Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Lei Hu
@article{DBLP:journals/bspc/HuCCW24, author = {Lei Hu and Wenjie Cai and Ziyang Chen and Mingjie Wang}, title = {A lightweight U-Net model for denoising and noise localization of {ECG} signals}, journal = {Biomed. Signal Process. Control.}, volume = {88}, number = {Part {B}}, pages = {105504}, year = {2024}, url = {https://doi.org/10.1016/j.bspc.2023.105504}, doi = {10.1016/J.BSPC.2023.105504}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bspc/HuCCW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LvSHGGW24, author = {Yin Lv and Danping Shi and Lei Hu and Zihui Guo and Yi Guo and Caibing Wang}, title = {Improved Linear Cryptanalysis of Block Cipher {BORON}}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {210--219}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac169}, doi = {10.1093/COMJNL/BXAC169}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/LvSHGGW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/LiSZDHDSYQW24, author = {Weirong Li and Kai Sun and Yunqiang Zhu and Fangyu Ding and Lei Hu and Xiaoliang Dai and Jia Song and Jie Yang and Lang Qian and Shu Wang}, title = {GeoTPE: {A} neural network model for geographical topic phrases extraction from literature based on {BERT} enhanced with relative position embedding}, journal = {Expert Syst. Appl.}, volume = {235}, pages = {121077}, year = {2024}, url = {https://doi.org/10.1016/j.eswa.2023.121077}, doi = {10.1016/J.ESWA.2023.121077}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eswa/LiSZDHDSYQW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kbs/WangXHFH24, author = {Yunsheng Wang and Xinghan Xu and Lei Hu and Jianchao Fan and Min Han}, title = {A time series continuous missing values imputation method based on generative adversarial networks}, journal = {Knowl. Based Syst.}, volume = {283}, pages = {111215}, year = {2024}, url = {https://doi.org/10.1016/j.knosys.2023.111215}, doi = {10.1016/J.KNOSYS.2023.111215}, timestamp = {Mon, 22 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/kbs/WangXHFH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/remotesensing/HuZRL24, author = {Lei Hu and Xun Zhou and Jiachen Ruan and Supeng Li}, title = {ASPP+-LANet: {A} Multi-Scale Context Extraction Network for Semantic Segmentation of High-Resolution Remote Sensing Images}, journal = {Remote. Sens.}, volume = {16}, number = {6}, pages = {1036}, year = {2024}, url = {https://doi.org/10.3390/rs16061036}, doi = {10.3390/RS16061036}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/remotesensing/HuZRL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ChenGHSMW24, author = {Yuchao Chen and Tingting Guo and Lei Hu and Lina Shang and Shuping Mao and Peng Wang}, title = {Small Stretch Problem of the {DCT} Scheme and How to Fix It}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2024}, number = {1}, pages = {114--134}, year = {2024}, url = {https://doi.org/10.46586/tosc.v2024.i1.114-134}, doi = {10.46586/TOSC.V2024.I1.114-134}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/ChenGHSMW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/HuLQHN24, author = {Lei Hu and Guyue Li and Xuewen Qian and Aiqun Hu and Derrick Wing Kwan Ng}, title = {Reconfigurable Intelligent Surface-Assisted Secret Key Generation in Spatially Correlated Channels}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {23}, number = {3}, pages = {2153--2166}, year = {2024}, url = {https://doi.org/10.1109/TWC.2023.3296076}, doi = {10.1109/TWC.2023.3296076}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/twc/HuLQHN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wcl/HuLHN24, author = {Lei Hu and Guyue Li and Aiqun Hu and Derrick Wing Kwan Ng}, title = {Exploiting Malicious {RIS} for Secret Key Acquisition in Physical-Layer Key Generation}, journal = {{IEEE} Wirel. Commun. Lett.}, volume = {13}, number = {2}, pages = {417--421}, year = {2024}, url = {https://doi.org/10.1109/LWC.2023.3330809}, doi = {10.1109/LWC.2023.3330809}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wcl/HuLHN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-03768, author = {Yushuai Wu and Ting Zhang and Hao Zhou and Hainan Wu and Hanwen Sunchu and Lei Hu and Xiaofang Chen and Suyuan Zhao and Gaochao Liu and Chao Sun and Jiahuan Zhang and Yizhen Luo and Peng Liu and Zaiqing Nie and Yushuai Wu}, title = {DeepCRE: Transforming Drug R{\&}D via AI-Driven Cross-drug Response Evaluation}, journal = {CoRR}, volume = {abs/2403.03768}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.03768}, doi = {10.48550/ARXIV.2403.03768}, eprinttype = {arXiv}, eprint = {2403.03768}, timestamp = {Wed, 03 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-03768.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SongYCHW24, author = {Ling Song and Qianqian Yang and Yincen Chen and Lei Hu and Jian Weng}, title = {Probabilistic Extensions: {A} One-Step Framework for Finding Rectangle Attacks and Beyond}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {344}, year = {2024}, url = {https://eprint.iacr.org/2024/344}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SongYCHW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/DongYHSC23, author = {Fei Dong and Jianguo Yang and Lei Hu and Sicong Sun and Yunkai Cai}, title = {Multi-Objective Matched Synchrosqueezing Chirplet Transform for Fault Feature Extraction From Marine Turbochargers}, journal = {{IEEE} Access}, volume = {11}, pages = {80702--80715}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3296689}, doi = {10.1109/ACCESS.2023.3296689}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/DongYHSC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bdcc/TangHCHLL23, author = {Ze{-}Yang Tang and Qibiao Hu and Yi{-}Bo Cui and Lei Hu and Yi{-}Wen Li and Yu{-}Jie Li}, title = {Evaluation Method of Electric Vehicle Charging Station Operation Based on Contrastive Learning}, journal = {Big Data Cogn. Comput.}, volume = {7}, number = {3}, pages = {133}, year = {2023}, url = {https://doi.org/10.3390/bdcc7030133}, doi = {10.3390/BDCC7030133}, timestamp = {Fri, 05 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bdcc/TangHCHLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/caaitrit/ZhangHLJLSSZHL23, author = {Yonghong Zhang and Ning Hu and Zhuofu Li and Xuquan Ji and Shanshan Liu and Youyang Sha and Xiongkang Song and Jian Zhang and Lei Hu and Weishi Li}, title = {Lumbar spine localisation method based on feature fusion}, journal = {{CAAI} Trans. Intell. Technol.}, volume = {8}, number = {3}, pages = {931--945}, year = {2023}, url = {https://doi.org/10.1049/cit2.12137}, doi = {10.1049/CIT2.12137}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/caaitrit/ZhangHLJLSSZHL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/GuoZYHL23, author = {Hao Guo and Zhiyu Zhang and Qianqian Yang and Lei Hu and Yiyuan Luo}, title = {A New Method To Find All The High-Probability Word-Oriented Truncated Differentials: Application To \texttt{Midori}, \texttt{SKINNY} And \texttt{CRAFT}}, journal = {Comput. J.}, volume = {66}, number = {5}, pages = {1069--1082}, year = {2023}, url = {https://doi.org/10.1093/comjnl/bxab213}, doi = {10.1093/COMJNL/BXAB213}, timestamp = {Fri, 23 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/GuoZYHL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LvSGCHG23, author = {Yin Lv and Danping Shi and Yi Guo and Qiu Chen and Lei Hu and Zihui Guo}, title = {Automatic Demirci-Sel{\c{c}}uk Meet-In-The-Middle Attack On {SIMON}}, journal = {Comput. J.}, volume = {66}, number = {12}, pages = {3052--3068}, year = {2023}, url = {https://doi.org/10.1093/comjnl/bxac149}, doi = {10.1093/COMJNL/BXAC149}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/LvSGCHG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/QiaoYSHJ23, author = {Wenxiao Qiao and Hailun Yan and Siwei Sun and Lei Hu and Jiwu Jing}, title = {New cryptanalysis of LowMC with algebraic techniques}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {5}, pages = {2057--2075}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01178-1}, doi = {10.1007/S10623-022-01178-1}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/QiaoYSHJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eaai/ZhaoHHWL23, author = {Jinling Zhao and Lei Hu and Linsheng Huang and Chuanjian Wang and Dong Liang}, title = {{MSRA-G:} Combination of multi-scale residual attention network and generative adversarial networks for hyperspectral image classification}, journal = {Eng. Appl. Artif. Intell.}, volume = {121}, pages = {106017}, year = {2023}, url = {https://doi.org/10.1016/j.engappai.2023.106017}, doi = {10.1016/J.ENGAPPAI.2023.106017}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eaai/ZhaoHHWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eaai/ZhangHML23, author = {Shitao Zhang and Lei Hu and Zhenzhen Ma and Xiaodi Liu}, title = {Two-rank multi-attribute group decision-making with linguistic distribution assessments: An optimization-based integrated approach}, journal = {Eng. Appl. Artif. Intell.}, volume = {121}, pages = {106170}, year = {2023}, url = {https://doi.org/10.1016/j.engappai.2023.106170}, doi = {10.1016/J.ENGAPPAI.2023.106170}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eaai/ZhangHML23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/envsoft/ZhangYHWZ23, author = {Mingda Zhang and Peng Yue and Lei Hu and Huayi Wu and Fan Zhang}, title = {An interoperable and service-oriented approach for real-time environmental simulation by coupling {OGC} {WPS} and SensorThings {API}}, journal = {Environ. Model. Softw.}, volume = {165}, pages = {105722}, year = {2023}, url = {https://doi.org/10.1016/j.envsoft.2023.105722}, doi = {10.1016/J.ENVSOFT.2023.105722}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/envsoft/ZhangYHWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/WeiSHWP23, author = {Zihao Wei and Siwei Sun and Lei Hu and Man Wei and Ren{\'{e}} Peralta}, title = {Searching the space of tower field implementations of the {\unicode{54589}}\({}_{\mbox{2\({}^{\mbox{8}}\)}}\) inverter - with applications to AES, Camellia and {SM4}}, journal = {Int. J. Inf. Comput. Secur.}, volume = {20}, number = {1/2}, pages = {1--26}, year = {2023}, url = {https://doi.org/10.1504/IJICS.2023.10052962}, doi = {10.1504/IJICS.2023.10052962}, timestamp = {Mon, 06 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/WeiSHWP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijis/HuZZZSJLLL23, author = {Lei Hu and Yonghong Zhang and Jian Zhang and Tianyang Zhang and Xiongkang Song and Xuquan Ji and Shanshan Liu and Zhuofu Li and Weishi Li}, title = {STP-Net: {A} Signal Prediction Method of Laminar Decompression Robot Based on Swin Transformer}, journal = {Int. J. Intell. Syst.}, volume = {2023}, pages = {1--20}, year = {2023}, url = {https://doi.org/10.1155/2023/7842495}, doi = {10.1155/2023/7842495}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijis/HuZZZSJLLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipm/BiNZHMZ0W23, author = {Xin Bi and Haojie Nie and Guoliang Zhang and Lei Hu and Yuliang Ma and Xiangguo Zhao and Ye Yuan and Guoren Wang}, title = {Boosting question answering over knowledge graph with reward integration and policy evaluation under weak supervision}, journal = {Inf. Process. Manag.}, volume = {60}, number = {2}, pages = {103242}, year = {2023}, url = {https://doi.org/10.1016/j.ipm.2022.103242}, doi = {10.1016/J.IPM.2022.103242}, timestamp = {Sun, 16 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipm/BiNZHMZ0W23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/LiuNSLH23, author = {Yunwen Liu and Zhongfeng Niu and Siwei Sun and Chao Li and Lei Hu}, title = {Rotational Differential-Linear Cryptanalysis Revisited}, journal = {J. Cryptol.}, volume = {36}, number = {1}, pages = {3}, year = {2023}, url = {https://doi.org/10.1007/s00145-022-09440-4}, doi = {10.1007/S00145-022-09440-4}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/LiuNSLH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/remotesensing/DaiZSZZLHW23, author = {Xiaoliang Dai and Yunqiang Zhu and Kai Sun and Qiang Zou and Shen Zhao and Weirong Li and Lei Hu and Shu Wang}, title = {Examining the Spatially Varying Relationships between Landslide Susceptibility and Conditioning Factors Using a Geographical Random Forest Approach: {A} Case Study in Liangshan, China}, journal = {Remote. Sens.}, volume = {15}, number = {6}, pages = {1513}, year = {2023}, url = {https://doi.org/10.3390/rs15061513}, doi = {10.3390/RS15061513}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/remotesensing/DaiZSZZLHW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/remotesensing/HuZZSLF23, author = {Lei Hu and Chenxiao Zhang and Mingda Zhang and Yuming Shi and Jiasheng Lu and Zhe Fang}, title = {Enhancing {FAIR} Data Services in Agricultural Disaster: {A} Review}, journal = {Remote. Sens.}, volume = {15}, number = {8}, pages = {2024}, year = {2023}, url = {https://doi.org/10.3390/rs15082024}, doi = {10.3390/RS15082024}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/remotesensing/HuZZSLF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/remotesensing/PangGHGZZZL23, author = {Siqi Pang and Junyao Ge and Lei Hu and Kaitai Guo and Yang Zheng and Changli Zheng and Wei Zhang and Jimin Liang}, title = {{RTV-SIFT:} Harnessing Structure Information for Robust Optical and {SAR} Image Registration}, journal = {Remote. Sens.}, volume = {15}, number = {18}, pages = {4476}, year = {2023}, url = {https://doi.org/10.3390/rs15184476}, doi = {10.3390/RS15184476}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/remotesensing/PangGHGZZZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/remotesensing/JiangLHPH23, author = {Liangcun Jiang and Feng Li and Li Huang and Feifei Peng and Lei Hu}, title = {TTNet: {A} Temporal-Transform Network for Semantic Change Detection Based on Bi-Temporal Remote Sensing Images}, journal = {Remote. Sens.}, volume = {15}, number = {18}, pages = {4555}, year = {2023}, url = {https://doi.org/10.3390/rs15184555}, doi = {10.3390/RS15184555}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/remotesensing/JiangLHPH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/Hu23, author = {Lei Hu}, title = {Implementation of the expansion of sensor information storage based on the Internet of Things and cloud computing}, journal = {Secur. Priv.}, volume = {6}, number = {2}, year = {2023}, url = {https://doi.org/10.1002/spy2.215}, doi = {10.1002/SPY2.215}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/Hu23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcom/HuSLHN23, author = {Lei Hu and Chen Sun and Guyue Li and Aiqun Hu and Derrick Wing Kwan Ng}, title = {Reconfigurable Intelligent Surface-Aided Secret Key Generation in Multi-Cell Systems}, journal = {{IEEE} Trans. Commun.}, volume = {71}, number = {11}, pages = {6499--6513}, year = {2023}, url = {https://doi.org/10.1109/TCOMM.2023.3301048}, doi = {10.1109/TCOMM.2023.3301048}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcom/HuSLHN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tgrs/HuHZZ23, author = {Lei Hu and Wei He and Liangpei Zhang and Hongyan Zhang}, title = {Cross-Domain Meta-Learning Under Dual-Adjustment Mode for Few-Shot Hyperspectral Image Classification}, journal = {{IEEE} Trans. Geosci. Remote. Sens.}, volume = {61}, pages = {1--16}, year = {2023}, url = {https://doi.org/10.1109/TGRS.2023.3320657}, doi = {10.1109/TGRS.2023.3320657}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tgrs/HuHZZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/XuSHWP23, author = {Jun Xu and Santanu Sarkar and Lei Hu and Huaxiong Wang and Yanbin Pan}, title = {Revisiting Modular Inversion Hidden Number Problem and Its Applications}, journal = {{IEEE} Trans. Inf. Theory}, volume = {69}, number = {8}, pages = {5337--5356}, year = {2023}, url = {https://doi.org/10.1109/TIT.2023.3263485}, doi = {10.1109/TIT.2023.3263485}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/XuSHWP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ZhangSWH23, author = {Zhiyu Zhang and Siwei Sun and Caibing Wang and Lei Hu}, title = {Classical and Quantum Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {2}, pages = {224--252}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i2.224-252}, doi = {10.46586/TOSC.V2023.I2.224-252}, timestamp = {Tue, 18 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/ZhangSWH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/GuoSHL23, author = {Yi Guo and Danping Shi and Lei Hu and Yin Lv}, editor = {Chunpeng Ge and Moti Yung}, title = {Improved Integral Cryptanalysis of Block Ciphers {BORON} and Khudra}, booktitle = {Information Security and Cryptology - 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14527}, pages = {153--171}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-97-0945-8\_9}, doi = {10.1007/978-981-97-0945-8\_9}, timestamp = {Mon, 11 Mar 2024 15:20:47 +0100}, biburl = {https://dblp.org/rec/conf/cisc/GuoSHL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasfaa/YuanBHZHYZS23, author = {Mingxu Yuan and Xin Bi and Xuechun Huang and Wei Zhang and Lei Hu and George Y. Yuan and Xiangguo Zhao and Yongjiao Sun}, editor = {Xin Wang and Maria Luisa Sapino and Wook{-}Shin Han and Amr El Abbadi and Gill Dobbie and Zhiyong Feng and Yingxiao Shao and Hongzhi Yin}, title = {Towards Time-Series Key Points Detection Through Self-supervised Learning and Probability Compensation}, booktitle = {Database Systems for Advanced Applications - 28th International Conference, {DASFAA} 2023, Tianjin, China, April 17-20, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13943}, pages = {237--252}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30637-2\_16}, doi = {10.1007/978-3-031-30637-2\_16}, timestamp = {Tue, 02 May 2023 16:41:52 +0200}, biburl = {https://dblp.org/rec/conf/dasfaa/YuanBHZHYZS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ShiSSHY23, author = {Danping Shi and Siwei Sun and Ling Song and Lei Hu and Qianqian Yang}, editor = {Carmit Hazay and Martijn Stam}, title = {Exploiting Non-full Key Additions: Full-Fledged Automatic Demirci-Sel{\c{c}}uk Meet-in-the-Middle Cryptanalysis of {SKINNY}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14007}, pages = {67--97}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30634-1\_3}, doi = {10.1007/978-3-031-30634-1\_3}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ShiSSHY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccv/ZhongHZX23, author = {Chongyang Zhong and Lei Hu and Zihao Zhang and Shihong Xia}, title = {AttT2M: Text-Driven Human Motion Generation with Multi-Perspective Attention Mechanism}, booktitle = {{IEEE/CVF} International Conference on Computer Vision, {ICCV} 2023, Paris, France, October 1-6, 2023}, pages = {509--519}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICCV51070.2023.00053}, doi = {10.1109/ICCV51070.2023.00053}, timestamp = {Fri, 19 Jan 2024 17:50:41 +0100}, biburl = {https://dblp.org/rec/conf/iccv/ZhongHZX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccv/JiangHX23, author = {Boyuan Jiang and Lei Hu and Shihong Xia}, title = {Probabilistic Triangulation for Uncalibrated Multi-View 3D Human Pose Estimation}, booktitle = {{IEEE/CVF} International Conference on Computer Vision, {ICCV} 2023, Paris, France, October 1-6, 2023}, pages = {14804--14814}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICCV51070.2023.01364}, doi = {10.1109/ICCV51070.2023.01364}, timestamp = {Mon, 22 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccv/JiangHX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ZhaoZYSH23, author = {Jiahao Zhao and Nana Zhang and Qianqian Yang and Ling Song and Lei Hu}, editor = {Junji Shikata and Hiroki Kuzuno}, title = {Improved Boomerang Attacks on Deoxys-BC}, booktitle = {Advances in Information and Computer Security - 18th International Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14128}, pages = {59--76}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41326-1\_4}, doi = {10.1007/978-3-031-41326-1\_4}, timestamp = {Fri, 25 Aug 2023 19:50:15 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ZhaoZYSH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/LiLHHN23, author = {Haoyu Li and Guyue Li and Lei Hu and Aiqun Hu and Derrick Wing Kwan Ng}, title = {RIS-Assisted Physical-Layer Key Generation with Discrete Phase Shift Optimization}, booktitle = {98th {IEEE} Vehicular Technology Conference, {VTC} Fall 2023, Hong Kong, SAR, China, October 10-13, 2023}, pages = {1--5}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/VTC2023-Fall60731.2023.10333843}, doi = {10.1109/VTC2023-FALL60731.2023.10333843}, timestamp = {Wed, 10 Jan 2024 16:12:42 +0100}, biburl = {https://dblp.org/rec/conf/vtc/LiLHHN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-12455, author = {Lei Hu and Chen Sun and Guyue Li and Aiqun Hu and Derrick Wing Kwan Ng}, title = {Reconfigurable Intelligent Surface-aided Secret Key Generation in Multi-Cell Systems}, journal = {CoRR}, volume = {abs/2303.12455}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.12455}, doi = {10.48550/ARXIV.2303.12455}, eprinttype = {arXiv}, eprint = {2303.12455}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-12455.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-14884, author = {Fan Yang and Lei Hu and Xinwu Liu and Shuangping Huang and Zhenghui Gu}, title = {A large-scale dataset for end-to-end table recognition in the wild}, journal = {CoRR}, volume = {abs/2303.14884}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.14884}, doi = {10.48550/ARXIV.2303.14884}, eprinttype = {arXiv}, eprint = {2303.14884}, timestamp = {Wed, 10 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-14884.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-08006, author = {Lei Hu and Zihao Zhang and Chongyang Zhong and Boyuan Jiang and Shihong Xia}, title = {Pose-aware Attention Network for Flexible Motion Retargeting by Body Part}, journal = {CoRR}, volume = {abs/2306.08006}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.08006}, doi = {10.48550/ARXIV.2306.08006}, eprinttype = {arXiv}, eprint = {2306.08006}, timestamp = {Sun, 18 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-08006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-00796, author = {Chongyang Zhong and Lei Hu and Zihao Zhang and Shihong Xia}, title = {AttT2M: Text-Driven Human Motion Generation with Multi-Perspective Attention Mechanism}, journal = {CoRR}, volume = {abs/2309.00796}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.00796}, doi = {10.48550/ARXIV.2309.00796}, eprinttype = {arXiv}, eprint = {2309.00796}, timestamp = {Mon, 11 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-00796.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-04756, author = {Boyuan Jiang and Lei Hu and Shihong Xia}, title = {Probabilistic Triangulation for Uncalibrated Multi-View 3D Human Pose Estimation}, journal = {CoRR}, volume = {abs/2309.04756}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.04756}, doi = {10.48550/ARXIV.2309.04756}, eprinttype = {arXiv}, eprint = {2309.04756}, timestamp = {Fri, 15 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-04756.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-17266, author = {Zhuofu Li and Yonghong Zhang and Chengxia Wang and Shanshan Liu and Xiongkang Song and Xuquan Ji and Shuai Jiang and Woquan Zhong and Lei Hu and Weishi Li}, title = {Automatic laminectomy cutting plane planning based on artificial intelligence in robot assisted laminectomy surgery}, journal = {CoRR}, volume = {abs/2312.17266}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.17266}, doi = {10.48550/ARXIV.2312.17266}, eprinttype = {arXiv}, eprint = {2312.17266}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-17266.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShiSSHY23, author = {Danping Shi and Siwei Sun and Ling Song and Lei Hu and Qianqian Yang}, title = {Exploiting Non-Full Key Additions: Full-Fledged Automatic Demirci-Selcuk Meet-in-the-Middle Cryptanalysis of {SKINNY}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {255}, year = {2023}, url = {https://eprint.iacr.org/2023/255}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ShiSSHY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangSWH23, author = {Zhiyu Zhang and Siwei Sun and Caibing Wang and Lei Hu}, title = {Classical and Quantum Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {772}, year = {2023}, url = {https://eprint.iacr.org/2023/772}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangSWH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaoZHLW23, author = {Shuping Mao and Zhiyu Zhang and Lei Hu and Luying Li and Peng Wang}, title = {Quantum Security of {TNT}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1280}, year = {2023}, url = {https://eprint.iacr.org/2023/1280}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaoZHLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiXH23, author = {Zhiwei Li and Jun Xu and Lei Hu}, title = {Signal Leakage Attack Meets Depth First Search: an Improved Approach on {DXL} Key Exchange Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1709}, year = {2023}, url = {https://eprint.iacr.org/2023/1709}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LiXH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenGHSMW23, author = {Yuchao Chen and Tingting Guo and Lei Hu and Lina Shang and Shuping Mao and Peng Wang}, title = {Small Stretch Problem of the {DCT} Scheme and How to Fix it}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1808}, year = {2023}, url = {https://eprint.iacr.org/2023/1808}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChenGHSMW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aeog/ZhangFHTPLCY22, author = {Chenxiao Zhang and Yukang Feng and Lei Hu and Deodato Tapete and Li Pan and Zheheng Liang and Francesca Cigna and Peng Yue}, title = {A domain adaptation neural network for change detection with heterogeneous optical and {SAR} remote sensing images}, journal = {Int. J. Appl. Earth Obs. Geoinformation}, volume = {109}, pages = {102769}, year = {2022}, url = {https://doi.org/10.1016/j.jag.2022.102769}, doi = {10.1016/J.JAG.2022.102769}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aeog/ZhangFHTPLCY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cgf/YeLHX22, author = {Yongjing Ye and Libin Liu and Lei Hu and Shihong Xia}, title = {Neural3Points: Learning to Generate Physically Realistic Full-body Motion for Virtual Reality Users}, journal = {Comput. Graph. Forum}, volume = {41}, number = {8}, pages = {183--194}, year = {2022}, url = {https://doi.org/10.1111/cgf.14634}, doi = {10.1111/CGF.14634}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cgf/YeLHX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/WeiSWGH22, author = {Man Wei and Siwei Sun and Zihao Wei and Zheng Gong and Lei Hu}, title = {A small first-order {DPA} resistant {AES} implementation with no fresh randomness}, journal = {Sci. China Inf. Sci.}, volume = {65}, number = {6}, pages = {1--3}, year = {2022}, url = {https://doi.org/10.1007/s11432-019-1469-7}, doi = {10.1007/S11432-019-1469-7}, timestamp = {Tue, 11 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/WeiSWGH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/WangZH22, author = {Xiaoqiang Wang and Dabin Zheng and Lei Hu}, title = {Several classes of PcN power functions over finite fields}, journal = {Discret. Appl. Math.}, volume = {322}, pages = {171--182}, year = {2022}, url = {https://doi.org/10.1016/j.dam.2022.08.022}, doi = {10.1016/J.DAM.2022.08.022}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dam/WangZH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gis/GaoYCZSJHFL22, author = {Fan Gao and Peng Yue and Zhipeng Cao and Shuaifeng Zhao and Boyi Shangguan and Liangcun Jiang and Lei Hu and Zhe Fang and Zheheng Liang}, title = {A multi-source spatio-temporal data cube for large-scale geospatial analysis}, journal = {Int. J. Geogr. Inf. Sci.}, volume = {36}, number = {9}, pages = {1853--1884}, year = {2022}, url = {https://doi.org/10.1080/13658816.2022.2087222}, doi = {10.1080/13658816.2022.2087222}, timestamp = {Tue, 06 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/gis/GaoYCZSJHFL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gis/YueSHJZCP22, author = {Peng Yue and Boyi Shangguan and Lei Hu and Liangcun Jiang and Chenxiao Zhang and Zhipeng Cao and Yinyin Pan}, title = {Towards a training data model for artificial intelligence in earth observation}, journal = {Int. J. Geogr. Inf. Sci.}, volume = {36}, number = {11}, pages = {2113--2137}, year = {2022}, url = {https://doi.org/10.1080/13658816.2022.2087223}, doi = {10.1080/13658816.2022.2087223}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/gis/YueSHJZCP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceee/ChenHZCZL22, author = {Yan Chen and Lei Hu and Yong Zheng and Zhanhao Cao and Zhiyang Zhou and Hui Lan}, title = {Nonlinear dynamic behavior analysis of photovoltaic quasi Z-source inverter}, journal = {{IEICE} Electron. Express}, volume = {19}, number = {18}, pages = {20220255}, year = {2022}, url = {https://doi.org/10.1587/elex.19.20220255}, doi = {10.1587/ELEX.19.20220255}, timestamp = {Wed, 15 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieiceee/ChenHZCZL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/ZhongHX22, author = {Chongyang Zhong and Lei Hu and Shihong Xia}, title = {Spatial-temporal modeling for prediction of stylized human motion}, journal = {Neurocomputing}, volume = {511}, pages = {34--42}, year = {2022}, url = {https://doi.org/10.1016/j.neucom.2022.08.075}, doi = {10.1016/J.NEUCOM.2022.08.075}, timestamp = {Wed, 12 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijon/ZhongHX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/remotesensing/HuFZJY22, author = {Lei Hu and Zhe Fang and Mingda Zhang and Liangcun Jiang and Peng Yue}, title = {Facilitating Typhoon-Triggered Flood Disaster-Ready Information Delivery Using {SDI} Services Approach - {A} Case Study in Hainan}, journal = {Remote. Sens.}, volume = {14}, number = {8}, pages = {1832}, year = {2022}, url = {https://doi.org/10.3390/rs14081832}, doi = {10.3390/RS14081832}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/remotesensing/HuFZJY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/remotesensing/WangYZSSLHQX22, author = {Shu Wang and Xinrong Yan and Yunqiang Zhu and Jia Song and Kai Sun and Weirong Li and Lei Hu and Yanmin Qi and Huiyao Xu}, title = {New Era for Geo-Parsing to Obtain Actual Locations: {A} Novel Toponym Correction Method Based on Remote Sensing Images}, journal = {Remote. Sens.}, volume = {14}, number = {19}, pages = {4725}, year = {2022}, url = {https://doi.org/10.3390/rs14194725}, doi = {10.3390/RS14194725}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/remotesensing/WangYZSSLHQX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/remotesensing/LingHCCY22, author = {Jie Ling and Lei Hu and Lang Cheng and Minghui Chen and Xin Yang}, title = {IRA-MRSNet: {A} Network Model for Change Detection in High-Resolution Remote Sensing Images}, journal = {Remote. Sens.}, volume = {14}, number = {21}, pages = {5598}, year = {2022}, url = {https://doi.org/10.3390/rs14215598}, doi = {10.3390/RS14215598}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/remotesensing/LingHCCY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/HuWCHJ22, author = {Lei Hu and Ligui Wang and Yanlu Chen and Niaoqing Hu and Yu Jiang}, title = {Bearing Fault Diagnosis Using Piecewise Aggregate Approximation and Complete Ensemble Empirical Mode Decomposition with Adaptive Noise}, journal = {Sensors}, volume = {22}, number = {17}, pages = {6599}, year = {2022}, url = {https://doi.org/10.3390/s22176599}, doi = {10.3390/S22176599}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/HuWCHJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/staeors/HuNRDZZL22, author = {Lei Hu and Chuang Niu and Shenghan Ren and Minghao Dong and Changli Zheng and Wei Zhang and Jimin Liang}, title = {Discriminative Context-Aware Network for Target Extraction in Remote Sensing Imagery}, journal = {{IEEE} J. Sel. Top. Appl. Earth Obs. Remote. Sens.}, volume = {15}, pages = {700--715}, year = {2022}, url = {https://doi.org/10.1109/JSTARS.2021.3138187}, doi = {10.1109/JSTARS.2021.3138187}, timestamp = {Mon, 16 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/staeors/HuNRDZZL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/XuSH22, author = {Jun Xu and Santanu Sarkar and Lei Hu}, title = {Revisiting orthogonal lattice attacks on approximate common divisor problems}, journal = {Theor. Comput. Sci.}, volume = {911}, pages = {55--69}, year = {2022}, url = {https://doi.org/10.1016/j.tcs.2022.02.005}, doi = {10.1016/J.TCS.2022.02.005}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/XuSH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/SunHHTD22, author = {Dengdi Sun and Jiale Huang and Lei Hu and Jin Tang and Zhuanlian Ding}, title = {Multitask Multigranularity Aggregation With Global-Guided Attention for Video Person Re-Identification}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {32}, number = {11}, pages = {7758--7771}, year = {2022}, url = {https://doi.org/10.1109/TCSVT.2022.3183011}, doi = {10.1109/TCSVT.2022.3183011}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcsv/SunHHTD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tgrs/JiangHZY22, author = {Yu Jiang and Lei Hu and Yongmei Zhang and Xin Yang}, title = {WRICNet: {A} Weighted Rich-Scale Inception Coder Network for Remote Sensing Image Change Detection}, journal = {{IEEE} Trans. Geosci. Remote. Sens.}, volume = {60}, pages = {1--13}, year = {2022}, url = {https://doi.org/10.1109/tgrs.2022.3145652}, doi = {10.1109/TGRS.2022.3145652}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tgrs/JiangHZY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/HuaDSZHW22, author = {Jialiang Hua and Xiaoyang Dong and Siwei Sun and Zhiyu Zhang and Lei Hu and Xiaoyun Wang}, title = {Improved {MITM} Cryptanalysis on Streebog}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {2}, pages = {63--91}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i2.63-91}, doi = {10.46586/TOSC.V2022.I2.63-91}, timestamp = {Thu, 30 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/HuaDSZHW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/YangSSSH22, author = {Qianqian Yang and Ling Song and Siwei Sun and Danping Shi and Lei Hu}, title = {New Properties of the Double Boomerang Connectivity Table}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {4}, pages = {208--242}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i4.208-242}, doi = {10.46586/TOSC.V2022.I4.208-242}, timestamp = {Tue, 10 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/YangSSSH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wc/LiHSEZPH22, author = {Guyue Li and Lei Hu and Paul Staat and Harald Elders{-}Boll and Christian T. Zenger and Christof Paar and Aiqun Hu}, title = {Reconfigurable Intelligent Surface for Physical Layer Key Generation: Constructive or Destructive?}, journal = {{IEEE} Wirel. Commun.}, volume = {29}, number = {4}, pages = {146--153}, year = {2022}, url = {https://doi.org/10.1109/MWC.007.2100545}, doi = {10.1109/MWC.007.2100545}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wc/LiHSEZPH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/SongZYSZHW22, author = {Ling Song and Nana Zhang and Qianqian Yang and Danping Shi and Jiahao Zhao and Lei Hu and Jian Weng}, editor = {Shweta Agrawal and Dongdai Lin}, title = {Optimizing Rectangle Attacks: {A} Unified and Generic Framework for Key Recovery}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13791}, pages = {410--440}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22963-3\_14}, doi = {10.1007/978-3-031-22963-3\_14}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/SongZYSZHW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/XuSWH22, author = {Jun Xu and Santanu Sarkar and Huaxiong Wang and Lei Hu}, editor = {Shweta Agrawal and Dongdai Lin}, title = {Improving Bounds on Elliptic Curve Hidden Number Problem for {ECDH} Key Exchange}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13793}, pages = {771--799}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22969-5\_26}, doi = {10.1007/978-3-031-22969-5\_26}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/XuSWH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cikm/BiZZHZN0W22, author = {Xin Bi and Shining Zhang and Yu Zhang and Lei Hu and Wei Zhang and Wenjing Niu and Ye Yuan and Guoren Wang}, editor = {Mohammad Al Hasan and Li Xiong}, title = {CASA-Net: {A} Context-Aware Correlation Convolutional Network for Scale-Adaptive Crack Detection}, booktitle = {Proceedings of the 31st {ACM} International Conference on Information {\&} Knowledge Management, Atlanta, GA, USA, October 17-21, 2022}, pages = {67--76}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3511808.3557252}, doi = {10.1145/3511808.3557252}, timestamp = {Wed, 19 Oct 2022 12:52:00 +0200}, biburl = {https://dblp.org/rec/conf/cikm/BiZZHZN0W22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cinc/HuCLL22, author = {Lei Hu and Wenjie Cai and Xinyue Li and Jia Li}, title = {Detection of Murmurs from Heart Sound Recordings with Deep Residual Networks}, booktitle = {Computing in Cardiology, CinC 2022, Tampere, Finland, September 4-7, 2022}, pages = {1--4}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.22489/CinC.2022.047}, doi = {10.22489/CINC.2022.047}, timestamp = {Tue, 18 Apr 2023 21:53:00 +0200}, biburl = {https://dblp.org/rec/conf/cinc/HuCLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/GaoXH22, author = {Jing Gao and Jun Xu and Lei Hu}, editor = {Yi Deng and Moti Yung}, title = {Inferring Sequences Produced by the Quadratic Generator}, booktitle = {Information Security and Cryptology - 18th International Conference, Inscrypt 2022, Beijing, China, December 11-13, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13837}, pages = {483--494}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-26553-2\_26}, doi = {10.1007/978-3-031-26553-2\_26}, timestamp = {Fri, 10 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/GaoXH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/ZhongHZYX22, author = {Chongyang Zhong and Lei Hu and Zihao Zhang and Yongjing Ye and Shihong Xia}, title = {Spatio-Temporal Gating-Adjacency {GCN} for Human Motion Prediction}, booktitle = {{IEEE/CVF} Conference on Computer Vision and Pattern Recognition, {CVPR} 2022, New Orleans, LA, USA, June 18-24, 2022}, pages = {6437--6446}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CVPR52688.2022.00634}, doi = {10.1109/CVPR52688.2022.00634}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cvpr/ZhongHZYX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eccv/ZhongHZX22, author = {Chongyang Zhong and Lei Hu and Zihao Zhang and Shihong Xia}, editor = {Shai Avidan and Gabriel J. Brostow and Moustapha Ciss{\'{e}} and Giovanni Maria Farinella and Tal Hassner}, title = {Learning Uncoupled-Modulation {CVAE} for 3D Action-Conditioned Human Motion Synthesis}, booktitle = {Computer Vision - {ECCV} 2022 - 17th European Conference, Tel Aviv, Israel, October 23-27, 2022, Proceedings, Part {XXI}}, series = {Lecture Notes in Computer Science}, volume = {13681}, pages = {716--732}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-19803-8\_42}, doi = {10.1007/978-3-031-19803-8\_42}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eccv/ZhongHZX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/HuLQNH22, author = {Lei Hu and Guyue Li and Xuewen Qian and Derrick Wing Kwan Ng and Aiqun Hu}, title = {Joint Transmit and Reflective Beamforming for RIS-assisted Secret Key Generation}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2022, Rio de Janeiro, Brazil, December 4-8, 2022}, pages = {2352--2357}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/GLOBECOM48099.2022.10001434}, doi = {10.1109/GLOBECOM48099.2022.10001434}, timestamp = {Tue, 17 Jan 2023 08:56:31 +0100}, biburl = {https://dblp.org/rec/conf/globecom/HuLQNH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icait/ZhangZPWLHW22, author = {Jin Zhang and Depei Zhang and Xiaoniu Peng and Anle Wang and Xiaotong Liu and Lei Hu and Yalan Wang}, title = {A High Dynamic Range Phase Modulated Analog Photonic Link Based on {IMD3} and {IMD5} Suppression}, booktitle = {14th {IEEE} International Conference on Advanced Infocomm Technology, {ICAIT} 2022, Chongqing, China, July 8-11, 2022}, pages = {99--102}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICAIT56197.2022.9862668}, doi = {10.1109/ICAIT56197.2022.9862668}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icait/ZhangZPWLHW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/GaoXWH22, author = {Jing Gao and Jun Xu and Tianyu Wang and Lei Hu}, editor = {Cristina Alcaraz and Liqun Chen and Shujun Li and Pierangela Samarati}, title = {New Results of Breaking the {CLS} Scheme from {ACM-CCS} 2014}, booktitle = {Information and Communications Security - 24th International Conference, {ICICS} 2022, Canterbury, UK, September 5-8, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13407}, pages = {37--54}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15777-6\_3}, doi = {10.1007/978-3-031-15777-6\_3}, timestamp = {Fri, 10 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/GaoXWH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/GuoWHY22, author = {Tingting Guo and Peng Wang and Lei Hu and Dingfeng Ye}, editor = {Takanori Isobe and Santanu Sarkar}, title = {Quantum Attacks on PRFs Based on Public Random Permutations}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2022 - 23rd International Conference on Cryptology in India, Kolkata, India, December 11-14, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13774}, pages = {566--591}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22912-1\_25}, doi = {10.1007/978-3-031-22912-1\_25}, timestamp = {Mon, 09 Jan 2023 17:58:33 +0100}, biburl = {https://dblp.org/rec/conf/indocrypt/GuoWHY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/MaoGWH22, author = {Shuping Mao and Tingting Guo and Peng Wang and Lei Hu}, editor = {Jung Hee Cheon and Thomas Johansson}, title = {Quantum Attacks on Lai-Massey Structure}, booktitle = {Post-Quantum Cryptography - 13th International Workshop, PQCrypto 2022, Virtual Event, September 28-30, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13512}, pages = {205--229}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17234-2\_11}, doi = {10.1007/978-3-031-17234-2\_11}, timestamp = {Sun, 12 Nov 2023 02:15:49 +0100}, biburl = {https://dblp.org/rec/conf/pqcrypto/MaoGWH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangHGH22, author = {Mengfan Wang and Guifang Huang and Hongmin Gao and Lei Hu}, title = {Improved Zero-Knowledge Proofs for Commitments from Learning Parity with Noise}, booktitle = {{IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022}, pages = {415--421}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00064}, doi = {10.1109/TRUSTCOM56396.2022.00064}, timestamp = {Mon, 27 Mar 2023 16:44:39 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangHGH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/HouLDHH22, author = {Yujie Hou and Guyue Li and Shuping Dang and Lei Hu and Aiqun Hu}, title = {Physical Layer Encryption Scheme Based on Dynamic Constellation Rotation}, booktitle = {96th Vehicular Technology Conference, {VTC} Fall 2022, London, United Kingdom, September 26-29, 2022}, pages = {1--5}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/VTC2022-Fall57202.2022.10012740}, doi = {10.1109/VTC2022-FALL57202.2022.10012740}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vtc/HouLDHH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-01474, author = {Chongyang Zhong and Lei Hu and Zihao Zhang and Yongjing Ye and Shihong Xia}, title = {Spatial-Temporal Gating-Adjacency {GCN} for Human Motion Prediction}, journal = {CoRR}, volume = {abs/2203.01474}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.01474}, doi = {10.48550/ARXIV.2203.01474}, eprinttype = {arXiv}, eprint = {2203.01474}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-01474.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2207-11752, author = {Lei Hu and Guyue Li and Xuewen Qian and Derrick Wing Kwan Ng and Aiqun Hu}, title = {Joint Transmit and Reflective Beamforming for RIS-assisted Secret Key Generation}, journal = {CoRR}, volume = {abs/2207.11752}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2207.11752}, doi = {10.48550/ARXIV.2207.11752}, eprinttype = {arXiv}, eprint = {2207.11752}, timestamp = {Mon, 01 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2207-11752.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2209-05753, author = {Yongjing Ye and Libin Liu and Lei Hu and Shihong Xia}, title = {Neural3Points: Learning to Generate Physically Realistic Full-body Motion for Virtual Reality Users}, journal = {CoRR}, volume = {abs/2209.05753}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2209.05753}, doi = {10.48550/ARXIV.2209.05753}, eprinttype = {arXiv}, eprint = {2209.05753}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2209-05753.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-03132, author = {Lei Hu and Guyue Li and Xuewen Qian and Aiqun Hu and Derrick Wing Kwan Ng}, title = {Reconfigurable Intelligent Surface-Assisted Secret Key Generation in Spatially Correlated Channels}, journal = {CoRR}, volume = {abs/2211.03132}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.03132}, doi = {10.48550/ARXIV.2211.03132}, eprinttype = {arXiv}, eprint = {2211.03132}, timestamp = {Wed, 09 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-03132.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YeXHH22, author = {Dingfeng Ye and Jun Xu and Guifang Huang and Lei Hu}, title = {Lattice Signature can be as Simple as Lattice Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {97}, year = {2022}, url = {https://eprint.iacr.org/2022/097}, timestamp = {Fri, 10 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/YeXHH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoWHY22, author = {Tingting Guo and Peng Wang and Lei Hu and Dingfeng Ye}, title = {Quantum Attacks on PRFs Based on Public Random Permutations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {442}, year = {2022}, url = {https://eprint.iacr.org/2022/442}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuoWHY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuaDSZHW22, author = {Jialiang Hua and Xiaoyang Dong and Siwei Sun and Zhiyu Zhang and Lei Hu and Xiaoyun Wang}, title = {Improved {MITM} Cryptanalysis on Streebog}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {568}, year = {2022}, url = {https://eprint.iacr.org/2022/568}, timestamp = {Mon, 16 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuaDSZHW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SongZYSZHW22, author = {Ling Song and Nana Zhang and Qianqian Yang and Danping Shi and Jiahao Zhao and Lei Hu and Jian Weng}, title = {Optimizing Rectangle Attacks: {A} Unified and Generic Framework for Key Recovery}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {723}, year = {2022}, url = {https://eprint.iacr.org/2022/723}, timestamp = {Mon, 20 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SongZYSZHW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaoG0H22, author = {Shuping Mao and Tingting Guo and Peng Wang and Lei Hu}, title = {Quantum Attacks on Lai-Massey Structure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {986}, year = {2022}, url = {https://eprint.iacr.org/2022/986}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaoG0H22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/00220WH22, author = {Jun Xu and Santanu Sarkar and Huaxiong Wang and Lei Hu}, title = {Improving Bounds on Elliptic Curve Hidden Number Problem for {ECDH} Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1239}, year = {2022}, url = {https://eprint.iacr.org/2022/1239}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/00220WH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SunLGHJHZY22, author = {Siwei Sun and Tianyu Liu and Zhi Guan and Yifei He and Jiwu Jing and Lei Hu and Zhenfeng Zhang and Hailun Yan}, title = {{LMS-SM3} and {HSS-SM3:} Instantiating Hash-based Post-Quantum Signature Schemes with {SM3}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1491}, year = {2022}, url = {https://eprint.iacr.org/2022/1491}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SunLGHJHZY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SunLGHJHZY22a, author = {Siwei Sun and Tianyu Liu and Zhi Guan and Yifei He and Jiwu Jing and Lei Hu and Zhenfeng Zhang and Hailun Yan}, title = {{XMSS-SM3} and {MT-XMSS-SM3:} Instantiating Extended Merkle Signature Schemes with {SM3}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1552}, year = {2022}, url = {https://eprint.iacr.org/2022/1552}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SunLGHJHZY22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YangSSSH22, author = {Qianqian Yang and Ling Song and Siwei Sun and Danping Shi and Lei Hu}, title = {New Properties of Double Boomerang Connectivity Table}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1579}, year = {2022}, url = {https://eprint.iacr.org/2022/1579}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/YangSSSH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/DaiYHMWLZYHZW21, author = {Shaotao Dai and Xufeng Yan and Zhiyong Hong and Tao Ma and Rui Wu and Zhongyu Li and Zhibin Zeng and Ping Yang and Lei Hu and Teng Zhang and Bangzhu Wang}, title = {Development and Test of One Commercial Megawatt Superconducting {DC} Induction Heater With Extra High Energy Efficiency}, journal = {{IEEE} Access}, volume = {9}, pages = {3301--3314}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2020.3047685}, doi = {10.1109/ACCESS.2020.3047685}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/DaiYHMWLZYHZW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/QuGCZYHZ21, author = {Hao Qu and Baoduo Geng and Bingrong Chen and Jian Zhang and Yongliang Yang and Lei Hu and Yu Zhao}, title = {Force Perception and Bone Recognition of Vertebral Lamina Milling by Robot-Assisted Ultrasonic Bone Scalpel Based on Backpropagation Neural Network}, journal = {{IEEE} Access}, volume = {9}, pages = {52101--52112}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3069549}, doi = {10.1109/ACCESS.2021.3069549}, timestamp = {Tue, 25 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/QuGCZYHZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhengLHZ21, author = {Gongliang Zheng and Jingtao Lei and Lei Hu and Lihai Zhang}, title = {Fuzzy Adaptive Sliding Mode Impedance Control of Fracture Reduction Robot}, journal = {{IEEE} Access}, volume = {9}, pages = {113653--113665}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3099692}, doi = {10.1109/ACCESS.2021.3099692}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZhengLHZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aeog/ZhaoHDHWZ21, author = {Jinling Zhao and Lei Hu and Yingying Dong and Linsheng Huang and Shizhuang Weng and Dongyan Zhang}, title = {A combination method of stacked autoencoder and 3D deep residual network for hyperspectral image classification}, journal = {Int. J. Appl. Earth Obs. Geoinformation}, volume = {102}, pages = {102459}, year = {2021}, url = {https://doi.org/10.1016/j.jag.2021.102459}, doi = {10.1016/J.JAG.2021.102459}, timestamp = {Thu, 17 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aeog/ZhaoHDHWZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/asc/SunYH21, author = {Maohua Sun and Ruidi Yang and Lei Hu}, title = {A secure distributed machine learning protocol against static semi-honest adversaries}, journal = {Appl. Soft Comput.}, volume = {102}, pages = {107095}, year = {2021}, url = {https://doi.org/10.1016/j.asoc.2021.107095}, doi = {10.1016/J.ASOC.2021.107095}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/asc/SunYH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/axioms/HuHZ21, author = {Lei Hu and Yaozhen Han and Shuqin Zhang}, title = {On the Existence of Coupled Fractional Jerk Equations with Multi-Point Boundary Conditions}, journal = {Axioms}, volume = {10}, number = {2}, pages = {103}, year = {2021}, url = {https://doi.org/10.3390/axioms10020103}, doi = {10.3390/AXIOMS10020103}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/axioms/HuHZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/WeiSWH21, author = {Man Wei and Siwei Sun and Zihao Wei and Lei Hu}, title = {Unbalanced sharing: a threshold implementation of {SM4}}, journal = {Sci. China Inf. Sci.}, volume = {64}, number = {5}, year = {2021}, url = {https://doi.org/10.1007/s11432-018-9794-6}, doi = {10.1007/S11432-018-9794-6}, timestamp = {Mon, 06 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/WeiSWH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhaH21, author = {Zhengbang Zha and Lei Hu}, title = {Some classes of power functions with low c-differential uniformity over finite fields}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {6}, pages = {1193--1210}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00866-8}, doi = {10.1007/S10623-021-00866-8}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhaH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SongTSH21, author = {Ling Song and Yi Tu and Danping Shi and Lei Hu}, title = {Security analysis of Subterranean 2.0}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {8}, pages = {1875--1905}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00892-6}, doi = {10.1007/S10623-021-00892-6}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/SongTSH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ffa/ZhaHLC21, author = {Zhengbang Zha and Lei Hu and Yan Liu and Xiwang Cao}, title = {Further results on optimal ternary cyclic codes}, journal = {Finite Fields Their Appl.}, volume = {75}, pages = {101898}, year = {2021}, url = {https://doi.org/10.1016/j.ffa.2021.101898}, doi = {10.1016/J.FFA.2021.101898}, timestamp = {Fri, 27 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ffa/ZhaHLC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijgi/YanYHZJG21, author = {Zheren Yan and Can Yang and Lei Hu and Jing Zhao and Liangcun Jiang and Jianya Gong}, title = {The Integration of Linguistic and Geospatial Features Using Global Context Embedding for Automated Text Geocoding}, journal = {{ISPRS} Int. J. Geo Inf.}, volume = {10}, number = {9}, pages = {572}, year = {2021}, url = {https://doi.org/10.3390/ijgi10090572}, doi = {10.3390/IJGI10090572}, timestamp = {Mon, 18 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijgi/YanYHZJG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijgi/HuXBP21, author = {Lei Hu and Jun Xu and Chao Bao and Tao Pei}, title = {Influential Factor Detection for Tourism on the Qinghai-Tibet Plateau Based on Social Media Data}, journal = {{ISPRS} Int. J. Geo Inf.}, volume = {10}, number = {9}, pages = {579}, year = {2021}, url = {https://doi.org/10.3390/ijgi10090579}, doi = {10.3390/IJGI10090579}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijgi/HuXBP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijgi/XuH21, author = {Jun Xu and Lei Hu}, title = {Geospatial Semantics Analysis of the Qinghai-Tibetan Plateau Based on Microblog Short Texts}, journal = {{ISPRS} Int. J. Geo Inf.}, volume = {10}, number = {10}, pages = {682}, year = {2021}, url = {https://doi.org/10.3390/ijgi10100682}, doi = {10.3390/IJGI10100682}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijgi/XuH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijim/HuP21, author = {Lei Hu and Manoch Prompanyo}, title = {The Influence of Sports Activities on College Students' Social Adaptability}, journal = {Int. J. Interact. Mob. Technol.}, volume = {15}, number = {14}, pages = {204}, year = {2021}, url = {https://doi.org/10.3991/ijim.v15i14.24801}, doi = {10.3991/IJIM.V15I14.24801}, timestamp = {Tue, 09 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijim/HuP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mis/HuX21, author = {Lei Hu and Xianling Xia}, title = {5G-Oriented IoT Big Data Analysis Method System}, journal = {Mob. Inf. Syst.}, volume = {2021}, pages = {3186696:1--3186696:9}, year = {2021}, url = {https://doi.org/10.1155/2021/3186696}, doi = {10.1155/2021/3186696}, timestamp = {Wed, 06 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mis/HuX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/remotesensing/YangHZL21, author = {Xin Yang and Lei Hu and Yongmei Zhang and Yunqing Li}, title = {MRA-SNet: Siamese Networks of Multiscale Residual and Attention for Change Detection in High-Resolution Remote Sensing Images}, journal = {Remote. Sens.}, volume = {13}, number = {22}, pages = {4528}, year = {2021}, url = {https://doi.org/10.3390/rs13224528}, doi = {10.3390/RS13224528}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/remotesensing/YangHZL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/remotesensing/ZhangDZPHHHFC21, author = {Yahao Zhang and Yuanyong Dian and Jingjing Zhou and Shoulian Peng and Yue Hu and Lei Hu and Zemin Han and Xinwei Fang and Hongxia Cui}, title = {Characterizing Spatial Patterns of Pine Wood Nematode Outbreaks in Subtropical Zone in China}, journal = {Remote. Sens.}, volume = {13}, number = {22}, pages = {4682}, year = {2021}, url = {https://doi.org/10.3390/rs13224682}, doi = {10.3390/RS13224682}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/remotesensing/ZhangDZPHHHFC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/remotesensing/ZhaoHDH21, author = {Jinling Zhao and Lei Hu and Yingying Dong and Linsheng Huang}, title = {Hybrid Dense Network with Dual Attention for Hyperspectral Image Classification}, journal = {Remote. Sens.}, volume = {13}, number = {23}, pages = {4921}, year = {2021}, url = {https://doi.org/10.3390/rs13234921}, doi = {10.3390/RS13234921}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/remotesensing/ZhaoHDH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/ZhaoHZF21, author = {Tianliu Zhao and Lei Hu and Yongmei Zhang and Jianying Fang}, title = {Super-Resolution Network with Information Distillation and Multi-Scale Attention for Medical {CT} Image}, journal = {Sensors}, volume = {21}, number = {20}, pages = {6870}, year = {2021}, url = {https://doi.org/10.3390/s21206870}, doi = {10.3390/S21206870}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/ZhaoHZF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/agro-geoinformatics/FangHHT21, author = {Zhe Fang and Lianlian He and Lei Hu and Tianyu Tuo}, title = {Developing Geospatial Web Services for Automatic Flood Mapping using Sentinel-1 Images}, booktitle = {9th International Conference on Agro-Geoinformatics, Agro-Geoinformatics 2021, Shenzhen, China, July 26-29, 2021}, pages = {1--5}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/Agro-Geoinformatics50104.2021.9530305}, doi = {10.1109/AGRO-GEOINFORMATICS50104.2021.9530305}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/agro-geoinformatics/FangHHT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/QinCZPHD21, author = {Yue Qin and Chi Cheng and Xiaohan Zhang and Yanbin Pan and Lei Hu and Jintai Ding}, editor = {Mehdi Tibouchi and Huaxiong Wang}, title = {A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based {NIST} Candidate KEMs}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13093}, pages = {92--121}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92068-5\_4}, doi = {10.1007/978-3-030-92068-5\_4}, timestamp = {Fri, 03 Dec 2021 17:36:41 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/QinCZPHD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DongZSWWH21, author = {Xiaoyang Dong and Zhiyu Zhang and Siwei Sun and Congming Wei and Xiaoyun Wang and Lei Hu}, editor = {Mehdi Tibouchi and Huaxiong Wang}, title = {Automatic Classical and Quantum Rebound Attacks on AES-Like Hashing by Exploiting Related-Key Differentials}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13090}, pages = {241--271}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92062-3\_9}, doi = {10.1007/978-3-030-92062-3\_9}, timestamp = {Mon, 28 Aug 2023 21:17:52 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/DongZSWWH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DongHSLWH21, author = {Xiaoyang Dong and Jialiang Hua and Siwei Sun and Zheng Li and Xiaoyun Wang and Lei Hu}, editor = {Tal Malkin and Chris Peikert}, title = {Meet-in-the-Middle Attacks Revisited: Key-Recovery, Collision, and Preimage Attacks}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12827}, pages = {278--308}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84252-9\_10}, doi = {10.1007/978-3-030-84252-9\_10}, timestamp = {Fri, 03 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/DongHSLWH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccai/LiHDF21, author = {Jun Li and Lei Hu and Wenrui Dai and Bin Fan}, title = {Research on Intelligent Assignment Method of Radar Jamming Task in Electronic Air Defense Operation}, booktitle = {{ICCAI} '21: 2021 7th International Conference on Computing and Artificial Intelligence, Tianjin China, April 23 - 26, 2021}, pages = {483--486}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3467707.3467780}, doi = {10.1145/3467707.3467780}, timestamp = {Tue, 28 Sep 2021 15:20:57 +0200}, biburl = {https://dblp.org/rec/conf/iccai/LiHDF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/ZhangH0X21, author = {Zihao Zhang and Lei Hu and Xiaoming Deng and Shihong Xia}, editor = {Zhi{-}Hua Zhou}, title = {Sequential 3D Human Pose Estimation Using Adaptive Point Cloud Sampling Strategy}, booktitle = {Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, {IJCAI} 2021, Virtual Event / Montreal, Canada, 19-27 August 2021}, pages = {1330--1337}, publisher = {ijcai.org}, year = {2021}, url = {https://doi.org/10.24963/ijcai.2021/184}, doi = {10.24963/IJCAI.2021/184}, timestamp = {Wed, 25 Aug 2021 17:11:16 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/ZhangH0X21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ZhangLQZSH21, author = {Yingjie Zhang and Lijun Lyu and Kexin Qiao and Zhiyu Zhang and Siwei Sun and Lei Hu}, editor = {Robert H. Deng and Feng Bao and Guilin Wang and Jian Shen and Mark Ryan and Weizhi Meng and Ding Wang}, title = {Automatic Key Recovery of Feistel Ciphers: Application to {SIMON} and {SIMECK}}, booktitle = {Information Security Practice and Experience: 16th International Conference, {ISPEC} 2021, Nanjing, China, December 17-19, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13107}, pages = {147--167}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-93206-0\_10}, doi = {10.1007/978-3-030-93206-0\_10}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/ZhangLQZSH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/WangLXHTZ21, author = {Tianyu Wang and Yuejun Liu and Jun Xu and Lei Hu and Yang Tao and Yongbin Zhou}, editor = {Joseph K. Liu and Sokratis K. Katsikas and Weizhi Meng and Willy Susilo and Rolly Intan}, title = {Integer {LWE} with Non-subgaussian Error and Related Attacks}, booktitle = {Information Security - 24th International Conference, {ISC} 2021, Virtual Event, November 10-12, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13118}, pages = {3--25}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-91356-4\_1}, doi = {10.1007/978-3-030-91356-4\_1}, timestamp = {Fri, 10 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/WangLXHTZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mm/HuHWLN21, author = {Lei Hu and Shaoli Huang and Shilei Wang and Wei Liu and Jifeng Ning}, editor = {Heng Tao Shen and Yueting Zhuang and John R. Smith and Yang Yang and Pablo C{\'{e}}sar and Florian Metze and Balakrishnan Prabhakaran}, title = {Do We Really Need Frame-by-Frame Annotation Datasets for Object Tracking?}, booktitle = {{MM} '21: {ACM} Multimedia Conference, Virtual Event, China, October 20 - 24, 2021}, pages = {4949--4957}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3474085.3475365}, doi = {10.1145/3474085.3475365}, timestamp = {Mon, 22 Apr 2024 21:24:20 +0200}, biburl = {https://dblp.org/rec/conf/mm/HuHWLN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/GuoWHY21, author = {Tingting Guo and Peng Wang and Lei Hu and Dingfeng Ye}, editor = {Jung Hee Cheon and Jean{-}Pierre Tillich}, title = {Attacks on Beyond-Birthday-Bound MACs in the Quantum Setting}, booktitle = {Post-Quantum Cryptography - 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20-22, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12841}, pages = {421--441}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-81293-5\_22}, doi = {10.1007/978-3-030-81293-5\_22}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/GuoWHY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smc/HuZGQTSY21, author = {Lei Hu and Dongsheng Zou and Xiwang Guo and Liang Qi and Ying Tang and Haohao Song and Jieying Yuan}, title = {Four-way Bidirectional Attention for Multiple-choice Reading Comprehension}, booktitle = {2021 {IEEE} International Conference on Systems, Man, and Cybernetics, {SMC} 2021, Melbourne, Australia, October 17-20, 2021}, pages = {238--243}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SMC52423.2021.9658632}, doi = {10.1109/SMC52423.2021.9658632}, timestamp = {Thu, 14 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/smc/HuZGQTSY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/HuLLH21, author = {Lei Hu and Guyue Li and Hongyi Luo and Aiqun Hu}, title = {On the {RIS} Manipulating Attack and Its Countermeasures in Physical-layer Key Generation}, booktitle = {94th {IEEE} Vehicular Technology Conference, {VTC} Fall 2021, Norman, OK, USA, September 27-30, 2021}, pages = {1--5}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/VTC2021-Fall52928.2021.9625442}, doi = {10.1109/VTC2021-FALL52928.2021.9625442}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vtc/HuLLH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/LuoLH21, author = {Hongyi Luo and Guyue Li and Lei Hu}, title = {On the Security of RIS-assisted Manipulating Attack in {MISO} systems}, booktitle = {94th {IEEE} Vehicular Technology Conference, {VTC} Fall 2021, Norman, OK, USA, September 27-30, 2021}, pages = {1--5}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/VTC2021-Fall52928.2021.9625272}, doi = {10.1109/VTC2021-FALL52928.2021.9625272}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vtc/LuoLH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-00511, author = {You Chen and Guyue Li and Cunhua Pan and Lei Hu and Aiqun Hu}, title = {Intelligent Reflecting Surface-Assisted Secret Key Generation In Multi-antenna Network}, journal = {CoRR}, volume = {abs/2105.00511}, year = {2021}, url = {https://arxiv.org/abs/2105.00511}, eprinttype = {arXiv}, eprint = {2105.00511}, timestamp = {Wed, 12 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-00511.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2108-05497, author = {Lei Hu and Guyue Li and Hongyi Luo and Aiqun Hu}, title = {On the {RIS} Manipulating Attack and Its Countermeasures in Physical-layer Key Generation}, journal = {CoRR}, volume = {abs/2108.05497}, year = {2021}, url = {https://arxiv.org/abs/2108.05497}, eprinttype = {arXiv}, eprint = {2108.05497}, timestamp = {Wed, 18 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2108-05497.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2108-07955, author = {Yu Jiang and Lei Hu and Yongmei Zhang and Xin Yang}, title = {WRICNet: {A} Weighted Rich-scale Inception Coder Network for Multi-Resolution Remote Sensing Image Change Detection}, journal = {CoRR}, volume = {abs/2108.07955}, year = {2021}, url = {https://arxiv.org/abs/2108.07955}, eprinttype = {arXiv}, eprint = {2108.07955}, timestamp = {Tue, 09 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2108-07955.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-08417, author = {Youyang Sha and Yonghong Zhang and Xuquan Ji and Lei Hu}, title = {Transformer-Unet: Raw Image Processing with Unet}, journal = {CoRR}, volume = {abs/2109.08417}, year = {2021}, url = {https://arxiv.org/abs/2109.08417}, eprinttype = {arXiv}, eprint = {2109.08417}, timestamp = {Wed, 22 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-08417.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2112-10043, author = {Guyue Li and Lei Hu and Paul Staat and Harald Elders{-}Boll and Christian T. Zenger and Christof Paar and Aiqun Hu}, title = {Reconfigurable Intelligent Surface for Physical Layer Key Generation: Constructive or Destructive?}, journal = {CoRR}, volume = {abs/2112.10043}, year = {2021}, url = {https://arxiv.org/abs/2112.10043}, eprinttype = {arXiv}, eprint = {2112.10043}, timestamp = {Tue, 04 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2112-10043.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/QinCZPHD21, author = {Yue Qin and Chi Cheng and Xiaohan Zhang and Yanbin Pan and Lei Hu and Jintai Ding}, title = {A Systematic Approach and Analysis of Key Mismatch Attacks on CPA-Secure Lattice-Based {NIST} Candidate KEMs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {123}, year = {2021}, url = {https://eprint.iacr.org/2021/123}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/QinCZPHD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuNSLH21, author = {Yunwen Liu and Zhongfeng Niu and Siwei Sun and Chao Li and Lei Hu}, title = {A Note on the Bias of Rotational Differential-Linear Distinguishers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {379}, year = {2021}, url = {https://eprint.iacr.org/2021/379}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuNSLH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DongHSLWH21, author = {Xiaoyang Dong and Jialiang Hua and Siwei Sun and Zheng Li and Xiaoyun Wang and Lei Hu}, title = {Meet-in-the-Middle Attacks Revisited: Focusing on Key-recovery and Collision Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {427}, year = {2021}, url = {https://eprint.iacr.org/2021/427}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DongHSLWH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DongZSW0H21, author = {Xiaoyang Dong and Zhiyu Zhang and Siwei Sun and Congming Wei and Xiaoyun Wang and Lei Hu}, title = {Automatic Classical and Quantum Rebound Attacks on AES-like Hashing by Exploiting Related-key Differentials}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1119}, year = {2021}, url = {https://eprint.iacr.org/2021/1119}, timestamp = {Mon, 06 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DongZSW0H21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/ZhangHHYLK20, author = {Lin Zhang and Lei Hu and Fei Hu and Zhijing Ye and Xin Li and Sunil Kumar}, title = {Enhanced {OLSR} routing for airborne networks with multi-beam directional antennas}, journal = {Ad Hoc Networks}, volume = {102}, pages = {102116}, year = {2020}, url = {https://doi.org/10.1016/j.adhoc.2020.102116}, doi = {10.1016/J.ADHOC.2020.102116}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/ZhangHHYLK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/XuHS20, author = {Jun Xu and Lei Hu and Santanu Sarkar}, title = {Cryptanalysis of elliptic curve hidden number problem from {PKC} 2017}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {2}, pages = {341--361}, year = {2020}, url = {https://doi.org/10.1007/s10623-019-00685-y}, doi = {10.1007/S10623-019-00685-Y}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/XuHS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ffa/ZhaH20, author = {Zhengbang Zha and Lei Hu}, title = {New classes of optimal ternary cyclic codes with minimum distance four}, journal = {Finite Fields Their Appl.}, volume = {64}, pages = {101671}, year = {2020}, url = {https://doi.org/10.1016/j.ffa.2020.101671}, doi = {10.1016/J.FFA.2020.101671}, timestamp = {Thu, 23 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ffa/ZhaH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nca/CaoHGWM20, author = {Weipeng Cao and Lei Hu and Jinzhu Gao and Xizhao Wang and Zhong Ming}, title = {A study on the relationship between the rank of input data and the performance of random weight neural network}, journal = {Neural Comput. Appl.}, volume = {32}, number = {16}, pages = {12685--12696}, year = {2020}, url = {https://doi.org/10.1007/s00521-020-04719-8}, doi = {10.1007/S00521-020-04719-8}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nca/CaoHGWM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/GuoSSSSHW20, author = {Hao Guo and Siwei Sun and Danping Shi and Ling Sun and Yao Sun and Lei Hu and Meiqin Wang}, title = {Differential Attacks on {CRAFT} Exploiting the Involutory S-boxes and Tweak Additions}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {3}, pages = {119--151}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.i3.119-151}, doi = {10.13154/TOSC.V2020.I3.119-151}, timestamp = {Mon, 05 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/GuoSSSSHW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvcg/ZhangHDX20, author = {Zihao Zhang and Lei Hu and Xiaoming Deng and Shihong Xia}, title = {Weakly Supervised Adversarial Learning for 3D Human Pose Estimation from Point Clouds}, journal = {{IEEE} Trans. Vis. Comput. Graph.}, volume = {26}, number = {5}, pages = {1851--1859}, year = {2020}, url = {https://doi.org/10.1109/TVCG.2020.2973076}, doi = {10.1109/TVCG.2020.2973076}, timestamp = {Sat, 30 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvcg/ZhangHDX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DongSSGWH20, author = {Xiaoyang Dong and Siwei Sun and Danping Shi and Fei Gao and Xiaoyun Wang and Lei Hu}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Quantum Collision Attacks on AES-Like Hashing with Low Quantum Random Access Memories}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12492}, pages = {727--757}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64834-3\_25}, doi = {10.1007/978-3-030-64834-3\_25}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/DongSSGWH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icann/SongZHY20, author = {Haohao Song and Dongsheng Zou and Lei Hu and Jieying Yuan}, editor = {Igor Farkas and Paolo Masulli and Stefan Wermter}, title = {Embedding Compression with Right Triangle Similarity Transformations}, booktitle = {Artificial Neural Networks and Machine Learning - {ICANN} 2020 - 29th International Conference on Artificial Neural Networks, Bratislava, Slovakia, September 15-18, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12397}, pages = {773--785}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-61616-8\_62}, doi = {10.1007/978-3-030-61616-8\_62}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icann/SongZHY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2008-12183, author = {Zhengbang Zha and Lei Hu}, title = {Some classes of power functions with low c-differential uniformity over finite fields}, journal = {CoRR}, volume = {abs/2008.12183}, year = {2020}, url = {https://arxiv.org/abs/2008.12183}, eprinttype = {arXiv}, eprint = {2008.12183}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2008-12183.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DongSSGWH20, author = {Xiaoyang Dong and Siwei Sun and Danping Shi and Fei Gao and Xiaoyun Wang and Lei Hu}, title = {Quantum Collision Attacks on AES-like Hashing with Low Quantum Random Access Memories}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1030}, year = {2020}, url = {https://eprint.iacr.org/2020/1030}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DongSSGWH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SongTSH20, author = {Ling Song and Yi Tu and Danping Shi and Lei Hu}, title = {Security Analysis of Subterranean 2.0}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1133}, year = {2020}, url = {https://eprint.iacr.org/2020/1133}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SongTSH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoSSSSHW20, author = {Hao Guo and Siwei Sun and Danping Shi and Ling Sun and Yao Sun and Lei Hu and Meiqin Wang}, title = {Differential Attacks on {CRAFT} Exploiting the Involutory S-boxes and Tweak Additions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1177}, year = {2020}, url = {https://eprint.iacr.org/2020/1177}, timestamp = {Fri, 30 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GuoSSSSHW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoWHY20, author = {Tingting Guo and Peng Wang and Lei Hu and Dingfeng Ye}, title = {Attack Beyond-Birthday-Bound MACs in Quantum Setting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1595}, year = {2020}, url = {https://eprint.iacr.org/2020/1595}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GuoWHY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/GuoWYHLW19, author = {Na Guo and Tianmiao Wang and Biao Yang and Lei Hu and Hongsheng Liu and Yuhan Wang}, title = {An Online Calibration Method for Microsoft HoloLens}, journal = {{IEEE} Access}, volume = {7}, pages = {101795--101803}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2930701}, doi = {10.1109/ACCESS.2019.2930701}, timestamp = {Wed, 21 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/GuoWYHLW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WangKGH19, author = {Pei Wang and Xianguang Kong and Zekun Guo and Lei Hu}, title = {Prediction of Axis Attitude Deviation and Deviation Correction Method Based on Data Driven During Shield Tunneling}, journal = {{IEEE} Access}, volume = {7}, pages = {163487--163501}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2952649}, doi = {10.1109/ACCESS.2019.2952649}, timestamp = {Thu, 28 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/WangKGH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amc/HuangGH19, author = {Qian{-}Min Huang and Yi{-}Tian Gao and Lei Hu}, title = {Bilinear forms, modulational instability and dark solitons for a fifth-order variable-coefficient nonlinear Schr{\"{o}}dinger equation in an inhomogeneous optical fiber}, journal = {Appl. Math. Comput.}, volume = {352}, pages = {270--278}, year = {2019}, url = {https://doi.org/10.1016/j.amc.2019.01.027}, doi = {10.1016/J.AMC.2019.01.027}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/amc/HuangGH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ffa/ZhaHZ19, author = {Zhengbang Zha and Lei Hu and Zhizheng Zhang}, title = {Permutation polynomials of the form x+{\(\gamma\)}Trqqn(h(x))}, journal = {Finite Fields Their Appl.}, volume = {60}, year = {2019}, url = {https://doi.org/10.1016/j.ffa.2019.101573}, doi = {10.1016/J.FFA.2019.101573}, timestamp = {Fri, 07 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ffa/ZhaHZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/YanSCWHWYW19, author = {Zhiqiang Yan and Bo Sun and Yu Chen and Lijie Wen and Lei Hu and Jianmin Wang and Mingji Yang and Lu Wang}, title = {Decomposed and parallel process discovery: {A} framework and application}, journal = {Future Gener. Comput. Syst.}, volume = {98}, pages = {392--405}, year = {2019}, url = {https://doi.org/10.1016/j.future.2019.03.048}, doi = {10.1016/J.FUTURE.2019.03.048}, timestamp = {Thu, 04 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/YanSCWHWYW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gandc/ZhangYCH19, author = {Xuequan Zhang and Peng Yue and Yumin Chen and Lei Hu}, title = {An efficient dynamic volume rendering for large-scale meteorological data in a virtual globe}, journal = {Comput. Geosci.}, volume = {126}, pages = {1--8}, year = {2019}, url = {https://doi.org/10.1016/j.cageo.2019.01.018}, doi = {10.1016/J.CAGEO.2019.01.018}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gandc/ZhangYCH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/WangHLTZZLG19, author = {Jun Wang and Lei Hu and Ning Li and Chang Tian and Zhaofeng Zhang and Mingyong Zeng and Zhangkai Luo and Huaping Guan}, title = {Co-Saliency Detection via Local Prediction and Global Refinement}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {102-A}, number = {4}, pages = {654--664}, year = {2019}, url = {https://doi.org/10.1587/transfun.E102.A.654}, doi = {10.1587/TRANSFUN.E102.A.654}, timestamp = {Mon, 18 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/WangHLTZZLG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/information/YuanLLHW19, author = {Xinpan Yuan and Qunfeng Liu and Jun Long and Lei Hu and Yulou Wang}, title = {Deep Image Similarity Measurement Based on the Improved Triplet Network with Spatial Pyramid Pooling}, journal = {Inf.}, volume = {10}, number = {4}, pages = {129}, year = {2019}, url = {https://doi.org/10.3390/info10040129}, doi = {10.3390/INFO10040129}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/information/YuanLLHW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/information/YuanLLHW19a, author = {Xinpan Yuan and Qunfeng Liu and Jun Long and Lei Hu and Songlin Wang}, title = {Multi-PQTable for Approximate Nearest-Neighbor Search}, journal = {Inf.}, volume = {10}, number = {6}, pages = {190}, year = {2019}, url = {https://doi.org/10.3390/info10060190}, doi = {10.3390/INFO10060190}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/information/YuanLLHW19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsjkx/ZhangLHD19, author = {Zhao Zhang and Hailong Li and Lei Hu and Siqi Dong}, title = {{\unicode{22522}}{\unicode{20110}}SDN-SFC{\unicode{30340}}{\unicode{26381}}{\unicode{21153}}{\unicode{21151}}{\unicode{33021}}{\unicode{36127}}{\unicode{36733}}{\unicode{22343}}{\unicode{34913}} (Service Function Load Balancing Based on {SDN-SFC)}}, journal = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}}, volume = {46}, number = {9}, pages = {130--136}, year = {2019}, url = {https://doi.org/10.11896/j.issn.1002-137X.2019.09.018}, doi = {10.11896/J.ISSN.1002-137X.2019.09.018}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsjkx/ZhangLHD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsjkx/DongLQZH19, author = {Siqi Dong and Hailong Li and Yuben Qu and Zhao Zhang and Lei Hu}, title = {{\unicode{31227}}{\unicode{21160}}{\unicode{36793}}{\unicode{32536}}{\unicode{35745}}{\unicode{31639}}{\unicode{20013}}{\unicode{30340}}{\unicode{35745}}{\unicode{31639}}{\unicode{21368}}{\unicode{36733}}{\unicode{31574}}{\unicode{30053}}{\unicode{30740}}{\unicode{31350}}{\unicode{32508}}{\unicode{36848}} (Survey of Research on Computation Unloading Strategy in Mobile Edge Computing)}, journal = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}}, volume = {46}, number = {11}, pages = {32--40}, year = {2019}, url = {https://doi.org/10.11896/jsjkx.181001872}, doi = {10.11896/JSJKX.181001872}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsjkx/DongLQZH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/GuoYWLHW19, author = {Na Guo and Biao Yang and Yuhan Wang and Hongsheng Liu and Lei Hu and Tianmiao Wang}, title = {New Calibrator with Points Distributed Conical Helically for Online Calibration of C-Arm}, journal = {Sensors}, volume = {19}, number = {9}, pages = {1989}, year = {2019}, url = {https://doi.org/10.3390/s19091989}, doi = {10.3390/S19091989}, timestamp = {Mon, 29 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/GuoYWLHW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/taes/HuLBHBK19, author = {Fei Hu and Xin Li and Elizabeth Serena Bentley and Lei Hu and Ke Bao and Sunil Kumar}, title = {Intelligent Multibeam Transmissions for Mission-Oriented Airborne Networks}, journal = {{IEEE} Trans. Aerosp. Electron. Syst.}, volume = {55}, number = {2}, pages = {619--630}, year = {2019}, url = {https://doi.org/10.1109/TAES.2018.2858152}, doi = {10.1109/TAES.2018.2858152}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/taes/HuLBHBK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/ZhengYLHZ19, author = {Dabin Zheng and Mu Yuan and Nian Li and Lei Hu and Xiangyong Zeng}, title = {Constructions of Involutions Over Finite Fields}, journal = {{IEEE} Trans. Inf. Theory}, volume = {65}, number = {12}, pages = {7876--7883}, year = {2019}, url = {https://doi.org/10.1109/TIT.2019.2919511}, doi = {10.1109/TIT.2019.2919511}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/ZhengYLHZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/HuHK19, author = {Lei Hu and Fei Hu and Sunil Kumar}, title = {Moth and Ant Inspired Routing in Hierarchical Airborne Networks with Multi-Beam Antennas}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {18}, number = {4}, pages = {910--922}, year = {2019}, url = {https://doi.org/10.1109/TMC.2018.2844851}, doi = {10.1109/TMC.2018.2844851}, timestamp = {Tue, 16 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/HuHK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LiSLWH19, author = {Shun Li and Siwei Sun and Chaoyun Li and Zihao Wei and Lei Hu}, title = {Constructing Low-latency Involutory {MDS} Matrices with Lightweight Circuits}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {1}, pages = {84--117}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i1.84-117}, doi = {10.13154/TOSC.V2019.I1.84-117}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/LiSLWH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/SongQH19, author = {Ling Song and Xianrui Qin and Lei Hu}, title = {Boomerang Connectivity Table Revisited. Application to {SKINNY} and {AES}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {1}, pages = {118--141}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i1.118-141}, doi = {10.13154/TOSC.V2019.I1.118-141}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/SongQH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/LiSSLH19, author = {Shun Li and Siwei Sun and Danping Shi and Chaoyun Li and Lei Hu}, title = {Lightweight Iterative {MDS} Matrices: How Small Can We Go?}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {4}, pages = {147--170}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i4.147-170}, doi = {10.13154/TOSC.V2019.I4.147-170}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/LiSSLH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ShiSSLH19, author = {Danping Shi and Siwei Sun and Yu Sasaki and Chaoyun Li and Lei Hu}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full {\textbackslash}mathsf {MORUS}}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11693}, pages = {180--209}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26951-7\_7}, doi = {10.1007/978-3-030-26951-7\_7}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ShiSSLH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Xu0HWP19, author = {Jun Xu and Santanu Sarkar and Lei Hu and Huaxiong Wang and Yanbin Pan}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11692}, pages = {297--321}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26948-7\_11}, doi = {10.1007/978-3-030-26948-7\_11}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Xu0HWP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ChenSSH19, author = {Qiu Chen and Danping Shi and Siwei Sun and Lei Hu}, editor = {Jianying Zhou and Xiapu Luo and Qingni Shen and Zhen Xu}, title = {Automatic Demirci-Sel{\c{c}}uk Meet-in-the-Middle Attack on {SKINNY} with Key-Bridging}, booktitle = {Information and Communications Security - 21st International Conference, {ICICS} 2019, Beijing, China, December 15-17, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11999}, pages = {233--247}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-41579-2\_14}, doi = {10.1007/978-3-030-41579-2\_14}, timestamp = {Mon, 02 Mar 2020 17:19:02 +0100}, biburl = {https://dblp.org/rec/conf/icics/ChenSSH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/WeiSSWH19, author = {Man Wei and Danping Shi and Siwei Sun and Peng Wang and Lei Hu}, editor = {Jianying Zhou and Xiapu Luo and Qingni Shen and Zhen Xu}, title = {Convolutional Neural Network Based Side-Channel Attacks with Customized Filters}, booktitle = {Information and Communications Security - 21st International Conference, {ICICS} 2019, Beijing, China, December 15-17, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11999}, pages = {799--813}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-41579-2\_46}, doi = {10.1007/978-3-030-41579-2\_46}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/WeiSSWH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/CaiWZSH19, author = {Jiahao Cai and Zihao Wei and Yingjie Zhang and Siwei Sun and Lei Hu}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Zero-sum Distinguishers for Round-reduced {GIMLI} Permutation}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {38--43}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007249000380043}, doi = {10.5220/0007249000380043}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/CaiWZSH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmv/ZhangSHZD19, author = {Yongmei Zhang and Jie Shu and Lei Hu and Qi Zhou and Zhirong Du}, editor = {Wolfgang Osten and Dmitry P. Nikolaev}, title = {A ship target tracking algorithm based on deep learning and multiple features}, booktitle = {Twelfth International Conference on Machine Vision, {ICMV} 2019, Amsterdam, The Netherlands, 16-18 November 2019}, series = {{SPIE} Proceedings}, volume = {11433}, pages = {1143304}, publisher = {{SPIE}}, year = {2019}, url = {https://doi.org/10.1117/12.2559945}, doi = {10.1117/12.2559945}, timestamp = {Thu, 29 Oct 2020 18:10:00 +0100}, biburl = {https://dblp.org/rec/conf/icmv/ZhangSHZD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/00220H19, author = {Jun Xu and Santanu Sarkar and Lei Hu}, editor = {Feng Hao and Sushmita Ruj and Sourav Sen Gupta}, title = {Revisiting Approximate Polynomial Common Divisor Problem and Noisy Multipolynomial Reconstruction}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2019 - 20th International Conference on Cryptology in India, Hyderabad, India, December 15-18, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11898}, pages = {398--411}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-35423-7\_20}, doi = {10.1007/978-3-030-35423-7\_20}, timestamp = {Wed, 20 Mar 2024 15:23:22 +0100}, biburl = {https://dblp.org/rec/conf/indocrypt/00220H19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsda/ZhaH19, author = {Zhengbang Zha and Lei Hu}, title = {The Boomerang Uniformity of Power Permutations x\({}^{\mbox{2}}\)\({}^{\mbox{k}}\)\({}^{\mbox{-1}}\) over F2\({}^{\mbox{n}}\)}, booktitle = {Ninth International Workshop on Signal Design and its Applications in Communications, {IWSDA} 2019, Dongguan, China, October 20-24, 2019}, pages = {1--4}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/IWSDA46143.2019.8966114}, doi = {10.1109/IWSDA46143.2019.8966114}, timestamp = {Thu, 06 Feb 2020 18:03:22 +0100}, biburl = {https://dblp.org/rec/conf/iwsda/ZhaH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiSLWH19, author = {Shun Li and Siwei Sun and Chaoyun Li and Zihao Wei and Lei Hu}, title = {Constructing Low-latency Involutory {MDS} Matrices with Lightweight Circuit}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {107}, year = {2019}, url = {https://eprint.iacr.org/2019/107}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiSLWH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SongQH19, author = {Ling Song and Xianrui Qin and Lei Hu}, title = {Boomerang Connectivity Table Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {146}, year = {2019}, url = {https://eprint.iacr.org/2019/146}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SongQH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShiSSLH19, author = {Danping Shi and Siwei Sun and Yu Sasaki and Chaoyun Li and Lei Hu}, title = {Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full {MORUS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {172}, year = {2019}, url = {https://eprint.iacr.org/2019/172}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShiSSLH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Xu0HWP19, author = {Jun Xu and Santanu Sarkar and Lei Hu and Huaxiong Wang and Yanbin Pan}, title = {New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {604}, year = {2019}, url = {https://eprint.iacr.org/2019/604}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Xu0HWP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiSSLH19, author = {Shun Li and Siwei Sun and Danping Shi and Chaoyun Li and Lei Hu}, title = {Lightweight Iterative {MDS} Matrices: How Small Can We Go?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1310}, year = {2019}, url = {https://eprint.iacr.org/2019/1310}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiSSLH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WangWLHHLGQX18, author = {Lifeng Wang and Tianmiao Wang and Hongpeng Liu and Lei Hu and Zhonghao Han and Wenyong Liu and Na Guo and Yansong Qi and Yongsheng Xu}, title = {An Automated Calibration Method of Ultrasonic Probe Based on Coherent Point Drift Algorithm}, journal = {{IEEE} Access}, volume = {6}, pages = {8657--8665}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2791582}, doi = {10.1109/ACCESS.2018.2791582}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/WangWLHHLGQX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/appml/HuangGH18, author = {Qianglian Huang and Yi{-}Tian Gao and Lei Hu}, title = {Breather-to-soliton transition for a sixth-order nonlinear Schr{\"{o}}dinger equation in an optical fiber}, journal = {Appl. Math. Lett.}, volume = {75}, pages = {135--140}, year = {2018}, url = {https://doi.org/10.1016/j.aml.2017.06.015}, doi = {10.1016/J.AML.2017.06.015}, timestamp = {Mon, 11 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/appml/HuangGH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ZhaHZ18, author = {Zhengbang Zha and Lei Hu and Zhizheng Zhang}, title = {New results on permutation polynomials of the form (x p m - x + {\(\delta\)}) s + x p m + x over {\(\mathbb{F}\)} p\({}^{\mbox{2m}}\)}, journal = {Cryptogr. Commun.}, volume = {10}, number = {3}, pages = {567--578}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0234-9}, doi = {10.1007/S12095-017-0234-9}, timestamp = {Fri, 07 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/ZhaHZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/XuSHHP18, author = {Jun Xu and Santanu Sarkar and Lei Hu and Zhangjie Huang and Liqiang Peng}, title = {Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {9}, pages = {1997--2033}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0435-4}, doi = {10.1007/S10623-017-0435-4}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/XuSHHP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ffa/ZhaHZ18, author = {Zhengbang Zha and Lei Hu and Zhizheng Zhang}, title = {Three new classes of generalized almost perfect nonlinear power functions}, journal = {Finite Fields Their Appl.}, volume = {53}, pages = {254--266}, year = {2018}, url = {https://doi.org/10.1016/j.ffa.2018.06.011}, doi = {10.1016/J.FFA.2018.06.011}, timestamp = {Fri, 07 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ffa/ZhaHZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdmbc/HuYHHH18, author = {Guoxiong Hu and Zhong Yang and Lei Hu and Li Huang and Jiaming Han}, title = {Small Object Detection with Multiscale Features}, journal = {Int. J. Digit. Multim. Broadcast.}, volume = {2018}, pages = {4546896:1--4546896:10}, year = {2018}, url = {https://doi.org/10.1155/2018/4546896}, doi = {10.1155/2018/4546896}, timestamp = {Mon, 08 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdmbc/HuYHHH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jossac/ShanHZL18, author = {Jinyong Shan and Lei Hu and Xiangyong Zeng and Chunlei Li}, title = {A Construction of 1-Resilient Boolean Functions with Good Cryptographic Properties}, journal = {J. Syst. Sci. Complex.}, volume = {31}, number = {4}, pages = {1042--1064}, year = {2018}, url = {https://doi.org/10.1007/s11424-017-6177-6}, doi = {10.1007/S11424-017-6177-6}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jossac/ShanHZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsjkx/LiuWHL18, author = {Chunyang Liu and Zemin Wu and Lei Hu and Xi Liu}, title = {{\unicode{22522}}{\unicode{20110}}{\unicode{20284}}{\unicode{29289}}{\unicode{24615}}{\unicode{21644}}{\unicode{31354}}{\unicode{26102}}{\unicode{21327}}{\unicode{26041}}{\unicode{24046}}{\unicode{29305}}{\unicode{24449}}{\unicode{30340}}{\unicode{34892}}{\unicode{20154}}{\unicode{26816}}{\unicode{27979}}{\unicode{31639}}{\unicode{27861}} (Pedestrian Detection Based on Objectness and Sapce-Time Covariance Features)}, journal = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}}, volume = {45}, number = {6A}, pages = {210--214}, year = {2018}, url = {http://www.jsjkx.com/CN/Y2018/V45/I6A/210}, doi = {Y2018/V45/I6A/210}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsjkx/LiuWHL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsjkx/WangWYHZJ18, author = {Jun Wang and Zemin Wu and Wei Yang and Lei Hu and Zhaofeng Zhang and Qingzhu Jiang}, title = {{\unicode{22522}}{\unicode{20110}}{\unicode{31232}}{\unicode{30095}}{\unicode{24674}}{\unicode{22797}}{\unicode{19982}}{\unicode{20248}}{\unicode{21270}}{\unicode{30340}}{\unicode{26174}}{\unicode{33879}}{\unicode{24615}}{\unicode{30446}}{\unicode{26631}}{\unicode{26816}}{\unicode{27979}}{\unicode{31639}}{\unicode{27861}} (Salient Object Detection Algorithm Based on Sparse Recovery and Optimization)}, journal = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}}, volume = {45}, number = {8}, pages = {258--263}, year = {2018}, url = {https://doi.org/10.11896/j.issn.1002-137X.2018.08.046}, doi = {10.11896/J.ISSN.1002-137X.2018.08.046}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsjkx/WangWYHZJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhuCSLH18, author = {Hongliang Zhu and Meiqi Chen and Maohua Sun and Xin Liao and Lei Hu}, title = {Outsourcing Set Intersection Computation Based on Bloom Filter for Privacy Preservation in Multimedia Processing}, journal = {Secur. Commun. Networks}, volume = {2018}, pages = {5841967:1--5841967:12}, year = {2018}, url = {https://doi.org/10.1155/2018/5841967}, doi = {10.1155/2018/5841967}, timestamp = {Wed, 27 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhuCSLH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YangHSTS18, author = {Qianqian Yang and Lei Hu and Danping Shi and Yosuke Todo and Siwei Sun}, title = {On the Complexity of Impossible Differential Cryptanalysis}, journal = {Secur. Commun. Networks}, volume = {2018}, pages = {7393401:1--7393401:11}, year = {2018}, url = {https://doi.org/10.1155/2018/7393401}, doi = {10.1155/2018/7393401}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YangHSTS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PengLKZH18, author = {Liqiang Peng and Yao Lu and Noboru Kunihiro and Rui Zhang and Lei Hu}, editor = {Willy Susilo and Guomin Yang}, title = {A Deterministic Algorithm for Computing Divisors in an Interval}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {3--12}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_1}, doi = {10.1007/978-3-319-93638-3\_1}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PengLKZH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ShiSDTSH18, author = {Danping Shi and Siwei Sun and Patrick Derbez and Yosuke Todo and Bing Sun and Lei Hu}, editor = {Thomas Peyrin and Steven D. Galbraith}, title = {Programming the Demirci-Sel{\c{c}}uk Meet-in-the-Middle Attack with Constraints}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11273}, pages = {3--34}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03329-3\_1}, doi = {10.1007/978-3-030-03329-3\_1}, timestamp = {Thu, 17 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/ShiSDTSH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbbb/LiuXHTW18, author = {Hongpeng Liu and Ying Xu and Lei Hu and Peifu Tang and Lifeng Wang}, title = {An Investigation of Errors in Fluoroscopic Navigation for Robot-Assisted Orthopedic Surgery}, booktitle = {Proceedings of the 8th International Conference on Bioscience, Biochemistry and Bioinformatics, {ICBBB} 2018, Tokyo, Japan, January 18-20, 2018}, pages = {134--138}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3180382.3180394}, doi = {10.1145/3180382.3180394}, timestamp = {Wed, 15 Nov 2023 17:18:11 +0100}, biburl = {https://dblp.org/rec/conf/icbbb/LiuXHTW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/ZhangSCH18, author = {Yingjie Zhang and Siwei Sun and Jiahao Cai and Lei Hu}, editor = {Liqun Chen and Mark Manulis and Steve A. Schneider}, title = {Speeding up {MILP} Aided Differential Characteristic Search with Matsui's Strategy}, booktitle = {Information Security - 21st International Conference, {ISC} 2018, Guildford, UK, September 9-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11060}, pages = {101--115}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99136-8\_6}, doi = {10.1007/978-3-319-99136-8\_6}, timestamp = {Fri, 07 Aug 2020 17:57:31 +0200}, biburl = {https://dblp.org/rec/conf/isw/ZhangSCH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/robio/YangHGWLH18, author = {Biao Yang and Lei Hu and Na Guo and Yuhan Wang and Hongsheng Liu and Zhonghao Han}, title = {Anterior Cruciate Ligament Reconstruction Surgery Navigation and Robotic Positioning System Under X-Rays}, booktitle = {{IEEE} International Conference on Robotics and Biomimetics, {ROBIO} 2018, Kuala Lumpur, Malaysia, December 12-15, 2018}, pages = {156--163}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ROBIO.2018.8665247}, doi = {10.1109/ROBIO.2018.8665247}, timestamp = {Wed, 16 Oct 2019 14:14:57 +0200}, biburl = {https://dblp.org/rec/conf/robio/YangHGWLH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcsp/HuGZWZ18, author = {Lei Hu and Zhiyang Gao and Yunjiao Zang and Jun Wang and Lei Zhang}, title = {Visual Tracking via Detecting and Removing Outliers Based on Block Sparse Representation}, booktitle = {10th International Conference on Wireless Communications and Signal Processing, {WCSP} 2018, Hangzhou, China, October 18-20, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/WCSP.2018.8555648}, doi = {10.1109/WCSP.2018.8555648}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/wcsp/HuGZWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcsp/WangTHWZS18, author = {Jun Wang and Chang Tian and Lei Hu and Hai Wang and Mingyong Zeng and Qing Shen}, title = {Video Saliency Estimation via Encoding Deep Spatiotemporal Saliency Cues}, booktitle = {10th International Conference on Wireless Communications and Signal Processing, {WCSP} 2018, Hangzhou, China, October 18-20, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/WCSP.2018.8555574}, doi = {10.1109/WCSP.2018.8555574}, timestamp = {Wed, 15 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wcsp/WangTHWZS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1811-11344, author = {Dabin Zheng and Mu Yuan and Nian Li and Lei Hu and Xiangyong Zeng}, title = {Constructions of involutions over finite fields}, journal = {CoRR}, volume = {abs/1811.11344}, year = {2018}, url = {http://arxiv.org/abs/1811.11344}, eprinttype = {arXiv}, eprint = {1811.11344}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1811-11344.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShiSDTSH18, author = {Danping Shi and Siwei Sun and Patrick Derbez and Yosuke Todo and Bing Sun and Lei Hu}, title = {Programming the Demirci-Sel{\c{c}}uk Meet-in-the-Middle Attack with Constraints}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {813}, year = {2018}, url = {https://eprint.iacr.org/2018/813}, timestamp = {Thu, 17 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShiSDTSH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XuSH18, author = {Jun Xu and Santanu Sarkar and Lei Hu}, title = {Revisiting Orthogonal Lattice Attacks on Approximate Common Divisor Problems and their Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1208}, year = {2018}, url = {https://eprint.iacr.org/2018/1208}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/XuSH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/ShiHSSQM17, author = {Danping Shi and Lei Hu and Siwei Sun and Ling Song and Kexin Qiao and Xiaoshuang Ma}, title = {Improved linear (hull) cryptanalysis of round-reduced versions of {SIMON}}, journal = {Sci. China Inf. Sci.}, volume = {60}, number = {3}, pages = {39101:1--39101:3}, year = {2017}, url = {https://doi.org/10.1007/s11432-015-0007-1}, doi = {10.1007/S11432-015-0007-1}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/ShiHSSQM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/PengHLXH17, author = {Liqiang Peng and Lei Hu and Yao Lu and Jun Xu and Zhangjie Huang}, title = {Cryptanalysis of Dual {RSA}}, journal = {Des. Codes Cryptogr.}, volume = {83}, number = {1}, pages = {1--21}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0196-5}, doi = {10.1007/S10623-016-0196-5}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/PengHLXH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ffa/ZhaHF17, author = {Zhengbang Zha and Lei Hu and Shuqin Fan}, title = {Further results on permutation trinomials over finite fields with even characteristic}, journal = {Finite Fields Their Appl.}, volume = {45}, pages = {43--52}, year = {2017}, url = {https://doi.org/10.1016/j.ffa.2016.11.011}, doi = {10.1016/J.FFA.2016.11.011}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ffa/ZhaHF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijfcs/SunH17, author = {Zhiqiang Sun and Lei Hu}, title = {Several Classes of Boolean Functions with Four-Valued Walsh Spectra}, journal = {Int. J. Found. Comput. Sci.}, volume = {28}, number = {4}, pages = {357--378}, year = {2017}, url = {https://doi.org/10.1142/S0129054117500228}, doi = {10.1142/S0129054117500228}, timestamp = {Wed, 11 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijfcs/SunH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ZhangWJDH17, author = {Zhaofeng Zhang and Zemin Wu and Qingzhu Jiang and Lin Du and Lei Hu}, title = {Co-saliency Detection Based on Superpixel Matching and Cellular Automata}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {11}, number = {5}, pages = {2576--2589}, year = {2017}, url = {https://doi.org/10.3837/tiis.2017.05.015}, doi = {10.3837/TIIS.2017.05.015}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/ZhangWJDH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsjkx/ZhangWDH18, author = {Zhaofeng Zhang and Zemin Wu and Lin Du and Lei Hu}, title = {{\unicode{22522}}{\unicode{20110}}{\unicode{21387}}{\unicode{32553}}{\unicode{22495}}{\unicode{32534}}{\unicode{30721}}{\unicode{38271}}{\unicode{24230}}{\unicode{30340}}{\unicode{35270}}{\unicode{39057}}{\unicode{26174}}{\unicode{33879}}{\unicode{24615}}{\unicode{26816}}{\unicode{27979}} (Video Saliency Detection Based on Compressed Domain Coding Length)}, journal = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}}, volume = {44}, number = {10}, pages = {312--317}, year = {2017}, url = {https://doi.org/10.11896/j.issn.1002-137X.2017.10.056}, doi = {10.11896/J.ISSN.1002-137X.2017.10.056}, timestamp = {Fri, 20 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsjkx/ZhangWDH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsjkx/ZhangWJDH18, author = {Zhaofeng Zhang and Zemin Wu and Qingzhu Jiang and Lin Du and Lei Hu}, title = {{\unicode{22522}}{\unicode{20110}}{\unicode{36229}}{\unicode{20687}}{\unicode{32032}}{\unicode{21305}}{\unicode{37197}}{\unicode{30340}}{\unicode{22270}}{\unicode{20687}}{\unicode{21327}}{\unicode{21516}}{\unicode{26174}}{\unicode{33879}}{\unicode{24615}}{\unicode{26816}}{\unicode{27979}} (Co-saliency Detection via Superpixel Matching)}, journal = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}}, volume = {44}, number = {11}, pages = {314--319}, year = {2017}, url = {https://doi.org/10.11896/j.issn.1002-137X.2017.11.048}, doi = {10.11896/J.ISSN.1002-137X.2017.11.048}, timestamp = {Fri, 20 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsjkx/ZhangWJDH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsjkx/LiuWHL17, author = {Chunyang Liu and Zemin Wu and Lei Hu and Xi Liu}, title = {{\unicode{22522}}{\unicode{20110}}DCT{\unicode{21464}}{\unicode{25442}}{\unicode{30340}}{\unicode{22810}}{\unicode{36890}}{\unicode{36947}}{\unicode{29305}}{\unicode{24449}}{\unicode{30340}}{\unicode{34892}}{\unicode{20154}}{\unicode{26816}}{\unicode{27979}} (Pedestrian Detection Based on {DCT} of Multi-channel Feature)}, journal = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}}, volume = {44}, number = {{Z11}}, pages = {221--224}, year = {2017}, url = {https://doi.org/10.11896/j.issn.1002-137X.2017.11A.046}, doi = {10.11896/J.ISSN.1002-137X.2017.11A.046}, timestamp = {Tue, 24 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsjkx/LiuWHL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsjkx/DuTWZHZ17, author = {Lin Du and Chang Tian and Zemin Wu and Zhaofeng Zhang and Lei Hu and Lei Zhang}, title = {{\unicode{38754}}{\unicode{21521}}{\unicode{20027}}{\unicode{35266}}{\unicode{36136}}{\unicode{37327}}{\unicode{30340}}{\unicode{35270}}{\unicode{39057}}{\unicode{20256}}{\unicode{36755}}{\unicode{32534}}{\unicode{30721}}{\unicode{21442}}{\unicode{25968}}{\unicode{30340}}{\unicode{36873}}{\unicode{25321}} (Choice of Coding Parameters in Video Transmission for Perceptual Quality)}, journal = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}}, volume = {44}, number = {{Z6}}, pages = {202--205}, year = {2017}, url = {https://doi.org/10.11896/j.issn.1002-137X.2017.6A.046}, doi = {10.11896/J.ISSN.1002-137X.2017.6A.046}, timestamp = {Tue, 24 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsjkx/DuTWZHZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/ZhangHQG17, author = {Zhongnan Zhang and Lei Hu and Ming Qiu and Fangyuan Gao}, title = {Events detection and community partition based on probabilistic snapshot for evolutionary social network}, journal = {Peer-to-Peer Netw. Appl.}, volume = {10}, number = {6}, pages = {1272--1284}, year = {2017}, url = {https://doi.org/10.1007/s12083-016-0427-6}, doi = {10.1007/S12083-016-0427-6}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/ZhangHQG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/SunGLYTQH17, author = {Siwei Sun and David G{\'{e}}rault and Pascal Lafourcade and Qianqian Yang and Yosuke Todo and Kexin Qiao and Lei Hu}, title = {Analysis of AES, SKINNY, and Others with Constraint Programming}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {1}, pages = {281--306}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i1.281-306}, doi = {10.13154/TOSC.V2017.I1.281-306}, timestamp = {Mon, 05 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/SunGLYTQH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/agro-geoinformatics/HuDYYTLZSHSR17, author = {Lei Hu and Liping Di and Eugene Yu and Peng Yue and Junmei Tang and Li Lin and Chen Zhang and Ziheng Sun and Ruiheng Hu and Ranjay Shrestha and Md. Shahinoor Rahman}, title = {Developing geospatial Web service and system for {SMAP} soil moisture monitoring}, booktitle = {2017 6th International Conference on Agro-Geoinformatics, Fairfax, VA, USA, August 7-10, 2017}, pages = {1--5}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/Agro-Geoinformatics.2017.8047066}, doi = {10.1109/AGRO-GEOINFORMATICS.2017.8047066}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/agro-geoinformatics/HuDYYTLZSHSR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/agro-geoinformatics/LinDYTSRKSZHYY17, author = {Li Lin and Liping Di and Eugene Genong Yu and Junmei Tang and Ranjay Shrestha and Md. Shahinoor Rahman and Lingjun Kang and Ziheng Sun and Chen Zhang and Lei Hu and Guangyuan Yang and Zhengwei Yang}, title = {Extract flood duration from Dartmouth Flood Observatory flood product}, booktitle = {2017 6th International Conference on Agro-Geoinformatics, Fairfax, VA, USA, August 7-10, 2017}, pages = {1--4}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/Agro-Geoinformatics.2017.8047064}, doi = {10.1109/AGRO-GEOINFORMATICS.2017.8047064}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/agro-geoinformatics/LinDYTSRKSZHYY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/agro-geoinformatics/LinDZHTY17, author = {Li Lin and Liping Di and Chen Zhang and Lei Hu and Junmei Tang and Eugene Yu}, title = {Developing a Web service based application for demographic information modeling and analyzing}, booktitle = {2017 6th International Conference on Agro-Geoinformatics, Fairfax, VA, USA, August 7-10, 2017}, pages = {1--5}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/Agro-Geoinformatics.2017.8047069}, doi = {10.1109/AGRO-GEOINFORMATICS.2017.8047069}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/agro-geoinformatics/LinDZHTY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/agro-geoinformatics/RahmanDSYLZHTY17, author = {Md. Shahinoor Rahman and Liping Di and Ranjay Shrestha and Eugene G. Yu and Li Lin and Chen Zhang and Lei Hu and Junmei Tang and Zhengwei Yang}, title = {Agriculture flood mapping with Soil Moisture Active Passive {(SMAP)} data: {A} case of 2016 Louisiana flood}, booktitle = {2017 6th International Conference on Agro-Geoinformatics, Fairfax, VA, USA, August 7-10, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/Agro-Geoinformatics.2017.8047062}, doi = {10.1109/AGRO-GEOINFORMATICS.2017.8047062}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/agro-geoinformatics/RahmanDSYLZHTY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/agro-geoinformatics/ShresthaDYRLHT17, author = {Ranjay Shrestha and Liping Di and Eugene G. Yu and Md. Shahinoor Rahman and Li Lin and Lei Hu and Junmei Tang}, title = {Crop Fraction Layer {(CFL)} datasets derived through {MODIS} and LandSat for the continental {US} from year 2000-2016}, booktitle = {2017 6th International Conference on Agro-Geoinformatics, Fairfax, VA, USA, August 7-10, 2017}, pages = {1--7}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/Agro-Geoinformatics.2017.8047068}, doi = {10.1109/AGRO-GEOINFORMATICS.2017.8047068}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/agro-geoinformatics/ShresthaDYRLHT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/agro-geoinformatics/YuDRLZHSKTY17, author = {Eugene G. Yu and Liping Di and Md. Shahinoor Rahman and Li Lin and Chen Zhang and Lei Hu and Ranjay Shrestha and Lingjun Kang and Junmei Tang and Guangyuan Yang}, title = {Performance improvement on a Web Geospatial service for the remote sensing flood-induced crop loss assessment web application using vector tiling}, booktitle = {2017 6th International Conference on Agro-Geoinformatics, Fairfax, VA, USA, August 7-10, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/Agro-Geoinformatics.2017.8047053}, doi = {10.1109/AGRO-GEOINFORMATICS.2017.8047053}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/agro-geoinformatics/YuDRLZHSKTY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/agro-geoinformatics/ZhangDSYHLTR17, author = {Chen Zhang and Liping Di and Ziheng Sun and Eugene G. Yu and Lei Hu and Li Lin and Junmei Tang and Md. Shahinoor Rahman}, title = {Integrating {OGC} Web Processing Service with cloud computing environment for Earth Observation data}, booktitle = {2017 6th International Conference on Agro-Geoinformatics, Fairfax, VA, USA, August 7-10, 2017}, pages = {1--4}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/Agro-Geoinformatics.2017.8047065}, doi = {10.1109/AGRO-GEOINFORMATICS.2017.8047065}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/agro-geoinformatics/ZhangDSYHLTR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/igarss/YangCHDM17, author = {Zhengwei Yang and Wade T. Crow and Lei Hu and Liping Di and Rick Mueller}, title = {{SMAP} {DATA} for cropland soil moisture assessment - {A} case study}, booktitle = {2017 {IEEE} International Geoscience and Remote Sensing Symposium, {IGARSS} 2017, Fort Worth, TX, USA, July 23-28, 2017}, pages = {1996--1999}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/IGARSS.2017.8127373}, doi = {10.1109/IGARSS.2017.8127373}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/igarss/YangCHDM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscid/HuH17, author = {Lei Hu and Fangyu Hu}, title = {Anomaly Detection in Crowded Scenes via {SA-MHOF} and Sparse Combination}, booktitle = {10th International Symposium on Computational Intelligence and Design, {ISCID} 2017, Hangzhou, China, December 9-10, 2017, Volume 1}, pages = {421--424}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISCID.2017.130}, doi = {10.1109/ISCID.2017.130}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/iscid/HuH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcsp/HuWZT17, author = {Lei Hu and Zemin Wu and Lei Zhang and Chang Tian}, title = {Fast recovery of non-negative sparse signals under heterogeneous noise}, booktitle = {9th International Conference on Wireless Communications and Signal Processing, {WCSP} 2017, Nanjing, China, October 11-13, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/WCSP.2017.8171027}, doi = {10.1109/WCSP.2017.8171027}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/wcsp/HuWZT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SunGLYTQH17, author = {Siwei Sun and David G{\'{e}}rault and Pascal Lafourcade and Qianqian Yang and Yosuke Todo and Kexin Qiao and Lei Hu}, title = {Analysis of AES, SKINNY, and Others with Constraint Programming}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {162}, year = {2017}, url = {http://eprint.iacr.org/2017/162}, timestamp = {Mon, 05 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SunGLYTQH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ffa/ZhaH16, author = {Zhengbang Zha and Lei Hu}, title = {Some classes of permutation polynomials of the form (x\({}^{\mbox{p\({}^{\mbox{m}}\)}}\)-x+{\(\delta\)})\({}^{\mbox{s}}\)+x over F\({}_{\mbox{p\({}^{\mbox{2m}}\)}}\)}, journal = {Finite Fields Their Appl.}, volume = {40}, pages = {150--162}, year = {2016}, url = {https://doi.org/10.1016/j.ffa.2016.04.003}, doi = {10.1016/J.FFA.2016.04.003}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ffa/ZhaH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jei/JiangWTLZH16, author = {Qingzhu Jiang and Zemin Wu and Chang Tian and Tao Liu and Mingyong Zeng and Lei Hu}, title = {Salient object detection based on discriminative boundary and multiple cues integration}, journal = {J. Electronic Imaging}, volume = {25}, number = {1}, pages = {013019}, year = {2016}, url = {https://doi.org/10.1117/1.JEI.25.1.013019}, doi = {10.1117/1.JEI.25.1.013019}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jei/JiangWTLZH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/PengHLW16, author = {Liqiang Peng and Lei Hu and Yao Lu and Hongyun Wei}, editor = {Kefei Chen and Dongdai Lin and Moti Yung}, title = {An Improved Analysis on Three Variants of the {RSA} Cryptosystem}, booktitle = {Information Security and Cryptology - 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10143}, pages = {140--149}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-54705-3\_9}, doi = {10.1007/978-3-319-54705-3\_9}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/PengHLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/FuWGSH16, author = {Kai Fu and Meiqin Wang and Yinghua Guo and Siwei Sun and Lei Hu}, editor = {Thomas Peyrin}, title = {MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck}, booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9783}, pages = {268--288}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-52993-5\_14}, doi = {10.1007/978-3-662-52993-5\_14}, timestamp = {Fri, 27 Mar 2020 08:58:25 +0100}, biburl = {https://dblp.org/rec/conf/fse/FuWGSH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icfhr/HuZ16, author = {Lei Hu and Richard Zanibbi}, title = {Line-of-Sight Stroke Graphs and Parzen Shape Context Features for Handwritten Math Formula Representation and Symbol Segmentation}, booktitle = {15th International Conference on Frontiers in Handwriting Recognition, {ICFHR} 2016, Shenzhen, China, October 23-26, 2016}, pages = {180--186}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ICFHR.2016.0044}, doi = {10.1109/ICFHR.2016.0044}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icfhr/HuZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icfhr/HuZ16a, author = {Lei Hu and Richard Zanibbi}, title = {MST-based Visual Parsing of Online Handwritten Mathematical Expressions}, booktitle = {15th International Conference on Frontiers in Handwriting Recognition, {ICFHR} 2016, Shenzhen, China, October 23-26, 2016}, pages = {337--342}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ICFHR.2016.0070}, doi = {10.1109/ICFHR.2016.0070}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icfhr/HuZ16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/PengHL16, author = {Liqiang Peng and Lei Hu and Yao Lu}, editor = {Seokhie Hong and Jong Hwan Park}, title = {Improved Results on Cryptanalysis of Prime Power {RSA}}, booktitle = {Information Security and Cryptology - {ICISC} 2016 - 19th International Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10157}, pages = {287--303}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-53177-9\_15}, doi = {10.1007/978-3-319-53177-9\_15}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/PengHL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/QiaoHS16a, author = {Kexin Qiao and Lei Hu and Siwei Sun}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Differential Analysis on Simeck and {SIMON} with Dynamic Key-Guessing Techniques}, booktitle = {Information Systems Security and Privacy - Second International Conference, {ICISSP} 2016, Rome, Italy, February 19-21, 2016, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {691}, pages = {64--85}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-54433-5\_5}, doi = {10.1007/978-3-319-54433-5\_5}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/QiaoHS16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/QiaoHS16, author = {Kexin Qiao and Lei Hu and Siwei Sun}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Differential Security Evaluation of Simeck with Dynamic Key-guessing Techniques}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {74--84}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005684400740084}, doi = {10.5220/0005684400740084}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/QiaoHS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/ShiHSS16, author = {Danping Shi and Lei Hu and Siwei Sun and Ling Song}, editor = {Olivier Camp and Steven Furnell and Paolo Mori}, title = {Linear(hull) Cryptanalysis of Round-reduced Versions of {KATAN}}, booktitle = {Proceedings of the 2nd International Conference on Information Systems Security and Privacy, {ICISSP} 2016, Rome, Italy, February 19-21, 2016}, pages = {364--371}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005739103640371}, doi = {10.5220/0005739103640371}, timestamp = {Sun, 18 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icissp/ShiHSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnc/HuHW16, author = {Maokai Hu and Lei Hu and Lifan Wang}, title = {Astronomical image superposition using an new improved particle swarm optimization}, booktitle = {12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery, {ICNC-FSKD} 2016, Changsha, China, August 13-15, 2016}, pages = {173--178}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/FSKD.2016.7603170}, doi = {10.1109/FSKD.2016.7603170}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/icnc/HuHW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/igarss/YangHYSDBM16, author = {Zhengwei Yang and Lei Hu and Genong Yu and Ranjay Shrestha and Liping Di and Claire Boryan and Rick Mueller}, title = {Web service-based {SMAP} soil moisture data visualization, dissemination and analytics based on vegscape framwork}, booktitle = {2016 {IEEE} International Geoscience and Remote Sensing Symposium, {IGARSS} 2016, Beijing, China, July 10-15, 2016}, pages = {3624--3627}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/IGARSS.2016.7729939}, doi = {10.1109/IGARSS.2016.7729939}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/igarss/YangHYSDBM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/XuHZPH16, author = {Jun Xu and Lei Hu and Xiaona Zhang and Liqiang Peng and Zhangjie Huang}, editor = {Matt Bishop and Anderson C. A. Nascimento}, title = {Cryptanalysis and Improved Construction of a Group Key Agreement for Secure Group Communication}, booktitle = {Information Security - 19th International Conference, {ISC} 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9866}, pages = {48--58}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45871-7\_4}, doi = {10.1007/978-3-319-45871-7\_4}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/XuHZPH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/XuHSZHP16, author = {Jun Xu and Lei Hu and Santanu Sarkar and Xiaona Zhang and Zhangjie Huang and Liqiang Peng}, editor = {Matt Bishop and Anderson C. A. Nascimento}, title = {Cryptanalysis of Multi-Prime {\textbackslash}varPhi -Hiding Assumption}, booktitle = {Information Security - 19th International Conference, {ISC} 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9866}, pages = {440--453}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45871-7\_26}, doi = {10.1007/978-3-319-45871-7\_26}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/XuHSZHP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/YangHSS16, author = {Qianqian Yang and Lei Hu and Siwei Sun and Ling Song}, editor = {Kazuto Ogawa and Katsunari Yoshioka}, title = {Related-Key Impossible Differential Analysis of Full Khudra}, booktitle = {Advances in Information and Computer Security - 11th International Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9836}, pages = {135--146}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44524-3\_8}, doi = {10.1007/978-3-319-44524-3\_8}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/YangHSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/YangHSS16, author = {Qianqian Yang and Lei Hu and Siwei Sun and Ling Song}, editor = {Jiageng Chen and Vincenzo Piuri and Chunhua Su and Moti Yung}, title = {Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR}, booktitle = {Network and System Security - 10th International Conference, {NSS} 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9955}, pages = {398--411}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-46298-1\_26}, doi = {10.1007/978-3-319-46298-1\_26}, timestamp = {Thu, 23 Jun 2022 19:57:36 +0200}, biburl = {https://dblp.org/rec/conf/nss/YangHSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartcom/HuSSXHK16, author = {Lei Hu and Huan Shen and Qingsong Shi and Jiajia Xu and Wei Hu and Peng Ke}, editor = {Meikang Qiu}, title = {An Buffering Optimization Algorithm for Cooperative Mobile Service}, booktitle = {Smart Computing and Communication - First International Conference, SmartCom 2016, Shenzhen, China, December 17-19, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10135}, pages = {86--94}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-52015-5\_9}, doi = {10.1007/978-3-319-52015-5\_9}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/smartcom/HuSSXHK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YangHSS16, author = {Qianqian Yang and Lei Hu and Siwei Sun and Ling Song}, title = {Truncated Differential Analysis of Round-Reduced RoadRunneR Block Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {84}, year = {2016}, url = {http://eprint.iacr.org/2016/084}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YangHSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XuHSZHP16, author = {Jun Xu and Lei Hu and Santanu Sarkar and Xiaona Zhang and Zhangjie Huang and Liqiang Peng}, title = {Cryptanalysis of Multi-Prime {\(\Phi\)}-Hiding Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {155}, year = {2016}, url = {http://eprint.iacr.org/2016/155}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/XuHSZHP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SunHWWSMYF16, author = {Siwei Sun and Lei Hu and Peng Wang and Meiqin Wang and Danping Shi and Xiaoshuang Ma and Qianqian Yang and Kai Fu}, title = {Mixed Integer Programming Models for Finite Automaton and Its Application to Additive Differential Patterns of Exclusive-Or}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {338}, year = {2016}, url = {http://eprint.iacr.org/2016/338}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SunHWWSMYF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FuWGSH16, author = {Kai Fu and Meiqin Wang and Yinghua Guo and Siwei Sun and Lei Hu}, title = {MILP-Based Automatic Search Algorithms for Diff erential and Linear Trails for Speck}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {407}, year = {2016}, url = {http://eprint.iacr.org/2016/407}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FuWGSH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhengWZH15, author = {Dabin Zheng and Xiaoqiang Wang and Xiangyong Zeng and Lei Hu}, title = {The weight distribution of a family of p-ary cyclic codes}, journal = {Des. Codes Cryptogr.}, volume = {75}, number = {2}, pages = {263--275}, year = {2015}, url = {https://doi.org/10.1007/s10623-013-9908-2}, doi = {10.1007/S10623-013-9908-2}, timestamp = {Fri, 23 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhengWZH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiCZLHS15, author = {Jiao Li and Claude Carlet and Xiangyong Zeng and Chunlei Li and Lei Hu and Jinyong Shan}, title = {Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks}, journal = {Des. Codes Cryptogr.}, volume = {76}, number = {2}, pages = {279--305}, year = {2015}, url = {https://doi.org/10.1007/s10623-014-9949-1}, doi = {10.1007/S10623-014-9949-1}, timestamp = {Mon, 24 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiCZLHS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/esi/HuYZGJZ15, author = {Lei Hu and Peng Yue and Mingda Zhang and Jianya Gong and Liangcun Jiang and Xining Zhang}, title = {Task-oriented Sensor Web data processing for environmental monitoring}, journal = {Earth Sci. Informatics}, volume = {8}, number = {3}, pages = {511--525}, year = {2015}, url = {https://doi.org/10.1007/s12145-015-0235-1}, doi = {10.1007/S12145-015-0235-1}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/esi/HuYZGJZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ffa/ZhaHC15, author = {Zhengbang Zha and Lei Hu and Xiwang Cao}, title = {Constructing permutations and complete permutations over finite fields via subfield-valued polynomials}, journal = {Finite Fields Their Appl.}, volume = {31}, pages = {162--177}, year = {2015}, url = {https://doi.org/10.1016/j.ffa.2014.10.002}, doi = {10.1016/J.FFA.2014.10.002}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ffa/ZhaHC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ffa/WangZHZ15, author = {Xiaoqiang Wang and Dabin Zheng and Lei Hu and Xiangyong Zeng}, title = {The weight distributions of two classes of binary cyclic codes}, journal = {Finite Fields Their Appl.}, volume = {34}, pages = {192--207}, year = {2015}, url = {https://doi.org/10.1016/j.ffa.2015.01.012}, doi = {10.1016/J.FFA.2015.01.012}, timestamp = {Fri, 23 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ffa/WangZHZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/QiaoHSMK15, author = {Kexin Qiao and Lei Hu and Siwei Sun and Xiaoshuang Ma and Haibin Kan}, title = {Improved {MILP} Modeling for Automatic Security Evaluation and Application to {FOX}}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {98-A}, number = {1}, pages = {72--80}, year = {2015}, url = {https://doi.org/10.1587/transfun.E98.A.72}, doi = {10.1587/TRANSFUN.E98.A.72}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/QiaoHSMK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijfcs/CaoH15, author = {Xiwang Cao and Lei Hu}, title = {Two Boolean Functions with Five-Valued Walsh Spectra and High Nonlinearity}, journal = {Int. J. Found. Comput. Sci.}, volume = {26}, number = {5}, pages = {537--556}, year = {2015}, url = {https://doi.org/10.1142/S0129054115500306}, doi = {10.1142/S0129054115500306}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijfcs/CaoH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jossac/SunH15, author = {Zhiqiang Sun and Lei Hu}, title = {Boolean functions with four-valued Walsh spectra}, journal = {J. Syst. Sci. Complex.}, volume = {28}, number = {3}, pages = {743--754}, year = {2015}, url = {https://doi.org/10.1007/s11424-014-2224-8}, doi = {10.1007/S11424-014-2224-8}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jossac/SunH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ShiHSS15, author = {Danping Shi and Lei Hu and Ling Song and Siwei Sun}, title = {Differential fault attack on Zorro block cipher}, journal = {Secur. Commun. Networks}, volume = {8}, number = {16}, pages = {2826--2835}, year = {2015}, url = {https://doi.org/10.1002/sec.1207}, doi = {10.1002/SEC.1207}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ShiHSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/staeors/HeYDZH15, author = {Lianlian He and Peng Yue and Liping Di and Mingda Zhang and Lei Hu}, title = {Adding Geospatial Data Provenance into {SDI} - {A} Service-Oriented Approach}, journal = {{IEEE} J. Sel. Top. Appl. Earth Obs. Remote. Sens.}, volume = {8}, number = {2}, pages = {926--936}, year = {2015}, url = {https://doi.org/10.1109/JSTARS.2014.2340737}, doi = {10.1109/JSTARS.2014.2340737}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/staeors/HeYDZH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/ZhaH15, author = {Zhengbang Zha and Lei Hu}, title = {Cyclotomic Constructions of Zero-Difference Balanced Functions With Applications}, journal = {{IEEE} Trans. Inf. Theory}, volume = {61}, number = {3}, pages = {1491--1495}, year = {2015}, url = {https://doi.org/10.1109/TIT.2014.2388231}, doi = {10.1109/TIT.2014.2388231}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/ZhaH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ZhangWXHPHL15, author = {Xiaona Zhang and Li{-}Ping Wang and Jun Xu and Lei Hu and Liqiang Peng and Zhangjie Huang and Zeyi Liu}, editor = {Dongdai Lin and XiaoFeng Wang and Moti Yung}, title = {Recovering a Sum of Two Squares Decomposition Revisited}, booktitle = {Information Security and Cryptology - 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9589}, pages = {178--192}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-38898-4\_11}, doi = {10.1007/978-3-319-38898-4\_11}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ZhangWXHPHL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/ZengWTZH15, author = {Mingyong Zeng and Zemin Wu and Chang Tian and Lei Zhang and Lei Hu}, title = {Efficient person re-identification by hybrid spatiogram and covariance descriptor}, booktitle = {2015 {IEEE} Conference on Computer Vision and Pattern Recognition Workshops, {CVPR} Workshops 2015, Boston, MA, USA, June 7-12, 2015}, pages = {48--56}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CVPRW.2015.7301296}, doi = {10.1109/CVPRW.2015.7301296}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cvpr/ZengWTZH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/HuHLLZ15, author = {Lei Hu and Wei Hu and Ruomiao Li and Chunqiang Li and Zhanyan Zhang}, title = {A Time Slices Based Novel {DVS} Algorithm for Embedded Systems}, booktitle = {17th {IEEE} International Conference on High Performance Computing and Communications, {HPCC} 2015, 7th {IEEE} International Symposium on Cyberspace Safety and Security, {CSS} 2015, and 12th {IEEE} International Conference on Embedded Software and Systems, {ICESS} 2015, New York, NY, USA, August 24-26, 2015}, pages = {1500--1505}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/HPCC-CSS-ICESS.2015.163}, doi = {10.1109/HPCC-CSS-ICESS.2015.163}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/hpcc/HuHLLZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/igarss/LiXGH15, author = {Xinzhi Li and Qizhi Xu and Feng Gao and Lei Hu}, title = {Pansharpening based on an improved ratio enhancement}, booktitle = {2015 {IEEE} International Geoscience and Remote Sensing Symposium, {IGARSS} 2015, Milan, Italy, July 26-31, 2015}, pages = {1100--1103}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/IGARSS.2015.7325962}, doi = {10.1109/IGARSS.2015.7325962}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/igarss/LiXGH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/igarss/ZhongXYH15, author = {Chen Zhong and Qizhi Xu and Feng Yang and Lei Hu}, title = {Building change detection for high-resolution remotely sensed images based on a semantic dependency}, booktitle = {2015 {IEEE} International Geoscience and Remote Sensing Symposium, {IGARSS} 2015, Milan, Italy, July 26-31, 2015}, pages = {3345--3348}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/IGARSS.2015.7326535}, doi = {10.1109/IGARSS.2015.7326535}, timestamp = {Mon, 28 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/igarss/ZhongXYH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/igarss/YangXGH15, author = {Feng Yang and Qizhi Xu and Feng Gao and Lei Hu}, title = {Ship detection from optical satellite images based on visual search mechanism}, booktitle = {2015 {IEEE} International Geoscience and Remote Sensing Symposium, {IGARSS} 2015, Milan, Italy, July 26-31, 2015}, pages = {3679--3682}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/IGARSS.2015.7326621}, doi = {10.1109/IGARSS.2015.7326621}, timestamp = {Mon, 28 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/igarss/YangXGH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/igarss/HuYFZ15, author = {Lei Hu and Jihua Ye and Yue Feng and Yongmei Zhang}, title = {Registration for long-term multi-temporal remote sensing images under spatial constraints from historical data}, booktitle = {2015 {IEEE} International Geoscience and Remote Sensing Symposium, {IGARSS} 2015, Milan, Italy, July 26-31, 2015}, pages = {4836--4839}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/IGARSS.2015.7326913}, doi = {10.1109/IGARSS.2015.7326913}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/igarss/HuYFZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/PengHLSXH15, author = {Liqiang Peng and Lei Hu and Yao Lu and Santanu Sarkar and Jun Xu and Zhangjie Huang}, editor = {Alex Biryukov and Vipul Goyal}, title = {Cryptanalysis of Variants of {RSA} with Multiple Small Secret Exponents}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2015 - 16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9462}, pages = {105--123}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26617-6\_6}, doi = {10.1007/978-3-319-26617-6\_6}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/PengHLSXH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/PengHHX15, author = {Liqiang Peng and Lei Hu and Zhangjie Huang and Jun Xu}, editor = {Javier L{\'{o}}pez and Yongdong Wu}, title = {Partial Prime Factor Exposure Attacks on {RSA} and Its Takagi's Variant}, booktitle = {Information Security Practice and Experience - 11th International Conference, {ISPEC} 2015, Beijing, China, May 5-8, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9065}, pages = {96--108}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17533-1\_7}, doi = {10.1007/978-3-319-17533-1\_7}, timestamp = {Thu, 29 Aug 2019 08:10:02 +0200}, biburl = {https://dblp.org/rec/conf/ispec/PengHHX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/YangHSQSSM15, author = {Qianqian Yang and Lei Hu and Siwei Sun and Kexin Qiao and Ling Song and Jinyong Shan and Xiaoshuang Ma}, editor = {Javier L{\'{o}}pez and Yongdong Wu}, title = {Improved Differential Analysis of Block Cipher {PRIDE}}, booktitle = {Information Security Practice and Experience - 11th International Conference, {ISPEC} 2015, Beijing, China, May 5-8, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9065}, pages = {209--219}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17533-1\_15}, doi = {10.1007/978-3-319-17533-1\_15}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/YangHSQSSM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/SunHWYQMSS15, author = {Siwei Sun and Lei Hu and Meiqin Wang and Qianqian Yang and Kexin Qiao and Xiaoshuang Ma and Ling Song and Jinyong Shan}, editor = {Javier L{\'{o}}pez and Chris J. Mitchell}, title = {Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis}, booktitle = {Information Security - 18th International Conference, {ISC} 2015, Trondheim, Norway, September 9-11, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9290}, pages = {141--157}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23318-5\_8}, doi = {10.1007/978-3-319-23318-5\_8}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/SunHWYQMSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/PengHLHX15, author = {Liqiang Peng and Lei Hu and Yao Lu and Zhangjie Huang and Jun Xu}, editor = {Keisuke Tanaka and Yuji Suga}, title = {Implicit Factorization of {RSA} Moduli Revisited (Short Paper)}, booktitle = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, pages = {67--76}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1\_5}, doi = {10.1007/978-3-319-22425-1\_5}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/PengHLHX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SunHQMSS15, author = {Siwei Sun and Lei Hu and Kexin Qiao and Xiaoshuang Ma and Jinyong Shan and Ling Song}, editor = {Keisuke Tanaka and Yuji Suga}, title = {Improvement on the Method for Automatic Differential Analysis and Its Application to Two Lightweight Block Ciphers {DESL} and LBlock-s}, booktitle = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, pages = {97--111}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1\_7}, doi = {10.1007/978-3-319-22425-1\_7}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/SunHQMSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/LuP0HL15, author = {Yao Lu and Liqiang Peng and Rui Zhang and Lei Hu and Dongdai Lin}, editor = {Orr Dunkelman and Liam Keliher}, title = {Towards Optimal Bounds for Implicit Factorization Problem}, booktitle = {Selected Areas in Cryptography - {SAC} 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9566}, pages = {462--476}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31301-6\_26}, doi = {10.1007/978-3-319-31301-6\_26}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/LuP0HL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ZhaHSS15, author = {Zhengbang Zha and Lei Hu and Siwei Sun and Jinyong Shan}, title = {Further results on differentially 4-uniform permutations over F\({}_{\mbox{2\({}^{\mbox{2m}}\)}}\)}, journal = {CoRR}, volume = {abs/1502.03874}, year = {2015}, url = {http://arxiv.org/abs/1502.03874}, eprinttype = {arXiv}, eprint = {1502.03874}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ZhaHSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SunHWWQMSSF15, author = {Siwei Sun and Lei Hu and Meiqin Wang and Peng Wang and Kexin Qiao and Xiaoshuang Ma and Danping Shi and Ling Song and Kai Fu}, title = {Constructing Mixed-integer Programming Models whose Feasible Region is Exactly the Set of All Valid Differential Characteristics of {SIMON}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {122}, year = {2015}, url = {http://eprint.iacr.org/2015/122}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SunHWWQMSSF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YangHSS15, author = {Qianqian Yang and Lei Hu and Siwei Sun and Ling Song}, title = {Related-key Impossible Differential Analysis of Full Khudra}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {840}, year = {2015}, url = {http://eprint.iacr.org/2015/840}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YangHSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/QiaoHS15, author = {Kexin Qiao and Lei Hu and Siwei Sun}, title = {Differential Security Evaluation of Simeck with Dynamic Key-guessing Techniques}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {902}, year = {2015}, url = {http://eprint.iacr.org/2015/902}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/QiaoHS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShiHSS15, author = {Danping Shi and Lei Hu and Siwei Sun and Ling Song}, title = {Linear (hull) Cryptanalysis of Round-reduced Versions of {KATAN}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {964}, year = {2015}, url = {http://eprint.iacr.org/2015/964}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShiHSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aaecc/ZhaHSS14, author = {Zhengbang Zha and Lei Hu and Siwei Sun and Yao Sun}, title = {New constructions of {APN} polynomial functions in odd characteristic}, journal = {Appl. Algebra Eng. Commun. Comput.}, volume = {25}, number = {4}, pages = {249--263}, year = {2014}, url = {https://doi.org/10.1007/s00200-014-0227-2}, doi = {10.1007/S00200-014-0227-2}, timestamp = {Tue, 22 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/aaecc/ZhaHSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ShanHZ14, author = {Jinyong Shan and Lei Hu and Xiangyong Zeng}, title = {Cryptographic properties of nested functions and algebraic immunity of the Boolean function in Hitag2 stream cipher}, journal = {Cryptogr. Commun.}, volume = {6}, number = {3}, pages = {233--254}, year = {2014}, url = {https://doi.org/10.1007/s12095-014-0099-0}, doi = {10.1007/S12095-014-0099-0}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ShanHZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CaoH14, author = {Weiwei Cao and Lei Hu}, title = {Projective interpolation of polynomial vectors and improved key recovery attack on {SFLASH}}, journal = {Des. Codes Cryptogr.}, volume = {73}, number = {3}, pages = {719--730}, year = {2014}, url = {https://doi.org/10.1007/s10623-013-9819-2}, doi = {10.1007/S10623-013-9819-2}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CaoH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ffa/ZhaHS14, author = {Zhengbang Zha and Lei Hu and Siwei Sun}, title = {Constructing new differentially 4-uniform permutations from the inverse function}, journal = {Finite Fields Their Appl.}, volume = {25}, pages = {64--78}, year = {2014}, url = {https://doi.org/10.1016/j.ffa.2013.08.003}, doi = {10.1016/J.FFA.2013.08.003}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ffa/ZhaHS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ffa/TuZH14, author = {Ziran Tu and Xiangyong Zeng and Lei Hu}, title = {Several classes of complete permutation polynomials}, journal = {Finite Fields Their Appl.}, volume = {25}, pages = {182--193}, year = {2014}, url = {https://doi.org/10.1016/j.ffa.2013.09.007}, doi = {10.1016/J.FFA.2013.09.007}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ffa/TuZH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ffa/CaoHZ14, author = {Xiwang Cao and Lei Hu and Zhengbang Zha}, title = {Constructing permutation polynomials from piecewise permutations}, journal = {Finite Fields Their Appl.}, volume = {26}, pages = {162--174}, year = {2014}, url = {https://doi.org/10.1016/j.ffa.2013.12.001}, doi = {10.1016/J.FFA.2013.12.001}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ffa/CaoHZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ffa/ZhengWHZ14, author = {Dabin Zheng and Xiaoqiang Wang and Lei Hu and Xiangyong Zeng}, title = {The weight distributions of two classes of p-ary cyclic codes}, journal = {Finite Fields Their Appl.}, volume = {29}, pages = {202--224}, year = {2014}, url = {https://doi.org/10.1016/j.ffa.2014.05.001}, doi = {10.1016/J.FFA.2014.05.001}, timestamp = {Fri, 23 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ffa/ZhengWHZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-com/XuHSX14, author = {Jun Xu and Lei Hu and Siwei Sun and Yonghong Xie}, title = {Cryptanalysis of countermeasures against multiple transmission attacks on {NTRU}}, journal = {{IET} Commun.}, volume = {8}, number = {12}, pages = {2142--2146}, year = {2014}, url = {https://doi.org/10.1049/iet-com.2013.1092}, doi = {10.1049/IET-COM.2013.1092}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-com/XuHSX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-com/XuHS14, author = {Jun Xu and Lei Hu and Siwei Sun}, title = {Cryptanalysis of two cryptosystems based on multiple intractability assumptions}, journal = {{IET} Commun.}, volume = {8}, number = {14}, pages = {2433--2437}, year = {2014}, url = {https://doi.org/10.1049/iet-com.2013.1101}, doi = {10.1049/IET-COM.2013.1101}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-com/XuHS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jossac/CaiZH14, author = {Han Cai and Xiangyong Zeng and Lei Hu}, title = {Families of \emph{p}-ary sequences with low correlation and large linear complexity}, journal = {J. Syst. Sci. Complex.}, volume = {27}, number = {6}, pages = {1305--1319}, year = {2014}, url = {https://doi.org/10.1007/s11424-014-1243-9}, doi = {10.1007/S11424-014-1243-9}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jossac/CaiZH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangH14, author = {Weijia Wang and Lei Hu}, title = {A generic homomorphic {MAC} construction for authentication in network coding}, journal = {Secur. Commun. Networks}, volume = {7}, number = {2}, pages = {429--433}, year = {2014}, url = {https://doi.org/10.1002/sec.847}, doi = {10.1002/SEC.847}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WangH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/WangH14, author = {Weijia Wang and Lei Hu}, title = {A Secure and Efficient Handover Authentication Protocol for Wireless Networks}, journal = {Sensors}, volume = {14}, number = {7}, pages = {11379--11394}, year = {2014}, url = {https://doi.org/10.3390/s140711379}, doi = {10.3390/S140711379}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/WangH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/staeors/YueJH14, author = {Peng Yue and Liangcun Jiang and Lei Hu}, title = {Google Fusion Tables for Managing Soil Moisture Sensor Observations}, journal = {{IEEE} J. Sel. Top. Appl. Earth Obs. Remote. Sens.}, volume = {7}, number = {11}, pages = {4414--4421}, year = {2014}, url = {https://doi.org/10.1109/JSTARS.2014.2353621}, doi = {10.1109/JSTARS.2014.2353621}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/staeors/YueJH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/LiZHLH14, author = {Chaoyun Li and Xiangyong Zeng and Tor Helleseth and Chunlei Li and Lei Hu}, title = {The Properties of a Class of Linear FSRs and Their Applications to the Construction of Nonlinear FSRs}, journal = {{IEEE} Trans. Inf. Theory}, volume = {60}, number = {5}, pages = {3052--3061}, year = {2014}, url = {https://doi.org/10.1109/TIT.2014.2310748}, doi = {10.1109/TIT.2014.2310748}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/LiZHLH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/HuangHXPX14, author = {Zhangjie Huang and Lei Hu and Jun Xu and Liqiang Peng and Yonghong Xie}, editor = {Ioana Boureanu and Philippe Owesarski and Serge Vaudenay}, title = {Partial Key Exposure Attacks on Takagi's Variant of {RSA}}, booktitle = {Applied Cryptography and Network Security - 12th International Conference, {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8479}, pages = {134--150}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-07536-5\_9}, doi = {10.1007/978-3-319-07536-5\_9}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/HuangHXPX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/PengHXHX14, author = {Liqiang Peng and Lei Hu and Jun Xu and Zhangjie Huang and Yonghong Xie}, editor = {David Pointcheval and Damien Vergnaud}, title = {Further Improvement of Factoring {RSA} Moduli with Implicit Hint}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2014 - 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8469}, pages = {165--177}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06734-6\_11}, doi = {10.1007/978-3-319-06734-6\_11}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/PengHXHX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/SunHWQMS14, author = {Siwei Sun and Lei Hu and Peng Wang and Kexin Qiao and Xiaoshuang Ma and Ling Song}, editor = {Palash Sarkar and Tetsu Iwata}, title = {Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, {DES(L)} and Other Bit-Oriented Block Ciphers}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8873}, pages = {158--178}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45611-8\_9}, doi = {10.1007/978-3-662-45611-8\_9}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/SunHWQMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/HuangHX14, author = {Zhangjie Huang and Lei Hu and Jun Xu}, editor = {Dongdai Lin and Moti Yung and Jianying Zhou}, title = {Attacking {RSA} with a Composed Decryption Exponent Using Unravelled Linearization}, booktitle = {Information Security and Cryptology - 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8957}, pages = {207--219}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-16745-9\_12}, doi = {10.1007/978-3-319-16745-9\_12}, timestamp = {Fri, 09 Apr 2021 18:52:22 +0200}, biburl = {https://dblp.org/rec/conf/cisc/HuangHX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/SongHSZSH14, author = {Ling Song and Lei Hu and Siwei Sun and Zhang Zhang and Danping Shi and Ronglin Hao}, editor = {Lucas Chi Kwong Hui and S. H. Qing and Elaine Shi and Siu{-}Ming Yiu}, title = {Error-Tolerant Algebraic Side-Channel Attacks Using {BEE}}, booktitle = {Information and Communications Security - 16th International Conference, {ICICS} 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8958}, pages = {1--15}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-21966-0\_1}, doi = {10.1007/978-3-319-21966-0\_1}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/SongHSZSH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icinfa/ZhaHS14, author = {Zhengbang Zha and Lei Hu and Jinyong Shan}, title = {Differentially 6-uniform permutations by modifying the Gold function}, booktitle = {{IEEE} International Conference on Information and Automation, {ICIA} 2014, Hailar, Hulun Buir, China, July 28-30, 2014}, pages = {961--965}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICInfA.2014.6932790}, doi = {10.1109/ICINFA.2014.6932790}, timestamp = {Mon, 09 Aug 2021 14:54:01 +0200}, biburl = {https://dblp.org/rec/conf/icinfa/ZhaHS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/XuHHP14, author = {Jun Xu and Lei Hu and Zhangjie Huang and Liqiang Peng}, editor = {Xinyi Huang and Jianying Zhou}, title = {Modular Inversion Hidden Number Problem Revisited}, booktitle = {Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8434}, pages = {537--551}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06320-1\_39}, doi = {10.1007/978-3-319-06320-1\_39}, timestamp = {Fri, 09 Apr 2021 18:45:22 +0200}, biburl = {https://dblp.org/rec/conf/ispec/XuHHP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lightsec/SongHMS14, author = {Ling Song and Lei Hu and Bingke Ma and Danping Shi}, editor = {Thomas Eisenbarth and Erdin{\c{c}} {\"{O}}zt{\"{u}}rk}, title = {Match Box Meet-in-the-Middle Attacks on the {SIMON} Family of Block Ciphers}, booktitle = {Lightweight Cryptography for Security and Privacy - Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8898}, pages = {140--151}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-16363-5\_9}, doi = {10.1007/978-3-319-16363-5\_9}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/lightsec/SongHMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/msn/HuZG14, author = {Lei Hu and Zhongnan Zhang and Fangyuan Gao}, title = {Probabilistic Snapshot Based Evolutionary Social Network Events Detection}, booktitle = {10th International Conference on Mobile Ad-hoc and Sensor Networks, {MSN} 2014, Maui, HI, USA, December 19-21, 2014}, pages = {243--250}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/MSN.2014.40}, doi = {10.1109/MSN.2014.40}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/msn/HuZG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/MaHSQS14, author = {Xiaoshuang Ma and Lei Hu and Siwei Sun and Kexin Qiao and Jinyong Shan}, editor = {Man Ho Au and Barbara Carminati and C.{-}C. Jay Kuo}, title = {Tighter Security Bound of {MIBS} Block Cipher against Differential Attack}, booktitle = {Network and System Security - 8th International Conference, {NSS} 2014, Xi'an, China, October 15-17, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8792}, pages = {518--525}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11698-3\_41}, doi = {10.1007/978-3-319-11698-3\_41}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/MaHSQS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/CaoH14, author = {Xiwang Cao and Lei Hu}, title = {Two Boolean functions with five-valued Walsh spectra and high nonlinearity}, journal = {CoRR}, volume = {abs/1406.4567}, year = {2014}, url = {http://arxiv.org/abs/1406.4567}, eprinttype = {arXiv}, eprint = {1406.4567}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/CaoH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SongHSZSH14a, author = {Ling Song and Lei Hu and Siwei Sun and Zhang Zhang and Danping Shi and Ronglin Hao}, title = {Error-Tolerant Algebraic Side-Channel Attacks Using {BEE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {683}, year = {2014}, url = {http://eprint.iacr.org/2014/683}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SongHSZSH14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SunHWWQMSS14, author = {Siwei Sun and Lei Hu and Meiqin Wang and Peng Wang and Kexin Qiao and Xiaoshuang Ma and Danping Shi and Ling Song}, title = {Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties and Its Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {747}, year = {2014}, url = {http://eprint.iacr.org/2014/747}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SunHWWQMSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XuHHP14, author = {Jun Xu and Lei Hu and Zhangjie Huang and Liqiang Peng}, title = {Finding Small Solutions of a Class of Simultaneous Modular Equations and Applications to Modular Inversion Hidden Number Problem and Inversive Congruential Generator}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {843}, year = {2014}, url = {http://eprint.iacr.org/2014/843}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/XuHHP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShiHSSQM14, author = {Danping Shi and Lei Hu and Siwei Sun and Ling Song and Kexin Qiao and Xiaoshuang Ma}, title = {Improved Linear (hull) Cryptanalysis of Round-reduced Versions of {SIMON}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {973}, year = {2014}, url = {http://eprint.iacr.org/2014/973}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShiHSSQM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YangHSQSSM14, author = {Qianqian Yang and Lei Hu and Siwei Sun and Kexin Qiao and Ling Song and Jinyong Shan and Xiaoshuang Ma}, title = {Improved Differential Analysis of Block Cipher {PRIDE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {978}, year = {2014}, url = {http://eprint.iacr.org/2014/978}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YangHSQSSM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShanHSSM14, author = {Jinyong Shan and Lei Hu and Ling Song and Siwei Sun and Xiaoshuang Ma}, title = {Related-Key Differential Attack on Round Reduced {RECTANGLE-80}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {986}, year = {2014}, url = {http://eprint.iacr.org/2014/986}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShanHSSM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aaecc/ZhengYH13, author = {Dabin Zheng and Long Yu and Lei Hu}, title = {On a class of binomial bent functions over the finite fields of odd characteristic}, journal = {Appl. Algebra Eng. Commun. Comput.}, volume = {24}, number = {6}, pages = {461--475}, year = {2013}, url = {https://doi.org/10.1007/s00200-013-0202-3}, doi = {10.1007/S00200-013-0202-3}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aaecc/ZhengYH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cbm/HuZLWYTFZDW13, author = {Lei Hu and Jie Zhang and Changsheng Li and Yun Wang and Yan Yang and Peifu Tang and Liming Fang and Lihai Zhang and Hailong Du and Liquan Wang}, title = {A femur fracture reduction method based on anatomy of the contralateral side}, journal = {Comput. Biol. Medicine}, volume = {43}, number = {7}, pages = {840--846}, year = {2013}, url = {https://doi.org/10.1016/j.compbiomed.2013.04.009}, doi = {10.1016/J.COMPBIOMED.2013.04.009}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cbm/HuZLWYTFZDW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/HuZSF13, author = {Lei Hu and Jianxiong Zhou and Zhiguang Shi and Qiang Fu}, title = {Compressed sensing of superimposed chirps with adaptive dictionary refinement}, journal = {Sci. China Inf. Sci.}, volume = {56}, number = {12}, pages = {1--15}, year = {2013}, url = {https://doi.org/10.1007/s11432-013-4838-1}, doi = {10.1007/S11432-013-4838-1}, timestamp = {Wed, 10 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/HuZSF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/digearth/YueZGH13, author = {Peng Yue and Hongxiu Zhou and Jianya Gong and Lei Hu}, title = {Geoprocessing in Cloud Computing platforms - a comparative analysis}, journal = {Int. J. Digit. Earth}, volume = {6}, number = {4}, pages = {404--425}, year = {2013}, url = {https://doi.org/10.1080/17538947.2012.748847}, doi = {10.1080/17538947.2012.748847}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/digearth/YueZGH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-com/PengHXXZ13, author = {Liqiang Peng and Lei Hu and Jun Xu and Yonghong Xie and Jinyin Zuo}, title = {Analysis of two knapsack public key cryptosystems}, journal = {{IET} Commun.}, volume = {7}, number = {15}, pages = {1638--1643}, year = {2013}, url = {https://doi.org/10.1049/iet-com.2013.0180}, doi = {10.1049/IET-COM.2013.0180}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-com/PengHXXZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijfcs/CaiZTH13, author = {Han Cai and Xiangyong Zeng and Xiaohu Tang and Lei Hu}, title = {New Optimal frequency Hopping sequence Sets from Balanced Nested difference Packings of Partition-Type}, journal = {Int. J. Found. Comput. Sci.}, volume = {24}, number = {4}, pages = {533}, year = {2013}, url = {https://doi.org/10.1142/S0129054113500196}, doi = {10.1142/S0129054113500196}, timestamp = {Tue, 06 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijfcs/CaiZTH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijfcs/ZhaH13, author = {Zhengbang Zha and Lei Hu}, title = {Constructing New {APN} Functions from known {PN} Functions}, journal = {Int. J. Found. Comput. Sci.}, volume = {24}, number = {8}, pages = {1209--1220}, year = {2013}, url = {https://doi.org/10.1142/S0129054113500299}, doi = {10.1142/S0129054113500299}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijfcs/ZhaH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/irob/HuWZZCMJFZ13, author = {Lei Hu and Yun Wang and Jie Zhang and Jun Zhang and Yan Cui and Lvzhong Ma and Junyuan Jiang and Liming Fang and Bangcheng Zhang}, title = {A massage robot based on Chinese massage therapy}, journal = {Ind. Robot}, volume = {40}, number = {2}, pages = {158--172}, year = {2013}, url = {https://doi.org/10.1108/01439911311297775}, doi = {10.1108/01439911311297775}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/irob/HuWZZCMJFZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tgrs/SunYHGZL13, author = {Ziheng Sun and Peng Yue and Lei Hu and Jianya Gong and Liangpei Zhang and Xianchang Lu}, title = {GeoPWProv: Interleaving Map and Faceted Metadata for Provenance Visualization and Navigation}, journal = {{IEEE} Trans. Geosci. Remote. Sens.}, volume = {51}, number = {11}, pages = {5131--5136}, year = {2013}, url = {https://doi.org/10.1109/TGRS.2013.2248064}, doi = {10.1109/TGRS.2013.2248064}, timestamp = {Tue, 07 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tgrs/SunYHGZL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsp/HuZSF13, author = {Lei Hu and Jianxiong Zhou and Zhiguang Shi and Qiang Fu}, title = {A Fast and Accurate Reconstruction Algorithm for Compressed Sensing of Complex Sinusoids}, journal = {{IEEE} Trans. Signal Process.}, volume = {61}, number = {22}, pages = {5744--5754}, year = {2013}, url = {https://doi.org/10.1109/TSP.2013.2280125}, doi = {10.1109/TSP.2013.2280125}, timestamp = {Wed, 10 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsp/HuZSF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/appt/HuSL13, author = {Lei Hu and Xukun Shen and Xiang Long}, editor = {Chenggang Wu and Albert Cohen}, title = {Research on {SPH} Parallel Acceleration Strategies for Multi-GPU Platform}, booktitle = {Advanced Parallel Processing Technologies - 10th International Symposium, {APPT} 2013, Stockholm, Sweden, August 27-28, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8299}, pages = {104--118}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-45293-2\_8}, doi = {10.1007/978-3-642-45293-2\_8}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/appt/HuSL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cikm/LiXLLGSLHC13, author = {Dong Li and Zhiming Xu and Yishu Luo and Sheng Li and Anika Gupta and Katia P. Sycara and Shengmei Luo and Lei Hu and Hong Chen}, editor = {Qi He and Arun Iyengar and Wolfgang Nejdl and Jian Pei and Rajeev Rastogi}, title = {Modeling information diffusion over social networks for temporal dynamic prediction}, booktitle = {22nd {ACM} International Conference on Information and Knowledge Management, CIKM'13, San Francisco, CA, USA, October 27 - November 1, 2013}, pages = {1477--1480}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2505515.2507823}, doi = {10.1145/2505515.2507823}, timestamp = {Sun, 26 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cikm/LiXLLGSLHC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/SunHSXW13, author = {Siwei Sun and Lei Hu and Ling Song and Yonghong Xie and Peng Wang}, editor = {Dongdai Lin and Shouhuai Xu and Moti Yung}, title = {Automatic Security Evaluation of Block Ciphers with S-bP Structures Against Related-Key Differential Attacks}, booktitle = {Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8567}, pages = {39--51}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-12087-4\_3}, doi = {10.1007/978-3-319-12087-4\_3}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/SunHSXW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drr/ZhuHZ13, author = {Siyu Zhu and Lei Hu and Richard Zanibbi}, editor = {Richard Zanibbi and Bertrand Co{\"{u}}asnon}, title = {Rotation-robust math symbol recognition and retrieval using outer contours and image subsampling}, booktitle = {Document Recognition and Retrieval XX, part of the IS{\&}T-SPIE Electronic Imaging Symposium, Burlingame, California, USA, February 5-7, 2013, Proceedings}, series = {{SPIE} Proceedings}, volume = {8658}, pages = {865805}, publisher = {{SPIE}}, year = {2013}, url = {https://doi.org/10.1117/12.2008383}, doi = {10.1117/12.2008383}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drr/ZhuHZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdar/HuZ13, author = {Lei Hu and Richard Zanibbi}, title = {Segmenting Handwritten Math Symbols Using AdaBoost and Multi-scale Shape Context Features}, booktitle = {12th International Conference on Document Analysis and Recognition, {ICDAR} 2013, Washington, DC, USA, August 25-28, 2013}, pages = {1180--1184}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ICDAR.2013.239}, doi = {10.1109/ICDAR.2013.239}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdar/HuZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/SongH13, author = {Ling Song and Lei Hu}, editor = {Robert H. Deng and Tao Feng}, title = {Improved Algebraic and Differential Fault Attacks on the {KATAN} Block Cipher}, booktitle = {Information Security Practice and Experience - 9th International Conference, {ISPEC} 2013, Lanzhou, China, May 12-14, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7863}, pages = {372--386}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38033-4\_27}, doi = {10.1007/978-3-642-38033-4\_27}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispec/SongH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lightsec/SongH13, author = {Ling Song and Lei Hu}, editor = {Gildas Avoine and Orhun Kara}, title = {Differential Fault Attack on the {PRINCE} Block Cipher}, booktitle = {Lightweight Cryptography for Security and Privacy - Second International Workshop, LightSec 2013, Gebze, Turkey, May 6-7, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8162}, pages = {43--54}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40392-7\_4}, doi = {10.1007/978-3-642-40392-7\_4}, timestamp = {Wed, 07 Dec 2022 23:13:43 +0100}, biburl = {https://dblp.org/rec/conf/lightsec/SongH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/WangHL13, author = {Weijia Wang and Lei Hu and Yong Li}, editor = {Javier L{\'{o}}pez and Xinyi Huang and Ravi S. Sandhu}, title = {Privacy-Preserving Password-Based Authenticated Key Exchange in the Three-Party Setting}, booktitle = {Network and System Security - 7th International Conference, {NSS} 2013, Madrid, Spain, June 3-4, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7873}, pages = {507--520}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38631-2\_37}, doi = {10.1007/978-3-642-38631-2\_37}, timestamp = {Tue, 09 Feb 2021 08:50:29 +0100}, biburl = {https://dblp.org/rec/conf/nss/WangHL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/TuZHL13, author = {Ziran Tu and Xiangyong Zeng and Lei Hu and Chunlei Li}, title = {A Class of Binomial Permutation Polynomials}, journal = {CoRR}, volume = {abs/1310.0337}, year = {2013}, url = {http://arxiv.org/abs/1310.0337}, eprinttype = {arXiv}, eprint = {1310.0337}, timestamp = {Mon, 24 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/TuZHL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SongH13, author = {Ling Song and Lei Hu}, title = {Differential Fault Attack on the {PRINCE} Block Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {43}, year = {2013}, url = {http://eprint.iacr.org/2013/043}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SongH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SunHSXW13, author = {Siwei Sun and Lei Hu and Ling Song and Yonghong Xie and Peng Wang}, title = {Automatic Security Evaluation of Block Ciphers with S-bP Structures against Related-key Differential Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {547}, year = {2013}, url = {http://eprint.iacr.org/2013/547}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SunHSXW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SunHW13, author = {Siwei Sun and Lei Hu and Peng Wang}, title = {Automatic Security Evaluation for Bit-oriented Block Ciphers in Related-key Model: Application to PRESENT-80, LBlock and Others}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {676}, year = {2013}, url = {http://eprint.iacr.org/2013/676}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SunHW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cma/GuoH12, author = {Lifeng Guo and Lei Hu}, title = {Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security}, journal = {Comput. Math. Appl.}, volume = {63}, number = {1}, pages = {151--157}, year = {2012}, url = {https://doi.org/10.1016/j.camwa.2011.11.002}, doi = {10.1016/J.CAMWA.2011.11.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cma/GuoH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cmpb/LuanWLLJH12, author = {Sheng Luan and Tianmiao Wang and Weishi Li and Zhongjun Liu and Liang Jiang and Lei Hu}, title = {3D navigation and monitoring for spinal milling operation based on registration between multiplanar fluoroscopy and {CT} images}, journal = {Comput. Methods Programs Biomed.}, volume = {108}, number = {1}, pages = {151--157}, year = {2012}, url = {https://doi.org/10.1016/j.cmpb.2012.02.007}, doi = {10.1016/J.CMPB.2012.02.007}, timestamp = {Sat, 30 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cmpb/LuanWLLJH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CaoH12, author = {Xiwang Cao and Lei Hu}, title = {On the reducibility of some composite polynomials over finite fields}, journal = {Des. Codes Cryptogr.}, volume = {64}, number = {3}, pages = {229--239}, year = {2012}, url = {https://doi.org/10.1007/s10623-011-9566-1}, doi = {10.1007/S10623-011-9566-1}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CaoH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ffa/ZengSH12, author = {Xiangyong Zeng and Jinyong Shan and Lei Hu}, title = {A triple-error-correcting cyclic code from the Gold and Kasami-Welch {APN} power functions}, journal = {Finite Fields Their Appl.}, volume = {18}, number = {1}, pages = {70--92}, year = {2012}, url = {https://doi.org/10.1016/j.ffa.2011.06.005}, doi = {10.1016/J.FFA.2011.06.005}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ffa/ZengSH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ffa/ZhaH12, author = {Zhengbang Zha and Lei Hu}, title = {Two classes of permutation polynomials over finite fields}, journal = {Finite Fields Their Appl.}, volume = {18}, number = {4}, pages = {781--790}, year = {2012}, url = {https://doi.org/10.1016/j.ffa.2012.02.003}, doi = {10.1016/J.FFA.2012.02.003}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ffa/ZhaH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/LuHHN12, author = {Li Lu and Jinsong Han and Lei Hu and Lionel M. Ni}, title = {Dynamic Key-Updating: Privacy-Preserving Authentication for {RFID} Systems}, journal = {Int. J. Distributed Sens. Networks}, volume = {8}, year = {2012}, url = {https://doi.org/10.1155/2012/153912}, doi = {10.1155/2012/153912}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/LuHHN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/DuCH12, author = {Xiaoni Du and Zhixiong Chen and Lei Hu}, title = {Linear complexity of binary sequences derived from Euler quotients with prime-power modulus}, journal = {Inf. Process. Lett.}, volume = {112}, number = {14-15}, pages = {604--609}, year = {2012}, url = {https://doi.org/10.1016/j.ipl.2012.04.011}, doi = {10.1016/J.IPL.2012.04.011}, timestamp = {Fri, 29 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/DuCH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/LiuZZWYHD12, author = {Jianyun Liu and Yuhang Zhao and Zhao{-}Xiang Zhang and Yun{-}Hong Wang and Xue{-}Mei Yuan and Lei Hu and Zhenjiang Dong}, title = {Spam Short Messages Detection via Mining Social Networks}, journal = {J. Comput. Sci. Technol.}, volume = {27}, number = {3}, pages = {506--514}, year = {2012}, url = {https://doi.org/10.1007/s11390-012-1239-7}, doi = {10.1007/S11390-012-1239-7}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcst/LiuZZWYHD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jossac/XieH12, author = {Yonghong Xie and Lei Hu}, title = {A matrix construction of Boolean functions with maximum algebraic immunity}, journal = {J. Syst. Sci. Complex.}, volume = {25}, number = {4}, pages = {792--801}, year = {2012}, url = {https://doi.org/10.1007/s11424-012-0286-z}, doi = {10.1007/S11424-012-0286-Z}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jossac/XieH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tgis/SunYLZH12, author = {Ziheng Sun and Peng Yue and Xianchang Lu and Xi Zhai and Lei Hu}, title = {A Task Ontology Driven Approach for Live Geoprocessing in a Service-Oriented Environment}, journal = {Trans. {GIS}}, volume = {16}, number = {6}, pages = {867--884}, year = {2012}, url = {https://doi.org/10.1111/j.1467-9671.2012.01364.x}, doi = {10.1111/J.1467-9671.2012.01364.X}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tgis/SunYLZH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsp/HuSZF12, author = {Lei Hu and Zhiguang Shi and Jianxiong Zhou and Qiang Fu}, title = {Compressed Sensing of Complex Sinusoids: An Approach Based on Dictionary Refinement}, journal = {{IEEE} Trans. Signal Process.}, volume = {60}, number = {7}, pages = {3809--3822}, year = {2012}, url = {https://doi.org/10.1109/TSP.2012.2193392}, doi = {10.1109/TSP.2012.2193392}, timestamp = {Wed, 10 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsp/HuSZF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bmei/GuoHLJZCC12, author = {Yong Xin Guo and Lei Hu and Yan{-}Chun Li and Qing Jiao and Guang{-}Yu Zhang and Di Chen and Dong Cui}, editor = {Tianqi Zhang}, title = {Measurement of fundus vessel diameter based on fundus fluorescence angiography image}, booktitle = {5th International Conference on BioMedical Engineering and Informatics, {BMEI} 2012, Chongqing, China, October 16-18, 2012}, pages = {309--312}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/BMEI.2012.6512902}, doi = {10.1109/BMEI.2012.6512902}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/bmei/GuoHLJZCC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/XuHSW12, author = {Jun Xu and Lei Hu and Siwei Sun and Ping Wang}, editor = {Josef Pieprzyk and Ahmad{-}Reza Sadeghi and Mark Manulis}, title = {Cryptanalysis of a Lattice-Knapsack Mixed Public Key Cryptosystem}, booktitle = {Cryptology and Network Security, 11th International Conference, {CANS} 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings}, volume = {7712}, pages = {32--42}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35404-5\_4}, doi = {10.1007/978-3-642-35404-5\_4}, timestamp = {Sun, 02 Jun 2019 21:12:31 +0200}, biburl = {https://dblp.org/rec/conf/cans/XuHSW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/XuHS12, author = {Jun Xu and Lei Hu and Siwei Sun}, editor = {Tat Wing Chim and Tsz Hon Yuen}, title = {Implicit Polynomial Recovery and Cryptanalysis of a Combinatorial Key Cryptosystem}, booktitle = {Information and Communications Security - 14th International Conference, {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7618}, pages = {45--57}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34129-8\_5}, doi = {10.1007/978-3-642-34129-8\_5}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/XuHS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpr/HuHPZ12, author = {Lei Hu and Kevin Hart and Richard Pospesel and Richard Zanibbi}, title = {Baseline extraction-driven Parsing of handwritten mathematical expressions}, booktitle = {Proceedings of the 21st International Conference on Pattern Recognition, {ICPR} 2012, Tsukuba, Japan, November 11-15, 2012}, pages = {326--330}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6460138/}, timestamp = {Tue, 10 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icpr/HuHPZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pg/ZhangSLZH12, author = {Fengquan Zhang and Xukun Shen and Xiang Long and Bin Zhao and Lei Hu}, editor = {Chris Bregler and Pedro V. Sander and Michael Wimmer}, title = {Real-time Particle Fluid Simulation with {WCSPH}}, booktitle = {20th Pacific Conference on Computer Graphics and Applications, {PG} 2012 - Short Papers, Hong Kong, September 12-14, 2012}, publisher = {Eurographics Association}, year = {2012}, url = {https://doi.org/10.2312/PE/PG/PG2012short/029-034}, doi = {10.2312/PE/PG/PG2012SHORT/029-034}, timestamp = {Wed, 26 May 2021 11:51:06 +0200}, biburl = {https://dblp.org/rec/conf/pg/ZhangSLZH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aaecc/SunZSH11, author = {Zhimin Sun and Xiangyong Zeng and Wei Su and Lei Hu}, title = {Aperiodic correlation of Kasami sequences in the small set}, journal = {Appl. Algebra Eng. Commun. Comput.}, volume = {22}, number = {4}, pages = {311--320}, year = {2011}, url = {https://doi.org/10.1007/s00200-011-0152-6}, doi = {10.1007/S00200-011-0152-6}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aaecc/SunZSH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aaecc/TuZZH11, author = {Ziran Tu and Dabin Zheng and Xiangyong Zeng and Lei Hu}, title = {Boolean functions with two distinct Walsh coefficients}, journal = {Appl. Algebra Eng. Commun. Comput.}, volume = {22}, number = {5-6}, pages = {359--366}, year = {2011}, url = {https://doi.org/10.1007/s00200-011-0155-3}, doi = {10.1007/S00200-011-0155-3}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aaecc/TuZZH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ffa/CaoH11, author = {Xiwang Cao and Lei Hu}, title = {New methods for generating permutation polynomials over finite fields}, journal = {Finite Fields Their Appl.}, volume = {17}, number = {6}, pages = {493--503}, year = {2011}, url = {https://doi.org/10.1016/j.ffa.2011.02.012}, doi = {10.1016/J.FFA.2011.02.012}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ffa/CaoH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ZhengZH11, author = {Dabin Zheng and Xiangyong Zeng and Lei Hu}, title = {A Family of \emph{p}-ary Binomial Bent Functions}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {94-A}, number = {9}, pages = {1868--1872}, year = {2011}, url = {https://doi.org/10.1587/transfun.E94.A.1868}, doi = {10.1587/TRANSFUN.E94.A.1868}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ZhengZH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcm/SuZH11, author = {Wei Su and Xiangyong Zeng and Lei Hu}, title = {Construction of 1-resilient Boolean functions with optimum algebraic immunity}, journal = {Int. J. Comput. Math.}, volume = {88}, number = {2}, pages = {222--238}, year = {2011}, url = {https://doi.org/10.1080/00207160903496985}, doi = {10.1080/00207160903496985}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcm/SuZH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/LiTZH11, author = {Nian Li and Xiaohu Tang and Xiangyong Zeng and Lei Hu}, title = {On the Correlation Distributions of the Optimal Quaternary Sequence Family \emph{U} and the Optimal Binary Sequence Family \emph{V}}, journal = {{IEEE} Trans. Inf. Theory}, volume = {57}, number = {6}, pages = {3815--3824}, year = {2011}, url = {https://doi.org/10.1109/TIT.2011.2132670}, doi = {10.1109/TIT.2011.2132670}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/LiTZH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/ZengCSH11, author = {Xiangyong Zeng and Claude Carlet and Jinyong Shan and Lei Hu}, title = {More Balanced Boolean Functions With Optimal Algebraic Immunity and Good Nonlinearity and Resistance to Fast Algebraic Attacks}, journal = {{IEEE} Trans. Inf. Theory}, volume = {57}, number = {9}, pages = {6310--6320}, year = {2011}, url = {https://doi.org/10.1109/TIT.2011.2109935}, doi = {10.1109/TIT.2011.2109935}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/ZengCSH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsp/ShiZHL11, author = {Zhiguang Shi and Jianxiong Zhou and Lei Hu and Jicheng Li}, title = {A New Derivation of Constrained Cram{\'{e}}r-Rao Bound Via Norm Minimization}, journal = {{IEEE} Trans. Signal Process.}, volume = {59}, number = {4}, pages = {1879--1882}, year = {2011}, url = {https://doi.org/10.1109/TSP.2010.2104147}, doi = {10.1109/TSP.2010.2104147}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsp/ShiZHL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bmei/YangHW11, author = {Yan Yang and Lei Hu and Junchen Wang}, editor = {Yongsheng Ding and Yonghong Peng and Riyi Shi and Kuangrong Hao and Lipo Wang}, title = {A fluoroscopy-based navigation system for fixation of femoral neck fracture}, booktitle = {4th International Conference on Biomedical Engineering and Informatics, {BMEI} 2011, Shanghai, China, October 15-17, 2011}, pages = {24--28}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/BMEI.2011.6098336}, doi = {10.1109/BMEI.2011.6098336}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/bmei/YangHW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bmei/WangWHLLS11, author = {Junchen Wang and Tianmiao Wang and Lei Hu and Hongen Liao and Kuan Luan and Ichiro Sakuma}, editor = {Yongsheng Ding and Yonghong Peng and Riyi Shi and Kuangrong Hao and Lipo Wang}, title = {A fully automatic 2D ultrasound probe calibration method using a simple phantom}, booktitle = {4th International Conference on Biomedical Engineering and Informatics, {BMEI} 2011, Shanghai, China, October 15-17, 2011}, pages = {588--592}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/BMEI.2011.6098408}, doi = {10.1109/BMEI.2011.6098408}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bmei/WangWHLLS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/SunHXZ11, author = {Siwei Sun and Lei Hu and Yonghong Xie and Xiangyong Zeng}, editor = {Dongdai Lin and Gene Tsudik and Xiaoyun Wang}, title = {Cube Cryptanalysis of Hitag2 Stream Cipher}, booktitle = {Cryptology and Network Security - 10th International Conference, {CANS} 2011, Sanya, China, December 10-12, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7092}, pages = {15--25}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25513-7\_3}, doi = {10.1007/978-3-642-25513-7\_3}, timestamp = {Mon, 25 Nov 2019 15:32:12 +0100}, biburl = {https://dblp.org/rec/conf/cans/SunHXZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/HuangH11, author = {Guifang Huang and Lei Hu}, editor = {Chuankun Wu and Moti Yung and Dongdai Lin}, title = {Concurrent Non-Malleable Witness Indistinguishable Argument from Any One-Way Function}, booktitle = {Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Beijing, China, November 30 - December 3, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7537}, pages = {363--378}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-34704-7\_25}, doi = {10.1007/978-3-642-34704-7\_25}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/HuangH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codcry/LiZH11, author = {Jie Li and Xiangyong Zeng and Lei Hu}, editor = {Yeow Meng Chee and Zhenbo Guo and San Ling and Fengjing Shao and Yuansheng Tang and Huaxiong Wang and Chaoping Xing}, title = {A New Family of Quadriphase Sequences with Low Correlation}, booktitle = {Coding and Cryptology - Third International Workshop, {IWCC} 2011, Qingdao, China, May 30-June 3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6639}, pages = {246--262}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20901-7\_16}, doi = {10.1007/978-3-642-20901-7\_16}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/codcry/LiZH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccl2/HuSVZ11, author = {Lei Hu and Xiaoning Shi and Stefan Vo{\ss} and Weigang Zhang}, editor = {J{\"{u}}rgen B{\"{o}}se and Hao Hu and Carlos Jahn and Xiaoning Shi and Robert Stahlbock and Stefan Vo{\ss}}, title = {Application of {RFID} Technology at the Entrance Gate of Container Terminals}, booktitle = {Computational Logistics - Second International Conference, {ICCL} 2011, Hamburg, Germany, September 19-22, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6971}, pages = {209--220}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24264-9\_16}, doi = {10.1007/978-3-642-24264-9\_16}, timestamp = {Thu, 22 Feb 2024 09:06:52 +0100}, biburl = {https://dblp.org/rec/conf/iccl2/HuSVZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdar/HuZ11, author = {Lei Hu and Richard Zanibbi}, title = {HMM-Based Recognition of Online Handwritten Mathematical Symbols Using Segmental K-Means Initialization and a Modified Pen-Up/Down Feature}, booktitle = {2011 International Conference on Document Analysis and Recognition, {ICDAR} 2011, Beijing, China, September 18-21, 2011}, pages = {457--462}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ICDAR.2011.98}, doi = {10.1109/ICDAR.2011.98}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdar/HuZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/igarss/GaoHH11, author = {Feng Gao and Lei Hu and Zhaofeng He}, title = {Bridge extraction based on on constrained Delaunay triangulation for panchromatic image}, booktitle = {2011 {IEEE} International Geoscience and Remote Sensing Symposium, {IGARSS} 2011, Vancouver, BC, Canada, July 24-29, 2011}, pages = {1429--1432}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/IGARSS.2011.6049334}, doi = {10.1109/IGARSS.2011.6049334}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/igarss/GaoHH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/igarss/HuZG11, author = {Lei Hu and Jin Zheng and Feng Gao}, title = {A building extraction method using shadow in high resolution multispectral images}, booktitle = {2011 {IEEE} International Geoscience and Remote Sensing Symposium, {IGARSS} 2011, Vancouver, BC, Canada, July 24-29, 2011}, pages = {1862--1865}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/IGARSS.2011.6049486}, doi = {10.1109/IGARSS.2011.6049486}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/igarss/HuZG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/CaoHDY11, author = {Weiwei Cao and Lei Hu and Jintai Ding and Zhijun Yin}, editor = {Feng Bao and Jian Weng}, title = {Kipnis-Shamir Attack on Unbalanced Oil-Vinegar Scheme}, booktitle = {Information Security Practice and Experience - 7th International Conference, {ISPEC} 2011, Guangzhou, China, May 30 - June 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6672}, pages = {168--180}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21031-0\_13}, doi = {10.1007/978-3-642-21031-0\_13}, timestamp = {Tue, 12 May 2020 10:56:38 +0200}, biburl = {https://dblp.org/rec/conf/ispec/CaoHDY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vrcai/ZhangHWS11, author = {Fengquan Zhang and Lei Hu and Jiawen Wu and Xukun Shen}, editor = {Zhi{-}Qiang Liu and Joaquim A. Jorge and Zhigeng Pan and Xiaopeng Zhang and Oscar Kin{-}Chung Au and Weiming Dong}, title = {A SPH-based method for interactive fluids simulation on the multi-GPU}, booktitle = {Proceedings of the 10th International Conference on Virtual Reality Continuum and its Applications in Industry, {VRCAI} 2011, Hong Kong, China, December 11-12, 2011}, pages = {423--426}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2087756.2087834}, doi = {10.1145/2087756.2087834}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vrcai/ZhangHWS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/waim/NiZCLH11, author = {Weiwei Ni and Jinwang Zheng and Zhihong Chong and Shan Lu and Lei Hu}, editor = {Haixun Wang and Shijun Li and Satoshi Oyama and Xiaohua Hu and Tieyun Qian}, title = {Location Privacy Protection in the Presence of Users' Preferences}, booktitle = {Web-Age Information Management - 12th International Conference, {WAIM} 2011, Wuhan, China, September 14-16, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6897}, pages = {340--352}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23535-1\_30}, doi = {10.1007/978-3-642-23535-1\_30}, timestamp = {Fri, 09 Apr 2021 17:11:09 +0200}, biburl = {https://dblp.org/rec/conf/waim/NiZCLH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aaecc/ZengZH10, author = {Xiangyong Zeng and Xishun Zhu and Lei Hu}, title = {Two new permutation polynomials with the form (\emph{x}\({}^{\mbox{2\({}^{\mbox{\emph{k}}}\)}}\)+\emph{x}+d)\({}^{\mbox{\emph{s}}}\)+\emph{x} over \emph{F}\({}_{\mbox{2\({}^{\mbox{\emph{n}}}\)}}\)}, journal = {Appl. Algebra Eng. Commun. Comput.}, volume = {21}, number = {2}, pages = {145--150}, year = {2010}, url = {https://doi.org/10.1007/s00200-010-0120-6}, doi = {10.1007/S00200-010-0120-6}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aaecc/ZengZH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aaecc/XiaZH10, author = {Yongbo Xia and Xiangyong Zeng and Lei Hu}, title = {Further crosscorrelation properties of sequences with the decimation factor \emph{d}=(\emph{p}\({}^{\mbox{\emph{n}}}\)+1)/(\emph{p}+1)-(\emph{p}\({}^{\mbox{\emph{n}}}\)-1)/2}, journal = {Appl. Algebra Eng. Commun. Comput.}, volume = {21}, number = {5}, pages = {329--342}, year = {2010}, url = {https://doi.org/10.1007/s00200-010-0128-y}, doi = {10.1007/S00200-010-0128-Y}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aaecc/XiaZH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aaecc/JiangHZ10, author = {Wenfeng Jiang and Lei Hu and Xiangyong Zeng}, title = {On the generalized large set of Kasami sequences}, journal = {Appl. Algebra Eng. Commun. Comput.}, volume = {21}, number = {6}, pages = {417--441}, year = {2010}, url = {https://doi.org/10.1007/s00200-010-0131-3}, doi = {10.1007/S00200-010-0131-3}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aaecc/JiangHZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ffa/ZengHJYC10, author = {Xiangyong Zeng and Lei Hu and Wenfeng Jiang and Qin Yue and Xiwang Cao}, title = {The weight distribution of a class of p-ary cyclic codes}, journal = {Finite Fields Their Appl.}, volume = {16}, number = {1}, pages = {56--73}, year = {2010}, url = {https://doi.org/10.1016/j.ffa.2009.12.001}, doi = {10.1016/J.FFA.2009.12.001}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ffa/ZengHJYC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/WangHL10, author = {Weijia Wang and Lei Hu and Yong Li}, title = {Security Analysis of a Dynamic Program Update Protocol for Wireless Sensor Networks}, journal = {{IEEE} Commun. Lett.}, volume = {14}, number = {8}, pages = {782--784}, year = {2010}, url = {https://doi.org/10.1109/LCOMM.2010.08.100406}, doi = {10.1109/LCOMM.2010.08.100406}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icl/WangHL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcm/XiaZH10, author = {Yongbo Xia and Xiangyong Zeng and Lei Hu}, title = {The large set of \emph{p}-ary Kasami sequences}, journal = {Int. J. Comput. Math.}, volume = {87}, number = {7}, pages = {1436--1455}, year = {2010}, url = {https://doi.org/10.1080/00207160802380918}, doi = {10.1080/00207160802380918}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcm/XiaZH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/WangHL10, author = {Weijia Wang and Lei Hu and Yong Li}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {How to Construct Secure and Efficient Three-Party Password-Based Authenticated Key Exchange Protocols}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {218--235}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_16}, doi = {10.1007/978-3-642-21518-6\_16}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/WangHL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/JiangHDS10, author = {Xin Jiang and Lei Hu and Jintai Ding and Siwei Sun}, editor = {Isao Echizen and Noboru Kunihiro and Ry{\^{o}}ichi Sasaki}, title = {On the Kipnis-Shamir Method Solving the MinRank Problem}, booktitle = {Advances in Information and Computer Security - 5th International Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010. Short Paper Proceedings}, pages = {1--13}, publisher = {Information Processing Society of Japan {(IPSJ)}}, year = {2010}, timestamp = {Thu, 15 Sep 2011 15:14:43 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/JiangHDS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pcm/HuJLG10, author = {Lei Hu and Yan Ji and Yang Li and Feng Gao}, editor = {Guoping Qiu and Kin{-}Man Lam and Hitoshi Kiya and Xiangyang Xue and C.{-}C. Jay Kuo and Michael S. Lew}, title = {{SAR} Image Segmentation Based on Kullback-Leibler Distance of Edgeworth}, booktitle = {Advances in Multimedia Information Processing - {PCM} 2010 - 11th Pacific Rim Conference on Multimedia, Shanghai, China, September 21-24, 2010, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {6297}, pages = {549--557}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15702-8\_50}, doi = {10.1007/978-3-642-15702-8\_50}, timestamp = {Mon, 26 Jun 2023 20:47:39 +0200}, biburl = {https://dblp.org/rec/conf/pcm/HuJLG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/CaoNHTD10, author = {Weiwei Cao and Xuyun Nie and Lei Hu and Xiling Tang and Jintai Ding}, editor = {Nicolas Sendrier}, title = {Cryptanalysis of Two Quartic Encryption Schemes and One Improved {MFE} Scheme}, booktitle = {Post-Quantum Cryptography, Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6061}, pages = {41--60}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12929-2\_4}, doi = {10.1007/978-3-642-12929-2\_4}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/CaoNHTD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soli/0001Q0HS10, author = {Gang Xiong and Tao Qin and Feiyue Wang and Lei Hu and Qingsong Shi}, title = {Design and improvement of {KPI} system for materials management in power group enterprise}, booktitle = {Proceedings of 2010 {IEEE} International Conference on Service Operations and Logistics, and Informatics, {SOLI} 2010, Qingdao, China, 15-17 July 2010}, pages = {171--176}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/SOLI.2010.5551585}, doi = {10.1109/SOLI.2010.5551585}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/soli/0001Q0HS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1001-4305, author = {Xiwang Cao and Lei Hu}, title = {On Exponential Sums, Nowton identities and Dickson Polynomials over Finite Fields}, journal = {CoRR}, volume = {abs/1001.4305}, year = {2010}, url = {http://arxiv.org/abs/1001.4305}, eprinttype = {arXiv}, eprint = {1001.4305}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1001-4305.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1001-5100, author = {Xiwang Cao and Lei Hu}, title = {On Exponential Sums, Nowton identities and Dickson Polynomials over Finite Fields}, journal = {CoRR}, volume = {abs/1001.5100}, year = {2010}, url = {http://arxiv.org/abs/1001.5100}, eprinttype = {arXiv}, eprint = {1001.5100}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1001-5100.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1003-5993, author = {Xiangyong Zeng and Jinyong Shan and Lei Hu}, title = {A Triple-Error-Correcting Cyclic Code from the Gold and Kasami-Welch {APN} Power Functions}, journal = {CoRR}, volume = {abs/1003.5993}, year = {2010}, url = {http://arxiv.org/abs/1003.5993}, eprinttype = {arXiv}, eprint = {1003.5993}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1003-5993.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CaoH10, author = {Xiwang Cao and Lei Hu}, title = {On Exponential Sums, Nowton identities and Dickson Polynomials over Finite Fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {39}, year = {2010}, url = {http://eprint.iacr.org/2010/039}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CaoH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TangTZH10, author = {Xiaohu Tang and Deng Tang and Xiangyong Zeng and Lei Hu}, title = {Balanced Boolean Functions with (Almost) Optimal Algebraic Immunity and Very High Nonlinearity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {443}, year = {2010}, url = {http://eprint.iacr.org/2010/443}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TangTZH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZengCSH10, author = {Xiangyong Zeng and Claude Carlet and Jinyong Shan and Lei Hu}, title = {Balanced Boolean Functions with Optimum Algebraic Immunity and High Nonlinearity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {534}, year = {2010}, url = {http://eprint.iacr.org/2010/534}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZengCSH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WengH09, author = {Guobiao Weng and Lei Hu}, title = {Some results on skew Hadamard difference sets}, journal = {Des. Codes Cryptogr.}, volume = {50}, number = {1}, pages = {93--105}, year = {2009}, url = {https://doi.org/10.1007/s10623-008-9216-4}, doi = {10.1007/S10623-008-9216-4}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/WengH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CarletZLH09, author = {Claude Carlet and Xiangyong Zeng and Chunlei Li and Lei Hu}, title = {Further properties of several classes of Boolean functions with optimum algebraic immunity}, journal = {Des. Codes Cryptogr.}, volume = {52}, number = {3}, pages = {303--338}, year = {2009}, url = {https://doi.org/10.1007/s10623-009-9284-0}, doi = {10.1007/S10623-009-9284-0}, timestamp = {Mon, 24 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CarletZLH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/JiangHTZ09, author = {Wenfeng Jiang and Lei Hu and Xiaohu Tang and Xiangyong Zeng}, title = {New Optimal Quadriphase Sequences With Larger Linear Span}, journal = {{IEEE} Trans. Inf. Theory}, volume = {55}, number = {1}, pages = {458--470}, year = {2009}, url = {https://doi.org/10.1109/TIT.2008.2008122}, doi = {10.1109/TIT.2008.2008122}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/JiangHTZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/TangHHJ09, author = {Xiaohu Tang and Tor Helleseth and Lei Hu and Wenfeng Jiang}, title = {Two New Families of Optimal Binary Sequences Obtained From Quaternary Sequences}, journal = {{IEEE} Trans. Inf. Theory}, volume = {55}, number = {4}, pages = {1833--1840}, year = {2009}, url = {https://doi.org/10.1109/TIT.2009.2013023}, doi = {10.1109/TIT.2009.2013023}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/TangHHJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/HellesethHKZLJ09, author = {Tor Helleseth and Lei Hu and Alexander Kholosha and Xiangyong Zeng and Nian Li and Wenfeng Jiang}, title = {Period-different m-sequences with at most four-valued cross correlation}, journal = {{IEEE} Trans. Inf. Theory}, volume = {55}, number = {7}, pages = {3305--3311}, year = {2009}, url = {https://doi.org/10.1109/TIT.2009.2021312}, doi = {10.1109/TIT.2009.2021312}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/HellesethHKZLJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/JiHO09, author = {Wen Ji and Lei Hu and Haiwen Ou}, title = {Algebraic Attack to {SMS4} and the Comparison with {AES}}, booktitle = {Proceedings of the Fifth International Conference on Information Assurance and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009}, pages = {662--665}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/IAS.2009.171}, doi = {10.1109/IAS.2009.171}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/JiHO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bmei/WangWHY09, author = {Qizhi Wang and Xinlei Wu and Lei Hu and Ming Yang}, title = {Validity of the Simulation of New Screw Fixed {FNF} for Healing: {A} Biomechanical Analysis}, booktitle = {Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, {BMEI} 2009, October 17-19, 2009, Tianjin, China}, pages = {1--4}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/BMEI.2009.5305219}, doi = {10.1109/BMEI.2009.5305219}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/bmei/WangWHY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bmei/ZhangGHDCCJ09, author = {Yu Guang Zhang and Xin Yong Guo and Lei Hu and Qin He Dang and Di Chen and Dong Cui and Qing Jiao}, title = {A Novel Approach for Blood Vessel Edge Detection in Retinal Images}, booktitle = {Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, {BMEI} 2009, October 17-19, 2009, Tianjin, China}, pages = {1--4}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/BMEI.2009.5304836}, doi = {10.1109/BMEI.2009.5304836}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bmei/ZhangGHDCCJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iros/HuHWWLLW09, author = {Yan Hu and Lei Hu and Tianmiao Wang and Jun Wei and Sun Lei and Wenyong Liu and Li Wen}, title = {A fluoroscopic-based navigation system for {ACL} reconstruction assisted by robot}, booktitle = {2009 {IEEE/RSJ} International Conference on Intelligent Robots and Systems, October 11-15, 2009, St. Louis, MO, {USA}}, pages = {1055--1060}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/IROS.2009.5354014}, doi = {10.1109/IROS.2009.5354014}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/iros/HuHWWLLW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/CaoH09, author = {Weiwei Cao and Lei Hu}, editor = {Heung Youl Youm and Moti Yung}, title = {Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation Structure}, booktitle = {Information Security Applications, 10th International Workshop, {WISA} 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5932}, pages = {254--267}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10838-9\_19}, doi = {10.1007/978-3-642-10838-9\_19}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/CaoH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0901-2391, author = {Xiangyong Zeng and Lei Hu and Wenfeng Jiang and Qin Yue and Xiwang Cao}, title = {Weight Distribution of {A} p-ary Cyclic Code}, journal = {CoRR}, volume = {abs/0901.2391}, year = {2009}, url = {http://arxiv.org/abs/0901.2391}, eprinttype = {arXiv}, eprint = {0901.2391}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0901-2391.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhengZH09, author = {Dabin Zheng and Xiangyong Zeng and Lei Hu}, title = {A Family of p-ary Binomial Bent Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {563}, year = {2009}, url = {http://eprint.iacr.org/2009/563}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhengZH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aaecc/JiangHTZ08, author = {Wenfeng Jiang and Lei Hu and Xiaohu Tang and Xiangyong Zeng}, title = {New family of binary sequences of period 4(2\({}^{\mbox{ \emph{n} }}\) - 1) with low correlation}, journal = {Appl. Algebra Eng. Commun. Comput.}, volume = {19}, number = {5}, pages = {429--439}, year = {2008}, url = {https://doi.org/10.1007/s00200-008-0082-0}, doi = {10.1007/S00200-008-0082-0}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aaecc/JiangHTZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejc/FengHK08, author = {Rongquan Feng and Lei Hu and Jin Ho Kwak}, title = {Authentication codes and bipartite graphs}, journal = {Eur. J. Comb.}, volume = {29}, number = {6}, pages = {1473--1482}, year = {2008}, url = {https://doi.org/10.1016/j.ejc.2007.06.013}, doi = {10.1016/J.EJC.2007.06.013}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejc/FengHK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/JiangHZ08, author = {Wenfeng Jiang and Lei Hu and Xiangyong Zeng}, title = {New Family of Binary Sequences with Low Correlation}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {91-A}, number = {1}, pages = {417--421}, year = {2008}, url = {https://doi.org/10.1093/ietfec/e91-a.1.417}, doi = {10.1093/IETFEC/E91-A.1.417}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/JiangHZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ZengLHT08, author = {Xiangyong Zeng and John Q. Liu and Lei Hu and Desmond P. Taylor}, title = {On the Linear Span of a Binary Sequence Family with Optimal Correlation Properties}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {91-A}, number = {2}, pages = {664--672}, year = {2008}, url = {https://doi.org/10.1093/ietfec/e91-a.2.664}, doi = {10.1093/IETFEC/E91-A.2.664}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ZengLHT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/LiZH08, author = {Nian Li and Xiangyong Zeng and Lei Hu}, title = {Binary Constant Weight Codes Based on Cyclic Difference Sets}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {91-A}, number = {5}, pages = {1288--1292}, year = {2008}, url = {https://doi.org/10.1093/ietfec/e91-a.5.1288}, doi = {10.1093/IETFEC/E91-A.5.1288}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/LiZH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/LuHLHHNM08, author = {Li Lu and Jinsong Han and Yunhao Liu and Lei Hu and Jinpeng Huai and Lionel M. Ni and Jian Ma}, title = {Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {19}, number = {10}, pages = {1325--1337}, year = {2008}, url = {https://doi.org/10.1109/TPDS.2008.15}, doi = {10.1109/TPDS.2008.15}, timestamp = {Tue, 20 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tpds/LuHLHHNM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/ZhuFLH08, author = {Bin B. Zhu and Min Feng and Fen Liu and Lei Hu}, title = {Analysis on AACS' Traitor Tracing Against Mix-and-Match Attacks}, booktitle = {5th {IEEE} Consumer Communications and Networking Conference, {CCNC} 2008, Las Vegas, NV, USA, January 10-12, 2008}, pages = {1097--1101}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ccnc08.2007.248}, doi = {10.1109/CCNC08.2007.248}, timestamp = {Mon, 09 Aug 2021 14:54:01 +0200}, biburl = {https://dblp.org/rec/conf/ccnc/ZhuFLH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icip/HuJHG08, author = {Lei Hu and Shuqiang Jiang and Qingming Huang and Wen Gao}, title = {People re-detection using Adaboost with sift and color correlogram}, booktitle = {Proceedings of the International Conference on Image Processing, {ICIP} 2008, October 12-15, 2008, San Diego, California, {USA}}, pages = {1348--1351}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ICIP.2008.4712013}, doi = {10.1109/ICIP.2008.4712013}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/icip/HuJHG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icira/XuYWHHY08, author = {Min Xu and Chuang Yang and Tianmiao Wang and Yan Hu and Lei Hu and Bing Yu}, editor = {Caihua Xiong and Honghai Liu and Yongan Huang and Youlun Xiong}, title = {Embedded Control System of Digital Operating Table}, booktitle = {Intelligent Robotics and Applications, First International Conference, {ICIRA} 2008, Wuhan, China, October 15-17, 2008 Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {5314}, pages = {556--565}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88513-9\_60}, doi = {10.1007/978-3-540-88513-9\_60}, timestamp = {Fri, 05 Mar 2021 11:49:33 +0100}, biburl = {https://dblp.org/rec/conf/icira/XuYWHHY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpr/HuWJHG08, author = {Lei Hu and Yizhou Wang and Shuqiang Jiang and Qingming Huang and Wen Gao}, title = {Human reappearance detection based on on-line learning}, booktitle = {19th International Conference on Pattern Recognition {(ICPR} 2008), December 8-11, 2008, Tampa, Florida, {USA}}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICPR.2008.4761564}, doi = {10.1109/ICPR.2008.4761564}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpr/HuWJHG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/NieJHDQ08, author = {Xuyun Nie and Xin Jiang and Lei Hu and Jintai Ding and Zhiguang Qin}, editor = {Jeng{-}Shyang Pan and Xiamu Niu and Hsiang{-}Cheh Huang and Lakhmi C. Jain}, title = {Breaking Instance {II} of New {TTM} Cryptosystems}, booktitle = {4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing {(IIH-MSP} 2008), Harbin, China, 15-17 August 2008, Proceedings}, pages = {1332--1335}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IIH-MSP.2008.246}, doi = {10.1109/IIH-MSP.2008.246}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/NieJHDQ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/JiH08, author = {Wen Ji and Lei Hu}, editor = {Liqun Chen and Yi Mu and Willy Susilo}, title = {Square Attack on Reduced-Round Zodiac Cipher}, booktitle = {Information Security Practice and Experience, 4th International Conference, {ISPEC} 2008, Sydney, Australia, April 21-23, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4991}, pages = {377--391}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79104-1\_27}, doi = {10.1007/978-3-540-79104-1\_27}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispec/JiH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/npc/LiuH08, author = {Fen Liu and Lei Hu}, editor = {Jian Cao and Minglu Li and Chuliang Weng and Yang Xiang and Xin Wang and Hong Tang and Feng Hong and Hong Liu and Yinglin Wang}, title = {{ROAD:} An {RFID} Offline Authentication, Privacy Preserving Protocol with Dos Resilience}, booktitle = {{IFIP} International Conference on Network and Parallel Computing, {NPC} 2008, Shanghai, China, October 18-21, 2008, Workshop Proceedings}, pages = {139--146}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/NPC.2008.9}, doi = {10.1109/NPC.2008.9}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/npc/LiuH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/seke/HuS08, author = {Lei Hu and Kamran Sartipi}, title = {Dynamic Analysis and Design Pattern Detection in Java Programs}, booktitle = {Proceedings of the Twentieth International Conference on Software Engineering {\&} Knowledge Engineering (SEKE'2008), San Francisco, CA, USA, July 1-3, 2008}, pages = {842--846}, publisher = {Knowledge Systems Institute Graduate School}, year = {2008}, timestamp = {Thu, 12 Mar 2020 11:30:50 +0100}, biburl = {https://dblp.org/rec/conf/seke/HuS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/seta/ZengLH08, author = {Xiangyong Zeng and Nian Li and Lei Hu}, editor = {Solomon W. Golomb and Matthew Geoffrey Parker and Alexander Pott and Arne Winterhof}, title = {A Class of Nonbinary Codes and Sequence Families}, booktitle = {Sequences and Their Applications - {SETA} 2008, 5th International Conference, Lexington, KY, USA, September 14-18, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5203}, pages = {81--94}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85912-3\_8}, doi = {10.1007/978-3-540-85912-3\_8}, timestamp = {Wed, 01 Sep 2021 10:36:07 +0200}, biburl = {https://dblp.org/rec/conf/seta/ZengLH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0801-0857, author = {Lei Hu and Xiangyong Zeng and Nian Li and Wenfeng Jiang}, title = {Period-Different {\textdollar}m{\textdollar}-Sequences With At Most {A} Four-Valued Cross Correlation}, journal = {CoRR}, volume = {abs/0801.0857}, year = {2008}, url = {http://arxiv.org/abs/0801.0857}, eprinttype = {arXiv}, eprint = {0801.0857}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0801-0857.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0802-3430, author = {Xiangyong Zeng and Nian Li and Lei Hu}, title = {A Class of Nonbinary Codes and Their Weight Distribution}, journal = {CoRR}, volume = {abs/0802.3430}, year = {2008}, url = {http://arxiv.org/abs/0802.3430}, eprinttype = {arXiv}, eprint = {0802.3430}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0802-3430.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcm/LiuHL07, author = {Yining Liu and Lei Hu and Heguo Liu}, title = {Using an efficient hash chain and delaying function to improve an e-lottery scheme}, journal = {Int. J. Comput. Math.}, volume = {84}, number = {7}, pages = {967--970}, year = {2007}, url = {https://doi.org/10.1080/00207160701294426}, doi = {10.1080/00207160701294426}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcm/LiuHL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/ZengLH07, author = {Xiangyong Zeng and John Q. Liu and Lei Hu}, title = {Generalized Kasami Sequences: The Large Set}, journal = {{IEEE} Trans. Inf. Theory}, volume = {53}, number = {7}, pages = {2587--2598}, year = {2007}, url = {https://doi.org/10.1109/TIT.2007.899528}, doi = {10.1109/TIT.2007.899528}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/ZengLH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/HuHF07, author = {Honggang Hu and Lei Hu and Dengguo Feng}, title = {On a Class of Pseudorandom Sequences From Elliptic Curves Over Finite Fields}, journal = {{IEEE} Trans. Inf. Theory}, volume = {53}, number = {7}, pages = {2598--2605}, year = {2007}, url = {https://doi.org/10.1109/TIT.2007.899532}, doi = {10.1109/TIT.2007.899532}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/HuHF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiuJHDLPW07, author = {Fen Liu and Wen Ji and Lei Hu and Jintai Ding and Shuwang Lv and Andrei Pyshkin and Ralf{-}Philipp Weinmann}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Analysis of the {SMS4} Block Cipher}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {158--170}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_13}, doi = {10.1007/978-3-540-73458-1\_13}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LiuJHDLPW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/NieHDLW07, author = {Xuyun Nie and Lei Hu and Jintai Ding and Jianyu Li and John Wagner}, editor = {Jonathan Katz and Moti Yung}, title = {Cryptanalysis of the {TRMC-4} Public Key Cryptosystem}, booktitle = {Applied Cryptography and Network Security, 5th International Conference, {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4521}, pages = {104--115}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72738-5\_7}, doi = {10.1007/978-3-540-72738-5\_7}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/NieHDLW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/WangHL08, author = {Weijia Wang and Lei Hu and Yong Li}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {Provably Secure N-Party Authenticated Key Exchange in the Multicast {DPWA} Setting}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {93--107}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_9}, doi = {10.1007/978-3-540-79499-8\_9}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/WangHL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/JiangDH08, author = {Xin Jiang and Jintai Ding and Lei Hu}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {Kipnis-Shamir Attack on {HFE} Revisited}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {399--411}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_31}, doi = {10.1007/978-3-540-79499-8\_31}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/JiangDH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/GuoWWH07, author = {Lifeng Guo and Guilin Wang and Duncan S. Wong and Lei Hu}, editor = {Selim Aissi and Hamid R. Arabnia}, title = {Further Discussions on the Security of a Nominative Signature Scheme}, booktitle = {Proceedings of the 2007 International Conference on Security {\&} Management, {SAM} 2007, Las Vegas, Nevada, USA, June 25-28, 2007}, pages = {566--572}, publisher = {{CSREA} Press}, year = {2007}, timestamp = {Wed, 12 Dec 2007 16:45:17 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/GuoWWH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/JiH07, author = {Wen Ji and Lei Hu}, editor = {K. Srinathan and C. Pandu Rangan and Moti Yung}, title = {New Description of {SMS4} by an Embedding overGF(2\({}^{\mbox{8}}\))}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4859}, pages = {238--251}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77026-8\_18}, doi = {10.1007/978-3-540-77026-8\_18}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/JiH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipps/LuHHHLN07, author = {Li Lu and Jinsong Han and Lei Hu and Jinpeng Huai and Yunhao Liu and Lionel M. Ni}, title = {Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols}, booktitle = {21th International Parallel and Distributed Processing Symposium {(IPDPS} 2007), Proceedings, 26-30 March 2007, Long Beach, California, {USA}}, pages = {1--10}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/IPDPS.2007.370284}, doi = {10.1109/IPDPS.2007.370284}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipps/LuHHHLN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itw/JiangHTZ07, author = {Wenfeng Jiang and Lei Hu and Xiaohu Tang and Xiangyong Zeng}, editor = {Tor Helleseth and P. Vijay Kumar and {\O}yvind Ytrehus}, title = {New Optimal Quadriphase Sequences with Larger Lnear Span}, booktitle = {Proceedings of the {IEEE} Information Theory Workshop on Information Theory for Wireless Networks, July 1-6, 2007, Solstrand, Norway}, pages = {1--5}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ITWITWN.2007.4318031}, doi = {10.1109/ITWITWN.2007.4318031}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/itw/JiangHTZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/LuHHLN07, author = {Li Lu and Jinsong Han and Lei Hu and Yunhao Liu and Lionel M. Ni}, title = {Dynamic Key-Updating: Privacy-Preserving Authentication for {RFID} Systems}, booktitle = {Fifth Annual {IEEE} International Conference on Pervasive Computing and Communications (PerCom 2007), 19-23 March 2007, White Plains, New York, {USA}}, pages = {13--22}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/PERCOM.2007.13}, doi = {10.1109/PERCOM.2007.13}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/LuHHLN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DingHNLW07, author = {Jintai Ding and Lei Hu and Xuyun Nie and Jianyu Li and John Wagner}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {High Order Linearization Equation {(HOLE)} Attack on Multivariate Public Key Cryptosystems}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {233--248}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_16}, doi = {10.1007/978-3-540-71677-8\_16}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DingHNLW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/robio/LiHKYW07, author = {Feng Li and Lei Hu and Shaolong Kuang and Chuang Yang and Tianmiao Wang}, title = {A 5-DOF table-mounted surgical robot}, booktitle = {{IEEE} International Conference on Robotics and Biomimetics, {ROBIO} 2007, Sanya, China, 15-28 December 2007}, pages = {355--359}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ROBIO.2007.4522187}, doi = {10.1109/ROBIO.2007.4522187}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/robio/LiHKYW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secperu/Wang0HL07, author = {Weijia Wang and Yong Li and Lei Hu and Li Lu}, editor = {Panagiotis Georgiadis and Javier L{\'{o}}pez and Stefanos Gritzalis and Giannis F. Marias}, title = {Storage-Awareness: {RFID} Private Authentication based on Sparse Tree}, booktitle = {Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SECPerU 2007, Istanbul, Turkey, July 19, 2007}, pages = {61--66}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/SECPERU.2007.13}, doi = {10.1109/SECPERU.2007.13}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secperu/Wang0HL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/LiuHLW07, author = {Fen Liu and Lei Hu and Li Lu and Weijia Wang}, title = {Privacy-preserving authentication with low computational overhead for {RFID} systems}, booktitle = {Third International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2007, Nice, France, 17-21 September, 2007}, pages = {127--132}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/SECCOM.2007.4550319}, doi = {10.1109/SECCOM.2007.4550319}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/LiuHLW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssc/TangHHJ07, author = {Xiaohu Tang and Tor Helleseth and Lei Hu and Wenfeng Jiang}, editor = {Solomon W. Golomb and Guang Gong and Tor Helleseth and Hong{-}Yeop Song}, title = {A New Family of Gold-Like Sequences}, booktitle = {Sequences, Subsequences, and Consequences, International Workshop, {SSC} 2007, Los Angeles, CA, USA, May 31 - June 2, 2007, Revised Invited Papers}, series = {Lecture Notes in Computer Science}, volume = {4893}, pages = {62--69}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77404-4\_6}, doi = {10.1007/978-3-540-77404-4\_6}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ssc/TangHHJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JiangDH07, author = {Xin Jiang and Jintai Ding and Lei Hu}, title = {Kipnis-Shamir's Attack on {HFE} Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {203}, year = {2007}, url = {http://eprint.iacr.org/2007/203}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JiangDH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarletZLH07, author = {Claude Carlet and Xiangyong Zeng and Chunlei Li and Lei Hu}, title = {Further Properties of Several Classes of Boolean Functions with Optimum Algebraic Immunity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {370}, year = {2007}, url = {http://eprint.iacr.org/2007/370}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarletZLH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZengHYJ07, author = {Xiangyong Zeng and Lei Hu and Yang Yang and Wenfeng Jiang}, title = {On The Inequivalence Of Ness-Helleseth {APN} Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {379}, year = {2007}, url = {http://eprint.iacr.org/2007/379}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZengHYJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NieJHD07, author = {Xuyun Nie and Xin Jiang and Lei Hu and Jintai Ding}, title = {Cryptanalysis of Two New Instances of {TTM} Cryptosystem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {381}, year = {2007}, url = {http://eprint.iacr.org/2007/381}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NieJHD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ZengHJ06, author = {Xiangyong Zeng and Lei Hu and Wenfeng Jiang}, title = {A Family of Binary Sequences with 4-Valued Optimal Out-of-Phase Correlation and Large Linear Span}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {89-A}, number = {7}, pages = {2029--2035}, year = {2006}, url = {https://doi.org/10.1093/ietfec/e89-a.7.2029}, doi = {10.1093/IETFEC/E89-A.7.2029}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ZengHJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jc/SunH06, author = {Nigang Sun and Lei Hu}, title = {Expansion and linear complexity of the coordinate sequences over Galois rings}, journal = {J. Complex.}, volume = {22}, number = {3}, pages = {382--395}, year = {2006}, url = {https://doi.org/10.1016/j.jco.2005.09.005}, doi = {10.1016/J.JCO.2005.09.005}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jc/SunH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/NieHLUD06, author = {Xuyun Nie and Lei Hu and Jianyu Li and Crystal Updegrove and Jintai Ding}, editor = {Jianying Zhou and Moti Yung and Feng Bao}, title = {Breaking a New Instance of {TTM} Cryptosystems}, booktitle = {Applied Cryptography and Network Security, 4th International Conference, {ACNS} 2006, Singapore, June 6-9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3989}, pages = {210--225}, year = {2006}, url = {https://doi.org/10.1007/11767480\_14}, doi = {10.1007/11767480\_14}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/NieHLUD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apscc/WangSH06, author = {Shaobin Wang and Na Su and Lei Hu}, title = {Fair E-cash Payment Model on Credit Overdraft}, booktitle = {Proceedings of The 1st {IEEE} Asia-Pacific Services Computing Conference, {APSCC} 2006, December 12-15, 2006, Guangzhou, China}, pages = {107--111}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/APSCC.2006.53}, doi = {10.1109/APSCC.2006.53}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/apscc/WangSH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/LuH06, author = {Li Lu and Lei Hu}, editor = {Hamid R. Arabnia and Selim Aissi}, title = {Pairing-Based Multi-Recipient Public Key Encryption}, booktitle = {Proceedings of the 2006 International Conference on Security {\&} Management, {SAM} 2006, Las Vegas, Nevada, USA, June 26-29, 2006}, pages = {159--165}, publisher = {{CSREA} Press}, year = {2006}, timestamp = {Fri, 01 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/LuH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/ZengHLZ06, author = {Xiangyong Zeng and Lei Hu and Qingchong Liu and Yuhong Zhu}, title = {Binary Sequences with Optimal Correlations and Large Linear Span}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2006, Istanbul, Turkey, 11-15 June 2006}, pages = {385--390}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ICC.2006.254758}, doi = {10.1109/ICC.2006.254758}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/ZengHLZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/WangH06, author = {Weijia Wang and Lei Hu}, editor = {Rana Barua and Tanja Lange}, title = {Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4329}, pages = {118--132}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11941378\_10}, doi = {10.1007/11941378\_10}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/WangH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iros/WangWLHL06, author = {Tianmiao Wang and Jun Wei and Da Liu and Lei Hu and Wenyong Liu}, title = {An Internet Robot Assistant Tele-neurosurgery System Case}, booktitle = {2006 {IEEE/RSJ} International Conference on Intelligent Robots and Systems, {IROS} 2006, October 9-15, 2006, Beijing, China}, pages = {2845--2849}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/IROS.2006.282071}, doi = {10.1109/IROS.2006.282071}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/iros/WangWLHL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/ZengLH06, author = {Xiangyong Zeng and Qingchong Liu and Lei Hu}, title = {A New Family of Codes and Generalized Kasami Sequences}, booktitle = {Proceedings 2006 {IEEE} International Symposium on Information Theory, {ISIT} 2006, The Westin Seattle, Seattle, Washington, USA, July 9-14, 2006}, pages = {907--911}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ISIT.2006.261791}, doi = {10.1109/ISIT.2006.261791}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/ZengLH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/seta/HuHF06, author = {Honggang Hu and Lei Hu and Dengguo Feng}, editor = {Guang Gong and Tor Helleseth and Hong{-}Yeop Song and Kyeongcheol Yang}, title = {On the Expected Value of the Joint 2-Adic Complexity of Periodic Binary Multisequences}, booktitle = {Sequences and Their Applications - {SETA} 2006, 4th International Conference, Beijing, China, September 24-28, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4086}, pages = {199--208}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11863854\_17}, doi = {10.1007/11863854\_17}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/seta/HuHF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/seta/HuZ06, author = {Lei Hu and Xiangyong Zeng}, editor = {Guang Gong and Tor Helleseth and Hong{-}Yeop Song and Kyeongcheol Yang}, title = {Partially Perfect Nonlinear Functions and a Construction of Cryptographic Boolean Functions}, booktitle = {Sequences and Their Applications - {SETA} 2006, 4th International Conference, Beijing, China, September 24-28, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4086}, pages = {402--416}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11863854\_35}, doi = {10.1007/11863854\_35}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/seta/HuZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DingHYC06, author = {Jintai Ding and Lei Hu and Bo{-}Yin Yang and Jiun{-}Ming Chen}, title = {Note on Design Criteria for Rainbow-Type Multivariates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {307}, year = {2006}, url = {http://eprint.iacr.org/2006/307}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DingHYC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DingHNLW06, author = {Jintai Ding and Lei Hu and Xuyun Nie and Jianyu Li and John Wagner}, title = {High Order Linearization Equation {(HOLE)} Attack on Multivariate Public Key Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {336}, year = {2006}, url = {http://eprint.iacr.org/2006/336}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DingHNLW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejasp/LiLCCH05, author = {Chengqing Li and Shujun Li and Guanrong Chen and Gang Chen and Lei Hu}, title = {Cryptanalysis of a New Signal Security System for Multimedia Data Transmission}, journal = {{EURASIP} J. Adv. Signal Process.}, volume = {2005}, number = {8}, pages = {1277--1288}, year = {2005}, url = {https://doi.org/10.1155/ASP.2005.1277}, doi = {10.1155/ASP.2005.1277}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejasp/LiLCCH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ZengH05, author = {Xiangyong Zeng and Lei Hu}, title = {Constructing Boolean Functions by Modifying Maiorana-McFarland's Superclass Functions}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {88-A}, number = {1}, pages = {59--66}, year = {2005}, url = {http://search.ieice.org/bin/summary.php?id=e88-a\_1\_59\&\#38;category=D\&\#38;year=2005\&\#38;lang=E\&\#38;abst=}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ZengH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ZengH05a, author = {Xiangyong Zeng and Lei Hu}, title = {Fast Modular Reduction over Euclidean Rings and Its Application to Universal Hash Functions}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {88-A}, number = {1}, pages = {305--310}, year = {2005}, url = {http://search.ieice.org/bin/summary.php?id=e88-a\_1\_305\&\#38;category=D\&\#38;year=2005\&\#38;lang=E\&\#38;abst=}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ZengH05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/HuDP05, author = {Lei Hu and Jun{-}Wu Dong and Dingyi Pei}, title = {Implementation of Cryptosystems Based on Tate Pairing}, journal = {J. Comput. Sci. Technol.}, volume = {20}, number = {2}, pages = {264--269}, year = {2005}, url = {https://doi.org/10.1007/s11390-005-0264-1}, doi = {10.1007/S11390-005-0264-1}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcst/HuDP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccnmc/HanLLHP05, author = {Jinsong Han and Yunhao Liu and Li Lu and Lei Hu and Abhishek P. Patil}, editor = {Xicheng Lu and Wei Zhao}, title = {A Random Walk Based Anonymous Peer-to-Peer Protocol Design}, booktitle = {Networking and Mobile Computing, Third International Conference, {ICCNMC} 2005, Zhangjiajie, China, August 2-4, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3619}, pages = {143--152}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11534310\_17}, doi = {10.1007/11534310\_17}, timestamp = {Tue, 20 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccnmc/HanLLHP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcsw/HanZLCH05, author = {Jinsong Han and Yanmin Zhu and Yunhao Liu and Jianfeng Cai and Lei Hu}, title = {Provide Privacy for Mobile {P2P} Systems}, booktitle = {25th International Conference on Distributed Computing Systems Workshops {(ICDCS} 2005 Workshops), 6-10 June 2005, Columbus, OH, {USA}}, pages = {829--834}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ICDCSW.2005.114}, doi = {10.1109/ICDCSW.2005.114}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcsw/HanZLCH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/HuHF05, author = {Honggang Hu and Lei Hu and Dengguo Feng}, title = {A new class of binary sequences with low correlation and large linear complexity from function fields}, booktitle = {Proceedings of the 2005 {IEEE} International Symposium on Information Theory, {ISIT} 2005, Adelaide, South Australia, Australia, 4-9 September 2005}, pages = {1997--2001}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ISIT.2005.1523695}, doi = {10.1109/ISIT.2005.1523695}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/HuHF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcc/ZengHL05, author = {Xiangyong Zeng and Lei Hu and Qingchong Liu}, editor = {{\O}yvind Ytrehus}, title = {A Novel Method for Constructing Almost Perfect Polyphase Sequences}, booktitle = {Coding and Cryptography, International Workshop, {WCC} 2005, Bergen, Norway, March 14-18, 2005. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3969}, pages = {346--353}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11779360\_27}, doi = {10.1007/11779360\_27}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/wcc/ZengHL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0508114, author = {Xiangyong Zeng and Lei Hu and Qingchong Liu}, title = {A Family of Binary Sequences with Optimal Correlation Property and Large Linear Span}, journal = {CoRR}, volume = {abs/cs/0508114}, year = {2005}, url = {http://arxiv.org/abs/cs/0508114}, eprinttype = {arXiv}, eprint = {cs/0508114}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0508114.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0508115, author = {Xiangyong Zeng and Lei Hu and Qingchong Liu}, title = {New Sequence Sets with Zero-Correlation Zone}, journal = {CoRR}, volume = {abs/cs/0508115}, year = {2005}, url = {http://arxiv.org/abs/cs/0508115}, eprinttype = {arXiv}, eprint = {cs/0508115}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0508115.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0511046, author = {Xiangyong Zeng and Qingchong Liu and Lei Hu}, title = {Generalized Kasami Sequences: The Large Set}, journal = {CoRR}, volume = {abs/cs/0511046}, year = {2005}, url = {http://arxiv.org/abs/cs/0511046}, eprinttype = {arXiv}, eprint = {cs/0511046}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0511046.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dm/HuP04, author = {Lei Hu and Dingyi Pei}, title = {Generator polynomials of characteristic ideal of maximal periodic arrays over Galois rings}, journal = {Discret. Math.}, volume = {278}, number = {1-3}, pages = {139--149}, year = {2004}, url = {https://doi.org/10.1016/j.disc.2003.06.001}, doi = {10.1016/J.DISC.2003.06.001}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dm/HuP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iros/WangLH04, author = {Tianmiao Wang and Wenyong Liu and Lei Hu}, title = {{BPOR:} a fluoroscopy-based robot navigating system for distal locking of intramedullary nails}, booktitle = {2004 {IEEE/RSJ} International Conference on Intelligent Robots and Systems, Sendai, Japan, September 28 - October 2, 2004}, pages = {3321--3326}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/IROS.2004.1389929}, doi = {10.1109/IROS.2004.1389929}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/iros/WangLH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/WangHD03, author = {Quanlong Wang and Lei Hu and Zongduo Dai}, title = {On Linear Complexity of Kronecker Sequences}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {86-A}, number = {11}, pages = {2853--2859}, year = {2003}, url = {http://search.ieice.org/bin/summary.php?id=e86-a\_11\_2853}, timestamp = {Tue, 08 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/WangHD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZengH03, author = {Xiangyong Zeng and Lei Hu}, title = {A Composition Construction of Bent-Like Boolean Functions from Quadratic Polynomials}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {204}, year = {2003}, url = {http://eprint.iacr.org/2003/204}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZengH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/miar/WangLHLWT01, author = {Tianmiao Wang and Da Liu and Lei Hu and Hongbo Lv and Zingang Wang and Zesheng Tang}, title = {A Simulation and Training Systems of Robot Assisted Surgery Based on Virtual Reality}, booktitle = {Medical Imaging and Augmented Reality: First International Workshop, {MIAR} 2001, Hong Kong, China, June 10-12, 2001. Proceedings}, pages = {103}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/MIAR.2001.930271}, doi = {10.1109/MIAR.2001.930271}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/miar/WangLHLWT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsc/LiuH98, author = {Mulan Liu and Lei Hu}, title = {Properties of Gr{\"{o}}bner Bases and Applications to Doubly Periodic Arrays}, journal = {J. Symb. Comput.}, volume = {26}, number = {3}, pages = {301--314}, year = {1998}, url = {https://doi.org/10.1006/jsco.1998.0213}, doi = {10.1006/JSCO.1998.0213}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsc/LiuH98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/HuG98, author = {Lei Hu and Ian Gorton}, title = {Performance Oriented Design Using {HL}}, booktitle = {Thirty-First Annual Hawaii International Conference on System Sciences, Kohala Coast, Hawaii, USA, January 6-9, 1998}, pages = {167--176}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/HICSS.1998.656135}, doi = {10.1109/HICSS.1998.656135}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/HuG98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdse/HuG97, author = {Lei Hu and Ian Gorton}, title = {A Performance Prototyping Approach to Designing Concurrent Software Architectures}, booktitle = {International Symposium on Software Engineering for Parallel and Distributed Systems, {PDSE} 1997, Boston, MA, USA, May 17-18, 1997}, pages = {270--276}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/PDSE.1997.596846}, doi = {10.1109/PDSE.1997.596846}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pdse/HuG97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.