Jiayu Xu

Orcid: 0000-0002-0881-9980

According to our database1, Jiayu Xu authored at least 45 papers between 2014 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Text Position-Aware Pixel Aggregation Network With Adaptive Gaussian Threshold: Detecting Text in the Wild.
IEEE Trans. Circuits Syst. Video Technol., January, 2024

Multi-Temporal and Time-Lag Responses of Terrestrial Net Ecosystem Productivity to Extreme Climate from 1981 to 2019 in China.
Remote. Sens., January, 2024

Under What Conditions Is Encrypted Key Exchange Actually Secure?
IACR Cryptol. ePrint Arch., 2024

Meta-DHGNN: method for CRS-related cytokines analysis in CAR-T therapy based on meta-learning directed heterogeneous graph neural network.
Briefings Bioinform., 2024

2023
A parallel and serial denoising network.
Expert Syst. Appl., November, 2023

Classical and Quantum Security of Elliptic Curve VRF, via Relative Indifferentiability.
IACR Cryptol. ePrint Arch., 2023

An Efficient Strong Asymmetric PAKE Compiler Instantiable from Group Actions.
IACR Cryptol. ePrint Arch., 2023

On the Non-Malleability of ECVRF in the Algebraic Group Model.
IACR Cryptol. ePrint Arch., 2023

Two-Layer Generation Expansion Planning Based on Flexibility Balance.
IEEE Access, 2023

2022
DS-TransUNet: Dual Swin Transformer U-Net for Medical Image Segmentation.
IEEE Trans. Instrum. Meas., 2022

A Universally Composable PAKE with Zero Communication Cost (And Why It Shouldn't Be Considered UC-Secure).
IACR Cryptol. ePrint Arch., 2022

How to Obfuscate MPC Inputs.
IACR Cryptol. ePrint Arch., 2022

The Abe-Okamoto Partially Blind Signature Scheme Revisited.
IACR Cryptol. ePrint Arch., 2022

Investigation of CRS-associated cytokines in CAR-T therapy with meta-GNN and pathway crosstalk.
BMC Bioinform., 2022

Context-aware learning for cancer cell nucleus recognition in pathology images.
Bioinform., 2022

ILGBMSH: an interpretable classification model for the shRNA target prediction with ensemble learning algorithm.
Briefings Bioinform., 2022

On Pairing-Free Blind Signature Schemes in the Algebraic Group Model.
Proceedings of the Public-Key Cryptography - PKC 2022, 2022

ConTrans: Improving Transformer with Convolutional Attention for Medical Image Segmentation.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2022, 2022

A Speaker-Aware Co-Attention Framework for Medical Dialogue Information Extraction.
Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing, 2022

2021
Context-Aware Compilation of DNN Training Pipelines across Edge and Cloud.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021

On the (In)Security of the Diffie-Hellman Oblivious PRF with Multiplicative Blinding.
IACR Cryptol. ePrint Arch., 2021

Spreading the Privacy Blanket: Differentially Oblivious Shuffling for Differential Privacy.
IACR Cryptol. ePrint Arch., 2021

Algebraic Adversaries in the Universal Composability Framework.
IACR Cryptol. ePrint Arch., 2021

DS-TransUNet: Dual Swin Transformer U-Net for Medical Image Segmentation.
CoRR, 2021

Graph Matching Based Privacy-Preserving Scheme in Social Networks.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2021

Federated Model Search via Reinforcement Learning.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

2020
On the Security of Time-Locked Puzzles and Timed Commitments.
IACR Cryptol. ePrint Arch., 2020

On Pairing-Free Blind Signature Schemes in the Algebraic Group Model.
IACR Cryptol. ePrint Arch., 2020

Universally Composable Relaxed Password Authenticated Key Exchange.
IACR Cryptol. ePrint Arch., 2020

Trajectory Planning of Upper Limb Rehabilitation Robot Based on Human Pose Estimation.
Proceedings of the 17th International Conference on Ubiquitous Robots, 2020

On the Security of Time-Lock Puzzles and Timed Commitments.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

Multi-field of View Aggregation and Context Encoding for Single-Stage Nucleus Recognition.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2020, 2020

Context-Aware Deep Model Compression for Edge Cloud Computing.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

2019
Password-Based Cryptographic Protocols in the Client-Server Setting.
PhD thesis, 2019

Strong Asymmetric PAKE based on Trapdoor CKEM.
IACR Cryptol. ePrint Arch., 2019

Password-Authenticated Public-Key Encryption.
IACR Cryptol. ePrint Arch., 2019

Pose Estimation Technique of Scattered Pistons Based on CAD Model and Global Feature.
Proceedings of the 16th International Conference on Ubiquitous Robots, 2019

2018
OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-Computation Attacks.
IACR Cryptol. ePrint Arch., 2018

Round-Reduced Modular Construction of Asymmetric Password-Authenticated Key Exchange.
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018

2017
A Wafer Prealignment Algorithm Based on Fourier Transform and Least Square Regression.
IEEE Trans Autom. Sci. Eng., 2017

TOPPSS: Cost-minimal Password-Protected Secret Sharing based on Threshold OPRF.
IACR Cryptol. ePrint Arch., 2017

2016
Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online).
IACR Cryptol. ePrint Arch., 2016

The application of relative moment and wavelet moment in target obstacle recognition.
Proceedings of the IEEE International Conference on Information and Automation, 2016

Extraction of high voltage transmission lines based on morphological processing.
Proceedings of the IEEE International Conference on Information and Automation, 2016

2014
A method of small-field-of-view and binocular camera calibration by using a wafer.
Proceedings of the IEEE International Conference on Information and Automation, 2014


  Loading...