default search action
Kunpeng Wang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j50]Lingyun Li, Xianhui Lu, Kunpeng Wang:
eBiBa: A Post-Quantum Hash-Based Signature With Small Signature Size in the Continuous Communication of Large-Scale Data. Comput. J. 67(4): 1405-1424 (2024) - [j49]Kunpeng Wang, Xuerui Li, Yanyan Liu, Lican Kang:
A communication-efficient method for generalized linear regression with ℓ 0 regularization. Commun. Stat. Simul. Comput. 53(8): 3850-3867 (2024) - [j48]Ruida Wang, Ziyi Li, Xianhui Lu, Zhenfei Zhang, Kunpeng Wang:
Key derivable signature and its application in blockchain stealth address. Cybersecur. 7(1): 43 (2024) - [j47]Siyang Chen, Han Wang, Zhihua Shen, Kunpeng Wang, Xiaohu Zhang:
Convolutional long-short term memory network for space debris detection and tracking. Knowl. Based Syst. 304: 112535 (2024) - [j46]Yingqing Wang, Guihe Qin, Mi Zou, Yanhua Liang, Guofeng Wang, Kunpeng Wang, Yao Feng, Zizhan Zhang:
A lightweight intrusion detection system for internet of vehicles based on transfer learning and MobileNetV2 with hyper-parameter optimization. Multim. Tools Appl. 83(8): 22347-22369 (2024) - [j45]Kunpeng Wang, Jingmei Li, Weifei Wu:
A novel transfer extreme learning machine from multiple sources for intrusion detection. Peer Peer Netw. Appl. 17(1): 33-47 (2024) - [j44]Han Wang, Siyang Chen, Zhihua Shen, Kunpeng Wang, Meiya Duan, Wenbo Yang, Bin Lin, Xiaohu Zhang:
A Robust Space Target Extraction Algorithm Based on Standardized Correlation Space Construction. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 17: 10188-10202 (2024) - [j43]Zhihao Li, Ying Liu, Xianhui Lu, Ruida Wang, Benqiang Wei, Chunling Chen, Kunpeng Wang:
Faster Bootstrapping via Modulus Raising and Composite NTT. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(1): 563-591 (2024) - [j42]Zhihao Li, Xianhui Lu, Zhiwei Wang, Ruida Wang, Ying Liu, Yinhang Zheng, Lutan Zhao, Kunpeng Wang, Rui Hou:
Faster NTRU-based Bootstrapping in less than 4 ms. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(3): 418-451 (2024) - [j41]Benqiang Wei, Xianhui Lu, Ruida Wang, Kun Liu, Zhihao Li, Kunpeng Wang:
Thunderbird: Efficient Homomorphic Evaluation of Symmetric Ciphers in 3GPP by combining two modes of TFHE. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(3): 530-573 (2024) - [j40]Kunpeng Wang, Zhengzheng Tu, Chenglong Li, Cheng Zhang, Bin Luo:
Learning Adaptive Fusion Bank for Multi-Modal Salient Object Detection. IEEE Trans. Circuits Syst. Video Technol. 34(8): 7344-7358 (2024) - [j39]Kunpeng Wang, Pilar Queralt, Juanjo Ledo, Naser Meqbel:
CSEM and MT Inversion at the Hontomín CO₂ Storage Site in Burgos, Spain. IEEE Trans. Geosci. Remote. Sens. 62: 1-16 (2024) - [j38]Chongxin Yuan, Kunpeng Wang, Wei Luo, Xiangpeng Wang, Wei Peng, Yunbao Yue, Xing Lan, Ning Chen:
2-D Magnetotelluric Gradient Prediction With the Transformer + Unet Network Based on Transverse Magnetic Polarization. IEEE Trans. Geosci. Remote. Sens. 62: 1-10 (2024) - [j37]Chunqi Liu, Yimin Hou, Zhimin Duan, Rui Shang, Kunpeng Wang, Dongsheng Chen:
Underground Power Cable Fault Detection and Localization Based on the Spectrum of Propagation Functions. IEEE Trans. Instrum. Meas. 73: 1-11 (2024) - [c59]Ruida Wang, Benqiang Wei, Zhihao Li, Xianhui Lu, Kunpeng Wang:
TFHE Bootstrapping: Faster, Smaller and Time-Space Trade-Offs. ACISP (1) 2024: 196-216 - [c58]Xiuxiu Li, Wei Yu, Kunpeng Wang:
A Novel Window τNAF on Koblitz Curves. ACISP (1) 2024: 411-428 - [c57]Ruida Wang, Yundi Wen, Zhihao Li, Xianhui Lu, Benqiang Wei, Kun Liu, Kunpeng Wang:
Circuit Bootstrapping: Faster and Smaller. EUROCRYPT (2) 2024: 342-372 - [c56]Ying Liu, Zhihao Li, Ruida Wang, Xianhui Lu, Kunpeng Wang:
Efficient Blind Rotation in FHEW Using Refined Decomposition and NTT. ISC (1) 2024: 315-334 - [c55]Zhengzheng Tu, Danying Lin, Bo Jiang, Le Gu, Kunpeng Wang, Sulan Zhai:
Bidirectional Alternating Fusion Network for RGB-T Salient Object Detection. PRCV (8) 2024: 34-48 - [i15]Kunpeng Wang, Danying Lin, Chenglong Li, Zhengzheng Tu, Bin Luo:
Alignment-Free RGBT Salient Object Detection: Semantics-guided Asymmetric Correlation Network and A Unified Benchmark. CoRR abs/2406.00917 (2024) - [i14]Kunpeng Wang, Zhengzheng Tu, Chenglong Li, Cheng Zhang, Bin Luo:
Learning Adaptive Fusion Bank for Multi-modal Salient Object Detection. CoRR abs/2406.01127 (2024) - [i13]Kunpeng Wang, Danying Lin, Chenglong Li, Zhengzheng Tu, Bin Luo:
Adapting Segment Anything Model to Multi-modal Salient Object Detection with Semantic Feature Fusion Guidance. CoRR abs/2408.15063 (2024) - [i12]Ruida Wang, Yundi Wen, Zhihao Li, Xianhui Lu, Benqiang Wei, Kun Liu, Kunpeng Wang:
Circuit Bootstrapping: Faster and Smaller. IACR Cryptol. ePrint Arch. 2024: 323 (2024) - 2023
- [j36]Yu Wei, Lei Bi, Xianhui Lu, Kunpeng Wang:
Security estimation of LWE via BKW algorithms. Cybersecur. 6(1): 24 (2023) - [j35]Zhengzheng Tu, Wenfang Yang, Kunpeng Wang, Amir Hussain, Bin Luo, Chenglong Li:
Multimodal salient object detection via adversarial learning with collaborative generator. Eng. Appl. Artif. Intell. 119: 105707 (2023) - [j34]Kunpeng Wang, Hao Zhou, Jingxiang Cai, Wenna Li, Juan Yao:
Time-domain adaptive attention network for single-channel speech separation. EURASIP J. Audio Speech Music. Process. 2023(1): 21 (2023) - [j33]Kunpeng Wang, Jingmei Li, Weifei Wu:
Intrusion detection algorithom based on transfer extreme learning machine. Intell. Data Anal. 27(2): 463-482 (2023) - [j32]Kunpeng Wang, Wenjing Lu, Peng Liu, Juan Yao, Huafeng Li:
Multi-stage attention network for monaural speech enhancement. IET Signal Process. 17(3) (2023) - [j31]Xue Du, Xiujuan Sun, Kunpeng Wang, Junlong Yang, Chuanjiang Wang:
Underwater image enhancement method based on entropy weight fusion. Comput. Animat. Virtual Worlds 34(2) (2023) - [j30]Dehua Wang, Gang Li, Zhichun Zhao, Jianwen Wang, Shuai Ding, Kunpeng Wang, Meiya Duan:
Detection Method of Radar Space Target Abnormal Motion via Local Density Peaks and Micro-Motion Feature. IEEE Geosci. Remote. Sens. Lett. 20: 1-5 (2023) - [j29]Xinghua Feng, Kunpeng Wang, Jiangmei Zhang, Jiayue Guan:
A New Measure for Determining the Equivalent Symmetry of Decomposed Subsystems from Large Complex Cyber-Physical Systems. Symmetry 15(1): 37 (2023) - [c54]Hao Zhou, Kunpeng Wang, Juan Yao, Wenhao Yang, Yi Chai:
Anomaly Sound Detection of Industrial Equipment Based on Incremental Learning. SAFEPROCESS 2023: 1-6 - [c53]Zhihao Li, Benqiang Wei, Ruida Wang, Xianhui Lu, Kunpeng Wang:
Full Domain Functional Bootstrapping with Least Significant Bit Encoding. Inscrypt (1) 2023: 203-223 - [c52]Ruida Wang, Zhihao Li, Benqiang Wei, Chunling Chen, Xianhui Lu, Kunpeng Wang:
Revisiting Key Switching Techniques with Applications to Light-Key FHE. ICISC (1) 2023: 41-64 - [c51]Shixin Tian, Zhili Dong, Kunpeng Wang, Chang Lv:
Subfield Attack on NTRU by using symmetric function map. ISIT 2023: 2308-2313 - [c50]Yu Wei, Lei Bi, Kunpeng Wang, Xianhui Lu:
An Improved BKW Algorithm for Solving LWE with Small Secrets. ISC 2023: 578-595 - [c49]Xiuxiu Li, Wei Yu, Kunpeng Wang:
Implementation of the Elliptic Curve Method. SciSec 2023: 115-126 - [c48]Xiuxiu Li, Wei Yu, Kunpeng Wang, Luying Li:
Almost Injective and Invertible Encodings for Jacobi Quartic Curves. SciSec 2023: 127-138 - [i11]Zhengzheng Tu, Qishun Wang, Hongshun Wang, Kunpeng Wang, Chenglong Li:
Erasure-based Interaction Network for RGBT Video Object Detection and A Unified Benchmark. CoRR abs/2308.01630 (2023) - [i10]Yufan Jiang, Qiaozhi He, Xiaomin Zhuang, Zhihua Wu, Kunpeng Wang, Wenlai Zhao, Guangwen Yang:
RecycleGPT: An Autoregressive Language Model with Recyclable Module. CoRR abs/2308.03421 (2023) - [i9]Kunpeng Wang, Chenglong Li, Zhengzheng Tu, Bin Luo:
Unified-modal Salient Object Detection via Adaptive Prompt Learning. CoRR abs/2311.16835 (2023) - 2022
- [j28]Lingyun Li, Xianhui Lu, Kunpeng Wang:
Hash-based signature revisited. Cybersecur. 5(1): 13 (2022) - [j27]Lei Bi, Xianhui Lu, Junjie Luo, Kunpeng Wang, Zhenfei Zhang:
Hybrid dual attack on LWE with arbitrary secrets. Cybersecur. 5(1): 15 (2022) - [j26]Yu Wang, Shunping Zhou, Yuanyuan Liu, Kunpeng Wang, Fang Fang, Haoyue Qian:
ConGNN: Context-consistent cross-graph neural network for group emotion recognition in the wild. Inf. Sci. 610: 707-724 (2022) - [j25]Bin Lin, Xia Yang, Jie Wang, Yangyang Wang, Kunpeng Wang, Xiaohu Zhang:
A Robust Space Target Detection Algorithm Based on Target Characteristics. IEEE Geosci. Remote. Sens. Lett. 19: 1-5 (2022) - [j24]Guanqiu Qi, Yuanchuan Zhang, Kunpeng Wang, Neal Mazur, Yang Liu, Devanshi Malaviya:
Small Object Detection Method Based on Adaptive Spatial Parallel Convolution and Fast Multi-Scale Fusion. Remote. Sens. 14(2): 420 (2022) - [j23]Shuang Li, Fan Li, Kunpeng Wang, Guanqiu Qi, Huafeng Li:
Mutual prediction learning and mixed viewpoints for unsupervised-domain adaptation person re-identification on blockchain. Simul. Model. Pract. Theory 119: 102568 (2022) - [j22]Kunpeng Wang, Zhongren Liu, Zhiqin Zhu, Guanqiu Qi, Juan Yao, Guozhen Miao:
Formation optimization of blockchain-assisted swarm robotics systems against failures based on energy balance. Simul. Model. Pract. Theory 120: 102599 (2022) - [j21]Kunpeng Wang, Wenjing Lu, Hao Zhou, Juan Yao:
Speech Enhancement Model Synthesis Based on Federal Learning for Industrial CPS in Multiple Noise Conditions. Symmetry 14(11): 2285 (2022) - [j20]Jianghong Han, Gang Li, Kunpeng Wang, Meiya Duan, Xiao-Ping Zhang:
1-Bit Radar Imaging Based on Adversarial Samples. IEEE Trans. Geosci. Remote. Sens. 60: 1-13 (2022) - [j19]Bin Lin, Lijun Zhong, Sheng Zhuge, Xia Yang, Yang Yang, Kunpeng Wang, Xiaohu Zhang:
A New Pattern for Detection of Streak-Like Space Target From Single Optical Images. IEEE Trans. Geosci. Remote. Sens. 60: 1-13 (2022) - [j18]Jianwen Wang, Gang Li, Zhichun Zhao, Jian Jiao, Shuai Ding, Kunpeng Wang, Meiya Duan:
Space Target Anomaly Detection Based on Gaussian Mixture Model and Micro-Doppler Features. IEEE Trans. Geosci. Remote. Sens. 60: 1-11 (2022) - [c47]Lei Bi, Xianhui Lu, Junjie Luo, Kunpeng Wang:
Hybrid Dual and Meet-LWE Attack. ACISP 2022: 168-188 - [c46]Zhili Dong, Shixin Tian, Kunpeng Wang, Chang Lv:
Subfield Attacks on HSVP in Ideal Lattices. Inscrypt 2022: 447-462 - [c45]Simeng Yuan, Wei Yu, Kunpeng Wang, Xiuxiu Li:
Partial Key Exposure Attacks on RSA with Moduli N=prqs. ISIT 2022: 1436-1440 - [c44]Xiuxiu Li, Wei Yu, Kunpeng Wang:
Efficient Scalar Multiplication on Koblitz Curves with Pre-computation. ISC 2022: 162-172 - [i8]Kunpeng Wang, Yuexi Dong, Yunpu Zeng, Zhichun Ye, Yangzhe Wang:
A CT-Based Airway Segmentation Using U2-net Trained by the Dice Loss Function. CoRR abs/2209.10796 (2022) - [i7]Lei Bi, Xianhui Lu, Junjie Luo, Kunpeng Wang:
Hybrid Dual and Meet-LWE Attack. IACR Cryptol. ePrint Arch. 2022: 1330 (2022) - 2021
- [j17]Kunpeng Wang, Jingxiang Cai, Juan Yao, Peng Liu, Zhiqin Zhu:
Co-teaching based pseudo label refinery for cross-domain object detection. IET Image Process. 15(13): 3189-3199 (2021) - [j16]Qiang He, Yu Chen, Kunpeng Wang:
Study on the hydrodynamic behaviour of journal bearing with herringbone grooved sleeve considering cavitation. Int. J. Comput. Sci. Math. 13(3): 283-300 (2021) - [j15]Shuo Wang, Tonghai Wu, Kunpeng Wang, Zhongxiao Peng, Ngaiming Kwok, Thompson Sarkodie-Gyan:
3-D Particle Surface Reconstruction From Multiview 2-D Images With Structure From Motion and Shape From Shading (January 2020). IEEE Trans. Ind. Electron. 68(2): 1626-1635 (2021) - [i6]Lei Bi, Xianhui Lu, Junjie Luo, Kunpeng Wang, Zhenfei Zhang:
Hybrid Dual Attack on LWE with Arbitrary Secrets. IACR Cryptol. ePrint Arch. 2021: 152 (2021) - 2020
- [j14]Haipeng Liu, Yuheng Wang, Anfu Zhou, Hanyue He, Wei Wang, Kunpeng Wang, Peilin Pan, Yixuan Lu, Liang Liu, Huadong Ma:
Real-time Arm Gesture Recognition in Smart Home Scenarios via Millimeter Wave Sensing. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 4(4): 140:1-140:28 (2020) - [j13]Shuo Wang, Tonghai Wu, Kunpeng Wang, Thompson Sarkodie-Gyan:
Ferrograph Analysis With Improved Particle Segmentation and Classification Methods. J. Comput. Inf. Sci. Eng. 20(2) (2020) - [j12]Qinju Liu, Xianhui Lu, Fucai Luo, Shuai Zhou, Jingnan He, Kunpeng Wang:
SecureBP from Homomorphic Encryption. Secur. Commun. Networks 2020: 5328059:1-5328059:9 (2020) - [j11]Kunpeng Wang, Mingyao Zheng, Hongyan Wei, Guanqiu Qi, Yuanyuan Li:
Multi-Modality Medical Image Fusion Using Convolutional Neural Network and Contrast Pyramid. Sensors 20(8): 2169 (2020)
2010 – 2019
- 2019
- [j10]Chuanxiao Yang, Liang Ding, Kunpeng Wang, Rong Song, Dewei Tang, Haibo Gao, Zongquan Deng:
The Effects of Walking Speed and Hardness of Terrain on the Foot-Terrain Interaction and Driving Torque for Planar Human Walking. IEEE Access 7: 56174-56189 (2019) - [j9]Tongchen Shen, Fuqun Wang, Kefei Chen, Kunpeng Wang, Bao Li:
Efficient Leveled (Multi) Identity-Based Fully Homomorphic Encryption Schemes. IEEE Access 7: 79299-79310 (2019) - [j8]Yan Zhao, Yujie Ning, Feng Zhang, Miao Ding, Yan Wen, Liang Shi, Kunpeng Wang, Mengnan Lu, Jingyan Sun, Menglu Wu, Bolun Cheng, Mei Ma, Lu Zhang, Shiqiang Cheng, Hui Shen, Qing Tian, Xiong Guo, Hong-Wen Deng:
PCA-based GRS analysis enhances the effectiveness for genetic correlation detection. Briefings Bioinform. 20(6): 2291-2298 (2019) - [j7]Fucai Luo, Fuqun Wang, Kunpeng Wang, Kefei Chen:
Fully homomorphic encryption based on the ring learning with rounding problem. IET Inf. Secur. 13(6): 639-648 (2019) - [j6]Fucai Luo, Fuqun Wang, Kunpeng Wang, Kefei Chen:
A more efficient leveled strongly-unforgeable fully homomorphic signature scheme. Inf. Sci. 480: 70-89 (2019) - [c43]Xiu Xu, Haiyang Xue, Kunpeng Wang, Man Ho Au, Song Tian:
Strongly Secure Authenticated Key Exchange from Supersingular Isogenies. ASIACRYPT (1) 2019: 278-308 - [c42]Liang Qiao, Hongkun Yu, Kunpeng Wang, Ruixin Sun, Wenlai Zhao, Haohuan Fu, Guangwen Yang:
Large-scale Parallel Design for Cryo-EM Structure Determination on Heterogeneous Many-core Architectures. BIBM 2019: 711-716 - [c41]Lei Shi, Kunpeng Wang, Zhen Liu:
Design, Development and Testing of a Wearable sEMG Acquisition System. DASC/PiCom/DataCom/CyberSciTech 2019: 527-532 - [c40]Guanyu Wang, Kunpeng Wang, Liang Ding, Haibo Gao, Haitao Yu, Zongquan Deng:
Analysis of Joint Torque under Single Movement Cycle of Underwater Legged Robot. ICARM 2019: 773-779 - [c39]Kunpeng Wang, Shizhen Xu, Haohuan Fu, Hongkun Yu, Wenlai Zhao, Guangwen Yang:
Parallelizing cryo-EM 3D reconstruction on GPU cluster with a partitioned and streamed model. ICS 2019: 13-23 - [c38]Xiu Xu, Christopher Leonardi, Anzo Teh, David Jao, Kunpeng Wang, Wei Yu, Reza Azarderakhsh:
Improved Digital Signatures Based on Elliptic Curve Endomorphism Rings. ISPEC 2019: 293-309 - [c37]Kunpeng Wang, Shizhen Xu, Hongkun Yu, Haohuan Fu, Guangwen Yang:
GPU-based 3D cryo-EM reconstruction with key-value streams: poster. PPoPP 2019: 421-422 - 2018
- [j5]Song Tian, Bao Li, Kunpeng Wang, Wei Yu:
Cover attacks for elliptic curves with cofactor two. Des. Codes Cryptogr. 86(11): 2451-2468 (2018) - [j4]Fucai Luo, Fuqun Wang, Kunpeng Wang, Jie Li, Kefei Chen:
LWR-Based Fully Homomorphic Encryption, Revisited. Secur. Commun. Networks 2018: 5967635:1-5967635:12 (2018) - [c36]Shuai Zhou, Haiyang Xue, Daode Zhang, Kunpeng Wang, Xianhui Lu, Bao Li, Jingnan He:
Preprocess-then-NTT Technique and Its Applications to Kyber and NewHope. Inscrypt 2018: 117-137 - [c35]Yuanyuan Gao, Kunpeng Wang:
Probability Preservation Property with Relative Error and Its Applications. ICISSP 2018: 461-468 - [c34]Fucai Luo, Kunpeng Wang, Changlu Lin:
Leveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with Rounding. ISPEC 2018: 101-115 - [c33]Fucai Luo, Kunpeng Wang:
Verifiable Decryption for Fully Homomorphic Encryption. ISC 2018: 347-365 - [i5]Xiu Xu, Haiyang Xue, Kunpeng Wang, Song Tian, Bei Liang, Wei Yu:
Strongly Secure Authenticated Key Exchange from Supersingular Isogeny. IACR Cryptol. ePrint Arch. 2018: 760 (2018) - [i4]Shuai Zhou, Haiyang Xue, Daode Zhang, Kunpeng Wang, Xianhui Lu, Bao Li, Jingnan He:
Preprocess-then-NTT Technique and Its Applications to KYBER and NEWHOPE. IACR Cryptol. ePrint Arch. 2018: 995 (2018) - 2017
- [j3]Kunpeng Wang, Guanqiu Qi, Zhiqin Zhu, Yi Chai:
A Novel Geometric Dictionary Construction Approach for Sparse Representation Based Image Fusion. Entropy 19(7): 306 (2017) - [c32]Xiaoyang He, Wei Yu, Kunpeng Wang:
Hashing into Twisted Jacobi Intersection Curves. Inscrypt 2017: 117-138 - [c31]Jie Li, Daode Zhang, Xianhui Lu, Kunpeng Wang:
Compact (Targeted Homomorphic) Inner Product Encryption from LWE. ICICS 2017: 132-140 - 2016
- [c30]Wei Yu, Kunpeng Wang, Bao Li, Xiaoyang He, Song Tian:
Deterministic Encoding into Twisted Edwards Curves. ACISP (2) 2016: 285-297 - [c29]Xiu Xu, Wei Yu, Kunpeng Wang, Xiaoyang He:
Constructing Isogenies on Extended Jacobi Quartic Curves. Inscrypt 2016: 416-427 - [c28]Jie Li, Yuanhong Zhong, Zhongyou Song, Yao Zhou, Tao Chen, Kunpeng Wang:
Management of Machine Room in Power System Based on Intelligent Monitoring. iThings/GreenCom/CPSCom/SmartData 2016: 631-635 - 2015
- [c27]Xiaoyang He, Wei Yu, Kunpeng Wang:
Hashing into Generalized Huff Curves. Inscrypt 2015: 22-44 - [c26]Weixuan Li, Wei Yu, Kunpeng Wang:
Improved Tripling on Elliptic Curves. Inscrypt 2015: 193-205 - [c25]Weixuan Li, Wei Yu, Kunpeng Wang:
Analysis of Fractional ωmbNAF for Scalar Multiplication. ISPEC 2015: 109-120 - [c24]Song Tian, Wei Yu, Bao Li, Kunpeng Wang:
Models of Curves from GHS Attack in Odd Characteristic. ISPEC 2015: 171-180 - [c23]Song Tian, Wei Yu, Bao Li, Kunpeng Wang:
Some Elliptic Subcovers of Genus 3 Hyperelliptic Curves. ISPEC 2015: 181-191 - [c22]Fuqun Wang, Kunpeng Wang, Bao Li, Yuanyuan Gao:
Leveled Strongly-Unforgeable Identity-Based Fully Homomorphic Signatures. ISC 2015: 42-60 - [c21]Wei Yu, Kunpeng Wang, Bao Li, Xiaoyang He, Song Tian:
Hashing into Jacobi Quartic Curves. ISC 2015: 355-375 - [c20]Fuqun Wang, Kunpeng Wang, Bao Li:
LWE-Based FHE with Better Parameters. IWSEC 2015: 175-192 - [c19]Fuqun Wang, Kunpeng Wang, Bao Li:
An Efficient Leveled Identity-Based FHE. NSS 2015: 303-315 - 2014
- [c18]Haiyang Xue, Bao Li, Xianhui Lu, Kunpeng Wang, Yamin Liu:
On the Lossiness of 2 k -th Power and the Instantiability of Rabin-OAEP. CANS 2014: 34-49 - [c17]Fuqun Wang, Kunpeng Wang:
Fully Homomorphic Encryption with Auxiliary Inputs. Inscrypt 2014: 220-238 - [c16]Song Tian, Kunpeng Wang, Bao Li, Wei Yu:
A Note on Diem's Proof. Inscrypt 2014: 463-471 - 2013
- [c15]Wei Yu, Kunpeng Wang, Bao Li, Song Tian:
On the Expansion Length Of Triple-Base Number Systems. AFRICACRYPT 2013: 424-432 - [c14]Wei Yu, Kunpeng Wang, Bao Li, Song Tian:
Triple-Base Number System for Scalar Multiplication. AFRICACRYPT 2013: 433-451 - [c13]Shan Chen, Kunpeng Wang, Dongdai Lin, Tao Wang:
Omega Pairing on Hyperelliptic Curves. Inscrypt 2013: 167-184 - [c12]Bo Li, Jingjie Zhang, Mingyu Chen, Jinchao Zhang, Kunpeng Wang, Dan Meng:
DIFTSAS: A DIstributed Full Text Search and Analysis System for Big Data. CSE 2013: 1303-1309 - [c11]Neal S. Wade, Kunpeng Wang, Matthieu Michel, Tom Willis:
Demonstration of a 200 kW/200 kWh energy storage system on an 11kV UK distribution feeder. ISGT Europe 2013: 1-5 - [c10]Wei Yu, Kunpeng Wang, Bao Li, Song Tian:
About Hash into Montgomery Form Elliptic Curves. ISPEC 2013: 147-159 - [c9]Wei Yu, Kunpeng Wang, Bao Li, Song Tian:
Joint Triple-Base Number System for Multi-Scalar Multiplication. ISPEC 2013: 160-173 - [c8]Xusheng Zhang, Kunpeng Wang:
Fast Symmetric Pairing Revisited. Pairing 2013: 131-148 - 2012
- [c7]Xusheng Zhang, Kunpeng Wang, Dongdai Lin:
On Efficient Pairings on Elliptic Curves over Extension Fields. Pairing 2012: 1-18 - [c6]Shan Chen, Kunpeng Wang, Dongdai Lin:
An Improved Twisted Ate Pairing over KSS Curves with k = 18. Pairing 2012: 35-45 - [i3]Xusheng Zhang, Kunpeng Wang, Dongdai Lin:
On Efficient Pairings on Elliptic Curves over Extension Fields. IACR Cryptol. ePrint Arch. 2012: 247 (2012) - 2011
- [c5]Lijun Zhang, Kunpeng Wang, Hong Wang, Dingfeng Ye:
Another Elliptic Curve Model for Faster Pairing Computation. ISPEC 2011: 432-446 - 2010
- [j2]Xuemei Li, Caiming Zhang, Yizhen Yue, Kunpeng Wang:
Cubic surface fitting to image by combination. Sci. China Inf. Sci. 53(7): 1287-1295 (2010) - [c4]Yazhe Zhang, Kunpeng Wang, Bao Li:
A Deniable Group Key Establishment Protocol in the Standard Model. ISPEC 2010: 308-323 - [i2]Hong Wang, Kunpeng Wang, Lijun Zhang, Bao Li:
Pairing Computation on Elliptic Curves of Jacobi Quartic Form. IACR Cryptol. ePrint Arch. 2010: 475 (2010)
2000 – 2009
- 2009
- [c3]Ming Li, Kunpeng Wang:
New Greedy Algorithm for Computing Double-Base Chains. IAS 2009: 445-450 - 2007
- [j1]Quanlong Wang, Kunpeng Wang, Zongduo Dai:
On optimal simultaneous rational approximation to (omega, omega2)tau with omega being some kind of cubic algebraic function. J. Approx. Theory 148(2): 194-210 (2007) - 2006
- [c2]Zhiqiang Gu, Gangyan Li, Kunpeng Wang:
A Workflow Management System for Dynamic Alliance. PROLAMAT 2006: 950-959 - [c1]Quanlong Wang, Kunpeng Wang, Zongduo Dai:
Implementation of Multi-continued Fraction Algorithm and Application to Multi-sequence Linear Synthesis. SETA 2006: 248-258 - 2005
- [i1]Kunpeng Wang, Bao Li:
Computation of Tate Pairing for Supersingular Curves over characteristic 5 and 7. IACR Cryptol. ePrint Arch. 2005: 374 (2005)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-13 23:43 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint