Chang Lv

Orcid: 0000-0002-6134-7871

According to our database1, Chang Lv authored at least 24 papers between 2016 and 2026.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book  In proceedings  Article  PhD thesis  Dataset  Other 

Links

On csauthors.net:

Bibliography

2026
On the complexity formulae of the number field sieve and its variants.
Des. Codes Cryptogr., March, 2026

Synthetic pertinence clustering and reinforced evolutionary algorithm for the hybrid E-commerce green location routing problem.
Swarm Evol. Comput., 2026

2025
Utilizing two subfields to accelerate individual logarithm computation in extended tower number field sieve.
Des. Codes Cryptogr., August, 2025

Nonexistence of generalized bent functions and the quadratic norm form equations.
Des. Codes Cryptogr., July, 2025

Achieving Computational Symmetry: A Novel Workflow Task Scheduling and Resource Allocation Method for D2D Cooperation.
Symmetry, 2025

Hourly photosynthetically active radiation prediction in solar greenhouses using Bayesian optimized machine learning and deep learning based on limited local weather data.
Comput. Electron. Agric., 2025

2024
Deep Learning Approach for Driver Speed Intention Recognition Based on Naturalistic Driving Data.
IEEE Trans. Intell. Transp. Syst., October, 2024

A Generalized MSST Algorithm for Counting Points of Elliptic Curves over 픽<sub>p<sup>n</sup></sub>.
J. Syst. Sci. Complex., August, 2024

Quantum Algorithms for the Multiplication of Circulant Matrices and Vectors.
Inf., August, 2024

A path relinking with tabu search algorithm for solving hybrid flow shop scheduling problem considering multiple critical paths.
Comput. Oper. Res., 2024

A feature correlation reinforce clustering and evolutionary algorithm for the green bike-sharing reposition problem.
Comput. Oper. Res., 2024

Amplitude Transformation of Quantum State Based on QSVT.
Proceedings of the IEEE International Symposium on Information Theory, 2024

2023
Lateral Entry Guidance With Terminal Time Constraint.
IEEE Trans. Aerosp. Electron. Syst., June, 2023

Subfield Attack on NTRU by using symmetric function map.
Proceedings of the IEEE International Symposium on Information Theory, 2023

2022
A fuzzy correlation based heuristic for Dual-mode integrated Location routing problem.
Comput. Oper. Res., 2022

Subfield Attacks on HSVP in Ideal Lattices.
Proceedings of the Information Security and Cryptology - 18th International Conference, 2022

2020
Refined analysis to the extended tower number field sieve.
Theor. Comput. Sci., 2020

Mixed-integer linear programming and constraint programming formulations for solving distributed flexible job shop scheduling problem.
Comput. Ind. Eng., 2020

2019
A variant of the Galbraith-Ruprai algorithm for discrete logarithms with improved complexity.
Des. Codes Cryptogr., 2019

2018
Nonexistence of generalized bent functions and the quadratic norm form equations.
CoRR, 2018

2017
On the Non-Existence of Certain Classes of Generalized Bent Functions.
IEEE Trans. Inf. Theory, 2017

On the Non-Existence of Certain Classes of Perfect p-Ary Sequences and Perfect Almost p-Ary Sequences.
IEEE Trans. Inf. Theory, 2017

2016
Improvements on the Individual Logarithm Step in exTNFS.
IACR Cryptol. ePrint Arch., 2016

Classifying and generating exact coset representatives of PGL<sub>2</sub>(F<sub>q</sub>) in PGL<sub>2</sub>(F<sub>q<sup>2</sup></sub>).
Finite Fields Their Appl., 2016


  Loading...