default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Exact matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 55 matches
- 2024
- Xinxin Gong, Yonglin Hao, Qingju Wang:
Combining MILP modeling with algebraic bias evaluation for linear mask search: improved fast correlation attacks on SNOW. Des. Codes Cryptogr. 92(6): 1663-1728 (2024) - Haoran Wang, Yongwei Feng, Yonglin Tian, Ziran Wang, Jia Hu, Masayoshi Tomizuka:
Towards the Next Level of Vehicle Automation Through Cooperative Driving: A Roadmap From Planning and Control Perspective. IEEE Trans. Intell. Veh. 9(3): 4335-4347 (2024) - Jian Ma, Yonglin Deng, Chen Chen, Haonan Lu, Zhenyu Yang:
GlyphDraw2: Automatic Generation of Complex Glyph Posters with Diffusion Models and Large Language Models. CoRR abs/2407.02252 (2024) - Xichao Hu, Dengguo Feng, Lin Jiao, Yonglin Hao, Xinxin Gong, Yongqiang Li:
A Deep Study of The Impossible Boomerang Distinguishers: New Construction Theory and Automatic Search Methods. IACR Cryptol. ePrint Arch. 2024: 1008 (2024) - 2023
- Qiang Yin, JiaXin Gu, Shaoyun Song, Yonglin Zhang, Gang Zhao, ZhiQiang Hao:
Acquisition method of target leveling height based on machine vision. Concurr. Comput. Pract. Exp. 35(3) (2023) - Lin Jiao, Yonglin Hao, Yongqiang Li:
Guess-and-determine attacks on SNOW-Vi stream cipher. Des. Codes Cryptogr. 91(5): 2021-2055 (2023) - Yanbin Xu, Yonglin Hao, Mingxing Wang:
Revisit two memoryless state-recovery cryptanalysis methods on A5/1. IET Inf. Secur. 17(4): 626-638 (2023) - Zhenhui Zheng, Juntao Xiong, Xiao Wang, Zexing Li, Qiyin Huang, Haoran Chen, Yonglin Han:
An efficient online citrus counting system for large-scale unstructured orchards based on the unmanned aerial vehicle. J. Field Robotics 40(3): 552-573 (2023) - Haobo Zhang, Ziang Yang, Yonglin Tian, Hongliang Zhang, Boya Di, Lingyang Song:
Reconfigurable Holographic Surface Aided Collaborative Wireless SLAM Using Federated Learning for Autonomous Driving. IEEE Trans. Intell. Veh. 8(8): 4031-4046 (2023) - Hao Fan, Yonglin Hao, Qingju Wang, Xinxin Gong, Lin Jiao:
Key Filtering in Cube Attacks from the Implementation Aspect. CANS 2023: 293-317 - Lorenzo Grassi, Yonglin Hao, Christian Rechberger, Markus Schofnegger, Roman Walch, Qingju Wang:
Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applications. CRYPTO (3) 2023: 573-606 - Jing Ma, Peng Liu, Hao Liu, Yonglin Tian, Fengyi Zhang, Yi Zhang, Zhaojie Wang:
Parallel Ships: An ACP-based Framework for Marine Equipment Testing and Training. DTPI 2023: 1-5 - Shao-I Chu, Zhi-Hao Zhuang, Sheng-Jung Liu, Chih-Yuan Lien, Yong-Lin Huang:
Booth Multiplier with Adjustable Widths Based on Probability Estimation Approach. GCCE 2023: 419-420 - Zebin Ma, Yonglin Zou, Xiaobin Huang, Wenjin Yan, Hao Xu, Jiexin Yang, Ying Zhang, Jinqi Huang:
pLMFPPred: a novel approach for accurate prediction of functional peptides integrating embedding from pre-trained protein language model and imbalanced learning. CoRR abs/2309.14404 (2023) - Hao Fan, Yonglin Hao, Qingju Wang, Xinxin Gong, Lin Jiao:
Key Filtering in Cube Attacks from the Implementation Aspect. IACR Cryptol. ePrint Arch. 2023: 1571 (2023) - Dengguo Feng, Lin Jiao, Yonglin Hao, Qunxiong Zheng, Wenling Wu, Wenfeng Qi, Lei Zhang, Liting Zhang, Siwei Sun, Tian Tian:
LOL: A Highly Flexible Framework for Designing Stream Ciphers. IACR Cryptol. ePrint Arch. 2023: 1235 (2023) - Xinxin Gong, Yonglin Hao, Qingju Wang:
Combining MILP Modeling with Algebraic Bias Evaluation for Linear Mask Search: Improved Fast Correlation Attacks on SNOW. IACR Cryptol. ePrint Arch. 2023: 145 (2023) - Yonglin Hao, Qingju Wang, Lin Jiao, Xinxin Gong:
Approximate Modeling of Signed Difference and Digraph based Bit Condition Deduction: New Boomerang Attacks on BLAKE. IACR Cryptol. ePrint Arch. 2023: 299 (2023) - Yanbin Xu, Yonglin Hao, Mingxing Wang:
Revisit Two Memoryless State-Recovery Cryptanalysis Methods on A5/1. IACR Cryptol. ePrint Arch. 2023: 1557 (2023) - 2022
- Eduardo Pérez-Pellitero, Sibi Catley-Chandar, Richard Shaw, Ales Leonardis, Radu Timofte, Zexin Zhang, Cen Liu, Yunbo Peng, Yue Lin, Gaocheng Yu, Jin Zhang, Zhe Ma, Hongbin Wang, Xiangyu Chen, Xintao Wang, Haiwei Wu, Lin Liu, Chao Dong, Jiantao Zhou, Qingsen Yan, Song Zhang, Weiye Chen, Yuhang Liu, Zhen Zhang, Yanning Zhang, Javen Qinfeng Shi, Dong Gong, Dan Zhu, Mengdi Sun, Guannan Chen, Yang Hu, Haowei Li, Baozhu Zou, Zhen Liu, Wenjie Lin, Ting Jiang, Chengzhi Jiang, Xinpeng Li, Mingyan Han, Haoqiang Fan, Jian Sun, Shuaicheng Liu, Juan Marín-Vega, Michael Sloth, Peter Schneider-Kamp, Richard Röttger, Chunyang Li, Long Bao, Gang He, Ziyao Xu, Li Xu, Gen Zhan, Ming Sun, Xing Wen, Junlin Li, Jinjing Li, Chenghua Li, Ruipeng Gang, Fangya Li, Chenming Liu, Shuang Feng, Fei Lei, Rui Liu, Junxiang Ruan, Tianhong Dai, Wei Li, Zhan Lu, Hengyan Liu, Peian Huang, Guangyu Ren, Yonglin Luo, Chang Liu, Qiang Tu, Sai Ma, Yizhen Cao, Steven Tel, Barthelemy Heyrman, Dominique Ginhac, Chul Lee, Gahyeon Kim, Seonghyun Park, An Gia Vien, Truong Thanh Nhat Mai, Howoon Yoon, Tu Vo, Alexander Holston, Sheir Zaheer, Chan Y. Park:
NTIRE 2022 Challenge on High Dynamic Range Imaging: Methods and Results. CVPR Workshops 2022: 1008-1022 - Eduardo Pérez-Pellitero, Sibi Catley-Chandar, Richard Shaw, Ales Leonardis, Radu Timofte, Zexin Zhang, Cen Liu, Yunbo Peng, Yue Lin, Gaocheng Yu, Jin Zhang, Zhe Ma, Hongbin Wang, Xiangyu Chen, Xintao Wang, Haiwei Wu, Lin Liu, Chao Dong, Jiantao Zhou, Qingsen Yan, Song Zhang, Weiye Chen, Yuhang Liu, Zhen Zhang, Yanning Zhang, Javen Qinfeng Shi, Dong Gong, Dan Zhu, Mengdi Sun, Guannan Chen, Yang Hu, Haowei Li, Baozhu Zou, Zhen Liu, Wenjie Lin, Ting Jiang, Chengzhi Jiang, Xinpeng Li, Mingyan Han, Haoqiang Fan, Jian Sun, Shuaicheng Liu, Juan Marín-Vega, Michael Sloth, Peter Schneider-Kamp, Richard Röttger, Chunyang Li, Long Bao, Gang He, Ziyao Xu, Li Xu, Gen Zhan, Ming Sun, Xing Wen, Junlin Li, Jinjing Li, Chenghua Li, Ruipeng Gang, Fangya Li, Chenming Liu, Shuang Feng, Fei Lei, Rui Liu, Junxiang Ruan, Tianhong Dai, Wei Li, Zhan Lu, Hengyan Liu, Peian Huang, Guangyu Ren, Yonglin Luo, Chang Liu, Qiang Tu, Sai Ma, Yizhen Cao, Steven Tel, Barthelemy Heyrman, Dominique Ginhac, Chul Lee, Gahyeon Kim, Seonghyun Park, An Gia Vien, Truong Thanh Nhat Mai, Howoon Yoon, Tu Vo, Alexander Holston, Sheir Zaheer, Chan Y. Park:
NTIRE 2022 Challenge on High Dynamic Range Imaging: Methods and Results. CoRR abs/2205.12633 (2022) - Lorenzo Grassi, Yonglin Hao, Christian Rechberger, Markus Schofnegger, Roman Walch, Qingju Wang:
A New Feistel Approach Meets Fluid-SPN: Griffin for Zero-Knowledge Applications. IACR Cryptol. ePrint Arch. 2022: 403 (2022) - 2021
- Yonglin Hao, Gregor Leander, Willi Meier, Yosuke Todo, Qingju Wang:
Modeling for Three-Subset Division Property without Unknown Subset. J. Cryptol. 34(3): 22 (2021) - Mingxing Wang, Yonglin Hao:
Revisit Two Memoryless State-Recovery Cryptanalysis Methods on A5/1. Inscrypt 2021: 191-211 - Lin Jiao, Dengguo Feng, Yonglin Hao, Xinxin Gong, Shaoyu Du:
FAN: A Lightweight Authenticated Cryptographic Algorithm. CT-RSA 2021: 299-325 - 2020
- Lin Jiao, Yonglin Hao, Dengguo Feng:
Stream cipher designs: a review. Sci. China Inf. Sci. 63(3) (2020) - Lin Jiao, Yongqiang Li, Yonglin Hao:
A Guess-And-Determine Attack On SNOW-V Stream Cipher. Comput. J. 63(12): 1789-1812 (2020) - Yonglin Hao, Lin Jiao, Chaoyun Li, Willi Meier, Yosuke Todo, Qingju Wang:
Links between Division Property and Other Cube Attack Variants. IACR Trans. Symmetric Cryptol. 2020(1): 363-395 (2020) - Yonglin Hao, Gregor Leander, Willi Meier, Yosuke Todo, Qingju Wang:
Modeling for Three-Subset Division Property Without Unknown Subset - Improved Cube Attacks Against Trivium and Grain-128AEAD. EUROCRYPT (1) 2020: 466-495 - Yonglin Hao, Gregor Leander, Willi Meier, Yosuke Todo, Qingju Wang:
Modeling for Three-Subset Division Property without Unknown Subset. IACR Cryptol. ePrint Arch. 2020: 441 (2020)
skipping 25 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-08 16:24 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint