. Theory, 2009
IEEE Trans. Inf. Theory, 2009
Further properties of several classes of Boolean functions with optimum algebraic immunity.
Des. Codes Cryptogr., 2009
Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation Structure.
Proceedings of the Information Security Applications, 10th International Workshop, 2009
Proceedings of the 2009 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2009
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009
Validity of the Simulation of New Screw Fixed FNF for Healing: A Biomechanical Analysis.
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
IEEE Trans. Parallel Distributed Syst., 2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
CoRR, 2008
New family of binary sequences of period 4(2<sup> <i>n</i> </sup> - 1) with low correlation.
Appl. Algebra Eng. Commun. Comput., 2008
Proceedings of the Sequences and Their Applications, 2008
Dynamic Analysis and Design Pattern Detection in Java Programs.
Proceedings of the Twentieth International Conference on Software Engineering & Knowledge Engineering (SEKE'2008), 2008
ROAD: An RFID Offline Authentication, Privacy Preserving Protocol with Dos Resilience.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008
Proceedings of the Information Security Practice and Experience, 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008
Proceedings of the Intelligent Robotics and Applications, First International Conference, 2008
Proceedings of the International Conference on Image Processing, 2008
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008
2007
IEEE Trans. Inf. Theory, 2007
Int. J. Comput. Math., 2007
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Sequences, Subsequences, and Consequences, International Workshop, 2007
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007
Proceedings of the Third International Workshop on Security, 2007
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2007
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2007), 2007
Proceedings of the IEEE Information Theory Workshop on Information Theory for Wireless Networks, 2007
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols.
Proceedings of the 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), 2007
Proceedings of the Progress in Cryptology, 2007
Further Discussions on the Security of a Nominative Signature Scheme.
Proceedings of the 2007 International Conference on Security & Management, 2007
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007
2006
J. Complex., 2006
A Family of Binary Sequences with 4-Valued Optimal Out-of-Phase Correlation and Large Linear Span.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
IACR Cryptol. ePrint Arch., 2006
High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems.
IACR Cryptol. ePrint Arch., 2006
Partially Perfect Nonlinear Functions and a Construction of Cryptographic Boolean Functions.
Proceedings of the Sequences and Their Applications, 2006
On the Expected Value of the Joint 2-Adic Complexity of Periodic Binary Multisequences.
Proceedings of the Sequences and Their Applications, 2006
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006
Proceedings of the 2006 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2006
Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols.
Proceedings of the Progress in Cryptology, 2006
Proceedings of IEEE International Conference on Communications, 2006
Pairing-Based Multi-Recipient Public Key Encryption.
Proceedings of the 2006 International Conference on Security & Management, 2006
Proceedings of The 1st IEEE Asia-Pacific Services Computing Conference, 2006
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006
2005
J. Comput. Sci. Technol., 2005
Fast Modular Reduction over Euclidean Rings and Its Application to Universal Hash Functions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
Constructing Boolean Functions by Modifying Maiorana-McFarland's Superclass Functions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
EURASIP J. Adv. Signal Process., 2005
CoRR, 2005
Proceedings of the Coding and Cryptography, International Workshop, 2005
A new class of binary sequences with low correlation and large linear complexity from function fields.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005
2004
Generator polynomials of characteristic ideal of maximal periodic arrays over Galois rings.
Discret. Math., 2004
BPOR: a fluoroscopy-based robot navigating system for distal locking of intramedullary nails.
Proceedings of the 2004 IEEE/RSJ International Conference on Intelligent Robots and Systems, Sendai, Japan, September 28, 2004
2003
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
A Composition Construction of Bent-Like Boolean Functions from Quadratic Polynomials.
IACR Cryptol. ePrint Arch., 2003
2001
A Simulation and Training Systems of Robot Assisted Surgery Based on Virtual Reality.
Proceedings of the Medical Imaging and Augmented Reality: First International Workshop, 2001
1998
J. Symb. Comput., 1998
Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences, 1998
1997
Proceedings of the International Symposium on Software Engineering for Parallel and Distributed Systems, 1997