Lin Jiao
Orcid: 0000-0001-6394-6619
According to our database1,
Lin Jiao
authored at least 56 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Trans. Inf. Theory, May, 2024
Expert Syst. Appl., February, 2024
Observer-Based Adaptive Finite-Time Neural Control for Constrained Nonlinear Systems With Actuator Saturation Compensation.
IEEE Trans. Instrum. Meas., 2024
Integrating foreground-background feature distillation and contrastive feature learning for ultra-fine-grained visual classification.
Pattern Recognit., 2024
Differential Fault Attacks on Privacy Protocols Friendly Symmetric-Key Primitives: RAIN and HERA.
IET Inf. Secur., 2024
A Deep Study of The Impossible Boomerang Distinguishers: New Construction Theory and Automatic Search Methods.
IACR Cryptol. ePrint Arch., 2024
Auto-adjustment label assignment-based convolutional neural network for oriented wheat diseases detection.
Comput. Electron. Agric., 2024
2023
IEEE Trans. Aerosp. Electron. Syst., December, 2023
Appl. Intell., November, 2023
Spatial convolutional self-attention-based transformer module for strawberry disease identification under complex background.
Comput. Electron. Agric., September, 2023
Multim. Tools Appl., May, 2023
Des. Codes Cryptogr., May, 2023
An effective pest detection method with automatic data augmentation strategy in the agricultural field.
Signal Image Video Process., March, 2023
IACR Trans. Symmetric Cryptol., 2023
An Underwater Image Restoration Method Based on Adaptive Brightness Improvement and Local Image Descattering.
IEEE Geosci. Remote. Sens. Lett., 2023
J. Electronic Imaging, 2023
Evaluating the Security of Block Ciphers Against Zero-correlation Linear Attack in the Distinguishers Aspect.
IACR Cryptol. ePrint Arch., 2023
Approximate Modeling of Signed Difference and Digraph based Bit Condition Deduction: New Boomerang Attacks on BLAKE.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Quantum Algorithm for Finding Impossible Differentials and Zero-Correlation Linear Hulls of Symmetric Ciphers.
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023
Springer, ISBN: 978-981-99-4972-4, 2023
2022
Neurocomputing, 2022
On the upper bound of squared correlation of SIMON-like functions and its applications.
IET Inf. Secur., 2022
Do NOT Misuse the Markov Cipher Assumption - Automatic Search for Differential and Impossible Differential Characteristics in ARX Ciphers.
IACR Cryptol. ePrint Arch., 2022
New Division Property Propagation Table: Applications to Block Ciphers with Large S-boxes.
Comput. J., 2022
Adaptive feature fusion pyramid network for multi-classes agricultural pest detection.
Comput. Electron. Agric., 2022
2021
IEEE Trans. Inf. Theory, 2021
Comput. Electron. Agric., 2021
Comput. Electron. Agric., 2021
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021
2020
IACR Trans. Symmetric Cryptol., 2020
Multim. Tools Appl., 2020
Neurocomputing, 2020
Mind the Propagation of States New Automatic Search Tool for Impossible Differentials and Impossible Polytopic Transitions (Full Version).
IACR Cryptol. ePrint Arch., 2020
AF-RCNN: An anchor-free convolutional neural network for multi-categories agricultural pest detection.
Comput. Electron. Agric., 2020
Mind the Propagation of States - New Automatic Search Tool for Impossible Differentials and Impossible Polytopic Transitions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020
2019
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly.
IEEE Trans. Computers, 2019
Sensors, 2019
2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Distributed, Ambient and Pervasive Interactions: Understanding Humans, 2018
2016
2015
Proceedings of the Information Security - 18th International Conference, 2015
2014
Revised Algorithms for Computing Algebraic Immunity against Algebraic and Fast Algebraic Attacks.
Proceedings of the Information Security - 17th International Conference, 2014
2013
Establishing Equations: The Complexity of Algebraic and Fast Algebraic Attacks Revisited.
Proceedings of the Information Security, 16th International Conference, 2013
2012
An Improved Time-Memory-Data Trade-Off Attack against Irregularly Clocked and Filtered Keystream Generators.
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012
2010
Proceedings of the GCC 2010, 2010
2009
J. Comput., 2009