Long Wen

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
Kde-Entropy: preserve efficient filter.
Signal Image Video Process., February, 2024

Real-Time Adaptive Safety-Critical Control with Gaussian Processes in High-Order Uncertain Models.
CoRR, 2024

Online Efficient Safety-Critical Control for Mobile Robots in Unknown Dynamic Multi-Obstacle Environments.
CoRR, 2024

2023
A comprehensive survey of oriented object detection in remote sensing images.
Expert Syst. Appl., August, 2023

An obstacle avoidance path planner for an autonomous tractor using the minimum snap algorithm.
Comput. Electron. Agric., April, 2023

CAPP-130: A Corpus of Chinese Application Privacy Policy Summarization and Interpretation.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Bare-Metal vs. Hypervisors and Containers: Performance Evaluation of Virtualization Technologies for Software-Defined Vehicles.
Proceedings of the IEEE Intelligent Vehicles Symposium, 2023

Robust Point Cloud Registration with Geometry-based Transformation Invariant Descriptor.
IROS, 2023

Two-branch weakly supervised semantic segmentation network based on web data enhancement.
Proceedings of the 2023 International Conference on Computer, 2023

Knowledge-Augmented Anomaly Detection in Small Lot Production for Semantic Temporal Process Data.
Proceedings of the 28th IEEE International Conference on Emerging Technologies and Factory Automation, 2023

2022
Development Analysis of Cross-Border E-Commerce Logistics Based on Big Data Technology Under Safety Law Protection.
Int. J. Inf. Syst. Serv. Sect., 2022

2021
Snow Particle Size Distribution From a 2-D Video Disdrometer and Radar Snowfall Estimation in East China.
IEEE Trans. Geosci. Remote. Sens., 2021

2020
An Automated Real-Time Localization System in Highway and Tunnel Using UWB DL-TDoA Technology.
Wirel. Commun. Mob. Comput., 2020

LoRa-Based Smart IoT Application for Smart City: An Example of Human Posture Detection.
Wirel. Commun. Mob. Comput., 2020

Deniably authenticated searchable encryption scheme based on Blockchain for medical image data sharing.
Multim. Tools Appl., 2020

Medical Data Sharing Scheme Based on Attribute Cryptosystem and Blockchain Technology.
IEEE Access, 2020

2019
Microphysical Characteristics of Three Convective Events with Intense Rainfall Observed by Polarimetric Radar and Disdrometer in Eastern China.
Remote. Sens., 2019

Designated Server Certificateless Deniably Authenticated Encryption With Keyword Search.
IEEE Access, 2019

Research on 3D Point Cloud De-Distortion Algorithm and Its Application on Euclidean Clustering.
IEEE Access, 2019

2018
The Artificial Bee Colony Algorithm Improved with Simplex Method.
J. Softw., 2018

Statistical integral attack on CAST-256 and IDEA.
Cryptogr. Commun., 2018

Reformative Vehicle License Plate Recognition Algorithm Based on Deep Learning.
Proceedings of the Cognitive Systems and Signal Processing - 4th International Conference, 2018

An Evaluation Method for Technical Condition of Ground-Based TT&C Network.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2018

2016
Integrals go Statistical: Cryptanalysis of Full Skipjack Variants.
IACR Cryptol. ePrint Arch., 2016

2015
Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds.
IACR Cryptol. ePrint Arch., 2015

2014
Improved Linear Cryptanalysis of CAST-256.
J. Comput. Sci. Technol., 2014

Related-Key Impossible Differential Attack on Reduced-Round LBlock.
J. Comput. Sci. Technol., 2014

Multidimensional zero-correlation attacks on lightweight block cipher HIGHT: Improved cryptanalysis of an ISO standard.
Inf. Process. Lett., 2014

Note of Multidimensional MITM Attack on 25-Round TWINE-128.
IACR Cryptol. ePrint Arch., 2014

Analysis on the Effect of New Futures Contract Coming into Market: Taking the Related Metal Futures in SHFE for Example.
Proceedings of the Second International Conference on Information Technology and Quantitative Management, 2014

General Application of FFT in Cryptanalysis and Improved Attack on CAST-256.
Proceedings of the Progress in Cryptology - INDOCRYPT 2014, 2014

Multidimensional Zero-Correlation Linear Cryptanalysis of E2.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014

Integral Zero-Correlation Distinguisher for ARX Block Cipher, with Application to SHACAL-2.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
Zero-Correlation Linear Cryptanalysis with FFT and Improved Attacks on ISO Standards Camellia and CLEFIA.
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013

Gait measurement and quantitative analysis in patients with Parkinson's disease for rehabilitation assessment.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2013

Sliding mode variable structure-based multi-shaft synchronous control method and its application in printing press.
Proceedings of the 10th IEEE International Conference on Control and Automation, 2013

Key Difference Invariant Bias in Block Ciphers.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

2009
Research on Retrieval of MES Components Based on Ontology.
Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, 2009


  Loading...