


Остановите войну!
for scientists:


default search action
Xuan Shen
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c15]Zhenglun Kong, Haoyu Ma, Geng Yuan, Mengshu Sun, Yanyue Xie, Peiyan Dong, Xin Meng, Xuan Shen, Hao Tang, Minghai Qin, Tianlong Chen, Xiaolong Ma, Xiaohui Xie, Zhangyang Wang, Yanzhi Wang:
Peeling the Onion: Hierarchical Reduction of Data Redundancy for Efficient Vision Transformer Training. AAAI 2023: 8360-8368 - [c14]Xuan Shen, Yaohua Wang, Ming Lin, Yilun Huang, Hao Tang, Xiuyu Sun, Yanzhi Wang:
DeepMAD: Mathematical Architecture Design for Deep Convolutional Neural Network. CVPR 2023: 6163-6173 - [c13]Xuan Shen, Zhenglun Kong, Minghai Qin, Peiyan Dong, Geng Yuan, Xin Meng, Hao Tang, Xiaolong Ma, Yanzhi Wang:
Data Level Lottery Ticket Hypothesis for Vision Transformers. IJCAI 2023: 1378-1386 - [i10]Xuan Shen, Yaohua Wang, Ming Lin, Yilun Huang, Hao Tang, Xiuyu Sun, Yanzhi Wang:
DeepMAD: Mathematical Architecture Design for Deep Convolutional Neural Network. CoRR abs/2303.02165 (2023) - 2022
- [j10]Haipeng Tong, Xuan Shen, Chao Li, Yunwen Liu:
Improved nonlinear invariant attack. Sci. China Inf. Sci. 65(3) (2022) - [j9]Xuan Shen
, Guoqiang Liu, Xiaofeng Wang, Bing Sun, Jun He:
Security evaluation on type-1 and type-1-like 4-branch generalized Feistel structures and application to reduced-round Lesamnta-LW-BC. IET Inf. Secur. 16(5): 390-400 (2022) - [j8]Yan Zhou, Xuan Shen, Chen Wang, Yixue Liao, Junli Li
:
Mining the Spatial Distribution Pattern of the Typical Fast-Food Industry Based on Point-of-Interest Data: The Case Study of Hangzhou, China. ISPRS Int. J. Geo Inf. 11(11): 559 (2022) - [j7]Yi Zhang
, Guoqiang Liu
, Chao Li
, Xuan Shen
:
Impossible differential cryptanalysis of FBC-128. J. Inf. Secur. Appl. 69: 103279 (2022) - [c12]Zhenglun Kong
, Peiyan Dong
, Xiaolong Ma
, Xin Meng
, Wei Niu
, Mengshu Sun
, Xuan Shen
, Geng Yuan
, Bin Ren
, Hao Tang
, Minghai Qin
, Yanzhi Wang
:
SPViT: Enabling Faster Vision Transformers via Latency-Aware Soft Token Pruning. ECCV (11) 2022: 620-640 - [c11]Yanyu Li, Xuan Shen, Geng Yuan, Jiexiong Guan, Wei Niu, Hao Tang, Bin Ren, Yanzhi Wang:
Real-Time Portrait Stylization on the Edge. IJCAI 2022: 5928-5931 - [i9]Yanyu Li, Xuan Shen, Geng Yuan, Jiexiong Guan, Wei Niu, Hao Tang, Bin Ren, Yanzhi Wang:
Real-Time Portrait Stylization on the Edge. CoRR abs/2206.01244 (2022) - [i8]Xuan Shen, Zhenglun Kong, Minghai Qin, Peiyan Dong, Geng Yuan, Xin Meng, Hao Tang, Xiaolong Ma, Yanzhi Wang:
The Lottery Ticket Hypothesis for Vision Transformers. CoRR abs/2211.01484 (2022) - [i7]Zhenglun Kong, Haoyu Ma, Geng Yuan, Mengshu Sun, Yanyue Xie, Peiyan Dong, Xin Meng, Xuan Shen, Hao Tang, Minghai Qin, Tianlong Chen, Xiaolong Ma, Xiaohui Xie, Zhangyang Wang, Yanzhi Wang:
Peeling the Onion: Hierarchical Reduction of Data Redundancy for Efficient Vision Transformer Training. CoRR abs/2211.10801 (2022) - 2021
- [j6]Xuan Shen, Lei Cheng, Bing Sun, Jun He
:
Revisiting Impossible Differential Distinguishers of Two Generalized Feistel Structures. Secur. Commun. Networks 2021: 5582711:1-5582711:10 (2021) - [j5]Jun He
, Xuan Shen
, Guoqiang Liu:
Improved Impossible Differentials and Zero-Correlation Linear Hulls of New Structure III. Secur. Commun. Networks 2021: 6515844:1-6515844:11 (2021) - [c10]Zhengang Li, Geng Yuan, Wei Niu, Pu Zhao
, Yanyu Li, Yuxuan Cai, Xuan Shen, Zheng Zhan, Zhenglun Kong, Qing Jin, Zhiyu Chen, Sijia Liu, Kaiyuan Yang, Bin Ren, Yanzhi Wang, Xue Lin:
NPAS: A Compiler-Aware Framework of Unified Network Pruning and Architecture Search for Beyond Real-Time Mobile Acceleration. CVPR 2021: 14255-14266 - [c9]Ning Liu, Geng Yuan, Zhengping Che, Xuan Shen, Xiaolong Ma, Qing Jin, Jian Ren, Jian Tang, Sijia Liu, Yanzhi Wang:
Lottery Ticket Preserves Weight Correlation: Is It Desirable or Not? ICML 2021: 7011-7020 - [c8]Xuan Shen, Geng Yuan, Wei Niu, Xiaolong Ma, Jiexiong Guan, Zhengang Li, Bin Ren, Yanzhi Wang:
Towards Fast and Accurate Multi-Person Pose Estimation on Mobile Devices. IJCAI 2021: 5012-5015 - [c7]Yunxiao Yang, Xuan Shen, Bing Sun:
Out of Non-linearity: Search Impossible Differentials by the Bitwise Characteristic Matrix. ISPEC 2021: 69-89 - [c6]Geng Yuan, Zhiheng Liao, Xiaolong Ma, Yuxuan Cai, Zhenglun Kong, Xuan Shen, Jingyan Fu, Zhengang Li, Chengming Zhang, Hongwu Peng, Ning Liu, Ao Ren, Jinhui Wang, Yanzhi Wang:
Improving DNN Fault Tolerance using Weight Pruning and Differential Crossbar Mapping for ReRAM-based Edge AI. ISQED 2021: 135-141 - [c5]Xiaolong Ma, Geng Yuan, Xuan Shen, Tianlong Chen, Xuxi Chen, Xiaohan Chen, Ning Liu, Minghai Qin, Sijia Liu, Zhangyang Wang, Yanzhi Wang:
Sanity Checks for Lottery Tickets: Does Your Winning Ticket Really Win the Jackpot? NeurIPS 2021: 12749-12760 - [i6]Wenjie Song, Xuan Shen:
Vertical federated learning based on DFP and BFGS. CoRR abs/2101.09428 (2021) - [i5]Ning Liu, Geng Yuan, Zhengping Che, Xuan Shen, Xiaolong Ma, Qing Jin, Jian Ren, Jian Tang, Sijia Liu, Yanzhi Wang:
Lottery Ticket Implies Accuracy Degradation, Is It a Desirable Phenomenon? CoRR abs/2102.11068 (2021) - [i4]Geng Yuan, Zhiheng Liao, Xiaolong Ma, Yuxuan Cai, Zhenglun Kong, Xuan Shen, Jingyan Fu, Zhengang Li, Chengming Zhang, Hongwu Peng, Ning Liu, Ao Ren, Jinhui Wang, Yanzhi Wang:
Improving DNN Fault Tolerance using Weight Pruning and Differential Crossbar Mapping for ReRAM-based Edge AI. CoRR abs/2106.09166 (2021) - [i3]Xuan Shen, Geng Yuan, Wei Niu, Xiaolong Ma, Jiexiong Guan, Zhengang Li, Bin Ren, Yanzhi Wang:
Towards Fast and Accurate Multi-Person Pose Estimation on Mobile Devices. CoRR abs/2106.15304 (2021) - [i2]Xiaolong Ma, Geng Yuan, Xuan Shen, Tianlong Chen, Xuxi Chen, Xiaohan Chen, Ning Liu, Minghai Qin, Sijia Liu, Zhangyang Wang, Yanzhi Wang:
Sanity Checks for Lottery Tickets: Does Your Winning Ticket Really Win the Jackpot? CoRR abs/2107.00166 (2021) - 2020
- [j4]Dejian Dai
, Tao Jiang, Wei Lu, Xuan Shen, Rui Xiu, Jingwei Zhang:
Nondestructive Detection for Egg Freshness Based on Hyperspectral Scattering Image Combined with Ensemble Learning. Sensors 20(19): 5484 (2020) - [i1]Zhengang Li, Geng Yuan, Wei Niu, Yanyu Li, Pu Zhao, Yuxuan Cai, Xuan Shen, Zheng Zhan, Zhenglun Kong, Qing Jin, Zhiyu Chen, Sijia Liu, Kaiyuan Yang, Bin Ren, Yanzhi Wang, Xue Lin:
6.7ms on Mobile with over 78% ImageNet Accuracy: Unified Network Pruning and Architecture Search for Beyond Real-Time Mobile Acceleration. CoRR abs/2012.00596 (2020)
2010 – 2019
- 2019
- [j3]Xuan Shen, Jun He:
Improved Impossible Differential Attack on 7-round Reduced ARIA-256. KSII Trans. Internet Inf. Syst. 13(11): 5773-5784 (2019) - 2018
- [j2]Xuan Shen, Guoqiang Liu, Chao Li, Longjiang Qu:
Impossible Differential Cryptanalysis of Fantomas and Robin. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(5): 863-866 (2018) - 2017
- [c4]Jun Shen, Xuan Shen, Wen Gao, Yong Zhang:
Simulation and Verification of Software Architecture for Loosely-Coupled Distributed System. CSA/CUTE 2017: 624-630 - [c3]Xuan Shen, Ruilin Li, Bing Sun, Lei Cheng, Chao Li, Maodong Liao:
Dual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-Like Ciphers. ISPEC 2017: 237-255 - 2016
- [c2]Xuan Shen, Guoqiang Liu, Bing Sun, Chao Li:
Impossible Differentials of SPN Ciphers. Inscrypt 2016: 47-63 - 2015
- [j1]Beibei Li, Zhihong Zhao, Xuan Shen, Cendi Xue, Liwei Zhong:
Fitting α β-crystalline structure onto electron microscopy based on SO(3) rotation group theory. J. Comb. Optim. 30(4): 906-919 (2015) - 2014
- [c1]Guangyao Zhao, Lei Cheng, Chao Li, Ruilin Li, Xuan Shen:
On the Practical Security Bound of GF-NLFSR Structure with SPN Round Function. ProvSec 2014: 40-54
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-09-08 10:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint