Xuan Shen

Orcid: 0000-0003-4965-7321

According to our database1, Xuan Shen authored at least 44 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A dynamic spectrum access algorithm based on deep reinforcement learning with novel multi-vehicle reward functions in cognitive vehicular networks.
Telecommun. Syst., October, 2024

Links between Quantum Distinguishers Based on Simon's Algorithm and Truncated Differentials.
IACR Trans. Symmetric Cryptol., 2024

Defending dominant cooperative probabilistic attack in CRNs by JS-divergence-based improved reputation algorithm.
Pervasive Mob. Comput., 2024

Free-XOR Gate Bootstrapping.
IACR Cryptol. ePrint Arch., 2024

Exploring Token Pruning in Vision State Space Models.
CoRR, 2024

Search for Efficient Large Language Models.
CoRR, 2024

AyE-Edge: Automated Deployment Space Search Empowering Accuracy yet Efficient Real-Time Object Detection on the Edge.
CoRR, 2024

EdgeQAT: Entropy and Distribution Guided Quantization-Aware Training for the Acceleration of Lightweight LLMs on the Edge.
CoRR, 2024

DAS-Gen: Continual Signature Generation for Evolving Malicious Traffic.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024

Pruning Foundation Models for High Accuracy without Retraining.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2024, 2024

Rethinking Token Reduction for State Space Models.
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024

Late Breaking Result: AQFP-aware Binary Neural Network Architecture Search.
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024

Feistel-Like Structures Revisited: Classification and Cryptanalysis.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Agile-Quant: Activation-Guided Quantization for Faster Inference of LLMs on the Edge.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Data Level Lottery Ticket Hypothesis for Vision Transformers.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

DeepMAD: Mathematical Architecture Design for Deep Convolutional Neural Network.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

Quantum Attacks: A View of Data Complexity on Offline Simon's Algorithm.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

Peeling the Onion: Hierarchical Reduction of Data Redundancy for Efficient Vision Transformer Training.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Impossible differential cryptanalysis of FBC-128.
J. Inf. Secur. Appl., 2022

Mining the Spatial Distribution Pattern of the Typical Fast-Food Industry Based on Point-of-Interest Data: The Case Study of Hangzhou, China.
ISPRS Int. J. Geo Inf., 2022

Security evaluation on type-1 and type-1-like 4-branch generalized Feistel structures and application to reduced-round Lesamnta-LW-BC.
IET Inf. Secur., 2022

The Lottery Ticket Hypothesis for Vision Transformers.
CoRR, 2022

Improved nonlinear invariant attack.
Sci. China Inf. Sci., 2022

Real-Time Portrait Stylization on the Edge.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

SPViT: Enabling Faster Vision Transformers via Latency-Aware Soft Token Pruning.
Proceedings of the Computer Vision - ECCV 2022, 2022

2021
Revisiting Impossible Differential Distinguishers of Two Generalized Feistel Structures.
Secur. Commun. Networks, 2021

Improved Impossible Differentials and Zero-Correlation Linear Hulls of New Structure III.
Secur. Commun. Networks, 2021

Lottery Ticket Implies Accuracy Degradation, Is It a Desirable Phenomenon?
CoRR, 2021

Vertical federated learning based on DFP and BFGS.
CoRR, 2021

Sanity Checks for Lottery Tickets: Does Your Winning Ticket Really Win the Jackpot?
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

Improving DNN Fault Tolerance using Weight Pruning and Differential Crossbar Mapping for ReRAM-based Edge AI.
Proceedings of the 22nd International Symposium on Quality Electronic Design, 2021

Out of Non-linearity: Search Impossible Differentials by the Bitwise Characteristic Matrix.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021

Towards Fast and Accurate Multi-Person Pose Estimation on Mobile Devices.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021

Lottery Ticket Preserves Weight Correlation: Is It Desirable or Not?
Proceedings of the 38th International Conference on Machine Learning, 2021

NPAS: A Compiler-Aware Framework of Unified Network Pruning and Architecture Search for Beyond Real-Time Mobile Acceleration.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

2020
Nondestructive Detection for Egg Freshness Based on Hyperspectral Scattering Image Combined with Ensemble Learning.
Sensors, 2020

6.7ms on Mobile with over 78% ImageNet Accuracy: Unified Network Pruning and Architecture Search for Beyond Real-Time Mobile Acceleration.
CoRR, 2020

2019
Improved Impossible Differential Attack on 7-round Reduced ARIA-256.
KSII Trans. Internet Inf. Syst., 2019

2018
Impossible Differential Cryptanalysis of Fantomas and Robin.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

2017
Dual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-Like Ciphers.
Proceedings of the Information Security Practice and Experience, 2017

Simulation and Verification of Software Architecture for Loosely-Coupled Distributed System.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

2016
Impossible Differentials of SPN Ciphers.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

2015
Fitting α β-crystalline structure onto electron microscopy based on SO(3) rotation group theory.
J. Comb. Optim., 2015

2014
On the Practical Security Bound of GF-NLFSR Structure with SPN Round Function.
Proceedings of the Provable Security - 8th International Conference, 2014


  Loading...