default search action
Shiyao Chen
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c21]Shiyao Chen, Jian Guo, Eik List, Danping Shi, Tianyu Zhang:
Diving Deep into the Preimage Security of AES-Like Hashing. EUROCRYPT (1) 2024: 398-426 - [c20]Bowei Shen, Xiaoquan Huang, Yonghong Shi, Shiyao Chen:
Dual Bidirectional Copy-Paste with Shape Constraint for Semi-Supervised Image Segmentation. ISBI 2024: 1-5 - [i13]Shiyao Chen, Jian Guo, Eik List, Danping Shi, Tianyu Zhang:
Diving Deep into the Preimage Security of AES-like Hashing. IACR Cryptol. ePrint Arch. 2024: 300 (2024) - [i12]Shiyao Chen, Xiaoyang Dong, Jian Guo, Tianyu Zhang:
Chosen-Prefix Collisions on AES-like Hashing. IACR Cryptol. ePrint Arch. 2024: 1888 (2024) - [i11]Fukang Liu, Katharina Koschatko, Lorenzo Grassi, Hailun Yan, Shiyao Chen, Subhadeep Banik, Willi Meier:
Opening the Blackbox: Collision Attacks on Round-Reduced Tip5, Tip4, Tip4' and Monolith. IACR Cryptol. ePrint Arch. 2024: 1900 (2024) - 2023
- [j13]Yijing Zhang, Shiyao Chen, Taeyoung Choi, Yuzheng Qi, Qianhui Wang, Guanyi Li, Yaxue Zhao:
Molecular dynamics simulations reveal the inhibition mechanism of Cdc42 by RhoGDI1. J. Comput. Aided Mol. Des. 37(7): 301-312 (2023) - [j12]Shiyao Chen, Chun Guo, Jian Guo, Li Liu, Meiqin Wang, Puwen Wei, Zeyu Xu:
Towards the Links of Cryptanalytic Methods on MPC/FHE/ZK-Friendly Symmetric-Key Primitives. IACR Trans. Symmetric Cryptol. 2023(2): 132-175 (2023) - [j11]Huina Li, Le He, Shiyao Chen, Jian Guo, Weidong Qiu:
Automatic Preimage Attack Framework on Ascon Using a Linearize-and-Guess Approach. IACR Trans. Symmetric Cryptol. 2023(3): 74-100 (2023) - [c19]Zeyu Xu, Shiyao Chen, Meiqin Wang, Puwen Wei:
Linear Cryptanalysis and Its Variants with Fast Fourier Transformation Technique on MPC/FHE/ZK-Friendly 𝔽p-Based Ciphers. ACISP 2023: 25-52 - [c18]Shiyao Chen, Shuang Zhang, Rufan Cao, Xinyu Zhang, Liangqing Guo, Xiaochun Han:
The Exploration of the Mechanism of Qiwei Baizhu San in the Treatment of Type 2 Diabetes Based on Network Pharmacology Integrating Macromolecular Docking. BIBM 2023: 4542-4546 - [c17]Lu Zhang, Cuiju Wang, Rufan Cao, Shiyao Chen, Liangqing Guo, Xiaochun Han:
Association of KCNJ11 gene polymorphisms with the risk of type 2 diabetes mellitus: A PRISMA-driven systematic review of 30,373 individuals. BIBM 2023: 4710-4717 - [c16]Zhuolong Zhang, Shiyao Chen, Wei Wang, Meiqin Wang:
Full Round Distinguishing and Key-Recovery Attacks on SAND-2. Inscrypt (2) 2023: 230-250 - [i10]Shiyao Chen, Chun Guo, Jian Guo, Li Liu, Meiqin Wang, Puwen Wei, Zeyu Xu:
Towards the Links of Cryptanalytic Methods on MPC/FHE/ZK-Friendly Symmetric-Key Primitives. IACR Cryptol. ePrint Arch. 2023: 748 (2023) - [i9]Huina Li, Le He, Shiyao Chen, Jian Guo, Weidong Qiu:
Automatic Preimage Attack Framework on \ascon Using a Linearize-and-Guess Approach. IACR Cryptol. ePrint Arch. 2023: 1266 (2023) - [i8]Zhuolong Zhang, Shiyao Chen, Wei Wang, Meiqin Wang:
Full Round Distinguishing and Key-Recovery Attacks on SAND-2 (Full version). IACR Cryptol. ePrint Arch. 2023: 1697 (2023) - 2022
- [j10]Shiyao Chen, Yanhong Fan, Ling Sun, Yong Fu, Haibo Zhou, Yongqing Li, Meiqin Wang, Weijia Wang, Chun Guo:
SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations. Des. Codes Cryptogr. 90(1): 155-198 (2022) - [j9]Shiyao Chen, Runze Zheng, Tianlei Wang, Tiejia Jiang, Feng Gao, Danping Wang, Jiuwen Cao:
Deterministic Learning-Based WEST Syndrome Analysis and Seizure Detection on ECG. IEEE Trans. Circuits Syst. II Express Briefs 69(11): 4603-4607 (2022) - [j8]Chunli Qin, Ji Zhou, Demin Yao, Han Zhuang, Hui Wang, Shiyao Chen, Yonghong Shi, Zhijian Song:
Vertebrae Labeling via End-to-End Integral Regression Localization and Multi-Label Classification Network. IEEE Trans. Neural Networks Learn. Syst. 33(6): 2726-2736 (2022) - [c15]Qian Hao, Shuang Zhang, Ruiguo Li, Xu Wang, Shiyao Chen, Rufan Cao, Liangqing Guo, Xiaochun Han:
Mechanism of Qiwei Baizhu San in the Treatment of T2DM by Regulating Liver miRNA. BIBM 2022: 3650-3654 - [c14]Shiyao Chen, Chun Guo, Jian Guo, Li Liu, Meiqin Wang, Puwen Wei, Zeyu Xu:
Related-Key Differential Cryptanalysis of GMiMC Used in Post-Quantum Signatures. ICISC 2022: 41-60 - [c13]Ziyan Qiao, Rui Sun, Shiyao Chen, Dong Zi, Xingyu Wu, Qian Wang, Endong Tong, Wenjia Niu, Jiqiang Liu:
Adapting on Road Traffic-Oriented Controlled Optimization of Phases to Heterogeneous Intersections. Intelligent Information Processing 2022: 522-535 - [i7]Shiyao Chen, Dale Chen-Song:
Detection, Recognition, and Tracking: A Survey. CoRR abs/2203.11900 (2022) - [i6]Ruilin Ma, Shiyao Chen, Qin Zhang:
Lightweight Monocular Depth Estimation. CoRR abs/2212.11363 (2022) - 2021
- [j7]Tingting Cui, Shiyao Chen, Kai Fu, Meiqin Wang, Keting Jia:
New automatic tool for finding impossible differentials and zero-correlation linear approximations. Sci. China Inf. Sci. 64(2) (2021) - [j6]Zishen Zhao, Shiyao Chen, Meiqin Wang, Wei Wang:
Improved cube-attack-like cryptanalysis of reduced-round Ketje-Jr and Keccak-MAC. Inf. Process. Lett. 171: 106124 (2021) - [i5]Shiyao Chen, Yanhong Fan, Ling Sun, Yong Fu, Haibo Zhou, Yongqing Li, Meiqin Wang, Weijia Wang, Chun Guo:
SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations. IACR Cryptol. ePrint Arch. 2021: 1560 (2021) - 2020
- [j5]Shiyao Chen, Yan Zhang, Zunwen He, Jinbo Nie, Wancheng Zhang:
A Novel Attention Cooperative Framework for Automatic Modulation Recognition. IEEE Access 8: 15673-15686 (2020)
2010 – 2019
- 2019
- [j4]Jinbo Nie, Yan Zhang, Zunwen He, Shiyao Chen, Shouliang Gong, Wancheng Zhang:
Deep Hierarchical Network for Automatic Modulation Classification. IEEE Access 7: 94604-94613 (2019) - [j3]Shiyao Chen, Ru Liu, Tingting Cui, Meiqin Wang:
Automatic search method for multiple differentials and its application on MANTIS. Sci. China Inf. Sci. 62(3): 32111:1-32111:15 (2019) - [c12]Yingying Liu, Ji Zhou, Shiyao Chen, Lei Liu:
Muscle segmentation of L3 slice in abdomen CT images based on fully convolutional networks. IPTA 2019: 1-5 - 2016
- [i4]Tingting Cui, Keting Jia, Kai Fu, Shiyao Chen, Meiqin Wang:
New Automatic Search Tool for Impossible Differentials and Zero-Correlation Linear Approximations. IACR Cryptol. ePrint Arch. 2016: 689 (2016) - 2013
- [j2]Shiyao Chen, Lang Tong:
Distributed Learning and Multiaccess of On-Off Channels. IEEE J. Sel. Top. Signal Process. 7(5): 837-845 (2013) - [c11]Shiyao Chen, Timothy Mount, Lang Tong:
Optimizing Operations for Large Scale Charging of Electric Vehicles. HICSS 2013: 2319-2326 - 2012
- [c10]Ting He, Shiyao Chen, Hyoil Kim, Lang Tong, Kang-Won Lee:
Scheduling Parallel Tasks onto Opportunistically Available Cloud Resources. IEEE CLOUD 2012: 180-187 - [c9]Shiyao Chen, Yuting Ji, Lang Tong:
Deadline scheduling for large scale charging of electric vehicles with renewable energy. SAM 2012: 13-16 - [c8]Shiyao Chen, Lang Tong, Qing Zhao:
Delay optimal multichannel opportunistic access. INFOCOM 2012: 1791-1799 - [c7]Ting He, Shiyao Chen, Hyoil Kim, Lang Tong, Kang-Won Lee:
To migrate or to wait: Bandwidth-latency tradeoff in opportunistic scheduling of parallel tasks. INFOCOM 2012: 2871-2875 - [c6]Shiyao Chen, Lang Tong:
iEMS for large scale charging of electric vehicles: Architecture and optimal online scheduling. SmartGridComm 2012: 629-634 - [i3]Shiyao Chen, Lang Tong:
Distributed Learning and Multiaccess of On-Off Channels. CoRR abs/1211.2064 (2012) - 2011
- [j1]Shiyao Chen, Lang Tong:
Maximum Throughput Region of Multiuser Cognitive Access of Continuous Time Markovian Channels. IEEE J. Sel. Areas Commun. 29(10): 1959-1969 (2011) - [c5]Shiyao Chen, Lang Tong, Ting He:
Optimal deadline scheduling with commitment. Allerton 2011: 111-118 - [c4]Shiyao Chen, Lang Tong:
Distributed multiaccess in hierarchical cognitive radio networks. ICASSP 2011: 2968-2971 - [c3]Shiyao Chen, Ting He, Ho Yin Starsky Wong, Kang-Won Lee, Lang Tong:
Secondary Job Scheduling in the Cloud with Deadlines. IPDPS Workshops 2011: 1009-1016 - [i2]Shiyao Chen, Lang Tong, Qing Zhao:
Delay Optimal Multichannel Opportunistic Access. CoRR abs/1108.0128 (2011) - [i1]Shiyao Chen, Lang Tong, Ting He:
Optimal Deadline Scheduling with Commitment. CoRR abs/1110.1124 (2011) - 2010
- [c2]Amine Laourine, Shiyao Chen, Lang Tong:
Queuing Analysis in Multichannel Cognitive Spectrum Access: A Large Deviation Approach. INFOCOM 2010: 1046-1054 - [c1]Shiyao Chen, Lang Tong:
Multiuser cognitive access of continuous time Markov channels: Maximum throughput and effective bandwidth regions. ITA 2010: 472-481
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-22 18:56 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint