Jian Zou

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
A circuit area optimization of MK-3 S-box.
Cybersecur., December, 2024

Systems approach for congruence and selection of cancer models towards precision medicine.
PLoS Comput. Biol., January, 2024

2023
Further insights on constructing quantum circuits for Camellia block cipher.
Quantum Inf. Process., December, 2023

Real and fake channel: GAN-based wireless channel modeling and generating.
Phys. Commun., December, 2023

Several classes of permutation pentanomials with the form xrh(xpm-1) over Fp2m.
Finite Fields Their Appl., December, 2023

Receiver Design for ICI-CSK System: A New Perspective Based on GRU Neural Network.
IEEE Commun. Lett., November, 2023

Quantum attacks on generalized Feistel networks based on the strong-weak separability.
Quantum Inf. Process., October, 2023

New results on quantum boomerang attacks.
Quantum Inf. Process., April, 2023

Improved Differential Analysis of MIBS Based on Greedy Algorithm.
IACR Cryptol. ePrint Arch., 2023

Further results on several classes of optimal ternary cyclic codes with minimum distance four.
IACR Cryptol. ePrint Arch., 2023

The <i>c</i>-differential uniformity and boomerang uniformity of three classes of permutation polynomials over F2n.
Finite Fields Their Appl., 2023

UniM<sup>2</sup>AE: Multi-modal Masked Autoencoders with Unified 3D Representation for 3D Perception in Autonomous Driving.
CoRR, 2023

Image Deblurring Based on Convex Non-Convex Sparse Regularization and Plug-and-Play Algorithm.
Algorithms, 2023

Improved Meet-in-the-Middle Cryptanalysis on Kupyna.
Proceedings of the 2023 13th International Conference on Communication and Network Security, 2023

The differential meet-in-the-middle attack on FUTURE and CRAFT.
Proceedings of the 2023 13th International Conference on Communication and Network Security, 2023

A Joint Link-Retrieve Framework for Open Table-and-Text Question Answering.
Proceedings of the Database Systems for Advanced Applications, 2023

2022
Biclustering high-frequency financial time series based on information theory.
Stat. Anal. Data Min., 2022

Some efficient quantum circuit implementations of Camellia.
Quantum Inf. Process., 2022

New quantum circuit implementations of SM4 and SM3.
Quantum Inf. Process., 2022

Monogenic features based single sample face recognition by kernel sparse representation on multiple Riemannian manifolds.
Neurocomputing, 2022

Quan-Transformer Based Channel Feedback for RIS-Aided Wireless Communication Systems.
IEEE Commun. Lett., 2022

The c-differential uniformity and boomerang uniformity of three classes of permutation polynomials over 픽<sub>2<sup>n</sup></sub>.
IACR Cryptol. ePrint Arch., 2022

Quantum Information Scrambling in Non-Markovian Open Quantum System.
Entropy, 2022

2021
An Online Monitoring Scheme of Output Capacitor's Equivalent Series Resistance for Buck Converters Without Current Sensors.
IEEE Trans. Ind. Electron., 2021

Efficient privacy-preserving authentication for V2G networks.
Peer-to-Peer Netw. Appl., 2021

Magnetic resonance imaging reconstruction via non-convex total variation regularization.
Int. J. Imaging Syst. Technol., 2021

Heat Modulation on Target Thermal Bath via Coherent Auxiliary Bath.
Entropy, 2021

Effect of Inter-System Coupling on Heat Transport in a Microscopic Collision Model.
Entropy, 2021

Learning Low-dimensional Manifolds for Scoring of Tissue Microarray Images.
CoRR, 2021

Privacy and Security Issues in Deep Learning: A Survey.
IEEE Access, 2021

Plug-and-Play ADMM for MRI Reconstruction With Convex Nonconvex Sparse Regularization.
IEEE Access, 2021

2020
Non-Markovianity of a Central Spin Interacting with a Lipkin-Meshkov-Glick Bath via a Conditional Past-Future Correlation.
Entropy, 2020

An Efficient Quantum Multi-Collision Search Algorithm.
IEEE Access, 2020

Quantum Circuit Implementations of AES with Fewer Qubits.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

Automatic Document Data Storage System Based on Machine Learning.
Proceedings of the Web and Big Data - 4th International Joint Conference, 2020

2019
A machine-learning-based hardware-Trojan detection approach for chips in the Internet of Things.
Int. J. Distributed Sens. Networks, 2019

Sufficient condition for exact support recovery of sparse signals through greedy block coordinate descent.
IET Signal Process., 2019

Observations on the Quantum Circuit of the SBox of AES.
IACR Cryptol. ePrint Arch., 2019

No-Signaling-in-Time (NSIT) Condition for Energy.
Entropy, 2019

Modeling financial durations using penalized estimating functions.
Comput. Stat. Data Anal., 2019

Bayesian hidden Markov models for dependent large-scale multiple testing.
Comput. Stat. Data Anal., 2019

Total Variation Denoising With Non-Convex Regularizers.
IEEE Access, 2019

2018
Dynamic Space-Time Model for Syndromic Surveillance with Particle Filters and Dirichlet Process.
Proceedings of the Handbook of Dynamic Data Driven Applications Systems., 2018

Bell inequality, steering, incompatibility and Leggett-Garg inequality under coarsening measurement.
Quantum Inf. Process., 2018

Entanglement generation of two quantum dots with Majorana fermions via optimal control.
Quantum Inf. Process., 2018

Protecting nonlocality of multipartite states by feed-forward control.
Quantum Inf. Process., 2018

Matrix exponential based discriminant locality preserving projections for feature extraction.
Neural Networks, 2018

Sparse L1-norm-based linear discriminant analysis.
Multim. Tools Appl., 2018

Cryptanalysis of the Round-Reduced Kupyna.
J. Inf. Sci. Eng., 2018

Improving the bound on the restricted isometry property constant in multiple orthogonal least squares.
IET Signal Process., 2018

Level set evolution with sparsity constraint for object extraction.
IET Image Process., 2018

New algorithms for the unbalanced generalised birthday problem.
IET Inf. Secur., 2018

Incorporating Deep Features in the Analysis of Tissue Microarray Images.
CoRR, 2018

Anomaly Detection via Graphical Lasso.
CoRR, 2018

Split Bregman Algorithm for Structured Sparse Reconstruction.
IEEE Access, 2018

MindCamera: Interactive Sketch-Based Image Retrieval and Synthesis.
IEEE Access, 2018

EVN: An Elastic Virtual Network Supporting NFV Customized and Rapid Migration.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

A Boundless Resource Orchestrator Based on Container Technology in Edge Computing.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

CASSIA: An assistant for identifying clinically and statistically significant decreases in antimicrobial susceptibility.
Proceedings of the 2018 IEEE EMBS International Conference on Biomedical & Health Informatics, 2018

2017
Analysis of various factors affecting the non-Markovian dynamics associated with a hierarchical environment based on collision model.
Quantum Inf. Process., 2017

L1-norm based null space discriminant analysis.
Multim. Tools Appl., 2017

An automatic active contour method for sea cucumber segmentation in natural underwater environments.
Comput. Electron. Agric., 2017

Causal Forest vs. Naive Causal Forest in Detecting Personalization: An Empirical Study in ASSISTments.
Proceedings of the 10th International Conference on Educational Data Mining, 2017

Using a Single Model Trained across Multiple Experiments to Improve the Detection of Treatment Effects.
Proceedings of the 10th International Conference on Educational Data Mining, 2017

An Offline Evaluation Method for Individual Treatment Rules and How to Find Heterogeneous Treatment Effect.
Proceedings of the 10th International Conference on Educational Data Mining, 2017

An online spatio-temporal model for inference and predictions of taxi demand.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

Leveraging Electronic Health Record Data for Community Health Assessment and Surveillance.
Proceedings of the AMIA 2017, 2017

2016
Low-Rank Matrix Factorization With Adaptive Graph Regularizer.
IEEE Trans. Image Process., 2016

L1-norm-based principal component analysis with adaptive regularization.
Pattern Recognit., 2016

L1-norm and maximum margin criterion based discriminant locality preserving projections via trace Lasso.
Pattern Recognit., 2016

Histogram-based embedding for learning on statistical manifolds.
Pattern Anal. Appl., 2016

A New and Fast Implementation of Orthogonal LDA Algorithm and Its Incremental Extension.
Neural Process. Lett., 2016

Graph Maximum Margin Criterion for Face Recognition.
Neural Process. Lett., 2016

Generalizing intersection kernel support vector machines for color texture based recognition.
J. Vis. Commun. Image Represent., 2016

Spare L1-norm-based maximum margin criterion.
J. Vis. Commun. Image Represent., 2016

Efficient portfolio allocation with sparse volatility estimation for high-frequency financial data.
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016

2015
Quantum controlled-not gate in the bad cavity regime.
Quantum Inf. Process., 2015

Incremental maximum margin criterion based on eigenvalue decomposition updating algorithm.
Mach. Vis. Appl., 2015

Split Bregman algorithms for multiple measurement vector problem.
Multidimens. Syst. Signal Process., 2015

Split Bregman algorithms for sparse group Lasso with application to MRI reconstruction.
Multidimens. Syst. Signal Process., 2015

Incremental learning from chunk data for IDR/QR.
Image Vis. Comput., 2015

Known-key distinguishers on 15-round 4-branch type-2 generalised Feistel networks with single substitution-permutation functions and near-collision attacks on its hashing modes.
IET Inf. Secur., 2015

Cryptanalysis of the Round-Reduced Kupyna Hash Function.
IACR Cryptol. ePrint Arch., 2015

Volatility matrix inference in high-frequency finance with regularization and efficient computations.
Proceedings of the 2015 IEEE International Conference on Big Data (IEEE BigData 2015), Santa Clara, CA, USA, October 29, 2015

Leveraging Health Information Exchange to Create Neighborhood Health Records for Public Health Agencies.
Proceedings of the AMIA 2015, 2015

2014
Block-sparse recovery via redundant block OMP.
Signal Process., 2014

A Bayesian spatio-temporal approach for real-time detection of disease outbreaks: a case study.
BMC Medical Informatics Decis. Mak., 2014

Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grostl Hash Function.
J. Inf. Sci. Eng., 2014

Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes.
Frontiers Comput. Sci., 2014

A perturbation algorithm for embedding virtual data centers in multipath networks.
Proceedings of the IEEE Global Communications Conference, 2014

High-frequency financial statistics with parallel R and Intel Xeon Phi coprocessor.
Proceedings of the 2014 IEEE International Conference on Big Data (IEEE BigData 2014), 2014

2013
Construction of general quantum channel for quantum teleportation.
Quantum Inf. Process., 2013

Object recognition using Gabor co-occurrence similarity.
Pattern Recognit., 2013

Improved complete neighbourhood preserving embedding for face recognition.
IET Comput. Vis., 2013

LHash: A Lightweight Hash Function (Full Version).
IACR Cryptol. ePrint Arch., 2013

A Universal Storage Architecture for Big Data in Cloud Environment.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Digital Greenhouse System via WSN.
Proceedings of the Advances in Wireless Sensor Networks, 2013

Cryptanalysis of the Round-Reduced GOST Hash Function.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

LHash: A Lightweight Hash Function.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

2012
A Block Fixed Point Continuation Algorithm for Block-Sparse Reconstruction.
IEEE Signal Process. Lett., 2012

Bayesian methodology for the analysis of spatial-temporal surveillance data.
Stat. Anal. Data Min., 2012

Incremental complete LDA for face recognition.
Pattern Recognit., 2012

Feature Extraction Using a Complete Kernel Extension of Supervised Graph Embedding.
Neural Process. Lett., 2012

Incremental learning of complete linear discriminant analysis for face recognition.
Knowl. Based Syst., 2012

Face recognition using discriminant sparsity neighborhood preserving embedding.
Knowl. Based Syst., 2012

Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grøstl.
IACR Cryptol. ePrint Arch., 2012

(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others (Extended Version).
IACR Cryptol. ePrint Arch., 2012

Incremental learning of discriminant common vectors for feature extraction.
Appl. Math. Comput., 2012

CO2 Laser Writing of Long-Period Fiber Gratings in Polarization-Maintaining Fiber under Tension.
Proceedings of the Advanced Infocomm Technology - 5th IEEE International Conference, 2012

(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

2011
Face recognition using multi-scale differential invariants in statistical manifold framework.
Int. J. Data Min. Model. Manag., 2011

Known-Key Distinguisher on Round-Reduced 3D Block Cipher.
Proceedings of the Information Security Applications - 12th International Workshop, 2011

Preimage Attacks on Step-Reduced SM3 Hash Function.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011

Indexing conceptual graph for abstracts of books.
Proceedings of the Eighth International Conference on Fuzzy Systems and Knowledge Discovery, 2011

2010
Texture Classification by Matching Co-occurrence Matrices on Statistical Manifolds.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
A novel method of the Flexible Interval S-Implication.
Proceedings of the 8th IEEE International Conference on Cognitive Informatics, 2009

2008
Face Recognition Based on Sub-image Feature Extraction and LS-SVM.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
Generic orthogonal moments: Jacobi-Fourier moments for invariant image description.
Pattern Recognit., 2007

Failure Analysis of Open Source J2EE Application Servers.
Proceedings of the Seventh International Conference on Quality Software (QSIC 2007), 2007

Character Reconstruction with Radial-Harmonic-Fourier Moments.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007


  Loading...