Jialin Huang

Orcid: 0009-0000-9915-1252

According to our database1, Jialin Huang authored at least 18 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Event-triggered impulse control on reaction-diffusion Gilpin-Ayala competition model with multiple stationary solutions.
Commun. Nonlinear Sci. Numer. Simul., November, 2023

ShapeSonic: Sonifying Fingertip Interactions for Non-Visual Virtual Shape Perception.
Proceedings of the SIGGRAPH Asia 2023 Conference Papers, 2023

2022
Use pre-trained models and multi-classifier voting methods to identify the ironic authors on Twitter.
Proceedings of the Working Notes of CLEF 2022 - Conference and Labs of the Evaluation Forum, Bologna, Italy, September 5th - to, 2022

2021
Stability analysis of nontrivial stationary solution and constant equilibrium point of reaction-diffusion neural networks with time delays under Dirichlet zero boundary value.
Neurocomputing, 2021

Existence, Uniqueness, and Input-to-State Stability of Ground State Stationary Strong Solution of a Single-Species Model via Mountain Pass Lemma.
Complex., 2021

2020
An Effective Algorithm for Beat-to-Beat Heart Rate Monitoring from Ballistocardiograms.
J. Medical Imaging Health Informatics, 2020

2016
Capacity and Data Complexity in Multidimensional Linear Attack.
IACR Cryptol. ePrint Arch., 2016

POSTER: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

Transposition of AES Key Schedule.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

2014
Revisiting key schedule's diffusion in relation with round function's diffusion.
Des. Codes Cryptogr., 2014

What is the effective key length for a block cipher: an attack on every practical block cipher.
Sci. China Inf. Sci., 2014

Improved Linear Cryptanalysis of Reduced-Round MIBS.
Proceedings of the Advances in Information and Computer Security, 2014

On the Key Schedule of Lightweight Block Ciphers.
Proceedings of the Progress in Cryptology - INDOCRYPT 2014, 2014

2013
On the Role of Diffusion Behaviors in Stability Criterion for <i>p</i>-Laplace Dynamical Equations with Infinite Delay and Partial Fuzzy Parameters under Dirichlet Boundary Value.
J. Appl. Math., 2013

Chosen-plaintext linear attacks on Serpent.
IET Inf. Secur., 2013

2012
What is the Effective Key Length for a Block Cipher: an Attack on Every Block Cipher.
IACR Cryptol. ePrint Arch., 2012

Transposition of AES Key Schedule.
IACR Cryptol. ePrint Arch., 2012

2010
Measuring Random Tests by Conditional Entropy and Optimal Execution Order.
Proceedings of the Trusted Systems - Second International Conference, 2010


  Loading...