Lei Hu

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2025
ReplayCAD: Generative Diffusion Replay for Continual Anomaly Detection.
CoRR, May, 2025

Automatic classification of near-fault pulse-like ground motions.
Comput. Aided Civ. Infrastructure Eng., April, 2025

An Automatic Cutting Plane Planning Method Based on Multi-Objective Optimization for Robot-Assisted Laminectomy Surgery.
IEEE Robotics Autom. Lett., March, 2025

Learning Transformation-Isomorphic Latent Space for Accurate Hand Pose Estimation.
CoRR, February, 2025

Entanglement-Assisted Coding for Arbitrary Linear Computations Over a Quantum MAC.
CoRR, January, 2025

A Cloud-Based Geoprocessing Platform Based on Extended OGC API-Processes Standard and PyQGIS.
Trans. GIS, 2025

Review articles as windows into Knowledge accumulation: the case of AI research.
Inf. Res., 2025

Managing flexible linguistic expressions with subjective preferences and objective information in group decision-making: A perspective based on personalized individual semantics.
Inf. Fusion, 2025

Proving multiplicative relations for different lattice commitments.
Int. J. Inf. Comput. Secur., 2025

Improved Secure Two-party Computation from a Geometric Perspective.
IACR Cryptol. ePrint Arch., 2025

New classes of optimal p-ary cyclic codes with minimum distance four.
Finite Fields Their Appl., 2025

On the minimum distance of a class of binary BCH codes.
Adv. Math. Commun., 2025

New Results on the φ-Hiding Assumption and Factoring Related RSA Moduli.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2024
Utilizing FWT in linear cryptanalysis of block ciphers with various structures.
Des. Codes Cryptogr., November, 2024

Motion planning and contact force distribution for heavy-duty hexapod robots walking on unknown rugged terrains.
J. Field Robotics, September, 2024

DePNR: A DeBERTa-based deep learning model with complete position embedding for place name recognition from geographical literature.
Trans. GIS, August, 2024

A lightweight U-Net model for denoising and noise localization of ECG signals.
Biomed. Signal Process. Control., February, 2024

GeoTPE: A neural network model for geographical topic phrases extraction from literature based on BERT enhanced with relative position embedding.
Expert Syst. Appl., January, 2024

Diffraction and Interaction of Interfacial Solitons in a Two-Layer Fluid of Great Depth.
SIAM J. Appl. Math., 2024

New results on PcN and APcN polynomials over finite fields.
Finite Fields Their Appl., 2024

Geometric Feature Enhanced Knowledge Graph Embedding and Spatial Reasoning.
CoRR, 2024

On-the-fly Learning to Transfer Motion Style with Diffusion Models: A Semantic Guidance Approach.
CoRR, 2024

DeepCRE: Transforming Drug R&D via AI-Driven Cross-drug Response Evaluation.
CoRR, 2024

An Intuitionistic Fuzzy SWARA-AROMAN Decision-Making Framework for Sports Event Management.
IEEE Access, 2024

A Task Transmission Path Selection Algorithm Based Object Identification and Intent-Driven in Uncertain Environments.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2024

Enhancing Table Structure Recognition via Bounding Box Guidance.
Proceedings of the Pattern Recognition - 27th International Conference, 2024

Key Recovery Attack on CRYSTALS-Kyber and Saber KEMs in Key Reuse Scenario.
Proceedings of the Computer Security - ESORICS 2024, 2024

An Improved Signal Leakage Attack Against DXL Key Exchange Protocol.
Proceedings of the Information Security and Cryptology - 20th International Conference, 2024

The Application of Deep Learning in Image Deblurring.
Proceedings of the 2024 4th International Conference on Artificial Intelligence, 2024

Multivariate conditional Granger causality analysis based on feature selection and Backward Time-lagged Variable Selection algorithm.
Proceedings of the 14th Asian Control Conference, 2024

2023
Automatic Demirci-Selçuk Meet-In-The-Middle Attack On SIMON.
Comput. J., December, 2023

RTV-SIFT: Harnessing Structure Information for Robust Optical and SAR Image Registration.
Remote. Sens., September, 2023

TTNet: A Temporal-Transform Network for Semantic Change Detection Based on Bi-Temporal Remote Sensing Images.
Remote. Sens., September, 2023

Lumbar spine localisation method based on feature fusion.
CAAI Trans. Intell. Technol., September, 2023

An interoperable and service-oriented approach for real-time environmental simulation by coupling OGC WPS and SensorThings API.
Environ. Model. Softw., July, 2023

Two-rank multi-attribute group decision-making with linguistic distribution assessments: An optimization-based integrated approach.
Eng. Appl. Artif. Intell., May, 2023

A New Method To Find All The High-Probability Word-Oriented Truncated Differentials: Application To <tt>Midori</tt>, <tt>SKINNY</tt> And <tt>CRAFT</tt>.
Comput. J., May, 2023

Enhancing FAIR Data Services in Agricultural Disaster: A Review.
Remote. Sens., April, 2023

Examining the Spatially Varying Relationships between Landslide Susceptibility and Conditioning Factors Using a Geographical Random Forest Approach: A Case Study in Liangshan, China.
Remote. Sens., March, 2023

Boosting question answering over knowledge graph with reward integration and policy evaluation under weak supervision.
Inf. Process. Manag., 2023

A Spine Segmentation Method under an Arbitrary Field of View Based on 3D Swin Transformer.
Int. J. Intell. Syst., 2023

STP-Net: A Signal Prediction Method of Laminar Decompression Robot Based on Swin Transformer.
Int. J. Intell. Syst., 2023

Automatic laminectomy cutting plane planning based on artificial intelligence in robot assisted laminectomy surgery.
CoRR, 2023

Pose-aware Attention Network for Flexible Motion Retargeting by Body Part.
CoRR, 2023

A large-scale dataset for end-to-end table recognition in the wild.
CoRR, 2023

Evaluation Method of Electric Vehicle Charging Station Operation Based on Contrastive Learning.
Big Data Cogn. Comput., 2023

Multi-Objective Matched Synchrosqueezing Chirplet Transform for Fault Feature Extraction From Marine Turbochargers.
IEEE Access, 2023

AttT2M: Text-Driven Human Motion Generation with Multi-Perspective Attention Mechanism.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Probabilistic Triangulation for Uncalibrated Multi-View 3D Human Pose Estimation.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Towards Time-Series Key Points Detection Through Self-supervised Learning and Probability Compensation.
Proceedings of the Database Systems for Advanced Applications, 2023

Improved Integral Cryptanalysis of Block Ciphers BORON and Khudra.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

2022
Reconfigurable Intelligent Surface for Physical Layer Key Generation: Constructive or Destructive?
IEEE Wirel. Commun., 2022

Multitask Multigranularity Aggregation With Global-Guided Attention for Video Person Re-Identification.
IEEE Trans. Circuits Syst. Video Technol., 2022

Discriminative Context-Aware Network for Target Extraction in Remote Sensing Imagery.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2022

New Era for Geo-Parsing to Obtain Actual Locations: A Novel Toponym Correction Method Based on Remote Sensing Images.
Remote. Sens., 2022

Facilitating Typhoon-Triggered Flood Disaster-Ready Information Delivery Using SDI Services Approach - A Case Study in Hainan.
Remote. Sens., 2022

Spatial-temporal modeling for prediction of stylized human motion.
Neurocomputing, 2022

Nonlinear dynamic behavior analysis of photovoltaic quasi Z-source inverter.
IEICE Electron. Express, 2022

Towards a training data model for artificial intelligence in earth observation.
Int. J. Geogr. Inf. Sci., 2022

A multi-source spatio-temporal data cube for large-scale geospatial analysis.
Int. J. Geogr. Inf. Sci., 2022

Several classes of PcN power functions over finite fields.
Discret. Appl. Math., 2022

Spatial-Temporal Gating-Adjacency GCN for Human Motion Prediction.
CoRR, 2022

A domain adaptation neural network for change detection with heterogeneous optical and SAR remote sensing images.
Int. J. Appl. Earth Obs. Geoinformation, 2022

Physical Layer Encryption Scheme Based on Dynamic Constellation Rotation.
Proceedings of the 96th Vehicular Technology Conference, 2022

Improved Zero-Knowledge Proofs for Commitments from Learning Parity with Noise.
Proceedings of the IEEE International Conference on Trust, 2022

A High Dynamic Range Phase Modulated Analog Photonic Link Based on IMD3 and IMD5 Suppression.
Proceedings of the 14th IEEE International Conference on Advanced Infocomm Technology, 2022

Spatio-Temporal Gating-Adjacency GCN for Human Motion Prediction.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Detection of Murmurs from Heart Sound Recordings with Deep Residual Networks.
Proceedings of the Computing in Cardiology, 2022

CASA-Net: A Context-Aware Correlation Convolutional Network for Scale-Adaptive Crack Detection.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022

2021
The Influence of Sports Activities on College Students' Social Adaptability.
Int. J. Interact. Mob. Technol., July, 2021

Characterizing Spatial Patterns of Pine Wood Nematode Outbreaks in Subtropical Zone in China.
Remote. Sens., 2021

The Integration of Linguistic and Geospatial Features Using Global Context Embedding for Automated Text Geocoding.
ISPRS Int. J. Geo Inf., 2021

A Systematic Approach and Analysis of Key Mismatch Attacks on CPA-Secure Lattice-Based NIST Candidate KEMs.
IACR Cryptol. ePrint Arch., 2021

Further results on optimal ternary cyclic codes.
Finite Fields Their Appl., 2021

Some classes of power functions with low c-differential uniformity over finite fields.
Des. Codes Cryptogr., 2021

Transformer-Unet: Raw Image Processing with Unet.
CoRR, 2021

WRICNet: A Weighted Rich-scale Inception Coder Network for Multi-Resolution Remote Sensing Image Change Detection.
CoRR, 2021

Intelligent Reflecting Surface-Assisted Secret Key Generation In Multi-antenna Network.
CoRR, 2021

On the Existence of Coupled Fractional Jerk Equations with Multi-Point Boundary Conditions.
Axioms, 2021

A secure distributed machine learning protocol against static semi-honest adversaries.
Appl. Soft Comput., 2021

Fuzzy Adaptive Sliding Mode Impedance Control of Fracture Reduction Robot.
IEEE Access, 2021

Force Perception and Bone Recognition of Vertebral Lamina Milling by Robot-Assisted Ultrasonic Bone Scalpel Based on Backpropagation Neural Network.
IEEE Access, 2021

Development and Test of One Commercial Megawatt Superconducting DC Induction Heater With Extra High Energy Efficiency.
IEEE Access, 2021

On the Security of RIS-assisted Manipulating Attack in MISO systems.
Proceedings of the 94th IEEE Vehicular Technology Conference, 2021

On the RIS Manipulating Attack and Its Countermeasures in Physical-layer Key Generation.
Proceedings of the 94th IEEE Vehicular Technology Conference, 2021

Four-way Bidirectional Attention for Multiple-choice Reading Comprehension.
Proceedings of the 2021 IEEE International Conference on Systems, Man, and Cybernetics, 2021

Do We Really Need Frame-by-Frame Annotation Datasets for Object Tracking?
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

Sequential 3D Human Pose Estimation Using Adaptive Point Cloud Sampling Strategy.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021

Research on Intelligent station layout optimization of air defense radar network.
Proceedings of the ICRSA 2021: 4th International Conference on Robot Systems and Applications, Chengdu, China, April 9, 2021

Research on Intelligent Assignment Method of Radar Jamming Task in Electronic Air Defense Operation.
Proceedings of the ICCAI '21: 2021 7th International Conference on Computing and Artificial Intelligence, Tianjin China, April 23, 2021

A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

Developing Geospatial Web Services for Automatic Flood Mapping using Sentinel-1 Images.
Proceedings of the 9th International Conference on Agro-Geoinformatics, 2021

2020
Weakly Supervised Adversarial Learning for 3D Human Pose Estimation from Point Clouds.
IEEE Trans. Vis. Comput. Graph., 2020

A study on the relationship between the rank of input data and the performance of random weight neural network.
Neural Comput. Appl., 2020

New classes of optimal ternary cyclic codes with minimum distance four.
Finite Fields Their Appl., 2020

Enhanced OLSR routing for airborne networks with multi-beam directional antennas.
Ad Hoc Networks, 2020

Embedding Compression with Right Triangle Similarity Transformations.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2020, 2020

2019
Moth and Ant Inspired Routing in Hierarchical Airborne Networks with Multi-Beam Antennas.
IEEE Trans. Mob. Comput., 2019

Constructions of Involutions Over Finite Fields.
IEEE Trans. Inf. Theory, 2019

Intelligent Multibeam Transmissions for Mission-Oriented Airborne Networks.
IEEE Trans. Aerosp. Electron. Syst., 2019

New Calibrator with Points Distributed Conical Helically for Online Calibration of C-Arm.
Sensors, 2019

基于SDN-SFC的服务功能负载均衡 (Service Function Load Balancing Based on SDN-SFC).
计算机科学, 2019

移动边缘计算中的计算卸载策略研究综述 (Survey of Research on Computation Unloading Strategy in Mobile Edge Computing).
计算机科学, 2019

Multi-PQTable for Approximate Nearest-Neighbor Search.
Inf., 2019

Deep Image Similarity Measurement Based on the Improved Triplet Network with Spatial Pyramid Pooling.
Inf., 2019

Co-Saliency Detection via Local Prediction and Global Refinement.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

An efficient dynamic volume rendering for large-scale meteorological data in a virtual globe.
Comput. Geosci., 2019

Decomposed and parallel process discovery: A framework and application.
Future Gener. Comput. Syst., 2019

Permutation polynomials of the form x+γTrqqn(h(x)).
Finite Fields Their Appl., 2019

Bilinear forms, modulational instability and dark solitons for a fifth-order variable-coefficient nonlinear Schrödinger equation in an inhomogeneous optical fiber.
Appl. Math. Comput., 2019

Prediction of Axis Attitude Deviation and Deviation Correction Method Based on Data Driven During Shield Tunneling.
IEEE Access, 2019

An Online Calibration Method for Microsoft HoloLens.
IEEE Access, 2019

The Boomerang Uniformity of Power Permutations x<sup>2</sup><sup>k</sup><sup>-1</sup> over F2<sup>n</sup>.
Proceedings of the Ninth International Workshop on Signal Design and its Applications in Communications, 2019

A ship target tracking algorithm based on deep learning and multiple features.
Proceedings of the Twelfth International Conference on Machine Vision, 2019

2018
Outsourcing Set Intersection Computation Based on Bloom Filter for Privacy Preservation in Multimedia Processing.
Secur. Commun. Networks, 2018

基于稀疏恢复与优化的显著性目标检测算法 (Salient Object Detection Algorithm Based on Sparse Recovery and Optimization).
计算机科学, 2018

基于似物性和空时协方差特征的行人检测算法 (Pedestrian Detection Based on Objectness and Sapce-Time Covariance Features).
计算机科学, 2018

Small Object Detection with Multiscale Features.
Int. J. Digit. Multim. Broadcast., 2018

Three new classes of generalized almost perfect nonlinear power functions.
Finite Fields Their Appl., 2018

New results on permutation polynomials of the form (x p m - x + δ) s + x p m + x over 𝔽 p<sup>2m</sup>.
Cryptogr. Commun., 2018

Breather-to-soliton transition for a sixth-order nonlinear Schrödinger equation in an optical fiber.
Appl. Math. Lett., 2018

An Automated Calibration Method of Ultrasonic Probe Based on Coherent Point Drift Algorithm.
IEEE Access, 2018

Video Saliency Estimation via Encoding Deep Spatiotemporal Saliency Cues.
Proceedings of the 10th International Conference on Wireless Communications and Signal Processing, 2018

Visual Tracking via Detecting and Removing Outliers Based on Block Sparse Representation.
Proceedings of the 10th International Conference on Wireless Communications and Signal Processing, 2018

Anterior Cruciate Ligament Reconstruction Surgery Navigation and Robotic Positioning System Under X-Rays.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2018

An Investigation of Errors in Fluoroscopic Navigation for Robot-Assisted Orthopedic Surgery.
Proceedings of the 8th International Conference on Bioscience, 2018

2017
Events detection and community partition based on probabilistic snapshot for evolutionary social network.
Peer-to-Peer Netw. Appl., 2017

基于超像素匹配的图像协同显著性检测 (Co-saliency Detection via Superpixel Matching).
计算机科学, 2017

基于压缩域编码长度的视频显著性检测 (Video Saliency Detection Based on Compressed Domain Coding Length).
计算机科学, 2017

基于DCT变换的多通道特征的行人检测 (Pedestrian Detection Based on DCT of Multi-channel Feature).
计算机科学, 2017

面向主观质量的视频传输编码参数的选择 (Choice of Coding Parameters in Video Transmission for Perceptual Quality).
计算机科学, 2017

Co-saliency Detection Based on Superpixel Matching and Cellular Automata.
KSII Trans. Internet Inf. Syst., 2017

Several Classes of Boolean Functions with Four-Valued Walsh Spectra.
Int. J. Found. Comput. Sci., 2017

Further results on permutation trinomials over finite fields with even characteristic.
Finite Fields Their Appl., 2017

Fast recovery of non-negative sparse signals under heterogeneous noise.
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017

Anomaly Detection in Crowded Scenes via SA-MHOF and Sparse Combination.
Proceedings of the 10th International Symposium on Computational Intelligence and Design, 2017

SMAP DATA for cropland soil moisture assessment - A case study.
Proceedings of the 2017 IEEE International Geoscience and Remote Sensing Symposium, 2017

2016
Salient object detection based on discriminative boundary and multiple cues integration.
J. Electronic Imaging, 2016

Some classes of permutation polynomials of the form (x<sup>p<sup>m</sup></sup>-x+δ)<sup>s</sup>+x over F<sub>p<sup>2m</sup></sub>.
Finite Fields Their Appl., 2016

An Buffering Optimization Algorithm for Cooperative Mobile Service.
Proceedings of the Smart Computing and Communication, 2016

Web service-based SMAP soil moisture data visualization, dissemination and analytics based on vegscape framwork.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

Astronomical image superposition using an new improved particle swarm optimization.
Proceedings of the 12th International Conference on Natural Computation, 2016

MST-based Visual Parsing of Online Handwritten Mathematical Expressions.
Proceedings of the 15th International Conference on Frontiers in Handwriting Recognition, 2016

Line-of-Sight Stroke Graphs and Parzen Shape Context Features for Handwritten Math Formula Representation and Symbol Segmentation.
Proceedings of the 15th International Conference on Frontiers in Handwriting Recognition, 2016

2015
Cyclotomic Constructions of Zero-Difference Balanced Functions With Applications.
IEEE Trans. Inf. Theory, 2015

Adding Geospatial Data Provenance into SDI - A Service-Oriented Approach.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2015

Boolean functions with four-valued Walsh spectra.
J. Syst. Sci. Complex., 2015

Two Boolean Functions with Five-Valued Walsh Spectra and High Nonlinearity.
Int. J. Found. Comput. Sci., 2015

Constructing permutations and complete permutations over finite fields via subfield-valued polynomials.
Finite Fields Their Appl., 2015

The weight distributions of two classes of binary cyclic codes.
Finite Fields Their Appl., 2015

Task-oriented Sensor Web data processing for environmental monitoring.
Earth Sci. Informatics, 2015

The weight distribution of a family of p-ary cyclic codes.
Des. Codes Cryptogr., 2015

Registration for long-term multi-temporal remote sensing images under spatial constraints from historical data.
Proceedings of the 2015 IEEE International Geoscience and Remote Sensing Symposium, 2015

A Time Slices Based Novel DVS Algorithm for Embedded Systems.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Efficient person re-identification by hybrid spatiogram and covariance descriptor.
Proceedings of the 2015 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2015

2014
Google Fusion Tables for Managing Soil Moisture Sensor Observations.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2014

A Secure and Efficient Handover Authentication Protocol for Wireless Networks.
Sensors, 2014

A generic homomorphic MAC construction for authentication in network coding.
Secur. Commun. Networks, 2014

Families of <i>p</i>-ary sequences with low correlation and large linear complexity.
J. Syst. Sci. Complex., 2014

The weight distributions of two classes of p-ary cyclic codes.
Finite Fields Their Appl., 2014

Several classes of complete permutation polynomials.
Finite Fields Their Appl., 2014

Constructing permutation polynomials from piecewise permutations.
Finite Fields Their Appl., 2014

Projective interpolation of polynomial vectors and improved key recovery attack on SFLASH.
Des. Codes Cryptogr., 2014

Probabilistic Snapshot Based Evolutionary Social Network Events Detection.
Proceedings of the 10th International Conference on Mobile Ad-hoc and Sensor Networks, 2014

2013
A Fast and Accurate Reconstruction Algorithm for Compressed Sensing of Complex Sinusoids.
IEEE Trans. Signal Process., 2013

A massage robot based on Chinese massage therapy.
Ind. Robot, 2013

Constructing New APN Functions from known PN Functions.
Int. J. Found. Comput. Sci., 2013

New Optimal frequency Hopping sequence Sets from Balanced Nested difference Packings of Partition-Type.
Int. J. Found. Comput. Sci., 2013

Geoprocessing in Cloud Computing platforms - a comparative analysis.
Int. J. Digit. Earth, 2013

Compressed sensing of superimposed chirps with adaptive dictionary refinement.
Sci. China Inf. Sci., 2013

A femur fracture reduction method based on anatomy of the contralateral side.
Comput. Biol. Medicine, 2013

On a class of binomial bent functions over the finite fields of odd characteristic.
Appl. Algebra Eng. Commun. Comput., 2013

Privacy-Preserving Password-Based Authenticated Key Exchange in the Three-Party Setting.
Proceedings of the Network and System Security - 7th International Conference, 2013

Segmenting Handwritten Math Symbols Using AdaBoost and Multi-scale Shape Context Features.
Proceedings of the 12th International Conference on Document Analysis and Recognition, 2013

Rotation-robust math symbol recognition and retrieval using outer contours and image subsampling.
Proceedings of the Document Recognition and Retrieval XX, 2013

Modeling information diffusion over social networks for temporal dynamic prediction.
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013

Research on SPH Parallel Acceleration Strategies for Multi-GPU Platform.
Proceedings of the Advanced Parallel Processing Technologies, 2013

2012
Compressed Sensing of Complex Sinusoids: An Approach Based on Dictionary Refinement.
IEEE Trans. Signal Process., 2012

A matrix construction of Boolean functions with maximum algebraic immunity.
J. Syst. Sci. Complex., 2012

Spam Short Messages Detection via Mining Social Networks.
J. Comput. Sci. Technol., 2012

Linear complexity of binary sequences derived from Euler quotients with prime-power modulus.
Inf. Process. Lett., 2012

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems.
Int. J. Distributed Sens. Networks, 2012

Two classes of permutation polynomials over finite fields.
Finite Fields Their Appl., 2012

On the reducibility of some composite polynomials over finite fields.
Des. Codes Cryptogr., 2012

3D navigation and monitoring for spinal milling operation based on registration between multiplanar fluoroscopy and CT images.
Comput. Methods Programs Biomed., 2012

Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security.
Comput. Math. Appl., 2012

Real-time Particle Fluid Simulation with WCSPH.
Proceedings of the 20th Pacific Conference on Computer Graphics and Applications, 2012

Baseline extraction-driven Parsing of handwritten mathematical expressions.
Proceedings of the 21st International Conference on Pattern Recognition, 2012

Measurement of fundus vessel diameter based on fundus fluorescence angiography image.
Proceedings of the 5th International Conference on BioMedical Engineering and Informatics, 2012

2011
A New Derivation of Constrained Cramér-Rao Bound Via Norm Minimization.
IEEE Trans. Signal Process., 2011

On the Correlation Distributions of the Optimal Quaternary Sequence Family <i>U</i> and the Optimal Binary Sequence Family <i>V</i>.
IEEE Trans. Inf. Theory, 2011

Construction of 1-resilient Boolean functions with optimum algebraic immunity.
Int. J. Comput. Math., 2011

A Family of <i>p</i>-ary Binomial Bent Functions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

New methods for generating permutation polynomials over finite fields.
Finite Fields Their Appl., 2011

Boolean functions with two distinct Walsh coefficients.
Appl. Algebra Eng. Commun. Comput., 2011

Aperiodic correlation of Kasami sequences in the small set.
Appl. Algebra Eng. Commun. Comput., 2011

Location Privacy Protection in the Presence of Users' Preferences.
Proceedings of the Web-Age Information Management - 12th International Conference, 2011

A SPH-based method for interactive fluids simulation on the multi-GPU.
Proceedings of the 10th International Conference on Virtual Reality Continuum and its Applications in Industry, 2011

Kipnis-Shamir Attack on Unbalanced Oil-Vinegar Scheme.
Proceedings of the Information Security Practice and Experience, 2011

HMM-Based Recognition of Online Handwritten Mathematical Symbols Using Segmental K-Means Initialization and a Modified Pen-Up/Down Feature.
Proceedings of the 2011 International Conference on Document Analysis and Recognition, 2011

Application of RFID Technology at the Entrance Gate of Container Terminals.
Proceedings of the Computational Logistics - Second International Conference, 2011

A New Family of Quadriphase Sequences with Low Correlation.
Proceedings of the Coding and Cryptology - Third International Workshop, 2011

Concurrent Non-Malleable Witness Indistinguishable Argument from Any One-Way Function.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011

A fluoroscopy-based navigation system for fixation of femoral neck fracture.
Proceedings of the 4th International Conference on Biomedical Engineering and Informatics, 2011

A fully automatic 2D ultrasound probe calibration method using a simple phantom.
Proceedings of the 4th International Conference on Biomedical Engineering and Informatics, 2011

2010
The large set of <i>p</i>-ary Kasami sequences.
Int. J. Comput. Math., 2010

Security Analysis of a Dynamic Program Update Protocol for Wireless Sensor Networks.
IEEE Commun. Lett., 2010

Balanced Boolean Functions with (Almost) Optimal Algebraic Immunity and Very High Nonlinearity.
IACR Cryptol. ePrint Arch., 2010

On Exponential Sums, Nowton identities and Dickson Polynomials over Finite Fields.
IACR Cryptol. ePrint Arch., 2010

The weight distribution of a class of p-ary cyclic codes.
Finite Fields Their Appl., 2010

Two new permutation polynomials with the form (<i>x</i><sup>2<sup><i>k</i></sup></sup>+<i>x</i>+d)<sup><i>s</i></sup>+<i>x</i> over <i>F</i><sub>2<sup><i>n</i></sup></sub>.
Appl. Algebra Eng. Commun. Comput., 2010

Further crosscorrelation properties of sequences with the decimation factor <i>d</i>=(<i>p</i><sup><i>n</i></sup>+1)/(<i>p</i>+1)-(<i>p</i><sup><i>n</i></sup>-1)/2.
Appl. Algebra Eng. Commun. Comput., 2010

On the generalized large set of Kasami sequences.
Appl. Algebra Eng. Commun. Comput., 2010

Design and improvement of KPI system for materials management in power group enterprise.
Proceedings of 2010 IEEE International Conference on Service Operations and Logistics, 2010

Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme.
Proceedings of the Post-Quantum Cryptography, Third International Workshop, 2010

How to Construct Secure and Efficient Three-Party Password-Based Authenticated Key Exchange Protocols.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

2009
New Optimal Quadriphase Sequences With Larger Linear Span.
IEEE Trans. Inf. Theory, 2009

A Family of p-ary Binomial Bent Functions.
IACR Cryptol. ePrint Arch., 2009

Some results on skew Hadamard difference sets.
Des. Codes Cryptogr., 2009

Weight Distribution of A p-ary Cyclic Code
CoRR, 2009

Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation Structure.
Proceedings of the Information Security Applications, 10th International Workshop, 2009

A fluoroscopic-based navigation system for ACL reconstruction assisted by robot.
Proceedings of the 2009 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2009

A Novel Approach for Blood Vessel Edge Detection in Retinal Images.
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009

Validity of the Simulation of New Screw Fixed FNF for Healing: A Biomechanical Analysis.
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009

Algebraic Attack to SMS4 and the Comparison with AES.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps.
IEEE Trans. Parallel Distributed Syst., 2008

On the Linear Span of a Binary Sequence Family with Optimal Correlation Properties.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

Binary Constant Weight Codes Based on Cyclic Difference Sets.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

New Family of Binary Sequences with Low Correlation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

Authentication codes and bipartite graphs.
Eur. J. Comb., 2008

A Class of Nonbinary Codes and Their Weight Distribution
CoRR, 2008

Period-Different $m$-Sequences With At Most A Four-Valued Cross Correlation
CoRR, 2008

New family of binary sequences of period 4(2<sup> <i>n</i> </sup> - 1) with low correlation.
Appl. Algebra Eng. Commun. Comput., 2008

A Class of Nonbinary Codes and Sequence Families.
Proceedings of the Sequences and Their Applications, 2008

Dynamic Analysis and Design Pattern Detection in Java Programs.
Proceedings of the Twentieth International Conference on Software Engineering & Knowledge Engineering (SEKE'2008), 2008

ROAD: An RFID Offline Authentication, Privacy Preserving Protocol with Dos Resilience.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008

Square Attack on Reduced-Round Zodiac Cipher.
Proceedings of the Information Security Practice and Experience, 2008

Breaking Instance II of New TTM Cryptosystems.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Human reappearance detection based on on-line learning.
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008

Embedded Control System of Digital Operating Table.
Proceedings of the Intelligent Robotics and Applications, First International Conference, 2008

People re-detection using Adaboost with sift and color correlogram.
Proceedings of the International Conference on Image Processing, 2008

Analysis on AACS' Traitor Tracing Against Mix-and-Match Attacks.
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008

2007
Generalized Kasami Sequences: The Large Set.
IEEE Trans. Inf. Theory, 2007

On a Class of Pseudorandom Sequences From Elliptic Curves Over Finite Fields.
IEEE Trans. Inf. Theory, 2007

Using an efficient hash chain and delaying function to improve an e-lottery scheme.
Int. J. Comput. Math., 2007

On The Inequivalence Of Ness-Helleseth APN Functions.
IACR Cryptol. ePrint Arch., 2007

Cryptanalysis of Two New Instances of TTM Cryptosystem.
IACR Cryptol. ePrint Arch., 2007

Kipnis-Shamir's Attack on HFE Revisited.
IACR Cryptol. ePrint Arch., 2007

Privacy-preserving authentication with low computational overhead for RFID systems.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

Storage-Awareness: RFID Private Authentication based on Sparse Tree.
Proceedings of the Third International Workshop on Security, 2007

A 5-DOF table-mounted surgical robot.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2007

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2007), 2007

New Optimal Quadriphase Sequences with Larger Lnear Span.
Proceedings of the IEEE Information Theory Workshop on Information Theory for Wireless Networks, 2007

Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols.
Proceedings of the 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), 2007

New Description of SMS4 by an Embedding overGF(2<sup>8</sup>).
Proceedings of the Progress in Cryptology, 2007

Further Discussions on the Security of a Nominative Signature Scheme.
Proceedings of the 2007 International Conference on Security & Management, 2007

Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

Kipnis-Shamir Attack on HFE Revisited.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

Cryptanalysis of the TRMC-4 Public Key Cryptosystem.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

Analysis of the SMS4 Block Cipher.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
Expansion and linear complexity of the coordinate sequences over Galois rings.
J. Complex., 2006

A Family of Binary Sequences with 4-Valued Optimal Out-of-Phase Correlation and Large Linear Span.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

Note on Design Criteria for Rainbow-Type Multivariates.
IACR Cryptol. ePrint Arch., 2006

High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems.
IACR Cryptol. ePrint Arch., 2006

Partially Perfect Nonlinear Functions and a Construction of Cryptographic Boolean Functions.
Proceedings of the Sequences and Their Applications, 2006

On the Expected Value of the Joint 2-Adic Complexity of Periodic Binary Multisequences.
Proceedings of the Sequences and Their Applications, 2006

A New Family of Codes and Generalized Kasami Sequences.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

An Internet Robot Assistant Tele-neurosurgery System Case.
Proceedings of the 2006 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2006

Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols.
Proceedings of the Progress in Cryptology, 2006

Binary Sequences with Optimal Correlations and Large Linear Span.
Proceedings of IEEE International Conference on Communications, 2006

Pairing-Based Multi-Recipient Public Key Encryption.
Proceedings of the 2006 International Conference on Security & Management, 2006

Fair E-cash Payment Model on Credit Overdraft.
Proceedings of The 1st IEEE Asia-Pacific Services Computing Conference, 2006

Breaking a New Instance of TTM Cryptosystems.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
Implementation of Cryptosystems Based on Tate Pairing.
J. Comput. Sci. Technol., 2005

Fast Modular Reduction over Euclidean Rings and Its Application to Universal Hash Functions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

Constructing Boolean Functions by Modifying Maiorana-McFarland's Superclass Functions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

Cryptanalysis of a New Signal Security System for Multimedia Data Transmission.
EURASIP J. Adv. Signal Process., 2005

Generalized Kasami Sequences: The Large Set
CoRR, 2005

New Sequence Sets with Zero-Correlation Zone
CoRR, 2005

A Family of Binary Sequences with Optimal Correlation Property and Large Linear Span
CoRR, 2005

A Novel Method for Constructing Almost Perfect Polyphase Sequences.
Proceedings of the Coding and Cryptography, International Workshop, 2005

A new class of binary sequences with low correlation and large linear complexity from function fields.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

Provide Privacy for Mobile P2P Systems.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

A Random Walk Based Anonymous Peer-to-Peer Protocol Design.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

2004
Generator polynomials of characteristic ideal of maximal periodic arrays over Galois rings.
Discret. Math., 2004

BPOR: a fluoroscopy-based robot navigating system for distal locking of intramedullary nails.
Proceedings of the 2004 IEEE/RSJ International Conference on Intelligent Robots and Systems, Sendai, Japan, September 28, 2004

2003
On Linear Complexity of Kronecker Sequences.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

A Composition Construction of Bent-Like Boolean Functions from Quadratic Polynomials.
IACR Cryptol. ePrint Arch., 2003

2001
A Simulation and Training Systems of Robot Assisted Surgery Based on Virtual Reality.
Proceedings of the Medical Imaging and Augmented Reality: First International Workshop, 2001

1998
Properties of Gröbner Bases and Applications to Doubly Periodic Arrays.
J. Symb. Comput., 1998

Performance Oriented Design Using HL.
Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences, 1998

1997
A Performance Prototyping Approach to Designing Concurrent Software Architectures.
Proceedings of the International Symposium on Software Engineering for Parallel and Distributed Systems, 1997


  Loading...