Author of the publication

Weak key analysis for chaotic cipher based on randomness properties.

, , , , and . Sci. China Inf. Sci., 55 (5): 1162-1171 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Real-time aerial targets detection algorithm based background subtraction., , , , , and . APSIPA, page 1-6. IEEE, (2013)An Underwater Thruster Fault Diagnosis Simulator and Thrust Calculation Method Based on Fault Clustering., , , , and . J. Robotics, (2021)Evaluating Recognitive Balanced Scorecard-Based Quality Improvement Strategies of Energy Investments With the Integrated Hesitant 2-Tuple Interval-Valued Pythagorean Fuzzy Decision-Making Approach to QFD., , , and . IEEE Access, (2020)Construction of self-dual MDR cyclic codes over finite chain rings., , and . J. Appl. Math. Comput., 69 (1): 549-564 (February 2023)A Distributed Gateway Selection Algorithm for UAV Networks., , , , , , and . IEEE Trans. Emerg. Top. Comput., 3 (1): 22-33 (2015)A new approach for the detection of abnormal heart sound signals using TQWT, VMD and neural networks., , , , , and . Artif. Intell. Rev., 54 (3): 1613-1647 (2021)A path planning algorithm for mobile robot based on water flow potential field method and beetle antennae search algorithm., , , , and . Comput. Electr. Eng., 109 (Part B): 108730 (August 2023)An optimal consensus tracking control algorithm for autonomous underwater vehicles with disturbances, , and . CoRR, (2012)Achievable partition information rate over noisy multi-access Boolean channel., , , , and . ISIT, page 1206-1210. IEEE, (2014)A cross-correlation-based method for spatial-temporal traffic analysis., and . Perform. Evaluation, 61 (2-3): 163-180 (2005)