Jianyong Huang

Orcid: 0000-0002-6581-895X

According to our database1, Jianyong Huang authored at least 16 papers between 2003 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A High-Temperature Superconducting Bandpass Dual-Mode Filter with Tunable Relative Bandwidth and Center Frequency.
Sensors, February, 2023

2022
Pixel Rows and Columns Relationship Modeling Network based on Transformer for Retinal Vessel Segmentation.
Proceedings of the International Joint Conference on Neural Networks, 2022

Transformer Based High-Frequency Predictive Model for Visual-Haptic Feedback of Virtual Surgery Navigation.
Proceedings of the Neural Information Processing - 29th International Conference, 2022

2021
Motion Enhancement of Spherical Surface Walkers with Microstructures.
Adv. Intell. Syst., 2021

Programmable Self-Locking Micromachines with Tunable Couplings.
Adv. Intell. Syst., 2021

Incorporation of Dynamic Stopping Strategy into the Hybrid P300 and SSVEP BCI-based Communication.
Proceedings of the ICAIIS 2021: 2021 2nd International Conference on Artificial Intelligence and Information Systems, Chongqing, China, May 28, 2021

2020
Encoding Smart Microjoints for Microcrawlers with Enhanced Locomotion.
Adv. Intell. Syst., 2020

2011
Repeated Differential Properties of the AES-128 and AES-256 Key Schedules.
Proceedings of the IEEE 10th International Conference on Trust, 2011

2010
Differential Fault Analysis of LEX.
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010

2009
A five-round algebraic property of AES and its application to the ALPHA-MAC.
Int. J. Appl. Cryptogr., 2009

2008
A Five-Round Algebraic Property of the Advanced Encryption Standard.
Proceedings of the Information Security, 11th International Conference, 2008

2006
On the Internal Structure of Alpha-MAC.
Proceedings of the Progressin Cryptology, 2006

2005
Security Analysis of Michael: The IEEE 802.11i Message Integrity Code.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

Personal Firewall for Pocket PC 2003: Design & Implementation.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2004
Image digital watermarking algorithm using multiresolution wavelet transform.
Proceedings of the IEEE International Conference on Systems, 2004

2003
On Using Fast Exponentiation Algorithm in PDAs (or: How Secure is the Discrete Logarithm Problem Assumption in PDAs?).
Proceedings of the International Conference on Security and Management, 2003


  Loading...