Bing Sun

According to our database1, Bing Sun authored at least 117 papers between 2002 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Complete Coverage Autonomous Underwater Vehicles Path Planning Based on Glasius Bio-Inspired Neural Network Algorithm for Discrete and Centralized Programming.
IEEE Trans. Cognitive and Developmental Systems, 2019

Complete Coverage Path Planning of Autonomous Underwater Vehicle Based on GBNN Algorithm.
Journal of Intelligent and Robotic Systems, 2019

New Results about the Boomerang Uniformity of Permutation Polynomials.
IACR Cryptology ePrint Archive, 2019

Do External Technology Sourcing and Industrial Agglomeration Successfully Facilitate an Increase in the Innovation Performance of High-Tech Industries in China?
IEEE Access, 2019

2018
Biologically Inspired Self-Organizing Map Applied to Task Assignment and Path Planning of an AUV System.
IEEE Trans. Cognitive and Developmental Systems, 2018

Multiclass Radio Frequency Interference Detection and Suppression for SAR Based on the Single Shot MultiBox Detector.
Sensors, 2018

Transmitting Pulse Encoding for Beyond-PRT Retransmitting Deception Jamming Detection in Spaceborne Synthetic Aperture Radar (SAR).
Sensors, 2018

A New Synthetic Aperture Radar (SAR) Imaging Method Combining Match Filter Imaging and Image Edge Enhancement.
Sensors, 2018

An Optimized Fuzzy Control Algorithm for Three-Dimensional AUV Path Planning.
Int. J. Fuzzy Syst., 2018

Comparative Study on Chinese and Global OLED Industry Based on Patent Data.
IEEE Access, 2018

Barrage Jamming Detection and Classification Based on Convolutional Neural Network for Synthetic Aperture Radar.
Proceedings of the 2018 IEEE International Geoscience and Remote Sensing Symposium, 2018

Multi-Channnel and Mimo Sar Anti-Jamming Analysis.
Proceedings of the 2018 IEEE International Geoscience and Remote Sensing Symposium, 2018

The Influence of Sar Image Quantization Method on Detection Precision.
Proceedings of the 2018 IEEE International Geoscience and Remote Sensing Symposium, 2018

Enhanced Azimuth Resolution for Spaceborne Interrupted FMCW Sar Through Spectral Analysis.
Proceedings of the 2018 IEEE International Geoscience and Remote Sensing Symposium, 2018

Three Dimensional AUV Complete Coverage Path Planning with Glasius Bio-inspired Neural Network.
Proceedings of the Intelligent Robotics and Applications - 11th International Conference, 2018

Adaptive Trajectory Tracking Control for Remotely Operated Vehicles Based on Disturbance Observer.
Proceedings of the Intelligent Robotics and Applications - 11th International Conference, 2018

Programming the Demirci-Selçuk Meet-in-the-Middle Attack with Constraints.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
Underdetermined DOA Estimation Method for Wideband Signals Using Joint Nonnegative Sparse Bayesian Learning.
IEEE Signal Process. Lett., 2017

High-Performance Anti-Retransmission Deception Jamming Utilizing Range Direction Multiple Input and Multiple Output (MIMO) Synthetic Aperture Radar (SAR).
Sensors, 2017

A Novel Spaceborne Sliding Spotlight Range Sweep Synthetic Aperture Radar: System and Imaging.
Remote Sensing, 2017

Optimal control problem with unilateral constraints for longitudinal vibration of a viscoelastic valve.
IMA J. Math. Control & Information, 2017

Maximum principle for optimal control of vibrations of a dynamic Gao beam in contact with a rigid foundation.
Int. J. Systems Science, 2017

Optimal control of vibrations of a dynamic Gao beam in contact with a reactive foundation.
Int. J. Systems Science, 2017

The tracking control of Unmanned underwater Vehicles based on Model predictive control.
I. J. Robotics and Automation, 2017

An Improved Model-Free adaptive control of marine Generator excitation System.
I. J. Robotics and Automation, 2017

New observation on division property.
SCIENCE CHINA Information Sciences, 2017

Revised cryptanalysis for SMS4.
SCIENCE CHINA Information Sciences, 2017

Dual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-Like Ciphers.
Proceedings of the Information Security Practice and Experience, 2017

SAR image segmentation based on BMFCM.
Proceedings of the 2017 IEEE International Geoscience and Remote Sensing Symposium, 2017

The Tracking Control of Unmanned Underwater Vehicles Based on QPSO-Model Predictive Control.
Proceedings of the Intelligent Robotics and Applications - 10th International Conference, 2017

2016
Source localization for sparse array using nonnegative sparse Bayesian learning.
Signal Processing, 2016

A Novel Azimuth Super-Resolution Method by Synthesizing Azimuth Bandwidth of Multiple Tracks of Airborne Stripmap SAR Data.
Sensors, 2016

A dynamic stochastic decision-making method based on discrete time sequences.
Knowl.-Based Syst., 2016

Real-time hybrid design of tracking control and obstacle avoidance for underactuated underwater vehicles.
Journal of Intelligent and Fuzzy Systems, 2016

An optimal distributed control problem of the viscous Degasperis-Procesi equation.
IMA J. Math. Control & Information, 2016

An Integrated AUV Path Planning Algorithm with ocean current and Dynamic obstacles.
I. J. Robotics and Automation, 2016

Improved zero-correlation linear cryptanalysis of reduced-round Camellia under weak keys.
IET Information Security, 2016

A multi-AUV cooperative hunting method in 3-D underwater environment with obstacle.
Eng. Appl. of AI, 2016

Deceptive jamming suppression for SAR based on time-varying initial phase.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

Provable Security Evaluation of Structures Against Impossible Differential and Zero Correlation Linear Cryptanalysis.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

New Insights on AES-Like SPN Ciphers.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

Impossible Differentials of SPN Ciphers.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

2015
Convergence of an Upwind Finite-Difference Scheme for Hamilton-Jacobi-Bellman Equation in Optimal Control.
IEEE Trans. Automat. Contr., 2015

Truncated differential cryptanalysis of PRINCE.
Security and Communication Networks, 2015

Differential fault analysis on LED using Super-Sbox.
IET Information Security, 2015

New Observation on Division Property.
IACR Cryptology ePrint Archive, 2015

A modified back-projection algorithm for imaging Geo-referenced SAR data.
Proceedings of the 2015 IEEE International Geoscience and Remote Sensing Symposium, 2015

Resolution analysis of sector scan GB-SAR for wide landslides monitoring.
Proceedings of the 2015 IEEE International Geoscience and Remote Sensing Symposium, 2015

Links Among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

Design of a dead reckoning based motion control system for small autonomous underwater vehicle.
Proceedings of the IEEE 28th Canadian Conference on Electrical and Computer Engineering, 2015

Path planning for autonomous underwater vehicle based on artificial potential field and velocity synthesis.
Proceedings of the IEEE 28th Canadian Conference on Electrical and Computer Engineering, 2015

2014
A Bioinspired Filtered Backstepping Tracking Control of 7000-m Manned Submarine Vehicle.
IEEE Trans. Industrial Electronics, 2014

A Parameter-Adjusting Polar Format Algorithm for Extremely High Squint SAR Imaging.
IEEE Trans. Geoscience and Remote Sensing, 2014

Mitigation of Azimuth Ambiguities in Spaceborne Stripmap SAR Images Using Selective Restoration.
IEEE Trans. Geoscience and Remote Sensing, 2014

Gait Characteristic Analysis and Identification Based on the iPhone's Accelerometer and Gyrometer.
Sensors, 2014

A novel fuzzy control algorithm for three-dimensional AUV path planning based on sonar model.
Journal of Intelligent and Fuzzy Systems, 2014

A Bio-Inspired Cascaded Approach for Three-Dimensional Tracking Control of Unmanned underwater Vehicles.
I. J. Robotics and Automation, 2014

Compressive Sensing Imaging for General SAR Echo Model Based on Maxwell's Equations.
EURASIP J. Adv. Sig. Proc., 2014

High-resolution palmprint minutiae extraction based on Gabor feature.
SCIENCE CHINA Information Sciences, 2014

Airborne geographically referenced stripmap SAR data processing.
Proceedings of the 2014 IEEE Geoscience and Remote Sensing Symposium, 2014

Signal model based on Maxwell's equations.
Proceedings of the 2014 IEEE Geoscience and Remote Sensing Symposium, 2014

2013
Fault analysis study of the block cipher FOX64.
Multimedia Tools Appl., 2013

Natural Interaction Based Online Military Boxing Learning System.
IJDET, 2013

The bio-inspired model based hybrid sliding-mode tracking control for unmanned underwater vehicles.
Eng. Appl. of AI, 2013

Security evaluation of MISTY structure with SPN round function.
Computers & Mathematics with Applications, 2013

The Translation-Invariant Metric and Its Application.
Proceedings of the Intelligence Science and Big Data Engineering, 2013

Extraction of building height based on modified double scattering model from single SAR image.
Proceedings of the 2013 IEEE International Geoscience and Remote Sensing Symposium, 2013

A Low Data Complexity Attack on the GMR-2 Cipher Used in the Satellite Phones.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013

Analyzing of Dynamic Friction Model for the Tire and the Runway.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

2012
On Algebraic Property of T-Functions.
IEICE Transactions, 2012

A new trajectory-based Polar Format Algorithm for bistatic SAR.
Proceedings of the 2012 IEEE International Geoscience and Remote Sensing Symposium, 2012

2011
A meet-in-the-middle attack on reduced-round ARIA.
Journal of Systems and Software, 2011

Impossible differential cryptanalysis of 13-round CLEFIA-128.
Journal of Systems and Software, 2011

Construction of Odd-Variable Resilient Boolean Functions with Optimal Degree.
J. Inf. Sci. Eng., 2011

Differential Fault Analysis on SMS4 using a single fault.
Inf. Process. Lett., 2011

Impossible differential cryptanalysis of SPN ciphers.
IET Information Security, 2011

Balanced rotation symmetric boolean functions with maximum algebraic immunity.
IET Information Security, 2011

Related-key impossible differential cryptanalysis on Crypton and Crypton v1.0.
Proceedings of the 2011 World Congress on Internet Security, 2011

2010
Maximum principle for optimal boundary control of the Kuramoto-Sivashinsky equation.
J. Franklin Institute, 2010

Pontryagin's maximum principle for optimal boundary control of a generalised Korteweg-de Vries equation.
Int. J. Systems Science, 2010

Improved Fault Attack on FOX.
IACR Cryptology ePrint Archive, 2010

A Meet-in-the-Middle Attack on ARIA.
IACR Cryptology ePrint Archive, 2010

Differential Fault Analysis on SMS4 Using a Single Fault.
IACR Cryptology ePrint Archive, 2010

Some Observations on MISTY Structure with SPN Round Function.
IACR Cryptology ePrint Archive, 2010

Impossible Differential Cryptanalysis of SPN Ciphers.
IACR Cryptology ePrint Archive, 2010

SQUARE attack on block ciphers with low algebraic degree.
SCIENCE CHINA Information Sciences, 2010

Impossible Differential Cryptanalysis on Feistel Ciphers with SP and SPS Round Functions.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

Cryptanalysis of a Generalized Unbalanced Feistel Network Structure.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

2009
Optimal control of vibrations of an elastic beam.
IMA J. Math. Control & Information, 2009

A new algorithm for finding numerical solutions of optimal feedback control.
IMA J. Math. Control & Information, 2009

New Integral Distinguisher for Rijndael-256.
IACR Cryptology ePrint Archive, 2009

Distinguishing Attacks on a Kind of Generalized Unbalanced Feistel Network.
IACR Cryptology ePrint Archive, 2009

Self-Protection Model Based on Intelligent Agent.
Proceedings of the Third International Conference on Network and System Security, 2009

The Fitness Evaluation Model of SAAS for Enterprise Information System.
Proceedings of the 2009 IEEE International Conference on e-Business Engineering, 2009

Study of Eradicating Invasive Organisms from Ballast Water with Pulsed Discharge in Liquid.
Proceedings of the Annual Meeting of the IEEE Industry Applications Society, 2009

Nozzleless EHD Spraying for Fine Droplet Production in Liquid-In-Liquid System.
Proceedings of the Annual Meeting of the IEEE Industry Applications Society, 2009

New Cryptanalysis of Block Ciphers with Low Algebraic Degree.
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009

A Multi-scale Based Algorithm for Sub-pixel Measurements of Circular Parts.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009

Learning IMED via shift-invariant transformation.
Proceedings of the 2009 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2009), 2009

Integral Cryptanalysis of ARIA.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

Saturation Attack on the Block Cipher HIGHT.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

2008
New Impossible Differential Cryptanalysis of ARIA.
IACR Cryptology ePrint Archive, 2008

GMTI Performance Analysis for Circular Scanning SAR Equipped on Slow Platform.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2008

Synchronization of Geo Spaceborne-Airborne Bistatic SAR.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2008

Construction of Resilient Functions with Multiple Cryptographic Criteria.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

Enumeration of Homogeneous Rotation Symmetric Functions over Fp.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

2007
Numerical solution to the optimal feedback control of continuous casting process.
J. Global Optimization, 2007

Maximum principle for optimal control of sterilization of prepackaged food.
IMA J. Math. Control & Information, 2007

P2P Multimedia Sharing over MANET.
Proceedings of the Advances in Multimedia Modeling, 2007

2006
COMBAT: Search Rapidly for Highly Similar Protein-Coding Sequences Using Bipartite Graph Matching.
Proceedings of the Computational Science, 2006

2004
RPE Query Processing and Optimization Techniques for XML Databases.
J. Comput. Sci. Technol., 2004

Answering XML Twig Queries with Automata.
Proceedings of the Advanced Web Technologies and Applications, 2004

2003
Automata Match: a new XML query processing approach.
Comput. Syst. Sci. Eng., 2003

Efficient Evaluation of XML Path Queries with Automata.
Proceedings of the Advances in Web-Age Information Management, 2003

Effective Schema-Based XML Query Optimization Techniques.
Proceedings of the 7th International Database Engineering and Applications Symposium (IDEAS 2003), 2003

2002
Performance Evaluation of a DOM-Based XML Database: Storage, Indexing and Query Optimization.
Proceedings of the Advances in Web-Age Information Management, 2002

A New Path Expression Computing Approach for XML Data.
Proceedings of the Efficiency and Effectiveness of XML Tools and Techniques and Data Integration over the Web, 2002


  Loading...