default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Exact matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 76 matches
- 2024
- Gaoshan Feng, Wenlin Qin, Enyong Xu, Zijun Sun, Xiangsuo Fan, Huajin Chen:
Infrared Object Detection Based on Improved Twist Tensor Model. IEEE Access 12: 45026-45043 (2024) - Hongfei Dai, Yufeng Chen, Wenlin Li, Fangmin Wang, Guan Wang, Zhongwang Pang, Bo Wang:
A Tampering Risk of Fiber-Based Frequency Synchronization Networks. IEEE Trans. Instrum. Meas. 73: 1-8 (2024) - Wenlin Li, Yufeng Chen, Hongfei Dai, Fangmin Wang, Bo Wang:
Phase Noise Control of the Fiber-Based Frequency Dissemination System. IEEE Trans. Instrum. Meas. 73: 1-7 (2024) - Zhixian Zhang, Weigen Chen, Kejie Wu, Hong Liu, Xingang Chen, Tianyan Jiang, Zhipeng Ma, Wenlin Feng:
Novel Approach for Partial Discharge Localization Based on Fiber-Optic F-P Sensing Array and Modified TDOA in a 110-kV Transformer. IEEE Trans. Instrum. Meas. 73: 1-11 (2024) - Weiqiong Cao, Hua Chen, Jingyi Feng, Linmin Fan, Wenling Wu:
Lattice-based Fault Attacks against ECMQV. IACR Cryptol. ePrint Arch. 2024: 882 (2024) - 2023
- Yufeng Chen, Hongfei Dai, Wenlin Li, Fangmin Wang, Bo Wang, Lijun Wang:
Time Reversal Enabled Fiber-Optic Time Synchronization. IEEE Trans. Instrum. Meas. 72: 1-8 (2023) - Shuyi Xie, Wenlin Yao, Yong Dai, Shaobo Wang, Donlin Zhou, Lifeng Jin, Xinhua Feng, Pengzhi Wei, Yujie Lin, Zhichao Hu, Dong Yu, Zhengyou Zhang, Jing Nie, Yuhong Liu:
TencentLLMEval: A Hierarchical Evaluation of Real-World Capabilities for Human-Aligned LLMs. CoRR abs/2311.05374 (2023) - Dengguo Feng, Lin Jiao, Yonglin Hao, Qunxiong Zheng, Wenling Wu, Wenfeng Qi, Lei Zhang, Liting Zhang, Siwei Sun, Tian Tian:
LOL: A Highly Flexible Framework for Designing Stream Ciphers. IACR Cryptol. ePrint Arch. 2023: 1235 (2023) - 2022
- Qingyu Li, Keren Dai, Wenling Zhang, Xiaofeng Wang, Zheng You, He Zhang:
Reprint of: Triboelectric nanogenerator-based wearable electronic devices and systems: Toward informatization and intelligence. Digit. Signal Process. 125: 103570 (2022) - Chunguang Lu, Weike Feng, Wenling Li, Yongshun Zhang, Yiduo Guo:
An adaptive IMM filter for jump Markov systems with inaccurate noise covariances in the presence of missing measurements. Digit. Signal Process. 127: 103529 (2022) - 2021
- Qingyu Li, Keren Dai, Wenling Zhang, Xiaofeng Wang, Zheng You, He Zhang:
Triboelectric nanogenerator-based wearable electronic devices and systems: Toward informatization and intelligence. Digit. Signal Process. 113: 103038 (2021) - 2020
- Wenlin Jiang, Liangliang Li, Zhengwen Tu, Yuming Feng:
Lagrange Stability for Delayed-Impulses in Discrete-Time Cohen-Grossberg Neural Networks with Delays. Neural Process. Lett. 51(2): 1835-1848 (2020) - Hengbo Hu, Wenlin Zhang, Li Feng, Ziwei Wei, Qi Chen:
Attention-Based End-to-End Keywords Spotting. ICCPR 2020: 479-483 - 2019
- Wenlin Jiang, Liangliang Li, Zhengwen Tu, Yuming Feng:
Exponential Lagrange stability for impulses in discrete-time delayed recurrent neural networks. Int. J. Syst. Sci. 50(1): 50-59 (2019) - 2018
- Weiqiong Cao, Hua Chen, Jingyi Feng, Limin Fan, Wenling Wu:
Lattice-Based Fault Attacks Against ECMQV. COSADE 2018: 101-116 - 2017
- Wenlin Li, Fengyang Zhang, Chong Li, He-Shan Song:
Quantum synchronization in a star-type cavity QED network. Commun. Nonlinear Sci. Numer. Simul. 42: 121-131 (2017) - Yongzhuang Wei, Enes Pasalic, Fengrong Zhang, Wenling Wu, Cheng-Xiang Wang:
New constructions of resilient functions with strictly almost optimal nonlinearity via non-overlap spectra functions. Inf. Sci. 415: 377-396 (2017) - Wenlin Meng, Wenfeng Zhu, Chi Zhang, Junrong Liu, Zheng Guo, Dawu Gu, Wei Fan, Haifeng Zhang, Yidong Yuan:
An Implementation of Trojan Side-Channel with a Masking Scheme. CIS 2017: 566-569 - 2016
- Yanfeng Wang, Wenling Wu:
New criterion for diffusion property and applications to improved GFS and EGFN. Des. Codes Cryptogr. 81(3): 393-412 (2016) - Si Gao, Hua Chen, Wenling Wu, Limin Fan, Jingyi Feng, Xiangliang Ma:
Linear Regression Attack with F-test: A New SCARE Technique for Secret Block Ciphers. CANS 2016: 3-18 - Yanfeng Wang, Wenling Wu:
New Observations on Piccolo Block Cipher. CT-RSA 2016: 378-393 - 2015
- Xiao-Li Yu, Wen-Ling Wu, Zhen-Qing Shi, Jian Zhang, Lei Zhang, Yanfeng Wang:
Zero-Correlation Linear Cryptanalysis of Reduced-Round SIMON. J. Comput. Sci. Technol. 30(6): 1358-1369 (2015) - Hadi Soleimany, Céline Blondeau, Xiaoli Yu, Wenling Wu, Kaisa Nyberg, Huiling Zhang, Lei Zhang, Yanfeng Wang:
Reflection Cryptanalysis of PRINCE-Like Ciphers. J. Cryptol. 28(3): 718-744 (2015) - Weiqiong Cao, Jingyi Feng, Shaofeng Zhu, Hua Chen, Wenling Wu, Xucang Han, Xiaoguang Zheng:
Practical Lattice-Based Fault Attack and Countermeasure on SM2 Signature Algorithm. ICICS 2015: 62-70 - Weiqiong Cao, Jingyi Feng, Hua Chen, Shaofeng Zhu, Wenling Wu, Xucang Han, Xiaoguang Zheng:
Two Lattice-Based Differential Fault Attacks Against ECDSA with wNAF Algorithm. ICISC 2015: 297-313 - Huiling Zhang, Wenling Wu, Yanfeng Wang:
Integral Attack Against Bit-Oriented Block Ciphers. ICISC 2015: 102-118 - 2014
- Xinxin Gong, Bin Zhang, Wenling Wu, Dengguo Feng:
Computing Walsh coefficients from the algebraic normal form of a Boolean function. Cryptogr. Commun. 6(4): 335-358 (2014) - Yanfeng Wang, Wenling Wu:
Improved Multidimensional Zero-Correlation Linear Cryptanalysis and Applications to LBlock and TWINE. ACISP 2014: 1-16 - Yanfeng Wang, Wenling Wu, Zhiyuan Guo, Xiaoli Yu:
Differential Cryptanalysis and Linear Distinguisher of Full-Round Zorro. ACNS 2014: 308-323 - Jianqun Cui, Wenlin Zhang, Feng Huang, Libing Wu:
Hierarchical Adaptive Recovery Algorithm in Mobile ALM. ICoC 2014: 95-105
skipping 46 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-26 00:32 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint