callback( { "result":{ "query":":facetid:toc:\"db/journals/chinaf/chinaf60.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"68.92" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"288", "@dc":"288", "@oc":"288", "@id":"43428216", "text":":facetid:toc:db/journals/chinaf/chinaf60.bht" } }, "hits":{ "@total":"288", "@computed":"288", "@sent":"288", "@first":"0", "hit":[{ "@score":"1", "@id":"2755189", "info":{"authors":{"author":[{"@pid":"11/539-1","text":"Gang Huang 0001"},{"@pid":"163/1747","text":"Huaqian Cai"},{"@pid":"140/9542","text":"Maciej Swiech"},{"@pid":"13/6769-12","text":"Ying Zhang 0012"},{"@pid":"08/2161","text":"Xuanzhe Liu"},{"@pid":"95/2040","text":"Peter A. Dinda"}]},"title":"DelayDroid: an instrumented approach to reducing tail-time energy of Android apps.","venue":"Sci. China Inf. Sci.","volume":"60","number":"1","pages":"12106","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/0001CSZLD17","doi":"10.1007/S11432-015-1026-Y","ee":"https://doi.org/10.1007/s11432-015-1026-y","url":"https://dblp.org/rec/journals/chinaf/0001CSZLD17"}, "url":"URL#2755189" }, { "@score":"1", "@id":"2755190", "info":{"authors":{"author":[{"@pid":"63/7026-1","text":"Cheng Hu 0001"},{"@pid":"02/10299","text":"Zegang Ding"},{"@pid":"16/4996","text":"Teng Long"},{"@pid":"47/223","text":"Stephen E. Hobbs"},{"@pid":"32/8957","text":"Andrea Monti Guarnieri"},{"@pid":"35/764","text":"Antoni Broquetas"}]},"title":"Editorial.","venue":"Sci. China Inf. Sci.","volume":"60","number":"6","pages":"060300:1-060300:2","year":"2017","type":"Journal Articles","access":"open","key":"journals/chinaf/0001DLHGB17","doi":"10.1007/S11432-017-9098-2","ee":"https://doi.org/10.1007/s11432-017-9098-2","url":"https://dblp.org/rec/journals/chinaf/0001DLHGB17"}, "url":"URL#2755190" }, { "@score":"1", "@id":"2755191", "info":{"authors":{"author":[{"@pid":"20/6417-1","text":"Wei He 0001"},{"@pid":"14/718","text":"Haifeng Huang"},{"@pid":"98/3201","text":"Yunan Chen"},{"@pid":"212/6783","text":"Wenzhen Xie"},{"@pid":"212/6798","text":"Fusen Feng"},{"@pid":"212/6742","text":"Yemeng Kang"},{"@pid":"64/221","text":"Changyin Sun"}]},"title":"Development of an autonomous flapping-wing aerial vehicle.","venue":"Sci. China Inf. Sci.","volume":"60","number":"6","pages":"063201:1-063201:8","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/0001HCXFKS17","doi":"10.1007/S11432-017-9077-1","ee":"https://doi.org/10.1007/s11432-017-9077-1","url":"https://dblp.org/rec/journals/chinaf/0001HCXFKS17"}, "url":"URL#2755191" }, { "@score":"1", "@id":"2755192", "info":{"authors":{"author":[{"@pid":"63/7026-1","text":"Cheng Hu 0001"},{"@pid":"170/1753-1","text":"Yuanhao Li 0001"},{"@pid":"17/10770","text":"Xichao Dong"},{"@pid":"06/2293-18","text":"Rui Wang 0018"},{"@pid":"56/434","text":"Chang Cui"}]},"title":"Optimal 3D deformation measuring in inclined geosynchronous orbit SAR differential interferometry.","venue":"Sci. China Inf. Sci.","volume":"60","number":"6","pages":"060303:1-060303:15","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/0001LD0C17","doi":"10.1007/S11432-016-9083-4","ee":"https://doi.org/10.1007/s11432-016-9083-4","url":"https://dblp.org/rec/journals/chinaf/0001LD0C17"}, "url":"URL#2755192" }, { "@score":"1", "@id":"2755193", "info":{"authors":{"author":[{"@pid":"63/3737-1","text":"Tao Zeng 0001"},{"@pid":"170/9728","text":"Tiandong Liu"},{"@pid":"02/10299","text":"Zegang Ding"},{"@pid":"52/323-4","text":"Qi Zhang 0004"},{"@pid":"78/6727-5","text":"Zhen Wang 0005"},{"@pid":"16/4996","text":"Teng Long"}]},"title":"A novel DEM reconstruction strategy based on multi-frequency InSAR in highly sloped terrain.","venue":"Sci. China Inf. Sci.","volume":"60","number":"8","pages":"88301","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/0001LDZWL17","doi":"10.1007/S11432-016-0085-4","ee":"https://doi.org/10.1007/s11432-016-0085-4","url":"https://dblp.org/rec/journals/chinaf/0001LDZWL17"}, "url":"URL#2755193" }, { "@score":"1", "@id":"2755194", "info":{"authors":{"author":[{"@pid":"55/2363-1","text":"Jianhua Zhang 0001"},{"@pid":"73/4491","text":"Pan Tang"},{"@pid":"04/2026-4","text":"Lei Tian 0004"},{"@pid":"212/6769","text":"Zhixue Hu"},{"@pid":"18/6839","text":"Tan Wang"},{"@pid":"97/604","text":"Haiming Wang"}]},"title":"6-100 GHz research progress and challenges from a channel perspective for fifth generation (5G) and future wireless communication.","venue":"Sci. China Inf. Sci.","volume":"60","number":"8","pages":"080301:1-080301:18","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/0001TTHWW17","doi":"10.1007/S11432-016-9144-X","ee":"https://doi.org/10.1007/s11432-016-9144-x","url":"https://dblp.org/rec/journals/chinaf/0001TTHWW17"}, "url":"URL#2755194" }, { "@score":"1", "@id":"2755195", "info":{"authors":{"author":[{"@pid":"75/148-1","text":"Yi Zeng 0001"},{"@pid":"145/7761","text":"Tielin Zhang"},{"@pid":"26/1194-2","text":"Bo Xu 0002"}]},"title":"Improving multi-layer spiking neural networks by incorporating brain-inspired rules.","venue":"Sci. China Inf. Sci.","volume":"60","number":"5","pages":"52201","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/0001ZX17","doi":"10.1007/S11432-016-0439-4","ee":"https://doi.org/10.1007/s11432-016-0439-4","url":"https://dblp.org/rec/journals/chinaf/0001ZX17"}, "url":"URL#2755195" }, { "@score":"1", "@id":"2755196", "info":{"authors":{"author":[{"@pid":"26/2578-2","text":"Rui Zhao 0002"},{"@pid":"182/9955","text":"Hongxin Lin"},{"@pid":"85/3508","text":"Yu-Cheng He"},{"@pid":"211/8583","text":"Dong-Hua Chen"},{"@pid":"62/1302","text":"Yongming Huang"}]},"title":"Impacts of outdated CSI for secure cooperative systems with opportunistic relay selection.","venue":"Sci. China Inf. Sci.","volume":"60","number":"6","pages":"069303:1-069303:3","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/0002LHCH17","doi":"10.1007/S11432-015-0942-8","ee":"https://doi.org/10.1007/s11432-015-0942-8","url":"https://dblp.org/rec/journals/chinaf/0002LHCH17"}, "url":"URL#2755196" }, { "@score":"1", "@id":"2755197", "info":{"authors":{"author":[{"@pid":"z/RuiZhang2","text":"Rui Zhang 0002"},{"@pid":"46/5778-2","text":"Hui Ma 0002"},{"@pid":"26/5662-2","text":"Yao Lu 0002"},{"@pid":"37/4190","text":"Yang Li"}]},"title":"Provably secure cloud storage for mobile networks with less computation and smaller overhead.","venue":"Sci. China Inf. Sci.","volume":"60","number":"12","pages":"122104:1-122104:13","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/0002MLL17","doi":"10.1007/S11432-016-0038-6","ee":"https://doi.org/10.1007/s11432-016-0038-6","url":"https://dblp.org/rec/journals/chinaf/0002MLL17"}, "url":"URL#2755197" }, { "@score":"1", "@id":"2755198", "info":{"authors":{"author":[{"@pid":"31/2088-3","text":"Lu Liu 0003"},{"@pid":"23/2060-1","text":"Dan Wang 0001"},{"@pid":"68/8130","text":"Zhouhua Peng"},{"@pid":"43/5979-1","text":"Hugh H. T. Liu"}]},"title":"Saturated coordinated control of multiple underactuated unmanned surface vehicles over a closed curve.","venue":"Sci. China Inf. Sci.","volume":"60","number":"7","pages":"070203:1-070203:14","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/0003WPL17","doi":"10.1007/S11432-016-9091-8","ee":"https://doi.org/10.1007/s11432-016-9091-8","url":"https://dblp.org/rec/journals/chinaf/0003WPL17"}, "url":"URL#2755198" }, { "@score":"1", "@id":"2755199", "info":{"authors":{"author":[{"@pid":"69/7024-3","text":"Bin Xu 0003"},{"@pid":"64/5845-6","text":"Yuan Yuan 0006"}]},"title":"Two performance enhanced control of flexible-link manipulator with system uncertainty and disturbances.","venue":"Sci. China Inf. Sci.","volume":"60","number":"5","pages":"50202","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/0003Y17","doi":"10.1007/S11432-016-0604-6","ee":"https://doi.org/10.1007/s11432-016-0604-6","url":"https://dblp.org/rec/journals/chinaf/0003Y17"}, "url":"URL#2755199" }, { "@score":"1", "@id":"2755200", "info":{"authors":{"author":[{"@pid":"55/3002-4","text":"Jie Cui 0004"},{"@pid":"12/2179-1","text":"Hong Zhong 0001"},{"@pid":"198/0216","text":"Weiya Luo"},{"@pid":"05/3499-24","text":"Jing Zhang 0024"}]},"title":"Area-based mobile multicast group key management scheme for secure mobile cooperative sensing.","venue":"Sci. China Inf. Sci.","volume":"60","number":"9","pages":"098104:1-098104:3","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/00040L017","doi":"10.1007/S11432-016-9048-8","ee":"https://doi.org/10.1007/s11432-016-9048-8","url":"https://dblp.org/rec/journals/chinaf/00040L017"}, "url":"URL#2755200" }, { "@score":"1", "@id":"2755201", "info":{"authors":{"author":[{"@pid":"84/2694-8","text":"Yong Wang 0008"},{"@pid":"70/2080","text":"Zhiqiu Huang"},{"@pid":"93/2334-19","text":"Yong Li 0019"},{"@pid":"191/6615","text":"BingWu Fang"}]},"title":"Lightweight fault localization combined with fault context to improve fault absolute rank.","venue":"Sci. China Inf. Sci.","volume":"60","number":"9","pages":"092113:1-092113:16","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/0008HLF17","doi":"10.1007/S11432-017-9112-2","ee":"https://doi.org/10.1007/s11432-017-9112-2","url":"https://dblp.org/rec/journals/chinaf/0008HLF17"}, "url":"URL#2755201" }, { "@score":"1", "@id":"2755202", "info":{"authors":{"author":[{"@pid":"26/108-8","text":"Chunyan Wang 0008"},{"@pid":"41/10645","text":"Zongyu Zuo"},{"@pid":"212/6774","text":"Qinghai Gong"},{"@pid":"57/606","text":"Zhengtao Ding"}]},"title":"Formation control with disturbance rejection for a class of Lipschitz nonlinear systems.","venue":"Sci. China Inf. Sci.","volume":"60","number":"7","pages":"070202:1-070202:11","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/0008ZGD17","doi":"10.1007/S11432-016-9125-2","ee":"https://doi.org/10.1007/s11432-016-9125-2","url":"https://dblp.org/rec/journals/chinaf/0008ZGD17"}, "url":"URL#2755202" }, { "@score":"1", "@id":"2755203", "info":{"authors":{"author":[{"@pid":"64/5666-19","text":"Lei Zhang 0019"},{"@pid":"135/7074","text":"Hao-lin Li"},{"@pid":"262/0620","text":"Zhiwei Xu"},{"@pid":"59/9706","text":"Hongxian Wang"}]},"title":"Application of fast factorized back-projection algorithm for high-resolution highly squinted airborne SAR imaging.","venue":"Sci. China Inf. Sci.","volume":"60","number":"6","pages":"62301","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/0019LXW17","doi":"10.1007/S11432-015-0927-3","ee":"https://doi.org/10.1007/s11432-015-0927-3","url":"https://dblp.org/rec/journals/chinaf/0019LXW17"}, "url":"URL#2755203" }, { "@score":"1", "@id":"2755204", "info":{"authors":{"author":[{"@pid":"64/6025-22","text":"Wei Li 0022"},{"@pid":"58/375","text":"Yuefei Sui"},{"@pid":"29/186-4","text":"Jie Luo 0004"},{"@pid":"89/5615","text":"Bo Chen"}]},"title":"Contrary description logic: Gentzen deduction system.","venue":"Sci. China Inf. Sci.","volume":"60","number":"11","pages":"112103:1-112103:9","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/0022SLC17","doi":"10.1007/S11432-015-9050-6","ee":"https://doi.org/10.1007/s11432-015-9050-6","url":"https://dblp.org/rec/journals/chinaf/0022SLC17"}, "url":"URL#2755204" }, { "@score":"1", "@id":"2755205", "info":{"authors":{"author":[{"@pid":"64/6025-22","text":"Wei Li 0022"},{"@pid":"58/375","text":"Yuefei Sui"},{"@pid":"52/3971","text":"Yuhui Wang"}]},"title":"The propositional normal default logic and the finite/infinite injury priority method.","venue":"Sci. China Inf. Sci.","volume":"60","number":"9","pages":"092107:1-092107:10","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/0022SW17","doi":"10.1007/S11432-016-0551-5","ee":"https://doi.org/10.1007/s11432-016-0551-5","url":"https://dblp.org/rec/journals/chinaf/0022SW17"}, "url":"URL#2755205" }, { "@score":"1", "@id":"2755206", "info":{"authors":{"author":[{"@pid":"185/9546","text":"Gatai Bai"},{"@pid":"99/955-3","text":"Ran Tao 0003"},{"@pid":"32/757-1","text":"Juan Zhao 0001"},{"@pid":"80/9705","text":"Xia Bai"},{"@pid":"33/4822-1","text":"Yue Wang 0001"}]},"title":"Fast FOCUSS method based on bi-conjugate gradient and its application to space-time clutter spectrum estimation.","venue":"Sci. China Inf. Sci.","volume":"60","number":"8","pages":"82302","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/BaiTZB017","doi":"10.1007/S11432-015-1016-X","ee":"https://doi.org/10.1007/s11432-015-1016-x","url":"https://dblp.org/rec/journals/chinaf/BaiTZB017"}, "url":"URL#2755206" }, { "@score":"1", "@id":"2755207", "info":{"authors":{"author":[{"@pid":"202/6475","text":"Weiqi Bai"},{"@pid":"30/8133","text":"Xiuming Yao"},{"@pid":"99/5261","text":"Hairong Dong"},{"@pid":"94/7236","text":"Xue Lin"}]},"title":"Mixed H-/H∞ fault detection filter design for the dynamics of high speed train.","venue":"Sci. China Inf. Sci.","volume":"60","number":"4","pages":"048201:1-048201:3","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/BaiYDL17","doi":"10.1007/S11432-016-9023-1","ee":"https://doi.org/10.1007/s11432-016-9023-1","url":"https://dblp.org/rec/journals/chinaf/BaiYDL17"}, "url":"URL#2755207" }, { "@score":"1", "@id":"2755208", "info":{"authors":{"author":[{"@pid":"212/6817","text":"Xuanyu Bai"},{"@pid":"34/6356","text":"Jianguo Yao"},{"@pid":"74/2356","text":"Mingxuan Yuan"},{"@pid":"97/1199","text":"Ke Deng"},{"@pid":"64/1308","text":"Xike Xie"},{"@pid":"96/5680","text":"Haibing Guan"}]},"title":"Embedding differential privacy in decision tree algorithm with different depths.","venue":"Sci. China Inf. Sci.","volume":"60","number":"8","pages":"082104:1-082104:15","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/BaiYYDXG17","doi":"10.1007/S11432-016-0442-1","ee":"https://doi.org/10.1007/s11432-016-0442-1","url":"https://dblp.org/rec/journals/chinaf/BaiYYDXG17"}, "url":"URL#2755208" }, { "@score":"1", "@id":"2755209", "info":{"authors":{"author":[{"@pid":"161/1073","text":"Lingfeng Bao"},{"@pid":"89/6793-1","text":"David Lo 0001"},{"@pid":"06/2072-1","text":"Xin Xia 0001"},{"@pid":"35/1103","text":"Shanping Li"}]},"title":"Automated Android application permission recommendation.","venue":"Sci. China Inf. Sci.","volume":"60","number":"9","pages":"092110:1-092110:17","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/BaoLXL17","doi":"10.1007/S11432-016-9072-3","ee":"https://doi.org/10.1007/s11432-016-9072-3","url":"https://dblp.org/rec/journals/chinaf/BaoLXL17"}, "url":"URL#2755209" }, { "@score":"1", "@id":"2755210", "info":{"authors":{"author":[{"@pid":"193/6686","text":"Jiuyue Cao"},{"@pid":"04/3348-14","text":"Yan Zhang 0014"},{"@pid":"74/8455","text":"Wei An"},{"@pid":"24/1518","text":"Xin Chen"},{"@pid":"167/9205","text":"Jiyan Sun"},{"@pid":"38/5321","text":"Yanni Han"}]},"title":"VNF-FG design and VNF placement for 5G mobile networks.","venue":"Sci. China Inf. Sci.","volume":"60","number":"4","pages":"40302","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/Cao0ACSH17","doi":"10.1007/S11432-016-9031-X","ee":"https://doi.org/10.1007/s11432-016-9031-x","url":"https://dblp.org/rec/journals/chinaf/Cao0ACSH17"}, "url":"URL#2755210" }, { "@score":"1", "@id":"2755211", "info":{"authors":{"author":[{"@pid":"57/3332","text":"Li Cao"},{"@pid":"197/0965","text":"Siukong Koo"},{"@pid":"68/4942","text":"Jian Sun"},{"@pid":"85/3682","text":"Guanhua Chen"},{"@pid":"49/4096","text":"Wenping Wang"}]},"title":"Structure descriptor for surface passivation in the simulation of atomistic models.","venue":"Sci. China Inf. Sci.","volume":"60","number":"3","pages":"32103","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/CaoKSCW17","doi":"10.1007/S11432-014-0876-4","ee":"https://doi.org/10.1007/s11432-014-0876-4","url":"https://dblp.org/rec/journals/chinaf/CaoKSCW17"}, "url":"URL#2755211" }, { "@score":"1", "@id":"2755212", "info":{"authors":{"author":[{"@pid":"77/2845","text":"Jinde Cao"},{"@pid":"154/1994","text":"Ruoxia Li"}]},"title":"Fixed-time synchronization of delayed memristor-based recurrent neural networks.","venue":"Sci. China Inf. Sci.","volume":"60","number":"3","pages":"32201","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/CaoL17","doi":"10.1007/S11432-016-0555-2","ee":"https://doi.org/10.1007/s11432-016-0555-2","url":"https://dblp.org/rec/journals/chinaf/CaoL17"}, "url":"URL#2755212" }, { "@score":"1", "@id":"2755213", "info":{"authors":{"author":[{"@pid":"125/3458","text":"Rong Chai"},{"@pid":"03/8549","text":"Haipeng Li"},{"@pid":"210/6278","text":"Feiying Meng"},{"@pid":"07/1671","text":"Qianbin Chen"}]},"title":"Energy consumption optimization-based joint route selection and flow allocation algorithm for software-defined networking.","venue":"Sci. China Inf. Sci.","volume":"60","number":"4","pages":"040306:1-040306:14","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/ChaiLMC17","doi":"10.1007/S11432-017-9043-8","ee":"https://doi.org/10.1007/s11432-017-9043-8","url":"https://dblp.org/rec/journals/chinaf/ChaiLMC17"}, "url":"URL#2755213" }, { "@score":"1", "@id":"2755214", "info":{"authors":{"author":[{"@pid":"81/4345-8","text":"Fei Chen 0008"},{"@pid":"92/5008-1","text":"Wei Ren 0001"},{"@pid":"65/6656","text":"Zongli Lin"}]},"title":"Multi-leader multi-follower coordination with cohesion, dispersion, and containment control via proximity graphs.","venue":"Sci. China Inf. Sci.","volume":"60","number":"11","pages":"110204:1-110204:20","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/Chen0L17","doi":"10.1007/S11432-017-9146-1","ee":"https://doi.org/10.1007/s11432-017-9146-1","url":"https://dblp.org/rec/journals/chinaf/Chen0L17"}, "url":"URL#2755214" }, { "@score":"1", "@id":"2755215", "info":{"authors":{"author":[{"@pid":"176/7584","text":"Mulin Chen"},{"@pid":"19/1924-9","text":"Qi Wang 0009"},{"@pid":"l/XuelongLi","text":"Xuelong Li 0001"}]},"title":"Patch-based topic model for group detection.","venue":"Sci. China Inf. Sci.","volume":"60","number":"11","pages":"113101:1-113101:7","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/Chen0L17a","doi":"10.1007/S11432-017-9237-1","ee":"https://doi.org/10.1007/s11432-017-9237-1","url":"https://dblp.org/rec/journals/chinaf/Chen0L17a"}, "url":"URL#2755215" }, { "@score":"1", "@id":"2755216", "info":{"authors":{"author":[{"@pid":"54/2930","text":"Hanhua Chen"},{"@pid":"98/4156","text":"Hai Jin 0001"},{"@pid":"142/7755","text":"Xiaolong Cui"}]},"title":"Hybrid followee recommendation in microblogging systems.","venue":"Sci. China Inf. Sci.","volume":"60","number":"1","pages":"12102","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/ChenJC17","doi":"10.1007/S11432-016-5551-7","ee":"https://doi.org/10.1007/s11432-016-5551-7","url":"https://dblp.org/rec/journals/chinaf/ChenJC17"}, "url":"URL#2755216" }, { "@score":"1", "@id":"2755217", "info":{"authors":{"author":[{"@pid":"66/6320-4","text":"Qi Chen 0004"},{"@pid":"56/4375","text":"Jing Wan"},{"@pid":"12/8126","text":"Jianliang Ai"}]},"title":"L1 adaptive control of a generic hypersonic vehicle model with a blended pneumatic and thrust vectoring control strategy.","venue":"Sci. China Inf. Sci.","volume":"60","number":"3","pages":"32203","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/ChenWA17","doi":"10.1007/S11432-016-0169-8","ee":"https://doi.org/10.1007/s11432-016-0169-8","url":"https://dblp.org/rec/journals/chinaf/ChenWA17"}, "url":"URL#2755217" }, { "@score":"1", "@id":"2755218", "info":{"authors":{"author":[{"@pid":"13/9705","text":"Yingmei Chen"},{"@pid":"19/5112-11","text":"Zhen Zhang 0011"},{"@pid":"43/9755","text":"Jiquan Li"},{"@pid":"39/721","text":"Hui Wang"},{"@pid":"212/6722","text":"Pengxia Wang"},{"@pid":"30/10798","text":"Yanwei Li"}]},"title":"Design of low power 4×40 Gb/s laser diode driver for parallel optical transmission systems.","venue":"Sci. China Inf. Sci.","volume":"60","number":"8","pages":"88401","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/ChenZLWWL17","doi":"10.1007/S11432-016-0372-5","ee":"https://doi.org/10.1007/s11432-016-0372-5","url":"https://dblp.org/rec/journals/chinaf/ChenZLWWL17"}, "url":"URL#2755218" }, { "@score":"1", "@id":"2755219", "info":{"authors":{"author":[{"@pid":"48/2700","text":"Lei Cheng"},{"@pid":"30/5583-1","text":"Bing Sun 0001"},{"@pid":"66/190-2","text":"Chao Li 0002"}]},"title":"Revised cryptanalysis for SMS4.","venue":"Sci. China Inf. Sci.","volume":"60","number":"12","pages":"122101","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/ChengS017","doi":"10.1007/S11432-016-0477-8","ee":"https://doi.org/10.1007/s11432-016-0477-8","url":"https://dblp.org/rec/journals/chinaf/ChengS017"}, "url":"URL#2755219" }, { "@score":"1", "@id":"2755220", "info":{"authors":{"author":[{"@pid":"212/6775","text":"Rajan Cristin"},{"@pid":"80/3177","text":"Velankanni Cyril Raj"}]},"title":"Consistency features and fuzzy-based segmentation for shadow and reflection detection in digital image forgery.","venue":"Sci. China Inf. Sci.","volume":"60","number":"8","pages":"082101:1-082101:18","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/CristinR17","doi":"10.1007/S11432-016-0478-Y","ee":"https://doi.org/10.1007/s11432-016-0478-y","url":"https://dblp.org/rec/journals/chinaf/CristinR17"}, "url":"URL#2755220" }, { "@score":"1", "@id":"2755221", "info":{"authors":{"author":[{"@pid":"79/940","text":"Qimei Cui"},{"@pid":"192/3610","text":"Zhiyan Cui"},{"@pid":"44/4773","text":"Wei Zheng"},{"@pid":"j/RikuJantti","text":"Riku Jäntti"},{"@pid":"128/8010","text":"Weiliang Xie"}]},"title":"Energy-aware deployment of dense heterogeneous cellular networks with QoS constraints.","venue":"Sci. China Inf. Sci.","volume":"60","number":"4","pages":"42303","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/CuiCZJX17","doi":"10.1007/S11432-016-0249-9","ee":"https://doi.org/10.1007/s11432-016-0249-9","url":"https://dblp.org/rec/journals/chinaf/CuiCZJX17"}, "url":"URL#2755221" }, { "@score":"1", "@id":"2755222", "info":{"authors":{"author":[{"@pid":"151/8858","text":"Hainan Cui"},{"@pid":"84/5969","text":"Shuhan Shen"},{"@pid":"35/6476","text":"Zhanyi Hu"}]},"title":"Global fusion of generalized camera model for efficient large-scale structure from motion.","venue":"Sci. China Inf. Sci.","volume":"60","number":"3","pages":"38101","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/CuiSH17","doi":"10.1007/S11432-015-0792-1","ee":"https://doi.org/10.1007/s11432-015-0792-1","url":"https://dblp.org/rec/journals/chinaf/CuiSH17"}, "url":"URL#2755222" }, { "@score":"1", "@id":"2755223", "info":{"authors":{"author":[{"@pid":"89/2968","text":"Xiaole Cui"},{"@pid":"72/3527","text":"Qiang Zhang"},{"@pid":"23/1520","text":"Xiaoxin Cui"},{"@pid":"45/6404","text":"Xin'an Wang"},{"@pid":"97/7420","text":"Jinfeng Kang"},{"@pid":"55/2775","text":"Xiaoyan Liu"}]},"title":"Testing of 1TnR RRAM array with sneak path technique.","venue":"Sci. China Inf. Sci.","volume":"60","number":"2","pages":"29402","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/CuiZCWKL17","doi":"10.1007/S11432-016-0015-7","ee":"https://doi.org/10.1007/s11432-016-0015-7","url":"https://dblp.org/rec/journals/chinaf/CuiZCWKL17"}, "url":"URL#2755223" }, { "@score":"1", "@id":"2755224", "info":{"authors":{"author":[{"@pid":"157/0194","text":"Yibin Dai"},{"@pid":"127/0195","text":"Shaozhen Chen"}]},"title":"Cryptanalysis of full PRIDE block cipher.","venue":"Sci. China Inf. Sci.","volume":"60","number":"5","pages":"052108:1-052108:12","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/DaiC17","doi":"10.1007/S11432-015-5487-3","ee":"https://doi.org/10.1007/s11432-015-5487-3","url":"https://dblp.org/rec/journals/chinaf/DaiC17"}, "url":"URL#2755224" }, { "@score":"1", "@id":"2755225", "info":{"authors":{"author":[{"@pid":"56/7757","text":"Jianxin Dai"},{"@pid":"125/8189","text":"Jun Wang"},{"@pid":"254/9924","text":"Chonghu Cheng 0001"},{"@pid":"99/311-1","text":"Ming Chen 0001"},{"@pid":"98/2691","text":"Jin Zhou"}]},"title":"Linear precoding based on a non-ideal Nakagami-m channel in a massive MIMO system.","venue":"Sci. China Inf. Sci.","volume":"60","number":"6","pages":"69301","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/DaiWC0Z17","doi":"10.1007/S11432-016-0400-1","ee":"https://doi.org/10.1007/s11432-016-0400-1","url":"https://dblp.org/rec/journals/chinaf/DaiWC0Z17"}, "url":"URL#2755225" }, { "@score":"1", "@id":"2755226", "info":{"authors":{"author":[{"@pid":"77/6871","text":"Yu Ding"},{"@pid":"64/5099","text":"Tao Wei"},{"@pid":"27/3541-3","text":"Hui Xue 0003"},{"@pid":"32/9374","text":"Yulong Zhang"},{"@pid":"94/3019-8","text":"Chao Zhang 0008"},{"@pid":"38/2577","text":"Xinhui Han"}]},"title":"Accurate and efficient exploit capture and classification.","venue":"Sci. China Inf. Sci.","volume":"60","number":"5","pages":"052110:1-052110:17","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/DingWXZZH17","doi":"10.1007/S11432-016-5521-0","ee":"https://doi.org/10.1007/s11432-016-5521-0","url":"https://dblp.org/rec/journals/chinaf/DingWXZZH17"}, "url":"URL#2755226" }, { "@score":"1", "@id":"2755227", "info":{"authors":{"author":[{"@pid":"123/7087","text":"Guangliang Dong"},{"@pid":"51/10779","text":"De-Zhen Xu"},{"@pid":"29/5847","text":"Haitao Li"},{"@pid":"78/6138","text":"Huan Zhou"}]},"title":"Initial result of the Chinese Deep Space Stations' coordinates from Chinese domestic VLBI experiments.","venue":"Sci. China Inf. Sci.","volume":"60","number":"1","pages":"12203","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/DongXLZ17","doi":"10.1007/S11432-016-0195-9","ee":"https://doi.org/10.1007/s11432-016-0195-9","url":"https://dblp.org/rec/journals/chinaf/DongXLZ17"}, "url":"URL#2755227" }, { "@score":"1", "@id":"2755228", "info":{"authors":{"author":[{"@pid":"153/9564","text":"Junwen Duan"},{"@pid":"44/10861","text":"Xiao Ding"},{"@pid":"52/5150-1","text":"Ting Liu 0001"}]},"title":"A Gaussian copula regression model for movie box-office revenues prediction.","venue":"Sci. China Inf. Sci.","volume":"60","number":"9","pages":"092103:1-092103:14","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/DuanDL17","doi":"10.1007/S11432-015-0905-6","ee":"https://doi.org/10.1007/s11432-015-0905-6","url":"https://dblp.org/rec/journals/chinaf/DuanDL17"}, "url":"URL#2755228" }, { "@score":"1", "@id":"2755229", "info":{"authors":{"author":[{"@pid":"212/1521","text":"Huayu Fan"},{"@pid":"63/7418","text":"Lixiang Ren"},{"@pid":"16/4996","text":"Teng Long"},{"@pid":"73/8858","text":"Erke Mao"}]},"title":"A high-precision phase-derived range and velocity measurement method based on synthetic wideband pulse Doppler radar.","venue":"Sci. China Inf. Sci.","volume":"60","number":"8","pages":"82301","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/FanRLM17","doi":"10.1007/S11432-016-0097-4","ee":"https://doi.org/10.1007/s11432-016-0097-4","url":"https://dblp.org/rec/journals/chinaf/FanRLM17"}, "url":"URL#2755229" }, { "@score":"1", "@id":"2755230", "info":{"authors":{"author":[{"@pid":"93/5437","text":"Zhejun Fang"},{"@pid":"66/1298","text":"Qixu Liu"},{"@pid":"83/6530-1","text":"Yuqing Zhang 0001"},{"@pid":"78/2022","text":"Kai Wang"},{"@pid":"67/187-6","text":"Zhiqiang Wang 0006"},{"@pid":"115/6521","text":"Qianru Wu"}]},"title":"A static technique for detecting input validation vulnerabilities in Android apps.","venue":"Sci. China Inf. Sci.","volume":"60","number":"5","pages":"052111:1-052111:16","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/FangLZWWW17","doi":"10.1007/S11432-015-5422-7","ee":"https://doi.org/10.1007/s11432-015-5422-7","url":"https://dblp.org/rec/journals/chinaf/FangLZWWW17"}, "url":"URL#2755230" }, { "@score":"1", "@id":"2755231", "info":{"authors":{"author":[{"@pid":"57/3702","text":"Weidong Fang"},{"@pid":"86/8332","text":"Wuxiong Zhang"},{"@pid":"48/450-1","text":"Yang Yang 0001"},{"@pid":"51/3710-47","text":"Yang Liu 0047"},{"@pid":"c/WeiChen36","text":"Wei Chen 0036"}]},"title":"A resilient trust management scheme for defending against reputation time-varying attacks based on BETA distribution.","venue":"Sci. China Inf. Sci.","volume":"60","number":"4","pages":"40305","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/FangZ0LC17","doi":"10.1007/S11432-016-9028-0","ee":"https://doi.org/10.1007/s11432-016-9028-0","url":"https://dblp.org/rec/journals/chinaf/FangZ0LC17"}, "url":"URL#2755231" }, { "@score":"1", "@id":"2755232", "info":{"authors":{"author":[{"@pid":"28/4423","text":"Rui Feng"},{"@pid":"29/6643-4","text":"Jie Huang 0004"},{"@pid":"68/4942-13","text":"Jian Sun 0013"},{"@pid":"75/2596","text":"Cheng-Xiang Wang 0001"}]},"title":"A novel 3D frequency domain SAGE algorithm with applications to parameter estimation in mmWave massive MIMO indoor channels.","venue":"Sci. China Inf. Sci.","volume":"60","number":"8","pages":"080305:1-080305:12","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/FengH0W17","doi":"10.1007/S11432-017-9139-4","ee":"https://doi.org/10.1007/s11432-017-9139-4","url":"https://dblp.org/rec/journals/chinaf/FengH0W17"}, "url":"URL#2755232" }, { "@score":"1", "@id":"2755233", "info":{"authors":{"author":[{"@pid":"95/8789","text":"Jingyu Feng"},{"@pid":"33/9707","text":"Guangyue Lu"},{"@pid":"83/6530-1","text":"Yuqing Zhang 0001"},{"@pid":"70/5417-1","text":"Honggang Wang 0001"}]},"title":"Avoiding monopolization: mutual-aid collusive attack detection in cooperative spectrum sensing.","venue":"Sci. China Inf. Sci.","volume":"60","number":"5","pages":"59101","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/FengLZW17","doi":"10.1007/S11432-015-0337-X","ee":"https://doi.org/10.1007/s11432-015-0337-x","url":"https://dblp.org/rec/journals/chinaf/FengLZW17"}, "url":"URL#2755233" }, { "@score":"1", "@id":"2755234", "info":{"authors":{"author":[{"@pid":"16/7005","text":"Jufu Feng"},{"@pid":"35/573-5","text":"Xiao Ma 0005"},{"@pid":"197/0766","text":"Wenjing Zhuang"}]},"title":"Collaborative representation Bayesian face recognition.","venue":"Sci. China Inf. Sci.","volume":"60","number":"4","pages":"48101","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/FengXZ17","doi":"10.1007/S11432-015-0799-4","ee":"https://doi.org/10.1007/s11432-015-0799-4","url":"https://dblp.org/rec/journals/chinaf/FengXZ17"}, "url":"URL#2755234" }, { "@score":"1", "@id":"2755235", "info":{"authors":{"author":[{"@pid":"46/4184","text":"Hao Feng"},{"@pid":"95/870","text":"Guang Zeng"},{"@pid":"56/6513","text":"Wenbao Han"},{"@pid":"48/450","text":"Yang Yang"}]},"title":"New strategy for searching disturbance vector of SHA-1 collision attack.","venue":"Sci. China Inf. Sci.","volume":"60","number":"12","pages":"129101:1-129101:3","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/FengZHY17","doi":"10.1007/S11432-016-9241-X","ee":"https://doi.org/10.1007/s11432-016-9241-x","url":"https://dblp.org/rec/journals/chinaf/FengZHY17"}, "url":"URL#2755235" }, { "@score":"1", "@id":"2755236", "info":{"authors":{"author":[{"@pid":"178/0686","text":"Qin Fu"},{"@pid":"185/2584","text":"Panpan Gu"},{"@pid":"08/827","text":"Xiangdong Li"},{"@pid":"89/6265","text":"Jianrong Wu"}]},"title":"Iterative learning control approach for consensus of multi-agent systems with regular linear dynamics.","venue":"Sci. China Inf. Sci.","volume":"60","number":"7","pages":"79202","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/FuGLW17","doi":"10.1007/S11432-016-0341-7","ee":"https://doi.org/10.1007/s11432-016-0341-7","url":"https://dblp.org/rec/journals/chinaf/FuGLW17"}, "url":"URL#2755236" }, { "@score":"1", "@id":"2755237", "info":{"authors":{"author":[{"@pid":"178/0686","text":"Qin Fu"},{"@pid":"185/2584","text":"Panpan Gu"},{"@pid":"89/6265","text":"Jianrong Wu"}]},"title":"Iterative learning control for one-dimensional fourth order distributed parameter systems.","venue":"Sci. China Inf. Sci.","volume":"60","number":"1","pages":"12204","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/FuGW17","doi":"10.1007/S11432-015-1031-6","ee":"https://doi.org/10.1007/s11432-015-1031-6","url":"https://dblp.org/rec/journals/chinaf/FuGW17"}, "url":"URL#2755237" }, { "@score":"1", "@id":"2755238", "info":{"authors":{"author":[{"@pid":"22/2389","text":"Kui Fu"},{"@pid":"197/0993","text":"Guangqiong Zhao"},{"@pid":"197/0899","text":"Xiajing Li"},{"@pid":"154/6079","text":"Zhong-Liang Tang"},{"@pid":"20/6417-1","text":"Wei He 0001"}]},"title":"Iterative spherical simplex unscented particle filter for CNS/Redshift integrated navigation system.","venue":"Sci. China Inf. Sci.","volume":"60","number":"4","pages":"42201","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/FuZLTH17","doi":"10.1007/S11432-015-0189-9","ee":"https://doi.org/10.1007/s11432-015-0189-9","url":"https://dblp.org/rec/journals/chinaf/FuZLTH17"}, "url":"URL#2755238" }, { "@score":"1", "@id":"2755239", "info":{"authors":{"author":[{"@pid":"211/2697","text":"Roger M. Fuster"},{"@pid":"211/2506","text":"Marc Fernández Usón"},{"@pid":"35/764","text":"Antoni Broquetas Ibars"}]},"title":"Interferometric orbit determination for geostationary satellites.","venue":"Sci. China Inf. Sci.","volume":"60","number":"6","pages":"060302:1-060302:11","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/FusterUI17","doi":"10.1007/S11432-016-9052-Y","ee":"https://doi.org/10.1007/s11432-016-9052-y","url":"https://dblp.org/rec/journals/chinaf/FusterUI17"}, "url":"URL#2755239" }, { "@score":"1", "@id":"2755240", "info":{"authors":{"author":[{"@pid":"46/3479-7","text":"Yan Gao 0007"},{"@pid":"93/4847-1","text":"Yunfei Chen 0001"},{"@pid":"55/4757","text":"Aiqun Hu"}]},"title":"Throughput and BER of wireless powered DF relaying in Nakagami-m fading.","venue":"Sci. China Inf. Sci.","volume":"60","number":"10","pages":"102306:1-102306:13","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/GaoCH17","doi":"10.1007/S11432-016-0611-X","ee":"https://doi.org/10.1007/s11432-016-0611-x","url":"https://dblp.org/rec/journals/chinaf/GaoCH17"}, "url":"URL#2755240" }, { "@score":"1", "@id":"2755241", "info":{"authors":{"author":[{"@pid":"157/0252","text":"Yabin Gao"},{"@pid":"178/4881-1","text":"Wensheng Luo 0001"},{"@pid":"125/5518","text":"Jianxing Liu"},{"@pid":"26/2019","text":"Ligang Wu 0001"}]},"title":"Integral sliding mode control design for nonlinear stochastic systems under imperfect quantization.","venue":"Sci. China Inf. Sci.","volume":"60","number":"12","pages":"120206:1-120206:11","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/GaoLLW17","doi":"10.1007/S11432-017-9148-2","ee":"https://doi.org/10.1007/s11432-017-9148-2","url":"https://dblp.org/rec/journals/chinaf/GaoLLW17"}, "url":"URL#2755241" }, { "@score":"1", "@id":"2755242", "info":{"authors":{"author":[{"@pid":"02/563-7","text":"Jian Gao 0007"},{"@pid":"169/9860","text":"Ruizhi Li"},{"@pid":"13/3656","text":"Minghao Yin"}]},"title":"A randomized diversification strategy for solving satisfiability problem with long clauses.","venue":"Sci. China Inf. Sci.","volume":"60","number":"9","pages":"092109:1-092109:11","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/GaoLY17","doi":"10.1007/S11432-016-0258-4","ee":"https://doi.org/10.1007/s11432-016-0258-4","url":"https://dblp.org/rec/journals/chinaf/GaoLY17"}, "url":"URL#2755242" }, { "@score":"1", "@id":"2755243", "info":{"authors":{"author":[{"@pid":"35/5676-2","text":"Sheng Gao 0002"},{"@pid":"172/8609","text":"XinDi Ma"},{"@pid":"50/1455","text":"Jianming Zhu"},{"@pid":"12/6604-1","text":"Jianfeng Ma 0001"}]},"title":"APRS: a privacy-preserving location-aware recommender system based on differentially private histogram.","venue":"Sci. China Inf. Sci.","volume":"60","number":"11","pages":"119103:1-119103:3","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/GaoMZM17","doi":"10.1007/S11432-017-9222-7","ee":"https://doi.org/10.1007/s11432-017-9222-7","url":"https://dblp.org/rec/journals/chinaf/GaoMZM17"}, "url":"URL#2755243" }, { "@score":"1", "@id":"2755244", "info":{"authors":{"author":[{"@pid":"199/5036","text":"Yong-Feng Gao 0001"},{"@pid":"27/2483","text":"Xi-Ming Sun"},{"@pid":"35/7092-36","text":"Wei Wang 0036"}]},"title":"Decentralized backstepping adaptive output tracking of large-scale stochastic nonlinear systems.","venue":"Sci. China Inf. Sci.","volume":"60","number":"12","pages":"120207:1-120207:11","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/GaoS017","doi":"10.1007/S11432-017-9142-3","ee":"https://doi.org/10.1007/s11432-017-9142-3","url":"https://dblp.org/rec/journals/chinaf/GaoS017"}, "url":"URL#2755244" }, { "@score":"1", "@id":"2755245", "info":{"authors":{"author":[{"@pid":"33/6908","text":"Liang Geng"},{"@pid":"21/3626-10","text":"Fan Zhang 0010"},{"@pid":"06/6517","text":"Jizhong Shen"},{"@pid":"20/6417","text":"Wei He"},{"@pid":"94/7837","text":"Shivam Bhasin"},{"@pid":"66/10058","text":"Xinjie Zhao 0001"},{"@pid":"73/5583","text":"Shize Guo"}]},"title":"Transistor level SCA-resistant scheme based on fluctuating power logic.","venue":"Sci. China Inf. Sci.","volume":"60","number":"10","pages":"109401:1-109401:3","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/Geng0SHB0G17","doi":"10.1007/S11432-016-9046-4","ee":"https://doi.org/10.1007/s11432-016-9046-4","url":"https://dblp.org/rec/journals/chinaf/Geng0SHB0G17"}, "url":"URL#2755245" }, { "@score":"1", "@id":"2755246", "info":{"authors":{"author":[{"@pid":"74/10056","text":"Xuena Geng"},{"@pid":"43/3931","text":"Dantong Ouyang"},{"@pid":"27/6859","text":"Yonggang Zhang"}]},"title":"Model-based diagnosis of incomplete discrete-event system with rough set theory.","venue":"Sci. China Inf. Sci.","volume":"60","number":"1","pages":"12205","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/GengOZ17","doi":"10.1007/S11432-015-0897-0","ee":"https://doi.org/10.1007/s11432-015-0897-0","url":"https://dblp.org/rec/journals/chinaf/GengOZ17"}, "url":"URL#2755246" }, { "@score":"1", "@id":"2755247", "info":{"authors":{"author":[{"@pid":"76/7727","text":"Ji-Bing Gong"},{"@pid":"20/7715","text":"Xiaoxia Gao"},{"@pid":"85/5637-1","text":"Hong Cheng 0001"},{"@pid":"212/6786","text":"Jihui Liu"},{"@pid":"192/9636","text":"Yanqing Song"},{"@pid":"212/6756","text":"Mantang Zhang"},{"@pid":"51/4138","text":"Yi Zhao"}]},"title":"Integrating a weighted-average method into the random walk framework to generate individual friend recommendations.","venue":"Sci. China Inf. Sci.","volume":"60","number":"11","pages":"110104:1-110104:22","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/GongGCLSZZ17","doi":"10.1007/S11432-017-9243-7","ee":"https://doi.org/10.1007/s11432-017-9243-7","url":"https://dblp.org/rec/journals/chinaf/GongGCLSZZ17"}, "url":"URL#2755247" }, { "@score":"1", "@id":"2755248", "info":{"authors":{"author":[{"@pid":"06/10400","text":"Yeyun Gong"},{"@pid":"52/323-1","text":"Qi Zhang 0001"},{"@pid":"127/6804","text":"Xiaoying Han"},{"@pid":"05/6735-1","text":"Xuanjing Huang 0001"}]},"title":"Phrase-based hashtag recommendation for microblog posts.","venue":"Sci. China Inf. Sci.","volume":"60","number":"1","pages":"12109","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/GongZHH17","doi":"10.1007/S11432-015-0900-X","ee":"https://doi.org/10.1007/s11432-015-0900-x","url":"https://dblp.org/rec/journals/chinaf/GongZHH17"}, "url":"URL#2755248" }, { "@score":"1", "@id":"2755249", "info":{"authors":{"author":[{"@pid":"128/4755","text":"Yongqiang Guan"},{"@pid":"68/4459-1","text":"Long Wang 0001"}]},"title":"Structural controllability of multi-agent systems with absolute protocol under fixed and switching topologies.","venue":"Sci. China Inf. Sci.","volume":"60","number":"9","pages":"092203:1-092203:15","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/Guan017","doi":"10.1007/S11432-016-0498-8","ee":"https://doi.org/10.1007/s11432-016-0498-8","url":"https://dblp.org/rec/journals/chinaf/Guan017"}, "url":"URL#2755249" }, { "@score":"1", "@id":"2755250", "info":{"authors":{"author":[{"@pid":"138/5904","text":"Xiangmin Guan"},{"@pid":"38/1691","text":"Xuejun Zhang"},{"@pid":"212/6741","text":"Renli Lv"},{"@pid":"85/5901-9","text":"Jun Chen 0009"},{"@pid":"151/4437","text":"Michal Weiszer"}]},"title":"A large-scale multi-objective flights conflict avoidance approach supporting 4D trajectory operation.","venue":"Sci. China Inf. Sci.","volume":"60","number":"11","pages":"112202:1-112202:13","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/GuanZLCW17","doi":"10.1007/S11432-016-9024-Y","ee":"https://doi.org/10.1007/s11432-016-9024-y","url":"https://dblp.org/rec/journals/chinaf/GuanZLCW17"}, "url":"URL#2755250" }, { "@score":"1", "@id":"2755251", "info":{"authors":{"author":[{"@pid":"32/8957","text":"Andrea Monti Guarnieri"},{"@pid":"63/6442","text":"Fabio Rocca"}]},"title":"Options for continuous radar Earth observations.","venue":"Sci. China Inf. Sci.","volume":"60","number":"6","pages":"060301:1-060301:15","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/GuarnieriR17","doi":"10.1007/S11432-016-9067-7","ee":"https://doi.org/10.1007/s11432-016-9067-7","url":"https://dblp.org/rec/journals/chinaf/GuarnieriR17"}, "url":"URL#2755251" }, { "@score":"1", "@id":"2755252", "info":{"authors":{"author":[{"@pid":"204/1187","text":"Lulu Guo"},{"@pid":"20/7139","text":"Bingzhao Gao"},{"@pid":"93/2334","text":"Yong Li"},{"@pid":"52/4150-3","text":"Hong Chen 0003"}]},"title":"A fast algorithm for nonlinear model predictive control applied to HEV energy management systems.","venue":"Sci. China Inf. Sci.","volume":"60","number":"9","pages":"92201","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/GuoGLC17","doi":"10.1007/S11432-016-0269-Y","ee":"https://doi.org/10.1007/s11432-016-0269-y","url":"https://dblp.org/rec/journals/chinaf/GuoGLC17"}, "url":"URL#2755252" }, { "@score":"1", "@id":"2755253", "info":{"authors":{"author":[{"@pid":"129/5261","text":"Hongyan Guo"},{"@pid":"77/1318","text":"Feng Liu"},{"@pid":"174/3671","text":"Ru Yu"},{"@pid":"96/7762","text":"Zhenping Sun"},{"@pid":"52/4150-3","text":"Hong Chen 0003"}]},"title":"Regional path moving horizon tracking controller design for autonomous ground vehicles.","venue":"Sci. China Inf. Sci.","volume":"60","number":"1","pages":"13201","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/GuoLYSC17","doi":"10.1007/S11432-016-0310-1","ee":"https://doi.org/10.1007/s11432-016-0310-1","url":"https://dblp.org/rec/journals/chinaf/GuoLYSC17"}, "url":"URL#2755253" }, { "@score":"1", "@id":"2755254", "info":{"authors":{"author":[{"@pid":"174/6651","text":"Peipei Hao"},{"@pid":"05/2543","text":"Shuming Chen"},{"@pid":"129/2239","text":"Pengcheng Huang"},{"@pid":"20/1036","text":"Jianjun Chen"},{"@pid":"71/6053","text":"Bin Liang"}]},"title":"Cost-effective SET-tolerant clock distribution network design by mitigating single event transient propagation.","venue":"Sci. China Inf. Sci.","volume":"60","number":"10","pages":"108401:1-108401:3","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/HaoCHCL17","doi":"10.1007/S11432-016-9041-5","ee":"https://doi.org/10.1007/s11432-016-9041-5","url":"https://dblp.org/rec/journals/chinaf/HaoCHCL17"}, "url":"URL#2755254" }, { "@score":"1", "@id":"2755255", "info":{"authors":{"author":[{"@pid":"87/7765","text":"Debiao He"},{"@pid":"99/4292-2","text":"Ding Wang 0002"},{"@pid":"45/2601","text":"Qi Xie"},{"@pid":"66/5496","text":"Kefei Chen"}]},"title":"Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation.","venue":"Sci. China Inf. Sci.","volume":"60","number":"5","pages":"52104","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/HeWXC17","doi":"10.1007/S11432-016-0161-2","ee":"https://doi.org/10.1007/s11432-016-0161-2","url":"https://dblp.org/rec/journals/chinaf/HeWXC17"}, "url":"URL#2755255" }, { "@score":"1", "@id":"2755256", "info":{"authors":{"author":[{"@pid":"78/8768","text":"Chunhua He"},{"@pid":"164/9262","text":"Jimeng Zhang"},{"@pid":"54/11433","text":"Qiancheng Zhao"},{"@pid":"197/0962","text":"Qinwen Huang"},{"@pid":"08/8404","text":"Zhenchuan Yang"},{"@pid":"96/3425","text":"Dacheng Zhang"},{"@pid":"86/8403","text":"Guizhen Yan"}]},"title":"An electrical-coupling-suppressing MEMS gyroscope with feed-forward coupling compensation and scalable fuzzy control.","venue":"Sci. China Inf. Sci.","volume":"60","number":"4","pages":"42402","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/HeZZHYZY17","doi":"10.1007/S11432-015-0931-8","ee":"https://doi.org/10.1007/s11432-015-0931-8","url":"https://dblp.org/rec/journals/chinaf/HeZZHYZY17"}, "url":"URL#2755256" }, { "@score":"1", "@id":"2755257", "info":{"authors":{"author":[{"@pid":"47/223","text":"Stephen E. Hobbs"},{"@pid":"212/6810","text":"Joan-Pau Sánchez"}]},"title":"Laplace plane and low inclination geosynchronous radar mission design.","venue":"Sci. China Inf. Sci.","volume":"60","number":"6","pages":"060305:1-060305:10","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/HobbsS17","doi":"10.1007/S11432-017-9081-3","ee":"https://doi.org/10.1007/s11432-017-9081-3","url":"https://dblp.org/rec/journals/chinaf/HobbsS17"}, "url":"URL#2755257" }, { "@score":"1", "@id":"2755258", "info":{"authors":{"author":[{"@pid":"148/5661","text":"Haibo Hong"},{"@pid":"54/2170","text":"Licheng Wang"},{"@pid":"148/5888","text":"Haseeb Ahmad"},{"@pid":"33/5774","text":"Yixian Yang"},{"@pid":"25/269","text":"Zhiguo Qu"}]},"title":"Minimum length key in MST cryptosystems.","venue":"Sci. China Inf. Sci.","volume":"60","number":"5","pages":"052106:1-052106:11","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/HongWAYQ17","doi":"10.1007/S11432-015-5479-3","ee":"https://doi.org/10.1007/s11432-015-5479-3","url":"https://dblp.org/rec/journals/chinaf/HongWAYQ17"}, "url":"URL#2755258" }, { "@score":"1", "@id":"2755259", "info":{"authors":{"author":[{"@pid":"45/8179","text":"Yihua Hu"},{"@pid":"193/0354","text":"Shilong Xu"}]},"title":"Super-sensitive detection of quantum interferometer in atmospheric environment.","venue":"Sci. China Inf. Sci.","volume":"60","number":"3","pages":"32502","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/HuX17","doi":"10.1007/S11432-015-0878-8","ee":"https://doi.org/10.1007/s11432-015-0878-8","url":"https://dblp.org/rec/journals/chinaf/HuX17"}, "url":"URL#2755259" }, { "@score":"1", "@id":"2755260", "info":{"authors":{"author":[{"@pid":"120/7010","text":"Shuang Hu"},{"@pid":"76/7037-1","text":"Jihong Zhu 0001"}]},"title":"Longitudinal high incidence unsteady aerodynamic modeling for advanced combat aircraft configuration from wind tunnel data.","venue":"Sci. China Inf. Sci.","volume":"60","number":"11","pages":"118201:1-118201:3","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/HuZ17","doi":"10.1007/S11432-017-9095-7","ee":"https://doi.org/10.1007/s11432-017-9095-7","url":"https://dblp.org/rec/journals/chinaf/HuZ17"}, "url":"URL#2755260" }, { "@score":"1", "@id":"2755261", "info":{"authors":{"author":[{"@pid":"09/4551","text":"Xuexian Hu"},{"@pid":"94/2739-1","text":"Jiang Zhang 0001"},{"@pid":"43/4074","text":"Zhenfeng Zhang"},{"@pid":"07/1951-2","text":"Jing Xu 0002"}]},"title":"Universally composable anonymous password authenticated key exchange.","venue":"Sci. China Inf. Sci.","volume":"60","number":"5","pages":"52107","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/HuZZX17","doi":"10.1007/S11432-016-5522-Z","ee":"https://doi.org/10.1007/s11432-016-5522-z","url":"https://dblp.org/rec/journals/chinaf/HuZZX17"}, "url":"URL#2755261" }, { "@score":"1", "@id":"2755262", "info":{"authors":{"author":[{"@pid":"18/2169","text":"Xing Huang"},{"@pid":"10/2272","text":"Wenzhong Guo"},{"@pid":"54/10149","text":"Genggeng Liu"},{"@pid":"86/2961","text":"Guolong Chen"}]},"title":"MLXR: multi-layer obstacle-avoiding X-architecture Steiner tree construction for VLSI routing.","venue":"Sci. China Inf. Sci.","volume":"60","number":"1","pages":"19102:1-19102:3","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/HuangGLC17","doi":"10.1007/S11432-015-0850-4","ee":"https://doi.org/10.1007/s11432-015-0850-4","url":"https://dblp.org/rec/journals/chinaf/HuangGLC17"}, "url":"URL#2755262" }, { "@score":"1", "@id":"2755263", "info":{"authors":{"author":[{"@pid":"115/6962","text":"Guanming Huang"},{"@pid":"197/0997","text":"Donesh Gillin"},{"@pid":"73/6801","text":"Dian Zhou"},{"@pid":"01/2537-4","text":"Jin Liu 0004"},{"@pid":"58/5418-1","text":"Xuan Zeng 0001"},{"@pid":"73/10115","text":"Po-Yu Kuo"}]},"title":"An efficient and robust method to determine the optimal tap coefficients of high speed FIR equalizer.","venue":"Sci. China Inf. Sci.","volume":"60","number":"2","pages":"22401","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/HuangGZLZK17","doi":"10.1007/S11432-015-0967-7","ee":"https://doi.org/10.1007/s11432-015-0967-7","url":"https://dblp.org/rec/journals/chinaf/HuangGZLZK17"}, "url":"URL#2755263" }, { "@score":"1", "@id":"2755264", "info":{"authors":{"author":[{"@pid":"39/6301","text":"Yu Huang"},{"@pid":"76/5889","text":"Liang Jin"},{"@pid":"18/3173","text":"Na Li"},{"@pid":"29/10221","text":"Zhou Zhong"},{"@pid":"35/4986","text":"Xiaoming Xu"}]},"title":"Secret key generation based on private pilot under man-in-the-middle attack.","venue":"Sci. China Inf. Sci.","volume":"60","number":"10","pages":"100307:1-100307:14","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/HuangJLZX17","doi":"10.1007/S11432-017-9195-3","ee":"https://doi.org/10.1007/s11432-017-9195-3","url":"https://dblp.org/rec/journals/chinaf/HuangJLZX17"}, "url":"URL#2755264" }, { "@score":"1", "@id":"2755265", "info":{"authors":{"author":[{"@pid":"168/7949","text":"Haoqiu Huang"},{"@pid":"03/4227","text":"Lanlan Rui"},{"@pid":"176/0935","text":"Weiwei Zheng"},{"@pid":"68/10365","text":"Danmei Niu"},{"@pid":"13/342","text":"Xuesong Qiu 0001"}]},"title":"General, practical, and accurate models for the performance analysis of cache cascades.","venue":"Sci. China Inf. Sci.","volume":"60","number":"4","pages":"49302","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/HuangRZNQ17","doi":"10.1007/S11432-016-0178-2","ee":"https://doi.org/10.1007/s11432-016-0178-2","url":"https://dblp.org/rec/journals/chinaf/HuangRZNQ17"}, "url":"URL#2755265" }, { "@score":"1", "@id":"2755266", "info":{"authors":{"author":[{"@pid":"81/6685-17","text":"Wei Huang 0017"},{"@pid":"67/2863","text":"Yun Wei"},{"@pid":"99/1305-1","text":"Jianhua Guo 0001"},{"@pid":"77/2845","text":"Jinde Cao"}]},"title":"Next-generation innovation and development of intelligent transportation system in China.","venue":"Sci. China Inf. Sci.","volume":"60","number":"11","pages":"110201:1-110201:11","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/HuangWGC17","doi":"10.1007/S11432-017-9182-X","ee":"https://doi.org/10.1007/s11432-017-9182-x","url":"https://dblp.org/rec/journals/chinaf/HuangWGC17"}, "url":"URL#2755266" }, { "@score":"1", "@id":"2755267", "info":{"authors":{"author":[{"@pid":"86/489","text":"Kai Huang"},{"@pid":"43/3362-2","text":"Ming Xu 0002"},{"@pid":"98/902","text":"Shaojing Fu"},{"@pid":"21/841-4","text":"Dongsheng Wang 0004"}]},"title":"Practical privacy-preserving compressed sensing image recovery in the cloud.","venue":"Sci. China Inf. Sci.","volume":"60","number":"9","pages":"098103:1-098103:3","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/HuangXFW17","doi":"10.1007/S11432-016-9055-2","ee":"https://doi.org/10.1007/s11432-016-9055-2","url":"https://dblp.org/rec/journals/chinaf/HuangXFW17"}, "url":"URL#2755267" }, { "@score":"1", "@id":"2755268", "info":{"authors":{"author":[{"@pid":"212/6726","text":"Yifei Ji"},{"@pid":"139/7508","text":"Qilei Zhang"},{"@pid":"55/6614","text":"Yongsheng Zhang"},{"@pid":"60/1749-1","text":"Zhen Dong 0001"}]},"title":"L-band geosynchronous SAR imaging degradations imposed by ionospheric irregularities.","venue":"Sci. China Inf. Sci.","volume":"60","number":"6","pages":"060308:1-060308:13","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/JiZZD17","doi":"10.1007/S11432-016-9064-1","ee":"https://doi.org/10.1007/s11432-016-9064-1","url":"https://dblp.org/rec/journals/chinaf/JiZZD17"}, "url":"URL#2755268" }, { "@score":"1", "@id":"2755269", "info":{"authors":{"author":[{"@pid":"160/4450","text":"Zhengdong Jiang"},{"@pid":"212/6768","text":"Kaizhe Guo"},{"@pid":"29/1726","text":"Peng Huang"},{"@pid":"00/7673","text":"Yiming Fan"},{"@pid":"142/8338","text":"Chenxi Zhao"},{"@pid":"139/8469","text":"Yong-Ling Ban"},{"@pid":"95/3736","text":"Jun Liu"},{"@pid":"69/6765","text":"Kai Kang"}]},"title":"45-GHz and 60-GHz 90 nm CMOS power amplifiers with a fully symmetrical 8-way transformer power combiner.","venue":"Sci. China Inf. Sci.","volume":"60","number":"8","pages":"080303:1-080303:12","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/JiangGHFZBLK17","doi":"10.1007/S11432-016-9102-0","ee":"https://doi.org/10.1007/s11432-016-9102-0","url":"https://dblp.org/rec/journals/chinaf/JiangGHFZBLK17"}, "url":"URL#2755269" }, { "@score":"1", "@id":"2755270", "info":{"authors":{"author":[{"@pid":"26/10331","text":"Yupeng Jiang"},{"@pid":"53/8860","text":"Qun-Xiong Zheng"},{"@pid":"44/6488","text":"Dongdai Lin"}]},"title":"On s-uniform property of compressing sequences derived from primitive sequences modulo odd prime powers.","venue":"Sci. China Inf. Sci.","volume":"60","number":"5","pages":"052102:1-052102:12","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/JiangZL17","doi":"10.1007/S11432-015-5472-X","ee":"https://doi.org/10.1007/s11432-015-5472-x","url":"https://dblp.org/rec/journals/chinaf/JiangZL17"}, "url":"URL#2755270" }, { "@score":"1", "@id":"2755271", "info":{"authors":{"author":[{"@pid":"30/3790-1","text":"He Jiang 0001"},{"@pid":"150/3481","text":"Jingxuan Zhang"},{"@pid":"147/9595","text":"Hongjing Ma"},{"@pid":"180/9877","text":"Najam Nazar"},{"@pid":"85/6484","text":"Zhilei Ren"}]},"title":"Mining authorship characteristics in bug repositories.","venue":"Sci. China Inf. Sci.","volume":"60","number":"1","pages":"12107","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/JiangZMNR17","doi":"10.1007/S11432-014-0372-Y","ee":"https://doi.org/10.1007/s11432-014-0372-y","url":"https://dblp.org/rec/journals/chinaf/JiangZMNR17"}, "url":"URL#2755271" }, { "@score":"1", "@id":"2755272", "info":{"authors":{"author":[{"@pid":"19/9687","text":"Linpeng Jin"},{"@pid":"00/2441","text":"Jun Dong"}]},"title":"Classification of normal and abnormal ECG records using lead convolutional neural network and rule inference.","venue":"Sci. China Inf. Sci.","volume":"60","number":"7","pages":"078103:1-078103:3","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/JinD17","doi":"10.1007/S11432-016-9047-6","ee":"https://doi.org/10.1007/s11432-016-9047-6","url":"https://dblp.org/rec/journals/chinaf/JinD17"}, "url":"URL#2755272" }, { "@score":"1", "@id":"2755273", "info":{"authors":{"author":[{"@pid":"82/8150","text":"Xiaomin Jin"},{"@pid":"57/1057","text":"Yuanan Liu"},{"@pid":"142/3633","text":"Wenhao Fan"},{"@pid":"07/6378-7","text":"Fan Wu 0007"},{"@pid":"53/2833","text":"Bihua Tang"}]},"title":"Multisite computation offloading in dynamic mobile cloud environments.","venue":"Sci. China Inf. Sci.","volume":"60","number":"8","pages":"89301","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/JinLFWT17","doi":"10.1007/S11432-016-0009-6","ee":"https://doi.org/10.1007/s11432-016-0009-6","url":"https://dblp.org/rec/journals/chinaf/JinLFWT17"}, "url":"URL#2755273" }, { "@score":"1", "@id":"2755274", "info":{"authors":{"author":[{"@pid":"98/4156","text":"Hai Jin 0001"},{"@pid":"183/5361","text":"Pengcheng Yao"},{"@pid":"56/4402","text":"Xiaofei Liao"}]},"title":"Towards dataflow based graph processing.","venue":"Sci. China Inf. Sci.","volume":"60","number":"12","pages":"126102:1-126102:3","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/JinYL17","doi":"10.1007/S11432-017-9226-8","ee":"https://doi.org/10.1007/s11432-017-9226-8","url":"https://dblp.org/rec/journals/chinaf/JinYL17"}, "url":"URL#2755274" }, { "@score":"1", "@id":"2755275", "info":{"authors":{"author":[{"@pid":"68/3340-15","text":"Xin Jin 0015"},{"@pid":"191/6507","text":"Shuyun Zhu"},{"@pid":"44/7731","text":"Chaoen Xiao"},{"@pid":"77/6730","text":"Hongbo Sun"},{"@pid":"50/3993","text":"Xiaodong Li"},{"@pid":"77/5486-1","text":"Geng Zhao 0001"},{"@pid":"93/8104","text":"Shiming Ge"}]},"title":"3D textured model encryption via 3D Lu chaotic mapping.","venue":"Sci. China Inf. Sci.","volume":"60","number":"12","pages":"122107:1-122107:9","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/JinZXSLZG17","doi":"10.1007/S11432-017-9266-1","ee":"https://doi.org/10.1007/s11432-017-9266-1","url":"https://dblp.org/rec/journals/chinaf/JinZXSLZG17"}, "url":"URL#2755275" }, { "@score":"1", "@id":"2755276", "info":{"authors":{"author":[{"@pid":"30/4085","text":"Zhongliang Jing"},{"@pid":"191/2471","text":"Lingfeng Qiao"},{"@pid":"129/8171","text":"Han Pan"},{"@pid":"68/6900","text":"Yongsheng Yang"},{"@pid":"145/6115","text":"Wujun Chen"}]},"title":"An overview of the configuration and manipulation of soft robotics for on-orbit servicing.","venue":"Sci. China Inf. Sci.","volume":"60","number":"5","pages":"050201:1-050201:19","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/JingQPYC17","doi":"10.1007/S11432-016-9033-0","ee":"https://doi.org/10.1007/s11432-016-9033-0","url":"https://dblp.org/rec/journals/chinaf/JingQPYC17"}, "url":"URL#2755276" }, { "@score":"1", "@id":"2755277", "info":{"authors":{"author":[{"@pid":"30/4085","text":"Zhongliang Jing"},{"@pid":"69/7024","text":"Bin Xu"},{"@pid":"02/2737-1","text":"Fuchun Sun 0001"},{"@pid":"212/6770","text":"George Z. Zhu"}]},"title":"Editorial.","venue":"Sci. China Inf. Sci.","volume":"60","number":"5","pages":"050200:1","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/JingXSZ17","doi":"10.1007/S11432-017-9060-4","ee":"https://doi.org/10.1007/s11432-017-9060-4","url":"https://dblp.org/rec/journals/chinaf/JingXSZ17"}, "url":"URL#2755277" }, { "@score":"1", "@id":"2755278", "info":{"authors":{"author":[{"@pid":"98/3089-1","text":"Yu Kang 0001"},{"@pid":"57/4533","text":"Yan Ding"},{"@pid":"212/6784","text":"Zerui Li"},{"@pid":"25/7045-10","text":"Yang Cao 0010"},{"@pid":"42/5918","text":"Yun-Bo Zhao"}]},"title":"A networked remote sensing system for on-road vehicle emission monitoring.","venue":"Sci. China Inf. Sci.","volume":"60","number":"4","pages":"043201:1-043201:8","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/KangDLCZ17","doi":"10.1007/S11432-016-9010-1","ee":"https://doi.org/10.1007/s11432-016-9010-1","url":"https://dblp.org/rec/journals/chinaf/KangDLCZ17"}, "url":"URL#2755278" }, { "@score":"1", "@id":"2755279", "info":{"authors":{"author":[{"@pid":"54/10326","text":"Taimur Khan"},{"@pid":"82/6843-3","text":"Naveed Ahmad 0003"},{"@pid":"74/5570-2","text":"Yue Cao 0002"},{"@pid":"124/5490","text":"Syed Asim Jalal"},{"@pid":"16/2961-6","text":"Muhammad Asif 0006"},{"@pid":"184/6802","text":"Sana-ul Haq"},{"@pid":"212/6764","text":"Haitham Cruichshank"}]},"title":"Certificate revocation in vehicular ad hoc networks techniques and protocols: a survey.","venue":"Sci. China Inf. Sci.","volume":"60","number":"10","pages":"100301:1-100301:18","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/KhanACJAHC17","doi":"10.1007/S11432-017-9203-X","ee":"https://doi.org/10.1007/s11432-017-9203-x","url":"https://dblp.org/rec/journals/chinaf/KhanACJAHC17"}, "url":"URL#2755279" }, { "@score":"1", "@id":"2755280", "info":{"authors":{"author":[{"@pid":"89/8510","text":"Hong Lai"},{"@pid":"10/9245","text":"Mingxing Luo"},{"@pid":"p/JosefPieprzyk","text":"Josef Pieprzyk"},{"@pid":"25/269","text":"Zhiguo Qu"},{"@pid":"22/10176","text":"Shudong Li"},{"@pid":"o/MehmetAOrgun","text":"Mehmet A. Orgun"}]},"title":"An efficient quantum blind digital signature scheme.","venue":"Sci. China Inf. Sci.","volume":"60","number":"8","pages":"082501:1-082501:14","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/LaiLPQLO17","doi":"10.1007/S11432-016-9061-4","ee":"https://doi.org/10.1007/s11432-016-9061-4","url":"https://dblp.org/rec/journals/chinaf/LaiLPQLO17"}, "url":"URL#2755280" }, { "@score":"1", "@id":"2755281", "info":{"authors":{"author":[{"@pid":"184/4286","text":"Yusi Lei"},{"@pid":"09/10016","text":"Fu Song"},{"@pid":"04/5600","text":"Wanwei Liu"},{"@pid":"83/5342-7","text":"Min Zhang 0007"}]},"title":"On the complexity of ω-pushdown automata.","venue":"Sci. China Inf. Sci.","volume":"60","number":"11","pages":"112102:1-112102:15","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/LeiSLZ17","doi":"10.1007/S11432-016-9026-X","ee":"https://doi.org/10.1007/s11432-016-9026-x","url":"https://dblp.org/rec/journals/chinaf/LeiSLZ17"}, "url":"URL#2755281" }, { "@score":"1", "@id":"2755282", "info":{"authors":{"author":{"@pid":"14/1395","text":"Liang Li"}},"title":"Generating pairing-friendly elliptic curves with fixed embedding degrees.","venue":"Sci. China Inf. Sci.","volume":"60","number":"11","pages":"119101","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/Li17","doi":"10.1007/S11432-016-0412-0","ee":"https://doi.org/10.1007/s11432-016-0412-0","url":"https://dblp.org/rec/journals/chinaf/Li17"}, "url":"URL#2755282" }, { "@score":"1", "@id":"2755283", "info":{"authors":{"author":[{"@pid":"138/5087","text":"Qingping Li"},{"@pid":"13/1151","text":"Junping Du"},{"@pid":"154/7054","text":"Suguo Zhu"},{"@pid":"54/3420-2","text":"Liang Xu 0002"}]},"title":"Adaptive multiple video sensors fusion based on decentralized Kalman filter and sensor confidence.","venue":"Sci. China Inf. Sci.","volume":"60","number":"6","pages":"62102","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/LiDZX17","doi":"10.1007/S11432-015-5450-3","ee":"https://doi.org/10.1007/s11432-015-5450-3","url":"https://dblp.org/rec/journals/chinaf/LiDZX17"}, "url":"URL#2755283" }, { "@score":"1", "@id":"2755284", "info":{"authors":{"author":[{"@pid":"47/4912","text":"Yongchen Li"},{"@pid":"76/5628","text":"Ya-Qiu Jin"}]},"title":"Target decomposition and recognition from wide-angle SAR imaging based on a Gaussian amplitude-phase model.","venue":"Sci. China Inf. Sci.","volume":"60","number":"6","pages":"62305","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/LiJ17","doi":"10.1007/S11432-016-0572-3","ee":"https://doi.org/10.1007/s11432-016-0572-3","url":"https://dblp.org/rec/journals/chinaf/LiJ17"}, "url":"URL#2755284" }, { "@score":"1", "@id":"2755285", "info":{"authors":{"author":[{"@pid":"142/6512","text":"Liechen Li"},{"@pid":"07/9631","text":"Daojing Li"},{"@pid":"121/7134","text":"Zhou-Hao Pan"}]},"title":"Compressed sensing application in interferometric synthetic aperture radar.","venue":"Sci. China Inf. Sci.","volume":"60","number":"10","pages":"102305:1-102305:17","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/LiLP17","doi":"10.1007/S11432-016-9017-6","ee":"https://doi.org/10.1007/s11432-016-9017-6","url":"https://dblp.org/rec/journals/chinaf/LiLP17"}, "url":"URL#2755285" }, { "@score":"1", "@id":"2755286", "info":{"authors":{"author":[{"@pid":"09/6669-3","text":"Teng Li 0003"},{"@pid":"12/6604-1","text":"Jianfeng Ma 0001"},{"@pid":"45/5103-1","text":"Cong Sun 0001"}]},"title":"NetPro: detecting attacks in MANET routing with provenance and verification.","venue":"Sci. China Inf. Sci.","volume":"60","number":"11","pages":"118101","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/LiMS17","doi":"10.1007/S11432-016-0370-Y","ee":"https://doi.org/10.1007/s11432-016-0370-y","url":"https://dblp.org/rec/journals/chinaf/LiMS17"}, "url":"URL#2755286" }, { "@score":"1", "@id":"2755287", "info":{"authors":{"author":[{"@pid":"93/2334","text":"Yong Li"},{"@pid":"m/XiaofengMeng-1","text":"Xiaofeng Meng 0001"},{"@pid":"72/3527","text":"Qiang Zhang"},{"@pid":"94/2739-6","text":"Jiang Zhang 0006"},{"@pid":"23/2494","text":"Changqing Wang"}]},"title":"Common patterns of online collective attention flow.","venue":"Sci. China Inf. Sci.","volume":"60","number":"5","pages":"59102","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/LiMZZW17","doi":"10.1007/S11432-015-0567-9","ee":"https://doi.org/10.1007/s11432-015-0567-9","url":"https://dblp.org/rec/journals/chinaf/LiMZZW17"}, "url":"URL#2755287" }, { "@score":"1", "@id":"2755288", "info":{"authors":{"author":[{"@pid":"58/2324","text":"Dexin Li"},{"@pid":"19/8953","text":"Marc Rodriguez-Cassola"},{"@pid":"05/8959","text":"Pau Prats-Iraola"},{"@pid":"60/1749-1","text":"Zhen Dong 0001"},{"@pid":"189/3021","text":"Manqing Wu"},{"@pid":"27/51","text":"Alberto Moreira"}]},"title":"Modelling of tropospheric delays in geosynchronous synthetic aperture radar.","venue":"Sci. China Inf. Sci.","volume":"60","number":"6","pages":"060307:1-060307:18","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/LiRPDWM17","doi":"10.1007/S11432-016-9065-1","ee":"https://doi.org/10.1007/s11432-016-9065-1","url":"https://dblp.org/rec/journals/chinaf/LiRPDWM17"}, "url":"URL#2755288" }, { "@score":"1", "@id":"2755289", "info":{"authors":{"author":[{"@pid":"28/9934","text":"Deren Li"},{"@pid":"75/6206-1","text":"Xin Shen 0001"},{"@pid":"84/2311","text":"Nengcheng Chen"},{"@pid":"39/8502","text":"Zhifeng Xiao"}]},"title":"Space-based information service in Internet Plus Era.","venue":"Sci. China Inf. Sci.","volume":"60","number":"10","pages":"102308:1-102308:10","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/LiSCX17","doi":"10.1007/S11432-016-9164-1","ee":"https://doi.org/10.1007/s11432-016-9164-1","url":"https://dblp.org/rec/journals/chinaf/LiSCX17"}, "url":"URL#2755289" }, { "@score":"1", "@id":"2755290", "info":{"authors":{"author":[{"@pid":"79/8389","text":"Yongzhi Li"},{"@pid":"26/10062","text":"Cheng Tao 0001"},{"@pid":"74/7037-1","text":"Liu Liu 0001"},{"@pid":"37/7892","text":"Lingwen Zhang"}]},"title":"Energy-efficiency-aware relay selection in distributed full duplex relay network with massive MIMO.","venue":"Sci. China Inf. Sci.","volume":"60","number":"2","pages":"22309:1-22309:15","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/LiTLZ17","doi":"10.1007/S11432-016-5601-1","ee":"https://doi.org/10.1007/s11432-016-5601-1","url":"https://dblp.org/rec/journals/chinaf/LiTLZ17"}, "url":"URL#2755290" }, { "@score":"1", "@id":"2755291", "info":{"authors":{"author":[{"@pid":"29/5847-1","text":"Haitao Li 0001"},{"@pid":"75/2741","text":"Yuzhen Wang"},{"@pid":"135/7434","text":"Peilian Guo"}]},"title":"Output reachability analysis and output regulation control design of Boolean control networks.","venue":"Sci. China Inf. Sci.","volume":"60","number":"2","pages":"22202","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/LiWG17","doi":"10.1007/S11432-015-0611-4","ee":"https://doi.org/10.1007/s11432-015-0611-4","url":"https://dblp.org/rec/journals/chinaf/LiWG17"}, "url":"URL#2755291" }, { "@score":"1", "@id":"2755292", "info":{"authors":{"author":[{"@pid":"35/8806","text":"Qiwei Li"},{"@pid":"97/2966-1","text":"Chang Xu 0001"},{"@pid":"125/1824","text":"Yepang Liu 0001"},{"@pid":"16/1889","text":"Chun Cao"},{"@pid":"67/3058","text":"Xiaoxing Ma"},{"@pid":"38/5132","text":"Jian Lü 0001"}]},"title":"CyanDroid: stable and effective energy inefficiency diagnosis for Android apps.","venue":"Sci. China Inf. Sci.","volume":"60","number":"1","pages":"12104","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/LiXLCML17","doi":"10.1007/S11432-015-1015-5","ee":"https://doi.org/10.1007/s11432-015-1015-5","url":"https://dblp.org/rec/journals/chinaf/LiXLCML17"}, "url":"URL#2755292" }, { "@score":"1", "@id":"2755293", "info":{"authors":{"author":[{"@pid":"153/2952-1","text":"Jiahui Li 0001"},{"@pid":"31/5990","text":"Limin Xiao"},{"@pid":"98/2265","text":"Xibin Xu"},{"@pid":"54/3643-1","text":"Xin Su 0001"},{"@pid":"76/5271","text":"Shidong Zhou"}]},"title":"Energy-efficient Butler-matrix-based hybrid beamforming for multiuser mmWave MIMO system.","venue":"Sci. China Inf. Sci.","volume":"60","number":"8","pages":"080304:1-080304:10","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/LiXXSZ17","doi":"10.1007/S11432-016-0640-5","ee":"https://doi.org/10.1007/s11432-016-0640-5","url":"https://dblp.org/rec/journals/chinaf/LiXXSZ17"}, "url":"URL#2755293" }, { "@score":"1", "@id":"2755294", "info":{"authors":{"author":[{"@pid":"83/6353-15","text":"Peng Li 0015"},{"@pid":"19/2453-3","text":"Xiang Yu 0003"},{"@pid":"03/32","text":"Xiaoyan Peng"},{"@pid":"50/735","text":"Zhiqiang Zheng"},{"@pid":"119/5917","text":"Youmin Zhang 0001"}]},"title":"Fault-tolerant cooperative control for multiple UAVs based on sliding mode techniques.","venue":"Sci. China Inf. Sci.","volume":"60","number":"7","pages":"070204:1-070204:13","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/LiYPZ017","doi":"10.1007/S11432-016-9074-8","ee":"https://doi.org/10.1007/s11432-016-9074-8","url":"https://dblp.org/rec/journals/chinaf/LiYPZ017"}, "url":"URL#2755294" }, { "@score":"1", "@id":"2755295", "info":{"authors":{"author":[{"@pid":"57/10187","text":"Yanbin Li"},{"@pid":"91/1701","text":"Guoyan Zhang"},{"@pid":"35/7092-35","text":"Wei Wang 0035"},{"@pid":"88/158","text":"Meiqin Wang"}]},"title":"Cryptanalysis of round-reduced ASCON.","venue":"Sci. China Inf. Sci.","volume":"60","number":"3","pages":"38102","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/LiZ0W17","doi":"10.1007/S11432-016-0283-3","ee":"https://doi.org/10.1007/s11432-016-0283-3","url":"https://dblp.org/rec/journals/chinaf/LiZ0W17"}, "url":"URL#2755295" }, { "@score":"1", "@id":"2755296", "info":{"authors":{"author":[{"@pid":"l/JingLi11","text":"Jing Li 0011"},{"@pid":"87/1585","text":"Yu Zheng"},{"@pid":"89/1900","text":"Jianhua Ge"},{"@pid":"128/3262","text":"Chensi Zhang"},{"@pid":"50/6639","text":"Xiangbin Yu 0001"}]},"title":"Simplified relay antenna selection with source beamforming for MIMO two-way relaying networks.","venue":"Sci. China Inf. Sci.","volume":"60","number":"2","pages":"22310","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/LiZGZY17","doi":"10.1007/S11432-015-0352-4","ee":"https://doi.org/10.1007/s11432-015-0352-4","url":"https://dblp.org/rec/journals/chinaf/LiZGZY17"}, "url":"URL#2755296" }, { "@score":"1", "@id":"2755297", "info":{"authors":{"author":[{"@pid":"71/6053","text":"Bin Liang"},{"@pid":"162/7163","text":"Ruiqiang Song"},{"@pid":"69/2353","text":"Jianwei Han"},{"@pid":"116/1274","text":"Yaqing Chi"},{"@pid":"02/1003","text":"Rui Chen"},{"@pid":"35/7328","text":"Chunmei Hu"},{"@pid":"20/1036","text":"Jianjun Chen"},{"@pid":"212/6819","text":"Yingqi Ma"},{"@pid":"212/6740","text":"Shipeng Shangguan"}]},"title":"Comparison of single-event upset generated by heavy ion and pulsed laser.","venue":"Sci. China Inf. Sci.","volume":"60","number":"7","pages":"072401:1-072401:9","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/LiangSHCCHCMS17","doi":"10.1007/S11432-016-0346-1","ee":"https://doi.org/10.1007/s11432-016-0346-1","url":"https://dblp.org/rec/journals/chinaf/LiangSHCCHCMS17"}, "url":"URL#2755297" }, { "@score":"1", "@id":"2755298", "info":{"authors":{"author":[{"@pid":"133/2947","text":"Nan Liao"},{"@pid":"23/1520","text":"Xiaoxin Cui"},{"@pid":"133/2874","text":"Kai Liao"},{"@pid":"25/3246","text":"Tian Wang"},{"@pid":"92/6680","text":"Dunshan Yu"},{"@pid":"89/2968","text":"Xiaole Cui"}]},"title":"Improving DFA attacks on AES with unknown and random faults.","venue":"Sci. China Inf. Sci.","volume":"60","number":"4","pages":"42401","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/LiaoCLWYC17","doi":"10.1007/S11432-016-0071-7","ee":"https://doi.org/10.1007/s11432-016-0071-7","url":"https://dblp.org/rec/journals/chinaf/LiaoCLWYC17"}, "url":"URL#2755298" }, { "@score":"1", "@id":"2755299", "info":{"authors":{"author":[{"@pid":"97/2274-20","text":"Yu Liu 0020"},{"@pid":"115/6437","text":"Ammar Ghazal"},{"@pid":"75/2596","text":"Cheng-Xiang Wang 0001"},{"@pid":"76/3232","text":"Xiaohu Ge"},{"@pid":"48/450-1","text":"Yang Yang 0001"},{"@pid":"182/7251","text":"Yapei Zhang"}]},"title":"Channel measurements and models for high-speed train wireless communication systems in tunnel scenarios: a survey.","venue":"Sci. China Inf. Sci.","volume":"60","number":"10","pages":"101301","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/LiuGWG0Z17","doi":"10.1007/S11432-016-9014-3","ee":"https://doi.org/10.1007/s11432-016-9014-3","url":"https://dblp.org/rec/journals/chinaf/LiuGWG0Z17"}, "url":"URL#2755299" }, { "@score":"1", "@id":"2755300", "info":{"authors":{"author":[{"@pid":"128/5315","text":"Weijian Liu"},{"@pid":"253/1400","text":"Hui Han"},{"@pid":"95/3736-4","text":"Jun Liu 0004"},{"@pid":"54/7821","text":"Hongli Li"},{"@pid":"181/2853","text":"Kai Li"},{"@pid":"60/10078","text":"Yong-Liang Wang"}]},"title":"Multichannel radar adaptive signal detection in interference and structure nonhomogeneity.","venue":"Sci. China Inf. Sci.","volume":"60","number":"11","pages":"112302:1-112302:14","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/LiuH0LLW17","doi":"10.1007/S11432-016-9105-7","ee":"https://doi.org/10.1007/s11432-016-9105-7","url":"https://dblp.org/rec/journals/chinaf/LiuH0LLW17"}, "url":"URL#2755300" }, { "@score":"1", "@id":"2755301", "info":{"authors":{"author":[{"@pid":"116/7204","text":"Xinglong Liu"},{"@pid":"24/3702","text":"Fei Hou"},{"@pid":"79/627-1","text":"Hong Qin 0001"},{"@pid":"94/5679","text":"Aimin Hao"}]},"title":"A CADe system for nodule detection in thoracic CT images based on artificial neural network.","venue":"Sci. China Inf. Sci.","volume":"60","number":"7","pages":"072106:1-072106:15","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/LiuHQH17","doi":"10.1007/S11432-016-9008-0","ee":"https://doi.org/10.1007/s11432-016-9008-0","url":"https://dblp.org/rec/journals/chinaf/LiuHQH17"}, "url":"URL#2755301" }, { "@score":"1", "@id":"2755302", "info":{"authors":{"author":[{"@pid":"126/4016","text":"Guanjun Liu"},{"@pid":"31/5933","text":"Changjun Jiang"}]},"title":"Observable liveness of Petri nets with controllable and observable transitions.","venue":"Sci. China Inf. Sci.","volume":"60","number":"11","pages":"118102","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/LiuJ17","doi":"10.1007/S11432-016-0241-Y","ee":"https://doi.org/10.1007/s11432-016-0241-y","url":"https://dblp.org/rec/journals/chinaf/LiuJ17"}, "url":"URL#2755302" }, { "@score":"1", "@id":"2755303", "info":{"authors":{"author":[{"@pid":"190/1869","text":"Zhao-yang Liu"},{"@pid":"06/1624","text":"Liyuan Liu"},{"@pid":"87/6853-4","text":"Zhao Zhang 0004"},{"@pid":"35/295-21","text":"Jian Liu 0021"},{"@pid":"54/6021","text":"Nanjian Wu"}]},"title":"Terahertz detector for imaging in 180-nm standard CMOS process.","venue":"Sci. China Inf. Sci.","volume":"60","number":"8","pages":"82401","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/LiuL0LW17","doi":"10.1007/S11432-015-0976-9","ee":"https://doi.org/10.1007/s11432-015-0976-9","url":"https://dblp.org/rec/journals/chinaf/LiuL0LW17"}, "url":"URL#2755303" }, { "@score":"1", "@id":"2755304", "info":{"authors":{"author":[{"@pid":"46/2375-11","text":"Hai Liu 0011"},{"@pid":"72/3476-1","text":"Xinghua Li 0001"},{"@pid":"12/6604-1","text":"Jianfeng Ma 0001"},{"@pid":"205/7008","text":"Mengfan Xu"},{"@pid":"65/7760","text":"Jingjing Guo"}]},"title":"Reconstruction methodology for rational secret sharing based on mechanism design.","venue":"Sci. China Inf. Sci.","volume":"60","number":"8","pages":"088101:1-088101:3","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/LiuLMXG17","doi":"10.1007/S11432-015-9066-9","ee":"https://doi.org/10.1007/s11432-015-9066-9","url":"https://dblp.org/rec/journals/chinaf/LiuLMXG17"}, "url":"URL#2755304" }, { "@score":"1", "@id":"2755305", "info":{"authors":{"author":[{"@pid":"139/4288","text":"Zhiquan Liu"},{"@pid":"12/6604-1","text":"Jianfeng Ma 0001"},{"@pid":"178/3086","text":"Zhongyuan Jiang"},{"@pid":"166/1798","text":"Yinbin Miao"}]},"title":"FCT: a fully-distributed context-aware trust model for location based service recommendation.","venue":"Sci. China Inf. Sci.","volume":"60","number":"8","pages":"082102:1-082102:16","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/LiuMJM17","doi":"10.1007/S11432-015-9029-Y","ee":"https://doi.org/10.1007/s11432-015-9029-y","url":"https://dblp.org/rec/journals/chinaf/LiuMJM17"}, "url":"URL#2755305" }, { "@score":"1", "@id":"2755306", "info":{"authors":{"author":[{"@pid":"97/2274-20","text":"Yu Liu 0020"},{"@pid":"75/2596","text":"Cheng-Xiang Wang 0001"},{"@pid":"150/0011","text":"Carlos F. López"},{"@pid":"76/3232","text":"Xiaohu Ge"}]},"title":"3D non-stationary wideband circular tunnel channel models for high-speed train wireless communication systems.","venue":"Sci. China Inf. Sci.","volume":"60","number":"8","pages":"82304","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/LiuWLG17","doi":"10.1007/S11432-016-9004-4","ee":"https://doi.org/10.1007/s11432-016-9004-4","url":"https://dblp.org/rec/journals/chinaf/LiuWLG17"}, "url":"URL#2755306" }, { "@score":"1", "@id":"2755307", "info":{"authors":{"author":[{"@pid":"88/11073","text":"ChunJuan Liu"},{"@pid":"68/11073","text":"YongShun Wang"},{"@pid":"65/11073","text":"ZaiXing Wang"},{"@pid":"66/3019","text":"Chao Chen"}]},"title":"Electrical performance of static induction transistor with transverse structure.","venue":"Sci. China Inf. Sci.","volume":"60","number":"2","pages":"22402","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/LiuWWC17","doi":"10.1007/S11432-015-1008-9","ee":"https://doi.org/10.1007/s11432-015-1008-9","url":"https://dblp.org/rec/journals/chinaf/LiuWWC17"}, "url":"URL#2755307" }, { "@score":"1", "@id":"2755308", "info":{"authors":{"author":[{"@pid":"74/1932","text":"Yue Liu"},{"@pid":"143/0974","text":"Chuanchuan Yang"},{"@pid":"22/3585","text":"Hongbin Li"}]},"title":"Pseudo pilot-aided OFDM system with high spectral efficiency for high performance coaxial transmission.","venue":"Sci. China Inf. Sci.","volume":"60","number":"6","pages":"62303","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/LiuYL17","doi":"10.1007/S11432-016-0036-8","ee":"https://doi.org/10.1007/s11432-016-0036-8","url":"https://dblp.org/rec/journals/chinaf/LiuYL17"}, "url":"URL#2755308" }, { "@score":"1", "@id":"2755309", "info":{"authors":{"author":[{"@pid":"29/4867-25","text":"Yong Liu 0025"},{"@pid":"212/6733","text":"Jianan Yang"},{"@pid":"71/3387-5","text":"Yizhou Wang 0005"},{"@pid":"35/4988-1","text":"Quan Pan 0001"},{"@pid":"33/6885","text":"Jianping Yuan"}]},"title":"Multi-objective optimal preliminary planning of multi-debris active removal mission in LEO.","venue":"Sci. China Inf. Sci.","volume":"60","number":"7","pages":"072202:1-072202:10","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/LiuYWPY17","doi":"10.1007/S11432-016-0566-7","ee":"https://doi.org/10.1007/s11432-016-0566-7","url":"https://dblp.org/rec/journals/chinaf/LiuYWPY17"}, "url":"URL#2755309" }, { "@score":"1", "@id":"2755310", "info":{"authors":{"author":[{"@pid":"39/4264","text":"Huabo Liu"},{"@pid":"30/97","text":"Tong Zhou"}]},"title":"Robust state estimation for uncertain linear systems with random parametric uncertainties.","venue":"Sci. China Inf. Sci.","volume":"60","number":"1","pages":"12202","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/LiuZ17","doi":"10.1007/S11432-015-0327-X","ee":"https://doi.org/10.1007/s11432-015-0327-x","url":"https://dblp.org/rec/journals/chinaf/LiuZ17"}, "url":"URL#2755310" }, { "@score":"1", "@id":"2755311", "info":{"authors":{"author":[{"@pid":"17/6835","text":"Dayou Liu"},{"@pid":"53/10146","text":"Yungang Zhu"},{"@pid":"212/6814","text":"Ni Ni"},{"@pid":"03/2134-14","text":"Jie Liu 0014"}]},"title":"Ordered proposition fusion based on consistency and uncertainty measurements.","venue":"Sci. China Inf. Sci.","volume":"60","number":"8","pages":"082103:1-082103:19","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/LiuZNL17","doi":"10.1007/S11432-016-9101-8","ee":"https://doi.org/10.1007/s11432-016-9101-8","url":"https://dblp.org/rec/journals/chinaf/LiuZNL17"}, "url":"URL#2755311" }, { "@score":"1", "@id":"2755312", "info":{"authors":{"author":[{"@pid":"51/2773","text":"Jiaqi Liu"},{"@pid":"92/5796","text":"Yuanfu Zhao"},{"@pid":"56/4499-24","text":"Liang Wang 0024"},{"@pid":"23/2060","text":"Dan Wang"},{"@pid":"25/290","text":"Hongchao Zheng"},{"@pid":"212/6771","text":"Maoxin Chen"},{"@pid":"19/2932-1","text":"Lei Shu 0001"},{"@pid":"212/6807","text":"Tongde Li"},{"@pid":"212/6732","text":"Dongqiang Li"},{"@pid":"71/6601","text":"Wei Guo"}]},"title":"High energy proton and heavy ion induced single event transient in 65-nm CMOS technology.","venue":"Sci. China Inf. Sci.","volume":"60","number":"12","pages":"120405:1-120405:3","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/LiuZWWZCSLLG17","doi":"10.1007/S11432-017-9254-2","ee":"https://doi.org/10.1007/s11432-017-9254-2","url":"https://dblp.org/rec/journals/chinaf/LiuZWWZCSLLG17"}, "url":"URL#2755312" }, { "@score":"1", "@id":"2755313", "info":{"authors":{"author":[{"@pid":"153/8523","text":"Shangwen Liu"},{"@pid":"37/9361","text":"Zenghui Zhang"},{"@pid":"91/2159","text":"Wenxian Yu"}]},"title":"Circulate shifted OFDM chirp waveform diversity design with digital beamforming for MIMO SAR.","venue":"Sci. China Inf. Sci.","volume":"60","number":"10","pages":"102307:1-102307:12","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/LiuZY17","doi":"10.1007/S11432-016-9003-9","ee":"https://doi.org/10.1007/s11432-016-9003-9","url":"https://dblp.org/rec/journals/chinaf/LiuZY17"}, "url":"URL#2755313" }, { "@score":"1", "@id":"2755314", "info":{"authors":{"author":[{"@pid":"99/341","text":"Yihua Lou"},{"@pid":"06/241-1","text":"Wenjun Wu 0001"},{"@pid":"13/2640","text":"Radu-Daniel Vatavu"},{"@pid":"87/3960","text":"Wei-Tek Tsai"}]},"title":"Personalized gesture interactions for cyber-physical smart-home environments.","venue":"Sci. China Inf. Sci.","volume":"60","number":"7","pages":"72104","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/Lou0VT17","doi":"10.1007/S11432-015-1014-7","ee":"https://doi.org/10.1007/s11432-015-1014-7","url":"https://dblp.org/rec/journals/chinaf/Lou0VT17"}, "url":"URL#2755314" }, { "@score":"1", "@id":"2755315", "info":{"authors":{"author":[{"@pid":"05/4625-5","text":"Jian Lou 0005"},{"@pid":"80/7843","text":"Lijuan Jia"},{"@pid":"99/955-3","text":"Ran Tao 0003"},{"@pid":"33/4822-1","text":"Yue Wang 0001"}]},"title":"Distributed incremental bias-compensated RLS estimation over multi-agent networks.","venue":"Sci. China Inf. Sci.","volume":"60","number":"3","pages":"32204","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/LouJTW17","doi":"10.1007/S11432-016-0284-2","ee":"https://doi.org/10.1007/s11432-016-0284-2","url":"https://dblp.org/rec/journals/chinaf/LouJTW17"}, "url":"URL#2755315" }, { "@score":"1", "@id":"2755316", "info":{"authors":{"author":[{"@pid":"56/2480","text":"Hongtao Lu"},{"@pid":"80/7804-1","text":"Chuan Huang 0001"},{"@pid":"54/5887","text":"Shihai Shao"},{"@pid":"02/3432","text":"Youxi Tang"}]},"title":"Novel multi-tap analog self-interference cancellation architecture with shared phase-shifter for full-duplex communications.","venue":"Sci. China Inf. Sci.","volume":"60","number":"10","pages":"102302:1-102302:16","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/LuHST17","doi":"10.1007/S11432-016-0291-9","ee":"https://doi.org/10.1007/s11432-016-0291-9","url":"https://dblp.org/rec/journals/chinaf/LuHST17"}, "url":"URL#2755316" }, { "@score":"1", "@id":"2755317", "info":{"authors":{"author":[{"@pid":"70/5794","text":"Di Lu"},{"@pid":"12/6604-1","text":"Jianfeng Ma 0001"},{"@pid":"45/5103-1","text":"Cong Sun 0001"},{"@pid":"172/8609","text":"XinDi Ma"},{"@pid":"84/5683-2","text":"Ning Xi 0002"}]},"title":"Credit-based scheme for security-aware and fairness-aware resource allocation in cloud computing.","venue":"Sci. China Inf. Sci.","volume":"60","number":"5","pages":"52103:1-52103:17","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/LuMSMX17","doi":"10.1007/S11432-015-5492-6","ee":"https://doi.org/10.1007/s11432-015-5492-6","url":"https://dblp.org/rec/journals/chinaf/LuMSMX17"}, "url":"URL#2755317" }, { "@score":"1", "@id":"2755318", "info":{"authors":{"author":[{"@pid":"204/9572","text":"Shaozhong Lu"},{"@pid":"36/1058","text":"Yongqing Wang"},{"@pid":"23/3439","text":"Sheng Li"},{"@pid":"85/10785","text":"Siliang Wu"}]},"title":"High-dynamics pulse-shaped signal simulation based on polynomial-based interpolation filters.","venue":"Sci. China Inf. Sci.","volume":"60","number":"10","pages":"109301","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/LuWLW17","doi":"10.1007/S11432-016-0541-1","ee":"https://doi.org/10.1007/s11432-016-0541-1","url":"https://dblp.org/rec/journals/chinaf/LuWLW17"}, "url":"URL#2755318" }, { "@score":"1", "@id":"2755319", "info":{"authors":{"author":[{"@pid":"16/6317-5","text":"Yang Lu 0005"},{"@pid":"50/4074","text":"Jun-Hai Yong"},{"@pid":"02/8075","text":"Kan-Le Shi"},{"@pid":"89/1329","text":"He-Jin Gu"},{"@pid":"16/3342","text":"Ping Zheng"},{"@pid":"92/3529","text":"Jean-Claude Paul"}]},"title":"B-spline surface fitting to mesh vertices.","venue":"Sci. China Inf. Sci.","volume":"60","number":"7","pages":"78101","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/LuYSGZP17","doi":"10.1007/S11432-016-0311-8","ee":"https://doi.org/10.1007/s11432-016-0311-8","url":"https://dblp.org/rec/journals/chinaf/LuYSGZP17"}, "url":"URL#2755319" }, { "@score":"1", "@id":"2755320", "info":{"authors":{"author":[{"@pid":"186/2820","text":"Lichuan Luo"},{"@pid":"186/2893","text":"Dechun Bao"},{"@pid":"186/2792","text":"Wuqi Yu"},{"@pid":"29/1274","text":"Zhaohua Zhang"},{"@pid":"92/138","text":"Tianling Ren"}]},"title":"A power manager system with 78% efficiency for high-voltage triboelectric nanogenerators.","venue":"Sci. China Inf. Sci.","volume":"60","number":"2","pages":"29401:1-29401:3","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/LuoBYZR17","doi":"10.1007/S11432-016-5602-0","ee":"https://doi.org/10.1007/s11432-016-5602-0","url":"https://dblp.org/rec/journals/chinaf/LuoBYZR17"}, "url":"URL#2755320" }, { "@score":"1", "@id":"2755321", "info":{"authors":{"author":[{"@pid":"53/2808","text":"Qi Luo"},{"@pid":"151/4981","text":"Yangyang Gong"},{"@pid":"212/6789","text":"Chunxue Jia"}]},"title":"Stability of gene regulatory networks with Lévy noise.","venue":"Sci. China Inf. Sci.","volume":"60","number":"7","pages":"072204:1-072204:13","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/LuoGJ17","doi":"10.1007/S11432-016-0526-8","ee":"https://doi.org/10.1007/s11432-016-0526-8","url":"https://dblp.org/rec/journals/chinaf/LuoGJ17"}, "url":"URL#2755321" }, { "@score":"1", "@id":"2755322", "info":{"authors":{"author":[{"@pid":"18/5122","text":"Lan Luo"},{"@pid":"37/2197-1","text":"Zhi Ma 0001"},{"@pid":"130/3753","text":"Zhengchao Wei"},{"@pid":"185/9434","text":"Riguang Leng"}]},"title":"Non-binary entanglement-assisted quantum stabilizer codes.","venue":"Sci. China Inf. Sci.","volume":"60","number":"4","pages":"42501:1-42501:14","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/LuoMWL17","doi":"10.1007/S11432-015-0932-Y","ee":"https://doi.org/10.1007/s11432-015-0932-y","url":"https://dblp.org/rec/journals/chinaf/LuoMWL17"}, "url":"URL#2755322" }, { "@score":"1", "@id":"2755323", "info":{"authors":{"author":[{"@pid":"86/7981","text":"Fei Lyu 0001"},{"@pid":"78/3204-1","text":"Feng Tian 0001"},{"@pid":"33/6648","text":"Guozhong Dai"},{"@pid":"09/3064","text":"Hongan Wang"}]},"title":"Tilting-Twisting-Rolling: a pen-based technique for compass geometric construction.","venue":"Sci. China Inf. Sci.","volume":"60","number":"5","pages":"053101:1-053101:6","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/LyuTDW17","doi":"10.1007/S11432-017-9063-2","ee":"https://doi.org/10.1007/s11432-017-9063-2","url":"https://dblp.org/rec/journals/chinaf/LyuTDW17"}, "url":"URL#2755323" }, { "@score":"1", "@id":"2755324", "info":{"authors":{"author":[{"@pid":"172/8609","text":"XinDi Ma"},{"@pid":"l/HuiLi6","text":"Hui Li 0006"},{"@pid":"12/6604-1","text":"Jianfeng Ma 0001"},{"@pid":"48/5579-1","text":"Qi Jiang 0001"},{"@pid":"35/5676-2","text":"Sheng Gao 0002"},{"@pid":"84/5683-2","text":"Ning Xi 0002"},{"@pid":"70/5794","text":"Di Lu"}]},"title":"APPLET: a privacy-preserving framework for location-aware recommender system.","venue":"Sci. China Inf. Sci.","volume":"60","number":"9","pages":"92101","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/Ma0M0GXL17","doi":"10.1007/S11432-015-0981-4","ee":"https://doi.org/10.1007/s11432-015-0981-4","url":"https://dblp.org/rec/journals/chinaf/Ma0M0GXL17"}, "url":"URL#2755324" }, { "@score":"1", "@id":"2755325", "info":{"authors":{"author":[{"@pid":"41/9712","text":"Lerong Ma"},{"@pid":"60/5451","text":"Dandan Song"},{"@pid":"16/3137","text":"Lejian Liao"},{"@pid":"59/7807","text":"Jingang Wang"}]},"title":"PSVM: a preference-enhanced SVM model using preference data for classification.","venue":"Sci. China Inf. Sci.","volume":"60","number":"12","pages":"122103:1-122103:14","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/MaSLW17","doi":"10.1007/S11432-016-9020-4","ee":"https://doi.org/10.1007/s11432-016-9020-4","url":"https://dblp.org/rec/journals/chinaf/MaSLW17"}, "url":"URL#2755325" }, { "@score":"1", "@id":"2755326", "info":{"authors":{"author":[{"@pid":"14/8015","text":"Lifeng Ma"},{"@pid":"97/5229","text":"Zidong Wang"},{"@pid":"77/2455","text":"Qing-Long Han"},{"@pid":"50/2415","text":"Yurong Liu"}]},"title":"Consensus control of stochastic multi-agent systems: a survey.","venue":"Sci. China Inf. Sci.","volume":"60","number":"12","pages":"120201:1-120201:15","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/MaWHL17","doi":"10.1007/S11432-017-9169-4","ee":"https://doi.org/10.1007/s11432-017-9169-4","url":"https://dblp.org/rec/journals/chinaf/MaWHL17"}, "url":"URL#2755326" }, { "@score":"1", "@id":"2755327", "info":{"authors":{"author":[{"@pid":"34/6050","text":"Chengying Mao"},{"@pid":"88/612","text":"Tsong Yueh Chen"},{"@pid":"05/1906","text":"Fei-Ching Kuo"}]},"title":"Out of sight, out of mind: a distance-aware forgetting strategy for adaptive random testing.","venue":"Sci. China Inf. Sci.","volume":"60","number":"9","pages":"092106:1-092106:21","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/MaoCK17","doi":"10.1007/S11432-016-0087-0","ee":"https://doi.org/10.1007/s11432-016-0087-0","url":"https://dblp.org/rec/journals/chinaf/MaoCK17"}, "url":"URL#2755327" }, { "@score":"1", "@id":"2755328", "info":{"authors":{"author":[{"@pid":"169/8890","text":"Shaowu Mao"},{"@pid":"78/5323","text":"Pei Zhang"},{"@pid":"31/9704","text":"Houzhen Wang"},{"@pid":"60/2163","text":"Huanguo Zhang"},{"@pid":"75/2327","text":"Wanqing Wu"}]},"title":"Cryptanalysis of a lattice based key exchange protocol.","venue":"Sci. China Inf. Sci.","volume":"60","number":"2","pages":"28101","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/MaoZWZW17","doi":"10.1007/S11432-015-0721-4","ee":"https://doi.org/10.1007/s11432-015-0721-4","url":"https://dblp.org/rec/journals/chinaf/MaoZWZW17"}, "url":"URL#2755328" }, { "@score":"1", "@id":"2755329", "info":{"authors":{"author":{"@pid":"14/2036","text":"Hong Mei 0001"}},"title":"Understanding "software-defined" from an OS perspective: technical challenges and research issues.","venue":"Sci. China Inf. Sci.","volume":"60","number":"12","pages":"126101:1-126101:3","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/Mei17","doi":"10.1007/S11432-017-9240-4","ee":"https://doi.org/10.1007/s11432-017-9240-4","url":"https://dblp.org/rec/journals/chinaf/Mei17"}, "url":"URL#2755329" }, { "@score":"1", "@id":"2755330", "info":{"authors":{"author":[{"@pid":"160/7156","text":"Deshan Meng"},{"@pid":"128/0308","text":"Houde Liu"},{"@pid":"129/5233","text":"Yanan Li"},{"@pid":"21/4057","text":"Wenfu Xu"},{"@pid":"71/6053-1","text":"Bin Liang 0001"}]},"title":"Vibration suppression of a large flexible spacecraft for on-orbit operation.","venue":"Sci. China Inf. Sci.","volume":"60","number":"5","pages":"050203:1-050203:15","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/MengLLXL17","doi":"10.1007/S11432-016-9035-0","ee":"https://doi.org/10.1007/s11432-016-9035-0","url":"https://dblp.org/rec/journals/chinaf/MengLLXL17"}, "url":"URL#2755330" }, { "@score":"1", "@id":"2755331", "info":{"authors":{"author":[{"@pid":"166/1798","text":"Yinbin Miao"},{"@pid":"12/6604-1","text":"Jianfeng Ma 0001"},{"@pid":"134/3945","text":"Ximeng Liu"},{"@pid":"09/4697-1","text":"Junwei Zhang 0001"},{"@pid":"139/4288","text":"Zhiquan Liu"}]},"title":"VKSE-MO: verifiable keyword search over encrypted data in multi-owner settings.","venue":"Sci. China Inf. Sci.","volume":"60","number":"12","pages":"122105:1-122105:15","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/MiaoMLZL17","doi":"10.1007/S11432-016-0540-X","ee":"https://doi.org/10.1007/s11432-016-0540-x","url":"https://dblp.org/rec/journals/chinaf/MiaoMLZL17"}, "url":"URL#2755331" }, { "@score":"1", "@id":"2755332", "info":{"authors":{"author":[{"@pid":"80/5755","text":"Feiping Nie 0001"},{"@pid":"60/2536-17","text":"Rui Zhang 0017"},{"@pid":"l/XuelongLi","text":"Xuelong Li 0001"}]},"title":"A generalized power iteration method for solving quadratic problem on the Stiefel manifold.","venue":"Sci. China Inf. Sci.","volume":"60","number":"11","pages":"112101:1-112101:10","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/Nie0L17","doi":"10.1007/S11432-016-9021-9","ee":"https://doi.org/10.1007/s11432-016-9021-9","url":"https://dblp.org/rec/journals/chinaf/Nie0L17"}, "url":"URL#2755332" }, { "@score":"1", "@id":"2755333", "info":{"authors":{"author":[{"@pid":"58/1506","text":"Xiaolin Ning"},{"@pid":"51/4015","text":"Zhuo Li"},{"@pid":"11/6088","text":"Weiren Wu"},{"@pid":"91/9064","text":"Yuqing Yang"},{"@pid":"52/5134","text":"Jiancheng Fang"},{"@pid":"37/2109","text":"Gang Liu"}]},"title":"Recursive adaptive filter using current innovation for celestial navigation during the Mars approach phase.","venue":"Sci. China Inf. Sci.","volume":"60","number":"3","pages":"32205","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/NingLWYFL17","doi":"10.1007/S11432-016-0405-2","ee":"https://doi.org/10.1007/s11432-016-0405-2","url":"https://dblp.org/rec/journals/chinaf/NingLWYFL17"}, "url":"URL#2755333" }, { "@score":"1", "@id":"2755334", "info":{"authors":{"author":[{"@pid":"158/3479","text":"Lukman Abiodun Olawoyin"},{"@pid":"172/1499","text":"Nana Zhang"},{"@pid":"243/7445","text":"Abdulkarim Ayopo Oloyede"},{"@pid":"138/3016","text":"Nasir Faruk"},{"@pid":"22/7020","text":"Hongwen Yang"}]},"title":"A random linear code based secure transmission scheme for wireless fading channels.","venue":"Sci. China Inf. Sci.","volume":"60","number":"4","pages":"049301:1-049301:3","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/OlawoyinZOFY17","doi":"10.1007/S11432-016-0253-X","ee":"https://doi.org/10.1007/s11432-016-0253-x","url":"https://dblp.org/rec/journals/chinaf/OlawoyinZOFY17"}, "url":"URL#2755334" }, { "@score":"1", "@id":"2755335", "info":{"authors":{"author":[{"@pid":"163/9636","text":"Isha Pathak"},{"@pid":"21/1893","text":"Deo Prakash Vidyarthi"}]},"title":"A model for virtual network embedding across multiple infrastructure providers using genetic algorithm.","venue":"Sci. China Inf. Sci.","volume":"60","number":"4","pages":"040308:1-040308:12","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/PathakV17","doi":"10.1007/S11432-016-9015-3","ee":"https://doi.org/10.1007/s11432-016-9015-3","url":"https://dblp.org/rec/journals/chinaf/PathakV17"}, "url":"URL#2755335" }, { "@score":"1", "@id":"2755336", "info":{"authors":{"author":[{"@pid":"188/7975","text":"Yanguo Peng"},{"@pid":"l/HuiLi6","text":"Hui Li 0006"},{"@pid":"00/1740","text":"Jiangtao Cui"},{"@pid":"09/4697-1","text":"Junwei Zhang 0001"},{"@pid":"12/6604-1","text":"Jianfeng Ma 0001"},{"@pid":"22/4616","text":"Changgen Peng"}]},"title":"hOPE: improved order preserving encryption with the power to homomorphic operations of ciphertexts.","venue":"Sci. China Inf. Sci.","volume":"60","number":"6","pages":"62101","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/Peng0CZMP17","doi":"10.1007/S11432-016-0242-7","ee":"https://doi.org/10.1007/s11432-016-0242-7","url":"https://dblp.org/rec/journals/chinaf/Peng0CZMP17"}, "url":"URL#2755336" }, { "@score":"1", "@id":"2755337", "info":{"authors":{"author":[{"@pid":"38/1142","text":"Liang Peng"},{"@pid":"59/873","text":"Zeng-Guang Hou"},{"@pid":"24/11239","text":"Long Peng"},{"@pid":"195/8912","text":"Lincong Luo"},{"@pid":"10/2246","text":"Weiqun Wang"}]},"title":"Robot assisted rehabilitation of the arm after stroke: prototype design and clinical evaluation.","venue":"Sci. China Inf. Sci.","volume":"60","number":"7","pages":"073201:1-073201:7","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/PengHPLW17","doi":"10.1007/S11432-017-9076-9","ee":"https://doi.org/10.1007/s11432-017-9076-9","url":"https://dblp.org/rec/journals/chinaf/PengHPLW17"}, "url":"URL#2755337" }, { "@score":"1", "@id":"2755338", "info":{"authors":{"author":[{"@pid":"60/1149","text":"Kemao Peng"},{"@pid":"75/2611-3","text":"Feng Lin 0003"},{"@pid":"55/4291","text":"Ben M. Chen"}]},"title":"Online schedule for autonomy of multiple unmanned aerial vehicles.","venue":"Sci. China Inf. Sci.","volume":"60","number":"7","pages":"072203:1-072203:13","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/PengLC17","doi":"10.1007/S11432-016-9025-9","ee":"https://doi.org/10.1007/s11432-016-9025-9","url":"https://dblp.org/rec/journals/chinaf/PengLC17"}, "url":"URL#2755338" }, { "@score":"1", "@id":"2755339", "info":{"authors":{"author":[{"@pid":"14/6370-1","text":"Xin Peng 0001"},{"@pid":"212/6791","text":"Zhengchang Xing"},{"@pid":"05/10517","text":"Sen Pan"},{"@pid":"137/8844","text":"Wenyi Qian"},{"@pid":"r/VaclavRajlich","text":"Václav Rajlich"},{"@pid":"37/4220","text":"Wenyun Zhao"}]},"title":"Reflective feature location: knowledge in mind meets information in system.","venue":"Sci. China Inf. Sci.","volume":"60","number":"7","pages":"72102","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/PengXPQRZ17","doi":"10.1007/S11432-015-0860-9","ee":"https://doi.org/10.1007/s11432-015-0860-9","url":"https://dblp.org/rec/journals/chinaf/PengXPQRZ17"}, "url":"URL#2755339" }, { "@score":"1", "@id":"2755340", "info":{"authors":{"author":[{"@pid":"175/9566","text":"Qingyuan Qi"},{"@pid":"10/6455","text":"Huanshui Zhang"}]},"title":"Time-inconsistent stochastic linear quadratic control for discrete-time systems.","venue":"Sci. China Inf. Sci.","volume":"60","number":"12","pages":"120204:1-120204:13","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/QiZ17","doi":"10.1007/S11432-017-9167-3","ee":"https://doi.org/10.1007/s11432-017-9167-3","url":"https://dblp.org/rec/journals/chinaf/QiZ17"}, "url":"URL#2755340" }, { "@score":"1", "@id":"2755341", "info":{"authors":{"author":[{"@pid":"80/7562","text":"Yu Qin"},{"@pid":"03/6757","text":"Zhengtao Yu 0001"},{"@pid":"33/3215","text":"Yanbing Wang"},{"@pid":"47/10188","text":"Shengxiang Gao"},{"@pid":"200/0161","text":"Linbin Shi"}]},"title":"Detecting micro-blog user interest communities through the integration of explicit user relationship and implicit topic relations.","venue":"Sci. China Inf. Sci.","volume":"60","number":"9","pages":"092105:1-092105:14","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/Qin0WGS17","doi":"10.1007/S11432-015-0899-6","ee":"https://doi.org/10.1007/s11432-015-0899-6","url":"https://dblp.org/rec/journals/chinaf/Qin0WGS17"}, "url":"URL#2755341" }, { "@score":"1", "@id":"2755342", "info":{"authors":{"author":[{"@pid":"24/2771-8","text":"Chuan Qin 0008"},{"@pid":"64/5666-33","text":"Lei Zhang 0033"},{"@pid":"89/5992-46","text":"Li Zhang 0046"},{"@pid":"59/2227-23","text":"Yan Wang 0023"},{"@pid":"12/4802","text":"Zhiping Yu"}]},"title":"A 5.8 GHz class-AB power amplifier with 25.4 dBm saturation power and 29.7% PAE.","venue":"Sci. China Inf. Sci.","volume":"60","number":"4","pages":"42403","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/Qin0ZWY17","doi":"10.1007/S11432-016-0299-4","ee":"https://doi.org/10.1007/s11432-016-0299-4","url":"https://dblp.org/rec/journals/chinaf/Qin0ZWY17"}, "url":"URL#2755342" }, { "@score":"1", "@id":"2755343", "info":{"authors":{"author":[{"@pid":"139/3293","text":"Shuo Qiu"},{"@pid":"27/4749","text":"Jiqiang Liu"},{"@pid":"139/3184","text":"Yanfeng Shi"},{"@pid":"60/2536","text":"Rui Zhang"}]},"title":"Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack.","venue":"Sci. China Inf. Sci.","volume":"60","number":"5","pages":"052105:1-052105:12","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/QiuLSZ17","doi":"10.1007/S11432-015-5449-9","ee":"https://doi.org/10.1007/s11432-015-5449-9","url":"https://dblp.org/rec/journals/chinaf/QiuLSZ17"}, "url":"URL#2755343" }, { "@score":"1", "@id":"2755344", "info":{"authors":{"author":[{"@pid":"212/6738","text":"Pingping Qiu"},{"@pid":"183/5639","text":"Weibin Qiu"},{"@pid":"91/9758","text":"Zhili Lin"},{"@pid":"183/5534","text":"Houbo Chen"},{"@pid":"142/5191","text":"Yixin Tang"},{"@pid":"64/5316","text":"Jiaxian Wang"},{"@pid":"183/5546","text":"Qiang Kan"},{"@pid":"183/5296","text":"Jiao-qing Pan"}]},"title":"Ultra-compact tunable graphene-based plasmonic multimode interference power splitter in mid infrared frequencies.","venue":"Sci. China Inf. Sci.","volume":"60","number":"8","pages":"82402","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/QiuQLCTWKP17","doi":"10.1007/S11432-016-0539-6","ee":"https://doi.org/10.1007/s11432-016-0539-6","url":"https://dblp.org/rec/journals/chinaf/QiuQLCTWKP17"}, "url":"URL#2755344" }, { "@score":"1", "@id":"2755345", "info":{"authors":{"author":[{"@pid":"136/4837","text":"Wen Qu"},{"@pid":"37/2233","text":"Daling Wang"},{"@pid":"97/1374-1","text":"Shi Feng 0001"},{"@pid":"55/5266-3","text":"Yifei Zhang 0003"},{"@pid":"49/6363","text":"Ge Yu 0001"}]},"title":"A novel cross-modal hashing algorithm based on multimodal deep learning.","venue":"Sci. China Inf. Sci.","volume":"60","number":"9","pages":"092104:1-092104:14","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/QuWFZY17","doi":"10.1007/S11432-015-0902-2","ee":"https://doi.org/10.1007/s11432-015-0902-2","url":"https://dblp.org/rec/journals/chinaf/QuWFZY17"}, "url":"URL#2755345" }, { "@score":"1", "@id":"2755346", "info":{"authors":{"author":[{"@pid":"171/0107","text":"Xiangyin Quan"},{"@pid":"08/7766","text":"Bingchen Zhang"},{"@pid":"06/462","text":"Zhengdao Wang"},{"@pid":"86/5355","text":"Chao Gao"},{"@pid":"24/8956","text":"Yirong Wu"}]},"title":"An efficient data compression technique based on BPDN for scattered fields from complex targets.","venue":"Sci. China Inf. Sci.","volume":"60","number":"10","pages":"109302","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/QuanZWGW17","doi":"10.1007/S11432-016-0529-6","ee":"https://doi.org/10.1007/s11432-016-0529-6","url":"https://dblp.org/rec/journals/chinaf/QuanZWGW17"}, "url":"URL#2755346" }, { "@score":"1", "@id":"2755347", "info":{"authors":{"author":[{"@pid":"212/6795","text":"Wahid Rajeh"},{"@pid":"98/4156","text":"Hai Jin 0001"},{"@pid":"z/DeqingZou","text":"Deqing Zou"}]},"title":"Saudi cloud infrastructure: a security analysis.","venue":"Sci. China Inf. Sci.","volume":"60","number":"12","pages":"122102:1-122102:13","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/RajehJZ17","doi":"10.1007/S11432-016-0322-7","ee":"https://doi.org/10.1007/s11432-016-0322-7","url":"https://dblp.org/rec/journals/chinaf/RajehJZ17"}, "url":"URL#2755347" }, { "@score":"1", "@id":"2755348", "info":{"authors":{"author":{"@pid":"130/7185","text":"Xi-Jun Ren"}},"title":"Quantum correlations generation and distribution in a universal covariant quantum cloning circuit.","venue":"Sci. China Inf. Sci.","volume":"60","number":"12","pages":"122501:1-122501:8","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/Ren17","doi":"10.1007/S11432-016-0569-2","ee":"https://doi.org/10.1007/s11432-016-0569-2","url":"https://dblp.org/rec/journals/chinaf/Ren17"}, "url":"URL#2755348" }, { "@score":"1", "@id":"2755349", "info":{"authors":{"author":[{"@pid":"85/6484","text":"Zhilei Ren"},{"@pid":"30/3790-1","text":"He Jiang 0001"},{"@pid":"86/4142","text":"Jifeng Xuan"},{"@pid":"16/7701","text":"Shuwei Zhang"},{"@pid":"17/6264","text":"Zhongxuan Luo"}]},"title":"Feature based problem hardness understanding for requirements engineering.","venue":"Sci. China Inf. Sci.","volume":"60","number":"3","pages":"32105","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/RenJXZL17","doi":"10.1007/S11432-016-0089-7","ee":"https://doi.org/10.1007/s11432-016-0089-7","url":"https://dblp.org/rec/journals/chinaf/RenJXZL17"}, "url":"URL#2755349" }, { "@score":"1", "@id":"2755350", "info":{"authors":{"author":[{"@pid":"54/9943","text":"Tabinda Salam"},{"@pid":"128/8066","text":"Waheed ur Rehman"},{"@pid":"96/6496","text":"Xiaofeng Tao"},{"@pid":"87/1254-6","text":"Yu Chen 0006"},{"@pid":"77/2428-3","text":"Ping Zhang 0003"}]},"title":"A trust framework based smart aggregation for machine type communication.","venue":"Sci. China Inf. Sci.","volume":"60","number":"10","pages":"100306:1-100306:15","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/SalamRTCZ17","doi":"10.1007/S11432-017-9186-6","ee":"https://doi.org/10.1007/s11432-017-9186-6","url":"https://dblp.org/rec/journals/chinaf/SalamRTCZ17"}, "url":"URL#2755350" }, { "@score":"1", "@id":"2755351", "info":{"authors":{"author":[{"@pid":"49/5166","text":"Jinhua She"},{"@pid":"21/4263","text":"Yasuhiro Ohyama"},{"@pid":"16/0-2","text":"Min Wu 0002"},{"@pid":"79/165","text":"Hiroshi Hashimoto"}]},"title":"Development of electric cart for improving walking ability - application of control theory to assistive technology.","venue":"Sci. China Inf. Sci.","volume":"60","number":"12","pages":"123201:1-123201:9","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/SheO0H17","doi":"10.1007/S11432-017-9261-1","ee":"https://doi.org/10.1007/s11432-017-9261-1","url":"https://dblp.org/rec/journals/chinaf/SheO0H17"}, "url":"URL#2755351" }, { "@score":"1", "@id":"2755352", "info":{"authors":{"author":[{"@pid":"88/8967","text":"Dong Shen"},{"@pid":"96/8085","text":"Jian Han"},{"@pid":"56/396","text":"Youqing Wang"}]},"title":"Convergence analysis of ILC input sequence for underdetermined linear systems.","venue":"Sci. China Inf. Sci.","volume":"60","number":"9","pages":"99201","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/ShenHW17","doi":"10.1007/S11432-016-0174-2","ee":"https://doi.org/10.1007/s11432-016-0174-2","url":"https://dblp.org/rec/journals/chinaf/ShenHW17"}, "url":"URL#2755352" }, { "@score":"1", "@id":"2755353", "info":{"authors":{"author":[{"@pid":"172/7638","text":"Peng Shi"},{"@pid":"212/6753","text":"Junru Chen"},{"@pid":"212/6730","text":"Jinke Lin"},{"@pid":"212/6727","text":"Lurong Zhang"}]},"title":"High-throughput fat quantifications of hematoxylin-eosin stained liver histopathological images based on pixel-wise clustering.","venue":"Sci. China Inf. Sci.","volume":"60","number":"9","pages":"092108:1-092108:12","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/ShiCLZ17","doi":"10.1007/S11432-016-9018-7","ee":"https://doi.org/10.1007/s11432-016-9018-7","url":"https://dblp.org/rec/journals/chinaf/ShiCLZ17"}, "url":"URL#2755353" }, { "@score":"1", "@id":"2755354", "info":{"authors":{"author":[{"@pid":"150/9416","text":"Danping Shi"},{"@pid":"09/6501","text":"Lei Hu"},{"@pid":"94/10123","text":"Siwei Sun"},{"@pid":"32/381-1","text":"Ling Song 0001"},{"@pid":"152/2559","text":"Kexin Qiao"},{"@pid":"152/2544","text":"Xiaoshuang Ma"}]},"title":"Improved linear (hull) cryptanalysis of round-reduced versions of SIMON.","venue":"Sci. China Inf. Sci.","volume":"60","number":"3","pages":"39101:1-39101:3","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/ShiHSSQM17","doi":"10.1007/S11432-015-0007-1","ee":"https://doi.org/10.1007/s11432-015-0007-1","url":"https://dblp.org/rec/journals/chinaf/ShiHSSQM17"}, "url":"URL#2755354" }, { "@score":"1", "@id":"2755355", "info":{"authors":{"author":[{"@pid":"35/8607","text":"Jianghong Shi"},{"@pid":"10/2639-6","text":"Chen Liu 0006"},{"@pid":"36/310","text":"Xuemin Hong"},{"@pid":"75/2596","text":"Cheng-Xiang Wang 0001"}]},"title":"Coexistence of delay-sensitive MTC/HTC traffic in large scale networks.","venue":"Sci. China Inf. Sci.","volume":"60","number":"10","pages":"100302:1-100302:15","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/ShiLHW17","doi":"10.1007/S11432-017-9183-2","ee":"https://doi.org/10.1007/s11432-017-9183-2","url":"https://dblp.org/rec/journals/chinaf/ShiLHW17"}, "url":"URL#2755355" }, { "@score":"1", "@id":"2755356", "info":{"authors":{"author":[{"@pid":"71/11310","text":"Jingtao Shi"},{"@pid":"13/8083","text":"Guangchen Wang"},{"@pid":"75/198-4","text":"Jie Xiong 0004"}]},"title":"Linear-quadratic stochastic Stackelberg differential game with asymmetric information.","venue":"Sci. China Inf. Sci.","volume":"60","number":"9","pages":"092202:1-092202:15","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/ShiWX17","doi":"10.1007/S11432-016-0654-Y","ee":"https://doi.org/10.1007/s11432-016-0654-y","url":"https://dblp.org/rec/journals/chinaf/ShiWX17"}, "url":"URL#2755356" }, { "@score":"1", "@id":"2755357", "info":{"authors":{"author":[{"@pid":"212/6767","text":"Liangren Shi"},{"@pid":"124/4348","text":"Zhiyun Zhao"},{"@pid":"65/6656","text":"Zongli Lin"}]},"title":"Robust semi-global leader-following practical consensus of a group of linear systems with imperfect actuators.","venue":"Sci. China Inf. Sci.","volume":"60","number":"7","pages":"072201:1-072201:12","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/ShiZL17","doi":"10.1007/S11432-016-0705-Y","ee":"https://doi.org/10.1007/s11432-016-0705-y","url":"https://dblp.org/rec/journals/chinaf/ShiZL17"}, "url":"URL#2755357" }, { "@score":"1", "@id":"2755358", "info":{"authors":{"author":[{"@pid":"162/7163","text":"Ruiqiang Song"},{"@pid":"05/2543","text":"Shuming Chen"},{"@pid":"71/6053","text":"Bin Liang"},{"@pid":"116/1274","text":"Yaqing Chi"},{"@pid":"20/1036","text":"Jianjun Chen"}]},"title":"Modeling the impact of process and operation variations on the soft error rate of digital circuits.","venue":"Sci. China Inf. Sci.","volume":"60","number":"12","pages":"129402","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/SongCLCC17","doi":"10.1007/S11432-016-9001-9","ee":"https://doi.org/10.1007/s11432-016-9001-9","url":"https://dblp.org/rec/journals/chinaf/SongCLCC17"}, "url":"URL#2755358" }, { "@score":"1", "@id":"2755359", "info":{"authors":{"author":[{"@pid":"127/6259","text":"Kang Song"},{"@pid":"72/5654","text":"Chunguo Li"},{"@pid":"62/1302","text":"Yongming Huang"},{"@pid":"90/3246","text":"Luxi Yang"}]},"title":"Antenna selection for two-way full duplex massive MIMO networks with amplify-and-forward relay.","venue":"Sci. China Inf. Sci.","volume":"60","number":"2","pages":"22308","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/SongLHY17","doi":"10.1007/S11432-016-5577-X","ee":"https://doi.org/10.1007/s11432-016-5577-x","url":"https://dblp.org/rec/journals/chinaf/SongLHY17"}, "url":"URL#2755359" }, { "@score":"1", "@id":"2755360", "info":{"authors":{"author":[{"@pid":"41/5420","text":"Ping Song"},{"@pid":"97/4626-13","text":"Yi Liu 0013"},{"@pid":"19/1886","text":"Tianxiao Liu"},{"@pid":"08/4002","text":"Depei Qian"}]},"title":"Flow Stealer: lightweight load balancing by stealing flows in distributed SDN controllers.","venue":"Sci. China Inf. Sci.","volume":"60","number":"3","pages":"32202","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/SongLLQ17","doi":"10.1007/S11432-016-0333-0","ee":"https://doi.org/10.1007/s11432-016-0333-0","url":"https://dblp.org/rec/journals/chinaf/SongLLQ17"}, "url":"URL#2755360" }, { "@score":"1", "@id":"2755361", "info":{"authors":{"author":{"@pid":"70/8680","text":"Duoqing Sun"}},"title":"Stability analysis of golden-section adaptive control systems based on the characteristic model.","venue":"Sci. China Inf. Sci.","volume":"60","number":"9","pages":"092205:1-092205:18","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/Sun17","doi":"10.1007/S11432-016-9005-2","ee":"https://doi.org/10.1007/s11432-016-9005-2","url":"https://dblp.org/rec/journals/chinaf/Sun17"}, "url":"URL#2755361" }, { "@score":"1", "@id":"2755362", "info":{"authors":{"author":[{"@pid":"30/5583-1","text":"Bing Sun 0001"},{"@pid":"121/4561","text":"Xin Hai"},{"@pid":"12/53","text":"Wenyu Zhang"},{"@pid":"48/2700","text":"Lei Cheng"},{"@pid":"148/4419-2","text":"Zhichao Yang 0002"}]},"title":"New observation on division property.","venue":"Sci. China Inf. Sci.","volume":"60","number":"9","pages":"98102","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/SunHZCY17","doi":"10.1007/S11432-015-0376-X","ee":"https://doi.org/10.1007/s11432-015-0376-x","url":"https://dblp.org/rec/journals/chinaf/SunHZCY17"}, "url":"URL#2755362" }, { "@score":"1", "@id":"2755363", "info":{"authors":{"author":[{"@pid":"37/5447","text":"Hong Sun"},{"@pid":"172/1211","text":"Cheng-Wei Sang"},{"@pid":"93/3226","text":"Chen-Guang Liu"}]},"title":"Principal basis analysis in sparse representation.","venue":"Sci. China Inf. Sci.","volume":"60","number":"2","pages":"28102","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/SunSL17","doi":"10.1007/S11432-015-0960-8","ee":"https://doi.org/10.1007/s11432-015-0960-8","url":"https://dblp.org/rec/journals/chinaf/SunSL17"}, "url":"URL#2755363" }, { "@score":"1", "@id":"2755364", "info":{"authors":{"author":[{"@pid":"08/6547-1","text":"Ling Sun 0001"},{"@pid":"88/158","text":"Meiqin Wang"}]},"title":"Toward a further understanding of bit-based division property.","venue":"Sci. China Inf. Sci.","volume":"60","number":"12","pages":"128101:1-128101:3","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/SunW17","doi":"10.1007/S11432-016-9170-Y","ee":"https://doi.org/10.1007/s11432-016-9170-y","url":"https://dblp.org/rec/journals/chinaf/SunW17"}, "url":"URL#2755364" }, { "@score":"1", "@id":"2755365", "info":{"authors":{"author":[{"@pid":"201/8244","text":"Yanhuan Sun"},{"@pid":"39/6844-8","text":"Ming Zhao 0008"},{"@pid":"59/5127","text":"Sihai Zhang"},{"@pid":"20/1068","text":"Jinkang Zhu"},{"@pid":"62/4801","text":"Wuyang Zhou"},{"@pid":"38/5225","text":"Shengli Zhou"}]},"title":"Aggregation transmission scheme for machine type communications.","venue":"Sci. China Inf. Sci.","volume":"60","number":"10","pages":"100305:1-100305:10","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/SunZZZZZ17","doi":"10.1007/S11432-017-9196-0","ee":"https://doi.org/10.1007/s11432-017-9196-0","url":"https://dblp.org/rec/journals/chinaf/SunZZZZZ17"}, "url":"URL#2755365" }, { "@score":"1", "@id":"2755366", "info":{"authors":{"author":[{"@pid":"53/4045","text":"Changbing Tang"},{"@pid":"40/1491-10","text":"Xiang Li 0010"},{"@pid":"78/6727-13","text":"Zhen Wang 0013"},{"@pid":"75/8230","text":"Jianmin Han"}]},"title":"Cooperation and distributed optimization for the unreliable wireless game with indirect reciprocity.","venue":"Sci. China Inf. Sci.","volume":"60","number":"11","pages":"110205:1-110205:17","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/TangLWH17","doi":"10.1007/S11432-017-9165-7","ee":"https://doi.org/10.1007/s11432-017-9165-7","url":"https://dblp.org/rec/journals/chinaf/TangLWH17"}, "url":"URL#2755366" }, { "@score":"1", "@id":"2755367", "info":{"authors":{"author":[{"@pid":"49/7602","text":"MaoNing Tang"},{"@pid":"79/129-3","text":"Qingxin Meng 0003"}]},"title":"Stochastic evolution equations of jump type with random coefficients: existence, uniqueness and optimal control.","venue":"Sci. China Inf. Sci.","volume":"60","number":"11","pages":"118202:1-118202:3","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/TangM17","doi":"10.1007/S11432-016-9107-1","ee":"https://doi.org/10.1007/s11432-016-9107-1","url":"https://dblp.org/rec/journals/chinaf/TangM17"}, "url":"URL#2755367" }, { "@score":"1", "@id":"2755368", "info":{"authors":{"author":[{"@pid":"t/JieTang","text":"Jie Tang 0001"},{"@pid":"58/1757","text":"Hanghang Tong"},{"@pid":"v/MVazirgiannis","text":"Michalis Vazirgiannis"}]},"title":"Special focus on natural language processing and social computing.","venue":"Sci. China Inf. Sci.","volume":"60","number":"11","pages":"110100:1-110100:2","year":"2017","type":"Journal Articles","access":"open","key":"journals/chinaf/TangTV17","doi":"10.1007/S11432-017-9251-5","ee":"https://doi.org/10.1007/s11432-017-9251-5","url":"https://dblp.org/rec/journals/chinaf/TangTV17"}, "url":"URL#2755368" }, { "@score":"1", "@id":"2755369", "info":{"authors":{"author":[{"@pid":"41/556","text":"Yuhua Tang"},{"@pid":"11/6088","text":"Weiren Wu"},{"@pid":"142/3227","text":"Dong Qiao"},{"@pid":"87/9032","text":"Xiangyu Li"}]},"title":"Effect of orbital shadow at an Earth-Moon Lagrange point on relay communication mission.","venue":"Sci. China Inf. Sci.","volume":"60","number":"11","pages":"112301:1-112301:10","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/TangWQL17","doi":"10.1007/S11432-016-9069-9","ee":"https://doi.org/10.1007/s11432-016-9069-9","url":"https://dblp.org/rec/journals/chinaf/TangWQL17"}, "url":"URL#2755369" }, { "@score":"1", "@id":"2755370", "info":{"authors":{"author":[{"@pid":"60/406","text":"Fei Tang"},{"@pid":"z/RuiZhang2","text":"Rui Zhang 0002"},{"@pid":"49/6722-1","text":"Hongda Li 0001"}]},"title":"Attribute-based non-interactive key exchange.","venue":"Sci. China Inf. Sci.","volume":"60","number":"1","pages":"19101:1-19101:3","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/TangZL17","doi":"10.1007/S11432-015-0994-0","ee":"https://doi.org/10.1007/s11432-015-0994-0","url":"https://dblp.org/rec/journals/chinaf/TangZL17"}, "url":"URL#2755370" }, { "@score":"1", "@id":"2755371", "info":{"authors":{"author":[{"@pid":"96/6496","text":"Xiaofeng Tao"},{"@pid":"79/4311","text":"Yan Han"},{"@pid":"43/2085-1","text":"Xiaodong Xu 0001"},{"@pid":"77/2428-3","text":"Ping Zhang 0003"},{"@pid":"36/4847","text":"Victor C. M. Leung"}]},"title":"Recent advances and future challenges for mobile network virtualization.","venue":"Sci. China Inf. Sci.","volume":"60","number":"4","pages":"040301:1-040301:12","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/TaoHX0L17","doi":"10.1007/S11432-017-9045-1","ee":"https://doi.org/10.1007/s11432-017-9045-1","url":"https://dblp.org/rec/journals/chinaf/TaoHX0L17"}, "url":"URL#2755371" }, { "@score":"1", "@id":"2755372", "info":{"authors":{"author":[{"@pid":"17/8990","text":"Jinhua Tao"},{"@pid":"97/8988","text":"Shi Qiu"},{"@pid":"85/9414","text":"Shaoli Liu"},{"@pid":"60/419-2","text":"Tianshi Chen 0002"},{"@pid":"51/5793","text":"Rui Mao 0001"}]},"title":"Stealth-ACK: stealth transmissions of NoC acknowledgements.","venue":"Sci. China Inf. Sci.","volume":"60","number":"9","pages":"92102","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/TaoQLCM17","doi":"10.1007/S11432-015-0328-Y","ee":"https://doi.org/10.1007/s11432-015-0328-y","url":"https://dblp.org/rec/journals/chinaf/TaoQLCM17"}, "url":"URL#2755372" }, { "@score":"1", "@id":"2755373", "info":{"authors":{"author":[{"@pid":"96/6496","text":"Xiaofeng Tao"},{"@pid":"77/2428-3","text":"Ping Zhang 0003"},{"@pid":"36/4847","text":"Victor C. M. Leung"},{"@pid":"55/758","text":"Songwu Lu"},{"@pid":"87/1254-6","text":"Yu Chen 0006"}]},"title":"Special focus on machine-type communications.","venue":"Sci. China Inf. Sci.","volume":"60","number":"10","pages":"100300:1-100300:2","year":"2017","type":"Journal Articles","access":"open","key":"journals/chinaf/TaoZLLC17","doi":"10.1007/S11432-017-9217-1","ee":"https://doi.org/10.1007/s11432-017-9217-1","url":"https://dblp.org/rec/journals/chinaf/TaoZLLC17"}, "url":"URL#2755373" }, { "@score":"1", "@id":"2755374", "info":{"authors":{"author":[{"@pid":"19/1603","text":"Bo Tian"},{"@pid":"59/2227-42","text":"Yan Wang 0042"},{"@pid":"64/1967-3","text":"Lei Guo 0003"}]},"title":"Entropy optimization based filtering for non-Gaussian stochastic systems.","venue":"Sci. China Inf. Sci.","volume":"60","number":"12","pages":"120203:1-120203:11","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/TianW017","doi":"10.1007/S11432-017-9138-6","ee":"https://doi.org/10.1007/s11432-017-9138-6","url":"https://dblp.org/rec/journals/chinaf/TianW017"}, "url":"URL#2755374" }, { "@score":"1", "@id":"2755375", "info":{"authors":{"author":[{"@pid":"07/4221","text":"Peng Wan"},{"@pid":"24/2311","text":"Shi Chen"},{"@pid":"67/1014","text":"Tao Yu"},{"@pid":"197/0845","text":"Zhongjie Hua"}]},"title":"A hybrid multiple copy routing algorithm in space delay-tolerant networks.","venue":"Sci. China Inf. Sci.","volume":"60","number":"4","pages":"42301","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/WanCYH17","doi":"10.1007/S11432-015-0954-6","ee":"https://doi.org/10.1007/s11432-015-0954-6","url":"https://dblp.org/rec/journals/chinaf/WanCYH17"}, "url":"URL#2755375" }, { "@score":"1", "@id":"2755376", "info":{"authors":{"author":[{"@pid":"20/8967-1","text":"Yangyang Wang 0001"},{"@pid":"79/3662","text":"Jun Bi"},{"@pid":"159/6908","text":"Keyao Zhang"}]},"title":"A tool for tracing network data plane via SDN/OpenFlow.","venue":"Sci. China Inf. Sci.","volume":"60","number":"2","pages":"22304","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/WangBZ17","doi":"10.1007/S11432-015-1057-7","ee":"https://doi.org/10.1007/s11432-015-1057-7","url":"https://dblp.org/rec/journals/chinaf/WangBZ17"}, "url":"URL#2755376" }, { "@score":"1", "@id":"2755377", "info":{"authors":{"author":[{"@pid":"16/5766","text":"Liangliang Wang"},{"@pid":"66/5496","text":"Kefei Chen"},{"@pid":"13/102-1","text":"Yu Long 0001"},{"@pid":"170/3245","text":"Huige Wang"}]},"title":"An efficient pairing-free certificateless signature scheme for resource-limited systems.","venue":"Sci. China Inf. Sci.","volume":"60","number":"11","pages":"119102","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/WangCLW17","doi":"10.1007/S11432-015-0367-6","ee":"https://doi.org/10.1007/s11432-015-0367-6","url":"https://dblp.org/rec/journals/chinaf/WangCLW17"}, "url":"URL#2755377" }, { "@score":"1", "@id":"2755378", "info":{"authors":{"author":[{"@pid":"170/3245","text":"Huige Wang"},{"@pid":"66/5496","text":"Kefei Chen"},{"@pid":"94/6901","text":"Baodong Qin"},{"@pid":"05/4632","text":"Xuejia Lai"},{"@pid":"197/0926","text":"Yunhua Wen"}]},"title":"A new construction on randomized message-locked encryption in the standard model via UCEs.","venue":"Sci. China Inf. Sci.","volume":"60","number":"5","pages":"52101","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/WangCQLW17","doi":"10.1007/S11432-015-1037-2","ee":"https://doi.org/10.1007/s11432-015-1037-2","url":"https://dblp.org/rec/journals/chinaf/WangCQLW17"}, "url":"URL#2755378" }, { "@score":"1", "@id":"2755379", "info":{"authors":{"author":[{"@pid":"52/3194-30","text":"Fei Wang 0030"},{"@pid":"27/6389","text":"Zesong Fei"},{"@pid":"02/736-37","text":"Jing Wang 0037"},{"@pid":"23/4955","text":"Yifan Liu"},{"@pid":"179/8827","text":"Zhikun Wu"}]},"title":"HAS QoE prediction based on dynamic video features with data mining in LTE network.","venue":"Sci. China Inf. Sci.","volume":"60","number":"4","pages":"42404","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/WangFWLW17","doi":"10.1007/S11432-015-1044-3","ee":"https://doi.org/10.1007/s11432-015-1044-3","url":"https://dblp.org/rec/journals/chinaf/WangFWLW17"}, "url":"URL#2755379" }, { "@score":"1", "@id":"2755380", "info":{"authors":{"author":[{"@pid":"54/6596","text":"Xiangyang Wang"},{"@pid":"167/9475","text":"Xiaoteng Gu"},{"@pid":"167/9176","text":"Qifeng Li"}]},"title":"A study of power allocation in multi-MRN aided multiuser networks.","venue":"Sci. China Inf. Sci.","volume":"60","number":"2","pages":"22303","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/WangGL17","doi":"10.1007/S11432-015-0686-0","ee":"https://doi.org/10.1007/s11432-015-0686-0","url":"https://dblp.org/rec/journals/chinaf/WangGL17"}, "url":"URL#2755380" }, { "@score":"1", "@id":"2755381", "info":{"authors":{"author":[{"@pid":"78/6727","text":"Zhen Wang"},{"@pid":"28/10753","text":"Lixin He"}]},"title":"Quantifying quantum information resources: a numerical study.","venue":"Sci. China Inf. Sci.","volume":"60","number":"5","pages":"52501","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/WangH17","doi":"10.1007/S11432-016-9006-6","ee":"https://doi.org/10.1007/s11432-016-9006-6","url":"https://dblp.org/rec/journals/chinaf/WangH17"}, "url":"URL#2755381" }, { "@score":"1", "@id":"2755382", "info":{"authors":{"author":[{"@pid":"35/7092-347","text":"Wei Wang 0347"},{"@pid":"34/3779","text":"Lihua Hu"},{"@pid":"35/6476","text":"Zhanyi Hu"}]},"title":"Energy-based multi-view piecewise planar stereo.","venue":"Sci. China Inf. Sci.","volume":"60","number":"3","pages":"32101","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/WangHH17","doi":"10.1007/S11432-015-0710-5","ee":"https://doi.org/10.1007/s11432-015-0710-5","url":"https://dblp.org/rec/journals/chinaf/WangHH17"}, "url":"URL#2755382" }, { "@score":"1", "@id":"2755383", "info":{"authors":{"author":[{"@pid":"06/4924-1","text":"An Wang 0001"},{"@pid":"05/8589","text":"Wenjing Hu"},{"@pid":"209/2367","text":"Weina Tian"},{"@pid":"141/5353","text":"Guoshuang Zhang"},{"@pid":"26/2546","text":"Liehuang Zhu"}]},"title":"Practical two-dimensional correlation power analysis and its backward fault-tolerance.","venue":"Sci. China Inf. Sci.","volume":"60","number":"6","pages":"68101","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/WangHTZZ17","doi":"10.1007/S11432-016-0398-Y","ee":"https://doi.org/10.1007/s11432-016-0398-y","url":"https://dblp.org/rec/journals/chinaf/WangHTZZ17"}, "url":"URL#2755383" }, { "@score":"1", "@id":"2755384", "info":{"authors":{"author":[{"@pid":"143/1778","text":"Xingya Wang"},{"@pid":"78/1716","text":"Shujuan Jiang"},{"@pid":"147/0949","text":"Pengfei Gao"},{"@pid":"136/4595","text":"Xiaolin Ju"},{"@pid":"136/7321","text":"Rongcun Wang"},{"@pid":"20/5452","text":"Yanmei Zhang"}]},"title":"Cost-effective testing based fault localization with distance based test-suite reduction.","venue":"Sci. China Inf. Sci.","volume":"60","number":"9","pages":"092112:1-092112:15","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/WangJGJWZ17","doi":"10.1007/S11432-016-9057-8","ee":"https://doi.org/10.1007/s11432-016-9057-8","url":"https://dblp.org/rec/journals/chinaf/WangJGJWZ17"}, "url":"URL#2755384" }, { "@score":"1", "@id":"2755385", "info":{"authors":{"author":[{"@pid":"16/1733","text":"Zhiping Wang"},{"@pid":"72/11307","text":"Haikun Jia"},{"@pid":"60/11307","text":"Lixue Kuang"},{"@pid":"92/1659","text":"Baoyong Chi"}]},"title":"An 80-83 GHz CMOS DCO based on DiCAD technique for size, linearity and noise optimization.","venue":"Sci. China Inf. Sci.","volume":"60","number":"8","pages":"080401:1-080401:3","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/WangJKC17","doi":"10.1007/S11432-016-9051-8","ee":"https://doi.org/10.1007/s11432-016-9051-8","url":"https://dblp.org/rec/journals/chinaf/WangJKC17"}, "url":"URL#2755385" }, { "@score":"1", "@id":"2755386", "info":{"authors":{"author":[{"@pid":"157/1619","text":"Kangli Wang"},{"@pid":"157/1810","text":"Yijie Ke"},{"@pid":"55/4291","text":"Ben M. Chen"}]},"title":"Autonomous reconfigurable hybrid tail-sitter UAV U-Lion.","venue":"Sci. China Inf. Sci.","volume":"60","number":"3","pages":"33201","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/WangKC17","doi":"10.1007/S11432-016-9002-X","ee":"https://doi.org/10.1007/s11432-016-9002-x","url":"https://dblp.org/rec/journals/chinaf/WangKC17"}, "url":"URL#2755386" }, { "@score":"1", "@id":"2755387", "info":{"authors":{"author":[{"@pid":"29/4241-1","text":"Xiaolin Wang 0001"},{"@pid":"165/2093","text":"Taowei Luo"},{"@pid":"32/11117","text":"Jingyuan Hu"},{"@pid":"88/5294","text":"Zhenlin Wang"},{"@pid":"70/4037","text":"Yingwei Luo"}]},"title":"Evaluating the impacts of hugepage on virtual machines.","venue":"Sci. China Inf. Sci.","volume":"60","number":"1","pages":"12103","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/WangLHWL17","doi":"10.1007/S11432-015-0764-7","ee":"https://doi.org/10.1007/s11432-015-0764-7","url":"https://dblp.org/rec/journals/chinaf/WangLHWL17"}, "url":"URL#2755387" }, { "@score":"1", "@id":"2755388", "info":{"authors":{"author":[{"@pid":"142/2752","text":"Jinglu Wang"},{"@pid":"171/6242","text":"Yonghua Lu"},{"@pid":"43/7726","text":"Jingbo Liu"},{"@pid":"04/575","text":"Long Quan"}]},"title":"A robust three-stage approach to large-scale urban scene recognition.","venue":"Sci. China Inf. Sci.","volume":"60","number":"10","pages":"103101:1-103101:13","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/WangLLQ17","doi":"10.1007/S11432-017-9178-8","ee":"https://doi.org/10.1007/s11432-017-9178-8","url":"https://dblp.org/rec/journals/chinaf/WangLLQ17"}, "url":"URL#2755388" }, { "@score":"1", "@id":"2755389", "info":{"authors":{"author":[{"@pid":"129/1023","text":"Zejue Wang"},{"@pid":"14/10237","text":"Hongjia Li"},{"@pid":"02/6332","text":"Zhen Xu"}]},"title":"Real-world traffic analysis and joint caching and scheduling for in-RAN caching networks.","venue":"Sci. China Inf. Sci.","volume":"60","number":"6","pages":"62302","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/WangLX17","doi":"10.1007/S11432-016-0391-2","ee":"https://doi.org/10.1007/s11432-016-0391-2","url":"https://dblp.org/rec/journals/chinaf/WangLX17"}, "url":"URL#2755389" }, { "@score":"1", "@id":"2755390", "info":{"authors":{"author":[{"@pid":"212/6811","text":"Juhong Wang"},{"@pid":"35/837","text":"Bin Liu"},{"@pid":"29/6948-3","text":"Kun Xu 0003"}]},"title":"Semantic segmentation of high-resolution images.","venue":"Sci. China Inf. Sci.","volume":"60","number":"12","pages":"123101:1-123101:6","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/WangLX17a","doi":"10.1007/S11432-017-9252-5","ee":"https://doi.org/10.1007/s11432-017-9252-5","url":"https://dblp.org/rec/journals/chinaf/WangLX17a"}, "url":"URL#2755390" }, { "@score":"1", "@id":"2755391", "info":{"authors":{"author":[{"@pid":"99/4292-1","text":"Ding Wang 0001"},{"@pid":"11/6606","text":"Chaoxu Mu"}]},"title":"Developing nonlinear adaptive optimal regulators through an improved neural learning mechanism.","venue":"Sci. China Inf. Sci.","volume":"60","number":"5","pages":"058201:1-058201:3","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/WangM17","doi":"10.1007/S11432-016-9022-1","ee":"https://doi.org/10.1007/s11432-016-9022-1","url":"https://dblp.org/rec/journals/chinaf/WangM17"}, "url":"URL#2755391" }, { "@score":"1", "@id":"2755392", "info":{"authors":{"author":[{"@pid":"154/5955","text":"Lijiao Wang"},{"@pid":"24/1572","text":"Bin Meng"}]},"title":"Characteristic model-based control of robotic manipulators with dynamic uncertainties.","venue":"Sci. China Inf. Sci.","volume":"60","number":"7","pages":"79201","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/WangM17a","doi":"10.1007/S11432-015-0356-5","ee":"https://doi.org/10.1007/s11432-015-0356-5","url":"https://dblp.org/rec/journals/chinaf/WangM17a"}, "url":"URL#2755392" }, { "@score":"1", "@id":"2755393", "info":{"authors":{"author":[{"@pid":"73/8605","text":"Chaowei Wang"},{"@pid":"201/8248","text":"Wuyang Mei"},{"@pid":"212/6800","text":"Xiangying Qin"},{"@pid":"57/4280","text":"Weidong Wang"}]},"title":"Quantum entropy based tabu search algorithm for energy saving in SDWN.","venue":"Sci. China Inf. Sci.","volume":"60","number":"4","pages":"040307:1-040307:16","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/WangMQW17","doi":"10.1007/S11432-017-9044-X","ee":"https://doi.org/10.1007/s11432-017-9044-x","url":"https://dblp.org/rec/journals/chinaf/WangMQW17"}, "url":"URL#2755393" }, { "@score":"1", "@id":"2755394", "info":{"authors":{"author":[{"@pid":"122/9193","text":"Yiyuan Wang"},{"@pid":"43/3931","text":"Dantong Ouyang"},{"@pid":"66/6011-5","text":"Liming Zhang 0005"},{"@pid":"13/3656","text":"Minghao Yin"}]},"title":"A novel local search for unicost set covering problem using hyperedge configuration checking and weight diversity.","venue":"Sci. China Inf. Sci.","volume":"60","number":"6","pages":"62103","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/WangO0Y17","doi":"10.1007/S11432-015-5377-8","ee":"https://doi.org/10.1007/s11432-015-5377-8","url":"https://dblp.org/rec/journals/chinaf/WangO0Y17"}, "url":"URL#2755394" }, { "@score":"1", "@id":"2755395", "info":{"authors":{"author":[{"@pid":"39/449-21","text":"Jian Wang 0021"},{"@pid":"192/9554","text":"Jiqing Sun"},{"@pid":"07/1644","text":"Hongfei Lin"},{"@pid":"170/3453","text":"Hualei Dong"},{"@pid":"122/5958-2","text":"Shaowu Zhang 0002"}]},"title":"Convolutional neural networks for expert recommendation in community question answering.","venue":"Sci. China Inf. Sci.","volume":"60","number":"11","pages":"110102:1-110102:9","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/WangSLDZ17","doi":"10.1007/S11432-016-9197-0","ee":"https://doi.org/10.1007/s11432-016-9197-0","url":"https://dblp.org/rec/journals/chinaf/WangSLDZ17"}, "url":"URL#2755395" }, { "@score":"1", "@id":"2755396", "info":{"authors":{"author":[{"@pid":"70/4828","text":"Yin Wang"},{"@pid":"49/7053","text":"Daobo Wang"}]},"title":"Tight formation control of multiple unmanned aerial vehicles through an adaptive control method.","venue":"Sci. China Inf. Sci.","volume":"60","number":"7","pages":"070207:1-070207:3","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/WangW17","doi":"10.1007/S11432-016-9092-Y","ee":"https://doi.org/10.1007/s11432-016-9092-y","url":"https://dblp.org/rec/journals/chinaf/WangW17"}, "url":"URL#2755396" }, { "@score":"1", "@id":"2755397", "info":{"authors":{"author":[{"@pid":"32/6238","text":"Gaoli Wang"},{"@pid":"07/91","text":"Chunbo Zhu"}]},"title":"Single key recovery attacks on reduced AES-192 and Kalyna-128/256.","venue":"Sci. China Inf. Sci.","volume":"60","number":"9","pages":"99101","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/WangZ17","doi":"10.1007/S11432-016-0417-7","ee":"https://doi.org/10.1007/s11432-016-0417-7","url":"https://dblp.org/rec/journals/chinaf/WangZ17"}, "url":"URL#2755397" }, { "@score":"1", "@id":"2755398", "info":{"authors":{"author":[{"@pid":"33/4679","text":"Zhenhua Wang"},{"@pid":"10/6455","text":"Huanshui Zhang"},{"@pid":"38/3704","text":"Minyue Fu 0001"},{"@pid":"13/6826-1","text":"Huaxiang Zhang 0001"}]},"title":"Consensus for high-order multi-agent systems with communication delay.","venue":"Sci. China Inf. Sci.","volume":"60","number":"9","pages":"092204:1-092204:12","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/WangZFZ17","doi":"10.1007/S11432-016-0094-7","ee":"https://doi.org/10.1007/s11432-016-0094-7","url":"https://dblp.org/rec/journals/chinaf/WangZFZ17"}, "url":"URL#2755398" }, { "@score":"1", "@id":"2755399", "info":{"authors":{"author":[{"@pid":"60/2139-11","text":"Xiaoming Wang 0011"},{"@pid":"67/4433","text":"Fuchun Zheng"},{"@pid":"168/4043","text":"Xia Jia"},{"@pid":"17/1464-1","text":"Xiaohu You 0001"}]},"title":"Resource allocation in OFDMA heterogeneous networks for maximizing weighted sum energy efficiency.","venue":"Sci. China Inf. Sci.","volume":"60","number":"6","pages":"62304","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/WangZJY17","doi":"10.1007/S11432-016-0425-3","ee":"https://doi.org/10.1007/s11432-016-0425-3","url":"https://dblp.org/rec/journals/chinaf/WangZJY17"}, "url":"URL#2755399" }, { "@score":"1", "@id":"2755400", "info":{"authors":{"author":[{"@pid":"26/9847","text":"Zhenqi Wei"},{"@pid":"96/2301","text":"Peilin Liu"},{"@pid":"158/8985","text":"Rongdi Sun"}]},"title":"HyBar: high efficient barrier synchronization based on a hybrid packet-circuit switching Network-on-Chip.","venue":"Sci. China Inf. Sci.","volume":"60","number":"6","pages":"62402","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/WeiLS17","doi":"10.1007/S11432-016-0306-Y","ee":"https://doi.org/10.1007/s11432-016-0306-y","url":"https://dblp.org/rec/journals/chinaf/WeiLS17"}, "url":"URL#2755400" }, { "@score":"1", "@id":"2755401", "info":{"authors":{"author":[{"@pid":"32/8638","text":"Fushan Wei"},{"@pid":"12/6604-1","text":"Jianfeng Ma 0001"},{"@pid":"04/2964","text":"Ruijie Zhang"},{"@pid":"00/6224","text":"Chuangui Ma"},{"@pid":"42/499","text":"Xu An Wang 0001"}]},"title":"An efficient and practical threshold gateway-oriented password-authenticated key exchange protocol in the standard model.","venue":"Sci. China Inf. Sci.","volume":"60","number":"7","pages":"72103","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/WeiMZMW17","doi":"10.1007/S11432-016-5535-7","ee":"https://doi.org/10.1007/s11432-016-5535-7","url":"https://dblp.org/rec/journals/chinaf/WeiMZMW17"}, "url":"URL#2755401" }, { "@score":"1", "@id":"2755402", "info":{"authors":{"author":[{"@pid":"10/3887","text":"Ning Wei"},{"@pid":"99/1955","text":"Zhongpei Zhang"}]},"title":"Competitive access in multi-RAT systems with regulated interference constraints.","venue":"Sci. China Inf. Sci.","volume":"60","number":"2","pages":"22306","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/WeiZ17","doi":"10.1007/S11432-015-0625-3","ee":"https://doi.org/10.1007/s11432-015-0625-3","url":"https://dblp.org/rec/journals/chinaf/WeiZ17"}, "url":"URL#2755402" }, { "@score":"1", "@id":"2755403", "info":{"authors":{"author":[{"@pid":"60/6284","text":"Zhendong Wu"},{"@pid":"31/6932","text":"Kai Lu"},{"@pid":"76/6429","text":"Xiaoping Wang"}]},"title":"Surveying concurrency bug detectors based on types of detected bugs.","venue":"Sci. China Inf. Sci.","volume":"60","number":"3","pages":"31101","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/WuLW17","doi":"10.1007/S11432-015-0203-2","ee":"https://doi.org/10.1007/s11432-015-0203-2","url":"https://dblp.org/rec/journals/chinaf/WuLW17"}, "url":"URL#2755403" }, { "@score":"1", "@id":"2755404", "info":{"authors":{"author":[{"@pid":"16/4302","text":"Junwei Wu"},{"@pid":"39/2105","text":"Liwei Shen"},{"@pid":"191/6634","text":"Wunan Guo"},{"@pid":"37/4220","text":"Wenyun Zhao"}]},"title":"Code recommendation for android development: how does it work and what can be improved?","venue":"Sci. China Inf. Sci.","volume":"60","number":"9","pages":"092111:1-092111:14","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/WuSGZ17","doi":"10.1007/S11432-017-9058-0","ee":"https://doi.org/10.1007/s11432-017-9058-0","url":"https://dblp.org/rec/journals/chinaf/WuSGZ17"}, "url":"URL#2755404" }, { "@score":"1", "@id":"2755405", "info":{"authors":{"author":[{"@pid":"46/8700","text":"Youxi Wu"},{"@pid":"79/6027","text":"Cong Shen"},{"@pid":"30/3790-1","text":"He Jiang 0001"},{"@pid":"59/4107","text":"Xindong Wu 0001"}]},"title":"Strict pattern matching under non-overlapping condition.","venue":"Sci. China Inf. Sci.","volume":"60","number":"1","pages":"12101","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/WuSJW17","doi":"10.1007/S11432-015-0935-3","ee":"https://doi.org/10.1007/s11432-015-0935-3","url":"https://dblp.org/rec/journals/chinaf/WuSJW17"}, "url":"URL#2755405" }, { "@score":"1", "@id":"2755406", "info":{"authors":{"author":[{"@pid":"157/8186","text":"Chenmiao Wu"},{"@pid":"09/3925","text":"Li Yang"}]},"title":"Qubit-wise teleportation and its application in public-key secret communication.","venue":"Sci. China Inf. Sci.","volume":"60","number":"3","pages":"32501","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/WuY17","doi":"10.1007/S11432-016-0152-4","ee":"https://doi.org/10.1007/s11432-016-0152-4","url":"https://dblp.org/rec/journals/chinaf/WuY17"}, "url":"URL#2755406" }, { "@score":"1", "@id":"2755407", "info":{"authors":{"author":[{"@pid":"157/8186","text":"Chenmiao Wu"},{"@pid":"09/3925","text":"Li Yang"}]},"title":"Erratum to: Qubit-wise teleportation and its application in public-key secret communication.","venue":"Sci. China Inf. Sci.","volume":"60","number":"3","pages":"39901","year":"2017","type":"Journal Articles","access":"open","key":"journals/chinaf/WuY17a","doi":"10.1007/S11432-016-0893-Y","ee":"https://doi.org/10.1007/s11432-016-0893-y","url":"https://dblp.org/rec/journals/chinaf/WuY17a"}, "url":"URL#2755407" }, { "@score":"1", "@id":"2755408", "info":{"authors":{"author":[{"@pid":"03/11522","text":"Hao Xie"},{"@pid":"11/914-1","text":"Ruo-feng Tong 0001"}]},"title":"Patch-based variational image approximation.","venue":"Sci. China Inf. Sci.","volume":"60","number":"3","pages":"32104","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/XieT17","doi":"10.1007/S11432-016-0130-4","ee":"https://doi.org/10.1007/s11432-016-0130-4","url":"https://dblp.org/rec/journals/chinaf/XieT17"}, "url":"URL#2755408" }, { "@score":"1", "@id":"2755409", "info":{"authors":{"author":[{"@pid":"180/6764","text":"Zhiwen Xie"},{"@pid":"33/2758","text":"Zhao Zeng"},{"@pid":"24/9769","text":"Guangyou Zhou"},{"@pid":"42/512","text":"Weijun Wang"}]},"title":"Topic enhanced deep structured semantic models for knowledge base question answering.","venue":"Sci. China Inf. Sci.","volume":"60","number":"11","pages":"110103:1-110103:15","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/XieZZW17","doi":"10.1007/S11432-017-9136-X","ee":"https://doi.org/10.1007/s11432-017-9136-x","url":"https://dblp.org/rec/journals/chinaf/XieZZW17"}, "url":"URL#2755409" }, { "@score":"1", "@id":"2755410", "info":{"authors":{"author":[{"@pid":"148/8802","text":"Shuangyun Xing"},{"@pid":"40/4905","text":"Feiqi Deng"}]},"title":"Delay-dependent dissipative filtering for nonlinear stochastic singular systems with time-varying delays.","venue":"Sci. China Inf. Sci.","volume":"60","number":"12","pages":"120208:1-120208:18","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/XingD17","doi":"10.1007/S11432-017-9163-4","ee":"https://doi.org/10.1007/s11432-017-9163-4","url":"https://dblp.org/rec/journals/chinaf/XingD17"}, "url":"URL#2755410" }, { "@score":"1", "@id":"2755411", "info":{"authors":{"author":[{"@pid":"212/6735","text":"Yannan Xu"},{"@pid":"191/4871","text":"Jinshun Bi"},{"@pid":"212/6799","text":"Gaobo Xu"},{"@pid":"49/7884","text":"Kai Xi"},{"@pid":"50/3402-51","text":"Bo Li 0051"},{"@pid":"20/2039-22","text":"Ming Liu 0022"}]},"title":"Total ionizing dose effects and annealing behaviors of HfO2-based MOS capacitor.","venue":"Sci. China Inf. Sci.","volume":"60","number":"12","pages":"120401:1-120401:3","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/XuBXXLL17","doi":"10.1007/S11432-017-9239-5","ee":"https://doi.org/10.1007/s11432-017-9239-5","url":"https://dblp.org/rec/journals/chinaf/XuBXXLL17"}, "url":"URL#2755411" }, { "@score":"1", "@id":"2755412", "info":{"authors":{"author":[{"@pid":"94/7001-1","text":"Ding Xu 0001"},{"@pid":"42/6066-2","text":"Qun Li 0002"}]},"title":"Price-based time and energy allocation in cognitive radio multiple access networks with energy harvesting.","venue":"Sci. China Inf. Sci.","volume":"60","number":"10","pages":"108302:1-108302:3","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/XuL17","doi":"10.1007/S11432-016-9016-4","ee":"https://doi.org/10.1007/s11432-016-9016-4","url":"https://dblp.org/rec/journals/chinaf/XuL17"}, "url":"URL#2755412" }, { "@score":"1", "@id":"2755413", "info":{"authors":{"author":[{"@pid":"43/2085-1","text":"Xiaodong Xu 0001"},{"@pid":"121/1088-2","text":"Jiaxiang Liu 0002"},{"@pid":"212/6766","text":"Wenwan Chen"},{"@pid":"129/1292","text":"Yanzhao Hou"},{"@pid":"96/6496","text":"Xiaofeng Tao"}]},"title":"Storage and computing resource enabled joint virtual resource allocation with QoS guarantee in mobile networks.","venue":"Sci. China Inf. Sci.","volume":"60","number":"4","pages":"040304:1-040304:11","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/XuLCHT17","doi":"10.1007/S11432-016-9038-7","ee":"https://doi.org/10.1007/s11432-016-9038-7","url":"https://dblp.org/rec/journals/chinaf/XuLCHT17"}, "url":"URL#2755413" }, { "@score":"1", "@id":"2755414", "info":{"authors":{"author":[{"@pid":"37/5126-23","text":"Jie Xu 0023"},{"@pid":"212/6748","text":"Linke Li"},{"@pid":"212/6779","text":"Sibian Lu"},{"@pid":"212/6758","text":"Huayun Yin"}]},"title":"A novel batch-based LKH tree balanced algorithm for group key management.","venue":"Sci. China Inf. Sci.","volume":"60","number":"10","pages":"108301:1-108301:3","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/XuLLY17","doi":"10.1007/S11432-015-1045-1","ee":"https://doi.org/10.1007/s11432-015-1045-1","url":"https://dblp.org/rec/journals/chinaf/XuLLY17"}, "url":"URL#2755414" }, { "@score":"1", "@id":"2755415", "info":{"authors":{"author":[{"@pid":"76/10775","text":"Dongyang Xu"},{"@pid":"28/2359","text":"Pinyi Ren"},{"@pid":"05/1627","text":"Qinghe Du"},{"@pid":"57/2405-1","text":"Li Sun 0001"},{"@pid":"74/8792-2","text":"Yichen Wang 0002"}]},"title":"Towards win-win: weighted-Voronoi-diagram based channel quantization for security enhancement in downlink cloud-RAN with limited CSI feedback.","venue":"Sci. China Inf. Sci.","volume":"60","number":"4","pages":"040303:1-040303:17","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/XuRDSW17","doi":"10.1007/S11432-016-9013-0","ee":"https://doi.org/10.1007/s11432-016-9013-0","url":"https://dblp.org/rec/journals/chinaf/XuRDSW17"}, "url":"URL#2755415" }, { "@score":"1", "@id":"2755416", "info":{"authors":{"author":[{"@pid":"84/586","text":"Peng Xu"},{"@pid":"66/5973-2","text":"Dongming Wang 0002"},{"@pid":"42/1054","text":"Feng Qi"}]},"title":"On the use of H-inf criterion in channel estimation and precoding in massive MIMO systems.","venue":"Sci. China Inf. Sci.","volume":"60","number":"2","pages":"22311","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/XuWQ17","doi":"10.1007/S11432-016-0476-0","ee":"https://doi.org/10.1007/s11432-016-0476-0","url":"https://dblp.org/rec/journals/chinaf/XuWQ17"}, "url":"URL#2755416" }, { "@score":"1", "@id":"2755417", "info":{"authors":{"author":[{"@pid":"201/8261","text":"Shenghao Xu"},{"@pid":"48/2947-1","text":"Haixia Zhang 0001"},{"@pid":"181/2690-3","text":"Jie Tian 0003"},{"@pid":"96/1515","text":"P. Takis Mathiopoulos"}]},"title":"Pilot reuse and power control of D2D underlaying massive MIMO systems for energy efficiency optimization.","venue":"Sci. China Inf. Sci.","volume":"60","number":"10","pages":"100303:1-100303:15","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/XuZTM17","doi":"10.1007/S11432-017-9194-Y","ee":"https://doi.org/10.1007/s11432-017-9194-y","url":"https://dblp.org/rec/journals/chinaf/XuZTM17"}, "url":"URL#2755417" }, { "@score":"1", "@id":"2755418", "info":{"authors":{"author":[{"@pid":"212/6729","text":"Changbao Xu"},{"@pid":"14/6654","text":"Yanlong Zhao"},{"@pid":"88/3","text":"Ji-Feng Zhang"}]},"title":"Decision-implementation complexity of cooperative game systems.","venue":"Sci. China Inf. Sci.","volume":"60","number":"11","pages":"112201:1-112201:18","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/XuZZ17","doi":"10.1007/S11432-017-9117-0","ee":"https://doi.org/10.1007/s11432-017-9117-0","url":"https://dblp.org/rec/journals/chinaf/XuZZ17"}, "url":"URL#2755418" }, { "@score":"1", "@id":"2755419", "info":{"authors":{"author":[{"@pid":"86/4142","text":"Jifeng Xuan"},{"@pid":"30/3790-1","text":"He Jiang 0001"},{"@pid":"29/2726-2","text":"Hongyu Zhang 0002"},{"@pid":"85/6484","text":"Zhilei Ren"}]},"title":"Developer recommendation on bug commenting: a ranking approach for the developer crowd.","venue":"Sci. China Inf. Sci.","volume":"60","number":"7","pages":"072105:1-072105:18","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/XuanJZR17","doi":"10.1007/S11432-015-0582-8","ee":"https://doi.org/10.1007/s11432-015-0582-8","url":"https://dblp.org/rec/journals/chinaf/XuanJZR17"}, "url":"URL#2755419" }, { "@score":"1", "@id":"2755420", "info":{"authors":{"author":[{"@pid":"16/10779","text":"Yuanyuan Xue"},{"@pid":"224/2164","text":"Zujun Wang"},{"@pid":"187/9815","text":"Minbo Liu"},{"@pid":"188/0079","text":"Baoping He"},{"@pid":"29/11073","text":"Zhibin Yao"},{"@pid":"187/9851","text":"Jiangkun Sheng"},{"@pid":"188/0107","text":"Wuying Ma"},{"@pid":"211/8437","text":"Guantao Dong"},{"@pid":"211/8614","text":"Junshan Jin"}]},"title":"Research on proton radiation effects on CMOS image sensors with experimental and particle transport simulation methods.","venue":"Sci. China Inf. Sci.","volume":"60","number":"12","pages":"120402:1-120402:3","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/XueWLHYSMDJ17","doi":"10.1007/S11432-017-9250-7","ee":"https://doi.org/10.1007/s11432-017-9250-7","url":"https://dblp.org/rec/journals/chinaf/XueWLHYSMDJ17"}, "url":"URL#2755420" }, { "@score":"1", "@id":"2755421", "info":{"authors":{"author":[{"@pid":"39/4919","text":"Yun Xue"},{"@pid":"29/4190-23","text":"Jun Zhang 0023"},{"@pid":"05/5369","text":"Xiqi Gao 0001"}]},"title":"Resource allocation for pilot-assisted massive MIMO transmission.","venue":"Sci. China Inf. Sci.","volume":"60","number":"4","pages":"42302","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/XueZG17","doi":"10.1007/S11432-016-0069-0","ee":"https://doi.org/10.1007/s11432-016-0069-0","url":"https://dblp.org/rec/journals/chinaf/XueZG17"}, "url":"URL#2755421" }, { "@score":"1", "@id":"2755422", "info":{"authors":{"author":[{"@pid":"163/6798","text":"Ling-Rong Xue"},{"@pid":"85/2139","text":"Weihai Zhang"},{"@pid":"79/2835","text":"Xue-Jun Xie"}]},"title":"Global practical tracking for stochastic time-delay nonlinear systems with SISS-like inverse dynamics.","venue":"Sci. China Inf. Sci.","volume":"60","number":"12","pages":"122201:1-122201:15","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/XueZX17","doi":"10.1007/S11432-016-0448-2","ee":"https://doi.org/10.1007/s11432-016-0448-2","url":"https://dblp.org/rec/journals/chinaf/XueZX17"}, "url":"URL#2755422" }, { "@score":"1", "@id":"2755423", "info":{"authors":{"author":[{"@pid":"67/8878","text":"Liping Yan"},{"@pid":"69/2205","text":"Yuanqing Xia"},{"@pid":"16/2148","text":"Mengyin Fu"}]},"title":"Optimal fusion estimation for stochastic systems with cross-correlated sensor noises.","venue":"Sci. China Inf. Sci.","volume":"60","number":"12","pages":"120205:1-120205:14","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/YanXF17","doi":"10.1007/S11432-017-9140-X","ee":"https://doi.org/10.1007/s11432-017-9140-x","url":"https://dblp.org/rec/journals/chinaf/YanXF17"}, "url":"URL#2755423" }, { "@score":"1", "@id":"2755424", "info":{"authors":{"author":[{"@pid":"46/999-25","text":"Bo Yang 0025"},{"@pid":"12/3780-1","text":"Xiaofeng Liao 0001"}]},"title":"Period analysis of the Logistic map for the finite field.","venue":"Sci. China Inf. Sci.","volume":"60","number":"2","pages":"22302","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/YangL17","doi":"10.1007/S11432-015-0756-1","ee":"https://doi.org/10.1007/s11432-015-0756-1","url":"https://dblp.org/rec/journals/chinaf/YangL17"}, "url":"URL#2755424" }, { "@score":"1", "@id":"2755425", "info":{"authors":{"author":[{"@pid":"67/1120","text":"Tao Yang"},{"@pid":"30/3943","text":"Wentao Liu"},{"@pid":"48/761-6","text":"Xue Chen 0006"},{"@pid":"197/1013","text":"Erkun Sun"},{"@pid":"146/5200","text":"Huitao Wang"},{"@pid":"265/1893","text":"Tai-Li Wang"},{"@pid":"83/5342-16","text":"Min Zhang 0016"},{"@pid":"84/6889-6","text":"Jie Zhang 0006"},{"@pid":"82/383","text":"Yuefeng Ji"}]},"title":"Modulation format independent blind polarization demultiplexing algorithms for elastic optical networks.","venue":"Sci. China Inf. Sci.","volume":"60","number":"2","pages":"22305","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/YangLCSWWZ0J17","doi":"10.1007/S11432-016-0321-X","ee":"https://doi.org/10.1007/s11432-016-0321-x","url":"https://dblp.org/rec/journals/chinaf/YangLCSWWZ0J17"}, "url":"URL#2755425" }, { "@score":"1", "@id":"2755426", "info":{"authors":{"author":[{"@pid":"212/6719","text":"Dingda Yang"},{"@pid":"50/6801","text":"Xiangwen Liao"},{"@pid":"98/917","text":"Huawei Shen"},{"@pid":"44/912","text":"Xueqi Cheng"},{"@pid":"86/2961","text":"Guolong Chen"}]},"title":"Relative influence maximization in competitive social networks.","venue":"Sci. China Inf. Sci.","volume":"60","number":"10","pages":"108101:1-108101:3","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/YangLSCC17","doi":"10.1007/S11432-016-9080-3","ee":"https://doi.org/10.1007/s11432-016-9080-3","url":"https://dblp.org/rec/journals/chinaf/YangLSCC17"}, "url":"URL#2755426" }, { "@score":"1", "@id":"2755427", "info":{"authors":{"author":[{"@pid":"62/5839-15","text":"Jing Yang 0015"},{"@pid":"14/6555","text":"Hongyan Wang"},{"@pid":"94/1825-5","text":"Jie Ding 0005"},{"@pid":"05/5369","text":"Xiqi Gao 0001"},{"@pid":"64/361-1","text":"Zhiguo Ding 0001"}]},"title":"Spectral and energy efficiency analysis for massive MIMO multi-pair two-way relaying networks under generalized power scaling.","venue":"Sci. China Inf. Sci.","volume":"60","number":"10","pages":"102303","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/YangWDGD17","doi":"10.1007/S11432-016-9007-2","ee":"https://doi.org/10.1007/s11432-016-9007-2","url":"https://dblp.org/rec/journals/chinaf/YangWDGD17"}, "url":"URL#2755427" }, { "@score":"1", "@id":"2755428", "info":{"authors":{"author":[{"@pid":"25/5712-8","text":"Guang Yang 0008"},{"@pid":"79/5620-1","text":"Ming Xiao 0001"}]},"title":"Blockage robust millimeter-wave networks.","venue":"Sci. China Inf. Sci.","volume":"60","number":"8","pages":"080307:1-080307:3","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/YangX17","doi":"10.1007/S11432-017-9147-0","ee":"https://doi.org/10.1007/s11432-017-9147-0","url":"https://dblp.org/rec/journals/chinaf/YangX17"}, "url":"URL#2755428" }, { "@score":"1", "@id":"2755429", "info":{"authors":{"author":[{"@pid":"200/2771","text":"Yongxing Yang"},{"@pid":"12/1198-33","text":"Jie Yang 0033"},{"@pid":"201/3438","text":"Zhongxing Zhang"},{"@pid":"06/1624","text":"Liyuan Liu"},{"@pid":"54/6021","text":"Nanjian Wu"}]},"title":"High-speed visual target tracking with mixed rotation invariant description and skipping searching.","venue":"Sci. China Inf. Sci.","volume":"60","number":"6","pages":"62401","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/YangYZLW17","doi":"10.1007/S11432-016-0037-0","ee":"https://doi.org/10.1007/s11432-016-0037-0","url":"https://dblp.org/rec/journals/chinaf/YangYZLW17"}, "url":"URL#2755429" }, { "@score":"1", "@id":"2755430", "info":{"authors":{"author":[{"@pid":"67/4051-5","text":"Wei Yin 0005"},{"@pid":"02/10299","text":"Zegang Ding"},{"@pid":"67/2405","text":"Xiaojun Lu"},{"@pid":"38/5267","text":"Yu Zhu"}]},"title":"Beam scan mode analysis and design for geosynchronous SAR.","venue":"Sci. China Inf. Sci.","volume":"60","number":"6","pages":"060306:1-060306:13","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/YinDLZ17","doi":"10.1007/S11432-016-9082-9","ee":"https://doi.org/10.1007/s11432-016-9082-9","url":"https://dblp.org/rec/journals/chinaf/YinDLZ17"}, "url":"URL#2755430" }, { "@score":"1", "@id":"2755431", "info":{"authors":{"author":[{"@pid":"20/9622-1","text":"Qiang Yin 0001"},{"@pid":"34/209","text":"Wen Hong"},{"@pid":"77/1513-2","text":"Yun Lin 0002"},{"@pid":"37/4190-37","text":"Yang Li 0037"}]},"title":"Soil moisture change estimation using InSAR coherence variations with preliminary laboratory measurements.","venue":"Sci. China Inf. Sci.","volume":"60","number":"2","pages":"29301","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/YinHLL17","doi":"10.1007/S11432-015-0839-1","ee":"https://doi.org/10.1007/s11432-015-0839-1","url":"https://dblp.org/rec/journals/chinaf/YinHLL17"}, "url":"URL#2755431" }, { "@score":"1", "@id":"2755432", "info":{"authors":{"author":[{"@pid":"89/2407-2","text":"Xiao Yu 0002"},{"@pid":"31/2088-2","text":"Lu Liu 0002"}]},"title":"Leader-follower formation of vehicles with velocity constraints and local coordinate frames.","venue":"Sci. China Inf. Sci.","volume":"60","number":"7","pages":"070206:1-070206:15","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/Yu017","doi":"10.1007/S11432-016-9094-1","ee":"https://doi.org/10.1007/s11432-016-9094-1","url":"https://dblp.org/rec/journals/chinaf/Yu017"}, "url":"URL#2755432" }, { "@score":"1", "@id":"2755433", "info":{"authors":{"author":[{"@pid":"22/4635-6","text":"Hai Yu 0006"},{"@pid":"29/1639-2","text":"Feng Shu 0002"},{"@pid":"159/4412","text":"You You"},{"@pid":"92/1375-20","text":"Jin Wang 0020"},{"@pid":"25/3327-5","text":"Tingting Liu 0005"},{"@pid":"17/1464-1","text":"Xiaohu You 0001"},{"@pid":"25/8858","text":"Jinhui Lu"},{"@pid":"75/2669-2","text":"Jianxin Wang 0002"},{"@pid":"99/5694","text":"Xiaohua Zhu"}]},"title":"Compressed sensing-based time-domain channel estimator for full-duplex OFDM systems with IQ-imbalances.","venue":"Sci. China Inf. Sci.","volume":"60","number":"8","pages":"82303","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/Yu0YWLYLWZ17","doi":"10.1007/S11432-016-0386-X","ee":"https://doi.org/10.1007/s11432-016-0386-x","url":"https://dblp.org/rec/journals/chinaf/Yu0YWLYLWZ17"}, "url":"URL#2755433" }, { "@score":"1", "@id":"2755434", "info":{"authors":{"author":[{"@pid":"68/6277","text":"Wenwu Yu"},{"@pid":"77/2845","text":"Jinde Cao"},{"@pid":"30/545","text":"Guanrong Chen"},{"@pid":"92/5008-1","text":"Wei Ren 0001"},{"@pid":"78/4802","text":"Xinghuo Yu 0001"}]},"title":"Special focus on distributed cooperative analysis, control and optimization in networks.","venue":"Sci. China Inf. Sci.","volume":"60","number":"11","pages":"110200:1","year":"2017","type":"Journal Articles","access":"open","key":"journals/chinaf/YuCC0Y17","doi":"10.1007/S11432-017-9236-8","ee":"https://doi.org/10.1007/s11432-017-9236-8","url":"https://dblp.org/rec/journals/chinaf/YuCC0Y17"}, "url":"URL#2755434" }, { "@score":"1", "@id":"2755435", "info":{"authors":{"author":[{"@pid":"46/2181","text":"Yang Yu"},{"@pid":"173/0241","text":"Tianyang Lei"},{"@pid":"31/6601-1","text":"Haibo Chen 0001"},{"@pid":"86/680","text":"Binyu Zang"}]},"title":"Characterizing and optimizing Java-based HPC applications on Intel many-core architecture.","venue":"Sci. China Inf. Sci.","volume":"60","number":"12","pages":"122106:1-122106:17","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/YuLCZ17","doi":"10.1007/S11432-015-0989-3","ee":"https://doi.org/10.1007/s11432-015-0989-3","url":"https://dblp.org/rec/journals/chinaf/YuLCZ17"}, "url":"URL#2755435" }, { "@score":"1", "@id":"2755436", "info":{"authors":{"author":[{"@pid":"68/6277","text":"Wenwu Yu"},{"@pid":"01/6368-6","text":"He Wang 0006"},{"@pid":"202/3231","text":"Huifen Hong"},{"@pid":"94/7131","text":"Guanghui Wen"}]},"title":"Distributed cooperative anti-disturbance control of multi-agent systems: an overview.","venue":"Sci. China Inf. Sci.","volume":"60","number":"11","pages":"110202:1-110202:14","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/YuWHW17","doi":"10.1007/S11432-017-9141-X","ee":"https://doi.org/10.1007/s11432-017-9141-x","url":"https://dblp.org/rec/journals/chinaf/YuWHW17"}, "url":"URL#2755436" }, { "@score":"1", "@id":"2755437", "info":{"authors":{"author":[{"@pid":"212/6759","text":"Yangguang Yu"},{"@pid":"38/64","text":"Zhiwen Zeng"},{"@pid":"34/9222","text":"Zhongkui Li"},{"@pid":"73/8714","text":"Xiangke Wang"},{"@pid":"78/6604","text":"Lincheng Shen"}]},"title":"Event-triggered encirclement control of multi-agent systems with bearing rigidity.","venue":"Sci. China Inf. Sci.","volume":"60","number":"11","pages":"110203:1-110203:18","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/YuZLWS17","doi":"10.1007/S11432-017-9109-9","ee":"https://doi.org/10.1007/s11432-017-9109-9","url":"https://dblp.org/rec/journals/chinaf/YuZLWS17"}, "url":"URL#2755437" }, { "@score":"1", "@id":"2755438", "info":{"authors":{"author":[{"@pid":"121/0929","text":"Yingying Yu"},{"@pid":"18/1649","text":"Zaichen Zhang"},{"@pid":"20/5233-1","text":"Liang Wu 0001"},{"@pid":"120/7223","text":"Jian Dang"}]},"title":"Upper bounds on the capacity for optical intensity channels with AWGN.","venue":"Sci. China Inf. Sci.","volume":"60","number":"2","pages":"22312","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/YuZWD17","doi":"10.1007/S11432-016-0452-X","ee":"https://doi.org/10.1007/s11432-016-0452-x","url":"https://dblp.org/rec/journals/chinaf/YuZWD17"}, "url":"URL#2755438" }, { "@score":"1", "@id":"2755439", "info":{"authors":{"author":[{"@pid":"40/10644","text":"Kai Yuan"},{"@pid":"54/518-1","text":"Yuhao Wang 0001"},{"@pid":"212/6737","text":"Linfang Shen"},{"@pid":"13/5350-1","text":"Ming Yao 0001"},{"@pid":"140/1172","text":"Xiaohua Deng"},{"@pid":"155/5190","text":"Fuhui Zhou"},{"@pid":"119/4216","text":"Zhou Chen"}]},"title":"Sub-THz signals' propagation model in hypersonic plasma sheath under different atmospheric conditions.","venue":"Sci. China Inf. Sci.","volume":"60","number":"11","pages":"113301:1-113301:11","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/YuanWSYDZC17","doi":"10.1007/S11432-017-9232-8","ee":"https://doi.org/10.1007/s11432-017-9232-8","url":"https://dblp.org/rec/journals/chinaf/YuanWSYDZC17"}, "url":"URL#2755439" }, { "@score":"1", "@id":"2755440", "info":{"authors":{"author":[{"@pid":"87/5293","text":"Guangrong Yue"},{"@pid":"67/187","text":"Zhiqiang Wang"},{"@pid":"09/3666","text":"Lei Chen"},{"@pid":"49/225-9","text":"Long Cheng 0009"},{"@pid":"175/1477","text":"Junlin Tang"},{"@pid":"195/3143","text":"Xianbing Zou"},{"@pid":"120/6940","text":"Yuan Zeng"},{"@pid":"00/10351","text":"Lianming Li"}]},"title":"Demonstration of 60 GHz millimeter-wave short-range wireless communication system at 3.5 Gbps over 5 m range.","venue":"Sci. China Inf. Sci.","volume":"60","number":"8","pages":"080306:1-080306:7","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/YueWCCTZZL17","doi":"10.1007/S11432-017-9059-Y","ee":"https://doi.org/10.1007/s11432-017-9059-y","url":"https://dblp.org/rec/journals/chinaf/YueWCCTZZL17"}, "url":"URL#2755440" }, { "@score":"1", "@id":"2755441", "info":{"authors":{"author":[{"@pid":"212/6812","text":"Hongzhou Yue"},{"@pid":"83/6530-1","text":"Yuqing Zhang 0001"},{"@pid":"38/1956","text":"Wenjie Wang"},{"@pid":"66/1298","text":"Qixu Liu"}]},"title":"Driving Android apps to trigger target API invocations based on activity and GUI filtering.","venue":"Sci. China Inf. Sci.","volume":"60","number":"7","pages":"78102","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/YueZWL17","doi":"10.1007/S11432-015-0825-3","ee":"https://doi.org/10.1007/s11432-015-0825-3","url":"https://dblp.org/rec/journals/chinaf/YueZWL17"}, "url":"URL#2755441" }, { "@score":"1", "@id":"2755442", "info":{"authors":{"author":[{"@pid":"62/6760","text":"Xia Zeng"},{"@pid":"36/5376","text":"Wang Lin"},{"@pid":"68/3884","text":"Zhengfeng Yang"},{"@pid":"56/2636","text":"Zhenbing Zeng"}]},"title":"Linear invariant generation for verification of nonlinear hybrid systems via conservative approximation.","venue":"Sci. China Inf. Sci.","volume":"60","number":"3","pages":"39102","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/ZengLYZ17","doi":"10.1007/S11432-015-0980-7","ee":"https://doi.org/10.1007/s11432-015-0980-7","url":"https://dblp.org/rec/journals/chinaf/ZengLYZ17"}, "url":"URL#2755442" }, { "@score":"1", "@id":"2755443", "info":{"authors":{"author":[{"@pid":"84/19-4","text":"Zhiyi Zhang 0004"},{"@pid":"86/541-1","text":"Zhenyu Chen 0001"},{"@pid":"19/9308","text":"Ruizhi Gao"},{"@pid":"w/WEricWong","text":"W. Eric Wong"},{"@pid":"46/5742","text":"Baowen Xu"}]},"title":"An empirical study on constraint optimization techniques for test generation.","venue":"Sci. China Inf. Sci.","volume":"60","number":"1","pages":"12105","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/ZhangCGWX17","doi":"10.1007/S11432-015-0450-5","ee":"https://doi.org/10.1007/s11432-015-0450-5","url":"https://dblp.org/rec/journals/chinaf/ZhangCGWX17"}, "url":"URL#2755443" }, { "@score":"1", "@id":"2755444", "info":{"authors":{"author":[{"@pid":"139/5876-2","text":"Yuhao Zhang 0002"},{"@pid":"79/940","text":"Qimei Cui"},{"@pid":"46/2005-22","text":"Ning Wang 0022"},{"@pid":"129/1292","text":"Yanzhao Hou"},{"@pid":"128/8010","text":"Weiliang Xie"}]},"title":"Energy-efficient resource allocation for hybrid bursty services in multi-relay OFDM networks.","venue":"Sci. China Inf. Sci.","volume":"60","number":"10","pages":"102304:1-102304:18","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/ZhangCWHX17","doi":"10.1007/S11432-016-9012-7","ee":"https://doi.org/10.1007/s11432-016-9012-7","url":"https://dblp.org/rec/journals/chinaf/ZhangCWHX17"}, "url":"URL#2755444" }, { "@score":"1", "@id":"2755445", "info":{"authors":{"author":[{"@pid":"27/5832-4","text":"Guoqing Zhang 0004"},{"@pid":"212/6744","text":"Yingjie Deng"},{"@pid":"24/3562-4","text":"Weidong Zhang 0004"},{"@pid":"198/4410","text":"Zhijian Sun"}]},"title":"Robust neural output-feedback stabilization for stochastic nonlinear process with time-varying delay and unknown dead zone.","venue":"Sci. China Inf. Sci.","volume":"60","number":"12","pages":"120202:1-120202:13","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/ZhangDZS17","doi":"10.1007/S11432-017-9113-8","ee":"https://doi.org/10.1007/s11432-017-9113-8","url":"https://dblp.org/rec/journals/chinaf/ZhangDZS17"}, "url":"URL#2755445" }, { "@score":"1", "@id":"2755446", "info":{"authors":{"author":[{"@pid":"35/7139","text":"Jiangyan Zhang"},{"@pid":"78/4732","text":"Jinwu Gao"},{"@pid":"15/7142","text":"Tielong Shen"}]},"title":"Adaptive idling control scheme and its experimental validation for gasoline engines.","venue":"Sci. China Inf. Sci.","volume":"60","number":"2","pages":"22203","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/ZhangGS17","doi":"10.1007/S11432-016-0296-3","ee":"https://doi.org/10.1007/s11432-016-0296-3","url":"https://dblp.org/rec/journals/chinaf/ZhangGS17"}, "url":"URL#2755446" }, { "@score":"1", "@id":"2755447", "info":{"authors":{"author":[{"@pid":"120/1297","text":"Jinxin Zhang"},{"@pid":"03/4098","text":"Hongxia Guo"},{"@pid":"43/7832","text":"Fengqi Zhang"},{"@pid":"160/7413","text":"Chaohui He"},{"@pid":"87/3555","text":"Pei Li"},{"@pid":"02/2408","text":"Yunyi Yan"},{"@pid":"39/721","text":"Hui Wang"},{"@pid":"80/1987","text":"Linxia Zhang"}]},"title":"Heavy ion micro-beam study of single-event transient (SET) in SiGe heterjunction bipolar transistor.","venue":"Sci. China Inf. Sci.","volume":"60","number":"12","pages":"120404:1-120404:3","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/ZhangGZHLYWZ17","doi":"10.1007/S11432-017-9249-6","ee":"https://doi.org/10.1007/s11432-017-9249-6","url":"https://dblp.org/rec/journals/chinaf/ZhangGZHLYWZ17"}, "url":"URL#2755447" }, { "@score":"1", "@id":"2755448", "info":{"authors":{"author":[{"@pid":"91/4353","text":"Xiang Zhang"},{"@pid":"45/10479","text":"Yiyong Huang"},{"@pid":"61/538","text":"Xiaoqian Chen"}]},"title":"Analysis and design of parameters in soft docking of micro/small satellites.","venue":"Sci. China Inf. Sci.","volume":"60","number":"5","pages":"050204:1-050204:14","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/ZhangHC17","doi":"10.1007/S11432-016-9034-7","ee":"https://doi.org/10.1007/s11432-016-9034-7","url":"https://dblp.org/rec/journals/chinaf/ZhangHC17"}, "url":"URL#2755448" }, { "@score":"1", "@id":"2755449", "info":{"authors":{"author":[{"@pid":"91/1701","text":"Guoyan Zhang"},{"@pid":"25/7479","text":"Meicheng Liu"}]},"title":"A distinguisher on PRESENT-like permutations with application to SPONGENT.","venue":"Sci. China Inf. Sci.","volume":"60","number":"7","pages":"72101","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/ZhangL17","doi":"10.1007/S11432-016-0165-6","ee":"https://doi.org/10.1007/s11432-016-0165-6","url":"https://dblp.org/rec/journals/chinaf/ZhangL17"}, "url":"URL#2755449" }, { "@score":"1", "@id":"2755450", "info":{"authors":{"author":[{"@pid":"174/0351","text":"Chuanchao Zhang"},{"@pid":"16/3621-7","text":"Juan Liu 0007"},{"@pid":"131/0059","text":"Qianqian Shi"},{"@pid":"63/3737-3","text":"Tao Zeng 0003"},{"@pid":"83/4411","text":"Luonan Chen"}]},"title":"Differential function analysis: identifying structure and activation variations in dysregulated pathways.","venue":"Sci. China Inf. Sci.","volume":"60","number":"1","pages":"12108","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/ZhangLSZC17","doi":"10.1007/S11432-016-0030-6","ee":"https://doi.org/10.1007/s11432-016-0030-6","url":"https://dblp.org/rec/journals/chinaf/ZhangLSZC17"}, "url":"URL#2755450" }, { "@score":"1", "@id":"2755451", "info":{"authors":{"author":[{"@pid":"73/7687","text":"Wenchang Zhang"},{"@pid":"02/2737-1","text":"Fuchun Sun 0001"},{"@pid":"50/6004","text":"Hang Wu"},{"@pid":"178/4450","text":"Haolin Yang"}]},"title":"A framework for the fusion of visual and tactile modalities for improving robot perception.","venue":"Sci. China Inf. Sci.","volume":"60","number":"1","pages":"12201","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/ZhangSWY17","doi":"10.1007/S11432-016-0158-2","ee":"https://doi.org/10.1007/s11432-016-0158-2","url":"https://dblp.org/rec/journals/chinaf/ZhangSWY17"}, "url":"URL#2755451" }, { "@score":"1", "@id":"2755452", "info":{"authors":{"author":[{"@pid":"183/0518","text":"Tian-Ye Zhang"},{"@pid":"183/0293","text":"Xu-Meng Wang"},{"@pid":"198/2374","text":"Zongzhuang Li"},{"@pid":"172/3045","text":"Fangzhou Guo"},{"@pid":"10/7484","text":"Yuxin Ma"},{"@pid":"c/WeiChen1","text":"Wei Chen 0001"}]},"title":"A survey of network anomaly visualization.","venue":"Sci. China Inf. Sci.","volume":"60","number":"12","pages":"121101:1-121101:17","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/ZhangWLGM017","doi":"10.1007/S11432-016-0428-2","ee":"https://doi.org/10.1007/s11432-016-0428-2","url":"https://dblp.org/rec/journals/chinaf/ZhangWLGM017"}, "url":"URL#2755452" }, { "@score":"1", "@id":"2755453", "info":{"authors":{"author":[{"@pid":"76/7247","text":"Xuefei Zhang"},{"@pid":"33/4822-10","text":"Yue Wang 0010"},{"@pid":"08/4252","text":"Ruiqi Wang"},{"@pid":"129/1292","text":"Yanzhao Hou"},{"@pid":"10/3366","text":"Da Wang"}]},"title":"Group-based joint signaling and data resource allocation in MTC-underlaid cellular networks.","venue":"Sci. China Inf. Sci.","volume":"60","number":"10","pages":"100304:1-100304:13","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/ZhangWWHW17","doi":"10.1007/S11432-017-9162-9","ee":"https://doi.org/10.1007/s11432-017-9162-9","url":"https://dblp.org/rec/journals/chinaf/ZhangWWHW17"}, "url":"URL#2755453" }, { "@score":"1", "@id":"2755454", "info":{"authors":{"author":[{"@pid":"06/6785-26","text":"Yang Zhang 0026"},{"@pid":"02/661","text":"Huaimin Wang"},{"@pid":"14/3946","text":"Gang Yin"},{"@pid":"12/5838-6","text":"Tao Wang 0006"},{"@pid":"55/2008-1","text":"Yue Yu 0001"}]},"title":"Social media in GitHub: the role of @-mention in assisting software development.","venue":"Sci. China Inf. Sci.","volume":"60","number":"3","pages":"32102","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/ZhangWYWY17","doi":"10.1007/S11432-015-1024-6","ee":"https://doi.org/10.1007/s11432-015-1024-6","url":"https://dblp.org/rec/journals/chinaf/ZhangWYWY17"}, "url":"URL#2755454" }, { "@score":"1", "@id":"2755455", "info":{"authors":{"author":[{"@pid":"126/1737","text":"Tianxian Zhang"},{"@pid":"83/4637-1","text":"Xiang-Gen Xia 0001"},{"@pid":"80/7726","text":"Lingjiang Kong"}]},"title":"CP-based MIMO OFDM radar IRCI free range reconstruction using real orthogonal designs.","venue":"Sci. China Inf. Sci.","volume":"60","number":"2","pages":"22301","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/ZhangXK17","doi":"10.1007/S11432-015-0979-5","ee":"https://doi.org/10.1007/s11432-015-0979-5","url":"https://dblp.org/rec/journals/chinaf/ZhangXK17"}, "url":"URL#2755455" }, { "@score":"1", "@id":"2755456", "info":{"authors":{"author":[{"@pid":"21/3626-10","text":"Fan Zhang 0010"},{"@pid":"66/10058","text":"Xinjie Zhao 0001"},{"@pid":"20/6417","text":"Wei He"},{"@pid":"94/7837","text":"Shivam Bhasin"},{"@pid":"73/5583","text":"Shize Guo"}]},"title":"Low-cost design of stealthy hardware trojan for bit-level fault attacks on block ciphers.","venue":"Sci. China Inf. Sci.","volume":"60","number":"4","pages":"48102","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/ZhangZHBG17","doi":"10.1007/S11432-016-0233-0","ee":"https://doi.org/10.1007/s11432-016-0233-0","url":"https://dblp.org/rec/journals/chinaf/ZhangZHBG17"}, "url":"URL#2755456" }, { "@score":"1", "@id":"2755457", "info":{"authors":{"author":[{"@pid":"04/1262-3","text":"Jiliang Zhang 0003"},{"@pid":"39/6153-10","text":"Hui Zhao 0010"},{"@pid":"99/7710","text":"Gaofeng Pan"}]},"title":"Secrecy outage analysis for underlay cognitive radio networks over correlated channels.","venue":"Sci. China Inf. Sci.","volume":"60","number":"2","pages":"22307","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/ZhangZP17","doi":"10.1007/S11432-015-0973-8","ee":"https://doi.org/10.1007/s11432-015-0973-8","url":"https://dblp.org/rec/journals/chinaf/ZhangZP17"}, "url":"URL#2755457" }, { "@score":"1", "@id":"2755458", "info":{"authors":{"author":[{"@pid":"93/3598","text":"Cheng Zhao"},{"@pid":"64/1967-1","text":"Lei Guo 0001"}]},"title":"PID controller design for second order nonlinear uncertain systems.","venue":"Sci. China Inf. Sci.","volume":"60","number":"2","pages":"22201","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/ZhaoG17","doi":"10.1007/S11432-016-0879-3","ee":"https://doi.org/10.1007/s11432-016-0879-3","url":"https://dblp.org/rec/journals/chinaf/ZhaoG17"}, "url":"URL#2755458" }, { "@score":"1", "@id":"2755459", "info":{"authors":{"author":[{"@pid":"05/752","text":"Xiaofan Zhao"},{"@pid":"212/6750","text":"Maliya Heini"},{"@pid":"212/6776","text":"Momin Sailai"},{"@pid":"212/6782","text":"Abuduwayiti Aierken"},{"@pid":"67/398","text":"Qi Guo"},{"@pid":"212/6739","text":"Yudong Li"},{"@pid":"212/6747","text":"Shulong Lu"},{"@pid":"194/2590","text":"Pan Dai"},{"@pid":"09/1103","text":"Yuanyuan Wu"},{"@pid":"25/1150","text":"Ming Tan"}]},"title":"1-MeV electron irradiation effects on InGaAsP/InGaAs double-junction solar cell and its component subcells.","venue":"Sci. China Inf. Sci.","volume":"60","number":"12","pages":"120403:1-120403:3","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/ZhaoHSAGLLDWT17","doi":"10.1007/S11432-017-9248-2","ee":"https://doi.org/10.1007/s11432-017-9248-2","url":"https://dblp.org/rec/journals/chinaf/ZhaoHSAGLLDWT17"}, "url":"URL#2755459" }, { "@score":"1", "@id":"2755460", "info":{"authors":{"author":[{"@pid":"38/4524","text":"Yanyan Zhao"},{"@pid":"86/5934","text":"Bing Qin 0001"},{"@pid":"52/5150-1","text":"Ting Liu 0001"}]},"title":"Encoding syntactic representations with a neural network for sentiment collocation extraction.","venue":"Sci. China Inf. Sci.","volume":"60","number":"11","pages":"110101:1-110101:12","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/ZhaoQL17","doi":"10.1007/S11432-016-9229-Y","ee":"https://doi.org/10.1007/s11432-016-9229-y","url":"https://dblp.org/rec/journals/chinaf/ZhaoQL17"}, "url":"URL#2755460" }, { "@score":"1", "@id":"2755461", "info":{"authors":{"author":[{"@pid":"51/4138","text":"Yi Zhao"},{"@pid":"46/999-3","text":"Bo Yang 0003"}]},"title":"Direct constructions and proofs for CCA secure (LR)IBE with dual system encryption.","venue":"Sci. China Inf. Sci.","volume":"60","number":"11","pages":"119104:1-119104:3","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/ZhaoY17","doi":"10.1007/S11432-016-9204-6","ee":"https://doi.org/10.1007/s11432-016-9204-6","url":"https://dblp.org/rec/journals/chinaf/ZhaoY17"}, "url":"URL#2755461" }, { "@score":"1", "@id":"2755462", "info":{"authors":{"author":[{"@pid":"196/6891","text":"Huakai Zhao"},{"@pid":"41/4482-1","text":"Shenghao Yang 0001"},{"@pid":"17/4315","text":"Guinian Feng"}]},"title":"Fast degree-distribution optimization for BATS codes.","venue":"Sci. China Inf. Sci.","volume":"60","number":"10","pages":"102301:1-102301:15","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/ZhaoYF17","doi":"10.1007/S11432-016-9011-8","ee":"https://doi.org/10.1007/s11432-016-9011-8","url":"https://dblp.org/rec/journals/chinaf/ZhaoYF17"}, "url":"URL#2755462" }, { "@score":"1", "@id":"2755463", "info":{"authors":{"author":[{"@pid":"23/3168-2","text":"Jie Zhao 0002"},{"@pid":"78/1485","text":"Rongcai Zhao"}]},"title":"Identifying superword level parallelism with extended directed dependence graph reachability.","venue":"Sci. China Inf. Sci.","volume":"60","number":"1","pages":"19103","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/ZhaoZ17","doi":"10.1007/S11432-015-0163-7","ee":"https://doi.org/10.1007/s11432-015-0163-7","url":"https://dblp.org/rec/journals/chinaf/ZhaoZ17"}, "url":"URL#2755463" }, { "@score":"1", "@id":"2755464", "info":{"authors":{"author":[{"@pid":"167/3132","text":"Qinglan Zhao"},{"@pid":"94/3077-1","text":"Dong Zheng 0001"}]},"title":"Two classes of rotation symmetric semi-bent functions.","venue":"Sci. China Inf. Sci.","volume":"60","number":"6","pages":"068103:1-068103:3","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/ZhaoZ17a","doi":"10.1007/S11432-016-9036-Y","ee":"https://doi.org/10.1007/s11432-016-9036-y","url":"https://dblp.org/rec/journals/chinaf/ZhaoZ17a"}, "url":"URL#2755464" }, { "@score":"1", "@id":"2755465", "info":{"authors":{"author":[{"@pid":"212/6772","text":"Wanji Zheng"},{"@pid":"28/441-5","text":"Jun Hu 0005"},{"@pid":"10/4661","text":"Wei Zhang"},{"@pid":"09/933","text":"Changjiang Yang"},{"@pid":"47/3951-1","text":"Zhiwei Li 0001"},{"@pid":"03/5337-1","text":"Jianjun Zhu 0001"}]},"title":"Potential of geosynchronous SAR interferometric measurements in estimating three-dimensional surface displacements.","venue":"Sci. China Inf. Sci.","volume":"60","number":"6","pages":"060304:1-060304:14","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/ZhengHZYLZ17","doi":"10.1007/S11432-016-9079-8","ee":"https://doi.org/10.1007/s11432-016-9079-8","url":"https://dblp.org/rec/journals/chinaf/ZhengHZYLZ17"}, "url":"URL#2755465" }, { "@score":"1", "@id":"2755466", "info":{"authors":{"author":[{"@pid":"67/4433","text":"Fu-Chun Zheng"},{"@pid":"99/6515-1","text":"Gang Wu 0001"}]},"title":"Special focus on millimeter wave communications techniques and devices for 5G - Editorial.","venue":"Sci. China Inf. Sci.","volume":"60","number":"8","pages":"080300:1-080300:2","year":"2017","type":"Journal Articles","access":"open","key":"journals/chinaf/ZhengW17","doi":"10.1007/S11432-017-9156-8","ee":"https://doi.org/10.1007/s11432-017-9156-8","url":"https://dblp.org/rec/journals/chinaf/ZhengW17"}, "url":"URL#2755466" }, { "@score":"1", "@id":"2755467", "info":{"authors":{"author":[{"@pid":"01/1901-22","text":"Yi Zhou 0022"},{"@pid":"07/2397","text":"Fazhi He"},{"@pid":"87/10187","text":"Yimin Qiu"}]},"title":"Dynamic strategy based parallel ant colony optimization on GPUs for TSPs.","venue":"Sci. China Inf. Sci.","volume":"60","number":"6","pages":"68102","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/ZhouHQ17","doi":"10.1007/S11432-015-0594-2","ee":"https://doi.org/10.1007/s11432-015-0594-2","url":"https://dblp.org/rec/journals/chinaf/ZhouHQ17"}, "url":"URL#2755467" }, { "@score":"1", "@id":"2755468", "info":{"authors":{"author":[{"@pid":"88/123","text":"Qian Zhou"},{"@pid":"79/4311","text":"Yan Han"},{"@pid":"93/227","text":"Shifeng Zhang"},{"@pid":"26/4784","text":"Xiaoxia Han"},{"@pid":"39/2936-8","text":"Lu Jie 0008"},{"@pid":"96/2421","text":"Ray C. C. Cheung"},{"@pid":"212/6765","text":"Guangtao Feng"}]},"title":"A low power V-band LC VCO with high Q varactor technique in 40 nm CMOS process.","venue":"Sci. China Inf. Sci.","volume":"60","number":"8","pages":"89401","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/ZhouHZHJCF17","doi":"10.1007/S11432-016-0301-3","ee":"https://doi.org/10.1007/s11432-016-0301-3","url":"https://dblp.org/rec/journals/chinaf/ZhouHZHJCF17"}, "url":"URL#2755468" }, { "@score":"1", "@id":"2755469", "info":{"authors":{"author":[{"@pid":"64/10047","text":"Lai Zhou"},{"@pid":"31/5990","text":"Limin Xiao"},{"@pid":"90/5587-5","text":"Zhi Yang 0005"},{"@pid":"153/2952-1","text":"Jiahui Li 0001"},{"@pid":"14/3321","text":"Jin Lian"},{"@pid":"76/5271","text":"Shidong Zhou"}]},"title":"Path loss model based on cluster at 28 GHz in the indoor and outdoor environments.","venue":"Sci. China Inf. Sci.","volume":"60","number":"8","pages":"080302:1-080302:11","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/ZhouXYLLZ17","doi":"10.1007/S11432-017-9127-6","ee":"https://doi.org/10.1007/s11432-017-9127-6","url":"https://dblp.org/rec/journals/chinaf/ZhouXYLLZ17"}, "url":"URL#2755469" }, { "@score":"1", "@id":"2755470", "info":{"authors":{"author":[{"@pid":"212/6752","text":"Jialing Zhou"},{"@pid":"158/6680","text":"Jianying Yang"},{"@pid":"34/9222","text":"Zhongkui Li"}]},"title":"Simultaneous attack of a stationary target using multiple missiles: a consensus-based approach.","venue":"Sci. China Inf. Sci.","volume":"60","number":"7","pages":"070205:1-070205:14","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/ZhouYL17","doi":"10.1007/S11432-016-9089-7","ee":"https://doi.org/10.1007/s11432-016-9089-7","url":"https://dblp.org/rec/journals/chinaf/ZhouYL17"}, "url":"URL#2755470" }, { "@score":"1", "@id":"2755471", "info":{"authors":{"author":[{"@pid":"99/5892","text":"Cheng Zhu"},{"@pid":"64/5666-33","text":"Lei Zhang 0033"},{"@pid":"212/6816","text":"Jinwen Geng"},{"@pid":"212/6780","text":"Xizeng Shi"},{"@pid":"04/4991","text":"He Qian"}]},"title":"A micro-array bio detection system based on a GMR sensor with 50-ppm sensitivity.","venue":"Sci. China Inf. Sci.","volume":"60","number":"8","pages":"082403:1-082403:9","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/Zhu0GSQ17","doi":"10.1007/S11432-016-0645-2","ee":"https://doi.org/10.1007/s11432-016-0645-2","url":"https://dblp.org/rec/journals/chinaf/Zhu0GSQ17"}, "url":"URL#2755471" }, { "@score":"1", "@id":"2755472", "info":{"authors":{"author":{"@pid":"20/6325","text":"Huafei Zhu"}},"title":"An efficient protocol for secure multicast key distribution in the presence of adaptive adversaries.","venue":"Sci. China Inf. Sci.","volume":"60","number":"5","pages":"52109","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/Zhu17","doi":"10.1007/S11432-014-0911-8","ee":"https://doi.org/10.1007/s11432-014-0911-8","url":"https://dblp.org/rec/journals/chinaf/Zhu17"}, "url":"URL#2755472" }, { "@score":"1", "@id":"2755473", "info":{"authors":{"author":[{"@pid":"26/2546","text":"Liehuang Zhu"},{"@pid":"43/6744","text":"Mingxin Chen"},{"@pid":"43/6524-1","text":"Zijian Zhang 0001"},{"@pid":"187/5817","text":"Ange Tong"},{"@pid":"54/1474","text":"Chen Xu"}]},"title":"A privacy-preserving video subscription scheme with the limitation of expire date.","venue":"Sci. China Inf. Sci.","volume":"60","number":"9","pages":"98101","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/ZhuCZTX17","doi":"10.1007/S11432-016-0305-5","ee":"https://doi.org/10.1007/s11432-016-0305-5","url":"https://dblp.org/rec/journals/chinaf/ZhuCZTX17"}, "url":"URL#2755473" }, { "@score":"1", "@id":"2755474", "info":{"authors":{"author":[{"@pid":"198/5661","text":"Xiaoge Zhu"},{"@pid":"139/7853","text":"DanYu Wu"},{"@pid":"72/5749","text":"Lei Zhou"},{"@pid":"205/7812","text":"Yinkun Huang"},{"@pid":"18/1539","text":"Jin Wu"},{"@pid":"98/738","text":"Xinyu Liu"}]},"title":"A four-channel time-interleaved 30-GS/s 6-bit ADC in 0.18 μm SiGe BiCMOS technology.","venue":"Sci. China Inf. Sci.","volume":"60","number":"12","pages":"129401","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/ZhuWZHWL17","doi":"10.1007/S11432-016-0711-Y","ee":"https://doi.org/10.1007/s11432-016-0711-y","url":"https://dblp.org/rec/journals/chinaf/ZhuWZHWL17"}, "url":"URL#2755474" }, { "@score":"1", "@id":"2755475", "info":{"authors":{"author":[{"@pid":"71/4410-4","text":"Bing Zhu 0004"},{"@pid":"40/2499","text":"Lihua Xie"},{"@pid":"142/2623","text":"Duo Han"},{"@pid":"16/8083-1","text":"Xiangyu Meng 0001"},{"@pid":"59/2489","text":"Rodney Teo"}]},"title":"A survey on recent progress in control of swarm systems.","venue":"Sci. China Inf. Sci.","volume":"60","number":"7","pages":"070201:1-070201:24","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/ZhuXHMT17","doi":"10.1007/S11432-016-9088-2","ee":"https://doi.org/10.1007/s11432-016-9088-2","url":"https://dblp.org/rec/journals/chinaf/ZhuXHMT17"}, "url":"URL#2755475" }, { "@score":"1", "@id":"2755476", "info":{"authors":{"author":[{"@pid":"203/6837","text":"Yin Zhuang"},{"@pid":"212/6778","text":"Dechun Guo"},{"@pid":"54/2335","text":"He Chen"},{"@pid":"46/9236","text":"Fukun Bi"},{"@pid":"93/5262-3","text":"Long Ma 0003"},{"@pid":"166/4057","text":"Nouman Qadeer Soomro"}]},"title":"A novel sea-land segmentation based on integral image reconstruction in MWIR images.","venue":"Sci. China Inf. Sci.","volume":"60","number":"6","pages":"69302","year":"2017","type":"Journal Articles","access":"closed","key":"journals/chinaf/ZhuangGCBMS17","doi":"10.1007/S11432-016-0410-3","ee":"https://doi.org/10.1007/s11432-016-0410-3","url":"https://dblp.org/rec/journals/chinaf/ZhuangGCBMS17"}, "url":"URL#2755476" } ] } } } )