default search action
Lin Jiao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j34]Haiyun Liu, Hongbo Chen, Jianming Du, Chengjun Xie, Qiong Zhou, Rujing Wang, Lin Jiao:
Auto-adjustment label assignment-based convolutional neural network for oriented wheat diseases detection. Comput. Electron. Agric. 222: 109029 (2024) - [j33]Shifeng Dong, Yue Teng, Lin Jiao, Jianming Du, Kang Liu, Rujing Wang:
ESA-Net: An efficient scale-aware network for small crop pest detection. Expert Syst. Appl. 236: 121308 (2024) - [j32]Man Kang, Lin Jiao, Yongqiang Li, Mingsheng Wang:
An iterative correction method for practically LPN solving. Inf. Sci. 679: 121080 (2024) - [j31]Qiupu Chen, Lin Jiao, Fenmei Wang, Jianming Du, Haiyun Liu, Xue Wang, Rujing Wang:
Integrating foreground-background feature distillation and contrastive feature learning for ultra-fine-grained visual classification. Pattern Recognit. 150: 110339 (2024) - [j30]Kang Liu, Po Yang, Lin Jiao, Rujing Wang, Zhipeng Yuan, Tao Li:
Observer-Based Adaptive Finite-Time Neural Control for Constrained Nonlinear Systems With Actuator Saturation Compensation. IEEE Trans. Instrum. Meas. 73: 1-16 (2024) - [j29]Fen Liu, Yongqiang Li, Huiqin Chen, Lin Jiao, Ming Luo, Mingsheng Wang:
YuX: Finite Field Multiplication Based Block Ciphers for Efficient FHE Evaluation. IEEE Trans. Inf. Theory 70(5): 3729-3749 (2024) - [i11]Xichao Hu, Dengguo Feng, Lin Jiao, Yonglin Hao, Xinxin Gong, Yongqiang Li:
A Deep Study of The Impossible Boomerang Distinguishers: New Construction Theory and Automatic Search Methods. IACR Cryptol. ePrint Arch. 2024: 1008 (2024) - 2023
- [b1]Rujing Wang, Lin Jiao, Kang Liu:
Deep Learning for Agricultural Visual Perception - Crop Pest and Disease Detection. Springer 2023, ISBN 978-981-99-4972-4, pp. 1-131 - [j28]Rujing Wang, Shifeng Dong, Lin Jiao, Jianming Du, Ziliang Huang, Shijian Zheng, Chenrui Kang:
OSAF-Net: A one-stage anchor-free detector for small-target crop pest detection. Appl. Intell. 53(21): 24895-24907 (2023) - [j27]Gaoqiang Li, Lin Jiao, Peng Chen, Kang Liu, Rujing Wang, Shifeng Dong, Chenrui Kang:
Spatial convolutional self-attention-based transformer module for strawberry disease identification under complex background. Comput. Electron. Agric. 212: 108121 (2023) - [j26]Lin Jiao, Yonglin Hao, Yongqiang Li:
Guess-and-determine attacks on SNOW-Vi stream cipher. Des. Codes Cryptogr. 91(5): 2021-2055 (2023) - [j25]Zheng Liang, Rui Ruan, Lin Jiao, Weidong Zhang, Peixian Zhuang:
An Underwater Image Restoration Method Based on Adaptive Brightness Improvement and Local Image Descattering. IEEE Geosci. Remote. Sens. Lett. 20: 1-5 (2023) - [j24]Lin Jiao, Chenrui Kang, Shifeng Dong, Peng Chen, Gaoqiang Li, Rujing Wang:
An attention-based feature pyramid network for single-stage small object detection. Multim. Tools Appl. 82(12): 18529-18544 (2023) - [j23]Shaowei Qian, Jianming Du, Jianan Zhou, Chengjun Xie, Lin Jiao, Rui Li:
An effective pest detection method with automatic data augmentation strategy in the agricultural field. Signal Image Video Process. 17(2): 563-571 (2023) - [j22]Kang Liu, Po Yang, Rujing Wang, Lin Jiao, Tao Li, Jie Zhang:
Observer-Based Adaptive Fuzzy Finite-Time Attitude Control for Quadrotor UAVs. IEEE Trans. Aerosp. Electron. Syst. 59(6): 8637-8654 (2023) - [j21]Bin Zhang, Ruitao Liu, Xinxin Gong, Lin Jiao:
Improved Fast Correlation Attacks on the Sosemanuk Stream Cipher. IACR Trans. Symmetric Cryptol. 2023(4): 83-111 (2023) - [c12]Huiqin Chen, Yongqiang Li, Parhat Abla, Zhiran Li, Lin Jiao, Mingsheng Wang:
Quantum Algorithm for Finding Impossible Differentials and Zero-Correlation Linear Hulls of Symmetric Ciphers. ACISP 2023: 431-451 - [c11]Huiqin Chen, Yongqiang Li, Xichao Hu, Zhengbin Liu, Lin Jiao, Mingsheng Wang:
Automatic Search Model for Related-Tweakey Impossible Differential Cryptanalysis. ACNS Workshops 2023: 3-22 - [c10]Hao Fan, Yonglin Hao, Qingju Wang, Xinxin Gong, Lin Jiao:
Key Filtering in Cube Attacks from the Implementation Aspect. CANS 2023: 293-317 - [i10]Yonglin Hao, Qingju Wang, Lin Jiao, Xinxin Gong:
Approximate Modeling of Signed Difference and Digraph based Bit Condition Deduction: New Boomerang Attacks on BLAKE. IACR Cryptol. ePrint Arch. 2023: 299 (2023) - [i9]Xichao Hu, Yongqiang Li, Lin Jiao, Zhengbin Liu, Mingsheng Wang:
Evaluating the Security of Block Ciphers Against Zero-correlation Linear Attack in the Distinguishers Aspect. IACR Cryptol. ePrint Arch. 2023: 496 (2023) - [i8]Dengguo Feng, Lin Jiao, Yonglin Hao, Qunxiong Zheng, Wenling Wu, Wenfeng Qi, Lei Zhang, Liting Zhang, Siwei Sun, Tian Tian:
LOL: A Highly Flexible Framework for Designing Stream Ciphers. IACR Cryptol. ePrint Arch. 2023: 1235 (2023) - [i7]Huiqin Chen, Yongqiang Li, Xichao Hu, Zhengbin Liu, Lin Jiao, Mingsheng Wang:
Automatic Search Model for Related-Tweakey Impossible Differential Cryptanalysis. IACR Cryptol. ePrint Arch. 2023: 1353 (2023) - [i6]Hao Fan, Yonglin Hao, Qingju Wang, Xinxin Gong, Lin Jiao:
Key Filtering in Cube Attacks from the Implementation Aspect. IACR Cryptol. ePrint Arch. 2023: 1571 (2023) - 2022
- [j20]Lin Jiao, Chengjun Xie, Peng Chen, Jianming Du, Rui Li, Jie Zhang:
Adaptive feature fusion pyramid network for multi-classes agricultural pest detection. Comput. Electron. Agric. 195: 106827 (2022) - [j19]Xichao Hu, Yongqiang Li, Lin Jiao, Mingsheng Wang:
New Division Property Propagation Table: Applications to Block Ciphers with Large S-boxes. Comput. J. 65(6): 1560-1573 (2022) - [j18]Lin Jiao, Yongqiang Li, Shaoyu Du:
Guess-and-Determine Attacks on AEGIS. Comput. J. 65(8): 2221-2230 (2022) - [j17]Zhengbin Liu, Yongqiang Li, Lin Jiao, Mingsheng Wang:
On the upper bound of squared correlation of SIMON-like functions and its applications. IET Inf. Secur. 16(3): 220-234 (2022) - [j16]Jianming Du, Liu Liu, Rui Li, Lin Jiao, Chengjun Xie, Rujing Wang:
Towards densely clustered tiny pest detection in the wild environment. Neurocomputing 490: 400-412 (2022) - [i5]Zheng Xu, Yongqiang Li, Lin Jiao, Mingsheng Wang, Willi Meier:
Do NOT Misuse the Markov Cipher Assumption - Automatic Search for Differential and Impossible Differential Characteristics in ARX Ciphers. IACR Cryptol. ePrint Arch. 2022: 135 (2022) - 2021
- [j15]Rujing Wang, Lin Jiao, Chengjun Xie, Peng Chen, Jianming Du, Rui Li:
S-RPN: Sampling-balanced region proposal network for small crop pest detection. Comput. Electron. Agric. 187: 106290 (2021) - [j14]Shifeng Dong, Rujing Wang, Kang Liu, Lin Jiao, Rui Li, Jianming Du, Yue Teng, Fenmei Wang:
CRA-Net: A channel recalibration feature pyramid network for detecting small pests. Comput. Electron. Agric. 191: 106518 (2021) - [j13]Zhengbin Liu, Yongqiang Li, Lin Jiao, Mingsheng Wang:
A New Method for Searching Optimal Differential and Linear Trails in ARX Ciphers. IEEE Trans. Inf. Theory 67(2): 1054-1068 (2021) - [c9]Lin Jiao, Dengguo Feng, Yonglin Hao, Xinxin Gong, Shaoyu Du:
FAN: A Lightweight Authenticated Cryptographic Algorithm. CT-RSA 2021: 299-325 - 2020
- [j12]Lin Jiao, Shifeng Dong, Shengyu Zhang, Chengjun Xie, Hongqiang Wang:
AF-RCNN: An anchor-free convolutional neural network for multi-categories agricultural pest detection. Comput. Electron. Agric. 174: 105522 (2020) - [j11]Lin Jiao, Yonglin Hao, Dengguo Feng:
Stream cipher designs: a review. Sci. China Inf. Sci. 63(3) (2020) - [j10]Lin Jiao, Yongqiang Li, Yonglin Hao:
A Guess-And-Determine Attack On SNOW-V Stream Cipher. Comput. J. 63(12): 1789-1812 (2020) - [j9]Lin Jiao:
Specifications and improvements of LPN solving algorithms. IET Inf. Secur. 14(1): 111-125 (2020) - [j8]Lin Jiao, Shengyu Zhang, Shifeng Dong, Hongqiang Wang:
RFP-Net: Receptive field-based proposal generation network for object detection. Neurocomputing 405: 138-148 (2020) - [j7]Lin Jiao, Rujing Wang, Chengjun Xie:
C-FCN: Corners-based fully convolutional network for visual object detection. Multim. Tools Appl. 79(39-40): 28841-28857 (2020) - [j6]Yonglin Hao, Lin Jiao, Chaoyun Li, Willi Meier, Yosuke Todo, Qingju Wang:
Links between Division Property and Other Cube Attack Variants. IACR Trans. Symmetric Cryptol. 2020(1): 363-395 (2020) - [c8]Xichao Hu, Yongqiang Li, Lin Jiao, Shizhu Tian, Mingsheng Wang:
Mind the Propagation of States - New Automatic Search Tool for Impossible Differentials and Impossible Polytopic Transitions. ASIACRYPT (1) 2020: 415-445 - [i4]Xichao Hu, Yongqiang Li, Lin Jiao, Shizhu Tian, Mingsheng Wang:
Mind the Propagation of States New Automatic Search Tool for Impossible Differentials and Impossible Polytopic Transitions (Full Version). IACR Cryptol. ePrint Arch. 2020: 1093 (2020)
2010 – 2019
- 2019
- [j5]Lin Jiao, Yonglin Hao, Yongqiang Li:
Improved guess-and-determine attack on TRIVIUM. IET Inf. Secur. 13(5): 411-419 (2019) - [j4]Shuai Xing, Dandi Wang, Qing Xu, Yuzhun Lin, Pengcheng Li, Lin Jiao, Xinlei Zhang, Chenbo Liu:
A Depth-Adaptive Waveform Decomposition Method for Airborne LiDAR Bathymetry. Sensors 19(23): 5065 (2019) - [j3]Yonglin Hao, Takanori Isobe, Lin Jiao, Chaoyun Li, Willi Meier, Yosuke Todo, Qingju Wang:
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly. IEEE Trans. Computers 68(10): 1470-1486 (2019) - [i3]Zhengbin Liu, Yongqiang Li, Lin Jiao, Mingsheng Wang:
A new method for Searching Optimal Differential and Linear Trails in ARX Ciphers. IACR Cryptol. ePrint Arch. 2019: 1438 (2019) - 2018
- [j2]Lin Jiao, Yongqiang Li, Yonglin Hao:
Guess-and-determine attacks on PANAMA-like stream ciphers. IET Inf. Secur. 12(6): 484-497 (2018) - [c7]Lie Zhang, Weiying Qi, Kun Zhao, Liang Wang, Xingdong Tan, Lin Jiao:
VR Games and the Dissemination of Cultural Heritage. HCI (21) 2018: 439-451 - [i2]Yonglin Hao, Lin Jiao, Chaoyun Li, Willi Meier, Yosuke Todo, Qingju Wang:
Observations on the Dynamic Cube Attack of 855-Round TRIVIUM from Crypto'18. IACR Cryptol. ePrint Arch. 2018: 972 (2018) - 2016
- [c6]Bin Zhang, Lin Jiao, Mingsheng Wang:
Faster Algorithms for Solving LPN. EUROCRYPT (1) 2016: 168-195 - [i1]Bin Zhang, Lin Jiao, Mingsheng Wang:
Faster Algorithms for Solving LPN. IACR Cryptol. ePrint Arch. 2016: 275 (2016) - 2015
- [c5]Lin Jiao, Bin Zhang, Mingsheng Wang:
Two Generic Methods of Analyzing Stream Ciphers. ISC 2015: 379-396 - 2014
- [c4]Lin Jiao, Bin Zhang, Mingsheng Wang:
Revised Algorithms for Computing Algebraic Immunity against Algebraic and Fast Algebraic Attacks. ISC 2014: 104-119 - 2013
- [c3]Lin Jiao, Bin Zhang, Mingsheng Wang:
Establishing Equations: The Complexity of Algebraic and Fast Algebraic Attacks Revisited. ISC 2013: 169-184 - 2012
- [c2]Lin Jiao, Mingsheng Wang, Bin Zhang, Yongqiang Li:
An Improved Time-Memory-Data Trade-Off Attack against Irregularly Clocked and Filtered Keystream Generators. Inscrypt 2012: 294-310 - 2010
- [c1]Yuzhe Zhi, Yi Liu, Lin Jiao, Peng Zhang:
A Parallel Simulator for Large-Scale Parallel Computers. GCC 2010: 196-200
2000 – 2009
- 2009
- [j1]Zhixin Sun, Lin Jiao:
Research of Intelligent Rule-base Based on Multilayer Intrusion Detection. J. Comput. 4(6): 453-460 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint