Song Tian

Orcid: 0009-0005-2037-3431

According to our database1, Song Tian authored at least 37 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Expected Precision of Gravity Gradient Recovered from Ka-Band Radar Interferometer Observations and Impact of Instrument Errors.
Remote. Sens., February, 2024

2023
Cover Attacks for Elliptic Curves over Cubic Extension Fields.
J. Cryptol., October, 2023

Critical Classes and Samples Discovering for Partial Domain Adaptation.
IEEE Trans. Cybern., September, 2023

Calibration of a QMS System for High-Sensitivity Gas Permeation Measurement.
IEEE Trans. Instrum. Meas., 2023

Energy Self-Sufficient Rail Corrugation Identification by a Multistable Piezo-Electro-Magnet Coupled Energy Transducer.
IEEE Trans. Instrum. Meas., 2023

Efficient automatic segmentation for multi-level pulmonary arteries: The PARSE challenge.
CoRR, 2023

MyRoom: A Unity Plugin for Procedural and Interactive Indoor Scene Synthesis.
Proceedings of the IEEE Conference on Games, 2023

2022
Automatic Image Quality Assessment and Cardiac Segmentation Based on CMR Images.
Proceedings of the Statistical Atlases and Computational Models of the Heart. Regular and CMRxMotion Challenge Papers, 2022

2021
Translating the Discrete Logarithm Problem on Jacobians of Genus 3 Hyperelliptic Curves with (ℓ , ℓ , ℓ )-Isogenies.
J. Cryptol., 2021

Vector-Based Realisation of Geographical Voronoi Treemaps With the ArcGIS Engine.
J. Inf. Technol. Res., 2021

Stability Limits for the Velocity Orientation Autopilot of Rolling Missiles.
IEEE Access, 2021

C-BERTT: A BERT-based Model For Extractive Summarization Of Chinese Online Judge Questions.
Proceedings of the Ninth International Conference on Advanced Cloud and Big Data, 2021

2020
Effects of Interferometric Radar Altimeter Errors on Marine Gravity Field Inversion.
Sensors, 2020

Cover attacks for elliptic curves with prime order.
CoRR, 2020

CSURF-TWO: CSIDH for the Ratio (2 : 1).
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020

2019
CSIDH on Other Form of Elliptic Curves.
IACR Cryptol. ePrint Arch., 2019

Strongly Secure Authenticated Key Exchange from Supersingular Isogenies.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

Constructing Hyperelliptic Covers for Elliptic Curves over Quadratic Extension Fields.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
Construction of C-ON/OFF network traffic model based on time series.
J. Intell. Fuzzy Syst., 2018

Gain-Scheduled for Aerial Vehicle Autopilot Design Using Fixed-Structure Synthesis.
J. Adv. Comput. Intell. Intell. Informatics, 2018

Strongly Secure Authenticated Key Exchange from Supersingular Isogeny.
IACR Cryptol. ePrint Arch., 2018

Cover attacks for elliptic curves with cofactor two.
Des. Codes Cryptogr., 2018

2017
Comparison of medical image 3D reconstruction rendering methods for robot-assisted surgery.
Proceedings of the 2nd International Conference on Advanced Robotics and Mechatronics, 2017

2016
Multifocus Image Fusion by the Sum of Local Variance Energy.
J. Inf. Hiding Multim. Signal Process., 2016

Deterministic Encoding into Twisted Edwards Curves.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Estimation of the Equivalent Number of Looks in SAR Images Based on Singular Value Decomposition.
IEEE Geosci. Remote. Sens. Lett., 2015

An Approach to Generate Spatial Voronoi Treemaps for Points, Lines, and Polygons.
J. Electr. Comput. Eng., 2015

Hashing into Jacobi Quartic Curves.
Proceedings of the Information Security - 18th International Conference, 2015

Some Elliptic Subcovers of Genus 3 Hyperelliptic Curves.
Proceedings of the Information Security Practice and Experience, 2015

Models of Curves from GHS Attack in Odd Characteristic.
Proceedings of the Information Security Practice and Experience, 2015

2014
A Note on Diem's Proof.
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014

Survey on unsupervised change detection techniques in SAR images1.
Proceedings of the IEEE China Summit & International Conference on Signal and Information Processing, 2014

2013
Joint Triple-Base Number System for Multi-Scalar Multiplication.
Proceedings of the Information Security Practice and Experience, 2013

About Hash into Montgomery Form Elliptic Curves.
Proceedings of the Information Security Practice and Experience, 2013

Triple-Base Number System for Scalar Multiplication.
Proceedings of the Progress in Cryptology, 2013

On the Expansion Length Of Triple-Base Number Systems.
Proceedings of the Progress in Cryptology, 2013

2011
Research on Schedulability of Partition Scheduling for IMA.
Proceedings of the 4th International Symposium on Computational Intelligence and Design, 2011


  Loading...