Lei Hu

According to our database1, Lei Hu authored at least 330 papers between 1997 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
5G-Oriented IoT Big Data Analysis Method System.
Mob. Inf. Syst., 2021

The Integration of Linguistic and Geospatial Features Using Global Context Embedding for Automated Text Geocoding.
ISPRS Int. J. Geo Inf., 2021

Influential Factor Detection for Tourism on the Qinghai-Tibet Plateau Based on Social Media Data.
ISPRS Int. J. Geo Inf., 2021

A Systematic Approach and Analysis of Key Mismatch Attacks on CPA-Secure Lattice-Based NIST Candidate KEMs.
IACR Cryptol. ePrint Arch., 2021

A Note on the Bias of Rotational Differential-Linear Distinguishers.
IACR Cryptol. ePrint Arch., 2021

Automatic Classical and Quantum Rebound Attacks on AES-like Hashing by Exploiting Related-key Differentials.
IACR Cryptol. ePrint Arch., 2021

Meet-in-the-Middle Attacks Revisited: Focusing on Key-recovery and Collision Attacks.
IACR Cryptol. ePrint Arch., 2021

Further results on optimal ternary cyclic codes.
Finite Fields Their Appl., 2021

Some classes of power functions with low c-differential uniformity over finite fields.
Des. Codes Cryptogr., 2021

Security analysis of Subterranean 2.0.
Des. Codes Cryptogr., 2021

Transformer-Unet: Raw Image Processing with Unet.
CoRR, 2021

WRICNet: A Weighted Rich-scale Inception Coder Network for Multi-Resolution Remote Sensing Image Change Detection.
CoRR, 2021

On the RIS Manipulating Attack and Its Countermeasures in Physical-layer Key Generation.
CoRR, 2021

Intelligent Reflecting Surface-Assisted Secret Key Generation In Multi-antenna Network.
CoRR, 2021

Unbalanced sharing: a threshold implementation of SM4.
Sci. China Inf. Sci., 2021

On the Existence of Coupled Fractional Jerk Equations with Multi-Point Boundary Conditions.
Axioms, 2021

A secure distributed machine learning protocol against static semi-honest adversaries.
Appl. Soft Comput., 2021

A combination method of stacked autoencoder and 3D deep residual network for hyperspectral image classification.
Int. J. Appl. Earth Obs. Geoinformation, 2021

Fuzzy Adaptive Sliding Mode Impedance Control of Fracture Reduction Robot.
IEEE Access, 2021

Force Perception and Bone Recognition of Vertebral Lamina Milling by Robot-Assisted Ultrasonic Bone Scalpel Based on Backpropagation Neural Network.
IEEE Access, 2021

Development and Test of One Commercial Megawatt Superconducting DC Induction Heater With Extra High Energy Efficiency.
IEEE Access, 2021

Attacks on Beyond-Birthday-Bound MACs in the Quantum Setting.
Proceedings of the Post-Quantum Cryptography - 12th International Workshop, 2021

Do We Really Need Frame-by-Frame Annotation Datasets for Object Tracking?
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

Sequential 3D Human Pose Estimation Using Adaptive Point Cloud Sampling Strategy.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021

Research on Intelligent Assignment Method of Radar Jamming Task in Electronic Air Defense Operation.
Proceedings of the ICCAI '21: 2021 7th International Conference on Computing and Artificial Intelligence, Tianjin China, April 23, 2021

Meet-in-the-Middle Attacks Revisited: Key-Recovery, Collision, and Preimage Attacks.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Developing Geospatial Web Services for Automatic Flood Mapping using Sentinel-1 Images.
Proceedings of the 9th International Conference on Agro-Geoinformatics, 2021

2020
Weakly Supervised Adversarial Learning for 3D Human Pose Estimation from Point Clouds.
IEEE Trans. Vis. Comput. Graph., 2020

A study on the relationship between the rank of input data and the performance of random weight neural network.
Neural Comput. Appl., 2020

Attack Beyond-Birthday-Bound MACs in Quantum Setting.
IACR Cryptol. ePrint Arch., 2020

Differential Attacks on CRAFT Exploiting the Involutory S-boxes and Tweak Additions.
IACR Cryptol. ePrint Arch., 2020

Quantum Collision Attacks on AES-like Hashing with Low Quantum Random Access Memories.
IACR Cryptol. ePrint Arch., 2020

New classes of optimal ternary cyclic codes with minimum distance four.
Finite Fields Their Appl., 2020

Cryptanalysis of elliptic curve hidden number problem from PKC 2017.
Des. Codes Cryptogr., 2020

Enhanced OLSR routing for airborne networks with multi-beam directional antennas.
Ad Hoc Networks, 2020

Embedding Compression with Right Triangle Similarity Transformations.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2020, 2020

2019
Boomerang Connectivity Table Revisited. Application to SKINNY and AES.
IACR Trans. Symmetric Cryptol., 2019

Constructing Low-latency Involutory MDS Matrices with Lightweight Circuits.
IACR Trans. Symmetric Cryptol., 2019

Moth and Ant Inspired Routing in Hierarchical Airborne Networks with Multi-Beam Antennas.
IEEE Trans. Mob. Comput., 2019

Constructions of Involutions Over Finite Fields.
IEEE Trans. Inf. Theory, 2019

Intelligent Multibeam Transmissions for Mission-Oriented Airborne Networks.
IEEE Trans. Aerosp. Electron. Syst., 2019

New Calibrator with Points Distributed Conical Helically for Online Calibration of C-Arm.
Sensors, 2019

基于SDN-SFC的服务功能负载均衡 (Service Function Load Balancing Based on SDN-SFC).
计算机科学, 2019

移动边缘计算中的计算卸载策略研究综述 (Survey of Research on Computation Unloading Strategy in Mobile Edge Computing).
计算机科学, 2019

Multi-PQTable for Approximate Nearest-Neighbor Search.
Inf., 2019

Deep Image Similarity Measurement Based on the Improved Triplet Network with Spatial Pyramid Pooling.
Inf., 2019

Co-Saliency Detection via Local Prediction and Global Refinement.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator.
IACR Cryptol. ePrint Arch., 2019

Scrutinizing the Tower Field Implementation of the 픽<sub>2<sup>8</sup></sub> Inverter - with Applications to AES, Camellia, and SM4.
IACR Cryptol. ePrint Arch., 2019

Boomerang Connectivity Table Revisited.
IACR Cryptol. ePrint Arch., 2019

Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS.
IACR Cryptol. ePrint Arch., 2019

Lightweight Iterative MDS Matrices: How Small Can We Go?
IACR Cryptol. ePrint Arch., 2019

Constructing Low-latency Involutory MDS Matrices with Lightweight Circuit.
IACR Cryptol. ePrint Arch., 2019

An efficient dynamic volume rendering for large-scale meteorological data in a virtual globe.
Comput. Geosci., 2019

Decomposed and parallel process discovery: A framework and application.
Future Gener. Comput. Syst., 2019

Permutation polynomials of the form x+γTrqqn(h(x)).
Finite Fields Their Appl., 2019

Bilinear forms, modulational instability and dark solitons for a fifth-order variable-coefficient nonlinear Schrödinger equation in an inhomogeneous optical fiber.
Appl. Math. Comput., 2019

Prediction of Axis Attitude Deviation and Deviation Correction Method Based on Data Driven During Shield Tunneling.
IEEE Access, 2019

An Online Calibration Method for Microsoft HoloLens.
IEEE Access, 2019

The Boomerang Uniformity of Power Permutations x<sup>2</sup><sup>k</sup><sup>-1</sup> over F2<sup>n</sup>.
Proceedings of the Ninth International Workshop on Signal Design and its Applications in Communications, 2019

Revisiting Approximate Polynomial Common Divisor Problem and Noisy Multipolynomial Reconstruction.
Proceedings of the Progress in Cryptology - INDOCRYPT 2019, 2019

A ship target tracking algorithm based on deep learning and multiple features.
Proceedings of the Twelfth International Conference on Machine Vision, 2019

Zero-sum Distinguishers for Round-reduced GIMLI Permutation.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

Convolutional Neural Network Based Side-Channel Attacks with Customized Filters.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

Automatic Demirci-Selçuk Meet-in-the-Middle Attack on SKINNY with Key-Bridging.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full \mathsf MORUS.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2018
Outsourcing Set Intersection Computation Based on Bloom Filter for Privacy Preservation in Multimedia Processing.
Secur. Commun. Networks, 2018

On the Complexity of Impossible Differential Cryptanalysis.
Secur. Commun. Networks, 2018

基于稀疏恢复与优化的显著性目标检测算法 (Salient Object Detection Algorithm Based on Sparse Recovery and Optimization).
计算机科学, 2018

基于似物性和空时协方差特征的行人检测算法 (Pedestrian Detection Based on Objectness and Sapce-Time Covariance Features).
计算机科学, 2018

A Construction of 1-Resilient Boolean Functions with Good Cryptographic Properties.
J. Syst. Sci. Complex., 2018

Small Object Detection with Multiscale Features.
Int. J. Digit. Multim. Broadcast., 2018

Revisiting Orthogonal Lattice Attacks on Approximate Common Divisor Problems and their Applications.
IACR Cryptol. ePrint Arch., 2018

Programming the Demirci-Selçuk Meet-in-the-Middle Attack with Constraints.
IACR Cryptol. ePrint Arch., 2018

Three new classes of generalized almost perfect nonlinear power functions.
Finite Fields Their Appl., 2018

Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator.
Des. Codes Cryptogr., 2018

New results on permutation polynomials of the form (x p m - x + δ) s + x p m + x over 𝔽 p<sup>2m</sup>.
Cryptogr. Commun., 2018

Breather-to-soliton transition for a sixth-order nonlinear Schrödinger equation in an optical fiber.
Appl. Math. Lett., 2018

An Automated Calibration Method of Ultrasonic Probe Based on Coherent Point Drift Algorithm.
IEEE Access, 2018

Video Saliency Estimation via Encoding Deep Spatiotemporal Saliency Cues.
Proceedings of the 10th International Conference on Wireless Communications and Signal Processing, 2018

Visual Tracking via Detecting and Removing Outliers Based on Block Sparse Representation.
Proceedings of the 10th International Conference on Wireless Communications and Signal Processing, 2018

Anterior Cruciate Ligament Reconstruction Surgery Navigation and Robotic Positioning System Under X-Rays.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2018

Speeding up MILP Aided Differential Characteristic Search with Matsui's Strategy.
Proceedings of the Information Security - 21st International Conference, 2018

A Deterministic Algorithm for Computing Divisors in an Interval.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Events detection and community partition based on probabilistic snapshot for evolutionary social network.
Peer-to-Peer Netw. Appl., 2017

基于超像素匹配的图像协同显著性检测 (Co-saliency Detection via Superpixel Matching).
计算机科学, 2017

基于压缩域编码长度的视频显著性检测 (Video Saliency Detection Based on Compressed Domain Coding Length).
计算机科学, 2017

基于DCT变换的多通道特征的行人检测 (Pedestrian Detection Based on DCT of Multi-channel Feature).
计算机科学, 2017

面向主观质量的视频传输编码参数的选择 (Choice of Coding Parameters in Video Transmission for Perceptual Quality).
计算机科学, 2017

Co-saliency Detection Based on Superpixel Matching and Cellular Automata.
KSII Trans. Internet Inf. Syst., 2017

Several Classes of Boolean Functions with Four-Valued Walsh Spectra.
Int. J. Found. Comput. Sci., 2017

Approximate Polynomial Common Divisor Problem Relates to Noisy Multipolynomial Reconstruction.
IACR Cryptol. ePrint Arch., 2017

Analysis of AES, SKINNY, and Others with Constraint Programming.
IACR Cryptol. ePrint Arch., 2017

Further results on permutation trinomials over finite fields with even characteristic.
Finite Fields Their Appl., 2017

Cryptanalysis of Dual RSA.
Des. Codes Cryptogr., 2017

Improved linear (hull) cryptanalysis of round-reduced versions of SIMON.
Sci. China Inf. Sci., 2017

Fast recovery of non-negative sparse signals under heterogeneous noise.
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017

Anomaly Detection in Crowded Scenes via SA-MHOF and Sparse Combination.
Proceedings of the 10th International Symposium on Computational Intelligence and Design, 2017

SMAP DATA for cropland soil moisture assessment - A case study.
Proceedings of the 2017 IEEE International Geoscience and Remote Sensing Symposium, 2017

Integrating OGC Web Processing Service with cloud computing environment for Earth Observation data.
Proceedings of the 2017 6th International Conference on Agro-Geoinformatics, 2017

Performance improvement on a Web Geospatial service for the remote sensing flood-induced crop loss assessment web application using vector tiling.
Proceedings of the 2017 6th International Conference on Agro-Geoinformatics, 2017

Crop Fraction Layer (CFL) datasets derived through MODIS and LandSat for the continental US from year 2000-2016.
Proceedings of the 2017 6th International Conference on Agro-Geoinformatics, 2017

Agriculture flood mapping with Soil Moisture Active Passive (SMAP) data: A case of 2016 Louisiana flood.
Proceedings of the 2017 6th International Conference on Agro-Geoinformatics, 2017

Developing a Web service based application for demographic information modeling and analyzing.
Proceedings of the 2017 6th International Conference on Agro-Geoinformatics, 2017

Extract flood duration from Dartmouth Flood Observatory flood product.
Proceedings of the 2017 6th International Conference on Agro-Geoinformatics, 2017

Developing geospatial Web service and system for SMAP soil moisture monitoring.
Proceedings of the 2017 6th International Conference on Agro-Geoinformatics, 2017

2016
Salient object detection based on discriminative boundary and multiple cues integration.
J. Electronic Imaging, 2016

Truncated Differential Analysis of Round-Reduced RoadRunneR Block Cipher.
IACR Cryptol. ePrint Arch., 2016

Cryptanalysis of Multi-Prime Φ-Hiding Assumption.
IACR Cryptol. ePrint Arch., 2016

Mixed Integer Programming Models for Finite Automaton and Its Application to Additive Differential Patterns of Exclusive-Or.
IACR Cryptol. ePrint Arch., 2016

MILP-Based Automatic Search Algorithms for Diff erential and Linear Trails for Speck.
IACR Cryptol. ePrint Arch., 2016

Some classes of permutation polynomials of the form (x<sup>p<sup>m</sup></sup>-x+δ)<sup>s</sup>+x over F<sub>p<sup>2m</sup></sub>.
Finite Fields Their Appl., 2016

An Buffering Optimization Algorithm for Cooperative Mobile Service.
Proceedings of the Smart Computing and Communication, 2016

Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR.
Proceedings of the Network and System Security - 10th International Conference, 2016

Cryptanalysis and Improved Construction of a Group Key Agreement for Secure Group Communication.
Proceedings of the Information Security - 19th International Conference, 2016

Cryptanalysis of Multi-Prime \varPhi -Hiding Assumption.
Proceedings of the Information Security - 19th International Conference, 2016

Web service-based SMAP soil moisture data visualization, dissemination and analytics based on vegscape framwork.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

Astronomical image superposition using an new improved particle swarm optimization.
Proceedings of the 12th International Conference on Natural Computation, 2016

Differential Analysis on Simeck and SIMON with Dynamic Key-Guessing Techniques.
Proceedings of the Information Systems Security and Privacy, 2016

Improved Results on Cryptanalysis of Prime Power RSA.
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016

MST-based Visual Parsing of Online Handwritten Mathematical Expressions.
Proceedings of the 15th International Conference on Frontiers in Handwriting Recognition, 2016

Line-of-Sight Stroke Graphs and Parzen Shape Context Features for Handwritten Math Formula Representation and Symbol Segmentation.
Proceedings of the 15th International Conference on Frontiers in Handwriting Recognition, 2016

MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck.
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016

An Improved Analysis on Three Variants of the RSA Cryptosystem.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

2015
Cyclotomic Constructions of Zero-Difference Balanced Functions With Applications.
IEEE Trans. Inf. Theory, 2015

Adding Geospatial Data Provenance into SDI - A Service-Oriented Approach.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2015

Differential fault attack on Zorro block cipher.
Secur. Commun. Networks, 2015

Boolean functions with four-valued Walsh spectra.
J. Syst. Sci. Complex., 2015

Two Boolean Functions with Five-Valued Walsh Spectra and High Nonlinearity.
Int. J. Found. Comput. Sci., 2015

Improved MILP Modeling for Automatic Security Evaluation and Application to FOX.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Related-key Impossible Differential Analysis of Full Khudra.
IACR Cryptol. ePrint Arch., 2015

Constructing Mixed-integer Programming Models whose Feasible Region is Exactly the Set of All Valid Differential Characteristics of SIMON.
IACR Cryptol. ePrint Arch., 2015

Linear (hull) Cryptanalysis of Round-reduced Versions of KATAN.
IACR Cryptol. ePrint Arch., 2015

Differential Security Evaluation of Simeck with Dynamic Key-guessing Techniques.
IACR Cryptol. ePrint Arch., 2015

Constructing permutations and complete permutations over finite fields via subfield-valued polynomials.
Finite Fields Their Appl., 2015

The weight distributions of two classes of binary cyclic codes.
Finite Fields Their Appl., 2015

Task-oriented Sensor Web data processing for environmental monitoring.
Earth Sci. Informatics, 2015

The weight distribution of a family of p-ary cyclic codes.
Des. Codes Cryptogr., 2015

Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks.
Des. Codes Cryptogr., 2015

Further results on differentially 4-uniform permutations over F<sub>2<sup>2m</sup></sub>.
CoRR, 2015

Towards Optimal Bounds for Implicit Factorization Problem.
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015

Improvement on the Method for Automatic Differential Analysis and Its Application to Two Lightweight Block Ciphers DESL and LBlock-s.
Proceedings of the Advances in Information and Computer Security, 2015

Implicit Factorization of RSA Moduli Revisited (Short Paper).
Proceedings of the Advances in Information and Computer Security, 2015

Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis.
Proceedings of the Information Security - 18th International Conference, 2015

Partial Prime Factor Exposure Attacks on RSA and Its Takagi's Variant.
Proceedings of the Information Security Practice and Experience, 2015

Cryptanalysis of Variants of RSA with Multiple Small Secret Exponents.
Proceedings of the Progress in Cryptology - INDOCRYPT 2015, 2015

Building change detection for high-resolution remotely sensed images based on a semantic dependency.
Proceedings of the 2015 IEEE International Geoscience and Remote Sensing Symposium, 2015

Ship detection from optical satellite images based on visual search mechanism.
Proceedings of the 2015 IEEE International Geoscience and Remote Sensing Symposium, 2015

Pansharpening based on an improved ratio enhancement.
Proceedings of the 2015 IEEE International Geoscience and Remote Sensing Symposium, 2015

Registration for long-term multi-temporal remote sensing images under spatial constraints from historical data.
Proceedings of the 2015 IEEE International Geoscience and Remote Sensing Symposium, 2015

A Time Slices Based Novel DVS Algorithm for Embedded Systems.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Efficient person re-identification by hybrid spatiogram and covariance descriptor.
Proceedings of the 2015 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2015

Recovering a Sum of Two Squares Decomposition Revisited.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

2014
The Properties of a Class of Linear FSRs and Their Applications to the Construction of Nonlinear FSRs.
IEEE Trans. Inf. Theory, 2014

Google Fusion Tables for Managing Soil Moisture Sensor Observations.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2014

A Secure and Efficient Handover Authentication Protocol for Wireless Networks.
Sensors, 2014

A generic homomorphic MAC construction for authentication in network coding.
Secur. Commun. Networks, 2014

Families of <i>p</i>-ary sequences with low correlation and large linear complexity.
J. Syst. Sci. Complex., 2014

Cryptanalysis of countermeasures against multiple transmission attacks on NTRU.
IET Commun., 2014

Cryptanalysis of two cryptosystems based on multiple intractability assumptions.
IET Commun., 2014

Improved Differential Analysis of Block Cipher PRIDE.
IACR Cryptol. ePrint Arch., 2014

Finding Small Solutions of a Class of Simultaneous Modular Equations and Applications to Modular Inversion Hidden Number Problem and Inversive Congruential Generator.
IACR Cryptol. ePrint Arch., 2014

Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties and Its Applications.
IACR Cryptol. ePrint Arch., 2014

Error-Tolerant Algebraic Side-Channel Attacks Using BEE.
IACR Cryptol. ePrint Arch., 2014

Related-Key Differential Attack on Round Reduced RECTANGLE-80.
IACR Cryptol. ePrint Arch., 2014

The weight distributions of two classes of p-ary cyclic codes.
Finite Fields Their Appl., 2014

Constructing new differentially 4-uniform permutations from the inverse function.
Finite Fields Their Appl., 2014

Several classes of complete permutation polynomials.
Finite Fields Their Appl., 2014

Constructing permutation polynomials from piecewise permutations.
Finite Fields Their Appl., 2014

Projective interpolation of polynomial vectors and improved key recovery attack on SFLASH.
Des. Codes Cryptogr., 2014

Cryptographic properties of nested functions and algebraic immunity of the Boolean function in Hitag2 stream cipher.
Cryptogr. Commun., 2014

New constructions of APN polynomial functions in odd characteristic.
Appl. Algebra Eng. Commun. Comput., 2014

Tighter Security Bound of MIBS Block Cipher against Differential Attack.
Proceedings of the Network and System Security - 8th International Conference, 2014

Probabilistic Snapshot Based Evolutionary Social Network Events Detection.
Proceedings of the 10th International Conference on Mobile Ad-hoc and Sensor Networks, 2014

Match Box Meet-in-the-Middle Attacks on the SIMON Family of Block Ciphers.
Proceedings of the Lightweight Cryptography for Security and Privacy, 2014

Modular Inversion Hidden Number Problem Revisited.
Proceedings of the Information Security Practice and Experience, 2014

Differentially 6-uniform permutations by modifying the Gold function.
Proceedings of the IEEE International Conference on Information and Automation, 2014

Attacking RSA with a Composed Decryption Exponent Using Unravelled Linearization.
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014

Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

Further Improvement of Factoring RSA Moduli with Implicit Hint.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014

Partial Key Exposure Attacks on Takagi's Variant of RSA.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
A Fast and Accurate Reconstruction Algorithm for Compressed Sensing of Complex Sinusoids.
IEEE Trans. Signal Process., 2013

GeoPWProv: Interleaving Map and Faceted Metadata for Provenance Visualization and Navigation.
IEEE Trans. Geosci. Remote. Sens., 2013

A massage robot based on Chinese massage therapy.
Ind. Robot, 2013

Constructing New APN Functions from known PN Functions.
Int. J. Found. Comput. Sci., 2013

New Optimal frequency Hopping sequence Sets from Balanced Nested difference Packings of Partition-Type.
Int. J. Found. Comput. Sci., 2013

Analysis of two knapsack public key cryptosystems.
IET Commun., 2013

Automatic Security Evaluation for Bit-oriented Block Ciphers in Related-key Model: Application to PRESENT-80, LBlock and Others.
IACR Cryptol. ePrint Arch., 2013

Automatic Security Evaluation of Block Ciphers with S-bP Structures against Related-key Differential Attacks.
IACR Cryptol. ePrint Arch., 2013

Differential Fault Attack on the PRINCE Block Cipher.
IACR Cryptol. ePrint Arch., 2013

Geoprocessing in Cloud Computing platforms - a comparative analysis.
Int. J. Digit. Earth, 2013

A Class of Binomial Permutation Polynomials.
CoRR, 2013

Compressed sensing of superimposed chirps with adaptive dictionary refinement.
Sci. China Inf. Sci., 2013

A femur fracture reduction method based on anatomy of the contralateral side.
Comput. Biol. Medicine, 2013

On a class of binomial bent functions over the finite fields of odd characteristic.
Appl. Algebra Eng. Commun. Comput., 2013

Privacy-Preserving Password-Based Authenticated Key Exchange in the Three-Party Setting.
Proceedings of the Network and System Security - 7th International Conference, 2013

Improved Algebraic and Differential Fault Attacks on the KATAN Block Cipher.
Proceedings of the Information Security Practice and Experience, 2013

Segmenting Handwritten Math Symbols Using AdaBoost and Multi-scale Shape Context Features.
Proceedings of the 12th International Conference on Document Analysis and Recognition, 2013

Rotation-robust math symbol recognition and retrieval using outer contours and image subsampling.
Proceedings of the Document Recognition and Retrieval XX, 2013

Modeling information diffusion over social networks for temporal dynamic prediction.
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013

Research on SPH Parallel Acceleration Strategies for Multi-GPU Platform.
Proceedings of the Advanced Parallel Processing Technologies, 2013

2012
Compressed Sensing of Complex Sinusoids: An Approach Based on Dictionary Refinement.
IEEE Trans. Signal Process., 2012

A Task Ontology Driven Approach for Live Geoprocessing in a Service-Oriented Environment.
Trans. GIS, 2012

A matrix construction of Boolean functions with maximum algebraic immunity.
J. Syst. Sci. Complex., 2012

Spam Short Messages Detection via Mining Social Networks.
J. Comput. Sci. Technol., 2012

Linear complexity of binary sequences derived from Euler quotients with prime-power modulus.
Inf. Process. Lett., 2012

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems.
Int. J. Distributed Sens. Networks, 2012

Two classes of permutation polynomials over finite fields.
Finite Fields Their Appl., 2012

A triple-error-correcting cyclic code from the Gold and Kasami-Welch APN power functions.
Finite Fields Their Appl., 2012

On the reducibility of some composite polynomials over finite fields.
Des. Codes Cryptogr., 2012

3D navigation and monitoring for spinal milling operation based on registration between multiplanar fluoroscopy and CT images.
Comput. Methods Programs Biomed., 2012

Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security.
Comput. Math. Appl., 2012

Real-time Particle Fluid Simulation with WCSPH.
Proceedings of the 20th Pacific Conference on Computer Graphics and Applications, 2012

Baseline extraction-driven Parsing of handwritten mathematical expressions.
Proceedings of the 21st International Conference on Pattern Recognition, 2012

Implicit Polynomial Recovery and Cryptanalysis of a Combinatorial Key Cryptosystem.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Cryptanalysis of a Lattice-Knapsack Mixed Public Key Cryptosystem.
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012

Measurement of fundus vessel diameter based on fundus fluorescence angiography image.
Proceedings of the 5th International Conference on BioMedical Engineering and Informatics, 2012

2011
A New Derivation of Constrained Cramér-Rao Bound Via Norm Minimization.
IEEE Trans. Signal Process., 2011

More Balanced Boolean Functions With Optimal Algebraic Immunity and Good Nonlinearity and Resistance to Fast Algebraic Attacks.
IEEE Trans. Inf. Theory, 2011

On the Correlation Distributions of the Optimal Quaternary Sequence Family <i>U</i> and the Optimal Binary Sequence Family <i>V</i>.
IEEE Trans. Inf. Theory, 2011

Construction of 1-resilient Boolean functions with optimum algebraic immunity.
Int. J. Comput. Math., 2011

A Family of <i>p</i>-ary Binomial Bent Functions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

New methods for generating permutation polynomials over finite fields.
Finite Fields Their Appl., 2011

Boolean functions with two distinct Walsh coefficients.
Appl. Algebra Eng. Commun. Comput., 2011

Aperiodic correlation of Kasami sequences in the small set.
Appl. Algebra Eng. Commun. Comput., 2011

Location Privacy Protection in the Presence of Users' Preferences.
Proceedings of the Web-Age Information Management - 12th International Conference, 2011

A SPH-based method for interactive fluids simulation on the multi-GPU.
Proceedings of the 10th International Conference on Virtual Reality Continuum and its Applications in Industry, 2011

Kipnis-Shamir Attack on Unbalanced Oil-Vinegar Scheme.
Proceedings of the Information Security Practice and Experience, 2011

A building extraction method using shadow in high resolution multispectral images.
Proceedings of the 2011 IEEE International Geoscience and Remote Sensing Symposium, 2011

Bridge extraction based on on constrained Delaunay triangulation for panchromatic image.
Proceedings of the 2011 IEEE International Geoscience and Remote Sensing Symposium, 2011

HMM-Based Recognition of Online Handwritten Mathematical Symbols Using Segmental K-Means Initialization and a Modified Pen-Up/Down Feature.
Proceedings of the 2011 International Conference on Document Analysis and Recognition, 2011

Application of RFID Technology at the Entrance Gate of Container Terminals.
Proceedings of the Computational Logistics - Second International Conference, 2011

A New Family of Quadriphase Sequences with Low Correlation.
Proceedings of the Coding and Cryptology - Third International Workshop, 2011

Concurrent Non-Malleable Witness Indistinguishable Argument from Any One-Way Function.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011

Cube Cryptanalysis of Hitag2 Stream Cipher.
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011

A fluoroscopy-based navigation system for fixation of femoral neck fracture.
Proceedings of the 4th International Conference on Biomedical Engineering and Informatics, 2011

A fully automatic 2D ultrasound probe calibration method using a simple phantom.
Proceedings of the 4th International Conference on Biomedical Engineering and Informatics, 2011

2010
The large set of <i>p</i>-ary Kasami sequences.
Int. J. Comput. Math., 2010

Security Analysis of a Dynamic Program Update Protocol for Wireless Sensor Networks.
IEEE Commun. Lett., 2010

Balanced Boolean Functions with Optimum Algebraic Immunity and High Nonlinearity.
IACR Cryptol. ePrint Arch., 2010

Balanced Boolean Functions with (Almost) Optimal Algebraic Immunity and Very High Nonlinearity.
IACR Cryptol. ePrint Arch., 2010

On Exponential Sums, Nowton identities and Dickson Polynomials over Finite Fields.
IACR Cryptol. ePrint Arch., 2010

The weight distribution of a class of p-ary cyclic codes.
Finite Fields Their Appl., 2010

Two new permutation polynomials with the form (<i>x</i><sup>2<sup><i>k</i></sup></sup>+<i>x</i>+d)<sup><i>s</i></sup>+<i>x</i> over <i>F</i><sub>2<sup><i>n</i></sup></sub>.
Appl. Algebra Eng. Commun. Comput., 2010

Further crosscorrelation properties of sequences with the decimation factor <i>d</i>=(<i>p</i><sup><i>n</i></sup>+1)/(<i>p</i>+1)-(<i>p</i><sup><i>n</i></sup>-1)/2.
Appl. Algebra Eng. Commun. Comput., 2010

On the generalized large set of Kasami sequences.
Appl. Algebra Eng. Commun. Comput., 2010

Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme.
Proceedings of the Post-Quantum Cryptography, Third International Workshop, 2010

SAR Image Segmentation Based on Kullback-Leibler Distance of Edgeworth.
Proceedings of the Advances in Multimedia Information Processing - PCM 2010, 2010

On the Kipnis-Shamir Method Solving the MinRank Problem.
Proceedings of the Advances in Information and Computer Security, 2010

How to Construct Secure and Efficient Three-Party Password-Based Authenticated Key Exchange Protocols.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

2009
Two New Families of Optimal Binary Sequences Obtained From Quaternary Sequences.
IEEE Trans. Inf. Theory, 2009

New Optimal Quadriphase Sequences With Larger Linear Span.
IEEE Trans. Inf. Theory, 2009

Period-different m-sequences with at most four-valued cross correlation.
IEEE Trans. Inf. Theory, 2009

A Family of p-ary Binomial Bent Functions.
IACR Cryptol. ePrint Arch., 2009

Some results on skew Hadamard difference sets.
Des. Codes Cryptogr., 2009

Further properties of several classes of Boolean functions with optimum algebraic immunity.
Des. Codes Cryptogr., 2009

Weight Distribution of A p-ary Cyclic Code
CoRR, 2009

Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation Structure.
Proceedings of the Information Security Applications, 10th International Workshop, 2009

A fluoroscopic-based navigation system for ACL reconstruction assisted by robot.
Proceedings of the 2009 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2009

A Novel Approach for Blood Vessel Edge Detection in Retinal Images.
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009

Validity of the Simulation of New Screw Fixed FNF for Healing: A Biomechanical Analysis.
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009

Algebraic Attack to SMS4 and the Comparison with AES.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps.
IEEE Trans. Parallel Distributed Syst., 2008

On the Linear Span of a Binary Sequence Family with Optimal Correlation Properties.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

Binary Constant Weight Codes Based on Cyclic Difference Sets.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

New Family of Binary Sequences with Low Correlation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

Authentication codes and bipartite graphs.
Eur. J. Comb., 2008

A Class of Nonbinary Codes and Their Weight Distribution
CoRR, 2008

Period-Different $m$-Sequences With At Most A Four-Valued Cross Correlation
CoRR, 2008

New family of binary sequences of period 4(2<sup> <i>n</i> </sup> - 1) with low correlation.
Appl. Algebra Eng. Commun. Comput., 2008

A Class of Nonbinary Codes and Sequence Families.
Proceedings of the Sequences and Their Applications, 2008

Dynamic Analysis and Design Pattern Detection in Java Programs.
Proceedings of the Twentieth International Conference on Software Engineering & Knowledge Engineering (SEKE'2008), 2008

ROAD: An RFID Offline Authentication, Privacy Preserving Protocol with Dos Resilience.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008

Square Attack on Reduced-Round Zodiac Cipher.
Proceedings of the Information Security Practice and Experience, 2008

Breaking Instance II of New TTM Cryptosystems.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Human reappearance detection based on on-line learning.
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008

Embedded Control System of Digital Operating Table.
Proceedings of the Intelligent Robotics and Applications, First International Conference, 2008

People re-detection using Adaboost with sift and color correlogram.
Proceedings of the International Conference on Image Processing, 2008

Analysis on AACS' Traitor Tracing Against Mix-and-Match Attacks.
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008

2007
Generalized Kasami Sequences: The Large Set.
IEEE Trans. Inf. Theory, 2007

On a Class of Pseudorandom Sequences From Elliptic Curves Over Finite Fields.
IEEE Trans. Inf. Theory, 2007

Using an efficient hash chain and delaying function to improve an e-lottery scheme.
Int. J. Comput. Math., 2007

On The Inequivalence Of Ness-Helleseth APN Functions.
IACR Cryptol. ePrint Arch., 2007

Cryptanalysis of Two New Instances of TTM Cryptosystem.
IACR Cryptol. ePrint Arch., 2007

Kipnis-Shamir's Attack on HFE Revisited.
IACR Cryptol. ePrint Arch., 2007

A New Family of Gold-Like Sequences.
Proceedings of the Sequences, Subsequences, and Consequences, International Workshop, 2007

Privacy-preserving authentication with low computational overhead for RFID systems.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

Storage-Awareness: RFID Private Authentication based on Sparse Tree.
Proceedings of the Third International Workshop on Security, 2007

A 5-DOF table-mounted surgical robot.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2007

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2007), 2007

New Optimal Quadriphase Sequences with Larger Lnear Span.
Proceedings of the IEEE Information Theory Workshop on Information Theory for Wireless Networks, 2007

Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols.
Proceedings of the 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), 2007

New Description of SMS4 by an Embedding overGF(2<sup>8</sup>).
Proceedings of the Progress in Cryptology, 2007

Further Discussions on the Security of a Nominative Signature Scheme.
Proceedings of the 2007 International Conference on Security & Management, 2007

Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

Kipnis-Shamir Attack on HFE Revisited.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

Cryptanalysis of the TRMC-4 Public Key Cryptosystem.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

Analysis of the SMS4 Block Cipher.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
Expansion and linear complexity of the coordinate sequences over Galois rings.
J. Complex., 2006

A Family of Binary Sequences with 4-Valued Optimal Out-of-Phase Correlation and Large Linear Span.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

Note on Design Criteria for Rainbow-Type Multivariates.
IACR Cryptol. ePrint Arch., 2006

High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems.
IACR Cryptol. ePrint Arch., 2006

Partially Perfect Nonlinear Functions and a Construction of Cryptographic Boolean Functions.
Proceedings of the Sequences and Their Applications, 2006

On the Expected Value of the Joint 2-Adic Complexity of Periodic Binary Multisequences.
Proceedings of the Sequences and Their Applications, 2006

A New Family of Codes and Generalized Kasami Sequences.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

An Internet Robot Assistant Tele-neurosurgery System Case.
Proceedings of the 2006 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2006

Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols.
Proceedings of the Progress in Cryptology, 2006

Binary Sequences with Optimal Correlations and Large Linear Span.
Proceedings of IEEE International Conference on Communications, 2006

Pairing-Based Multi-Recipient Public Key Encryption.
Proceedings of the 2006 International Conference on Security & Management, 2006

Fair E-cash Payment Model on Credit Overdraft.
Proceedings of The 1st IEEE Asia-Pacific Services Computing Conference, 2006

Breaking a New Instance of TTM Cryptosystems.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
Implementation of Cryptosystems Based on Tate Pairing.
J. Comput. Sci. Technol., 2005

Fast Modular Reduction over Euclidean Rings and Its Application to Universal Hash Functions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

Constructing Boolean Functions by Modifying Maiorana-McFarland's Superclass Functions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

Cryptanalysis of a New Signal Security System for Multimedia Data Transmission.
EURASIP J. Adv. Signal Process., 2005

Generalized Kasami Sequences: The Large Set
CoRR, 2005

New Sequence Sets with Zero-Correlation Zone
CoRR, 2005

A Family of Binary Sequences with Optimal Correlation Property and Large Linear Span
CoRR, 2005

A Novel Method for Constructing Almost Perfect Polyphase Sequences.
Proceedings of the Coding and Cryptography, International Workshop, 2005

A new class of binary sequences with low correlation and large linear complexity from function fields.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

Provide Privacy for Mobile P2P Systems.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

A Random Walk Based Anonymous Peer-to-Peer Protocol Design.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

2004
Generator polynomials of characteristic ideal of maximal periodic arrays over Galois rings.
Discret. Math., 2004

BPOR: a fluoroscopy-based robot navigating system for distal locking of intramedullary nails.
Proceedings of the 2004 IEEE/RSJ International Conference on Intelligent Robots and Systems, Sendai, Japan, September 28, 2004

2003
On Linear Complexity of Kronecker Sequences.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

A Composition Construction of Bent-Like Boolean Functions from Quadratic Polynomials.
IACR Cryptol. ePrint Arch., 2003

2001
A Simulation and Training Systems of Robot Assisted Surgery Based on Virtual Reality.
Proceedings of the Medical Imaging and Augmented Reality: First International Workshop, 2001

1998
Properties of Gröbner Bases and Applications to Doubly Periodic Arrays.
J. Symb. Comput., 1998

Performance Oriented Design Using HL.
Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences, 1998

1997
A Performance Prototyping Approach to Designing Concurrent Software Architectures.
Proceedings of the International Symposium on Software Engineering for Parallel and Distributed Systems, 1997


  Loading...