Jingyuan Zhao

Orcid: 0000-0003-3289-4048

According to our database1, Jingyuan Zhao authored at least 30 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Successive POI Recommendation via Brain-Inspired Spatiotemporal Aware Representation.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Deep probability multi-view feature learning for data clustering.
Expert Syst. Appl., May, 2023

2022
Ultrasound-Guided Assistive Robots for Scoliosis Assessment With Optimization-Based Control and Variable Impedance.
IEEE Robotics Autom. Lett., 2022

Ultrasound-Guided Assistive Robots for Scoliosis Assessment with Optimization-based Control and Variable Impedance.
CoRR, 2022

2021
Research Based on Multimodal Deep Feature Fusion for the Auxiliary Diagnosis Model of Infectious Respiratory Diseases.
Sci. Program., 2021

Improving NSGA-II for Multi-Constrained QoS Routing.
J. Circuits Syst. Comput., 2021

Profiling HPC Applications with Low Overhead and High Accuracy.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

2020
A GPU-based residual network for medical image classification in smart medicine.
Inf. Sci., 2020

2019
New Distinguisher on Reduced-Round Keccak Sponge Function.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

The urban computing on the distribution of inhalable particulate matters to Smart City-based residential groups.
Concurr. Comput. Pract. Exp., 2019

2018
Differential attacks on reduced SIMON versions with dynamic key-guessing techniques.
Sci. China Inf. Sci., 2018

2016
Conditional Cube Attack on Reduced-Round Keccak Sponge Function.
IACR Cryptol. ePrint Arch., 2016

How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers.
IACR Cryptol. ePrint Arch., 2016

2015
New Impossible Differential Attack on SAFER Block Cipher Family.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

2014
Improved Linear Cryptanalysis of CAST-256.
J. Comput. Sci. Technol., 2014

Related-Key Impossible Differential Attack on Reduced-Round LBlock.
J. Comput. Sci. Technol., 2014

Differential Analysis on Block Cipher PRIDE.
IACR Cryptol. ePrint Arch., 2014

Improved Differential Attacks on Reduced SIMON Versions.
IACR Cryptol. ePrint Arch., 2014

Enhancing enterprise training performance: Perspectives from knowledge transfer and integration.
Comput. Hum. Behav., 2014

2013
An Empirical Study on China's Regional Carbon Emissions of Agriculture.
Int. J. Asian Bus. Inf. Manag., 2013

Internationalization Strategies of Chinese Pharmaceutical Firms.
Int. J. Asian Bus. Inf. Manag., 2013

Key Difference Invariant Bias in Block Ciphers.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

2012
New Impossible Differential Attack on SAFER<sub>+</sub> and SAFER<sub>++</sub>.
IACR Cryptol. ePrint Arch., 2012

Enterprise knowledge management model based on China's practice and case study.
Comput. Hum. Behav., 2012

New Impossible Differential Attack on SAFER + and SAFER + +.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012

2011
Pathway-based analysis using reduced gene subsets in genome-wide association studies.
BMC Bioinform., 2011

Regional knowledge management: the perspective of management theory.
Behav. Inf. Technol., 2011

2010
Study on Cultural Commercialization and Public Consumption: The Case of China.
Int. J. Asian Bus. Inf. Manag., 2010

School knowledge management framework and strategies: The new perspective on teacher professional development.
Comput. Hum. Behav., 2010

2009
School Innovative Management Model and Strategies: The Perspective of Organizational Learning.
Inf. Syst. Manag., 2009


  Loading...