Author of the publication

Security Analysis of Some Diffusion Mechanisms Used in Chaotic Ciphers.

, , , , and . Int. J. Bifurc. Chaos, 27 (10): 1750155:1-1750155:13 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalyzing a class of image encryption schemes based on Chinese remainder theorem., , , and . Signal Process. Image Commun., 29 (8): 914-920 (2014)Distinction Between Ships and Icebergs in SAR Images Using Ensemble Loss Trained Convolutional Neural Networks., , , , , and . Australasian Conference on Artificial Intelligence, volume 11320 of Lecture Notes in Computer Science, page 216-223. Springer, (2018)Index suffix-prefix overlaps by (w, k)-minimizer to generate long contigs for reads compression., , , and . Bioinform., 35 (12): 2066-2074 (2019)Co-training based prediction of multi-label protein-protein interactions., , , , , and . Comput. Biol. Medicine, (2024)DualSyn: A dual-level feature interaction method to predict synergistic drug combinations., , , , , , and . Expert Syst. Appl., (2024)GPMO: Gradient Perturbation-Based Contrastive Learning for Molecule Optimization., , , , , and . IJCAI, page 4940-4948. ijcai.org, (2023)Deciphering an Image Cipher Based on Mixed Transformed Logistic Maps., , , , and . Int. J. Bifurc. Chaos, 25 (13): 1550188:1-1550188:9 (2015)WebTraceMiner: a web service for processing and mining EST sequence trace files., , , , , , , , and . Nucleic Acids Res., 35 (Web-Server-Issue): 137-142 (2007)Vision localization method for intelligent vehicles in low-texture environments., , , , and . CIS, page 243-247. IEEE, (2022)Research on Intelligent Monitoring Method of Medicine Delivery Vehicle Based on Internet of Things Technology., , and . DSA, page 794-799. IEEE, (2023)