Liting Zhang

Orcid: 0000-0003-4919-2667

According to our database1, Liting Zhang authored at least 50 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Elimination of Random Mixed Noise in ECG Using Convolutional Denoising Autoencoder With Transformer Encoder.
IEEE J. Biomed. Health Informatics, April, 2024

Predicting spontaneous termination of atrial fibrillation based on dual path network and feature selection.
Biomed. Signal Process. Control., February, 2024

DHFNet: dual-decoding hierarchical fusion network for RGB-thermal semantic segmentation.
Vis. Comput., January, 2024

UTLNet: Uncertainty-Aware Transformer Localization Network for RGB-Depth Mirror Segmentation.
IEEE Trans. Multim., 2024

Multitask Learning-Based Quality Assessment and Denoising of Electrocardiogram Signals.
IEEE Trans. Instrum. Meas., 2024

Research on data center computing resources and energy load Co-optimization considering spatial-temporal allocation.
Comput. Electr. Eng., 2024

An atrial fibrillation detection algorithm based on lightweight design architecture and feature fusion strategy.
Biomed. Signal Process. Control., 2024

2023
Diagnosis of atrial fibrillation using self-complementary attentional convolutional neural network.
Comput. Methods Programs Biomed., August, 2023

LOL: A Highly Flexible Framework for Designing Stream Ciphers.
IACR Cryptol. ePrint Arch., 2023

2022
Multi-subband fusion algorithm based on autoencoder.
IET Signal Process., December, 2022

Emitter Localization Algorithm Based on Passive Synthetic Aperture.
IEEE Trans. Aerosp. Electron. Syst., 2022

Passive Synthetic Aperture High-Precision Radiation Source Location by Single Satellite.
IEEE Geosci. Remote. Sens. Lett., 2022

ECG segmentation algorithm based on bidirectional hidden semi-Markov model.
Comput. Biol. Medicine, 2022

Effective Velocity Calculation Method in Passive Synthetic Aperture for Emitter Localization.
Proceedings of the IEEE Global Communications Conference, 2022

Arrhythmia Classification on Different Time Windows Using CSR-BiGRU Network.
Proceedings of the 15th International Congress on Image and Signal Processing, 2022

Study On The Application Of Small CNN In Arrhythmia Classification.
Proceedings of the 15th International Congress on Image and Signal Processing, 2022

2021
Preliminary Research on a Comparison and Evaluation of FY-4A LMI and ADTD Data through a Moving Amplification Matching Algorithm.
Remote. Sens., 2021

Region-edge-based active contours driven by hybrid and local fuzzy region-based energy for image segmentation.
Inf. Sci., 2021

Fuzzy region-based active contour driven by global and local fitting energy for image segmentation.
Appl. Soft Comput., 2021

Robust 2DPCA by Tℓ₁ Criterion Maximization for Image Recognition.
IEEE Access, 2021

Multiple-Time-Scale Data Augmentation and Application in AF detection.
Proceedings of the 14th International Congress on Image and Signal Processing, 2021

2019
Fuzzy Region-Based Active Contours Driven by Weighting Global and Local Fitting Energy.
IEEE Access, 2019

Active Contour Driven by Weighted Hybrid Signed Pressure Force for Image Segmentation.
IEEE Access, 2019

2017
Single Key Variant of PMAC_Plus.
IACR Trans. Symmetric Cryptol., 2017

Optimisation and fabrication by 3D printing of a ceiling antenna for communication applications.
Int. J. Wirel. Mob. Comput., 2017

Performance evaluation of reliable communications for wireless in-body sensor networks.
Proceedings of the International Conference on Computer, 2017

2016
Multi-key Analysis of Tweakable Even-Mansour with Applications to Minalpher and OPP.
IACR Trans. Symmetric Cryptol., 2016

Localized Patch-Based Fuzzy Active Contours for Image Segmentation.
Comput. Math. Methods Medicine, 2016

Multiresolution convex variational model for multiphase image segmentation.
Comput. Electr. Eng., 2016

Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications.
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016

2015
Relate-Key Almost Universal Hash Functions: Definitions, Constructions and Applications.
IACR Cryptol. ePrint Arch., 2015

Combining Dynamic Constrained Many-Objective Optimization with DE to Solve Constrained Optimization Problems.
Proceedings of the Computational Intelligence and Intelligent Systems, 2015

Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

2013
Attacking and Fixing the CS Mode.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

2012
TrCBC: Another look at CBC-MAC.
Inf. Process. Lett., 2012

Cryptanalysis of the OKH Authenticated Encryption Scheme.
IACR Cryptol. ePrint Arch., 2012

Collision Attacks on Variant of OCB Mode and Its Series.
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012

3kf9: Enhancing 3GPP-MAC beyond the Birthday Bound.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2011
CBCR: CBC MAC with rotating transformations.
Sci. China Inf. Sci., 2011

PolyE+CTR: A Swiss-Army-Knife Mode for Block Ciphers.
Proceedings of the Provable Security - 5th International Conference, 2011

BCBC: A More Efficient MAC Algorithm.
Proceedings of the Information Security Practice and Experience, 2011

2010
A New Variant of 3GPP-MAC With Provable Security and Higher Efficiency.
J. Inf. Sci. Eng., 2010

Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited.
Proceedings of the Fast Software Encryption, 17th International Workshop, 2010

2009
Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher.
IACR Cryptol. ePrint Arch., 2009

Robust Location Algorithm for Planar Target Based on Fuzzy Clustering.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009

Proposition of Two Cipher Structures.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

A note on Cook's elastic block cipher.
Proceedings of the 2009 ACM Symposium on Information, 2009

2008
On the Correctness of An Approach Against Side-channel attacks.
IACR Cryptol. ePrint Arch., 2008

Extended Models for Message Authentication.
Proceedings of the Information Security and Cryptology, 2008

On the Unprovable Security of 2-Key XCBC.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008


  Loading...