Tingting Cui

Orcid: 0000-0001-5868-4730

According to our database1, Tingting Cui authored at least 42 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Structure attack on full-round DBST.
Frontiers Comput. Sci., August, 2024

A new assessment method on co-occurring mountain and plain floods based on copula functions.
Autom., June, 2024

Finding Impossible Differentials in ARX Ciphers under Weak Keys.
IACR Trans. Symmetric Cryptol., 2024

CMoralEval: A Moral Evaluation Benchmark for Chinese Large Language Models.
CoRR, 2024

OpenEval: Benchmarking Chinese LLMs across Capability, Alignment and Safety.
CoRR, 2024

CMoralEval: A Moral Evaluation Benchmark for Chinese Large Language Models.
Proceedings of the Findings of the Association for Computational Linguistics, 2024

2023
Covariate-modulated large-scale multiple testing under dependence.
Comput. Stat. Data Anal., April, 2023

2022
An STP-based model toward designing S-boxes with good cryptographic properties.
Des. Codes Cryptogr., 2022

2021
What drives consumer website stickiness intention? The role of website service quality and website involvement.
Int. J. Serv. Technol. Manag., 2021

Stability of networked control system subject to denial-of-service.
Sci. China Inf. Sci., 2021

New automatic tool for finding impossible differentials and zero-correlation linear approximations.
Sci. China Inf. Sci., 2021

Investigation for 8-bit SKINNY-like S-boxes, analysis and applications.
Cryptogr. Commun., 2021

2020
MultiFuzz: A Coverage-Based Multiparty-Protocol Fuzzer for IoT Publish/Subscribe Protocols.
Sensors, 2020

Improved Single-Key Attacks on 2-GOST.
Secur. Commun. Networks, 2020

Distinguisher on full-round compression function of GOST R.
Inf. Process. Lett., 2020

Algebraic Key-Recovery Attacks on Reduced-Round Xoofff.
IACR Cryptol. ePrint Arch., 2020

2019
Automatic search method for multiple differentials and its application on MANTIS.
Sci. China Inf. Sci., 2019

2018
Towards Key-Dependent Integral and Impossible Differential Distinguishers on 5-Round AES.
IACR Cryptol. ePrint Arch., 2018

Statistical integral attack on CAST-256 and IDEA.
Cryptogr. Commun., 2018

Statistical integral distinguisher with multi-structure and its application on AES-like ciphers.
Cryptogr. Commun., 2018

A local information based multi-objective evolutionary algorithm for community detection in complex networks.
Appl. Soft Comput., 2018

FPGA-Based Real-time Interference Alignment Verification System.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2018

2017
Some cryptanalytic results on Lizard.
IACR Trans. Symmetric Cryptol., 2017

Line-Based Registration of Panoramic Images and LiDAR Point Clouds for Mobile Mapping.
Sensors, 2017

Website Service Quality and Shopping Website Stickiness: The Mediating Effect of Website Involvement.
Proceedings of the 16th Wuhan International Conference on E-Business, 2017

Data-Driven Reserve Prices for Social Advertising Auctions at LinkedIn.
Proceedings of the ADKDD'17, Halifax, NS, Canada, August 13 - 17, 2017, 2017

Statistical Integral Distinguisher with Multi-structure and Its Application on AES.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Trend-Residual Dual Modeling for Detection of Outliers in Low-Cost GPS Trajectories.
Sensors, 2016

Integrals go Statistical: Cryptanalysis of Full Skipjack Variants.
IACR Cryptol. ePrint Arch., 2016

New Automatic Search Tool for Impossible Differentials and Zero-Correlation Linear Approximations.
IACR Cryptol. ePrint Arch., 2016

Improving algorithm 2 in multidimensional (zero-correlation) linear cryptanalysis using χ<sup>2</sup>-method.
Des. Codes Cryptogr., 2016

Improved Differential Cryptanalysis of CAST-128 and CAST-256.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

2015
PaddyFrog: systematically detecting confused deputy vulnerability in Android applications.
Secur. Commun. Networks, 2015

Shooting Recognition and Simulation in VR Shooting Theaters.
Proceedings of the Computer Vision - CCF Chinese Conference, 2015

2014
A two-view VR shooting theater system.
Proceedings of the 13th ACM SIGGRAPH International Conference on Virtual-Reality Continuum and its Applications in Industry, 2014

Computing Realistic Images for Audience Interaction in Projection-Based Multi-view Display System.
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014

A Range-Free Multiple Target Localization Algorithm Using Compressive Sensing Theory in Wireless Sensor Networks.
Proceedings of the 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2014

2013
An Efficient Approach for Solving Reliable Facility Location Models.
INFORMS J. Comput., 2013

2011
Weight in Competitive K-Means Algorithm.
Proceedings of the Frontiers in Computer Education [International Conference on Frontiers in Computer Education, 2011

2010
Decision Making under Uncertainty: Reliability and Incentive Compatibility.
PhD thesis, 2010

Complexity of some inverse shortest path lengths problems.
Networks, 2010

Reliable Facility Location Design Under the Risk of Disruptions.
Oper. Res., 2010


  Loading...