default search action
Shaozhen Chen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j21]Huarun Chen, Yijun Liu, Wujian Ye, Jialiang Ye, Yuehai Chen, Shaozhen Chen, Chao Han:
Research on Hardware Acceleration of Traffic Sign Recognition Based on Spiking Neural Network and FPGA Platform. IEEE Trans. Very Large Scale Integr. Syst. 33(2): 499-511 (2025) - 2024
- [j20]Xiaowei Li, Jiongjiong Ren, Shaozhen Chen:
Improved deep learning aided key recovery framework: applications to large-state block ciphers. Frontiers Inf. Technol. Electron. Eng. 25(10): 1406-1420 (2024) - [c5]Shaozhen Chen:
Motion control of two degrees of freedom(2-DOF) manipulator based on fuzzy PID: Motion control of 2-DOF manipulator based on fuzzy PID. ICCIR 2024: 217-223 - [c4]Kangkang Shi, Jiongjiong Ren, Shaozhen Chen:
Related-Tweakey Boomerang and Rectangle Attacks on Reduced-Round Joltik-BC. ISPEC 2024: 94-111 - 2023
- [j19]Zezhou Hou, Jiongjiong Ren, Shaozhen Chen:
Practical Attacks of Round-Reduced SIMON Based on Deep Learning. Comput. J. 66(10): 2517-2534 (2023) - [j18]Jiashuo Liu, Jiongjiong Ren, Shaozhen Chen:
A deep learning aided differential distinguisher improvement framework with more lightweight and universality. Cybersecur. 6(1): 47 (2023) - [j17]Dongdong Lin, Manman Li, Zezhou Hou, Shaozhen Chen:
Conditional differential analysis on the KATAN ciphers based on deep learning. IET Inf. Secur. 17(3): 347-359 (2023) - [j16]Zhangjun Ma, Manman Li, Shaozhen Chen:
Meet-in-the-middle attacks on round-reduced CRAFT based on automatic search. IET Inf. Secur. 17(3): 534-543 (2023) - [j15]Jiashuo Liu, Jiongjiong Ren, Shaozhen Chen, ManMan Li:
Improved neural distinguishers with multi-round and multi-splicing construction. J. Inf. Secur. Appl. 74: 103461 (2023) - [j14]Zhangjun Ma, Manman Li, Shaozhen Chen:
Improved meet-in-the-middle attacks on reduced-round tweakable block ciphers Kiasu-BC and Deoxys-BC. J. King Saud Univ. Comput. Inf. Sci. 35(9): 101765 (2023) - 2022
- [j13]Manman Li, Shaozhen Chen:
Improved Meet-in-the-Middle Attacks on Reduced-Round Tweakable Block Cipher Deoxys-BC. Comput. J. 65(9): 2411-2420 (2022) - [j12]Yuehai Chen, Huarun Chen, Shaozhen Chen, Chao Han, Wujian Ye, Yijun Liu, Huihui Zhou:
DITES: A Lightweight and Flexible Dual-Core Isolated Trusted Execution SoC Based on RISC-V. Sensors 22(16): 5981 (2022) - [c3]Dongdong Lin, Shaozhen Chen, Manman Li, Zezhou Hou:
The Construction and Application of (Related-Key) Conditional Differential Neural Distinguishers on KATAN. CANS 2022: 203-224 - [i11]Jiashuo Liu, Jiongjiong Ren, Shaozhen Chen, ManMan Li:
Improved Neural Distinguishers with Multi-Round and Multi-Splicing Construction. IACR Cryptol. ePrint Arch. 2022: 1279 (2022) - [i10]Jiashuo Liu, Jiongjiong Ren, Shaozhen Chen:
Effective Network Parameter Reduction Schemes for Neural Distinguisher. IACR Cryptol. ePrint Arch. 2022: 1765 (2022) - 2021
- [j11]Manman Li, Shaozhen Chen:
Improved meet-in-the-middle attacks on reduced-round Joltik-BC. IET Inf. Secur. 15(3): 247-255 (2021) - [i9]Zezhou Hou, Jiongjiong Ren, Shaozhen Chen:
Cryptanalysis of Round-Reduced SIMON32 Based on Deep Learning. IACR Cryptol. ePrint Arch. 2021: 362 (2021) - [i8]Zezhou Hou, Jiongjiong Ren, Shaozhen Chen:
Improve Neural Distinguisher for Cryptanalysis. IACR Cryptol. ePrint Arch. 2021: 1017 (2021)
2010 – 2019
- 2019
- [j10]Jiongjiong Ren, Shaozhen Chen:
Cryptanalysis of Reduced-Round SPECK. IEEE Access 7: 63045-63056 (2019) - [j9]Hang Li, Jiongjiong Ren, Shaozhen Chen:
Improved Integral Attack on Reduced-Round Simeck. IEEE Access 7: 118806-118814 (2019) - 2017
- [j8]Yibin Dai, Shaozhen Chen:
Cryptanalysis of full PRIDE block cipher. Sci. China Inf. Sci. 60(5): 052108:1-052108:12 (2017) - [j7]Wentan Yi, Shaozhen Chen, Yuchen Li:
Zero-correlation Linear Cryptanalysis of SAFER Block Cipher Family Using the Undisturbed Bits. Comput. J. 60(4): 613-624 (2017) - 2016
- [j6]Wentan Yi, Shaozhen Chen:
Multidimensional zero-correlation linear cryptanalysis of the block cipher KASUMI. IET Inf. Secur. 10(4): 215-221 (2016) - [j5]Yibin Dai, Shaozhen Chen:
Security analysis of Khudra: a lightweight block cipher for FPGAs. Secur. Commun. Networks 9(10): 1173-1185 (2016) - [c2]Wentan Yi, Baofeng Wu, Shaozhen Chen, Dongdai Lin:
Improved Integral and Zero-correlation Linear Cryptanalysis of CLEFIA Block Cipher. Inscrypt 2016: 33-46 - [i7]Wentan Yi, Shaozhen Chen:
Characterizations of the Degraded Boolean Function and Cryptanalysis of the SAFER Family. IACR Cryptol. ePrint Arch. 2016: 36 (2016) - [i6]Wentan Yi, Shaozhen Chen:
Improved Integral and Zero-correlation Linear Cryptanalysis of Reduced-round CLEFIA Block Cipher. IACR Cryptol. ePrint Arch. 2016: 149 (2016) - 2015
- [j4]Wentan Yi, Shaozhen Chen, Kuanyang Wei:
Zero-Correlation Linear Cryptanalysis of Reduced Round ARIA with Partial-sum and FFT. KSII Trans. Internet Inf. Syst. 9(1): 280-295 (2015) - [j3]Qingbin Wang, Shaozhen Chen:
Attribute-based signature for threshold predicates from lattices. Secur. Commun. Networks 8(5): 811-821 (2015) - [c1]Qingbin Wang, Shaozhen Chen, Aijun Ge:
A New Lattice-Based Threshold Attribute-Based Signature Scheme. ISPEC 2015: 406-420 - 2014
- [i5]Wentan Yi, Shaozhen Chen:
Multidimensional Zero-Correlation Linear Cryptanalysis of the Block Cipher KASUMI. CoRR abs/1404.6100 (2014) - [i4]Wentan Yi, Shaozhen Chen:
Integral Cryptanalysis of the Block Cipher E2. CoRR abs/1405.6483 (2014) - [i3]Wentan Yi, Shaozhen Chen, Kuanyang Wei:
Zero-Correlation Linear Cryptanalysis of Reduced Round ARIA with Partial-sum and FFT. CoRR abs/1406.3240 (2014) - [i2]Wentan Yi, Shaozhen Chen:
Multidimensional Zero-Correlation Linear Attacks on Reduced-Round MISTY1. CoRR abs/1410.4312 (2014) - [i1]Yibin Dai, Shaozhen Chen:
Cryptanalysis of Full PRIDE Block Cipher. IACR Cryptol. ePrint Arch. 2014: 987 (2014) - 2013
- [j2]Linzhen Lu, Shaozhen Chen:
A compress slide attack on the full GOST block cipher. Inf. Process. Lett. 113(17): 634-639 (2013) - 2010
- [j1]Wenqiang Wang, Shaozhen Chen:
Attribute-based ring signature scheme with constant-size signature. IET Inf. Secur. 4(2): 104-110 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-05 21:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint