Yin Tan
According to our database1,
Yin Tan
authored at least 23 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Multi-scale Quaternion CNN and BiGRU with Cross Self-attention Feature Fusion for Fault Diagnosis of Bearing.
CoRR, 2024
2023
Proceedings of the IEEE International Parallel and Distributed Processing Symposium, 2023
2016
More constructions of differentially 4-uniform permutations on 𝔽<sub>2<sup>2k</sup></sub>.
Des. Codes Cryptogr., 2016
Quadratic zero-difference balanced functions, APN functions and strongly regular graphs.
Des. Codes Cryptogr., 2016
Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions.
Cryptogr. Commun., 2016
An adaptive model selection strategy for surrogate-assisted particle swarm optimization algorithm.
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016
A self-adaptive similarity-based fitness approximation for evolutionary optimization.
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016
2014
IACR Cryptol. ePrint Arch., 2014
On a class of quadratic polynomials with no zeros and its application to APN functions.
Finite Fields Their Appl., 2014
Sci. China Inf. Sci., 2014
2013
Constructing Differentially 4-Uniform Permutations Over ${\BBF}_{2^{2k}}$ via the Switching Method.
IEEE Trans. Inf. Theory, 2013
CoRR, 2013
Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation.
Proceedings of the Cryptology and Network Security - 12th International Conference, 2013
2012
Universal cycles for minimum coverings of pairs by triples, with application to 2-radius sequences.
Math. Comput., 2012
Finite Fields Their Appl., 2012
Proceedings of the Sequences and Their Applications - SETA 2012, 2012
2011
2010
J. Comb. Theory A, 2010
Proceedings of the Sequences and Their Applications - SETA 2010, 2010
2009
Proceedings of the Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, 2009
2003
Int. J. Comput. Eng. Sci., 2003