Zhi Hu
Orcid: 0009-0003-2259-2086
According to our database1,
Zhi Hu
authored at least 74 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Neural Network-Based Fusion of InSAR and Optical Digital Elevation Models with Consideration of Local Terrain Features.
Remote. Sens., October, 2024
A Modified Brain Storm Optimization Algorithm for Solving Scheduling of Double-End Automated Storage and Retrieval Systems.
Symmetry, August, 2024
Adaptive Framing and Virtual Channel Scheduling Algorithm Based on Advanced Orbiting System for Consumer Sustainability in Industry 5.0.
IEEE Trans. Consumer Electron., May, 2024
InSAR Digital Elevation Model Void-Filling Method Based on Incorporating Elevation Outlier Detection.
Remote. Sens., April, 2024
Trans. Inst. Meas. Control, 2024
Proceedings of the 2024 3rd Asia Conference on Algorithms, Computing and Machine Learning, 2024
2023
Fully Distributed Event-Triggered Bipartite Output Formation Control for Heterogeneous MASs With Directed Graphs.
IEEE Trans. Circuits Syst. II Express Briefs, June, 2023
A Vertical Seismic Profiling Wavefield Separating Method Based on the Frequency-Wavenumber Vector.
IEEE Geosci. Remote. Sens. Lett., 2023
Clust. Comput., 2023
2022
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., August, 2022
Observer-Based Bipartite Formation Control for MASs With External Disturbances Under Event-Triggered Scheme.
IEEE Trans. Circuits Syst. II Express Briefs, 2022
J. King Saud Univ. Comput. Inf. Sci., 2022
Optimizing the evaluation of <i>ℓ</i>-isogenous curve for isogeny-based cryptography.
Inf. Process. Lett., 2022
Finite Fields Their Appl., 2022
Optimized Implementation of SM4 on AVR Microcontrollers, RISC-V Processors, and ARM Processors.
IEEE Access, 2022
IEEE Access, 2022
Proceedings of the SIGIR '22: The 45th International ACM SIGIR Conference on Research and Development in Information Retrieval, Madrid, Spain, July 11, 2022
2021
IEEE Trans. Circuits Syst. I Regul. Pap., 2021
Erratum to "High-Power Radiation at 1 THz in Silicon: A Fully Scalable Array Using a Multi-Functional Radiating Mesh Structure".
IEEE J. Solid State Circuits, 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Fast scalar multiplication of degenerate divisors for hyperelliptic curve cryptosystems.
Appl. Math. Comput., 2021
IEEE Access, 2021
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021
The Business Structure of a Metrology Institution Based on Linear Regression Analysis.
Proceedings of the 7th International Conference on Systems and Informatics, 2021
Research on the Middle Platform Service System of Battlefield Data Governance Information based on 5G Technology.
Proceedings of the AIAM 2021: 3rd International Conference on Artificial Intelligence and Advanced Manufacture, Manchester, United Kingdom, October 23, 2021
2020
ACM Trans. Embed. Comput. Syst., 2020
IEEE Geosci. Remote. Sens. Lett., 2020
Impact of Optimized Operations A· B, A· C for Binary Field Inversion on Quantum Computers.
Proceedings of the Information Security Applications - 21st International Conference, 2020
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020
Parallel Implementation of SM2 Elliptic Curve Cryptography on Intel Processors with AVX2.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020
2019
Lightweight Implementations of NIST P-256 and SM2 ECC on 8-bit Resource-Constraint Embedded Device.
ACM Trans. Embed. Comput. Syst., 2019
A 32-Unit 240-GHz Heterodyne Receiver Array in 65-nm CMOS With Array-Wide Phase Locking.
IEEE J. Solid State Circuits, 2019
IET Inf. Secur., 2019
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
New explicit injective compressing mappings on primitive sequences over ℤ p e $\mathbb {Z}_{p^e}$.
Cryptogr. Commun., 2019
Injectivity on distribution of elements in the compressed sequences derived from primitive sequences over ℤ<sub>p<sup>e</sup></sub>.
Cryptogr. Commun., 2019
IEEE Access, 2019
Fast ECDH Key Exchange Using Twisted Edwards Curves with an Efficiently Computable Endomorphism.
Proceedings of the 2019 International Workshop on Secure Internet of Things, 2019
2018
SIDH on ARM: Faster Modular Multiplications for Faster Post-Quantum Supersingular Isogeny Key Exchange.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018
High-Power Radiation at 1 THz in Silicon: A Fully Scalable Array Using a Multi-Functional Radiating Mesh Structure.
IEEE J. Solid State Circuits, 2018
Fundam. Informaticae, 2018
Research on Virtual Channel Multiplexing Algorithm Based on Advanced Orbiting Systems.
IEEE Access, 2018
Proceedings of the Information Security Applications - 19th International Conference, 2018
Proceedings of the Information Security and Cryptology - ICISC 2018, 2018
2017
ACM Trans. Embed. Comput. Syst., 2017
On Emerging Family of Elliptic Curves to Secure Internet of Things: ECC Comes of Age.
IEEE Trans. Dependable Secur. Comput., 2017
Elliptic Curve Cryptography with Efficiently Computable Endomorphisms and Its Hardware Implementations for the Internet of Things.
IEEE Trans. Computers, 2017
Proceedings of the Information Security Applications - 18th International Conference, 2017
Energy-efficient terahertz electronics using multi-functional electromagnetism and high-parallelism architecture.
Proceedings of the IEEE 60th International Midwest Symposium on Circuits and Systems, 2017
2016
Inf. Process. Lett., 2016
Proceedings of the Information Security Applications - 17th International Workshop, 2016
On Constructing Parameterized Families of Pairing-Friendly Elliptic Curves with \rho =1.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016
2015
Trusted Tree-Based Trust Management Scheme for Secure Routing in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015
VLSI Implementation of Double-Base Scalar Multiplication on a Twisted Edwards Curve with an Efficiently Computable Endomorphism.
IACR Cryptol. ePrint Arch., 2015
Sci. China Inf. Sci., 2015
Injectivity of compressing maps on the set of primitive sequences modulo square-free odd integers.
Cryptogr. Commun., 2015
Efficient Implementation of ECDH Key Exchange for MSP430-Based Wireless Sensor Networks.
Proceedings of the 10th ACM Symposium on Information, 2015
Iterative disparity voting based stereo matching algorithm and its hardware implementation.
Proceedings of the 20th Asia and South Pacific Design Automation Conference, 2015
2014
Performance Optimization of Force Feedback Control System in Virtual Vascular Intervention Surgery.
Comput. Math. Methods Medicine, 2014
2013
CoRR, 2013
Generation and Tate Pairing Computation of Ordinary Elliptic Curves with Embedding Degree One.
Proceedings of the Information and Communications Security - 15th International Conference, 2013
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013
2012
Des. Codes Cryptogr., 2012
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012
2010
Efficient 3-dimensional GLV method for faster point multiplication on some GLS elliptic curves.
Inf. Process. Lett., 2010
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010
2000
Proceedings of the American Control Conference, 2000