Остановите войну!
for scientists:
default search action
Mingjie Chen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c10]Andrea Basso, Mingjie Chen, Tako Boris Fouotsa, Péter Kutas, Abel Laval, Laurane Marco, Gustave Tchoffo Saah:
Exploring SIDH-Based Signature Parameters. ACNS (1) 2024: 432-456 - 2023
- [j7]Qing Mi, Mingjie Chen, Zhi Cai, Xibin Jia:
What makes a readable code? A causal analysis method. Softw. Pract. Exp. 53(6): 1391-1409 (2023) - [j6]Youxi Wu, Mingjie Chen, Yan Li, Jing Liu, Zhao Li, Jinyan Li, Xindong Wu:
ONP-Miner: One-off Negative Sequential Pattern Mining. ACM Trans. Knowl. Discov. Data 17(3): 37:1-37:24 (2023) - [c9]Mingjie Chen, Muhammad Imran, Gábor Ivanyos, Péter Kutas, Antonin Leroux, Christophe Petit:
Hidden Stabilizers, the Isogeny to Endomorphism Ring Problem and the Cryptanalysis of pSIDH. ASIACRYPT (3) 2023: 99-130 - [c8]Mingjie Chen, Yi-Fu Lai, Abel Laval, Laurane Marco, Christophe Petit:
Malleable Commitments from Group Actions and Zero-Knowledge Proofs for Circuits Based on Isogenies. INDOCRYPT (1) 2023: 221-243 - [i16]Mingjie Chen, Muhammad Imran, Gábor Ivanyos, Péter Kutas, Antonin Leroux, Christophe Petit:
Hidden Stabilizers, the Isogeny To Endomorphism Ring Problem and the Cryptanalysis of pSIDH. CoRR abs/2305.19897 (2023) - [i15]Chanho Park, Chengsong Lu, Mingjie Chen, Thomas Hain:
Fast Word Error Rate Estimation Using Self-Supervised Representations For Speech And Text. CoRR abs/2310.08225 (2023) - [i14]Mingjie Chen, Muhammad Imran, Gábor Ivanyos, Péter Kutas, Antonin Leroux, Christophe Petit:
Hidden Stabilizers, the Isogeny To Endomorphism Ring Problem and the Cryptanalysis of pSIDH. IACR Cryptol. ePrint Arch. 2023: 779 (2023) - [i13]Mingjie Chen, Antonin Leroux:
SCALLOP-HD: group action from 2-dimensional isogenies. IACR Cryptol. ePrint Arch. 2023: 1488 (2023) - [i12]Mingjie Chen, Yi-Fu Lai, Abel Laval, Laurane Marco, Christophe Petit:
Malleable Commitments from Group Actions and Zero-Knowledge Proofs for Circuits based on Isogenies. IACR Cryptol. ePrint Arch. 2023: 1710 (2023) - [i11]Andrea Basso, Mingjie Chen, Tako Boris Fouotsa, Péter Kutas, Abel Laval, Laurane Marco, Gustave Tchoffo Saah:
Exploring SIDH-based Signature Parameters. IACR Cryptol. ePrint Arch. 2023: 1906 (2023) - 2022
- [j5]Mingjie Chen, Xincai Qiu, Weisheng Zeng, Daoli Peng:
Combining Sample Plot Stratification and Machine Learning Algorithms to Improve Forest Aboveground Carbon Density Estimation in Northeast China Using Airborne LiDAR Data. Remote. Sens. 14(6): 1477 (2022) - [j4]Nan Zhang, Mingjie Chen, Fan Yang, Cancan Yang, Penghui Yang, Yushan Gao, Yue Shang, Daoli Peng:
Forest Height Mapping Using Feature Selection and Machine Learning by Integrating Multi-Source Satellite Data in Baoding City, North China. Remote. Sens. 14(18): 4434 (2022) - [c7]Emily Wenger, Mingjie Chen, François Charton, Kristin E. Lauter:
SALSA: Attacking Lattice Cryptography with Transformers. NeurIPS 2022 - [i10]Sarah Arpin, Mingjie Chen, Kristin E. Lauter, Renate Scheidler, Katherine E. Stange, Ha T. N. Tran:
Orienteering with one endomorphism. CoRR abs/2201.11079 (2022) - [i9]Sarah Arpin, Mingjie Chen, Kristin E. Lauter, Renate Scheidler, Katherine E. Stange, Ha T. N. Tran:
Orientations and cycles in supersingular isogeny graphs. CoRR abs/2205.03976 (2022) - [i8]Emily Wenger, Mingjie Chen, François Charton, Kristin E. Lauter:
SALSA: Attacking Lattice Cryptography with Transformers. CoRR abs/2207.04785 (2022) - [i7]Youxi Wu, Mingjie Chen, Yan Li, Jing Liu, Zhao Li, Jinyan Li, Xindong Wu:
One-off Negative Sequential Pattern Mining. CoRR abs/2207.11950 (2022) - [i6]Sarah Arpin, Mingjie Chen, Kristin E. Lauter, Renate Scheidler, Katherine E. Stange, Ha T. N. Tran:
Orienteering with one endomorphism. IACR Cryptol. ePrint Arch. 2022: 98 (2022) - [i5]Sarah Arpin, Mingjie Chen, Kristin E. Lauter, Renate Scheidler, Katherine E. Stange, Ha T. N. Tran:
Orientations and cycles in supersingular isogeny graphs. IACR Cryptol. ePrint Arch. 2022: 562 (2022) - [i4]Emily Wenger, Mingjie Chen, François Charton, Kristin E. Lauter:
SALSA: Attacking Lattice Cryptography with Transformers. IACR Cryptol. ePrint Arch. 2022: 935 (2022) - 2021
- [j3]Jie Yang, Huanqin Wang, Jitong Zhou, Da-Ren Chen, Deyi Kong, Fajun Yu, Huaqiao Gui, Jianguo Liu, Mingjie Chen:
A Build-In Data Inversion Method to Retrieve Aerosol Size Distributions for a Portable Ultrafine Particle Sizer (PUPS). IEEE Access 9: 2879-2889 (2021) - [c6]Mingjie Chen, Yanpei Shi, Thomas Hain:
Towards Low-Resource Stargan Voice Conversion Using Weight Adaptive Instance Normalization. ICASSP 2021: 5949-5953 - [c5]Shengjie Huang, Mingjie Chen, Yanyan Xu, Dengfeng Ke, Thomas Hain:
WINVC: One-Shot Voice Conversion with Weight Adaptive Instance Normalization. PRICAI (2) 2021: 559-573 - 2020
- [c4]Mingjie Chen, Thomas Hain:
Unsupervised Acoustic Unit Representation Learning for Voice Conversion Using WaveNet Auto-Encoders. INTERSPEECH 2020: 4866-4870 - [i3]Mingjie Chen, Thomas Hain:
Unsupervised Acoustic Unit Representation Learning for Voice Conversion using WaveNet Auto-encoders. CoRR abs/2008.06892 (2020) - [i2]Mingjie Chen, Yanpei Shi, Thomas Hain:
Towards Low-Resource StarGAN Voice Conversion using Weight Adaptive Instance Normalization. CoRR abs/2010.11646 (2020) - [i1]Yanpei Shi, Mingjie Chen, Qiang Huang, Thomas Hain:
T-vectors: Weakly Supervised Speaker Identification Using Hierarchical Transformer Model. CoRR abs/2010.16071 (2020)
2010 – 2019
- 2017
- [c3]James Thorne, Mingjie Chen, Giorgos Myrianthous, Jiashu Pu, Xiaoxuan Wang, Andreas Vlachos:
Fake news stance detection using stacked ensemble of classifiers. NLPmJ@EMNLP 2017: 80-83 - 2016
- [j2]Kefeng Fan, Xiangzhen Yao, Xiaohe Fan, Yong Wang, Mingjie Chen:
A new usage control protocol for data protection of cloud environment. EURASIP J. Inf. Secur. 2016: 7 (2016) - [c2]Zhuang Yang, Bin Duan, Mingjie Chen, Zhiyong Zhu:
A proactive operation strategy of electric vehicle charging-discharging in Photovoltaic micro-grid. ISGT 2016: 1-5 - 2013
- [j1]Mingjie Chen, Yunwei Sun, Pengcheng Fu, Charles R. Carrigan, Zhiming Lu, Charles H. Tong, Thomas A. Buscheck:
Surrogate-based optimization of hydraulic fracturing in pre-existing fracture networks. Comput. Geosci. 58: 69-79 (2013)
2000 – 2009
- 2009
- [c1]Mingjie Chen, Kefeng Fan, Wei Mo, Subing Zhang:
Implementation and Evaluation of a Novel Audio Watermarking Scheme. CIS (2) 2009: 269-272
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-09 20:44 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint