BibTeX records: Lei Hu

download as .bib file

@article{DBLP:journals/bspc/HuCCW24,
  author       = {Lei Hu and
                  Wenjie Cai and
                  Ziyang Chen and
                  Mingjie Wang},
  title        = {A lightweight U-Net model for denoising and noise localization of
                  {ECG} signals},
  journal      = {Biomed. Signal Process. Control.},
  volume       = {88},
  number       = {Part {B}},
  pages        = {105504},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.bspc.2023.105504},
  doi          = {10.1016/J.BSPC.2023.105504},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bspc/HuCCW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/LvSHGGW24,
  author       = {Yin Lv and
                  Danping Shi and
                  Lei Hu and
                  Zihui Guo and
                  Yi Guo and
                  Caibing Wang},
  title        = {Improved Linear Cryptanalysis of Block Cipher {BORON}},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {1},
  pages        = {210--219},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxac169},
  doi          = {10.1093/COMJNL/BXAC169},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/LvSHGGW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/LiSZDHDSYQW24,
  author       = {Weirong Li and
                  Kai Sun and
                  Yunqiang Zhu and
                  Fangyu Ding and
                  Lei Hu and
                  Xiaoliang Dai and
                  Jia Song and
                  Jie Yang and
                  Lang Qian and
                  Shu Wang},
  title        = {GeoTPE: {A} neural network model for geographical topic phrases extraction
                  from literature based on {BERT} enhanced with relative position embedding},
  journal      = {Expert Syst. Appl.},
  volume       = {235},
  pages        = {121077},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.eswa.2023.121077},
  doi          = {10.1016/J.ESWA.2023.121077},
  timestamp    = {Fri, 15 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eswa/LiSZDHDSYQW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kbs/WangXHFH24,
  author       = {Yunsheng Wang and
                  Xinghan Xu and
                  Lei Hu and
                  Jianchao Fan and
                  Min Han},
  title        = {A time series continuous missing values imputation method based on
                  generative adversarial networks},
  journal      = {Knowl. Based Syst.},
  volume       = {283},
  pages        = {111215},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.knosys.2023.111215},
  doi          = {10.1016/J.KNOSYS.2023.111215},
  timestamp    = {Mon, 22 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/kbs/WangXHFH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/remotesensing/HuZRL24,
  author       = {Lei Hu and
                  Xun Zhou and
                  Jiachen Ruan and
                  Supeng Li},
  title        = {ASPP+-LANet: {A} Multi-Scale Context Extraction Network for Semantic
                  Segmentation of High-Resolution Remote Sensing Images},
  journal      = {Remote. Sens.},
  volume       = {16},
  number       = {6},
  pages        = {1036},
  year         = {2024},
  url          = {https://doi.org/10.3390/rs16061036},
  doi          = {10.3390/RS16061036},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/remotesensing/HuZRL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ChenGHSMW24,
  author       = {Yuchao Chen and
                  Tingting Guo and
                  Lei Hu and
                  Lina Shang and
                  Shuping Mao and
                  Peng Wang},
  title        = {Small Stretch Problem of the {DCT} Scheme and How to Fix It},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2024},
  number       = {1},
  pages        = {114--134},
  year         = {2024},
  url          = {https://doi.org/10.46586/tosc.v2024.i1.114-134},
  doi          = {10.46586/TOSC.V2024.I1.114-134},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/ChenGHSMW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/HuLQHN24,
  author       = {Lei Hu and
                  Guyue Li and
                  Xuewen Qian and
                  Aiqun Hu and
                  Derrick Wing Kwan Ng},
  title        = {Reconfigurable Intelligent Surface-Assisted Secret Key Generation
                  in Spatially Correlated Channels},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {23},
  number       = {3},
  pages        = {2153--2166},
  year         = {2024},
  url          = {https://doi.org/10.1109/TWC.2023.3296076},
  doi          = {10.1109/TWC.2023.3296076},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/twc/HuLQHN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wcl/HuLHN24,
  author       = {Lei Hu and
                  Guyue Li and
                  Aiqun Hu and
                  Derrick Wing Kwan Ng},
  title        = {Exploiting Malicious {RIS} for Secret Key Acquisition in Physical-Layer
                  Key Generation},
  journal      = {{IEEE} Wirel. Commun. Lett.},
  volume       = {13},
  number       = {2},
  pages        = {417--421},
  year         = {2024},
  url          = {https://doi.org/10.1109/LWC.2023.3330809},
  doi          = {10.1109/LWC.2023.3330809},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wcl/HuLHN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-03768,
  author       = {Yushuai Wu and
                  Ting Zhang and
                  Hao Zhou and
                  Hainan Wu and
                  Hanwen Sunchu and
                  Lei Hu and
                  Xiaofang Chen and
                  Suyuan Zhao and
                  Gaochao Liu and
                  Chao Sun and
                  Jiahuan Zhang and
                  Yizhen Luo and
                  Peng Liu and
                  Zaiqing Nie and
                  Yushuai Wu},
  title        = {DeepCRE: Transforming Drug R{\&}D via AI-Driven Cross-drug Response
                  Evaluation},
  journal      = {CoRR},
  volume       = {abs/2403.03768},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.03768},
  doi          = {10.48550/ARXIV.2403.03768},
  eprinttype    = {arXiv},
  eprint       = {2403.03768},
  timestamp    = {Wed, 03 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-03768.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SongYCHW24,
  author       = {Ling Song and
                  Qianqian Yang and
                  Yincen Chen and
                  Lei Hu and
                  Jian Weng},
  title        = {Probabilistic Extensions: {A} One-Step Framework for Finding Rectangle
                  Attacks and Beyond},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {344},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/344},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SongYCHW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/DongYHSC23,
  author       = {Fei Dong and
                  Jianguo Yang and
                  Lei Hu and
                  Sicong Sun and
                  Yunkai Cai},
  title        = {Multi-Objective Matched Synchrosqueezing Chirplet Transform for Fault
                  Feature Extraction From Marine Turbochargers},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {80702--80715},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3296689},
  doi          = {10.1109/ACCESS.2023.3296689},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/DongYHSC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bdcc/TangHCHLL23,
  author       = {Ze{-}Yang Tang and
                  Qibiao Hu and
                  Yi{-}Bo Cui and
                  Lei Hu and
                  Yi{-}Wen Li and
                  Yu{-}Jie Li},
  title        = {Evaluation Method of Electric Vehicle Charging Station Operation Based
                  on Contrastive Learning},
  journal      = {Big Data Cogn. Comput.},
  volume       = {7},
  number       = {3},
  pages        = {133},
  year         = {2023},
  url          = {https://doi.org/10.3390/bdcc7030133},
  doi          = {10.3390/BDCC7030133},
  timestamp    = {Fri, 05 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bdcc/TangHCHLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/caaitrit/ZhangHLJLSSZHL23,
  author       = {Yonghong Zhang and
                  Ning Hu and
                  Zhuofu Li and
                  Xuquan Ji and
                  Shanshan Liu and
                  Youyang Sha and
                  Xiongkang Song and
                  Jian Zhang and
                  Lei Hu and
                  Weishi Li},
  title        = {Lumbar spine localisation method based on feature fusion},
  journal      = {{CAAI} Trans. Intell. Technol.},
  volume       = {8},
  number       = {3},
  pages        = {931--945},
  year         = {2023},
  url          = {https://doi.org/10.1049/cit2.12137},
  doi          = {10.1049/CIT2.12137},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/caaitrit/ZhangHLJLSSZHL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/GuoZYHL23,
  author       = {Hao Guo and
                  Zhiyu Zhang and
                  Qianqian Yang and
                  Lei Hu and
                  Yiyuan Luo},
  title        = {A New Method To Find All The High-Probability Word-Oriented Truncated
                  Differentials: Application To \texttt{Midori}, \texttt{SKINNY} And
                  \texttt{CRAFT}},
  journal      = {Comput. J.},
  volume       = {66},
  number       = {5},
  pages        = {1069--1082},
  year         = {2023},
  url          = {https://doi.org/10.1093/comjnl/bxab213},
  doi          = {10.1093/COMJNL/BXAB213},
  timestamp    = {Fri, 23 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/GuoZYHL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/LvSGCHG23,
  author       = {Yin Lv and
                  Danping Shi and
                  Yi Guo and
                  Qiu Chen and
                  Lei Hu and
                  Zihui Guo},
  title        = {Automatic Demirci-Sel{\c{c}}uk Meet-In-The-Middle Attack On {SIMON}},
  journal      = {Comput. J.},
  volume       = {66},
  number       = {12},
  pages        = {3052--3068},
  year         = {2023},
  url          = {https://doi.org/10.1093/comjnl/bxac149},
  doi          = {10.1093/COMJNL/BXAC149},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/LvSGCHG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/QiaoYSHJ23,
  author       = {Wenxiao Qiao and
                  Hailun Yan and
                  Siwei Sun and
                  Lei Hu and
                  Jiwu Jing},
  title        = {New cryptanalysis of LowMC with algebraic techniques},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {5},
  pages        = {2057--2075},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01178-1},
  doi          = {10.1007/S10623-022-01178-1},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/QiaoYSHJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eaai/ZhaoHHWL23,
  author       = {Jinling Zhao and
                  Lei Hu and
                  Linsheng Huang and
                  Chuanjian Wang and
                  Dong Liang},
  title        = {{MSRA-G:} Combination of multi-scale residual attention network and
                  generative adversarial networks for hyperspectral image classification},
  journal      = {Eng. Appl. Artif. Intell.},
  volume       = {121},
  pages        = {106017},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.engappai.2023.106017},
  doi          = {10.1016/J.ENGAPPAI.2023.106017},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eaai/ZhaoHHWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eaai/ZhangHML23,
  author       = {Shitao Zhang and
                  Lei Hu and
                  Zhenzhen Ma and
                  Xiaodi Liu},
  title        = {Two-rank multi-attribute group decision-making with linguistic distribution
                  assessments: An optimization-based integrated approach},
  journal      = {Eng. Appl. Artif. Intell.},
  volume       = {121},
  pages        = {106170},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.engappai.2023.106170},
  doi          = {10.1016/J.ENGAPPAI.2023.106170},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eaai/ZhangHML23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/envsoft/ZhangYHWZ23,
  author       = {Mingda Zhang and
                  Peng Yue and
                  Lei Hu and
                  Huayi Wu and
                  Fan Zhang},
  title        = {An interoperable and service-oriented approach for real-time environmental
                  simulation by coupling {OGC} {WPS} and SensorThings {API}},
  journal      = {Environ. Model. Softw.},
  volume       = {165},
  pages        = {105722},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.envsoft.2023.105722},
  doi          = {10.1016/J.ENVSOFT.2023.105722},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/envsoft/ZhangYHWZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/WeiSHWP23,
  author       = {Zihao Wei and
                  Siwei Sun and
                  Lei Hu and
                  Man Wei and
                  Ren{\'{e}} Peralta},
  title        = {Searching the space of tower field implementations of the {\unicode{54589}}\({}_{\mbox{2\({}^{\mbox{8}}\)}}\)
                  inverter - with applications to AES, Camellia and {SM4}},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {20},
  number       = {1/2},
  pages        = {1--26},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJICS.2023.10052962},
  doi          = {10.1504/IJICS.2023.10052962},
  timestamp    = {Mon, 06 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/WeiSHWP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijis/HuZZZSJLLL23,
  author       = {Lei Hu and
                  Yonghong Zhang and
                  Jian Zhang and
                  Tianyang Zhang and
                  Xiongkang Song and
                  Xuquan Ji and
                  Shanshan Liu and
                  Zhuofu Li and
                  Weishi Li},
  title        = {STP-Net: {A} Signal Prediction Method of Laminar Decompression Robot
                  Based on Swin Transformer},
  journal      = {Int. J. Intell. Syst.},
  volume       = {2023},
  pages        = {1--20},
  year         = {2023},
  url          = {https://doi.org/10.1155/2023/7842495},
  doi          = {10.1155/2023/7842495},
  timestamp    = {Thu, 14 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijis/HuZZZSJLLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipm/BiNZHMZ0W23,
  author       = {Xin Bi and
                  Haojie Nie and
                  Guoliang Zhang and
                  Lei Hu and
                  Yuliang Ma and
                  Xiangguo Zhao and
                  Ye Yuan and
                  Guoren Wang},
  title        = {Boosting question answering over knowledge graph with reward integration
                  and policy evaluation under weak supervision},
  journal      = {Inf. Process. Manag.},
  volume       = {60},
  number       = {2},
  pages        = {103242},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ipm.2022.103242},
  doi          = {10.1016/J.IPM.2022.103242},
  timestamp    = {Sun, 16 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipm/BiNZHMZ0W23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/LiuNSLH23,
  author       = {Yunwen Liu and
                  Zhongfeng Niu and
                  Siwei Sun and
                  Chao Li and
                  Lei Hu},
  title        = {Rotational Differential-Linear Cryptanalysis Revisited},
  journal      = {J. Cryptol.},
  volume       = {36},
  number       = {1},
  pages        = {3},
  year         = {2023},
  url          = {https://doi.org/10.1007/s00145-022-09440-4},
  doi          = {10.1007/S00145-022-09440-4},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/LiuNSLH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/remotesensing/DaiZSZZLHW23,
  author       = {Xiaoliang Dai and
                  Yunqiang Zhu and
                  Kai Sun and
                  Qiang Zou and
                  Shen Zhao and
                  Weirong Li and
                  Lei Hu and
                  Shu Wang},
  title        = {Examining the Spatially Varying Relationships between Landslide Susceptibility
                  and Conditioning Factors Using a Geographical Random Forest Approach:
                  {A} Case Study in Liangshan, China},
  journal      = {Remote. Sens.},
  volume       = {15},
  number       = {6},
  pages        = {1513},
  year         = {2023},
  url          = {https://doi.org/10.3390/rs15061513},
  doi          = {10.3390/RS15061513},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/remotesensing/DaiZSZZLHW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/remotesensing/HuZZSLF23,
  author       = {Lei Hu and
                  Chenxiao Zhang and
                  Mingda Zhang and
                  Yuming Shi and
                  Jiasheng Lu and
                  Zhe Fang},
  title        = {Enhancing {FAIR} Data Services in Agricultural Disaster: {A} Review},
  journal      = {Remote. Sens.},
  volume       = {15},
  number       = {8},
  pages        = {2024},
  year         = {2023},
  url          = {https://doi.org/10.3390/rs15082024},
  doi          = {10.3390/RS15082024},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/remotesensing/HuZZSLF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/remotesensing/PangGHGZZZL23,
  author       = {Siqi Pang and
                  Junyao Ge and
                  Lei Hu and
                  Kaitai Guo and
                  Yang Zheng and
                  Changli Zheng and
                  Wei Zhang and
                  Jimin Liang},
  title        = {{RTV-SIFT:} Harnessing Structure Information for Robust Optical and
                  {SAR} Image Registration},
  journal      = {Remote. Sens.},
  volume       = {15},
  number       = {18},
  pages        = {4476},
  year         = {2023},
  url          = {https://doi.org/10.3390/rs15184476},
  doi          = {10.3390/RS15184476},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/remotesensing/PangGHGZZZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/remotesensing/JiangLHPH23,
  author       = {Liangcun Jiang and
                  Feng Li and
                  Li Huang and
                  Feifei Peng and
                  Lei Hu},
  title        = {TTNet: {A} Temporal-Transform Network for Semantic Change Detection
                  Based on Bi-Temporal Remote Sensing Images},
  journal      = {Remote. Sens.},
  volume       = {15},
  number       = {18},
  pages        = {4555},
  year         = {2023},
  url          = {https://doi.org/10.3390/rs15184555},
  doi          = {10.3390/RS15184555},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/remotesensing/JiangLHPH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/Hu23,
  author       = {Lei Hu},
  title        = {Implementation of the expansion of sensor information storage based
                  on the Internet of Things and cloud computing},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {2},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.215},
  doi          = {10.1002/SPY2.215},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/Hu23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcom/HuSLHN23,
  author       = {Lei Hu and
                  Chen Sun and
                  Guyue Li and
                  Aiqun Hu and
                  Derrick Wing Kwan Ng},
  title        = {Reconfigurable Intelligent Surface-Aided Secret Key Generation in
                  Multi-Cell Systems},
  journal      = {{IEEE} Trans. Commun.},
  volume       = {71},
  number       = {11},
  pages        = {6499--6513},
  year         = {2023},
  url          = {https://doi.org/10.1109/TCOMM.2023.3301048},
  doi          = {10.1109/TCOMM.2023.3301048},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcom/HuSLHN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tgrs/HuHZZ23,
  author       = {Lei Hu and
                  Wei He and
                  Liangpei Zhang and
                  Hongyan Zhang},
  title        = {Cross-Domain Meta-Learning Under Dual-Adjustment Mode for Few-Shot
                  Hyperspectral Image Classification},
  journal      = {{IEEE} Trans. Geosci. Remote. Sens.},
  volume       = {61},
  pages        = {1--16},
  year         = {2023},
  url          = {https://doi.org/10.1109/TGRS.2023.3320657},
  doi          = {10.1109/TGRS.2023.3320657},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tgrs/HuHZZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/XuSHWP23,
  author       = {Jun Xu and
                  Santanu Sarkar and
                  Lei Hu and
                  Huaxiong Wang and
                  Yanbin Pan},
  title        = {Revisiting Modular Inversion Hidden Number Problem and Its Applications},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {69},
  number       = {8},
  pages        = {5337--5356},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIT.2023.3263485},
  doi          = {10.1109/TIT.2023.3263485},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/XuSHWP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ZhangSWH23,
  author       = {Zhiyu Zhang and
                  Siwei Sun and
                  Caibing Wang and
                  Lei Hu},
  title        = {Classical and Quantum Meet-in-the-Middle Nostradamus Attacks on AES-like
                  Hashing},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {2},
  pages        = {224--252},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i2.224-252},
  doi          = {10.46586/TOSC.V2023.I2.224-252},
  timestamp    = {Tue, 18 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/ZhangSWH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/GuoSHL23,
  author       = {Yi Guo and
                  Danping Shi and
                  Lei Hu and
                  Yin Lv},
  editor       = {Chunpeng Ge and
                  Moti Yung},
  title        = {Improved Integral Cryptanalysis of Block Ciphers {BORON} and Khudra},
  booktitle    = {Information Security and Cryptology - 19th International Conference,
                  Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected
                  Papers, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14527},
  pages        = {153--171},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-0945-8\_9},
  doi          = {10.1007/978-981-97-0945-8\_9},
  timestamp    = {Mon, 11 Mar 2024 15:20:47 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/GuoSHL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dasfaa/YuanBHZHYZS23,
  author       = {Mingxu Yuan and
                  Xin Bi and
                  Xuechun Huang and
                  Wei Zhang and
                  Lei Hu and
                  George Y. Yuan and
                  Xiangguo Zhao and
                  Yongjiao Sun},
  editor       = {Xin Wang and
                  Maria Luisa Sapino and
                  Wook{-}Shin Han and
                  Amr El Abbadi and
                  Gill Dobbie and
                  Zhiyong Feng and
                  Yingxiao Shao and
                  Hongzhi Yin},
  title        = {Towards Time-Series Key Points Detection Through Self-supervised Learning
                  and Probability Compensation},
  booktitle    = {Database Systems for Advanced Applications - 28th International Conference,
                  {DASFAA} 2023, Tianjin, China, April 17-20, 2023, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13943},
  pages        = {237--252},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30637-2\_16},
  doi          = {10.1007/978-3-031-30637-2\_16},
  timestamp    = {Tue, 02 May 2023 16:41:52 +0200},
  biburl       = {https://dblp.org/rec/conf/dasfaa/YuanBHZHYZS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/ShiSSHY23,
  author       = {Danping Shi and
                  Siwei Sun and
                  Ling Song and
                  Lei Hu and
                  Qianqian Yang},
  editor       = {Carmit Hazay and
                  Martijn Stam},
  title        = {Exploiting Non-full Key Additions: Full-Fledged Automatic Demirci-Sel{\c{c}}uk
                  Meet-in-the-Middle Cryptanalysis of {SKINNY}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Lyon, France, April 23-27, 2023, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14007},
  pages        = {67--97},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30634-1\_3},
  doi          = {10.1007/978-3-031-30634-1\_3},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/ShiSSHY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccv/ZhongHZX23,
  author       = {Chongyang Zhong and
                  Lei Hu and
                  Zihao Zhang and
                  Shihong Xia},
  title        = {AttT2M: Text-Driven Human Motion Generation with Multi-Perspective
                  Attention Mechanism},
  booktitle    = {{IEEE/CVF} International Conference on Computer Vision, {ICCV} 2023,
                  Paris, France, October 1-6, 2023},
  pages        = {509--519},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICCV51070.2023.00053},
  doi          = {10.1109/ICCV51070.2023.00053},
  timestamp    = {Fri, 19 Jan 2024 17:50:41 +0100},
  biburl       = {https://dblp.org/rec/conf/iccv/ZhongHZX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccv/JiangHX23,
  author       = {Boyuan Jiang and
                  Lei Hu and
                  Shihong Xia},
  title        = {Probabilistic Triangulation for Uncalibrated Multi-View 3D Human Pose
                  Estimation},
  booktitle    = {{IEEE/CVF} International Conference on Computer Vision, {ICCV} 2023,
                  Paris, France, October 1-6, 2023},
  pages        = {14804--14814},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICCV51070.2023.01364},
  doi          = {10.1109/ICCV51070.2023.01364},
  timestamp    = {Mon, 22 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccv/JiangHX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ZhaoZYSH23,
  author       = {Jiahao Zhao and
                  Nana Zhang and
                  Qianqian Yang and
                  Ling Song and
                  Lei Hu},
  editor       = {Junji Shikata and
                  Hiroki Kuzuno},
  title        = {Improved Boomerang Attacks on Deoxys-BC},
  booktitle    = {Advances in Information and Computer Security - 18th International
                  Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31,
                  2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14128},
  pages        = {59--76},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-41326-1\_4},
  doi          = {10.1007/978-3-031-41326-1\_4},
  timestamp    = {Fri, 25 Aug 2023 19:50:15 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ZhaoZYSH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/LiLHHN23,
  author       = {Haoyu Li and
                  Guyue Li and
                  Lei Hu and
                  Aiqun Hu and
                  Derrick Wing Kwan Ng},
  title        = {RIS-Assisted Physical-Layer Key Generation with Discrete Phase Shift
                  Optimization},
  booktitle    = {98th {IEEE} Vehicular Technology Conference, {VTC} Fall 2023, Hong
                  Kong, SAR, China, October 10-13, 2023},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/VTC2023-Fall60731.2023.10333843},
  doi          = {10.1109/VTC2023-FALL60731.2023.10333843},
  timestamp    = {Wed, 10 Jan 2024 16:12:42 +0100},
  biburl       = {https://dblp.org/rec/conf/vtc/LiLHHN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-12455,
  author       = {Lei Hu and
                  Chen Sun and
                  Guyue Li and
                  Aiqun Hu and
                  Derrick Wing Kwan Ng},
  title        = {Reconfigurable Intelligent Surface-aided Secret Key Generation in
                  Multi-Cell Systems},
  journal      = {CoRR},
  volume       = {abs/2303.12455},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2303.12455},
  doi          = {10.48550/ARXIV.2303.12455},
  eprinttype    = {arXiv},
  eprint       = {2303.12455},
  timestamp    = {Thu, 13 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2303-12455.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-14884,
  author       = {Fan Yang and
                  Lei Hu and
                  Xinwu Liu and
                  Shuangping Huang and
                  Zhenghui Gu},
  title        = {A large-scale dataset for end-to-end table recognition in the wild},
  journal      = {CoRR},
  volume       = {abs/2303.14884},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2303.14884},
  doi          = {10.48550/ARXIV.2303.14884},
  eprinttype    = {arXiv},
  eprint       = {2303.14884},
  timestamp    = {Wed, 10 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2303-14884.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-08006,
  author       = {Lei Hu and
                  Zihao Zhang and
                  Chongyang Zhong and
                  Boyuan Jiang and
                  Shihong Xia},
  title        = {Pose-aware Attention Network for Flexible Motion Retargeting by Body
                  Part},
  journal      = {CoRR},
  volume       = {abs/2306.08006},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.08006},
  doi          = {10.48550/ARXIV.2306.08006},
  eprinttype    = {arXiv},
  eprint       = {2306.08006},
  timestamp    = {Sun, 18 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-08006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-00796,
  author       = {Chongyang Zhong and
                  Lei Hu and
                  Zihao Zhang and
                  Shihong Xia},
  title        = {AttT2M: Text-Driven Human Motion Generation with Multi-Perspective
                  Attention Mechanism},
  journal      = {CoRR},
  volume       = {abs/2309.00796},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.00796},
  doi          = {10.48550/ARXIV.2309.00796},
  eprinttype    = {arXiv},
  eprint       = {2309.00796},
  timestamp    = {Mon, 11 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-00796.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-04756,
  author       = {Boyuan Jiang and
                  Lei Hu and
                  Shihong Xia},
  title        = {Probabilistic Triangulation for Uncalibrated Multi-View 3D Human Pose
                  Estimation},
  journal      = {CoRR},
  volume       = {abs/2309.04756},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.04756},
  doi          = {10.48550/ARXIV.2309.04756},
  eprinttype    = {arXiv},
  eprint       = {2309.04756},
  timestamp    = {Fri, 15 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-04756.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-17266,
  author       = {Zhuofu Li and
                  Yonghong Zhang and
                  Chengxia Wang and
                  Shanshan Liu and
                  Xiongkang Song and
                  Xuquan Ji and
                  Shuai Jiang and
                  Woquan Zhong and
                  Lei Hu and
                  Weishi Li},
  title        = {Automatic laminectomy cutting plane planning based on artificial intelligence
                  in robot assisted laminectomy surgery},
  journal      = {CoRR},
  volume       = {abs/2312.17266},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.17266},
  doi          = {10.48550/ARXIV.2312.17266},
  eprinttype    = {arXiv},
  eprint       = {2312.17266},
  timestamp    = {Wed, 10 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-17266.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShiSSHY23,
  author       = {Danping Shi and
                  Siwei Sun and
                  Ling Song and
                  Lei Hu and
                  Qianqian Yang},
  title        = {Exploiting Non-Full Key Additions: Full-Fledged Automatic Demirci-Selcuk
                  Meet-in-the-Middle Cryptanalysis of {SKINNY}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {255},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/255},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ShiSSHY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangSWH23,
  author       = {Zhiyu Zhang and
                  Siwei Sun and
                  Caibing Wang and
                  Lei Hu},
  title        = {Classical and Quantum Meet-in-the-Middle Nostradamus Attacks on AES-like
                  Hashing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {772},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/772},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangSWH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaoZHLW23,
  author       = {Shuping Mao and
                  Zhiyu Zhang and
                  Lei Hu and
                  Luying Li and
                  Peng Wang},
  title        = {Quantum Security of {TNT}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1280},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1280},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaoZHLW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiXH23,
  author       = {Zhiwei Li and
                  Jun Xu and
                  Lei Hu},
  title        = {Signal Leakage Attack Meets Depth First Search: an Improved Approach
                  on {DXL} Key Exchange Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1709},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1709},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LiXH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenGHSMW23,
  author       = {Yuchao Chen and
                  Tingting Guo and
                  Lei Hu and
                  Lina Shang and
                  Shuping Mao and
                  Peng Wang},
  title        = {Small Stretch Problem of the {DCT} Scheme and How to Fix it},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1808},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1808},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenGHSMW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aeog/ZhangFHTPLCY22,
  author       = {Chenxiao Zhang and
                  Yukang Feng and
                  Lei Hu and
                  Deodato Tapete and
                  Li Pan and
                  Zheheng Liang and
                  Francesca Cigna and
                  Peng Yue},
  title        = {A domain adaptation neural network for change detection with heterogeneous
                  optical and {SAR} remote sensing images},
  journal      = {Int. J. Appl. Earth Obs. Geoinformation},
  volume       = {109},
  pages        = {102769},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jag.2022.102769},
  doi          = {10.1016/J.JAG.2022.102769},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aeog/ZhangFHTPLCY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cgf/YeLHX22,
  author       = {Yongjing Ye and
                  Libin Liu and
                  Lei Hu and
                  Shihong Xia},
  title        = {Neural3Points: Learning to Generate Physically Realistic Full-body
                  Motion for Virtual Reality Users},
  journal      = {Comput. Graph. Forum},
  volume       = {41},
  number       = {8},
  pages        = {183--194},
  year         = {2022},
  url          = {https://doi.org/10.1111/cgf.14634},
  doi          = {10.1111/CGF.14634},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cgf/YeLHX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/WeiSWGH22,
  author       = {Man Wei and
                  Siwei Sun and
                  Zihao Wei and
                  Zheng Gong and
                  Lei Hu},
  title        = {A small first-order {DPA} resistant {AES} implementation with no fresh
                  randomness},
  journal      = {Sci. China Inf. Sci.},
  volume       = {65},
  number       = {6},
  pages        = {1--3},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11432-019-1469-7},
  doi          = {10.1007/S11432-019-1469-7},
  timestamp    = {Tue, 11 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/WeiSWGH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/WangZH22,
  author       = {Xiaoqiang Wang and
                  Dabin Zheng and
                  Lei Hu},
  title        = {Several classes of PcN power functions over finite fields},
  journal      = {Discret. Appl. Math.},
  volume       = {322},
  pages        = {171--182},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.dam.2022.08.022},
  doi          = {10.1016/J.DAM.2022.08.022},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dam/WangZH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gis/GaoYCZSJHFL22,
  author       = {Fan Gao and
                  Peng Yue and
                  Zhipeng Cao and
                  Shuaifeng Zhao and
                  Boyi Shangguan and
                  Liangcun Jiang and
                  Lei Hu and
                  Zhe Fang and
                  Zheheng Liang},
  title        = {A multi-source spatio-temporal data cube for large-scale geospatial
                  analysis},
  journal      = {Int. J. Geogr. Inf. Sci.},
  volume       = {36},
  number       = {9},
  pages        = {1853--1884},
  year         = {2022},
  url          = {https://doi.org/10.1080/13658816.2022.2087222},
  doi          = {10.1080/13658816.2022.2087222},
  timestamp    = {Tue, 06 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/gis/GaoYCZSJHFL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gis/YueSHJZCP22,
  author       = {Peng Yue and
                  Boyi Shangguan and
                  Lei Hu and
                  Liangcun Jiang and
                  Chenxiao Zhang and
                  Zhipeng Cao and
                  Yinyin Pan},
  title        = {Towards a training data model for artificial intelligence in earth
                  observation},
  journal      = {Int. J. Geogr. Inf. Sci.},
  volume       = {36},
  number       = {11},
  pages        = {2113--2137},
  year         = {2022},
  url          = {https://doi.org/10.1080/13658816.2022.2087223},
  doi          = {10.1080/13658816.2022.2087223},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/gis/YueSHJZCP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceee/ChenHZCZL22,
  author       = {Yan Chen and
                  Lei Hu and
                  Yong Zheng and
                  Zhanhao Cao and
                  Zhiyang Zhou and
                  Hui Lan},
  title        = {Nonlinear dynamic behavior analysis of photovoltaic quasi Z-source
                  inverter},
  journal      = {{IEICE} Electron. Express},
  volume       = {19},
  number       = {18},
  pages        = {20220255},
  year         = {2022},
  url          = {https://doi.org/10.1587/elex.19.20220255},
  doi          = {10.1587/ELEX.19.20220255},
  timestamp    = {Wed, 15 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieiceee/ChenHZCZL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijon/ZhongHX22,
  author       = {Chongyang Zhong and
                  Lei Hu and
                  Shihong Xia},
  title        = {Spatial-temporal modeling for prediction of stylized human motion},
  journal      = {Neurocomputing},
  volume       = {511},
  pages        = {34--42},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.neucom.2022.08.075},
  doi          = {10.1016/J.NEUCOM.2022.08.075},
  timestamp    = {Wed, 12 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijon/ZhongHX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/remotesensing/HuFZJY22,
  author       = {Lei Hu and
                  Zhe Fang and
                  Mingda Zhang and
                  Liangcun Jiang and
                  Peng Yue},
  title        = {Facilitating Typhoon-Triggered Flood Disaster-Ready Information Delivery
                  Using {SDI} Services Approach - {A} Case Study in Hainan},
  journal      = {Remote. Sens.},
  volume       = {14},
  number       = {8},
  pages        = {1832},
  year         = {2022},
  url          = {https://doi.org/10.3390/rs14081832},
  doi          = {10.3390/RS14081832},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/remotesensing/HuFZJY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/remotesensing/WangYZSSLHQX22,
  author       = {Shu Wang and
                  Xinrong Yan and
                  Yunqiang Zhu and
                  Jia Song and
                  Kai Sun and
                  Weirong Li and
                  Lei Hu and
                  Yanmin Qi and
                  Huiyao Xu},
  title        = {New Era for Geo-Parsing to Obtain Actual Locations: {A} Novel Toponym
                  Correction Method Based on Remote Sensing Images},
  journal      = {Remote. Sens.},
  volume       = {14},
  number       = {19},
  pages        = {4725},
  year         = {2022},
  url          = {https://doi.org/10.3390/rs14194725},
  doi          = {10.3390/RS14194725},
  timestamp    = {Fri, 15 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/remotesensing/WangYZSSLHQX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/remotesensing/LingHCCY22,
  author       = {Jie Ling and
                  Lei Hu and
                  Lang Cheng and
                  Minghui Chen and
                  Xin Yang},
  title        = {IRA-MRSNet: {A} Network Model for Change Detection in High-Resolution
                  Remote Sensing Images},
  journal      = {Remote. Sens.},
  volume       = {14},
  number       = {21},
  pages        = {5598},
  year         = {2022},
  url          = {https://doi.org/10.3390/rs14215598},
  doi          = {10.3390/RS14215598},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/remotesensing/LingHCCY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/HuWCHJ22,
  author       = {Lei Hu and
                  Ligui Wang and
                  Yanlu Chen and
                  Niaoqing Hu and
                  Yu Jiang},
  title        = {Bearing Fault Diagnosis Using Piecewise Aggregate Approximation and
                  Complete Ensemble Empirical Mode Decomposition with Adaptive Noise},
  journal      = {Sensors},
  volume       = {22},
  number       = {17},
  pages        = {6599},
  year         = {2022},
  url          = {https://doi.org/10.3390/s22176599},
  doi          = {10.3390/S22176599},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/HuWCHJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/staeors/HuNRDZZL22,
  author       = {Lei Hu and
                  Chuang Niu and
                  Shenghan Ren and
                  Minghao Dong and
                  Changli Zheng and
                  Wei Zhang and
                  Jimin Liang},
  title        = {Discriminative Context-Aware Network for Target Extraction in Remote
                  Sensing Imagery},
  journal      = {{IEEE} J. Sel. Top. Appl. Earth Obs. Remote. Sens.},
  volume       = {15},
  pages        = {700--715},
  year         = {2022},
  url          = {https://doi.org/10.1109/JSTARS.2021.3138187},
  doi          = {10.1109/JSTARS.2021.3138187},
  timestamp    = {Mon, 16 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/staeors/HuNRDZZL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/XuSH22,
  author       = {Jun Xu and
                  Santanu Sarkar and
                  Lei Hu},
  title        = {Revisiting orthogonal lattice attacks on approximate common divisor
                  problems},
  journal      = {Theor. Comput. Sci.},
  volume       = {911},
  pages        = {55--69},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.tcs.2022.02.005},
  doi          = {10.1016/J.TCS.2022.02.005},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/XuSH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/SunHHTD22,
  author       = {Dengdi Sun and
                  Jiale Huang and
                  Lei Hu and
                  Jin Tang and
                  Zhuanlian Ding},
  title        = {Multitask Multigranularity Aggregation With Global-Guided Attention
                  for Video Person Re-Identification},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {32},
  number       = {11},
  pages        = {7758--7771},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCSVT.2022.3183011},
  doi          = {10.1109/TCSVT.2022.3183011},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcsv/SunHHTD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tgrs/JiangHZY22,
  author       = {Yu Jiang and
                  Lei Hu and
                  Yongmei Zhang and
                  Xin Yang},
  title        = {WRICNet: {A} Weighted Rich-Scale Inception Coder Network for Remote
                  Sensing Image Change Detection},
  journal      = {{IEEE} Trans. Geosci. Remote. Sens.},
  volume       = {60},
  pages        = {1--13},
  year         = {2022},
  url          = {https://doi.org/10.1109/tgrs.2022.3145652},
  doi          = {10.1109/TGRS.2022.3145652},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tgrs/JiangHZY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/HuaDSZHW22,
  author       = {Jialiang Hua and
                  Xiaoyang Dong and
                  Siwei Sun and
                  Zhiyu Zhang and
                  Lei Hu and
                  Xiaoyun Wang},
  title        = {Improved {MITM} Cryptanalysis on Streebog},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {2},
  pages        = {63--91},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i2.63-91},
  doi          = {10.46586/TOSC.V2022.I2.63-91},
  timestamp    = {Thu, 30 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/HuaDSZHW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/YangSSSH22,
  author       = {Qianqian Yang and
                  Ling Song and
                  Siwei Sun and
                  Danping Shi and
                  Lei Hu},
  title        = {New Properties of the Double Boomerang Connectivity Table},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {4},
  pages        = {208--242},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i4.208-242},
  doi          = {10.46586/TOSC.V2022.I4.208-242},
  timestamp    = {Tue, 10 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/YangSSSH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wc/LiHSEZPH22,
  author       = {Guyue Li and
                  Lei Hu and
                  Paul Staat and
                  Harald Elders{-}Boll and
                  Christian T. Zenger and
                  Christof Paar and
                  Aiqun Hu},
  title        = {Reconfigurable Intelligent Surface for Physical Layer Key Generation:
                  Constructive or Destructive?},
  journal      = {{IEEE} Wirel. Commun.},
  volume       = {29},
  number       = {4},
  pages        = {146--153},
  year         = {2022},
  url          = {https://doi.org/10.1109/MWC.007.2100545},
  doi          = {10.1109/MWC.007.2100545},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wc/LiHSEZPH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/SongZYSZHW22,
  author       = {Ling Song and
                  Nana Zhang and
                  Qianqian Yang and
                  Danping Shi and
                  Jiahao Zhao and
                  Lei Hu and
                  Jian Weng},
  editor       = {Shweta Agrawal and
                  Dongdai Lin},
  title        = {Optimizing Rectangle Attacks: {A} Unified and Generic Framework for
                  Key Recovery},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13791},
  pages        = {410--440},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22963-3\_14},
  doi          = {10.1007/978-3-031-22963-3\_14},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/SongZYSZHW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/XuSWH22,
  author       = {Jun Xu and
                  Santanu Sarkar and
                  Huaxiong Wang and
                  Lei Hu},
  editor       = {Shweta Agrawal and
                  Dongdai Lin},
  title        = {Improving Bounds on Elliptic Curve Hidden Number Problem for {ECDH}
                  Key Exchange},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13793},
  pages        = {771--799},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22969-5\_26},
  doi          = {10.1007/978-3-031-22969-5\_26},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/XuSWH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cikm/BiZZHZN0W22,
  author       = {Xin Bi and
                  Shining Zhang and
                  Yu Zhang and
                  Lei Hu and
                  Wei Zhang and
                  Wenjing Niu and
                  Ye Yuan and
                  Guoren Wang},
  editor       = {Mohammad Al Hasan and
                  Li Xiong},
  title        = {CASA-Net: {A} Context-Aware Correlation Convolutional Network for
                  Scale-Adaptive Crack Detection},
  booktitle    = {Proceedings of the 31st {ACM} International Conference on Information
                  {\&} Knowledge Management, Atlanta, GA, USA, October 17-21, 2022},
  pages        = {67--76},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3511808.3557252},
  doi          = {10.1145/3511808.3557252},
  timestamp    = {Wed, 19 Oct 2022 12:52:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cikm/BiZZHZN0W22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cinc/HuCLL22,
  author       = {Lei Hu and
                  Wenjie Cai and
                  Xinyue Li and
                  Jia Li},
  title        = {Detection of Murmurs from Heart Sound Recordings with Deep Residual
                  Networks},
  booktitle    = {Computing in Cardiology, CinC 2022, Tampere, Finland, September 4-7,
                  2022},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.22489/CinC.2022.047},
  doi          = {10.22489/CINC.2022.047},
  timestamp    = {Tue, 18 Apr 2023 21:53:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cinc/HuCLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/GaoXH22,
  author       = {Jing Gao and
                  Jun Xu and
                  Lei Hu},
  editor       = {Yi Deng and
                  Moti Yung},
  title        = {Inferring Sequences Produced by the Quadratic Generator},
  booktitle    = {Information Security and Cryptology - 18th International Conference,
                  Inscrypt 2022, Beijing, China, December 11-13, 2022, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13837},
  pages        = {483--494},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-26553-2\_26},
  doi          = {10.1007/978-3-031-26553-2\_26},
  timestamp    = {Fri, 10 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/GaoXH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cvpr/ZhongHZYX22,
  author       = {Chongyang Zhong and
                  Lei Hu and
                  Zihao Zhang and
                  Yongjing Ye and
                  Shihong Xia},
  title        = {Spatio-Temporal Gating-Adjacency {GCN} for Human Motion Prediction},
  booktitle    = {{IEEE/CVF} Conference on Computer Vision and Pattern Recognition,
                  {CVPR} 2022, New Orleans, LA, USA, June 18-24, 2022},
  pages        = {6437--6446},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CVPR52688.2022.00634},
  doi          = {10.1109/CVPR52688.2022.00634},
  timestamp    = {Wed, 05 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cvpr/ZhongHZYX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eccv/ZhongHZX22,
  author       = {Chongyang Zhong and
                  Lei Hu and
                  Zihao Zhang and
                  Shihong Xia},
  editor       = {Shai Avidan and
                  Gabriel J. Brostow and
                  Moustapha Ciss{\'{e}} and
                  Giovanni Maria Farinella and
                  Tal Hassner},
  title        = {Learning Uncoupled-Modulation {CVAE} for 3D Action-Conditioned Human
                  Motion Synthesis},
  booktitle    = {Computer Vision - {ECCV} 2022 - 17th European Conference, Tel Aviv,
                  Israel, October 23-27, 2022, Proceedings, Part {XXI}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13681},
  pages        = {716--732},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-19803-8\_42},
  doi          = {10.1007/978-3-031-19803-8\_42},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eccv/ZhongHZX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/HuLQNH22,
  author       = {Lei Hu and
                  Guyue Li and
                  Xuewen Qian and
                  Derrick Wing Kwan Ng and
                  Aiqun Hu},
  title        = {Joint Transmit and Reflective Beamforming for RIS-assisted Secret
                  Key Generation},
  booktitle    = {{IEEE} Global Communications Conference, {GLOBECOM} 2022, Rio de Janeiro,
                  Brazil, December 4-8, 2022},
  pages        = {2352--2357},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/GLOBECOM48099.2022.10001434},
  doi          = {10.1109/GLOBECOM48099.2022.10001434},
  timestamp    = {Tue, 17 Jan 2023 08:56:31 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/HuLQNH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icait/ZhangZPWLHW22,
  author       = {Jin Zhang and
                  Depei Zhang and
                  Xiaoniu Peng and
                  Anle Wang and
                  Xiaotong Liu and
                  Lei Hu and
                  Yalan Wang},
  title        = {A High Dynamic Range Phase Modulated Analog Photonic Link Based on
                  {IMD3} and {IMD5} Suppression},
  booktitle    = {14th {IEEE} International Conference on Advanced Infocomm Technology,
                  {ICAIT} 2022, Chongqing, China, July 8-11, 2022},
  pages        = {99--102},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICAIT56197.2022.9862668},
  doi          = {10.1109/ICAIT56197.2022.9862668},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icait/ZhangZPWLHW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/GaoXWH22,
  author       = {Jing Gao and
                  Jun Xu and
                  Tianyu Wang and
                  Lei Hu},
  editor       = {Cristina Alcaraz and
                  Liqun Chen and
                  Shujun Li and
                  Pierangela Samarati},
  title        = {New Results of Breaking the {CLS} Scheme from {ACM-CCS} 2014},
  booktitle    = {Information and Communications Security - 24th International Conference,
                  {ICICS} 2022, Canterbury, UK, September 5-8, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13407},
  pages        = {37--54},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15777-6\_3},
  doi          = {10.1007/978-3-031-15777-6\_3},
  timestamp    = {Fri, 10 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/GaoXWH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/GuoWHY22,
  author       = {Tingting Guo and
                  Peng Wang and
                  Lei Hu and
                  Dingfeng Ye},
  editor       = {Takanori Isobe and
                  Santanu Sarkar},
  title        = {Quantum Attacks on PRFs Based on Public Random Permutations},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2022 - 23rd International Conference
                  on Cryptology in India, Kolkata, India, December 11-14, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13774},
  pages        = {566--591},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22912-1\_25},
  doi          = {10.1007/978-3-031-22912-1\_25},
  timestamp    = {Mon, 09 Jan 2023 17:58:33 +0100},
  biburl       = {https://dblp.org/rec/conf/indocrypt/GuoWHY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/MaoGWH22,
  author       = {Shuping Mao and
                  Tingting Guo and
                  Peng Wang and
                  Lei Hu},
  editor       = {Jung Hee Cheon and
                  Thomas Johansson},
  title        = {Quantum Attacks on Lai-Massey Structure},
  booktitle    = {Post-Quantum Cryptography - 13th International Workshop, PQCrypto
                  2022, Virtual Event, September 28-30, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13512},
  pages        = {205--229},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17234-2\_11},
  doi          = {10.1007/978-3-031-17234-2\_11},
  timestamp    = {Sun, 12 Nov 2023 02:15:49 +0100},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/MaoGWH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WangHGH22,
  author       = {Mengfan Wang and
                  Guifang Huang and
                  Hongmin Gao and
                  Lei Hu},
  title        = {Improved Zero-Knowledge Proofs for Commitments from Learning Parity
                  with Noise},
  booktitle    = {{IEEE} International Conference on Trust, Security and Privacy in
                  Computing and Communications, TrustCom 2022, Wuhan, China, December
                  9-11, 2022},
  pages        = {415--421},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00064},
  doi          = {10.1109/TRUSTCOM56396.2022.00064},
  timestamp    = {Mon, 27 Mar 2023 16:44:39 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/WangHGH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/HouLDHH22,
  author       = {Yujie Hou and
                  Guyue Li and
                  Shuping Dang and
                  Lei Hu and
                  Aiqun Hu},
  title        = {Physical Layer Encryption Scheme Based on Dynamic Constellation Rotation},
  booktitle    = {96th Vehicular Technology Conference, {VTC} Fall 2022, London, United
                  Kingdom, September 26-29, 2022},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/VTC2022-Fall57202.2022.10012740},
  doi          = {10.1109/VTC2022-FALL57202.2022.10012740},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vtc/HouLDHH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2203-01474,
  author       = {Chongyang Zhong and
                  Lei Hu and
                  Zihao Zhang and
                  Yongjing Ye and
                  Shihong Xia},
  title        = {Spatial-Temporal Gating-Adjacency {GCN} for Human Motion Prediction},
  journal      = {CoRR},
  volume       = {abs/2203.01474},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2203.01474},
  doi          = {10.48550/ARXIV.2203.01474},
  eprinttype    = {arXiv},
  eprint       = {2203.01474},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2203-01474.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2207-11752,
  author       = {Lei Hu and
                  Guyue Li and
                  Xuewen Qian and
                  Derrick Wing Kwan Ng and
                  Aiqun Hu},
  title        = {Joint Transmit and Reflective Beamforming for RIS-assisted Secret
                  Key Generation},
  journal      = {CoRR},
  volume       = {abs/2207.11752},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2207.11752},
  doi          = {10.48550/ARXIV.2207.11752},
  eprinttype    = {arXiv},
  eprint       = {2207.11752},
  timestamp    = {Mon, 01 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2207-11752.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2209-05753,
  author       = {Yongjing Ye and
                  Libin Liu and
                  Lei Hu and
                  Shihong Xia},
  title        = {Neural3Points: Learning to Generate Physically Realistic Full-body
                  Motion for Virtual Reality Users},
  journal      = {CoRR},
  volume       = {abs/2209.05753},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2209.05753},
  doi          = {10.48550/ARXIV.2209.05753},
  eprinttype    = {arXiv},
  eprint       = {2209.05753},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2209-05753.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-03132,
  author       = {Lei Hu and
                  Guyue Li and
                  Xuewen Qian and
                  Aiqun Hu and
                  Derrick Wing Kwan Ng},
  title        = {Reconfigurable Intelligent Surface-Assisted Secret Key Generation
                  in Spatially Correlated Channels},
  journal      = {CoRR},
  volume       = {abs/2211.03132},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.03132},
  doi          = {10.48550/ARXIV.2211.03132},
  eprinttype    = {arXiv},
  eprint       = {2211.03132},
  timestamp    = {Wed, 09 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-03132.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YeXHH22,
  author       = {Dingfeng Ye and
                  Jun Xu and
                  Guifang Huang and
                  Lei Hu},
  title        = {Lattice Signature can be as Simple as Lattice Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {97},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/097},
  timestamp    = {Fri, 10 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/YeXHH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoWHY22,
  author       = {Tingting Guo and
                  Peng Wang and
                  Lei Hu and
                  Dingfeng Ye},
  title        = {Quantum Attacks on PRFs Based on Public Random Permutations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {442},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/442},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoWHY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuaDSZHW22,
  author       = {Jialiang Hua and
                  Xiaoyang Dong and
                  Siwei Sun and
                  Zhiyu Zhang and
                  Lei Hu and
                  Xiaoyun Wang},
  title        = {Improved {MITM} Cryptanalysis on Streebog},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {568},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/568},
  timestamp    = {Mon, 16 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuaDSZHW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SongZYSZHW22,
  author       = {Ling Song and
                  Nana Zhang and
                  Qianqian Yang and
                  Danping Shi and
                  Jiahao Zhao and
                  Lei Hu and
                  Jian Weng},
  title        = {Optimizing Rectangle Attacks: {A} Unified and Generic Framework for
                  Key Recovery},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {723},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/723},
  timestamp    = {Mon, 20 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SongZYSZHW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaoG0H22,
  author       = {Shuping Mao and
                  Tingting Guo and
                  Peng Wang and
                  Lei Hu},
  title        = {Quantum Attacks on Lai-Massey Structure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {986},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/986},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaoG0H22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/00220WH22,
  author       = {Jun Xu and
                  Santanu Sarkar and
                  Huaxiong Wang and
                  Lei Hu},
  title        = {Improving Bounds on Elliptic Curve Hidden Number Problem for {ECDH}
                  Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1239},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1239},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/00220WH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SunLGHJHZY22,
  author       = {Siwei Sun and
                  Tianyu Liu and
                  Zhi Guan and
                  Yifei He and
                  Jiwu Jing and
                  Lei Hu and
                  Zhenfeng Zhang and
                  Hailun Yan},
  title        = {{LMS-SM3} and {HSS-SM3:} Instantiating Hash-based Post-Quantum Signature
                  Schemes with {SM3}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1491},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1491},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SunLGHJHZY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SunLGHJHZY22a,
  author       = {Siwei Sun and
                  Tianyu Liu and
                  Zhi Guan and
                  Yifei He and
                  Jiwu Jing and
                  Lei Hu and
                  Zhenfeng Zhang and
                  Hailun Yan},
  title        = {{XMSS-SM3} and {MT-XMSS-SM3:} Instantiating Extended Merkle Signature
                  Schemes with {SM3}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1552},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1552},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SunLGHJHZY22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangSSSH22,
  author       = {Qianqian Yang and
                  Ling Song and
                  Siwei Sun and
                  Danping Shi and
                  Lei Hu},
  title        = {New Properties of Double Boomerang Connectivity Table},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1579},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1579},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/YangSSSH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/DaiYHMWLZYHZW21,
  author       = {Shaotao Dai and
                  Xufeng Yan and
                  Zhiyong Hong and
                  Tao Ma and
                  Rui Wu and
                  Zhongyu Li and
                  Zhibin Zeng and
                  Ping Yang and
                  Lei Hu and
                  Teng Zhang and
                  Bangzhu Wang},
  title        = {Development and Test of One Commercial Megawatt Superconducting {DC}
                  Induction Heater With Extra High Energy Efficiency},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {3301--3314},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2020.3047685},
  doi          = {10.1109/ACCESS.2020.3047685},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/DaiYHMWLZYHZW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/QuGCZYHZ21,
  author       = {Hao Qu and
                  Baoduo Geng and
                  Bingrong Chen and
                  Jian Zhang and
                  Yongliang Yang and
                  Lei Hu and
                  Yu Zhao},
  title        = {Force Perception and Bone Recognition of Vertebral Lamina Milling
                  by Robot-Assisted Ultrasonic Bone Scalpel Based on Backpropagation
                  Neural Network},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {52101--52112},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3069549},
  doi          = {10.1109/ACCESS.2021.3069549},
  timestamp    = {Tue, 25 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/QuGCZYHZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhengLHZ21,
  author       = {Gongliang Zheng and
                  Jingtao Lei and
                  Lei Hu and
                  Lihai Zhang},
  title        = {Fuzzy Adaptive Sliding Mode Impedance Control of Fracture Reduction
                  Robot},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {113653--113665},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3099692},
  doi          = {10.1109/ACCESS.2021.3099692},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZhengLHZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aeog/ZhaoHDHWZ21,
  author       = {Jinling Zhao and
                  Lei Hu and
                  Yingying Dong and
                  Linsheng Huang and
                  Shizhuang Weng and
                  Dongyan Zhang},
  title        = {A combination method of stacked autoencoder and 3D deep residual network
                  for hyperspectral image classification},
  journal      = {Int. J. Appl. Earth Obs. Geoinformation},
  volume       = {102},
  pages        = {102459},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jag.2021.102459},
  doi          = {10.1016/J.JAG.2021.102459},
  timestamp    = {Thu, 17 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aeog/ZhaoHDHWZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/asc/SunYH21,
  author       = {Maohua Sun and
                  Ruidi Yang and
                  Lei Hu},
  title        = {A secure distributed machine learning protocol against static semi-honest
                  adversaries},
  journal      = {Appl. Soft Comput.},
  volume       = {102},
  pages        = {107095},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.asoc.2021.107095},
  doi          = {10.1016/J.ASOC.2021.107095},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/asc/SunYH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/axioms/HuHZ21,
  author       = {Lei Hu and
                  Yaozhen Han and
                  Shuqin Zhang},
  title        = {On the Existence of Coupled Fractional Jerk Equations with Multi-Point
                  Boundary Conditions},
  journal      = {Axioms},
  volume       = {10},
  number       = {2},
  pages        = {103},
  year         = {2021},
  url          = {https://doi.org/10.3390/axioms10020103},
  doi          = {10.3390/AXIOMS10020103},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/axioms/HuHZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/WeiSWH21,
  author       = {Man Wei and
                  Siwei Sun and
                  Zihao Wei and
                  Lei Hu},
  title        = {Unbalanced sharing: a threshold implementation of {SM4}},
  journal      = {Sci. China Inf. Sci.},
  volume       = {64},
  number       = {5},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11432-018-9794-6},
  doi          = {10.1007/S11432-018-9794-6},
  timestamp    = {Mon, 06 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/WeiSWH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhaH21,
  author       = {Zhengbang Zha and
                  Lei Hu},
  title        = {Some classes of power functions with low c-differential uniformity
                  over finite fields},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {6},
  pages        = {1193--1210},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00866-8},
  doi          = {10.1007/S10623-021-00866-8},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhaH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SongTSH21,
  author       = {Ling Song and
                  Yi Tu and
                  Danping Shi and
                  Lei Hu},
  title        = {Security analysis of Subterranean 2.0},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {8},
  pages        = {1875--1905},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00892-6},
  doi          = {10.1007/S10623-021-00892-6},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/SongTSH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ffa/ZhaHLC21,
  author       = {Zhengbang Zha and
                  Lei Hu and
                  Yan Liu and
                  Xiwang Cao},
  title        = {Further results on optimal ternary cyclic codes},
  journal      = {Finite Fields Their Appl.},
  volume       = {75},
  pages        = {101898},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ffa.2021.101898},
  doi          = {10.1016/J.FFA.2021.101898},
  timestamp    = {Fri, 27 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ffa/ZhaHLC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijgi/YanYHZJG21,
  author       = {Zheren Yan and
                  Can Yang and
                  Lei Hu and
                  Jing Zhao and
                  Liangcun Jiang and
                  Jianya Gong},
  title        = {The Integration of Linguistic and Geospatial Features Using Global
                  Context Embedding for Automated Text Geocoding},
  journal      = {{ISPRS} Int. J. Geo Inf.},
  volume       = {10},
  number       = {9},
  pages        = {572},
  year         = {2021},
  url          = {https://doi.org/10.3390/ijgi10090572},
  doi          = {10.3390/IJGI10090572},
  timestamp    = {Mon, 18 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijgi/YanYHZJG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijgi/HuXBP21,
  author       = {Lei Hu and
                  Jun Xu and
                  Chao Bao and
                  Tao Pei},
  title        = {Influential Factor Detection for Tourism on the Qinghai-Tibet Plateau
                  Based on Social Media Data},
  journal      = {{ISPRS} Int. J. Geo Inf.},
  volume       = {10},
  number       = {9},
  pages        = {579},
  year         = {2021},
  url          = {https://doi.org/10.3390/ijgi10090579},
  doi          = {10.3390/IJGI10090579},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijgi/HuXBP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijgi/XuH21,
  author       = {Jun Xu and
                  Lei Hu},
  title        = {Geospatial Semantics Analysis of the Qinghai-Tibetan Plateau Based
                  on Microblog Short Texts},
  journal      = {{ISPRS} Int. J. Geo Inf.},
  volume       = {10},
  number       = {10},
  pages        = {682},
  year         = {2021},
  url          = {https://doi.org/10.3390/ijgi10100682},
  doi          = {10.3390/IJGI10100682},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijgi/XuH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijim/HuP21,
  author       = {Lei Hu and
                  Manoch Prompanyo},
  title        = {The Influence of Sports Activities on College Students' Social Adaptability},
  journal      = {Int. J. Interact. Mob. Technol.},
  volume       = {15},
  number       = {14},
  pages        = {204},
  year         = {2021},
  url          = {https://doi.org/10.3991/ijim.v15i14.24801},
  doi          = {10.3991/IJIM.V15I14.24801},
  timestamp    = {Tue, 09 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijim/HuP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mis/HuX21,
  author       = {Lei Hu and
                  Xianling Xia},
  title        = {5G-Oriented IoT Big Data Analysis Method System},
  journal      = {Mob. Inf. Syst.},
  volume       = {2021},
  pages        = {3186696:1--3186696:9},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/3186696},
  doi          = {10.1155/2021/3186696},
  timestamp    = {Wed, 06 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mis/HuX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/remotesensing/YangHZL21,
  author       = {Xin Yang and
                  Lei Hu and
                  Yongmei Zhang and
                  Yunqing Li},
  title        = {MRA-SNet: Siamese Networks of Multiscale Residual and Attention for
                  Change Detection in High-Resolution Remote Sensing Images},
  journal      = {Remote. Sens.},
  volume       = {13},
  number       = {22},
  pages        = {4528},
  year         = {2021},
  url          = {https://doi.org/10.3390/rs13224528},
  doi          = {10.3390/RS13224528},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/remotesensing/YangHZL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/remotesensing/ZhangDZPHHHFC21,
  author       = {Yahao Zhang and
                  Yuanyong Dian and
                  Jingjing Zhou and
                  Shoulian Peng and
                  Yue Hu and
                  Lei Hu and
                  Zemin Han and
                  Xinwei Fang and
                  Hongxia Cui},
  title        = {Characterizing Spatial Patterns of Pine Wood Nematode Outbreaks in
                  Subtropical Zone in China},
  journal      = {Remote. Sens.},
  volume       = {13},
  number       = {22},
  pages        = {4682},
  year         = {2021},
  url          = {https://doi.org/10.3390/rs13224682},
  doi          = {10.3390/RS13224682},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/remotesensing/ZhangDZPHHHFC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/remotesensing/ZhaoHDH21,
  author       = {Jinling Zhao and
                  Lei Hu and
                  Yingying Dong and
                  Linsheng Huang},
  title        = {Hybrid Dense Network with Dual Attention for Hyperspectral Image Classification},
  journal      = {Remote. Sens.},
  volume       = {13},
  number       = {23},
  pages        = {4921},
  year         = {2021},
  url          = {https://doi.org/10.3390/rs13234921},
  doi          = {10.3390/RS13234921},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/remotesensing/ZhaoHDH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/ZhaoHZF21,
  author       = {Tianliu Zhao and
                  Lei Hu and
                  Yongmei Zhang and
                  Jianying Fang},
  title        = {Super-Resolution Network with Information Distillation and Multi-Scale
                  Attention for Medical {CT} Image},
  journal      = {Sensors},
  volume       = {21},
  number       = {20},
  pages        = {6870},
  year         = {2021},
  url          = {https://doi.org/10.3390/s21206870},
  doi          = {10.3390/S21206870},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/ZhaoHZF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/agro-geoinformatics/FangHHT21,
  author       = {Zhe Fang and
                  Lianlian He and
                  Lei Hu and
                  Tianyu Tuo},
  title        = {Developing Geospatial Web Services for Automatic Flood Mapping using
                  Sentinel-1 Images},
  booktitle    = {9th International Conference on Agro-Geoinformatics, Agro-Geoinformatics
                  2021, Shenzhen, China, July 26-29, 2021},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/Agro-Geoinformatics50104.2021.9530305},
  doi          = {10.1109/AGRO-GEOINFORMATICS50104.2021.9530305},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/agro-geoinformatics/FangHHT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/QinCZPHD21,
  author       = {Yue Qin and
                  Chi Cheng and
                  Xiaohan Zhang and
                  Yanbin Pan and
                  Lei Hu and
                  Jintai Ding},
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based
                  {NIST} Candidate KEMs},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13093},
  pages        = {92--121},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92068-5\_4},
  doi          = {10.1007/978-3-030-92068-5\_4},
  timestamp    = {Fri, 03 Dec 2021 17:36:41 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/QinCZPHD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DongZSWWH21,
  author       = {Xiaoyang Dong and
                  Zhiyu Zhang and
                  Siwei Sun and
                  Congming Wei and
                  Xiaoyun Wang and
                  Lei Hu},
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {Automatic Classical and Quantum Rebound Attacks on AES-Like Hashing
                  by Exploiting Related-Key Differentials},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13090},
  pages        = {241--271},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92062-3\_9},
  doi          = {10.1007/978-3-030-92062-3\_9},
  timestamp    = {Mon, 28 Aug 2023 21:17:52 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DongZSWWH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DongHSLWH21,
  author       = {Xiaoyang Dong and
                  Jialiang Hua and
                  Siwei Sun and
                  Zheng Li and
                  Xiaoyun Wang and
                  Lei Hu},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Meet-in-the-Middle Attacks Revisited: Key-Recovery, Collision, and
                  Preimage Attacks},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12827},
  pages        = {278--308},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84252-9\_10},
  doi          = {10.1007/978-3-030-84252-9\_10},
  timestamp    = {Fri, 03 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/DongHSLWH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccai/LiHDF21,
  author       = {Jun Li and
                  Lei Hu and
                  Wenrui Dai and
                  Bin Fan},
  title        = {Research on Intelligent Assignment Method of Radar Jamming Task in
                  Electronic Air Defense Operation},
  booktitle    = {{ICCAI} '21: 2021 7th International Conference on Computing and Artificial
                  Intelligence, Tianjin China, April 23 - 26, 2021},
  pages        = {483--486},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3467707.3467780},
  doi          = {10.1145/3467707.3467780},
  timestamp    = {Tue, 28 Sep 2021 15:20:57 +0200},
  biburl       = {https://dblp.org/rec/conf/iccai/LiHDF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/ZhangH0X21,
  author       = {Zihao Zhang and
                  Lei Hu and
                  Xiaoming Deng and
                  Shihong Xia},
  editor       = {Zhi{-}Hua Zhou},
  title        = {Sequential 3D Human Pose Estimation Using Adaptive Point Cloud Sampling
                  Strategy},
  booktitle    = {Proceedings of the Thirtieth International Joint Conference on Artificial
                  Intelligence, {IJCAI} 2021, Virtual Event / Montreal, Canada, 19-27
                  August 2021},
  pages        = {1330--1337},
  publisher    = {ijcai.org},
  year         = {2021},
  url          = {https://doi.org/10.24963/ijcai.2021/184},
  doi          = {10.24963/IJCAI.2021/184},
  timestamp    = {Wed, 25 Aug 2021 17:11:16 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcai/ZhangH0X21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ZhangLQZSH21,
  author       = {Yingjie Zhang and
                  Lijun Lyu and
                  Kexin Qiao and
                  Zhiyu Zhang and
                  Siwei Sun and
                  Lei Hu},
  editor       = {Robert H. Deng and
                  Feng Bao and
                  Guilin Wang and
                  Jian Shen and
                  Mark Ryan and
                  Weizhi Meng and
                  Ding Wang},
  title        = {Automatic Key Recovery of Feistel Ciphers: Application to {SIMON}
                  and {SIMECK}},
  booktitle    = {Information Security Practice and Experience: 16th International Conference,
                  {ISPEC} 2021, Nanjing, China, December 17-19, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13107},
  pages        = {147--167},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-93206-0\_10},
  doi          = {10.1007/978-3-030-93206-0\_10},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/ZhangLQZSH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/WangLXHTZ21,
  author       = {Tianyu Wang and
                  Yuejun Liu and
                  Jun Xu and
                  Lei Hu and
                  Yang Tao and
                  Yongbin Zhou},
  editor       = {Joseph K. Liu and
                  Sokratis K. Katsikas and
                  Weizhi Meng and
                  Willy Susilo and
                  Rolly Intan},
  title        = {Integer {LWE} with Non-subgaussian Error and Related Attacks},
  booktitle    = {Information Security - 24th International Conference, {ISC} 2021,
                  Virtual Event, November 10-12, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13118},
  pages        = {3--25},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-91356-4\_1},
  doi          = {10.1007/978-3-030-91356-4\_1},
  timestamp    = {Fri, 10 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/WangLXHTZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mm/HuHWLN21,
  author       = {Lei Hu and
                  Shaoli Huang and
                  Shilei Wang and
                  Wei Liu and
                  Jifeng Ning},
  editor       = {Heng Tao Shen and
                  Yueting Zhuang and
                  John R. Smith and
                  Yang Yang and
                  Pablo C{\'{e}}sar and
                  Florian Metze and
                  Balakrishnan Prabhakaran},
  title        = {Do We Really Need Frame-by-Frame Annotation Datasets for Object Tracking?},
  booktitle    = {{MM} '21: {ACM} Multimedia Conference, Virtual Event, China, October
                  20 - 24, 2021},
  pages        = {4949--4957},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3474085.3475365},
  doi          = {10.1145/3474085.3475365},
  timestamp    = {Mon, 22 Apr 2024 21:24:20 +0200},
  biburl       = {https://dblp.org/rec/conf/mm/HuHWLN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/GuoWHY21,
  author       = {Tingting Guo and
                  Peng Wang and
                  Lei Hu and
                  Dingfeng Ye},
  editor       = {Jung Hee Cheon and
                  Jean{-}Pierre Tillich},
  title        = {Attacks on Beyond-Birthday-Bound MACs in the Quantum Setting},
  booktitle    = {Post-Quantum Cryptography - 12th International Workshop, PQCrypto
                  2021, Daejeon, South Korea, July 20-22, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12841},
  pages        = {421--441},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-81293-5\_22},
  doi          = {10.1007/978-3-030-81293-5\_22},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/GuoWHY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smc/HuZGQTSY21,
  author       = {Lei Hu and
                  Dongsheng Zou and
                  Xiwang Guo and
                  Liang Qi and
                  Ying Tang and
                  Haohao Song and
                  Jieying Yuan},
  title        = {Four-way Bidirectional Attention for Multiple-choice Reading Comprehension},
  booktitle    = {2021 {IEEE} International Conference on Systems, Man, and Cybernetics,
                  {SMC} 2021, Melbourne, Australia, October 17-20, 2021},
  pages        = {238--243},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SMC52423.2021.9658632},
  doi          = {10.1109/SMC52423.2021.9658632},
  timestamp    = {Thu, 14 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/smc/HuZGQTSY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/HuLLH21,
  author       = {Lei Hu and
                  Guyue Li and
                  Hongyi Luo and
                  Aiqun Hu},
  title        = {On the {RIS} Manipulating Attack and Its Countermeasures in Physical-layer
                  Key Generation},
  booktitle    = {94th {IEEE} Vehicular Technology Conference, {VTC} Fall 2021, Norman,
                  OK, USA, September 27-30, 2021},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/VTC2021-Fall52928.2021.9625442},
  doi          = {10.1109/VTC2021-FALL52928.2021.9625442},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vtc/HuLLH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/LuoLH21,
  author       = {Hongyi Luo and
                  Guyue Li and
                  Lei Hu},
  title        = {On the Security of RIS-assisted Manipulating Attack in {MISO} systems},
  booktitle    = {94th {IEEE} Vehicular Technology Conference, {VTC} Fall 2021, Norman,
                  OK, USA, September 27-30, 2021},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/VTC2021-Fall52928.2021.9625272},
  doi          = {10.1109/VTC2021-FALL52928.2021.9625272},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vtc/LuoLH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-00511,
  author       = {You Chen and
                  Guyue Li and
                  Cunhua Pan and
                  Lei Hu and
                  Aiqun Hu},
  title        = {Intelligent Reflecting Surface-Assisted Secret Key Generation In Multi-antenna
                  Network},
  journal      = {CoRR},
  volume       = {abs/2105.00511},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.00511},
  eprinttype    = {arXiv},
  eprint       = {2105.00511},
  timestamp    = {Wed, 12 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-00511.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2108-05497,
  author       = {Lei Hu and
                  Guyue Li and
                  Hongyi Luo and
                  Aiqun Hu},
  title        = {On the {RIS} Manipulating Attack and Its Countermeasures in Physical-layer
                  Key Generation},
  journal      = {CoRR},
  volume       = {abs/2108.05497},
  year         = {2021},
  url          = {https://arxiv.org/abs/2108.05497},
  eprinttype    = {arXiv},
  eprint       = {2108.05497},
  timestamp    = {Wed, 18 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2108-05497.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2108-07955,
  author       = {Yu Jiang and
                  Lei Hu and
                  Yongmei Zhang and
                  Xin Yang},
  title        = {WRICNet: {A} Weighted Rich-scale Inception Coder Network for Multi-Resolution
                  Remote Sensing Image Change Detection},
  journal      = {CoRR},
  volume       = {abs/2108.07955},
  year         = {2021},
  url          = {https://arxiv.org/abs/2108.07955},
  eprinttype    = {arXiv},
  eprint       = {2108.07955},
  timestamp    = {Tue, 09 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2108-07955.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2109-08417,
  author       = {Youyang Sha and
                  Yonghong Zhang and
                  Xuquan Ji and
                  Lei Hu},
  title        = {Transformer-Unet: Raw Image Processing with Unet},
  journal      = {CoRR},
  volume       = {abs/2109.08417},
  year         = {2021},
  url          = {https://arxiv.org/abs/2109.08417},
  eprinttype    = {arXiv},
  eprint       = {2109.08417},
  timestamp    = {Wed, 22 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-08417.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2112-10043,
  author       = {Guyue Li and
                  Lei Hu and
                  Paul Staat and
                  Harald Elders{-}Boll and
                  Christian T. Zenger and
                  Christof Paar and
                  Aiqun Hu},
  title        = {Reconfigurable Intelligent Surface for Physical Layer Key Generation:
                  Constructive or Destructive?},
  journal      = {CoRR},
  volume       = {abs/2112.10043},
  year         = {2021},
  url          = {https://arxiv.org/abs/2112.10043},
  eprinttype    = {arXiv},
  eprint       = {2112.10043},
  timestamp    = {Tue, 04 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2112-10043.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/QinCZPHD21,
  author       = {Yue Qin and
                  Chi Cheng and
                  Xiaohan Zhang and
                  Yanbin Pan and
                  Lei Hu and
                  Jintai Ding},
  title        = {A Systematic Approach and Analysis of Key Mismatch Attacks on CPA-Secure
                  Lattice-Based {NIST} Candidate KEMs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {123},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/123},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/QinCZPHD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuNSLH21,
  author       = {Yunwen Liu and
                  Zhongfeng Niu and
                  Siwei Sun and
                  Chao Li and
                  Lei Hu},
  title        = {A Note on the Bias of Rotational Differential-Linear Distinguishers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {379},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/379},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuNSLH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DongHSLWH21,
  author       = {Xiaoyang Dong and
                  Jialiang Hua and
                  Siwei Sun and
                  Zheng Li and
                  Xiaoyun Wang and
                  Lei Hu},
  title        = {Meet-in-the-Middle Attacks Revisited: Focusing on Key-recovery and
                  Collision Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {427},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/427},
  timestamp    = {Wed, 16 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DongHSLWH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DongZSW0H21,
  author       = {Xiaoyang Dong and
                  Zhiyu Zhang and
                  Siwei Sun and
                  Congming Wei and
                  Xiaoyun Wang and
                  Lei Hu},
  title        = {Automatic Classical and Quantum Rebound Attacks on AES-like Hashing
                  by Exploiting Related-key Differentials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1119},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1119},
  timestamp    = {Mon, 06 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DongZSW0H21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/ZhangHHYLK20,
  author       = {Lin Zhang and
                  Lei Hu and
                  Fei Hu and
                  Zhijing Ye and
                  Xin Li and
                  Sunil Kumar},
  title        = {Enhanced {OLSR} routing for airborne networks with multi-beam directional
                  antennas},
  journal      = {Ad Hoc Networks},
  volume       = {102},
  pages        = {102116},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.adhoc.2020.102116},
  doi          = {10.1016/J.ADHOC.2020.102116},
  timestamp    = {Mon, 04 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/ZhangHHYLK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/XuHS20,
  author       = {Jun Xu and
                  Lei Hu and
                  Santanu Sarkar},
  title        = {Cryptanalysis of elliptic curve hidden number problem from {PKC} 2017},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {2},
  pages        = {341--361},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-019-00685-y},
  doi          = {10.1007/S10623-019-00685-Y},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/XuHS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ffa/ZhaH20,
  author       = {Zhengbang Zha and
                  Lei Hu},
  title        = {New classes of optimal ternary cyclic codes with minimum distance
                  four},
  journal      = {Finite Fields Their Appl.},
  volume       = {64},
  pages        = {101671},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ffa.2020.101671},
  doi          = {10.1016/J.FFA.2020.101671},
  timestamp    = {Thu, 23 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ffa/ZhaH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nca/CaoHGWM20,
  author       = {Weipeng Cao and
                  Lei Hu and
                  Jinzhu Gao and
                  Xizhao Wang and
                  Zhong Ming},
  title        = {A study on the relationship between the rank of input data and the
                  performance of random weight neural network},
  journal      = {Neural Comput. Appl.},
  volume       = {32},
  number       = {16},
  pages        = {12685--12696},
  year         = {2020},
  url          = {https://doi.org/10.1007/s00521-020-04719-8},
  doi          = {10.1007/S00521-020-04719-8},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nca/CaoHGWM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/GuoSSSSHW20,
  author       = {Hao Guo and
                  Siwei Sun and
                  Danping Shi and
                  Ling Sun and
                  Yao Sun and
                  Lei Hu and
                  Meiqin Wang},
  title        = {Differential Attacks on {CRAFT} Exploiting the Involutory S-boxes
                  and Tweak Additions},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {3},
  pages        = {119--151},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.i3.119-151},
  doi          = {10.13154/TOSC.V2020.I3.119-151},
  timestamp    = {Mon, 05 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/GuoSSSSHW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvcg/ZhangHDX20,
  author       = {Zihao Zhang and
                  Lei Hu and
                  Xiaoming Deng and
                  Shihong Xia},
  title        = {Weakly Supervised Adversarial Learning for 3D Human Pose Estimation
                  from Point Clouds},
  journal      = {{IEEE} Trans. Vis. Comput. Graph.},
  volume       = {26},
  number       = {5},
  pages        = {1851--1859},
  year         = {2020},
  url          = {https://doi.org/10.1109/TVCG.2020.2973076},
  doi          = {10.1109/TVCG.2020.2973076},
  timestamp    = {Sat, 30 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvcg/ZhangHDX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DongSSGWH20,
  author       = {Xiaoyang Dong and
                  Siwei Sun and
                  Danping Shi and
                  Fei Gao and
                  Xiaoyun Wang and
                  Lei Hu},
  editor       = {Shiho Moriai and
                  Huaxiong Wang},
  title        = {Quantum Collision Attacks on AES-Like Hashing with Low Quantum Random
                  Access Memories},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12492},
  pages        = {727--757},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64834-3\_25},
  doi          = {10.1007/978-3-030-64834-3\_25},
  timestamp    = {Wed, 16 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DongSSGWH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icann/SongZHY20,
  author       = {Haohao Song and
                  Dongsheng Zou and
                  Lei Hu and
                  Jieying Yuan},
  editor       = {Igor Farkas and
                  Paolo Masulli and
                  Stefan Wermter},
  title        = {Embedding Compression with Right Triangle Similarity Transformations},
  booktitle    = {Artificial Neural Networks and Machine Learning - {ICANN} 2020 - 29th
                  International Conference on Artificial Neural Networks, Bratislava,
                  Slovakia, September 15-18, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12397},
  pages        = {773--785},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61616-8\_62},
  doi          = {10.1007/978-3-030-61616-8\_62},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icann/SongZHY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2008-12183,
  author       = {Zhengbang Zha and
                  Lei Hu},
  title        = {Some classes of power functions with low c-differential uniformity
                  over finite fields},
  journal      = {CoRR},
  volume       = {abs/2008.12183},
  year         = {2020},
  url          = {https://arxiv.org/abs/2008.12183},
  eprinttype    = {arXiv},
  eprint       = {2008.12183},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2008-12183.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DongSSGWH20,
  author       = {Xiaoyang Dong and
                  Siwei Sun and
                  Danping Shi and
                  Fei Gao and
                  Xiaoyun Wang and
                  Lei Hu},
  title        = {Quantum Collision Attacks on AES-like Hashing with Low Quantum Random
                  Access Memories},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1030},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1030},
  timestamp    = {Wed, 16 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DongSSGWH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SongTSH20,
  author       = {Ling Song and
                  Yi Tu and
                  Danping Shi and
                  Lei Hu},
  title        = {Security Analysis of Subterranean 2.0},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1133},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1133},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SongTSH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoSSSSHW20,
  author       = {Hao Guo and
                  Siwei Sun and
                  Danping Shi and
                  Ling Sun and
                  Yao Sun and
                  Lei Hu and
                  Meiqin Wang},
  title        = {Differential Attacks on {CRAFT} Exploiting the Involutory S-boxes
                  and Tweak Additions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1177},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1177},
  timestamp    = {Fri, 30 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoSSSSHW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoWHY20,
  author       = {Tingting Guo and
                  Peng Wang and
                  Lei Hu and
                  Dingfeng Ye},
  title        = {Attack Beyond-Birthday-Bound MACs in Quantum Setting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1595},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1595},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoWHY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/GuoWYHLW19,
  author       = {Na Guo and
                  Tianmiao Wang and
                  Biao Yang and
                  Lei Hu and
                  Hongsheng Liu and
                  Yuhan Wang},
  title        = {An Online Calibration Method for Microsoft HoloLens},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {101795--101803},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2930701},
  doi          = {10.1109/ACCESS.2019.2930701},
  timestamp    = {Wed, 21 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/GuoWYHLW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WangKGH19,
  author       = {Pei Wang and
                  Xianguang Kong and
                  Zekun Guo and
                  Lei Hu},
  title        = {Prediction of Axis Attitude Deviation and Deviation Correction Method
                  Based on Data Driven During Shield Tunneling},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {163487--163501},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2952649},
  doi          = {10.1109/ACCESS.2019.2952649},
  timestamp    = {Thu, 28 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/WangKGH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/HuangGH19,
  author       = {Qian{-}Min Huang and
                  Yi{-}Tian Gao and
                  Lei Hu},
  title        = {Bilinear forms, modulational instability and dark solitons for a fifth-order
                  variable-coefficient nonlinear Schr{\"{o}}dinger equation in
                  an inhomogeneous optical fiber},
  journal      = {Appl. Math. Comput.},
  volume       = {352},
  pages        = {270--278},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.amc.2019.01.027},
  doi          = {10.1016/J.AMC.2019.01.027},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/amc/HuangGH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ffa/ZhaHZ19,
  author       = {Zhengbang Zha and
                  Lei Hu and
                  Zhizheng Zhang},
  title        = {Permutation polynomials of the form x+{\(\gamma\)}Trqqn(h(x))},
  journal      = {Finite Fields Their Appl.},
  volume       = {60},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ffa.2019.101573},
  doi          = {10.1016/J.FFA.2019.101573},
  timestamp    = {Fri, 07 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ffa/ZhaHZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/YanSCWHWYW19,
  author       = {Zhiqiang Yan and
                  Bo Sun and
                  Yu Chen and
                  Lijie Wen and
                  Lei Hu and
                  Jianmin Wang and
                  Mingji Yang and
                  Lu Wang},
  title        = {Decomposed and parallel process discovery: {A} framework and application},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {98},
  pages        = {392--405},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.future.2019.03.048},
  doi          = {10.1016/J.FUTURE.2019.03.048},
  timestamp    = {Thu, 04 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/YanSCWHWYW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gandc/ZhangYCH19,
  author       = {Xuequan Zhang and
                  Peng Yue and
                  Yumin Chen and
                  Lei Hu},
  title        = {An efficient dynamic volume rendering for large-scale meteorological
                  data in a virtual globe},
  journal      = {Comput. Geosci.},
  volume       = {126},
  pages        = {1--8},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.cageo.2019.01.018},
  doi          = {10.1016/J.CAGEO.2019.01.018},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/gandc/ZhangYCH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/WangHLTZZLG19,
  author       = {Jun Wang and
                  Lei Hu and
                  Ning Li and
                  Chang Tian and
                  Zhaofeng Zhang and
                  Mingyong Zeng and
                  Zhangkai Luo and
                  Huaping Guan},
  title        = {Co-Saliency Detection via Local Prediction and Global Refinement},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {102-A},
  number       = {4},
  pages        = {654--664},
  year         = {2019},
  url          = {https://doi.org/10.1587/transfun.E102.A.654},
  doi          = {10.1587/TRANSFUN.E102.A.654},
  timestamp    = {Mon, 18 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/WangHLTZZLG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/information/YuanLLHW19,
  author       = {Xinpan Yuan and
                  Qunfeng Liu and
                  Jun Long and
                  Lei Hu and
                  Yulou Wang},
  title        = {Deep Image Similarity Measurement Based on the Improved Triplet Network
                  with Spatial Pyramid Pooling},
  journal      = {Inf.},
  volume       = {10},
  number       = {4},
  pages        = {129},
  year         = {2019},
  url          = {https://doi.org/10.3390/info10040129},
  doi          = {10.3390/INFO10040129},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/information/YuanLLHW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/information/YuanLLHW19a,
  author       = {Xinpan Yuan and
                  Qunfeng Liu and
                  Jun Long and
                  Lei Hu and
                  Songlin Wang},
  title        = {Multi-PQTable for Approximate Nearest-Neighbor Search},
  journal      = {Inf.},
  volume       = {10},
  number       = {6},
  pages        = {190},
  year         = {2019},
  url          = {https://doi.org/10.3390/info10060190},
  doi          = {10.3390/INFO10060190},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/information/YuanLLHW19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsjkx/ZhangLHD19,
  author       = {Zhao Zhang and
                  Hailong Li and
                  Lei Hu and
                  Siqi Dong},
  title        = {{\unicode{22522}}{\unicode{20110}}SDN-SFC{\unicode{30340}}{\unicode{26381}}{\unicode{21153}}{\unicode{21151}}{\unicode{33021}}{\unicode{36127}}{\unicode{36733}}{\unicode{22343}}{\unicode{34913}}
                  (Service Function Load Balancing Based on {SDN-SFC)}},
  journal      = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}},
  volume       = {46},
  number       = {9},
  pages        = {130--136},
  year         = {2019},
  url          = {https://doi.org/10.11896/j.issn.1002-137X.2019.09.018},
  doi          = {10.11896/J.ISSN.1002-137X.2019.09.018},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsjkx/ZhangLHD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsjkx/DongLQZH19,
  author       = {Siqi Dong and
                  Hailong Li and
                  Yuben Qu and
                  Zhao Zhang and
                  Lei Hu},
  title        = {{\unicode{31227}}{\unicode{21160}}{\unicode{36793}}{\unicode{32536}}{\unicode{35745}}{\unicode{31639}}{\unicode{20013}}{\unicode{30340}}{\unicode{35745}}{\unicode{31639}}{\unicode{21368}}{\unicode{36733}}{\unicode{31574}}{\unicode{30053}}{\unicode{30740}}{\unicode{31350}}{\unicode{32508}}{\unicode{36848}}
                  (Survey of Research on Computation Unloading Strategy in Mobile Edge
                  Computing)},
  journal      = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}},
  volume       = {46},
  number       = {11},
  pages        = {32--40},
  year         = {2019},
  url          = {https://doi.org/10.11896/jsjkx.181001872},
  doi          = {10.11896/JSJKX.181001872},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsjkx/DongLQZH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/GuoYWLHW19,
  author       = {Na Guo and
                  Biao Yang and
                  Yuhan Wang and
                  Hongsheng Liu and
                  Lei Hu and
                  Tianmiao Wang},
  title        = {New Calibrator with Points Distributed Conical Helically for Online
                  Calibration of C-Arm},
  journal      = {Sensors},
  volume       = {19},
  number       = {9},
  pages        = {1989},
  year         = {2019},
  url          = {https://doi.org/10.3390/s19091989},
  doi          = {10.3390/S19091989},
  timestamp    = {Mon, 29 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/GuoYWLHW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/taes/HuLBHBK19,
  author       = {Fei Hu and
                  Xin Li and
                  Elizabeth Serena Bentley and
                  Lei Hu and
                  Ke Bao and
                  Sunil Kumar},
  title        = {Intelligent Multibeam Transmissions for Mission-Oriented Airborne
                  Networks},
  journal      = {{IEEE} Trans. Aerosp. Electron. Syst.},
  volume       = {55},
  number       = {2},
  pages        = {619--630},
  year         = {2019},
  url          = {https://doi.org/10.1109/TAES.2018.2858152},
  doi          = {10.1109/TAES.2018.2858152},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/taes/HuLBHBK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/ZhengYLHZ19,
  author       = {Dabin Zheng and
                  Mu Yuan and
                  Nian Li and
                  Lei Hu and
                  Xiangyong Zeng},
  title        = {Constructions of Involutions Over Finite Fields},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {65},
  number       = {12},
  pages        = {7876--7883},
  year         = {2019},
  url          = {https://doi.org/10.1109/TIT.2019.2919511},
  doi          = {10.1109/TIT.2019.2919511},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/ZhengYLHZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/HuHK19,
  author       = {Lei Hu and
                  Fei Hu and
                  Sunil Kumar},
  title        = {Moth and Ant Inspired Routing in Hierarchical Airborne Networks with
                  Multi-Beam Antennas},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {18},
  number       = {4},
  pages        = {910--922},
  year         = {2019},
  url          = {https://doi.org/10.1109/TMC.2018.2844851},
  doi          = {10.1109/TMC.2018.2844851},
  timestamp    = {Tue, 16 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/HuHK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LiSLWH19,
  author       = {Shun Li and
                  Siwei Sun and
                  Chaoyun Li and
                  Zihao Wei and
                  Lei Hu},
  title        = {Constructing Low-latency Involutory {MDS} Matrices with Lightweight
                  Circuits},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {1},
  pages        = {84--117},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i1.84-117},
  doi          = {10.13154/TOSC.V2019.I1.84-117},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/LiSLWH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/SongQH19,
  author       = {Ling Song and
                  Xianrui Qin and
                  Lei Hu},
  title        = {Boomerang Connectivity Table Revisited. Application to {SKINNY} and
                  {AES}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {1},
  pages        = {118--141},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i1.118-141},
  doi          = {10.13154/TOSC.V2019.I1.118-141},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/SongQH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/LiSSLH19,
  author       = {Shun Li and
                  Siwei Sun and
                  Danping Shi and
                  Chaoyun Li and
                  Lei Hu},
  title        = {Lightweight Iterative {MDS} Matrices: How Small Can We Go?},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {4},
  pages        = {147--170},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i4.147-170},
  doi          = {10.13154/TOSC.V2019.I4.147-170},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/LiSSLH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ShiSSLH19,
  author       = {Danping Shi and
                  Siwei Sun and
                  Yu Sasaki and
                  Chaoyun Li and
                  Lei Hu},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions
                  of Full {\textbackslash}mathsf {MORUS}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11693},
  pages        = {180--209},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26951-7\_7},
  doi          = {10.1007/978-3-030-26951-7\_7},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ShiSSLH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Xu0HWP19,
  author       = {Jun Xu and
                  Santanu Sarkar and
                  Lei Hu and
                  Huaxiong Wang and
                  Yanbin Pan},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {New Results on Modular Inversion Hidden Number Problem and Inversive
                  Congruential Generator},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11692},
  pages        = {297--321},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26948-7\_11},
  doi          = {10.1007/978-3-030-26948-7\_11},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Xu0HWP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ChenSSH19,
  author       = {Qiu Chen and
                  Danping Shi and
                  Siwei Sun and
                  Lei Hu},
  editor       = {Jianying Zhou and
                  Xiapu Luo and
                  Qingni Shen and
                  Zhen Xu},
  title        = {Automatic Demirci-Sel{\c{c}}uk Meet-in-the-Middle Attack on {SKINNY}
                  with Key-Bridging},
  booktitle    = {Information and Communications Security - 21st International Conference,
                  {ICICS} 2019, Beijing, China, December 15-17, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11999},
  pages        = {233--247},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-41579-2\_14},
  doi          = {10.1007/978-3-030-41579-2\_14},
  timestamp    = {Mon, 02 Mar 2020 17:19:02 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/ChenSSH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/WeiSSWH19,
  author       = {Man Wei and
                  Danping Shi and
                  Siwei Sun and
                  Peng Wang and
                  Lei Hu},
  editor       = {Jianying Zhou and
                  Xiapu Luo and
                  Qingni Shen and
                  Zhen Xu},
  title        = {Convolutional Neural Network Based Side-Channel Attacks with Customized
                  Filters},
  booktitle    = {Information and Communications Security - 21st International Conference,
                  {ICICS} 2019, Beijing, China, December 15-17, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11999},
  pages        = {799--813},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-41579-2\_46},
  doi          = {10.1007/978-3-030-41579-2\_46},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/WeiSSWH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/CaiWZSH19,
  author       = {Jiahao Cai and
                  Zihao Wei and
                  Yingjie Zhang and
                  Siwei Sun and
                  Lei Hu},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Zero-sum Distinguishers for Round-reduced {GIMLI} Permutation},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {38--43},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007249000380043},
  doi          = {10.5220/0007249000380043},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/CaiWZSH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmv/ZhangSHZD19,
  author       = {Yongmei Zhang and
                  Jie Shu and
                  Lei Hu and
                  Qi Zhou and
                  Zhirong Du},
  editor       = {Wolfgang Osten and
                  Dmitry P. Nikolaev},
  title        = {A ship target tracking algorithm based on deep learning and multiple
                  features},
  booktitle    = {Twelfth International Conference on Machine Vision, {ICMV} 2019, Amsterdam,
                  The Netherlands, 16-18 November 2019},
  series       = {{SPIE} Proceedings},
  volume       = {11433},
  pages        = {1143304},
  publisher    = {{SPIE}},
  year         = {2019},
  url          = {https://doi.org/10.1117/12.2559945},
  doi          = {10.1117/12.2559945},
  timestamp    = {Thu, 29 Oct 2020 18:10:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icmv/ZhangSHZD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/00220H19,
  author       = {Jun Xu and
                  Santanu Sarkar and
                  Lei Hu},
  editor       = {Feng Hao and
                  Sushmita Ruj and
                  Sourav Sen Gupta},
  title        = {Revisiting Approximate Polynomial Common Divisor Problem and Noisy
                  Multipolynomial Reconstruction},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2019 - 20th International Conference
                  on Cryptology in India, Hyderabad, India, December 15-18, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11898},
  pages        = {398--411},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-35423-7\_20},
  doi          = {10.1007/978-3-030-35423-7\_20},
  timestamp    = {Wed, 20 Mar 2024 15:23:22 +0100},
  biburl       = {https://dblp.org/rec/conf/indocrypt/00220H19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsda/ZhaH19,
  author       = {Zhengbang Zha and
                  Lei Hu},
  title        = {The Boomerang Uniformity of Power Permutations x\({}^{\mbox{2}}\)\({}^{\mbox{k}}\)\({}^{\mbox{-1}}\)
                  over F2\({}^{\mbox{n}}\)},
  booktitle    = {Ninth International Workshop on Signal Design and its Applications
                  in Communications, {IWSDA} 2019, Dongguan, China, October 20-24, 2019},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/IWSDA46143.2019.8966114},
  doi          = {10.1109/IWSDA46143.2019.8966114},
  timestamp    = {Thu, 06 Feb 2020 18:03:22 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsda/ZhaH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiSLWH19,
  author       = {Shun Li and
                  Siwei Sun and
                  Chaoyun Li and
                  Zihao Wei and
                  Lei Hu},
  title        = {Constructing Low-latency Involutory {MDS} Matrices with Lightweight
                  Circuit},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {107},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/107},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiSLWH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SongQH19,
  author       = {Ling Song and
                  Xianrui Qin and
                  Lei Hu},
  title        = {Boomerang Connectivity Table Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {146},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/146},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SongQH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShiSSLH19,
  author       = {Danping Shi and
                  Siwei Sun and
                  Yu Sasaki and
                  Chaoyun Li and
                  Lei Hu},
  title        = {Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions
                  of Full {MORUS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {172},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/172},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShiSSLH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Xu0HWP19,
  author       = {Jun Xu and
                  Santanu Sarkar and
                  Lei Hu and
                  Huaxiong Wang and
                  Yanbin Pan},
  title        = {New Results on Modular Inversion Hidden Number Problem and Inversive
                  Congruential Generator},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {604},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/604},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Xu0HWP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiSSLH19,
  author       = {Shun Li and
                  Siwei Sun and
                  Danping Shi and
                  Chaoyun Li and
                  Lei Hu},
  title        = {Lightweight Iterative {MDS} Matrices: How Small Can We Go?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1310},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1310},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiSSLH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WangWLHHLGQX18,
  author       = {Lifeng Wang and
                  Tianmiao Wang and
                  Hongpeng Liu and
                  Lei Hu and
                  Zhonghao Han and
                  Wenyong Liu and
                  Na Guo and
                  Yansong Qi and
                  Yongsheng Xu},
  title        = {An Automated Calibration Method of Ultrasonic Probe Based on Coherent
                  Point Drift Algorithm},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {8657--8665},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2791582},
  doi          = {10.1109/ACCESS.2018.2791582},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/WangWLHHLGQX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/appml/HuangGH18,
  author       = {Qianglian Huang and
                  Yi{-}Tian Gao and
                  Lei Hu},
  title        = {Breather-to-soliton transition for a sixth-order nonlinear Schr{\"{o}}dinger
                  equation in an optical fiber},
  journal      = {Appl. Math. Lett.},
  volume       = {75},
  pages        = {135--140},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.aml.2017.06.015},
  doi          = {10.1016/J.AML.2017.06.015},
  timestamp    = {Mon, 11 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/appml/HuangGH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/ZhaHZ18,
  author       = {Zhengbang Zha and
                  Lei Hu and
                  Zhizheng Zhang},
  title        = {New results on permutation polynomials of the form (x p m - x + {\(\delta\)})
                  s + x p m + x over {\(\mathbb{F}\)} p\({}^{\mbox{2m}}\)},
  journal      = {Cryptogr. Commun.},
  volume       = {10},
  number       = {3},
  pages        = {567--578},
  year         = {2018},
  url          = {https://doi.org/10.1007/s12095-017-0234-9},
  doi          = {10.1007/S12095-017-0234-9},
  timestamp    = {Fri, 07 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ccds/ZhaHZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/XuSHHP18,
  author       = {Jun Xu and
                  Santanu Sarkar and
                  Lei Hu and
                  Zhangjie Huang and
                  Liqiang Peng},
  title        = {Solving a class of modular polynomial equations and its relation to
                  modular inversion hidden number problem and inversive congruential
                  generator},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {9},
  pages        = {1997--2033},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0435-4},
  doi          = {10.1007/S10623-017-0435-4},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/XuSHHP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ffa/ZhaHZ18,
  author       = {Zhengbang Zha and
                  Lei Hu and
                  Zhizheng Zhang},
  title        = {Three new classes of generalized almost perfect nonlinear power functions},
  journal      = {Finite Fields Their Appl.},
  volume       = {53},
  pages        = {254--266},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ffa.2018.06.011},
  doi          = {10.1016/J.FFA.2018.06.011},
  timestamp    = {Fri, 07 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ffa/ZhaHZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdmbc/HuYHHH18,
  author       = {Guoxiong Hu and
                  Zhong Yang and
                  Lei Hu and
                  Li Huang and
                  Jiaming Han},
  title        = {Small Object Detection with Multiscale Features},
  journal      = {Int. J. Digit. Multim. Broadcast.},
  volume       = {2018},
  pages        = {4546896:1--4546896:10},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/4546896},
  doi          = {10.1155/2018/4546896},
  timestamp    = {Mon, 08 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdmbc/HuYHHH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jossac/ShanHZL18,
  author       = {Jinyong Shan and
                  Lei Hu and
                  Xiangyong Zeng and
                  Chunlei Li},
  title        = {A Construction of 1-Resilient Boolean Functions with Good Cryptographic
                  Properties},
  journal      = {J. Syst. Sci. Complex.},
  volume       = {31},
  number       = {4},
  pages        = {1042--1064},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11424-017-6177-6},
  doi          = {10.1007/S11424-017-6177-6},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jossac/ShanHZL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsjkx/LiuWHL18,
  author       = {Chunyang Liu and
                  Zemin Wu and
                  Lei Hu and
                  Xi Liu},
  title        = {{\unicode{22522}}{\unicode{20110}}{\unicode{20284}}{\unicode{29289}}{\unicode{24615}}{\unicode{21644}}{\unicode{31354}}{\unicode{26102}}{\unicode{21327}}{\unicode{26041}}{\unicode{24046}}{\unicode{29305}}{\unicode{24449}}{\unicode{30340}}{\unicode{34892}}{\unicode{20154}}{\unicode{26816}}{\unicode{27979}}{\unicode{31639}}{\unicode{27861}}
                  (Pedestrian Detection Based on Objectness and Sapce-Time Covariance
                  Features)},
  journal      = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}},
  volume       = {45},
  number       = {6A},
  pages        = {210--214},
  year         = {2018},
  url          = {http://www.jsjkx.com/CN/Y2018/V45/I6A/210},
  doi          = {Y2018/V45/I6A/210},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsjkx/LiuWHL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsjkx/WangWYHZJ18,
  author       = {Jun Wang and
                  Zemin Wu and
                  Wei Yang and
                  Lei Hu and
                  Zhaofeng Zhang and
                  Qingzhu Jiang},
  title        = {{\unicode{22522}}{\unicode{20110}}{\unicode{31232}}{\unicode{30095}}{\unicode{24674}}{\unicode{22797}}{\unicode{19982}}{\unicode{20248}}{\unicode{21270}}{\unicode{30340}}{\unicode{26174}}{\unicode{33879}}{\unicode{24615}}{\unicode{30446}}{\unicode{26631}}{\unicode{26816}}{\unicode{27979}}{\unicode{31639}}{\unicode{27861}}
                  (Salient Object Detection Algorithm Based on Sparse Recovery and Optimization)},
  journal      = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}},
  volume       = {45},
  number       = {8},
  pages        = {258--263},
  year         = {2018},
  url          = {https://doi.org/10.11896/j.issn.1002-137X.2018.08.046},
  doi          = {10.11896/J.ISSN.1002-137X.2018.08.046},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsjkx/WangWYHZJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhuCSLH18,
  author       = {Hongliang Zhu and
                  Meiqi Chen and
                  Maohua Sun and
                  Xin Liao and
                  Lei Hu},
  title        = {Outsourcing Set Intersection Computation Based on Bloom Filter for
                  Privacy Preservation in Multimedia Processing},
  journal      = {Secur. Commun. Networks},
  volume       = {2018},
  pages        = {5841967:1--5841967:12},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/5841967},
  doi          = {10.1155/2018/5841967},
  timestamp    = {Wed, 27 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhuCSLH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YangHSTS18,
  author       = {Qianqian Yang and
                  Lei Hu and
                  Danping Shi and
                  Yosuke Todo and
                  Siwei Sun},
  title        = {On the Complexity of Impossible Differential Cryptanalysis},
  journal      = {Secur. Commun. Networks},
  volume       = {2018},
  pages        = {7393401:1--7393401:11},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/7393401},
  doi          = {10.1155/2018/7393401},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YangHSTS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PengLKZH18,
  author       = {Liqiang Peng and
                  Yao Lu and
                  Noboru Kunihiro and
                  Rui Zhang and
                  Lei Hu},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {A Deterministic Algorithm for Computing Divisors in an Interval},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {3--12},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_1},
  doi          = {10.1007/978-3-319-93638-3\_1},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PengLKZH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ShiSDTSH18,
  author       = {Danping Shi and
                  Siwei Sun and
                  Patrick Derbez and
                  Yosuke Todo and
                  Bing Sun and
                  Lei Hu},
  editor       = {Thomas Peyrin and
                  Steven D. Galbraith},
  title        = {Programming the Demirci-Sel{\c{c}}uk Meet-in-the-Middle Attack with
                  Constraints},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11273},
  pages        = {3--34},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03329-3\_1},
  doi          = {10.1007/978-3-030-03329-3\_1},
  timestamp    = {Thu, 17 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ShiSDTSH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icbbb/LiuXHTW18,
  author       = {Hongpeng Liu and
                  Ying Xu and
                  Lei Hu and
                  Peifu Tang and
                  Lifeng Wang},
  title        = {An Investigation of Errors in Fluoroscopic Navigation for Robot-Assisted
                  Orthopedic Surgery},
  booktitle    = {Proceedings of the 8th International Conference on Bioscience, Biochemistry
                  and Bioinformatics, {ICBBB} 2018, Tokyo, Japan, January 18-20, 2018},
  pages        = {134--138},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3180382.3180394},
  doi          = {10.1145/3180382.3180394},
  timestamp    = {Wed, 15 Nov 2023 17:18:11 +0100},
  biburl       = {https://dblp.org/rec/conf/icbbb/LiuXHTW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/ZhangSCH18,
  author       = {Yingjie Zhang and
                  Siwei Sun and
                  Jiahao Cai and
                  Lei Hu},
  editor       = {Liqun Chen and
                  Mark Manulis and
                  Steve A. Schneider},
  title        = {Speeding up {MILP} Aided Differential Characteristic Search with Matsui's
                  Strategy},
  booktitle    = {Information Security - 21st International Conference, {ISC} 2018,
                  Guildford, UK, September 9-12, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11060},
  pages        = {101--115},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99136-8\_6},
  doi          = {10.1007/978-3-319-99136-8\_6},
  timestamp    = {Fri, 07 Aug 2020 17:57:31 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/ZhangSCH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/robio/YangHGWLH18,
  author       = {Biao Yang and
                  Lei Hu and
                  Na Guo and
                  Yuhan Wang and
                  Hongsheng Liu and
                  Zhonghao Han},
  title        = {Anterior Cruciate Ligament Reconstruction Surgery Navigation and Robotic
                  Positioning System Under X-Rays},
  booktitle    = {{IEEE} International Conference on Robotics and Biomimetics, {ROBIO}
                  2018, Kuala Lumpur, Malaysia, December 12-15, 2018},
  pages        = {156--163},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ROBIO.2018.8665247},
  doi          = {10.1109/ROBIO.2018.8665247},
  timestamp    = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl       = {https://dblp.org/rec/conf/robio/YangHGWLH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcsp/HuGZWZ18,
  author       = {Lei Hu and
                  Zhiyang Gao and
                  Yunjiao Zang and
                  Jun Wang and
                  Lei Zhang},
  title        = {Visual Tracking via Detecting and Removing Outliers Based on Block
                  Sparse Representation},
  booktitle    = {10th International Conference on Wireless Communications and Signal
                  Processing, {WCSP} 2018, Hangzhou, China, October 18-20, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/WCSP.2018.8555648},
  doi          = {10.1109/WCSP.2018.8555648},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/wcsp/HuGZWZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcsp/WangTHWZS18,
  author       = {Jun Wang and
                  Chang Tian and
                  Lei Hu and
                  Hai Wang and
                  Mingyong Zeng and
                  Qing Shen},
  title        = {Video Saliency Estimation via Encoding Deep Spatiotemporal Saliency
                  Cues},
  booktitle    = {10th International Conference on Wireless Communications and Signal
                  Processing, {WCSP} 2018, Hangzhou, China, October 18-20, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/WCSP.2018.8555574},
  doi          = {10.1109/WCSP.2018.8555574},
  timestamp    = {Wed, 15 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcsp/WangTHWZS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1811-11344,
  author       = {Dabin Zheng and
                  Mu Yuan and
                  Nian Li and
                  Lei Hu and
                  Xiangyong Zeng},
  title        = {Constructions of involutions over finite fields},
  journal      = {CoRR},
  volume       = {abs/1811.11344},
  year         = {2018},
  url          = {http://arxiv.org/abs/1811.11344},
  eprinttype    = {arXiv},
  eprint       = {1811.11344},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1811-11344.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShiSDTSH18,
  author       = {Danping Shi and
                  Siwei Sun and
                  Patrick Derbez and
                  Yosuke Todo and
                  Bing Sun and
                  Lei Hu},
  title        = {Programming the Demirci-Sel{\c{c}}uk Meet-in-the-Middle Attack with
                  Constraints},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {813},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/813},
  timestamp    = {Thu, 17 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShiSDTSH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XuSH18,
  author       = {Jun Xu and
                  Santanu Sarkar and
                  Lei Hu},
  title        = {Revisiting Orthogonal Lattice Attacks on Approximate Common Divisor
                  Problems and their Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1208},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1208},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/XuSH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/ShiHSSQM17,
  author       = {Danping Shi and
                  Lei Hu and
                  Siwei Sun and
                  Ling Song and
                  Kexin Qiao and
                  Xiaoshuang Ma},
  title        = {Improved linear (hull) cryptanalysis of round-reduced versions of
                  {SIMON}},
  journal      = {Sci. China Inf. Sci.},
  volume       = {60},
  number       = {3},
  pages        = {39101:1--39101:3},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11432-015-0007-1},
  doi          = {10.1007/S11432-015-0007-1},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/ShiHSSQM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/PengHLXH17,
  author       = {Liqiang Peng and
                  Lei Hu and
                  Yao Lu and
                  Jun Xu and
                  Zhangjie Huang},
  title        = {Cryptanalysis of Dual {RSA}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {83},
  number       = {1},
  pages        = {1--21},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0196-5},
  doi          = {10.1007/S10623-016-0196-5},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/PengHLXH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ffa/ZhaHF17,
  author       = {Zhengbang Zha and
                  Lei Hu and
                  Shuqin Fan},
  title        = {Further results on permutation trinomials over finite fields with
                  even characteristic},
  journal      = {Finite Fields Their Appl.},
  volume       = {45},
  pages        = {43--52},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ffa.2016.11.011},
  doi          = {10.1016/J.FFA.2016.11.011},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ffa/ZhaHF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijfcs/SunH17,
  author       = {Zhiqiang Sun and
                  Lei Hu},
  title        = {Several Classes of Boolean Functions with Four-Valued Walsh Spectra},
  journal      = {Int. J. Found. Comput. Sci.},
  volume       = {28},
  number       = {4},
  pages        = {357--378},
  year         = {2017},
  url          = {https://doi.org/10.1142/S0129054117500228},
  doi          = {10.1142/S0129054117500228},
  timestamp    = {Wed, 11 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijfcs/SunH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/ZhangWJDH17,
  author       = {Zhaofeng Zhang and
                  Zemin Wu and
                  Qingzhu Jiang and
                  Lin Du and
                  Lei Hu},
  title        = {Co-saliency Detection Based on Superpixel Matching and Cellular Automata},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {11},
  number       = {5},
  pages        = {2576--2589},
  year         = {2017},
  url          = {https://doi.org/10.3837/tiis.2017.05.015},
  doi          = {10.3837/TIIS.2017.05.015},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/ZhangWJDH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsjkx/ZhangWDH18,
  author       = {Zhaofeng Zhang and
                  Zemin Wu and
                  Lin Du and
                  Lei Hu},
  title        = {{\unicode{22522}}{\unicode{20110}}{\unicode{21387}}{\unicode{32553}}{\unicode{22495}}{\unicode{32534}}{\unicode{30721}}{\unicode{38271}}{\unicode{24230}}{\unicode{30340}}{\unicode{35270}}{\unicode{39057}}{\unicode{26174}}{\unicode{33879}}{\unicode{24615}}{\unicode{26816}}{\unicode{27979}}
                  (Video Saliency Detection Based on Compressed Domain Coding Length)},
  journal      = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}},
  volume       = {44},
  number       = {10},
  pages        = {312--317},
  year         = {2017},
  url          = {https://doi.org/10.11896/j.issn.1002-137X.2017.10.056},
  doi          = {10.11896/J.ISSN.1002-137X.2017.10.056},
  timestamp    = {Fri, 20 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsjkx/ZhangWDH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsjkx/ZhangWJDH18,
  author       = {Zhaofeng Zhang and
                  Zemin Wu and
                  Qingzhu Jiang and
                  Lin Du and
                  Lei Hu},
  title        = {{\unicode{22522}}{\unicode{20110}}{\unicode{36229}}{\unicode{20687}}{\unicode{32032}}{\unicode{21305}}{\unicode{37197}}{\unicode{30340}}{\unicode{22270}}{\unicode{20687}}{\unicode{21327}}{\unicode{21516}}{\unicode{26174}}{\unicode{33879}}{\unicode{24615}}{\unicode{26816}}{\unicode{27979}}
                  (Co-saliency Detection via Superpixel Matching)},
  journal      = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}},
  volume       = {44},
  number       = {11},
  pages        = {314--319},
  year         = {2017},
  url          = {https://doi.org/10.11896/j.issn.1002-137X.2017.11.048},
  doi          = {10.11896/J.ISSN.1002-137X.2017.11.048},
  timestamp    = {Fri, 20 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsjkx/ZhangWJDH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsjkx/LiuWHL17,
  author       = {Chunyang Liu and
                  Zemin Wu and
                  Lei Hu and
                  Xi Liu},
  title        = {{\unicode{22522}}{\unicode{20110}}DCT{\unicode{21464}}{\unicode{25442}}{\unicode{30340}}{\unicode{22810}}{\unicode{36890}}{\unicode{36947}}{\unicode{29305}}{\unicode{24449}}{\unicode{30340}}{\unicode{34892}}{\unicode{20154}}{\unicode{26816}}{\unicode{27979}}
                  (Pedestrian Detection Based on {DCT} of Multi-channel Feature)},
  journal      = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}},
  volume       = {44},
  number       = {{Z11}},
  pages        = {221--224},
  year         = {2017},
  url          = {https://doi.org/10.11896/j.issn.1002-137X.2017.11A.046},
  doi          = {10.11896/J.ISSN.1002-137X.2017.11A.046},
  timestamp    = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsjkx/LiuWHL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsjkx/DuTWZHZ17,
  author       = {Lin Du and
                  Chang Tian and
                  Zemin Wu and
                  Zhaofeng Zhang and
                  Lei Hu and
                  Lei Zhang},
  title        = {{\unicode{38754}}{\unicode{21521}}{\unicode{20027}}{\unicode{35266}}{\unicode{36136}}{\unicode{37327}}{\unicode{30340}}{\unicode{35270}}{\unicode{39057}}{\unicode{20256}}{\unicode{36755}}{\unicode{32534}}{\unicode{30721}}{\unicode{21442}}{\unicode{25968}}{\unicode{30340}}{\unicode{36873}}{\unicode{25321}}
                  (Choice of Coding Parameters in Video Transmission for Perceptual
                  Quality)},
  journal      = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}},
  volume       = {44},
  number       = {{Z6}},
  pages        = {202--205},
  year         = {2017},
  url          = {https://doi.org/10.11896/j.issn.1002-137X.2017.6A.046},
  doi          = {10.11896/J.ISSN.1002-137X.2017.6A.046},
  timestamp    = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsjkx/DuTWZHZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/ZhangHQG17,
  author       = {Zhongnan Zhang and
                  Lei Hu and
                  Ming Qiu and
                  Fangyuan Gao},
  title        = {Events detection and community partition based on probabilistic snapshot
                  for evolutionary social network},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {10},
  number       = {6},
  pages        = {1272--1284},
  year         = {2017},
  url          = {https://doi.org/10.1007/s12083-016-0427-6},
  doi          = {10.1007/S12083-016-0427-6},
  timestamp    = {Mon, 04 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/ZhangHQG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/SunGLYTQH17,
  author       = {Siwei Sun and
                  David G{\'{e}}rault and
                  Pascal Lafourcade and
                  Qianqian Yang and
                  Yosuke Todo and
                  Kexin Qiao and
                  Lei Hu},
  title        = {Analysis of AES, SKINNY, and Others with Constraint Programming},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {1},
  pages        = {281--306},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i1.281-306},
  doi          = {10.13154/TOSC.V2017.I1.281-306},
  timestamp    = {Mon, 05 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/SunGLYTQH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/agro-geoinformatics/HuDYYTLZSHSR17,
  author       = {Lei Hu and
                  Liping Di and
                  Eugene Yu and
                  Peng Yue and
                  Junmei Tang and
                  Li Lin and
                  Chen Zhang and
                  Ziheng Sun and
                  Ruiheng Hu and
                  Ranjay Shrestha and
                  Md. Shahinoor Rahman},
  title        = {Developing geospatial Web service and system for {SMAP} soil moisture
                  monitoring},
  booktitle    = {2017 6th International Conference on Agro-Geoinformatics, Fairfax,
                  VA, USA, August 7-10, 2017},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/Agro-Geoinformatics.2017.8047066},
  doi          = {10.1109/AGRO-GEOINFORMATICS.2017.8047066},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/agro-geoinformatics/HuDYYTLZSHSR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/agro-geoinformatics/LinDYTSRKSZHYY17,
  author       = {Li Lin and
                  Liping Di and
                  Eugene Genong Yu and
                  Junmei Tang and
                  Ranjay Shrestha and
                  Md. Shahinoor Rahman and
                  Lingjun Kang and
                  Ziheng Sun and
                  Chen Zhang and
                  Lei Hu and
                  Guangyuan Yang and
                  Zhengwei Yang},
  title        = {Extract flood duration from Dartmouth Flood Observatory flood product},
  booktitle    = {2017 6th International Conference on Agro-Geoinformatics, Fairfax,
                  VA, USA, August 7-10, 2017},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/Agro-Geoinformatics.2017.8047064},
  doi          = {10.1109/AGRO-GEOINFORMATICS.2017.8047064},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/agro-geoinformatics/LinDYTSRKSZHYY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/agro-geoinformatics/LinDZHTY17,
  author       = {Li Lin and
                  Liping Di and
                  Chen Zhang and
                  Lei Hu and
                  Junmei Tang and
                  Eugene Yu},
  title        = {Developing a Web service based application for demographic information
                  modeling and analyzing},
  booktitle    = {2017 6th International Conference on Agro-Geoinformatics, Fairfax,
                  VA, USA, August 7-10, 2017},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/Agro-Geoinformatics.2017.8047069},
  doi          = {10.1109/AGRO-GEOINFORMATICS.2017.8047069},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/agro-geoinformatics/LinDZHTY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/agro-geoinformatics/RahmanDSYLZHTY17,
  author       = {Md. Shahinoor Rahman and
                  Liping Di and
                  Ranjay Shrestha and
                  Eugene G. Yu and
                  Li Lin and
                  Chen Zhang and
                  Lei Hu and
                  Junmei Tang and
                  Zhengwei Yang},
  title        = {Agriculture flood mapping with Soil Moisture Active Passive {(SMAP)}
                  data: {A} case of 2016 Louisiana flood},
  booktitle    = {2017 6th International Conference on Agro-Geoinformatics, Fairfax,
                  VA, USA, August 7-10, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/Agro-Geoinformatics.2017.8047062},
  doi          = {10.1109/AGRO-GEOINFORMATICS.2017.8047062},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/agro-geoinformatics/RahmanDSYLZHTY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/agro-geoinformatics/ShresthaDYRLHT17,
  author       = {Ranjay Shrestha and
                  Liping Di and
                  Eugene G. Yu and
                  Md. Shahinoor Rahman and
                  Li Lin and
                  Lei Hu and
                  Junmei Tang},
  title        = {Crop Fraction Layer {(CFL)} datasets derived through {MODIS} and LandSat
                  for the continental {US} from year 2000-2016},
  booktitle    = {2017 6th International Conference on Agro-Geoinformatics, Fairfax,
                  VA, USA, August 7-10, 2017},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/Agro-Geoinformatics.2017.8047068},
  doi          = {10.1109/AGRO-GEOINFORMATICS.2017.8047068},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/agro-geoinformatics/ShresthaDYRLHT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/agro-geoinformatics/YuDRLZHSKTY17,
  author       = {Eugene G. Yu and
                  Liping Di and
                  Md. Shahinoor Rahman and
                  Li Lin and
                  Chen Zhang and
                  Lei Hu and
                  Ranjay Shrestha and
                  Lingjun Kang and
                  Junmei Tang and
                  Guangyuan Yang},
  title        = {Performance improvement on a Web Geospatial service for the remote
                  sensing flood-induced crop loss assessment web application using vector
                  tiling},
  booktitle    = {2017 6th International Conference on Agro-Geoinformatics, Fairfax,
                  VA, USA, August 7-10, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/Agro-Geoinformatics.2017.8047053},
  doi          = {10.1109/AGRO-GEOINFORMATICS.2017.8047053},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/agro-geoinformatics/YuDRLZHSKTY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/agro-geoinformatics/ZhangDSYHLTR17,
  author       = {Chen Zhang and
                  Liping Di and
                  Ziheng Sun and
                  Eugene G. Yu and
                  Lei Hu and
                  Li Lin and
                  Junmei Tang and
                  Md. Shahinoor Rahman},
  title        = {Integrating {OGC} Web Processing Service with cloud computing environment
                  for Earth Observation data},
  booktitle    = {2017 6th International Conference on Agro-Geoinformatics, Fairfax,
                  VA, USA, August 7-10, 2017},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/Agro-Geoinformatics.2017.8047065},
  doi          = {10.1109/AGRO-GEOINFORMATICS.2017.8047065},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/agro-geoinformatics/ZhangDSYHLTR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/igarss/YangCHDM17,
  author       = {Zhengwei Yang and
                  Wade T. Crow and
                  Lei Hu and
                  Liping Di and
                  Rick Mueller},
  title        = {{SMAP} {DATA} for cropland soil moisture assessment - {A} case study},
  booktitle    = {2017 {IEEE} International Geoscience and Remote Sensing Symposium,
                  {IGARSS} 2017, Fort Worth, TX, USA, July 23-28, 2017},
  pages        = {1996--1999},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/IGARSS.2017.8127373},
  doi          = {10.1109/IGARSS.2017.8127373},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/igarss/YangCHDM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscid/HuH17,
  author       = {Lei Hu and
                  Fangyu Hu},
  title        = {Anomaly Detection in Crowded Scenes via {SA-MHOF} and Sparse Combination},
  booktitle    = {10th International Symposium on Computational Intelligence and Design,
                  {ISCID} 2017, Hangzhou, China, December 9-10, 2017, Volume 1},
  pages        = {421--424},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ISCID.2017.130},
  doi          = {10.1109/ISCID.2017.130},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/iscid/HuH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcsp/HuWZT17,
  author       = {Lei Hu and
                  Zemin Wu and
                  Lei Zhang and
                  Chang Tian},
  title        = {Fast recovery of non-negative sparse signals under heterogeneous noise},
  booktitle    = {9th International Conference on Wireless Communications and Signal
                  Processing, {WCSP} 2017, Nanjing, China, October 11-13, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/WCSP.2017.8171027},
  doi          = {10.1109/WCSP.2017.8171027},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/wcsp/HuWZT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SunGLYTQH17,
  author       = {Siwei Sun and
                  David G{\'{e}}rault and
                  Pascal Lafourcade and
                  Qianqian Yang and
                  Yosuke Todo and
                  Kexin Qiao and
                  Lei Hu},
  title        = {Analysis of AES, SKINNY, and Others with Constraint Programming},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {162},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/162},
  timestamp    = {Mon, 05 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SunGLYTQH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ffa/ZhaH16,
  author       = {Zhengbang Zha and
                  Lei Hu},
  title        = {Some classes of permutation polynomials of the form (x\({}^{\mbox{p\({}^{\mbox{m}}\)}}\)-x+{\(\delta\)})\({}^{\mbox{s}}\)+x
                  over F\({}_{\mbox{p\({}^{\mbox{2m}}\)}}\)},
  journal      = {Finite Fields Their Appl.},
  volume       = {40},
  pages        = {150--162},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.ffa.2016.04.003},
  doi          = {10.1016/J.FFA.2016.04.003},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ffa/ZhaH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jei/JiangWTLZH16,
  author       = {Qingzhu Jiang and
                  Zemin Wu and
                  Chang Tian and
                  Tao Liu and
                  Mingyong Zeng and
                  Lei Hu},
  title        = {Salient object detection based on discriminative boundary and multiple
                  cues integration},
  journal      = {J. Electronic Imaging},
  volume       = {25},
  number       = {1},
  pages        = {013019},
  year         = {2016},
  url          = {https://doi.org/10.1117/1.JEI.25.1.013019},
  doi          = {10.1117/1.JEI.25.1.013019},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jei/JiangWTLZH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/PengHLW16,
  author       = {Liqiang Peng and
                  Lei Hu and
                  Yao Lu and
                  Hongyun Wei},
  editor       = {Kefei Chen and
                  Dongdai Lin and
                  Moti Yung},
  title        = {An Improved Analysis on Three Variants of the {RSA} Cryptosystem},
  booktitle    = {Information Security and Cryptology - 12th International Conference,
                  Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10143},
  pages        = {140--149},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-54705-3\_9},
  doi          = {10.1007/978-3-319-54705-3\_9},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/PengHLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/FuWGSH16,
  author       = {Kai Fu and
                  Meiqin Wang and
                  Yinghua Guo and
                  Siwei Sun and
                  Lei Hu},
  editor       = {Thomas Peyrin},
  title        = {MILP-Based Automatic Search Algorithms for Differential and Linear
                  Trails for Speck},
  booktitle    = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
                  Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9783},
  pages        = {268--288},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-52993-5\_14},
  doi          = {10.1007/978-3-662-52993-5\_14},
  timestamp    = {Fri, 27 Mar 2020 08:58:25 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/FuWGSH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icfhr/HuZ16,
  author       = {Lei Hu and
                  Richard Zanibbi},
  title        = {Line-of-Sight Stroke Graphs and Parzen Shape Context Features for
                  Handwritten Math Formula Representation and Symbol Segmentation},
  booktitle    = {15th International Conference on Frontiers in Handwriting Recognition,
                  {ICFHR} 2016, Shenzhen, China, October 23-26, 2016},
  pages        = {180--186},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICFHR.2016.0044},
  doi          = {10.1109/ICFHR.2016.0044},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icfhr/HuZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icfhr/HuZ16a,
  author       = {Lei Hu and
                  Richard Zanibbi},
  title        = {MST-based Visual Parsing of Online Handwritten Mathematical Expressions},
  booktitle    = {15th International Conference on Frontiers in Handwriting Recognition,
                  {ICFHR} 2016, Shenzhen, China, October 23-26, 2016},
  pages        = {337--342},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICFHR.2016.0070},
  doi          = {10.1109/ICFHR.2016.0070},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icfhr/HuZ16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/PengHL16,
  author       = {Liqiang Peng and
                  Lei Hu and
                  Yao Lu},
  editor       = {Seokhie Hong and
                  Jong Hwan Park},
  title        = {Improved Results on Cryptanalysis of Prime Power {RSA}},
  booktitle    = {Information Security and Cryptology - {ICISC} 2016 - 19th International
                  Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10157},
  pages        = {287--303},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53177-9\_15},
  doi          = {10.1007/978-3-319-53177-9\_15},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/PengHL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/QiaoHS16a,
  author       = {Kexin Qiao and
                  Lei Hu and
                  Siwei Sun},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Differential Analysis on Simeck and {SIMON} with Dynamic Key-Guessing
                  Techniques},
  booktitle    = {Information Systems Security and Privacy - Second International Conference,
                  {ICISSP} 2016, Rome, Italy, February 19-21, 2016, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {691},
  pages        = {64--85},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-54433-5\_5},
  doi          = {10.1007/978-3-319-54433-5\_5},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/QiaoHS16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/QiaoHS16,
  author       = {Kexin Qiao and
                  Lei Hu and
                  Siwei Sun},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Differential Security Evaluation of Simeck with Dynamic Key-guessing
                  Techniques},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {74--84},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005684400740084},
  doi          = {10.5220/0005684400740084},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/QiaoHS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/ShiHSS16,
  author       = {Danping Shi and
                  Lei Hu and
                  Siwei Sun and
                  Ling Song},
  editor       = {Olivier Camp and
                  Steven Furnell and
                  Paolo Mori},
  title        = {Linear(hull) Cryptanalysis of Round-reduced Versions of {KATAN}},
  booktitle    = {Proceedings of the 2nd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21,
                  2016},
  pages        = {364--371},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005739103640371},
  doi          = {10.5220/0005739103640371},
  timestamp    = {Sun, 18 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icissp/ShiHSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnc/HuHW16,
  author       = {Maokai Hu and
                  Lei Hu and
                  Lifan Wang},
  title        = {Astronomical image superposition using an new improved particle swarm
                  optimization},
  booktitle    = {12th International Conference on Natural Computation, Fuzzy Systems
                  and Knowledge Discovery, {ICNC-FSKD} 2016, Changsha, China, August
                  13-15, 2016},
  pages        = {173--178},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/FSKD.2016.7603170},
  doi          = {10.1109/FSKD.2016.7603170},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/icnc/HuHW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/igarss/YangHYSDBM16,
  author       = {Zhengwei Yang and
                  Lei Hu and
                  Genong Yu and
                  Ranjay Shrestha and
                  Liping Di and
                  Claire Boryan and
                  Rick Mueller},
  title        = {Web service-based {SMAP} soil moisture data visualization, dissemination
                  and analytics based on vegscape framwork},
  booktitle    = {2016 {IEEE} International Geoscience and Remote Sensing Symposium,
                  {IGARSS} 2016, Beijing, China, July 10-15, 2016},
  pages        = {3624--3627},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/IGARSS.2016.7729939},
  doi          = {10.1109/IGARSS.2016.7729939},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/igarss/YangHYSDBM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/XuHZPH16,
  author       = {Jun Xu and
                  Lei Hu and
                  Xiaona Zhang and
                  Liqiang Peng and
                  Zhangjie Huang},
  editor       = {Matt Bishop and
                  Anderson C. A. Nascimento},
  title        = {Cryptanalysis and Improved Construction of a Group Key Agreement for
                  Secure Group Communication},
  booktitle    = {Information Security - 19th International Conference, {ISC} 2016,
                  Honolulu, HI, USA, September 3-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9866},
  pages        = {48--58},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45871-7\_4},
  doi          = {10.1007/978-3-319-45871-7\_4},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/XuHZPH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/XuHSZHP16,
  author       = {Jun Xu and
                  Lei Hu and
                  Santanu Sarkar and
                  Xiaona Zhang and
                  Zhangjie Huang and
                  Liqiang Peng},
  editor       = {Matt Bishop and
                  Anderson C. A. Nascimento},
  title        = {Cryptanalysis of Multi-Prime {\textbackslash}varPhi -Hiding Assumption},
  booktitle    = {Information Security - 19th International Conference, {ISC} 2016,
                  Honolulu, HI, USA, September 3-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9866},
  pages        = {440--453},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45871-7\_26},
  doi          = {10.1007/978-3-319-45871-7\_26},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/XuHSZHP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/YangHSS16,
  author       = {Qianqian Yang and
                  Lei Hu and
                  Siwei Sun and
                  Ling Song},
  editor       = {Kazuto Ogawa and
                  Katsunari Yoshioka},
  title        = {Related-Key Impossible Differential Analysis of Full Khudra},
  booktitle    = {Advances in Information and Computer Security - 11th International
                  Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9836},
  pages        = {135--146},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44524-3\_8},
  doi          = {10.1007/978-3-319-44524-3\_8},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/YangHSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/YangHSS16,
  author       = {Qianqian Yang and
                  Lei Hu and
                  Siwei Sun and
                  Ling Song},
  editor       = {Jiageng Chen and
                  Vincenzo Piuri and
                  Chunhua Su and
                  Moti Yung},
  title        = {Extension of Meet-in-the-Middle Technique for Truncated Differential
                  and Its Application to RoadRunneR},
  booktitle    = {Network and System Security - 10th International Conference, {NSS}
                  2016, Taipei, Taiwan, September 28-30, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9955},
  pages        = {398--411},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46298-1\_26},
  doi          = {10.1007/978-3-319-46298-1\_26},
  timestamp    = {Thu, 23 Jun 2022 19:57:36 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/YangHSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartcom/HuSSXHK16,
  author       = {Lei Hu and
                  Huan Shen and
                  Qingsong Shi and
                  Jiajia Xu and
                  Wei Hu and
                  Peng Ke},
  editor       = {Meikang Qiu},
  title        = {An Buffering Optimization Algorithm for Cooperative Mobile Service},
  booktitle    = {Smart Computing and Communication - First International Conference,
                  SmartCom 2016, Shenzhen, China, December 17-19, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10135},
  pages        = {86--94},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-52015-5\_9},
  doi          = {10.1007/978-3-319-52015-5\_9},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/smartcom/HuSSXHK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangHSS16,
  author       = {Qianqian Yang and
                  Lei Hu and
                  Siwei Sun and
                  Ling Song},
  title        = {Truncated Differential Analysis of Round-Reduced RoadRunneR Block
                  Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {84},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/084},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YangHSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XuHSZHP16,
  author       = {Jun Xu and
                  Lei Hu and
                  Santanu Sarkar and
                  Xiaona Zhang and
                  Zhangjie Huang and
                  Liqiang Peng},
  title        = {Cryptanalysis of Multi-Prime {\(\Phi\)}-Hiding Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {155},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/155},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/XuHSZHP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SunHWWSMYF16,
  author       = {Siwei Sun and
                  Lei Hu and
                  Peng Wang and
                  Meiqin Wang and
                  Danping Shi and
                  Xiaoshuang Ma and
                  Qianqian Yang and
                  Kai Fu},
  title        = {Mixed Integer Programming Models for Finite Automaton and Its Application
                  to Additive Differential Patterns of Exclusive-Or},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {338},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/338},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SunHWWSMYF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FuWGSH16,
  author       = {Kai Fu and
                  Meiqin Wang and
                  Yinghua Guo and
                  Siwei Sun and
                  Lei Hu},
  title        = {MILP-Based Automatic Search Algorithms for Diff erential and Linear
                  Trails for Speck},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {407},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/407},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FuWGSH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhengWZH15,
  author       = {Dabin Zheng and
                  Xiaoqiang Wang and
                  Xiangyong Zeng and
                  Lei Hu},
  title        = {The weight distribution of a family of p-ary cyclic codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {75},
  number       = {2},
  pages        = {263--275},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10623-013-9908-2},
  doi          = {10.1007/S10623-013-9908-2},
  timestamp    = {Fri, 23 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhengWZH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiCZLHS15,
  author       = {Jiao Li and
                  Claude Carlet and
                  Xiangyong Zeng and
                  Chunlei Li and
                  Lei Hu and
                  Jinyong Shan},
  title        = {Two constructions of balanced Boolean functions with optimal algebraic
                  immunity, high nonlinearity and good behavior against fast algebraic
                  attacks},
  journal      = {Des. Codes Cryptogr.},
  volume       = {76},
  number       = {2},
  pages        = {279--305},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10623-014-9949-1},
  doi          = {10.1007/S10623-014-9949-1},
  timestamp    = {Mon, 24 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiCZLHS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/esi/HuYZGJZ15,
  author       = {Lei Hu and
                  Peng Yue and
                  Mingda Zhang and
                  Jianya Gong and
                  Liangcun Jiang and
                  Xining Zhang},
  title        = {Task-oriented Sensor Web data processing for environmental monitoring},
  journal      = {Earth Sci. Informatics},
  volume       = {8},
  number       = {3},
  pages        = {511--525},
  year         = {2015},
  url          = {https://doi.org/10.1007/s12145-015-0235-1},
  doi          = {10.1007/S12145-015-0235-1},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/esi/HuYZGJZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ffa/ZhaHC15,
  author       = {Zhengbang Zha and
                  Lei Hu and
                  Xiwang Cao},
  title        = {Constructing permutations and complete permutations over finite fields
                  via subfield-valued polynomials},
  journal      = {Finite Fields Their Appl.},
  volume       = {31},
  pages        = {162--177},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ffa.2014.10.002},
  doi          = {10.1016/J.FFA.2014.10.002},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ffa/ZhaHC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ffa/WangZHZ15,
  author       = {Xiaoqiang Wang and
                  Dabin Zheng and
                  Lei Hu and
                  Xiangyong Zeng},
  title        = {The weight distributions of two classes of binary cyclic codes},
  journal      = {Finite Fields Their Appl.},
  volume       = {34},
  pages        = {192--207},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ffa.2015.01.012},
  doi          = {10.1016/J.FFA.2015.01.012},
  timestamp    = {Fri, 23 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ffa/WangZHZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/QiaoHSMK15,
  author       = {Kexin Qiao and
                  Lei Hu and
                  Siwei Sun and
                  Xiaoshuang Ma and
                  Haibin Kan},
  title        = {Improved {MILP} Modeling for Automatic Security Evaluation and Application
                  to {FOX}},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {98-A},
  number       = {1},
  pages        = {72--80},
  year         = {2015},
  url          = {https://doi.org/10.1587/transfun.E98.A.72},
  doi          = {10.1587/TRANSFUN.E98.A.72},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/QiaoHSMK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijfcs/CaoH15,
  author       = {Xiwang Cao and
                  Lei Hu},
  title        = {Two Boolean Functions with Five-Valued Walsh Spectra and High Nonlinearity},
  journal      = {Int. J. Found. Comput. Sci.},
  volume       = {26},
  number       = {5},
  pages        = {537--556},
  year         = {2015},
  url          = {https://doi.org/10.1142/S0129054115500306},
  doi          = {10.1142/S0129054115500306},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijfcs/CaoH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jossac/SunH15,
  author       = {Zhiqiang Sun and
                  Lei Hu},
  title        = {Boolean functions with four-valued Walsh spectra},
  journal      = {J. Syst. Sci. Complex.},
  volume       = {28},
  number       = {3},
  pages        = {743--754},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11424-014-2224-8},
  doi          = {10.1007/S11424-014-2224-8},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jossac/SunH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ShiHSS15,
  author       = {Danping Shi and
                  Lei Hu and
                  Ling Song and
                  Siwei Sun},
  title        = {Differential fault attack on Zorro block cipher},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {16},
  pages        = {2826--2835},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1207},
  doi          = {10.1002/SEC.1207},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ShiHSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/staeors/HeYDZH15,
  author       = {Lianlian He and
                  Peng Yue and
                  Liping Di and
                  Mingda Zhang and
                  Lei Hu},
  title        = {Adding Geospatial Data Provenance into {SDI} - {A} Service-Oriented
                  Approach},
  journal      = {{IEEE} J. Sel. Top. Appl. Earth Obs. Remote. Sens.},
  volume       = {8},
  number       = {2},
  pages        = {926--936},
  year         = {2015},
  url          = {https://doi.org/10.1109/JSTARS.2014.2340737},
  doi          = {10.1109/JSTARS.2014.2340737},
  timestamp    = {Tue, 31 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/staeors/HeYDZH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/ZhaH15,
  author       = {Zhengbang Zha and
                  Lei Hu},
  title        = {Cyclotomic Constructions of Zero-Difference Balanced Functions With
                  Applications},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {61},
  number       = {3},
  pages        = {1491--1495},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIT.2014.2388231},
  doi          = {10.1109/TIT.2014.2388231},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/ZhaH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ZhangWXHPHL15,
  author       = {Xiaona Zhang and
                  Li{-}Ping Wang and
                  Jun Xu and
                  Lei Hu and
                  Liqiang Peng and
                  Zhangjie Huang and
                  Zeyi Liu},
  editor       = {Dongdai Lin and
                  XiaoFeng Wang and
                  Moti Yung},
  title        = {Recovering a Sum of Two Squares Decomposition Revisited},
  booktitle    = {Information Security and Cryptology - 11th International Conference,
                  Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9589},
  pages        = {178--192},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-38898-4\_11},
  doi          = {10.1007/978-3-319-38898-4\_11},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/ZhangWXHPHL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cvpr/ZengWTZH15,
  author       = {Mingyong Zeng and
                  Zemin Wu and
                  Chang Tian and
                  Lei Zhang and
                  Lei Hu},
  title        = {Efficient person re-identification by hybrid spatiogram and covariance
                  descriptor},
  booktitle    = {2015 {IEEE} Conference on Computer Vision and Pattern Recognition
                  Workshops, {CVPR} Workshops 2015, Boston, MA, USA, June 7-12, 2015},
  pages        = {48--56},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CVPRW.2015.7301296},
  doi          = {10.1109/CVPRW.2015.7301296},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cvpr/ZengWTZH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/HuHLLZ15,
  author       = {Lei Hu and
                  Wei Hu and
                  Ruomiao Li and
                  Chunqiang Li and
                  Zhanyan Zhang},
  title        = {A Time Slices Based Novel {DVS} Algorithm for Embedded Systems},
  booktitle    = {17th {IEEE} International Conference on High Performance Computing
                  and Communications, {HPCC} 2015, 7th {IEEE} International Symposium
                  on Cyberspace Safety and Security, {CSS} 2015, and 12th {IEEE} International
                  Conference on Embedded Software and Systems, {ICESS} 2015, New York,
                  NY, USA, August 24-26, 2015},
  pages        = {1500--1505},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/HPCC-CSS-ICESS.2015.163},
  doi          = {10.1109/HPCC-CSS-ICESS.2015.163},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/hpcc/HuHLLZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/igarss/LiXGH15,
  author       = {Xinzhi Li and
                  Qizhi Xu and
                  Feng Gao and
                  Lei Hu},
  title        = {Pansharpening based on an improved ratio enhancement},
  booktitle    = {2015 {IEEE} International Geoscience and Remote Sensing Symposium,
                  {IGARSS} 2015, Milan, Italy, July 26-31, 2015},
  pages        = {1100--1103},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/IGARSS.2015.7325962},
  doi          = {10.1109/IGARSS.2015.7325962},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/igarss/LiXGH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/igarss/ZhongXYH15,
  author       = {Chen Zhong and
                  Qizhi Xu and
                  Feng Yang and
                  Lei Hu},
  title        = {Building change detection for high-resolution remotely sensed images
                  based on a semantic dependency},
  booktitle    = {2015 {IEEE} International Geoscience and Remote Sensing Symposium,
                  {IGARSS} 2015, Milan, Italy, July 26-31, 2015},
  pages        = {3345--3348},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/IGARSS.2015.7326535},
  doi          = {10.1109/IGARSS.2015.7326535},
  timestamp    = {Mon, 28 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/igarss/ZhongXYH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/igarss/YangXGH15,
  author       = {Feng Yang and
                  Qizhi Xu and
                  Feng Gao and
                  Lei Hu},
  title        = {Ship detection from optical satellite images based on visual search
                  mechanism},
  booktitle    = {2015 {IEEE} International Geoscience and Remote Sensing Symposium,
                  {IGARSS} 2015, Milan, Italy, July 26-31, 2015},
  pages        = {3679--3682},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/IGARSS.2015.7326621},
  doi          = {10.1109/IGARSS.2015.7326621},
  timestamp    = {Mon, 28 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/igarss/YangXGH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/igarss/HuYFZ15,
  author       = {Lei Hu and
                  Jihua Ye and
                  Yue Feng and
                  Yongmei Zhang},
  title        = {Registration for long-term multi-temporal remote sensing images under
                  spatial constraints from historical data},
  booktitle    = {2015 {IEEE} International Geoscience and Remote Sensing Symposium,
                  {IGARSS} 2015, Milan, Italy, July 26-31, 2015},
  pages        = {4836--4839},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/IGARSS.2015.7326913},
  doi          = {10.1109/IGARSS.2015.7326913},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/igarss/HuYFZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/PengHLSXH15,
  author       = {Liqiang Peng and
                  Lei Hu and
                  Yao Lu and
                  Santanu Sarkar and
                  Jun Xu and
                  Zhangjie Huang},
  editor       = {Alex Biryukov and
                  Vipul Goyal},
  title        = {Cryptanalysis of Variants of {RSA} with Multiple Small Secret Exponents},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2015 - 16th International Conference
                  on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9462},
  pages        = {105--123},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26617-6\_6},
  doi          = {10.1007/978-3-319-26617-6\_6},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/PengHLSXH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/PengHHX15,
  author       = {Liqiang Peng and
                  Lei Hu and
                  Zhangjie Huang and
                  Jun Xu},
  editor       = {Javier L{\'{o}}pez and
                  Yongdong Wu},
  title        = {Partial Prime Factor Exposure Attacks on {RSA} and Its Takagi's Variant},
  booktitle    = {Information Security Practice and Experience - 11th International
                  Conference, {ISPEC} 2015, Beijing, China, May 5-8, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9065},
  pages        = {96--108},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-17533-1\_7},
  doi          = {10.1007/978-3-319-17533-1\_7},
  timestamp    = {Thu, 29 Aug 2019 08:10:02 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/PengHHX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/YangHSQSSM15,
  author       = {Qianqian Yang and
                  Lei Hu and
                  Siwei Sun and
                  Kexin Qiao and
                  Ling Song and
                  Jinyong Shan and
                  Xiaoshuang Ma},
  editor       = {Javier L{\'{o}}pez and
                  Yongdong Wu},
  title        = {Improved Differential Analysis of Block Cipher {PRIDE}},
  booktitle    = {Information Security Practice and Experience - 11th International
                  Conference, {ISPEC} 2015, Beijing, China, May 5-8, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9065},
  pages        = {209--219},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-17533-1\_15},
  doi          = {10.1007/978-3-319-17533-1\_15},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/YangHSQSSM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/SunHWYQMSS15,
  author       = {Siwei Sun and
                  Lei Hu and
                  Meiqin Wang and
                  Qianqian Yang and
                  Kexin Qiao and
                  Xiaoshuang Ma and
                  Ling Song and
                  Jinyong Shan},
  editor       = {Javier L{\'{o}}pez and
                  Chris J. Mitchell},
  title        = {Extending the Applicability of the Mixed-Integer Programming Technique
                  in Automatic Differential Cryptanalysis},
  booktitle    = {Information Security - 18th International Conference, {ISC} 2015,
                  Trondheim, Norway, September 9-11, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9290},
  pages        = {141--157},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23318-5\_8},
  doi          = {10.1007/978-3-319-23318-5\_8},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/SunHWYQMSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/PengHLHX15,
  author       = {Liqiang Peng and
                  Lei Hu and
                  Yao Lu and
                  Zhangjie Huang and
                  Jun Xu},
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {Implicit Factorization of {RSA} Moduli Revisited (Short Paper)},
  booktitle    = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  pages        = {67--76},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1\_5},
  doi          = {10.1007/978-3-319-22425-1\_5},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/PengHLHX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SunHQMSS15,
  author       = {Siwei Sun and
                  Lei Hu and
                  Kexin Qiao and
                  Xiaoshuang Ma and
                  Jinyong Shan and
                  Ling Song},
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {Improvement on the Method for Automatic Differential Analysis and
                  Its Application to Two Lightweight Block Ciphers {DESL} and LBlock-s},
  booktitle    = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  pages        = {97--111},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1\_7},
  doi          = {10.1007/978-3-319-22425-1\_7},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/SunHQMSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/LuP0HL15,
  author       = {Yao Lu and
                  Liqiang Peng and
                  Rui Zhang and
                  Lei Hu and
                  Dongdai Lin},
  editor       = {Orr Dunkelman and
                  Liam Keliher},
  title        = {Towards Optimal Bounds for Implicit Factorization Problem},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2015 - 22nd International Conference,
                  Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9566},
  pages        = {462--476},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31301-6\_26},
  doi          = {10.1007/978-3-319-31301-6\_26},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/LuP0HL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ZhaHSS15,
  author       = {Zhengbang Zha and
                  Lei Hu and
                  Siwei Sun and
                  Jinyong Shan},
  title        = {Further results on differentially 4-uniform permutations over F\({}_{\mbox{2\({}^{\mbox{2m}}\)}}\)},
  journal      = {CoRR},
  volume       = {abs/1502.03874},
  year         = {2015},
  url          = {http://arxiv.org/abs/1502.03874},
  eprinttype    = {arXiv},
  eprint       = {1502.03874},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ZhaHSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SunHWWQMSSF15,
  author       = {Siwei Sun and
                  Lei Hu and
                  Meiqin Wang and
                  Peng Wang and
                  Kexin Qiao and
                  Xiaoshuang Ma and
                  Danping Shi and
                  Ling Song and
                  Kai Fu},
  title        = {Constructing Mixed-integer Programming Models whose Feasible Region
                  is Exactly the Set of All Valid Differential Characteristics of {SIMON}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {122},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/122},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SunHWWQMSSF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangHSS15,
  author       = {Qianqian Yang and
                  Lei Hu and
                  Siwei Sun and
                  Ling Song},
  title        = {Related-key Impossible Differential Analysis of Full Khudra},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {840},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/840},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YangHSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/QiaoHS15,
  author       = {Kexin Qiao and
                  Lei Hu and
                  Siwei Sun},
  title        = {Differential Security Evaluation of Simeck with Dynamic Key-guessing
                  Techniques},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {902},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/902},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/QiaoHS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShiHSS15,
  author       = {Danping Shi and
                  Lei Hu and
                  Siwei Sun and
                  Ling Song},
  title        = {Linear (hull) Cryptanalysis of Round-reduced Versions of {KATAN}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {964},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/964},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShiHSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aaecc/ZhaHSS14,
  author       = {Zhengbang Zha and
                  Lei Hu and
                  Siwei Sun and
                  Yao Sun},
  title        = {New constructions of {APN} polynomial functions in odd characteristic},
  journal      = {Appl. Algebra Eng. Commun. Comput.},
  volume       = {25},
  number       = {4},
  pages        = {249--263},
  year         = {2014},
  url          = {https://doi.org/10.1007/s00200-014-0227-2},
  doi          = {10.1007/S00200-014-0227-2},
  timestamp    = {Tue, 22 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/aaecc/ZhaHSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/ShanHZ14,
  author       = {Jinyong Shan and
                  Lei Hu and
                  Xiangyong Zeng},
  title        = {Cryptographic properties of nested functions and algebraic immunity
                  of the Boolean function in Hitag2 stream cipher},
  journal      = {Cryptogr. Commun.},
  volume       = {6},
  number       = {3},
  pages        = {233--254},
  year         = {2014},
  url          = {https://doi.org/10.1007/s12095-014-0099-0},
  doi          = {10.1007/S12095-014-0099-0},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/ShanHZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CaoH14,
  author       = {Weiwei Cao and
                  Lei Hu},
  title        = {Projective interpolation of polynomial vectors and improved key recovery
                  attack on {SFLASH}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {73},
  number       = {3},
  pages        = {719--730},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-013-9819-2},
  doi          = {10.1007/S10623-013-9819-2},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CaoH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ffa/ZhaHS14,
  author       = {Zhengbang Zha and
                  Lei Hu and
                  Siwei Sun},
  title        = {Constructing new differentially 4-uniform permutations from the inverse
                  function},
  journal      = {Finite Fields Their Appl.},
  volume       = {25},
  pages        = {64--78},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ffa.2013.08.003},
  doi          = {10.1016/J.FFA.2013.08.003},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ffa/ZhaHS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ffa/TuZH14,
  author       = {Ziran Tu and
                  Xiangyong Zeng and
                  Lei Hu},
  title        = {Several classes of complete permutation polynomials},
  journal      = {Finite Fields Their Appl.},
  volume       = {25},
  pages        = {182--193},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ffa.2013.09.007},
  doi          = {10.1016/J.FFA.2013.09.007},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ffa/TuZH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ffa/CaoHZ14,
  author       = {Xiwang Cao and
                  Lei Hu and
                  Zhengbang Zha},
  title        = {Constructing permutation polynomials from piecewise permutations},
  journal      = {Finite Fields Their Appl.},
  volume       = {26},
  pages        = {162--174},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ffa.2013.12.001},
  doi          = {10.1016/J.FFA.2013.12.001},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ffa/CaoHZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ffa/ZhengWHZ14,
  author       = {Dabin Zheng and
                  Xiaoqiang Wang and
                  Lei Hu and
                  Xiangyong Zeng},
  title        = {The weight distributions of two classes of p-ary cyclic codes},
  journal      = {Finite Fields Their Appl.},
  volume       = {29},
  pages        = {202--224},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ffa.2014.05.001},
  doi          = {10.1016/J.FFA.2014.05.001},
  timestamp    = {Fri, 23 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ffa/ZhengWHZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-com/XuHSX14,
  author       = {Jun Xu and
                  Lei Hu and
                  Siwei Sun and
                  Yonghong Xie},
  title        = {Cryptanalysis of countermeasures against multiple transmission attacks
                  on {NTRU}},
  journal      = {{IET} Commun.},
  volume       = {8},
  number       = {12},
  pages        = {2142--2146},
  year         = {2014},
  url          = {https://doi.org/10.1049/iet-com.2013.1092},
  doi          = {10.1049/IET-COM.2013.1092},
  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-com/XuHSX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-com/XuHS14,
  author       = {Jun Xu and
                  Lei Hu and
                  Siwei Sun},
  title        = {Cryptanalysis of two cryptosystems based on multiple intractability
                  assumptions},
  journal      = {{IET} Commun.},
  volume       = {8},
  number       = {14},
  pages        = {2433--2437},
  year         = {2014},
  url          = {https://doi.org/10.1049/iet-com.2013.1101},
  doi          = {10.1049/IET-COM.2013.1101},
  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-com/XuHS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jossac/CaiZH14,
  author       = {Han Cai and
                  Xiangyong Zeng and
                  Lei Hu},
  title        = {Families of \emph{p}-ary sequences with low correlation and large
                  linear complexity},
  journal      = {J. Syst. Sci. Complex.},
  volume       = {27},
  number       = {6},
  pages        = {1305--1319},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11424-014-1243-9},
  doi          = {10.1007/S11424-014-1243-9},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jossac/CaiZH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangH14,
  author       = {Weijia Wang and
                  Lei Hu},
  title        = {A generic homomorphic {MAC} construction for authentication in network
                  coding},
  journal      = {Secur. Commun. Networks},
  volume       = {7},
  number       = {2},
  pages        = {429--433},
  year         = {2014},
  url          = {https://doi.org/10.1002/sec.847},
  doi          = {10.1002/SEC.847},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WangH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/WangH14,
  author       = {Weijia Wang and
                  Lei Hu},
  title        = {A Secure and Efficient Handover Authentication Protocol for Wireless
                  Networks},
  journal      = {Sensors},
  volume       = {14},
  number       = {7},
  pages        = {11379--11394},
  year         = {2014},
  url          = {https://doi.org/10.3390/s140711379},
  doi          = {10.3390/S140711379},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/WangH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/staeors/YueJH14,
  author       = {Peng Yue and
                  Liangcun Jiang and
                  Lei Hu},
  title        = {Google Fusion Tables for Managing Soil Moisture Sensor Observations},
  journal      = {{IEEE} J. Sel. Top. Appl. Earth Obs. Remote. Sens.},
  volume       = {7},
  number       = {11},
  pages        = {4414--4421},
  year         = {2014},
  url          = {https://doi.org/10.1109/JSTARS.2014.2353621},
  doi          = {10.1109/JSTARS.2014.2353621},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/staeors/YueJH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/LiZHLH14,
  author       = {Chaoyun Li and
                  Xiangyong Zeng and
                  Tor Helleseth and
                  Chunlei Li and
                  Lei Hu},
  title        = {The Properties of a Class of Linear FSRs and Their Applications to
                  the Construction of Nonlinear FSRs},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {60},
  number       = {5},
  pages        = {3052--3061},
  year         = {2014},
  url          = {https://doi.org/10.1109/TIT.2014.2310748},
  doi          = {10.1109/TIT.2014.2310748},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/LiZHLH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/HuangHXPX14,
  author       = {Zhangjie Huang and
                  Lei Hu and
                  Jun Xu and
                  Liqiang Peng and
                  Yonghong Xie},
  editor       = {Ioana Boureanu and
                  Philippe Owesarski and
                  Serge Vaudenay},
  title        = {Partial Key Exposure Attacks on Takagi's Variant of {RSA}},
  booktitle    = {Applied Cryptography and Network Security - 12th International Conference,
                  {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8479},
  pages        = {134--150},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-07536-5\_9},
  doi          = {10.1007/978-3-319-07536-5\_9},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/HuangHXPX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/PengHXHX14,
  author       = {Liqiang Peng and
                  Lei Hu and
                  Jun Xu and
                  Zhangjie Huang and
                  Yonghong Xie},
  editor       = {David Pointcheval and
                  Damien Vergnaud},
  title        = {Further Improvement of Factoring {RSA} Moduli with Implicit Hint},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2014 - 7th International Conference
                  on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8469},
  pages        = {165--177},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06734-6\_11},
  doi          = {10.1007/978-3-319-06734-6\_11},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/PengHXHX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/SunHWQMS14,
  author       = {Siwei Sun and
                  Lei Hu and
                  Peng Wang and
                  Kexin Qiao and
                  Xiaoshuang Ma and
                  Ling Song},
  editor       = {Palash Sarkar and
                  Tetsu Iwata},
  title        = {Automatic Security Evaluation and (Related-key) Differential Characteristic
                  Search: Application to SIMON, PRESENT, LBlock, {DES(L)} and Other
                  Bit-Oriented Block Ciphers},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8873},
  pages        = {158--178},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45611-8\_9},
  doi          = {10.1007/978-3-662-45611-8\_9},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/SunHWQMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/HuangHX14,
  author       = {Zhangjie Huang and
                  Lei Hu and
                  Jun Xu},
  editor       = {Dongdai Lin and
                  Moti Yung and
                  Jianying Zhou},
  title        = {Attacking {RSA} with a Composed Decryption Exponent Using Unravelled
                  Linearization},
  booktitle    = {Information Security and Cryptology - 10th International Conference,
                  Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8957},
  pages        = {207--219},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-16745-9\_12},
  doi          = {10.1007/978-3-319-16745-9\_12},
  timestamp    = {Fri, 09 Apr 2021 18:52:22 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/HuangHX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/SongHSZSH14,
  author       = {Ling Song and
                  Lei Hu and
                  Siwei Sun and
                  Zhang Zhang and
                  Danping Shi and
                  Ronglin Hao},
  editor       = {Lucas Chi Kwong Hui and
                  S. H. Qing and
                  Elaine Shi and
                  Siu{-}Ming Yiu},
  title        = {Error-Tolerant Algebraic Side-Channel Attacks Using {BEE}},
  booktitle    = {Information and Communications Security - 16th International Conference,
                  {ICICS} 2014, Hong Kong, China, December 16-17, 2014, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8958},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-21966-0\_1},
  doi          = {10.1007/978-3-319-21966-0\_1},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/SongHSZSH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icinfa/ZhaHS14,
  author       = {Zhengbang Zha and
                  Lei Hu and
                  Jinyong Shan},
  title        = {Differentially 6-uniform permutations by modifying the Gold function},
  booktitle    = {{IEEE} International Conference on Information and Automation, {ICIA}
                  2014, Hailar, Hulun Buir, China, July 28-30, 2014},
  pages        = {961--965},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICInfA.2014.6932790},
  doi          = {10.1109/ICINFA.2014.6932790},
  timestamp    = {Mon, 09 Aug 2021 14:54:01 +0200},
  biburl       = {https://dblp.org/rec/conf/icinfa/ZhaHS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/XuHHP14,
  author       = {Jun Xu and
                  Lei Hu and
                  Zhangjie Huang and
                  Liqiang Peng},
  editor       = {Xinyi Huang and
                  Jianying Zhou},
  title        = {Modular Inversion Hidden Number Problem Revisited},
  booktitle    = {Information Security Practice and Experience - 10th International
                  Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8434},
  pages        = {537--551},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06320-1\_39},
  doi          = {10.1007/978-3-319-06320-1\_39},
  timestamp    = {Fri, 09 Apr 2021 18:45:22 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/XuHHP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lightsec/SongHMS14,
  author       = {Ling Song and
                  Lei Hu and
                  Bingke Ma and
                  Danping Shi},
  editor       = {Thomas Eisenbarth and
                  Erdin{\c{c}} {\"{O}}zt{\"{u}}rk},
  title        = {Match Box Meet-in-the-Middle Attacks on the {SIMON} Family of Block
                  Ciphers},
  booktitle    = {Lightweight Cryptography for Security and Privacy - Third International
                  Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8898},
  pages        = {140--151},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-16363-5\_9},
  doi          = {10.1007/978-3-319-16363-5\_9},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/lightsec/SongHMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/msn/HuZG14,
  author       = {Lei Hu and
                  Zhongnan Zhang and
                  Fangyuan Gao},
  title        = {Probabilistic Snapshot Based Evolutionary Social Network Events Detection},
  booktitle    = {10th International Conference on Mobile Ad-hoc and Sensor Networks,
                  {MSN} 2014, Maui, HI, USA, December 19-21, 2014},
  pages        = {243--250},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSN.2014.40},
  doi          = {10.1109/MSN.2014.40},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/msn/HuZG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/MaHSQS14,
  author       = {Xiaoshuang Ma and
                  Lei Hu and
                  Siwei Sun and
                  Kexin Qiao and
                  Jinyong Shan},
  editor       = {Man Ho Au and
                  Barbara Carminati and
                  C.{-}C. Jay Kuo},
  title        = {Tighter Security Bound of {MIBS} Block Cipher against Differential
                  Attack},
  booktitle    = {Network and System Security - 8th International Conference, {NSS}
                  2014, Xi'an, China, October 15-17, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8792},
  pages        = {518--525},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11698-3\_41},
  doi          = {10.1007/978-3-319-11698-3\_41},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/MaHSQS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CaoH14,
  author       = {Xiwang Cao and
                  Lei Hu},
  title        = {Two Boolean functions with five-valued Walsh spectra and high nonlinearity},
  journal      = {CoRR},
  volume       = {abs/1406.4567},
  year         = {2014},
  url          = {http://arxiv.org/abs/1406.4567},
  eprinttype    = {arXiv},
  eprint       = {1406.4567},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/CaoH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SongHSZSH14a,
  author       = {Ling Song and
                  Lei Hu and
                  Siwei Sun and
                  Zhang Zhang and
                  Danping Shi and
                  Ronglin Hao},
  title        = {Error-Tolerant Algebraic Side-Channel Attacks Using {BEE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {683},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/683},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SongHSZSH14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SunHWWQMSS14,
  author       = {Siwei Sun and
                  Lei Hu and
                  Meiqin Wang and
                  Peng Wang and
                  Kexin Qiao and
                  Xiaoshuang Ma and
                  Danping Shi and
                  Ling Song},
  title        = {Automatic Enumeration of (Related-key) Differential and Linear Characteristics
                  with Predefined Properties and Its Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {747},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/747},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SunHWWQMSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XuHHP14,
  author       = {Jun Xu and
                  Lei Hu and
                  Zhangjie Huang and
                  Liqiang Peng},
  title        = {Finding Small Solutions of a Class of Simultaneous Modular Equations
                  and Applications to Modular Inversion Hidden Number Problem and Inversive
                  Congruential Generator},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {843},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/843},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/XuHHP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShiHSSQM14,
  author       = {Danping Shi and
                  Lei Hu and
                  Siwei Sun and
                  Ling Song and
                  Kexin Qiao and
                  Xiaoshuang Ma},
  title        = {Improved Linear (hull) Cryptanalysis of Round-reduced Versions of
                  {SIMON}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {973},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/973},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShiHSSQM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangHSQSSM14,
  author       = {Qianqian Yang and
                  Lei Hu and
                  Siwei Sun and
                  Kexin Qiao and
                  Ling Song and
                  Jinyong Shan and
                  Xiaoshuang Ma},
  title        = {Improved Differential Analysis of Block Cipher {PRIDE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {978},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/978},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YangHSQSSM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShanHSSM14,
  author       = {Jinyong Shan and
                  Lei Hu and
                  Ling Song and
                  Siwei Sun and
                  Xiaoshuang Ma},
  title        = {Related-Key Differential Attack on Round Reduced {RECTANGLE-80}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {986},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/986},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShanHSSM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aaecc/ZhengYH13,
  author       = {Dabin Zheng and
                  Long Yu and
                  Lei Hu},
  title        = {On a class of binomial bent functions over the finite fields of odd
                  characteristic},
  journal      = {Appl. Algebra Eng. Commun. Comput.},
  volume       = {24},
  number       = {6},
  pages        = {461--475},
  year         = {2013},
  url          = {https://doi.org/10.1007/s00200-013-0202-3},
  doi          = {10.1007/S00200-013-0202-3},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aaecc/ZhengYH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cbm/HuZLWYTFZDW13,
  author       = {Lei Hu and
                  Jie Zhang and
                  Changsheng Li and
                  Yun Wang and
                  Yan Yang and
                  Peifu Tang and
                  Liming Fang and
                  Lihai Zhang and
                  Hailong Du and
                  Liquan Wang},
  title        = {A femur fracture reduction method based on anatomy of the contralateral
                  side},
  journal      = {Comput. Biol. Medicine},
  volume       = {43},
  number       = {7},
  pages        = {840--846},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.compbiomed.2013.04.009},
  doi          = {10.1016/J.COMPBIOMED.2013.04.009},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cbm/HuZLWYTFZDW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/HuZSF13,
  author       = {Lei Hu and
                  Jianxiong Zhou and
                  Zhiguang Shi and
                  Qiang Fu},
  title        = {Compressed sensing of superimposed chirps with adaptive dictionary
                  refinement},
  journal      = {Sci. China Inf. Sci.},
  volume       = {56},
  number       = {12},
  pages        = {1--15},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11432-013-4838-1},
  doi          = {10.1007/S11432-013-4838-1},
  timestamp    = {Wed, 10 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/HuZSF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/digearth/YueZGH13,
  author       = {Peng Yue and
                  Hongxiu Zhou and
                  Jianya Gong and
                  Lei Hu},
  title        = {Geoprocessing in Cloud Computing platforms - a comparative analysis},
  journal      = {Int. J. Digit. Earth},
  volume       = {6},
  number       = {4},
  pages        = {404--425},
  year         = {2013},
  url          = {https://doi.org/10.1080/17538947.2012.748847},
  doi          = {10.1080/17538947.2012.748847},
  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/digearth/YueZGH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-com/PengHXXZ13,
  author       = {Liqiang Peng and
                  Lei Hu and
                  Jun Xu and
                  Yonghong Xie and
                  Jinyin Zuo},
  title        = {Analysis of two knapsack public key cryptosystems},
  journal      = {{IET} Commun.},
  volume       = {7},
  number       = {15},
  pages        = {1638--1643},
  year         = {2013},
  url          = {https://doi.org/10.1049/iet-com.2013.0180},
  doi          = {10.1049/IET-COM.2013.0180},
  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-com/PengHXXZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijfcs/CaiZTH13,
  author       = {Han Cai and
                  Xiangyong Zeng and
                  Xiaohu Tang and
                  Lei Hu},
  title        = {New Optimal frequency Hopping sequence Sets from Balanced Nested difference
                  Packings of Partition-Type},
  journal      = {Int. J. Found. Comput. Sci.},
  volume       = {24},
  number       = {4},
  pages        = {533},
  year         = {2013},
  url          = {https://doi.org/10.1142/S0129054113500196},
  doi          = {10.1142/S0129054113500196},
  timestamp    = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijfcs/CaiZTH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijfcs/ZhaH13,
  author       = {Zhengbang Zha and
                  Lei Hu},
  title        = {Constructing New {APN} Functions from known {PN} Functions},
  journal      = {Int. J. Found. Comput. Sci.},
  volume       = {24},
  number       = {8},
  pages        = {1209--1220},
  year         = {2013},
  url          = {https://doi.org/10.1142/S0129054113500299},
  doi          = {10.1142/S0129054113500299},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijfcs/ZhaH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/irob/HuWZZCMJFZ13,
  author       = {Lei Hu and
                  Yun Wang and
                  Jie Zhang and
                  Jun Zhang and
                  Yan Cui and
                  Lvzhong Ma and
                  Junyuan Jiang and
                  Liming Fang and
                  Bangcheng Zhang},
  title        = {A massage robot based on Chinese massage therapy},
  journal      = {Ind. Robot},
  volume       = {40},
  number       = {2},
  pages        = {158--172},
  year         = {2013},
  url          = {https://doi.org/10.1108/01439911311297775},
  doi          = {10.1108/01439911311297775},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/irob/HuWZZCMJFZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tgrs/SunYHGZL13,
  author       = {Ziheng Sun and
                  Peng Yue and
                  Lei Hu and
                  Jianya Gong and
                  Liangpei Zhang and
                  Xianchang Lu},
  title        = {GeoPWProv: Interleaving Map and Faceted Metadata for Provenance Visualization
                  and Navigation},
  journal      = {{IEEE} Trans. Geosci. Remote. Sens.},
  volume       = {51},
  number       = {11},
  pages        = {5131--5136},
  year         = {2013},
  url          = {https://doi.org/10.1109/TGRS.2013.2248064},
  doi          = {10.1109/TGRS.2013.2248064},
  timestamp    = {Tue, 07 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tgrs/SunYHGZL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsp/HuZSF13,
  author       = {Lei Hu and
                  Jianxiong Zhou and
                  Zhiguang Shi and
                  Qiang Fu},
  title        = {A Fast and Accurate Reconstruction Algorithm for Compressed Sensing
                  of Complex Sinusoids},
  journal      = {{IEEE} Trans. Signal Process.},
  volume       = {61},
  number       = {22},
  pages        = {5744--5754},
  year         = {2013},
  url          = {https://doi.org/10.1109/TSP.2013.2280125},
  doi          = {10.1109/TSP.2013.2280125},
  timestamp    = {Wed, 10 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsp/HuZSF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/appt/HuSL13,
  author       = {Lei Hu and
                  Xukun Shen and
                  Xiang Long},
  editor       = {Chenggang Wu and
                  Albert Cohen},
  title        = {Research on {SPH} Parallel Acceleration Strategies for Multi-GPU Platform},
  booktitle    = {Advanced Parallel Processing Technologies - 10th International Symposium,
                  {APPT} 2013, Stockholm, Sweden, August 27-28, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8299},
  pages        = {104--118},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-45293-2\_8},
  doi          = {10.1007/978-3-642-45293-2\_8},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/appt/HuSL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cikm/LiXLLGSLHC13,
  author       = {Dong Li and
                  Zhiming Xu and
                  Yishu Luo and
                  Sheng Li and
                  Anika Gupta and
                  Katia P. Sycara and
                  Shengmei Luo and
                  Lei Hu and
                  Hong Chen},
  editor       = {Qi He and
                  Arun Iyengar and
                  Wolfgang Nejdl and
                  Jian Pei and
                  Rajeev Rastogi},
  title        = {Modeling information diffusion over social networks for temporal dynamic
                  prediction},
  booktitle    = {22nd {ACM} International Conference on Information and Knowledge Management,
                  CIKM'13, San Francisco, CA, USA, October 27 - November 1, 2013},
  pages        = {1477--1480},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2505515.2507823},
  doi          = {10.1145/2505515.2507823},
  timestamp    = {Sun, 26 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cikm/LiXLLGSLHC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/SunHSXW13,
  author       = {Siwei Sun and
                  Lei Hu and
                  Ling Song and
                  Yonghong Xie and
                  Peng Wang},
  editor       = {Dongdai Lin and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Automatic Security Evaluation of Block Ciphers with S-bP Structures
                  Against Related-Key Differential Attacks},
  booktitle    = {Information Security and Cryptology - 9th International Conference,
                  Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8567},
  pages        = {39--51},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12087-4\_3},
  doi          = {10.1007/978-3-319-12087-4\_3},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/SunHSXW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drr/ZhuHZ13,
  author       = {Siyu Zhu and
                  Lei Hu and
                  Richard Zanibbi},
  editor       = {Richard Zanibbi and
                  Bertrand Co{\"{u}}asnon},
  title        = {Rotation-robust math symbol recognition and retrieval using outer
                  contours and image subsampling},
  booktitle    = {Document Recognition and Retrieval XX, part of the IS{\&}T-SPIE
                  Electronic Imaging Symposium, Burlingame, California, USA, February
                  5-7, 2013, Proceedings},
  series       = {{SPIE} Proceedings},
  volume       = {8658},
  pages        = {865805},
  publisher    = {{SPIE}},
  year         = {2013},
  url          = {https://doi.org/10.1117/12.2008383},
  doi          = {10.1117/12.2008383},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drr/ZhuHZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdar/HuZ13,
  author       = {Lei Hu and
                  Richard Zanibbi},
  title        = {Segmenting Handwritten Math Symbols Using AdaBoost and Multi-scale
                  Shape Context Features},
  booktitle    = {12th International Conference on Document Analysis and Recognition,
                  {ICDAR} 2013, Washington, DC, USA, August 25-28, 2013},
  pages        = {1180--1184},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICDAR.2013.239},
  doi          = {10.1109/ICDAR.2013.239},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdar/HuZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/SongH13,
  author       = {Ling Song and
                  Lei Hu},
  editor       = {Robert H. Deng and
                  Tao Feng},
  title        = {Improved Algebraic and Differential Fault Attacks on the {KATAN} Block
                  Cipher},
  booktitle    = {Information Security Practice and Experience - 9th International Conference,
                  {ISPEC} 2013, Lanzhou, China, May 12-14, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7863},
  pages        = {372--386},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38033-4\_27},
  doi          = {10.1007/978-3-642-38033-4\_27},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/SongH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lightsec/SongH13,
  author       = {Ling Song and
                  Lei Hu},
  editor       = {Gildas Avoine and
                  Orhun Kara},
  title        = {Differential Fault Attack on the {PRINCE} Block Cipher},
  booktitle    = {Lightweight Cryptography for Security and Privacy - Second International
                  Workshop, LightSec 2013, Gebze, Turkey, May 6-7, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8162},
  pages        = {43--54},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40392-7\_4},
  doi          = {10.1007/978-3-642-40392-7\_4},
  timestamp    = {Wed, 07 Dec 2022 23:13:43 +0100},
  biburl       = {https://dblp.org/rec/conf/lightsec/SongH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/WangHL13,
  author       = {Weijia Wang and
                  Lei Hu and
                  Yong Li},
  editor       = {Javier L{\'{o}}pez and
                  Xinyi Huang and
                  Ravi S. Sandhu},
  title        = {Privacy-Preserving Password-Based Authenticated Key Exchange in the
                  Three-Party Setting},
  booktitle    = {Network and System Security - 7th International Conference, {NSS}
                  2013, Madrid, Spain, June 3-4, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7873},
  pages        = {507--520},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38631-2\_37},
  doi          = {10.1007/978-3-642-38631-2\_37},
  timestamp    = {Tue, 09 Feb 2021 08:50:29 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/WangHL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/TuZHL13,
  author       = {Ziran Tu and
                  Xiangyong Zeng and
                  Lei Hu and
                  Chunlei Li},
  title        = {A Class of Binomial Permutation Polynomials},
  journal      = {CoRR},
  volume       = {abs/1310.0337},
  year         = {2013},
  url          = {http://arxiv.org/abs/1310.0337},
  eprinttype    = {arXiv},
  eprint       = {1310.0337},
  timestamp    = {Mon, 24 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/TuZHL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SongH13,
  author       = {Ling Song and
                  Lei Hu},
  title        = {Differential Fault Attack on the {PRINCE} Block Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {43},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/043},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SongH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SunHSXW13,
  author       = {Siwei Sun and
                  Lei Hu and
                  Ling Song and
                  Yonghong Xie and
                  Peng Wang},
  title        = {Automatic Security Evaluation of Block Ciphers with S-bP Structures
                  against Related-key Differential Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {547},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/547},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SunHSXW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SunHW13,
  author       = {Siwei Sun and
                  Lei Hu and
                  Peng Wang},
  title        = {Automatic Security Evaluation for Bit-oriented Block Ciphers in Related-key
                  Model: Application to PRESENT-80, LBlock and Others},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {676},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/676},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SunHW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cma/GuoH12,
  author       = {Lifeng Guo and
                  Lei Hu},
  title        = {Efficient bidirectional proxy re-encryption with direct chosen-ciphertext
                  security},
  journal      = {Comput. Math. Appl.},
  volume       = {63},
  number       = {1},
  pages        = {151--157},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.camwa.2011.11.002},
  doi          = {10.1016/J.CAMWA.2011.11.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cma/GuoH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cmpb/LuanWLLJH12,
  author       = {Sheng Luan and
                  Tianmiao Wang and
                  Weishi Li and
                  Zhongjun Liu and
                  Liang Jiang and
                  Lei Hu},
  title        = {3D navigation and monitoring for spinal milling operation based on
                  registration between multiplanar fluoroscopy and {CT} images},
  journal      = {Comput. Methods Programs Biomed.},
  volume       = {108},
  number       = {1},
  pages        = {151--157},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.cmpb.2012.02.007},
  doi          = {10.1016/J.CMPB.2012.02.007},
  timestamp    = {Sat, 30 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cmpb/LuanWLLJH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CaoH12,
  author       = {Xiwang Cao and
                  Lei Hu},
  title        = {On the reducibility of some composite polynomials over finite fields},
  journal      = {Des. Codes Cryptogr.},
  volume       = {64},
  number       = {3},
  pages        = {229--239},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10623-011-9566-1},
  doi          = {10.1007/S10623-011-9566-1},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CaoH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ffa/ZengSH12,
  author       = {Xiangyong Zeng and
                  Jinyong Shan and
                  Lei Hu},
  title        = {A triple-error-correcting cyclic code from the Gold and Kasami-Welch
                  {APN} power functions},
  journal      = {Finite Fields Their Appl.},
  volume       = {18},
  number       = {1},
  pages        = {70--92},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.ffa.2011.06.005},
  doi          = {10.1016/J.FFA.2011.06.005},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ffa/ZengSH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ffa/ZhaH12,
  author       = {Zhengbang Zha and
                  Lei Hu},
  title        = {Two classes of permutation polynomials over finite fields},
  journal      = {Finite Fields Their Appl.},
  volume       = {18},
  number       = {4},
  pages        = {781--790},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.ffa.2012.02.003},
  doi          = {10.1016/J.FFA.2012.02.003},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ffa/ZhaH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/LuHHN12,
  author       = {Li Lu and
                  Jinsong Han and
                  Lei Hu and
                  Lionel M. Ni},
  title        = {Dynamic Key-Updating: Privacy-Preserving Authentication for {RFID}
                  Systems},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {8},
  year         = {2012},
  url          = {https://doi.org/10.1155/2012/153912},
  doi          = {10.1155/2012/153912},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/LuHHN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/DuCH12,
  author       = {Xiaoni Du and
                  Zhixiong Chen and
                  Lei Hu},
  title        = {Linear complexity of binary sequences derived from Euler quotients
                  with prime-power modulus},
  journal      = {Inf. Process. Lett.},
  volume       = {112},
  number       = {14-15},
  pages        = {604--609},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.ipl.2012.04.011},
  doi          = {10.1016/J.IPL.2012.04.011},
  timestamp    = {Fri, 29 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/DuCH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/LiuZZWYHD12,
  author       = {Jianyun Liu and
                  Yuhang Zhao and
                  Zhao{-}Xiang Zhang and
                  Yun{-}Hong Wang and
                  Xue{-}Mei Yuan and
                  Lei Hu and
                  Zhenjiang Dong},
  title        = {Spam Short Messages Detection via Mining Social Networks},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {27},
  number       = {3},
  pages        = {506--514},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11390-012-1239-7},
  doi          = {10.1007/S11390-012-1239-7},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcst/LiuZZWYHD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jossac/XieH12,
  author       = {Yonghong Xie and
                  Lei Hu},
  title        = {A matrix construction of Boolean functions with maximum algebraic
                  immunity},
  journal      = {J. Syst. Sci. Complex.},
  volume       = {25},
  number       = {4},
  pages        = {792--801},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11424-012-0286-z},
  doi          = {10.1007/S11424-012-0286-Z},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jossac/XieH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tgis/SunYLZH12,
  author       = {Ziheng Sun and
                  Peng Yue and
                  Xianchang Lu and
                  Xi Zhai and
                  Lei Hu},
  title        = {A Task Ontology Driven Approach for Live Geoprocessing in a Service-Oriented
                  Environment},
  journal      = {Trans. {GIS}},
  volume       = {16},
  number       = {6},
  pages        = {867--884},
  year         = {2012},
  url          = {https://doi.org/10.1111/j.1467-9671.2012.01364.x},
  doi          = {10.1111/J.1467-9671.2012.01364.X},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tgis/SunYLZH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsp/HuSZF12,
  author       = {Lei Hu and
                  Zhiguang Shi and
                  Jianxiong Zhou and
                  Qiang Fu},
  title        = {Compressed Sensing of Complex Sinusoids: An Approach Based on Dictionary
                  Refinement},
  journal      = {{IEEE} Trans. Signal Process.},
  volume       = {60},
  number       = {7},
  pages        = {3809--3822},
  year         = {2012},
  url          = {https://doi.org/10.1109/TSP.2012.2193392},
  doi          = {10.1109/TSP.2012.2193392},
  timestamp    = {Wed, 10 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsp/HuSZF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bmei/GuoHLJZCC12,
  author       = {Yong Xin Guo and
                  Lei Hu and
                  Yan{-}Chun Li and
                  Qing Jiao and
                  Guang{-}Yu Zhang and
                  Di Chen and
                  Dong Cui},
  editor       = {Tianqi Zhang},
  title        = {Measurement of fundus vessel diameter based on fundus fluorescence
                  angiography image},
  booktitle    = {5th International Conference on BioMedical Engineering and Informatics,
                  {BMEI} 2012, Chongqing, China, October 16-18, 2012},
  pages        = {309--312},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/BMEI.2012.6512902},
  doi          = {10.1109/BMEI.2012.6512902},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/bmei/GuoHLJZCC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/XuHSW12,
  author       = {Jun Xu and
                  Lei Hu and
                  Siwei Sun and
                  Ping Wang},
  editor       = {Josef Pieprzyk and
                  Ahmad{-}Reza Sadeghi and
                  Mark Manulis},
  title        = {Cryptanalysis of a Lattice-Knapsack Mixed Public Key Cryptosystem},
  booktitle    = {Cryptology and Network Security, 11th International Conference, {CANS}
                  2012, Darmstadt, Germany, December 12-14, 2012. Proceedings},
  volume       = {7712},
  pages        = {32--42},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35404-5\_4},
  doi          = {10.1007/978-3-642-35404-5\_4},
  timestamp    = {Sun, 02 Jun 2019 21:12:31 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/XuHSW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/XuHS12,
  author       = {Jun Xu and
                  Lei Hu and
                  Siwei Sun},
  editor       = {Tat Wing Chim and
                  Tsz Hon Yuen},
  title        = {Implicit Polynomial Recovery and Cryptanalysis of a Combinatorial
                  Key Cryptosystem},
  booktitle    = {Information and Communications Security - 14th International Conference,
                  {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7618},
  pages        = {45--57},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34129-8\_5},
  doi          = {10.1007/978-3-642-34129-8\_5},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/XuHS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpr/HuHPZ12,
  author       = {Lei Hu and
                  Kevin Hart and
                  Richard Pospesel and
                  Richard Zanibbi},
  title        = {Baseline extraction-driven Parsing of handwritten mathematical expressions},
  booktitle    = {Proceedings of the 21st International Conference on Pattern Recognition,
                  {ICPR} 2012, Tsukuba, Japan, November 11-15, 2012},
  pages        = {326--330},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6460138/},
  timestamp    = {Tue, 10 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icpr/HuHPZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pg/ZhangSLZH12,
  author       = {Fengquan Zhang and
                  Xukun Shen and
                  Xiang Long and
                  Bin Zhao and
                  Lei Hu},
  editor       = {Chris Bregler and
                  Pedro V. Sander and
                  Michael Wimmer},
  title        = {Real-time Particle Fluid Simulation with {WCSPH}},
  booktitle    = {20th Pacific Conference on Computer Graphics and Applications, {PG}
                  2012 - Short Papers, Hong Kong, September 12-14, 2012},
  publisher    = {Eurographics Association},
  year         = {2012},
  url          = {https://doi.org/10.2312/PE/PG/PG2012short/029-034},
  doi          = {10.2312/PE/PG/PG2012SHORT/029-034},
  timestamp    = {Wed, 26 May 2021 11:51:06 +0200},
  biburl       = {https://dblp.org/rec/conf/pg/ZhangSLZH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aaecc/SunZSH11,
  author       = {Zhimin Sun and
                  Xiangyong Zeng and
                  Wei Su and
                  Lei Hu},
  title        = {Aperiodic correlation of Kasami sequences in the small set},
  journal      = {Appl. Algebra Eng. Commun. Comput.},
  volume       = {22},
  number       = {4},
  pages        = {311--320},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00200-011-0152-6},
  doi          = {10.1007/S00200-011-0152-6},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aaecc/SunZSH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aaecc/TuZZH11,
  author       = {Ziran Tu and
                  Dabin Zheng and
                  Xiangyong Zeng and
                  Lei Hu},
  title        = {Boolean functions with two distinct Walsh coefficients},
  journal      = {Appl. Algebra Eng. Commun. Comput.},
  volume       = {22},
  number       = {5-6},
  pages        = {359--366},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00200-011-0155-3},
  doi          = {10.1007/S00200-011-0155-3},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aaecc/TuZZH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ffa/CaoH11,
  author       = {Xiwang Cao and
                  Lei Hu},
  title        = {New methods for generating permutation polynomials over finite fields},
  journal      = {Finite Fields Their Appl.},
  volume       = {17},
  number       = {6},
  pages        = {493--503},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.ffa.2011.02.012},
  doi          = {10.1016/J.FFA.2011.02.012},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ffa/CaoH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ZhengZH11,
  author       = {Dabin Zheng and
                  Xiangyong Zeng and
                  Lei Hu},
  title        = {A Family of \emph{p}-ary Binomial Bent Functions},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {94-A},
  number       = {9},
  pages        = {1868--1872},
  year         = {2011},
  url          = {https://doi.org/10.1587/transfun.E94.A.1868},
  doi          = {10.1587/TRANSFUN.E94.A.1868},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ZhengZH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcm/SuZH11,
  author       = {Wei Su and
                  Xiangyong Zeng and
                  Lei Hu},
  title        = {Construction of 1-resilient Boolean functions with optimum algebraic
                  immunity},
  journal      = {Int. J. Comput. Math.},
  volume       = {88},
  number       = {2},
  pages        = {222--238},
  year         = {2011},
  url          = {https://doi.org/10.1080/00207160903496985},
  doi          = {10.1080/00207160903496985},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcm/SuZH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/LiTZH11,
  author       = {Nian Li and
                  Xiaohu Tang and
                  Xiangyong Zeng and
                  Lei Hu},
  title        = {On the Correlation Distributions of the Optimal Quaternary Sequence
                  Family \emph{U} and the Optimal Binary Sequence Family \emph{V}},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {57},
  number       = {6},
  pages        = {3815--3824},
  year         = {2011},
  url          = {https://doi.org/10.1109/TIT.2011.2132670},
  doi          = {10.1109/TIT.2011.2132670},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/LiTZH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/ZengCSH11,
  author       = {Xiangyong Zeng and
                  Claude Carlet and
                  Jinyong Shan and
                  Lei Hu},
  title        = {More Balanced Boolean Functions With Optimal Algebraic Immunity and
                  Good Nonlinearity and Resistance to Fast Algebraic Attacks},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {57},
  number       = {9},
  pages        = {6310--6320},
  year         = {2011},
  url          = {https://doi.org/10.1109/TIT.2011.2109935},
  doi          = {10.1109/TIT.2011.2109935},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/ZengCSH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsp/ShiZHL11,
  author       = {Zhiguang Shi and
                  Jianxiong Zhou and
                  Lei Hu and
                  Jicheng Li},
  title        = {A New Derivation of Constrained Cram{\'{e}}r-Rao Bound Via Norm
                  Minimization},
  journal      = {{IEEE} Trans. Signal Process.},
  volume       = {59},
  number       = {4},
  pages        = {1879--1882},
  year         = {2011},
  url          = {https://doi.org/10.1109/TSP.2010.2104147},
  doi          = {10.1109/TSP.2010.2104147},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsp/ShiZHL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bmei/YangHW11,
  author       = {Yan Yang and
                  Lei Hu and
                  Junchen Wang},
  editor       = {Yongsheng Ding and
                  Yonghong Peng and
                  Riyi Shi and
                  Kuangrong Hao and
                  Lipo Wang},
  title        = {A fluoroscopy-based navigation system for fixation of femoral neck
                  fracture},
  booktitle    = {4th International Conference on Biomedical Engineering and Informatics,
                  {BMEI} 2011, Shanghai, China, October 15-17, 2011},
  pages        = {24--28},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/BMEI.2011.6098336},
  doi          = {10.1109/BMEI.2011.6098336},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/bmei/YangHW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bmei/WangWHLLS11,
  author       = {Junchen Wang and
                  Tianmiao Wang and
                  Lei Hu and
                  Hongen Liao and
                  Kuan Luan and
                  Ichiro Sakuma},
  editor       = {Yongsheng Ding and
                  Yonghong Peng and
                  Riyi Shi and
                  Kuangrong Hao and
                  Lipo Wang},
  title        = {A fully automatic 2D ultrasound probe calibration method using a simple
                  phantom},
  booktitle    = {4th International Conference on Biomedical Engineering and Informatics,
                  {BMEI} 2011, Shanghai, China, October 15-17, 2011},
  pages        = {588--592},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/BMEI.2011.6098408},
  doi          = {10.1109/BMEI.2011.6098408},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bmei/WangWHLLS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/SunHXZ11,
  author       = {Siwei Sun and
                  Lei Hu and
                  Yonghong Xie and
                  Xiangyong Zeng},
  editor       = {Dongdai Lin and
                  Gene Tsudik and
                  Xiaoyun Wang},
  title        = {Cube Cryptanalysis of Hitag2 Stream Cipher},
  booktitle    = {Cryptology and Network Security - 10th International Conference, {CANS}
                  2011, Sanya, China, December 10-12, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7092},
  pages        = {15--25},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25513-7\_3},
  doi          = {10.1007/978-3-642-25513-7\_3},
  timestamp    = {Mon, 25 Nov 2019 15:32:12 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/SunHXZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/HuangH11,
  author       = {Guifang Huang and
                  Lei Hu},
  editor       = {Chuankun Wu and
                  Moti Yung and
                  Dongdai Lin},
  title        = {Concurrent Non-Malleable Witness Indistinguishable Argument from Any
                  One-Way Function},
  booktitle    = {Information Security and Cryptology - 7th International Conference,
                  Inscrypt 2011, Beijing, China, November 30 - December 3, 2011. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7537},
  pages        = {363--378},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-34704-7\_25},
  doi          = {10.1007/978-3-642-34704-7\_25},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/HuangH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codcry/LiZH11,
  author       = {Jie Li and
                  Xiangyong Zeng and
                  Lei Hu},
  editor       = {Yeow Meng Chee and
                  Zhenbo Guo and
                  San Ling and
                  Fengjing Shao and
                  Yuansheng Tang and
                  Huaxiong Wang and
                  Chaoping Xing},
  title        = {A New Family of Quadriphase Sequences with Low Correlation},
  booktitle    = {Coding and Cryptology - Third International Workshop, {IWCC} 2011,
                  Qingdao, China, May 30-June 3, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6639},
  pages        = {246--262},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20901-7\_16},
  doi          = {10.1007/978-3-642-20901-7\_16},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/codcry/LiZH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccl2/HuSVZ11,
  author       = {Lei Hu and
                  Xiaoning Shi and
                  Stefan Vo{\ss} and
                  Weigang Zhang},
  editor       = {J{\"{u}}rgen B{\"{o}}se and
                  Hao Hu and
                  Carlos Jahn and
                  Xiaoning Shi and
                  Robert Stahlbock and
                  Stefan Vo{\ss}},
  title        = {Application of {RFID} Technology at the Entrance Gate of Container
                  Terminals},
  booktitle    = {Computational Logistics - Second International Conference, {ICCL}
                  2011, Hamburg, Germany, September 19-22, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6971},
  pages        = {209--220},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24264-9\_16},
  doi          = {10.1007/978-3-642-24264-9\_16},
  timestamp    = {Thu, 22 Feb 2024 09:06:52 +0100},
  biburl       = {https://dblp.org/rec/conf/iccl2/HuSVZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdar/HuZ11,
  author       = {Lei Hu and
                  Richard Zanibbi},
  title        = {HMM-Based Recognition of Online Handwritten Mathematical Symbols Using
                  Segmental K-Means Initialization and a Modified Pen-Up/Down Feature},
  booktitle    = {2011 International Conference on Document Analysis and Recognition,
                  {ICDAR} 2011, Beijing, China, September 18-21, 2011},
  pages        = {457--462},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ICDAR.2011.98},
  doi          = {10.1109/ICDAR.2011.98},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdar/HuZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/igarss/GaoHH11,
  author       = {Feng Gao and
                  Lei Hu and
                  Zhaofeng He},
  title        = {Bridge extraction based on on constrained Delaunay triangulation for
                  panchromatic image},
  booktitle    = {2011 {IEEE} International Geoscience and Remote Sensing Symposium,
                  {IGARSS} 2011, Vancouver, BC, Canada, July 24-29, 2011},
  pages        = {1429--1432},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/IGARSS.2011.6049334},
  doi          = {10.1109/IGARSS.2011.6049334},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/igarss/GaoHH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/igarss/HuZG11,
  author       = {Lei Hu and
                  Jin Zheng and
                  Feng Gao},
  title        = {A building extraction method using shadow in high resolution multispectral
                  images},
  booktitle    = {2011 {IEEE} International Geoscience and Remote Sensing Symposium,
                  {IGARSS} 2011, Vancouver, BC, Canada, July 24-29, 2011},
  pages        = {1862--1865},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/IGARSS.2011.6049486},
  doi          = {10.1109/IGARSS.2011.6049486},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/igarss/HuZG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/CaoHDY11,
  author       = {Weiwei Cao and
                  Lei Hu and
                  Jintai Ding and
                  Zhijun Yin},
  editor       = {Feng Bao and
                  Jian Weng},
  title        = {Kipnis-Shamir Attack on Unbalanced Oil-Vinegar Scheme},
  booktitle    = {Information Security Practice and Experience - 7th International Conference,
                  {ISPEC} 2011, Guangzhou, China, May 30 - June 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6672},
  pages        = {168--180},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21031-0\_13},
  doi          = {10.1007/978-3-642-21031-0\_13},
  timestamp    = {Tue, 12 May 2020 10:56:38 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/CaoHDY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vrcai/ZhangHWS11,
  author       = {Fengquan Zhang and
                  Lei Hu and
                  Jiawen Wu and
                  Xukun Shen},
  editor       = {Zhi{-}Qiang Liu and
                  Joaquim A. Jorge and
                  Zhigeng Pan and
                  Xiaopeng Zhang and
                  Oscar Kin{-}Chung Au and
                  Weiming Dong},
  title        = {A SPH-based method for interactive fluids simulation on the multi-GPU},
  booktitle    = {Proceedings of the 10th International Conference on Virtual Reality
                  Continuum and its Applications in Industry, {VRCAI} 2011, Hong Kong,
                  China, December 11-12, 2011},
  pages        = {423--426},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2087756.2087834},
  doi          = {10.1145/2087756.2087834},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vrcai/ZhangHWS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/waim/NiZCLH11,
  author       = {Weiwei Ni and
                  Jinwang Zheng and
                  Zhihong Chong and
                  Shan Lu and
                  Lei Hu},
  editor       = {Haixun Wang and
                  Shijun Li and
                  Satoshi Oyama and
                  Xiaohua Hu and
                  Tieyun Qian},
  title        = {Location Privacy Protection in the Presence of Users' Preferences},
  booktitle    = {Web-Age Information Management - 12th International Conference, {WAIM}
                  2011, Wuhan, China, September 14-16, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6897},
  pages        = {340--352},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23535-1\_30},
  doi          = {10.1007/978-3-642-23535-1\_30},
  timestamp    = {Fri, 09 Apr 2021 17:11:09 +0200},
  biburl       = {https://dblp.org/rec/conf/waim/NiZCLH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aaecc/ZengZH10,
  author       = {Xiangyong Zeng and
                  Xishun Zhu and
                  Lei Hu},
  title        = {Two new permutation polynomials with the form (\emph{x}\({}^{\mbox{2\({}^{\mbox{\emph{k}}}\)}}\)+\emph{x}+d)\({}^{\mbox{\emph{s}}}\)+\emph{x}
                  over \emph{F}\({}_{\mbox{2\({}^{\mbox{\emph{n}}}\)}}\)},
  journal      = {Appl. Algebra Eng. Commun. Comput.},
  volume       = {21},
  number       = {2},
  pages        = {145--150},
  year         = {2010},
  url          = {https://doi.org/10.1007/s00200-010-0120-6},
  doi          = {10.1007/S00200-010-0120-6},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aaecc/ZengZH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aaecc/XiaZH10,
  author       = {Yongbo Xia and
                  Xiangyong Zeng and
                  Lei Hu},
  title        = {Further crosscorrelation properties of sequences with the decimation
                  factor \emph{d}=(\emph{p}\({}^{\mbox{\emph{n}}}\)+1)/(\emph{p}+1)-(\emph{p}\({}^{\mbox{\emph{n}}}\)-1)/2},
  journal      = {Appl. Algebra Eng. Commun. Comput.},
  volume       = {21},
  number       = {5},
  pages        = {329--342},
  year         = {2010},
  url          = {https://doi.org/10.1007/s00200-010-0128-y},
  doi          = {10.1007/S00200-010-0128-Y},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aaecc/XiaZH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aaecc/JiangHZ10,
  author       = {Wenfeng Jiang and
                  Lei Hu and
                  Xiangyong Zeng},
  title        = {On the generalized large set of Kasami sequences},
  journal      = {Appl. Algebra Eng. Commun. Comput.},
  volume       = {21},
  number       = {6},
  pages        = {417--441},
  year         = {2010},
  url          = {https://doi.org/10.1007/s00200-010-0131-3},
  doi          = {10.1007/S00200-010-0131-3},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aaecc/JiangHZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ffa/ZengHJYC10,
  author       = {Xiangyong Zeng and
                  Lei Hu and
                  Wenfeng Jiang and
                  Qin Yue and
                  Xiwang Cao},
  title        = {The weight distribution of a class of p-ary cyclic codes},
  journal      = {Finite Fields Their Appl.},
  volume       = {16},
  number       = {1},
  pages        = {56--73},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.ffa.2009.12.001},
  doi          = {10.1016/J.FFA.2009.12.001},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ffa/ZengHJYC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/WangHL10,
  author       = {Weijia Wang and
                  Lei Hu and
                  Yong Li},
  title        = {Security Analysis of a Dynamic Program Update Protocol for Wireless
                  Sensor Networks},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {14},
  number       = {8},
  pages        = {782--784},
  year         = {2010},
  url          = {https://doi.org/10.1109/LCOMM.2010.08.100406},
  doi          = {10.1109/LCOMM.2010.08.100406},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icl/WangHL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcm/XiaZH10,
  author       = {Yongbo Xia and
                  Xiangyong Zeng and
                  Lei Hu},
  title        = {The large set of \emph{p}-ary Kasami sequences},
  journal      = {Int. J. Comput. Math.},
  volume       = {87},
  number       = {7},
  pages        = {1436--1455},
  year         = {2010},
  url          = {https://doi.org/10.1080/00207160802380918},
  doi          = {10.1080/00207160802380918},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcm/XiaZH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/WangHL10,
  author       = {Weijia Wang and
                  Lei Hu and
                  Yong Li},
  editor       = {Xuejia Lai and
                  Moti Yung and
                  Dongdai Lin},
  title        = {How to Construct Secure and Efficient Three-Party Password-Based Authenticated
                  Key Exchange Protocols},
  booktitle    = {Information Security and Cryptology - 6th International Conference,
                  Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6584},
  pages        = {218--235},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-21518-6\_16},
  doi          = {10.1007/978-3-642-21518-6\_16},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/WangHL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/JiangHDS10,
  author       = {Xin Jiang and
                  Lei Hu and
                  Jintai Ding and
                  Siwei Sun},
  editor       = {Isao Echizen and
                  Noboru Kunihiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {On the Kipnis-Shamir Method Solving the MinRank Problem},
  booktitle    = {Advances in Information and Computer Security - 5th International
                  Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
                  Short Paper Proceedings},
  pages        = {1--13},
  publisher    = {Information Processing Society of Japan {(IPSJ)}},
  year         = {2010},
  timestamp    = {Thu, 15 Sep 2011 15:14:43 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/JiangHDS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pcm/HuJLG10,
  author       = {Lei Hu and
                  Yan Ji and
                  Yang Li and
                  Feng Gao},
  editor       = {Guoping Qiu and
                  Kin{-}Man Lam and
                  Hitoshi Kiya and
                  Xiangyang Xue and
                  C.{-}C. Jay Kuo and
                  Michael S. Lew},
  title        = {{SAR} Image Segmentation Based on Kullback-Leibler Distance of Edgeworth},
  booktitle    = {Advances in Multimedia Information Processing - {PCM} 2010 - 11th
                  Pacific Rim Conference on Multimedia, Shanghai, China, September 21-24,
                  2010, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6297},
  pages        = {549--557},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15702-8\_50},
  doi          = {10.1007/978-3-642-15702-8\_50},
  timestamp    = {Mon, 26 Jun 2023 20:47:39 +0200},
  biburl       = {https://dblp.org/rec/conf/pcm/HuJLG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/CaoNHTD10,
  author       = {Weiwei Cao and
                  Xuyun Nie and
                  Lei Hu and
                  Xiling Tang and
                  Jintai Ding},
  editor       = {Nicolas Sendrier},
  title        = {Cryptanalysis of Two Quartic Encryption Schemes and One Improved {MFE}
                  Scheme},
  booktitle    = {Post-Quantum Cryptography, Third International Workshop, PQCrypto
                  2010, Darmstadt, Germany, May 25-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6061},
  pages        = {41--60},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12929-2\_4},
  doi          = {10.1007/978-3-642-12929-2\_4},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/CaoNHTD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soli/0001Q0HS10,
  author       = {Gang Xiong and
                  Tao Qin and
                  Feiyue Wang and
                  Lei Hu and
                  Qingsong Shi},
  title        = {Design and improvement of {KPI} system for materials management in
                  power group enterprise},
  booktitle    = {Proceedings of 2010 {IEEE} International Conference on Service Operations
                  and Logistics, and Informatics, {SOLI} 2010, Qingdao, China, 15-17
                  July 2010},
  pages        = {171--176},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/SOLI.2010.5551585},
  doi          = {10.1109/SOLI.2010.5551585},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/soli/0001Q0HS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1001-4305,
  author       = {Xiwang Cao and
                  Lei Hu},
  title        = {On Exponential Sums, Nowton identities and Dickson Polynomials over
                  Finite Fields},
  journal      = {CoRR},
  volume       = {abs/1001.4305},
  year         = {2010},
  url          = {http://arxiv.org/abs/1001.4305},
  eprinttype    = {arXiv},
  eprint       = {1001.4305},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1001-4305.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1001-5100,
  author       = {Xiwang Cao and
                  Lei Hu},
  title        = {On Exponential Sums, Nowton identities and Dickson Polynomials over
                  Finite Fields},
  journal      = {CoRR},
  volume       = {abs/1001.5100},
  year         = {2010},
  url          = {http://arxiv.org/abs/1001.5100},
  eprinttype    = {arXiv},
  eprint       = {1001.5100},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1001-5100.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1003-5993,
  author       = {Xiangyong Zeng and
                  Jinyong Shan and
                  Lei Hu},
  title        = {A Triple-Error-Correcting Cyclic Code from the Gold and Kasami-Welch
                  {APN} Power Functions},
  journal      = {CoRR},
  volume       = {abs/1003.5993},
  year         = {2010},
  url          = {http://arxiv.org/abs/1003.5993},
  eprinttype    = {arXiv},
  eprint       = {1003.5993},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1003-5993.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CaoH10,
  author       = {Xiwang Cao and
                  Lei Hu},
  title        = {On Exponential Sums, Nowton identities and Dickson Polynomials over
                  Finite Fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {39},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/039},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CaoH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TangTZH10,
  author       = {Xiaohu Tang and
                  Deng Tang and
                  Xiangyong Zeng and
                  Lei Hu},
  title        = {Balanced Boolean Functions with (Almost) Optimal Algebraic Immunity
                  and Very High Nonlinearity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {443},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/443},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TangTZH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZengCSH10,
  author       = {Xiangyong Zeng and
                  Claude Carlet and
                  Jinyong Shan and
                  Lei Hu},
  title        = {Balanced Boolean Functions with Optimum Algebraic Immunity and High
                  Nonlinearity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {534},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/534},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZengCSH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WengH09,
  author       = {Guobiao Weng and
                  Lei Hu},
  title        = {Some results on skew Hadamard difference sets},
  journal      = {Des. Codes Cryptogr.},
  volume       = {50},
  number       = {1},
  pages        = {93--105},
  year         = {2009},
  url          = {https://doi.org/10.1007/s10623-008-9216-4},
  doi          = {10.1007/S10623-008-9216-4},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/WengH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CarletZLH09,
  author       = {Claude Carlet and
                  Xiangyong Zeng and
                  Chunlei Li and
                  Lei Hu},
  title        = {Further properties of several classes of Boolean functions with optimum
                  algebraic immunity},
  journal      = {Des. Codes Cryptogr.},
  volume       = {52},
  number       = {3},
  pages        = {303--338},
  year         = {2009},
  url          = {https://doi.org/10.1007/s10623-009-9284-0},
  doi          = {10.1007/S10623-009-9284-0},
  timestamp    = {Mon, 24 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CarletZLH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/JiangHTZ09,
  author       = {Wenfeng Jiang and
                  Lei Hu and
                  Xiaohu Tang and
                  Xiangyong Zeng},
  title        = {New Optimal Quadriphase Sequences With Larger Linear Span},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {55},
  number       = {1},
  pages        = {458--470},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIT.2008.2008122},
  doi          = {10.1109/TIT.2008.2008122},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/JiangHTZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/TangHHJ09,
  author       = {Xiaohu Tang and
                  Tor Helleseth and
                  Lei Hu and
                  Wenfeng Jiang},
  title        = {Two New Families of Optimal Binary Sequences Obtained From Quaternary
                  Sequences},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {55},
  number       = {4},
  pages        = {1833--1840},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIT.2009.2013023},
  doi          = {10.1109/TIT.2009.2013023},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/TangHHJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/HellesethHKZLJ09,
  author       = {Tor Helleseth and
                  Lei Hu and
                  Alexander Kholosha and
                  Xiangyong Zeng and
                  Nian Li and
                  Wenfeng Jiang},
  title        = {Period-different m-sequences with at most four-valued cross correlation},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {55},
  number       = {7},
  pages        = {3305--3311},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIT.2009.2021312},
  doi          = {10.1109/TIT.2009.2021312},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/HellesethHKZLJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/JiHO09,
  author       = {Wen Ji and
                  Lei Hu and
                  Haiwen Ou},
  title        = {Algebraic Attack to {SMS4} and the Comparison with {AES}},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {662--665},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.171},
  doi          = {10.1109/IAS.2009.171},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/JiHO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bmei/WangWHY09,
  author       = {Qizhi Wang and
                  Xinlei Wu and
                  Lei Hu and
                  Ming Yang},
  title        = {Validity of the Simulation of New Screw Fixed {FNF} for Healing: {A}
                  Biomechanical Analysis},
  booktitle    = {Proceedings of the 2nd International Conference on BioMedical Engineering
                  and Informatics, {BMEI} 2009, October 17-19, 2009, Tianjin, China},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/BMEI.2009.5305219},
  doi          = {10.1109/BMEI.2009.5305219},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/bmei/WangWHY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bmei/ZhangGHDCCJ09,
  author       = {Yu Guang Zhang and
                  Xin Yong Guo and
                  Lei Hu and
                  Qin He Dang and
                  Di Chen and
                  Dong Cui and
                  Qing Jiao},
  title        = {A Novel Approach for Blood Vessel Edge Detection in Retinal Images},
  booktitle    = {Proceedings of the 2nd International Conference on BioMedical Engineering
                  and Informatics, {BMEI} 2009, October 17-19, 2009, Tianjin, China},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/BMEI.2009.5304836},
  doi          = {10.1109/BMEI.2009.5304836},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bmei/ZhangGHDCCJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iros/HuHWWLLW09,
  author       = {Yan Hu and
                  Lei Hu and
                  Tianmiao Wang and
                  Jun Wei and
                  Sun Lei and
                  Wenyong Liu and
                  Li Wen},
  title        = {A fluoroscopic-based navigation system for {ACL} reconstruction assisted
                  by robot},
  booktitle    = {2009 {IEEE/RSJ} International Conference on Intelligent Robots and
                  Systems, October 11-15, 2009, St. Louis, MO, {USA}},
  pages        = {1055--1060},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/IROS.2009.5354014},
  doi          = {10.1109/IROS.2009.5354014},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/iros/HuHWWLLW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/CaoH09,
  author       = {Weiwei Cao and
                  Lei Hu},
  editor       = {Heung Youl Youm and
                  Moti Yung},
  title        = {Cryptanalysis of a Multivariate Public Key Encryption Scheme with
                  Internal Perturbation Structure},
  booktitle    = {Information Security Applications, 10th International Workshop, {WISA}
                  2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5932},
  pages        = {254--267},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10838-9\_19},
  doi          = {10.1007/978-3-642-10838-9\_19},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/CaoH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0901-2391,
  author       = {Xiangyong Zeng and
                  Lei Hu and
                  Wenfeng Jiang and
                  Qin Yue and
                  Xiwang Cao},
  title        = {Weight Distribution of {A} p-ary Cyclic Code},
  journal      = {CoRR},
  volume       = {abs/0901.2391},
  year         = {2009},
  url          = {http://arxiv.org/abs/0901.2391},
  eprinttype    = {arXiv},
  eprint       = {0901.2391},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0901-2391.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhengZH09,
  author       = {Dabin Zheng and
                  Xiangyong Zeng and
                  Lei Hu},
  title        = {A Family of p-ary Binomial Bent Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {563},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/563},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhengZH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aaecc/JiangHTZ08,
  author       = {Wenfeng Jiang and
                  Lei Hu and
                  Xiaohu Tang and
                  Xiangyong Zeng},
  title        = {New family of binary sequences of period 4(2\({}^{\mbox{ \emph{n}
                  }}\) - 1) with low correlation},
  journal      = {Appl. Algebra Eng. Commun. Comput.},
  volume       = {19},
  number       = {5},
  pages        = {429--439},
  year         = {2008},
  url          = {https://doi.org/10.1007/s00200-008-0082-0},
  doi          = {10.1007/S00200-008-0082-0},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aaecc/JiangHTZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejc/FengHK08,
  author       = {Rongquan Feng and
                  Lei Hu and
                  Jin Ho Kwak},
  title        = {Authentication codes and bipartite graphs},
  journal      = {Eur. J. Comb.},
  volume       = {29},
  number       = {6},
  pages        = {1473--1482},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.ejc.2007.06.013},
  doi          = {10.1016/J.EJC.2007.06.013},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejc/FengHK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/JiangHZ08,
  author       = {Wenfeng Jiang and
                  Lei Hu and
                  Xiangyong Zeng},
  title        = {New Family of Binary Sequences with Low Correlation},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {91-A},
  number       = {1},
  pages        = {417--421},
  year         = {2008},
  url          = {https://doi.org/10.1093/ietfec/e91-a.1.417},
  doi          = {10.1093/IETFEC/E91-A.1.417},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/JiangHZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ZengLHT08,
  author       = {Xiangyong Zeng and
                  John Q. Liu and
                  Lei Hu and
                  Desmond P. Taylor},
  title        = {On the Linear Span of a Binary Sequence Family with Optimal Correlation
                  Properties},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {91-A},
  number       = {2},
  pages        = {664--672},
  year         = {2008},
  url          = {https://doi.org/10.1093/ietfec/e91-a.2.664},
  doi          = {10.1093/IETFEC/E91-A.2.664},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ZengLHT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/LiZH08,
  author       = {Nian Li and
                  Xiangyong Zeng and
                  Lei Hu},
  title        = {Binary Constant Weight Codes Based on Cyclic Difference Sets},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {91-A},
  number       = {5},
  pages        = {1288--1292},
  year         = {2008},
  url          = {https://doi.org/10.1093/ietfec/e91-a.5.1288},
  doi          = {10.1093/IETFEC/E91-A.5.1288},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/LiZH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/LuHLHHNM08,
  author       = {Li Lu and
                  Jinsong Han and
                  Yunhao Liu and
                  Lei Hu and
                  Jinpeng Huai and
                  Lionel M. Ni and
                  Jian Ma},
  title        = {Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {19},
  number       = {10},
  pages        = {1325--1337},
  year         = {2008},
  url          = {https://doi.org/10.1109/TPDS.2008.15},
  doi          = {10.1109/TPDS.2008.15},
  timestamp    = {Tue, 20 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tpds/LuHLHHNM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/ZhuFLH08,
  author       = {Bin B. Zhu and
                  Min Feng and
                  Fen Liu and
                  Lei Hu},
  title        = {Analysis on AACS' Traitor Tracing Against Mix-and-Match Attacks},
  booktitle    = {5th {IEEE} Consumer Communications and Networking Conference, {CCNC}
                  2008, Las Vegas, NV, USA, January 10-12, 2008},
  pages        = {1097--1101},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ccnc08.2007.248},
  doi          = {10.1109/CCNC08.2007.248},
  timestamp    = {Mon, 09 Aug 2021 14:54:01 +0200},
  biburl       = {https://dblp.org/rec/conf/ccnc/ZhuFLH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icip/HuJHG08,
  author       = {Lei Hu and
                  Shuqiang Jiang and
                  Qingming Huang and
                  Wen Gao},
  title        = {People re-detection using Adaboost with sift and color correlogram},
  booktitle    = {Proceedings of the International Conference on Image Processing, {ICIP}
                  2008, October 12-15, 2008, San Diego, California, {USA}},
  pages        = {1348--1351},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICIP.2008.4712013},
  doi          = {10.1109/ICIP.2008.4712013},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icip/HuJHG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icira/XuYWHHY08,
  author       = {Min Xu and
                  Chuang Yang and
                  Tianmiao Wang and
                  Yan Hu and
                  Lei Hu and
                  Bing Yu},
  editor       = {Caihua Xiong and
                  Honghai Liu and
                  Yongan Huang and
                  Youlun Xiong},
  title        = {Embedded Control System of Digital Operating Table},
  booktitle    = {Intelligent Robotics and Applications, First International Conference,
                  {ICIRA} 2008, Wuhan, China, October 15-17, 2008 Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5314},
  pages        = {556--565},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88513-9\_60},
  doi          = {10.1007/978-3-540-88513-9\_60},
  timestamp    = {Fri, 05 Mar 2021 11:49:33 +0100},
  biburl       = {https://dblp.org/rec/conf/icira/XuYWHHY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpr/HuWJHG08,
  author       = {Lei Hu and
                  Yizhou Wang and
                  Shuqiang Jiang and
                  Qingming Huang and
                  Wen Gao},
  title        = {Human reappearance detection based on on-line learning},
  booktitle    = {19th International Conference on Pattern Recognition {(ICPR} 2008),
                  December 8-11, 2008, Tampa, Florida, {USA}},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICPR.2008.4761564},
  doi          = {10.1109/ICPR.2008.4761564},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icpr/HuWJHG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/NieJHDQ08,
  author       = {Xuyun Nie and
                  Xin Jiang and
                  Lei Hu and
                  Jintai Ding and
                  Zhiguang Qin},
  editor       = {Jeng{-}Shyang Pan and
                  Xiamu Niu and
                  Hsiang{-}Cheh Huang and
                  Lakhmi C. Jain},
  title        = {Breaking Instance {II} of New {TTM} Cryptosystems},
  booktitle    = {4th International Conference on Intelligent Information Hiding and
                  Multimedia Signal Processing {(IIH-MSP} 2008), Harbin, China, 15-17
                  August 2008, Proceedings},
  pages        = {1332--1335},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IIH-MSP.2008.246},
  doi          = {10.1109/IIH-MSP.2008.246},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iih-msp/NieJHDQ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/JiH08,
  author       = {Wen Ji and
                  Lei Hu},
  editor       = {Liqun Chen and
                  Yi Mu and
                  Willy Susilo},
  title        = {Square Attack on Reduced-Round Zodiac Cipher},
  booktitle    = {Information Security Practice and Experience, 4th International Conference,
                  {ISPEC} 2008, Sydney, Australia, April 21-23, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4991},
  pages        = {377--391},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79104-1\_27},
  doi          = {10.1007/978-3-540-79104-1\_27},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/JiH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/npc/LiuH08,
  author       = {Fen Liu and
                  Lei Hu},
  editor       = {Jian Cao and
                  Minglu Li and
                  Chuliang Weng and
                  Yang Xiang and
                  Xin Wang and
                  Hong Tang and
                  Feng Hong and
                  Hong Liu and
                  Yinglin Wang},
  title        = {{ROAD:} An {RFID} Offline Authentication, Privacy Preserving Protocol
                  with Dos Resilience},
  booktitle    = {{IFIP} International Conference on Network and Parallel Computing,
                  {NPC} 2008, Shanghai, China, October 18-21, 2008, Workshop Proceedings},
  pages        = {139--146},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/NPC.2008.9},
  doi          = {10.1109/NPC.2008.9},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/npc/LiuH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/seke/HuS08,
  author       = {Lei Hu and
                  Kamran Sartipi},
  title        = {Dynamic Analysis and Design Pattern Detection in Java Programs},
  booktitle    = {Proceedings of the Twentieth International Conference on Software
                  Engineering {\&} Knowledge Engineering (SEKE'2008), San Francisco,
                  CA, USA, July 1-3, 2008},
  pages        = {842--846},
  publisher    = {Knowledge Systems Institute Graduate School},
  year         = {2008},
  timestamp    = {Thu, 12 Mar 2020 11:30:50 +0100},
  biburl       = {https://dblp.org/rec/conf/seke/HuS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/seta/ZengLH08,
  author       = {Xiangyong Zeng and
                  Nian Li and
                  Lei Hu},
  editor       = {Solomon W. Golomb and
                  Matthew Geoffrey Parker and
                  Alexander Pott and
                  Arne Winterhof},
  title        = {A Class of Nonbinary Codes and Sequence Families},
  booktitle    = {Sequences and Their Applications - {SETA} 2008, 5th International
                  Conference, Lexington, KY, USA, September 14-18, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5203},
  pages        = {81--94},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85912-3\_8},
  doi          = {10.1007/978-3-540-85912-3\_8},
  timestamp    = {Wed, 01 Sep 2021 10:36:07 +0200},
  biburl       = {https://dblp.org/rec/conf/seta/ZengLH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0801-0857,
  author       = {Lei Hu and
                  Xiangyong Zeng and
                  Nian Li and
                  Wenfeng Jiang},
  title        = {Period-Different {\textdollar}m{\textdollar}-Sequences With At Most
                  {A} Four-Valued Cross Correlation},
  journal      = {CoRR},
  volume       = {abs/0801.0857},
  year         = {2008},
  url          = {http://arxiv.org/abs/0801.0857},
  eprinttype    = {arXiv},
  eprint       = {0801.0857},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0801-0857.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0802-3430,
  author       = {Xiangyong Zeng and
                  Nian Li and
                  Lei Hu},
  title        = {A Class of Nonbinary Codes and Their Weight Distribution},
  journal      = {CoRR},
  volume       = {abs/0802.3430},
  year         = {2008},
  url          = {http://arxiv.org/abs/0802.3430},
  eprinttype    = {arXiv},
  eprint       = {0802.3430},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0802-3430.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcm/LiuHL07,
  author       = {Yining Liu and
                  Lei Hu and
                  Heguo Liu},
  title        = {Using an efficient hash chain and delaying function to improve an
                  e-lottery scheme},
  journal      = {Int. J. Comput. Math.},
  volume       = {84},
  number       = {7},
  pages        = {967--970},
  year         = {2007},
  url          = {https://doi.org/10.1080/00207160701294426},
  doi          = {10.1080/00207160701294426},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcm/LiuHL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/ZengLH07,
  author       = {Xiangyong Zeng and
                  John Q. Liu and
                  Lei Hu},
  title        = {Generalized Kasami Sequences: The Large Set},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {53},
  number       = {7},
  pages        = {2587--2598},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIT.2007.899528},
  doi          = {10.1109/TIT.2007.899528},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/ZengLH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/HuHF07,
  author       = {Honggang Hu and
                  Lei Hu and
                  Dengguo Feng},
  title        = {On a Class of Pseudorandom Sequences From Elliptic Curves Over Finite
                  Fields},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {53},
  number       = {7},
  pages        = {2598--2605},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIT.2007.899532},
  doi          = {10.1109/TIT.2007.899532},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/HuHF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiuJHDLPW07,
  author       = {Fen Liu and
                  Wen Ji and
                  Lei Hu and
                  Jintai Ding and
                  Shuwang Lv and
                  Andrei Pyshkin and
                  Ralf{-}Philipp Weinmann},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {Analysis of the {SMS4} Block Cipher},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {158--170},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_13},
  doi          = {10.1007/978-3-540-73458-1\_13},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LiuJHDLPW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/NieHDLW07,
  author       = {Xuyun Nie and
                  Lei Hu and
                  Jintai Ding and
                  Jianyu Li and
                  John Wagner},
  editor       = {Jonathan Katz and
                  Moti Yung},
  title        = {Cryptanalysis of the {TRMC-4} Public Key Cryptosystem},
  booktitle    = {Applied Cryptography and Network Security, 5th International Conference,
                  {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4521},
  pages        = {104--115},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72738-5\_7},
  doi          = {10.1007/978-3-540-72738-5\_7},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/NieHDLW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/WangHL08,
  author       = {Weijia Wang and
                  Lei Hu and
                  Yong Li},
  editor       = {Dingyi Pei and
                  Moti Yung and
                  Dongdai Lin and
                  Chuankun Wu},
  title        = {Provably Secure N-Party Authenticated Key Exchange in the Multicast
                  {DPWA} Setting},
  booktitle    = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt
                  2007, Xining, China, August 31 - September 5, 2007, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4990},
  pages        = {93--107},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-79499-8\_9},
  doi          = {10.1007/978-3-540-79499-8\_9},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/WangHL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/JiangDH08,
  author       = {Xin Jiang and
                  Jintai Ding and
                  Lei Hu},
  editor       = {Dingyi Pei and
                  Moti Yung and
                  Dongdai Lin and
                  Chuankun Wu},
  title        = {Kipnis-Shamir Attack on {HFE} Revisited},
  booktitle    = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt
                  2007, Xining, China, August 31 - September 5, 2007, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4990},
  pages        = {399--411},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-79499-8\_31},
  doi          = {10.1007/978-3-540-79499-8\_31},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/JiangDH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/GuoWWH07,
  author       = {Lifeng Guo and
                  Guilin Wang and
                  Duncan S. Wong and
                  Lei Hu},
  editor       = {Selim Aissi and
                  Hamid R. Arabnia},
  title        = {Further Discussions on the Security of a Nominative Signature Scheme},
  booktitle    = {Proceedings of the 2007 International Conference on Security {\&}
                  Management, {SAM} 2007, Las Vegas, Nevada, USA, June 25-28, 2007},
  pages        = {566--572},
  publisher    = {{CSREA} Press},
  year         = {2007},
  timestamp    = {Wed, 12 Dec 2007 16:45:17 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/GuoWWH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/JiH07,
  author       = {Wen Ji and
                  Lei Hu},
  editor       = {K. Srinathan and
                  C. Pandu Rangan and
                  Moti Yung},
  title        = {New Description of {SMS4} by an Embedding overGF(2\({}^{\mbox{8}}\))},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2007, 8th International Conference
                  on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4859},
  pages        = {238--251},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77026-8\_18},
  doi          = {10.1007/978-3-540-77026-8\_18},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/JiH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/LuHHHLN07,
  author       = {Li Lu and
                  Jinsong Han and
                  Lei Hu and
                  Jinpeng Huai and
                  Yunhao Liu and
                  Lionel M. Ni},
  title        = {Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer
                  Protocols},
  booktitle    = {21th International Parallel and Distributed Processing Symposium {(IPDPS}
                  2007), Proceedings, 26-30 March 2007, Long Beach, California, {USA}},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/IPDPS.2007.370284},
  doi          = {10.1109/IPDPS.2007.370284},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipps/LuHHHLN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itw/JiangHTZ07,
  author       = {Wenfeng Jiang and
                  Lei Hu and
                  Xiaohu Tang and
                  Xiangyong Zeng},
  editor       = {Tor Helleseth and
                  P. Vijay Kumar and
                  {\O}yvind Ytrehus},
  title        = {New Optimal Quadriphase Sequences with Larger Lnear Span},
  booktitle    = {Proceedings of the {IEEE} Information Theory Workshop on Information
                  Theory for Wireless Networks, July 1-6, 2007, Solstrand, Norway},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ITWITWN.2007.4318031},
  doi          = {10.1109/ITWITWN.2007.4318031},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/itw/JiangHTZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/LuHHLN07,
  author       = {Li Lu and
                  Jinsong Han and
                  Lei Hu and
                  Yunhao Liu and
                  Lionel M. Ni},
  title        = {Dynamic Key-Updating: Privacy-Preserving Authentication for {RFID}
                  Systems},
  booktitle    = {Fifth Annual {IEEE} International Conference on Pervasive Computing
                  and Communications (PerCom 2007), 19-23 March 2007, White Plains,
                  New York, {USA}},
  pages        = {13--22},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/PERCOM.2007.13},
  doi          = {10.1109/PERCOM.2007.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/LuHHLN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DingHNLW07,
  author       = {Jintai Ding and
                  Lei Hu and
                  Xuyun Nie and
                  Jianyu Li and
                  John Wagner},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {High Order Linearization Equation {(HOLE)} Attack on Multivariate
                  Public Key Cryptosystems},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {233--248},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_16},
  doi          = {10.1007/978-3-540-71677-8\_16},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DingHNLW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/robio/LiHKYW07,
  author       = {Feng Li and
                  Lei Hu and
                  Shaolong Kuang and
                  Chuang Yang and
                  Tianmiao Wang},
  title        = {A 5-DOF table-mounted surgical robot},
  booktitle    = {{IEEE} International Conference on Robotics and Biomimetics, {ROBIO}
                  2007, Sanya, China, 15-28 December 2007},
  pages        = {355--359},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ROBIO.2007.4522187},
  doi          = {10.1109/ROBIO.2007.4522187},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/robio/LiHKYW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secperu/Wang0HL07,
  author       = {Weijia Wang and
                  Yong Li and
                  Lei Hu and
                  Li Lu},
  editor       = {Panagiotis Georgiadis and
                  Javier L{\'{o}}pez and
                  Stefanos Gritzalis and
                  Giannis F. Marias},
  title        = {Storage-Awareness: {RFID} Private Authentication based on Sparse Tree},
  booktitle    = {Third International Workshop on Security, Privacy and Trust in Pervasive
                  and Ubiquitous Computing, SECPerU 2007, Istanbul, Turkey, July 19,
                  2007},
  pages        = {61--66},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/SECPERU.2007.13},
  doi          = {10.1109/SECPERU.2007.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secperu/Wang0HL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/LiuHLW07,
  author       = {Fen Liu and
                  Lei Hu and
                  Li Lu and
                  Weijia Wang},
  title        = {Privacy-preserving authentication with low computational overhead
                  for {RFID} systems},
  booktitle    = {Third International Conference on Security and Privacy in Communication
                  Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September,
                  2007},
  pages        = {127--132},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/SECCOM.2007.4550319},
  doi          = {10.1109/SECCOM.2007.4550319},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/LiuHLW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssc/TangHHJ07,
  author       = {Xiaohu Tang and
                  Tor Helleseth and
                  Lei Hu and
                  Wenfeng Jiang},
  editor       = {Solomon W. Golomb and
                  Guang Gong and
                  Tor Helleseth and
                  Hong{-}Yeop Song},
  title        = {A New Family of Gold-Like Sequences},
  booktitle    = {Sequences, Subsequences, and Consequences, International Workshop,
                  {SSC} 2007, Los Angeles, CA, USA, May 31 - June 2, 2007, Revised Invited
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4893},
  pages        = {62--69},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77404-4\_6},
  doi          = {10.1007/978-3-540-77404-4\_6},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ssc/TangHHJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JiangDH07,
  author       = {Xin Jiang and
                  Jintai Ding and
                  Lei Hu},
  title        = {Kipnis-Shamir's Attack on {HFE} Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {203},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/203},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JiangDH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarletZLH07,
  author       = {Claude Carlet and
                  Xiangyong Zeng and
                  Chunlei Li and
                  Lei Hu},
  title        = {Further Properties of Several Classes of Boolean Functions with Optimum
                  Algebraic Immunity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {370},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/370},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarletZLH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZengHYJ07,
  author       = {Xiangyong Zeng and
                  Lei Hu and
                  Yang Yang and
                  Wenfeng Jiang},
  title        = {On The Inequivalence Of Ness-Helleseth {APN} Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {379},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/379},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZengHYJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NieJHD07,
  author       = {Xuyun Nie and
                  Xin Jiang and
                  Lei Hu and
                  Jintai Ding},
  title        = {Cryptanalysis of Two New Instances of {TTM} Cryptosystem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {381},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/381},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NieJHD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ZengHJ06,
  author       = {Xiangyong Zeng and
                  Lei Hu and
                  Wenfeng Jiang},
  title        = {A Family of Binary Sequences with 4-Valued Optimal Out-of-Phase Correlation
                  and Large Linear Span},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {89-A},
  number       = {7},
  pages        = {2029--2035},
  year         = {2006},
  url          = {https://doi.org/10.1093/ietfec/e89-a.7.2029},
  doi          = {10.1093/IETFEC/E89-A.7.2029},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ZengHJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jc/SunH06,
  author       = {Nigang Sun and
                  Lei Hu},
  title        = {Expansion and linear complexity of the coordinate sequences over Galois
                  rings},
  journal      = {J. Complex.},
  volume       = {22},
  number       = {3},
  pages        = {382--395},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.jco.2005.09.005},
  doi          = {10.1016/J.JCO.2005.09.005},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jc/SunH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/NieHLUD06,
  author       = {Xuyun Nie and
                  Lei Hu and
                  Jianyu Li and
                  Crystal Updegrove and
                  Jintai Ding},
  editor       = {Jianying Zhou and
                  Moti Yung and
                  Feng Bao},
  title        = {Breaking a New Instance of {TTM} Cryptosystems},
  booktitle    = {Applied Cryptography and Network Security, 4th International Conference,
                  {ACNS} 2006, Singapore, June 6-9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3989},
  pages        = {210--225},
  year         = {2006},
  url          = {https://doi.org/10.1007/11767480\_14},
  doi          = {10.1007/11767480\_14},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/NieHLUD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apscc/WangSH06,
  author       = {Shaobin Wang and
                  Na Su and
                  Lei Hu},
  title        = {Fair E-cash Payment Model on Credit Overdraft},
  booktitle    = {Proceedings of The 1st {IEEE} Asia-Pacific Services Computing Conference,
                  {APSCC} 2006, December 12-15, 2006, Guangzhou, China},
  pages        = {107--111},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/APSCC.2006.53},
  doi          = {10.1109/APSCC.2006.53},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/apscc/WangSH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/LuH06,
  author       = {Li Lu and
                  Lei Hu},
  editor       = {Hamid R. Arabnia and
                  Selim Aissi},
  title        = {Pairing-Based Multi-Recipient Public Key Encryption},
  booktitle    = {Proceedings of the 2006 International Conference on Security {\&}
                  Management, {SAM} 2006, Las Vegas, Nevada, USA, June 26-29, 2006},
  pages        = {159--165},
  publisher    = {{CSREA} Press},
  year         = {2006},
  timestamp    = {Fri, 01 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/LuH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/ZengHLZ06,
  author       = {Xiangyong Zeng and
                  Lei Hu and
                  Qingchong Liu and
                  Yuhong Zhu},
  title        = {Binary Sequences with Optimal Correlations and Large Linear Span},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2006, Istanbul, Turkey, 11-15 June 2006},
  pages        = {385--390},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICC.2006.254758},
  doi          = {10.1109/ICC.2006.254758},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/ZengHLZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/WangH06,
  author       = {Weijia Wang and
                  Lei Hu},
  editor       = {Rana Barua and
                  Tanja Lange},
  title        = {Efficient and Provably Secure Generic Construction of Three-Party
                  Password-Based Authenticated Key Exchange Protocols},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2006, 7th International Conference
                  on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4329},
  pages        = {118--132},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11941378\_10},
  doi          = {10.1007/11941378\_10},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/WangH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iros/WangWLHL06,
  author       = {Tianmiao Wang and
                  Jun Wei and
                  Da Liu and
                  Lei Hu and
                  Wenyong Liu},
  title        = {An Internet Robot Assistant Tele-neurosurgery System Case},
  booktitle    = {2006 {IEEE/RSJ} International Conference on Intelligent Robots and
                  Systems, {IROS} 2006, October 9-15, 2006, Beijing, China},
  pages        = {2845--2849},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/IROS.2006.282071},
  doi          = {10.1109/IROS.2006.282071},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/iros/WangWLHL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/ZengLH06,
  author       = {Xiangyong Zeng and
                  Qingchong Liu and
                  Lei Hu},
  title        = {A New Family of Codes and Generalized Kasami Sequences},
  booktitle    = {Proceedings 2006 {IEEE} International Symposium on Information Theory,
                  {ISIT} 2006, The Westin Seattle, Seattle, Washington, USA, July 9-14,
                  2006},
  pages        = {907--911},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/ISIT.2006.261791},
  doi          = {10.1109/ISIT.2006.261791},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/ZengLH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/seta/HuHF06,
  author       = {Honggang Hu and
                  Lei Hu and
                  Dengguo Feng},
  editor       = {Guang Gong and
                  Tor Helleseth and
                  Hong{-}Yeop Song and
                  Kyeongcheol Yang},
  title        = {On the Expected Value of the Joint 2-Adic Complexity of Periodic Binary
                  Multisequences},
  booktitle    = {Sequences and Their Applications - {SETA} 2006, 4th International
                  Conference, Beijing, China, September 24-28, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4086},
  pages        = {199--208},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11863854\_17},
  doi          = {10.1007/11863854\_17},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/seta/HuHF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/seta/HuZ06,
  author       = {Lei Hu and
                  Xiangyong Zeng},
  editor       = {Guang Gong and
                  Tor Helleseth and
                  Hong{-}Yeop Song and
                  Kyeongcheol Yang},
  title        = {Partially Perfect Nonlinear Functions and a Construction of Cryptographic
                  Boolean Functions},
  booktitle    = {Sequences and Their Applications - {SETA} 2006, 4th International
                  Conference, Beijing, China, September 24-28, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4086},
  pages        = {402--416},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11863854\_35},
  doi          = {10.1007/11863854\_35},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/seta/HuZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DingHYC06,
  author       = {Jintai Ding and
                  Lei Hu and
                  Bo{-}Yin Yang and
                  Jiun{-}Ming Chen},
  title        = {Note on Design Criteria for Rainbow-Type Multivariates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {307},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/307},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DingHYC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DingHNLW06,
  author       = {Jintai Ding and
                  Lei Hu and
                  Xuyun Nie and
                  Jianyu Li and
                  John Wagner},
  title        = {High Order Linearization Equation {(HOLE)} Attack on Multivariate
                  Public Key Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {336},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/336},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DingHNLW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejasp/LiLCCH05,
  author       = {Chengqing Li and
                  Shujun Li and
                  Guanrong Chen and
                  Gang Chen and
                  Lei Hu},
  title        = {Cryptanalysis of a New Signal Security System for Multimedia Data
                  Transmission},
  journal      = {{EURASIP} J. Adv. Signal Process.},
  volume       = {2005},
  number       = {8},
  pages        = {1277--1288},
  year         = {2005},
  url          = {https://doi.org/10.1155/ASP.2005.1277},
  doi          = {10.1155/ASP.2005.1277},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejasp/LiLCCH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ZengH05,
  author       = {Xiangyong Zeng and
                  Lei Hu},
  title        = {Constructing Boolean Functions by Modifying Maiorana-McFarland's Superclass
                  Functions},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {88-A},
  number       = {1},
  pages        = {59--66},
  year         = {2005},
  url          = {http://search.ieice.org/bin/summary.php?id=e88-a\_1\_59\&\#38;category=D\&\#38;year=2005\&\#38;lang=E\&\#38;abst=},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ZengH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ZengH05a,
  author       = {Xiangyong Zeng and
                  Lei Hu},
  title        = {Fast Modular Reduction over Euclidean Rings and Its Application to
                  Universal Hash Functions},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {88-A},
  number       = {1},
  pages        = {305--310},
  year         = {2005},
  url          = {http://search.ieice.org/bin/summary.php?id=e88-a\_1\_305\&\#38;category=D\&\#38;year=2005\&\#38;lang=E\&\#38;abst=},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ZengH05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/HuDP05,
  author       = {Lei Hu and
                  Jun{-}Wu Dong and
                  Dingyi Pei},
  title        = {Implementation of Cryptosystems Based on Tate Pairing},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {20},
  number       = {2},
  pages        = {264--269},
  year         = {2005},
  url          = {https://doi.org/10.1007/s11390-005-0264-1},
  doi          = {10.1007/S11390-005-0264-1},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcst/HuDP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccnmc/HanLLHP05,
  author       = {Jinsong Han and
                  Yunhao Liu and
                  Li Lu and
                  Lei Hu and
                  Abhishek P. Patil},
  editor       = {Xicheng Lu and
                  Wei Zhao},
  title        = {A Random Walk Based Anonymous Peer-to-Peer Protocol Design},
  booktitle    = {Networking and Mobile Computing, Third International Conference, {ICCNMC}
                  2005, Zhangjiajie, China, August 2-4, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3619},
  pages        = {143--152},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11534310\_17},
  doi          = {10.1007/11534310\_17},
  timestamp    = {Tue, 20 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccnmc/HanLLHP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcsw/HanZLCH05,
  author       = {Jinsong Han and
                  Yanmin Zhu and
                  Yunhao Liu and
                  Jianfeng Cai and
                  Lei Hu},
  title        = {Provide Privacy for Mobile {P2P} Systems},
  booktitle    = {25th International Conference on Distributed Computing Systems Workshops
                  {(ICDCS} 2005 Workshops), 6-10 June 2005, Columbus, OH, {USA}},
  pages        = {829--834},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICDCSW.2005.114},
  doi          = {10.1109/ICDCSW.2005.114},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcsw/HanZLCH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/HuHF05,
  author       = {Honggang Hu and
                  Lei Hu and
                  Dengguo Feng},
  title        = {A new class of binary sequences with low correlation and large linear
                  complexity from function fields},
  booktitle    = {Proceedings of the 2005 {IEEE} International Symposium on Information
                  Theory, {ISIT} 2005, Adelaide, South Australia, Australia, 4-9 September
                  2005},
  pages        = {1997--2001},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ISIT.2005.1523695},
  doi          = {10.1109/ISIT.2005.1523695},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/HuHF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcc/ZengHL05,
  author       = {Xiangyong Zeng and
                  Lei Hu and
                  Qingchong Liu},
  editor       = {{\O}yvind Ytrehus},
  title        = {A Novel Method for Constructing Almost Perfect Polyphase Sequences},
  booktitle    = {Coding and Cryptography, International Workshop, {WCC} 2005, Bergen,
                  Norway, March 14-18, 2005. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3969},
  pages        = {346--353},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11779360\_27},
  doi          = {10.1007/11779360\_27},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/wcc/ZengHL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0508114,
  author       = {Xiangyong Zeng and
                  Lei Hu and
                  Qingchong Liu},
  title        = {A Family of Binary Sequences with Optimal Correlation Property and
                  Large Linear Span},
  journal      = {CoRR},
  volume       = {abs/cs/0508114},
  year         = {2005},
  url          = {http://arxiv.org/abs/cs/0508114},
  eprinttype    = {arXiv},
  eprint       = {cs/0508114},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0508114.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0508115,
  author       = {Xiangyong Zeng and
                  Lei Hu and
                  Qingchong Liu},
  title        = {New Sequence Sets with Zero-Correlation Zone},
  journal      = {CoRR},
  volume       = {abs/cs/0508115},
  year         = {2005},
  url          = {http://arxiv.org/abs/cs/0508115},
  eprinttype    = {arXiv},
  eprint       = {cs/0508115},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0508115.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0511046,
  author       = {Xiangyong Zeng and
                  Qingchong Liu and
                  Lei Hu},
  title        = {Generalized Kasami Sequences: The Large Set},
  journal      = {CoRR},
  volume       = {abs/cs/0511046},
  year         = {2005},
  url          = {http://arxiv.org/abs/cs/0511046},
  eprinttype    = {arXiv},
  eprint       = {cs/0511046},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0511046.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dm/HuP04,
  author       = {Lei Hu and
                  Dingyi Pei},
  title        = {Generator polynomials of characteristic ideal of maximal periodic
                  arrays over Galois rings},
  journal      = {Discret. Math.},
  volume       = {278},
  number       = {1-3},
  pages        = {139--149},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.disc.2003.06.001},
  doi          = {10.1016/J.DISC.2003.06.001},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dm/HuP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iros/WangLH04,
  author       = {Tianmiao Wang and
                  Wenyong Liu and
                  Lei Hu},
  title        = {{BPOR:} a fluoroscopy-based robot navigating system for distal locking
                  of intramedullary nails},
  booktitle    = {2004 {IEEE/RSJ} International Conference on Intelligent Robots and
                  Systems, Sendai, Japan, September 28 - October 2, 2004},
  pages        = {3321--3326},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/IROS.2004.1389929},
  doi          = {10.1109/IROS.2004.1389929},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/iros/WangLH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/WangHD03,
  author       = {Quanlong Wang and
                  Lei Hu and
                  Zongduo Dai},
  title        = {On Linear Complexity of Kronecker Sequences},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {86-A},
  number       = {11},
  pages        = {2853--2859},
  year         = {2003},
  url          = {http://search.ieice.org/bin/summary.php?id=e86-a\_11\_2853},
  timestamp    = {Tue, 08 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/WangHD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZengH03,
  author       = {Xiangyong Zeng and
                  Lei Hu},
  title        = {A Composition Construction of Bent-Like Boolean Functions from Quadratic
                  Polynomials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {204},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/204},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZengH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/miar/WangLHLWT01,
  author       = {Tianmiao Wang and
                  Da Liu and
                  Lei Hu and
                  Hongbo Lv and
                  Zingang Wang and
                  Zesheng Tang},
  title        = {A Simulation and Training Systems of Robot Assisted Surgery Based
                  on Virtual Reality},
  booktitle    = {Medical Imaging and Augmented Reality: First International Workshop,
                  {MIAR} 2001, Hong Kong, China, June 10-12, 2001. Proceedings},
  pages        = {103},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/MIAR.2001.930271},
  doi          = {10.1109/MIAR.2001.930271},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/miar/WangLHLWT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsc/LiuH98,
  author       = {Mulan Liu and
                  Lei Hu},
  title        = {Properties of Gr{\"{o}}bner Bases and Applications to Doubly
                  Periodic Arrays},
  journal      = {J. Symb. Comput.},
  volume       = {26},
  number       = {3},
  pages        = {301--314},
  year         = {1998},
  url          = {https://doi.org/10.1006/jsco.1998.0213},
  doi          = {10.1006/JSCO.1998.0213},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsc/LiuH98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/HuG98,
  author       = {Lei Hu and
                  Ian Gorton},
  title        = {Performance Oriented Design Using {HL}},
  booktitle    = {Thirty-First Annual Hawaii International Conference on System Sciences,
                  Kohala Coast, Hawaii, USA, January 6-9, 1998},
  pages        = {167--176},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/HICSS.1998.656135},
  doi          = {10.1109/HICSS.1998.656135},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/HuG98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdse/HuG97,
  author       = {Lei Hu and
                  Ian Gorton},
  title        = {A Performance Prototyping Approach to Designing Concurrent Software
                  Architectures},
  booktitle    = {International Symposium on Software Engineering for Parallel and Distributed
                  Systems, {PDSE} 1997, Boston, MA, USA, May 17-18, 1997},
  pages        = {270--276},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/PDSE.1997.596846},
  doi          = {10.1109/PDSE.1997.596846},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pdse/HuG97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics