Dingyi Pei

Orcid: 0000-0001-7756-3678

According to our database1, Dingyi Pei authored at least 55 papers between 1990 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Emerging Frontiers in Human-Robot Interaction.
J. Intell. Robotic Syst., June, 2024

2023
Learning Hand Gestures using Synergies in a Humanoid Robot.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2023

Electroencephalogram based Control of Prosthetic Hand using Optimizable Support Vector Machine.
Proceedings of the 2023 6th International Conference on Advances in Robotics, 2023

2022
Reconstructing Synergy-Based Hand Grasp Kinematics from Electroencephalographic Signals.
Sensors, 2022

Dynamical Synergies of Multidigit Hand Prehension.
Sensors, 2022

Data Fusion-Based Musculoskeletal Synergies in the Grasping Hand.
Sensors, 2022

Musculoskeletal Synergies in the Grasping Hand.
Proceedings of the 44th Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2022

Message from the General Co-Chairs: AsiaJCIS 2022.
Proceedings of the 17th Asia Joint Conference on Information Security, 2022

2021
Generalizability of Hand Kinematic Synergies derived using Independent Component Analysis.
Proceedings of the 43rd Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2021

Design and Implementation of an Instrumented Data Glove that measures Kinematics and Dynamics of Human Hand.
Proceedings of the 43rd Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2021

2020
Advances in security research in the Asiacrypt region.
Commun. ACM, 2020

Lateralization and Model Transference in a Bilateral Cursor Task<sup>*</sup>.
Proceedings of the 42nd Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2020

2019
Myoelectric Control of a Soft Hand Exoskeleton Using Kinematic Synergies.
IEEE Trans. Biomed. Circuits Syst., 2019

Neural Decoding of Synergy-Based Hand Movements Using Electroencephalography.
IEEE Access, 2019

Dynamic Control of Virtual Hand Grasp Using Spatiotemporal Synergies.
IEEE Access, 2019

2018
Fast construction of binary ring FCSRs for hardware stream ciphers.
Des. Codes Cryptogr., 2018

A Construction of Zero-Difference Functions.
CoRR, 2018

Decoding Asynchronous Reaching in Electroencephalography Using Stacked Autoencoders.
IEEE Access, 2018

Decoding Synergy-Based Hand Movements using Electroencephalography.
Proceedings of the 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2018

A Note on the Sidelnikov-Shestakov Attack of Niederreiter Scheme.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2017
Construction for de Bruijn sequences with large stage.
Des. Codes Cryptogr., 2017

Practical construction of ring LFSRs and ring FCSRs with low diffusion delay for hardware cryptographic applications.
Cryptogr. Commun., 2017

2016
Piecewise constructions of inverses of cyclotomic mapping permutation polynomials.
Finite Fields Their Appl., 2016

Large classes of permutation polynomials over F<sub>q<sup>2</sup></sub>.
Des. Codes Cryptogr., 2016

2015
Construction of Transition Matrices for Ternary Ring Feedback With Carry Shift Registers.
IEEE Trans. Inf. Theory, 2015

Construction of Transition Matrices for Binary FCSRs.
IACR Cryptol. ePrint Arch., 2015

Piecewise constructions of inverses of some permutation polynomials.
Finite Fields Their Appl., 2015

2013
A note on ramp secret sharing schemes from error-correcting codes.
Math. Comput. Model., 2013

Efficient integer span program for hierarchical threshold access structure.
Inf. Process. Lett., 2013

2012
An efficient key distribution scheme in cloud computing.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

2011
Fast Algebraic Attacks and Decomposition of Symmetric Boolean Functions.
IEEE Trans. Inf. Theory, 2011

Constructing a Diversified FCSR with a Given Connection Integer.
IACR Cryptol. ePrint Arch., 2011

Results on the Immunity of Boolean Functions against Probabilistic Algebraic Attacks.
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2010
A novel key pre-distribution scheme for wireless distributed sensor networks.
Sci. China Inf. Sci., 2010

Identification and construction of Boolean functions with maximum algebraic immunity.
Sci. China Inf. Sci., 2010

Construction of Boolean functions with maximum algebraic immunity and count of their annihilators at lowest degree.
Sci. China Inf. Sci., 2010

Count of annihilators of Boolean functions with given algebraic immunity.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

Determining Parameters of Key Predistribution Schemes via Linear Codes in Wireless Sensor Networks.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

2009
New Family of Non-Cartesian Perfect Authentication Codes.
Proceedings of the Coding and Cryptology, Second International Workshop, 2009

2008
A Class of Key Predistribution Schemes Based on Orthogonal Arrays.
J. Comput. Sci. Technol., 2008

Perfectly Hiding Commitment Scheme with Two-Round from Any One-Way Permutation.
IACR Cryptol. ePrint Arch., 2008

Delegateable signatures based on non-interactive witness indistinguishable and non-interactive witness hiding proofs.
Sci. China Ser. F Inf. Sci., 2008

5-Round Computational Zero-Knowledge Proof with Negligible Error Probability for Any NP from Any One-Way Permutation.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

2007
Designated Verifier Signature: Definition, Framework and New Constructions.
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007

A Key Predistribution Scheme Based on 3-Designs.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

Efficient Zaps and Signatures of Knowledge.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

2005
Implementation of Cryptosystems Based on Tate Pairing.
J. Comput. Sci. Technol., 2005

On Delegatability of Four Designated Verifier Signatures.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

2004
Non-Interactive and Information-Theoretic Secure Publicly Verifiable Secret Sharing.
IACR Cryptol. ePrint Arch., 2004

Delegateable Signature Using Witness Indistinguishable and Witness Hiding Proofs.
IACR Cryptol. ePrint Arch., 2004

Generator polynomials of characteristic ideal of maximal periodic arrays over Galois rings.
Discret. Math., 2004

2000
The Correlation of a Boolean Function with Its Variables.
Proceedings of the Progress in Cryptology, 2000

1999
Characterization of Optimal Authentication Codes with Arbitration.
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999

1995
Information-Theoretic Bounds for Authentication Codes and Block Designs.
J. Cryptol., 1995

1990
A VLSI DEsign for Computing Exponentiations in GF(2^m) and Its Application to Generate Pseudorandom Number Sequences.
IEEE Trans. Computers, 1990


  Loading...