Hongbo Yu

Orcid: 0000-0001-8500-5991

According to our database1, Hongbo Yu authored at least 74 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Suppression Method for Smeared Spectrum Jamming Based on Lv's Distribution Combined with Biorthogonal Fourier Transform.
J. Electr. Comput. Eng., 2024

2023
Neural-Aided Statistical Attack for Cryptanalysis.
Comput. J., October, 2023

A New Neural Distinguisher Considering Features Derived From Multiple Ciphertext Pairs.
Comput. J., June, 2023

A virtual surgical prototype system based on gesture recognition for virtual surgical training in maxillofacial surgery.
Int. J. Comput. Assist. Radiol. Surg., May, 2023

Neural representations of vicarious rewards are linked to interoception and prosocial behaviour.
NeuroImage, April, 2023

Resilience-oriented design for complex MEP systems in BIM.
Adv. Eng. Informatics, January, 2023

Cognitive and neural bases of visual-context-guided decision-making.
NeuroImage, 2023

Practical Preimage Attack on 3-Round Keccak-256.
IACR Cryptol. ePrint Arch., 2023

Differential-Linear Approximation Semi-Unconstrained Searching and Partition Tree: Application to LEA and Speck.
IACR Cryptol. ePrint Arch., 2023

Differential-Linear Approximation Semi-unconstrained Searching and Partition Tree: Application to LEA and Speck.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
Improved Preimage Attacks on Round-Reduced Keccak-384/512 via Restricted Linear Structures.
IACR Cryptol. ePrint Arch., 2022

A Deep Learning aided Key Recovery Framework for Large-State Block Ciphers.
IACR Cryptol. ePrint Arch., 2022

Development of a maxillofacial virtual surgical system based on biomechanical parameters of facial soft tissue.
Int. J. Comput. Assist. Radiol. Surg., 2022

Detecting logical relationships in mechanical, electrical, and plumbing (MEP) systems with BIM using graph matching.
Adv. Eng. Informatics, 2022

2021
Reactive Obstacle Avoidance Method for a UAV.
Proceedings of the Deep Learning for Unmanned Systems, 2021

Improved Preimage Attacks on 3-Round Keccak-224/256.
IACR Trans. Symmetric Cryptol., 2021

Improved Preimage Attacks on 4-Round Keccak-224/256.
IACR Trans. Symmetric Cryptol., 2021

The mutuality of social emotions: How the victim's reactive attitude influences the transgressor's emotional responses.
NeuroImage, 2021

Wireless Sensor Network Node Localization Algorithm Based on PSO-MA.
J. Web Eng., 2021

Bridging Machine Learning and Cryptanalysis via EDLCT.
IACR Cryptol. ePrint Arch., 2021

Improved Neural Aided Statistical Attack for Cryptanalysis.
IACR Cryptol. ePrint Arch., 2021

A New Neural Distinguisher Model Considering Derived Features from Multiple Ciphertext Pairs.
IACR Cryptol. ePrint Arch., 2021

Preliminary study on mechanical characteristics of maxillofacial soft and hard tissues for virtual surgery.
Int. J. Comput. Assist. Radiol. Surg., 2021

2020
Affective evaluation of others' altruistic decisions under risk and ambiguity.
NeuroImage, 2020

Guilty by association: How group-based (collective) guilt arises in the brain.
NeuroImage, 2020

Blockchain-Assisted Secure Device Authentication for Cross-Domain Industrial IoT.
IEEE J. Sel. Areas Commun., 2020

Neural Aided Statistical Attack for Cryptanalysis.
IACR Cryptol. ePrint Arch., 2020

Self-inferred desires to benefit self and other.
Proceedings of the 42th Annual Meeting of the Cognitive Science Society, 2020

Field Identification of Cold Tolerance of High Oleic Acid Peanut at Germination Stage and Verification of Physiological Indices.
Proceedings of the BIBE 2020: The Fourth International Conference on Biological Information and Biomedical Engineering, 2020

2019
Modeling Morality in 3-D: Decision-Making, Judgment, and Inference.
Top. Cogn. Sci., 2019

Cryptanalysis of Reduced-Round SipHash.
IACR Cryptol. ePrint Arch., 2019

A Dynamic Programming Based TBD Algorithm for Near Space Targets Under Range Ambiguity.
Proceedings of the Communications, Signal Processing, and Systems, 2019

A New Nonlinear Method for Calculating the Error of Passive Location.
Proceedings of the Communications, Signal Processing, and Systems, 2019

2018
MILP-based Differential Attack on Round-reduced GIFT.
IACR Cryptol. ePrint Arch., 2018

Improved cryptanalysis of step-reduced SM3.
Sci. China Inf. Sci., 2018

2017
How do self-interest and other-need interact in the brain to determine altruistic behavior?
NeuroImage, 2017

Prototype Decision Support System for Black Ice Detection and Road Closure Control.
IEEE Intell. Transp. Syst. Mag., 2017

2016
Robust adaptive beamforming against large DOA mismatch with linear phase and magnitude constraints for multiple-input-multiple-output radar.
IET Signal Process., 2016

A novel RHT-TBD approach for weak targets in HPRF radar.
Sci. China Inf. Sci., 2016

Evaluate the security margins of SHA-512, SHA-256 and DHA-256 against the boomerang attack.
Sci. China Inf. Sci., 2016

2015
Improved cryptanalysis on RIPEMD-128.
IET Inf. Secur., 2015

Improved boomerang attacks on round-reduced SM3 and keyed permutation of BLAKE-256.
IET Inf. Secur., 2015

2014
Feedback of the amygdala globally modulates visual response of primary visual cortex in the cat.
NeuroImage, 2014

Cryptanalysis of GOST R hash function.
Inf. Process. Lett., 2014

Boomerang Attack on Step-Reduced SHA-512.
IACR Cryptol. ePrint Arch., 2014

Joint range ambiguity resolving and multiple maneuvering targets tracking in clutter via MMPHDF-DA.
Sci. China Inf. Sci., 2014

2013
Improved Boomerang Attacks on Round-Reduced SM3 and BLAKE-256.
IACR Cryptol. ePrint Arch., 2013

A bio-inspired quadruped robot with a global compliant spine.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2013

Improved Meet-in-the-Middle Attacks on Round-Reduced ARIA.
Proceedings of the Information Security, 16th International Conference, 2013

Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013

Improved Boomerang Attacks on SM3.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013

2012
The Boomerang Attacks on the Round-Reduced Skein-512.
IACR Cryptol. ePrint Arch., 2012

2011
Current transport mechanisms and trap state investigations in (Ni/Au)-AlN/GaN Schottky barrier diodes.
Microelectron. Reliab., 2011

Near-Collision Attack on the Step-Reduced Compression Function of Skein-256.
IACR Cryptol. ePrint Arch., 2011

A Meet-in-the-Middle Attack on the Full KASUMI.
IACR Cryptol. ePrint Arch., 2011

New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256.
IACR Cryptol. ePrint Arch., 2011

2010
Cryptanalysis of the Compression Function of SIMD.
IACR Cryptol. ePrint Arch., 2010

Precise analysis of hydraulic press performance based on rough set.
Proceedings of the Seventh International Conference on Fuzzy Systems and Knowledge Discovery, 2010

2009
Near-Collision Attack on the Compression Function of Dynamic SHA2.
IACR Cryptol. ePrint Arch., 2009

Full Key-Recovery Attack on the HMAC/NMAC Based on 3 and 4-Pass HAVAL.
Proceedings of the Information Security Practice and Experience, 2009

Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC.
Proceedings of the Advances in Cryptology, 2009

Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256.
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009

2008
A Space-Time GIS Approach to Exploring Large Individual-based Spatiotemporal Datasets.
Trans. GIS, 2008

Global evaluation of contributions of GABA<sub>A</sub>, AMPA and NMDA receptors to orientation maps in cat's visual cortex.
NeuroImage, 2008

Exploring potential human activities in physical and virtual spaces: a spatio-temporal GIS approach.
Int. J. Geogr. Inf. Sci., 2008

2007
MultiCollision Attack on the Compression Functions of MD4 and 3-Pass HAVAL.
IACR Cryptol. ePrint Arch., 2007

Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL.
Proceedings of the Information Security and Cryptology, 2007

2006
Slab-like functional architecture of higher order cortical area 21a showing oblique effect of orientation preference in the cat.
NeuroImage, 2006

Cryptanalysis of the Full HAVAL with 4 and 5 Passes.
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006

2005
How to Break MD5 and Other Hash Functions.
Proceedings of the Advances in Cryptology, 2005

Finding Collisions in the Full SHA-1.
Proceedings of the Advances in Cryptology, 2005

Efficient Collision Search Attacks on SHA-0.
Proceedings of the Advances in Cryptology, 2005

The Second-Preimage Attack on MD4.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

2004
Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD.
IACR Cryptol. ePrint Arch., 2004


  Loading...