Journal: Science in China Series F: Information Sciences

Volume 59, Issue 5

0 -- 0Anfan Zhang, Shugen Ma, Bin Li, Minghui Wang, Xian Guo, Yuechao Wang. Adaptive controller design for underwater snake robot with unmatched uncertainties
0 -- 0Haibin Duan, Han Li, Qinan Luo, Cong Zhang, Cong Li, Pei Li, Yimin Deng. A binocular vision-based UAVs autonomous aerial refueling platform
0 -- 0Yong Zhao, Shengjie Lu, Hailong Qian, Pengcheng Yao. Robust mesh deformation with salient features preservation
0 -- 0Peilian Guo, Yuzhen Wang, Haitao Li. Stable degree analysis for strategy profiles of evolutionary networked games
0 -- 0Yuanjun Laili, Lin Zhang, Fei Tao, Ping Chuan Ma. Rotated neighbor learning-based auto-configured evolutionary algorithm
0 -- 0Gang Yang, Xingshe Zhou. Intelligent CPS: features and challenges
0 -- 0Hai Jin, Weiqi Dai, Deqing Zou. Theory and methodology of research on cloud security
0 -- 0Yanlong Zhao, Wenjian Bi, Ting Wang. Iterative parameter estimate with batched binary-valued observations
0 -- 0Hongbo Yu, Yonglin Hao, Dongxia Bai. Evaluate the security margins of SHA-512, SHA-256 and DHA-256 against the boomerang attack
0 -- 0Dave Towey, Yunwei Dong, Chang-ai Sun, Tsong Yueh Chen. Metamorphic testing as a test case selection strategy
0 -- 0Song Li, Hai-Xin Duan, Zhiliang Wang, Jinjin Liang, Xing Li. An accurate distributed scheme for detection of prefix interception
0 -- 0Ling Du, Xiaochun Cao, Wei Zhang, Xinpeng Zhang, Na Liu, Jianguo Wei. Semi-fragile watermarking for image authentication based on compressive sensing
0 -- 0Lin Xu, Shaobo Lin, ZongBen Xu. Learning capability of the truncated greedy algorithm
0 -- 0Xiushan Nie, Yane Chai, Ju Liu, Jiande Sun, Yilong Yin. Spherical torus-based video hashing for near-duplicate video detection
0 -- 0Fengrong Zhang, Shixiong Xia, Pantelimon Stanica, Yu Zhou. Further results on constructions of generalized bent Boolean functions
0 -- 0Lulu Wang, Bixin Li, Hareton Leung. A new method to encode calling contexts with recursions
0 -- 0Jinhui Liu, Huanguo Zhang, Jianwei Jia, Houzhen Wang, Shaowu Mao, Wanqing Wu. Cryptanalysis of an asymmetric cipher protocol using a matrix decomposition problem
0 -- 0Xiaoge Zhang, Andrew Adamatzky, Xin-She Yang, Hai Yang, Sankaran Mahadevan, Yong Deng. A Physarum-inspired approach to supply chain network design
0 -- 0Xiai Chen, Zhi Han, Yao Wang, Yandong Tang, Haibin Yu. Nonconvex plus quadratic penalized low-rank and sparse decomposition for noisy image alignment
0 -- 0Jianfei Huang, Yu Kang, Bin Meng, Yun-Bo Zhao, Haibo Ji. Characteristic model based adaptive controller design and analysis for a class of SISO systems
0 -- 0Dayou Liu, Bo Yang 0002, Shang Gao, Yungang Zhu, Yong Lai. Intelligent CPSS and its application to health care computing
0 -- 0Huaimin Wang, Bo Ding. Growing construction and adaptive evolution of complex software systems
0 -- 0Debiao He, Neeraj Kumar, Han Shen, Jong-Hyouk Lee. One-to-many authentication for access control in mobile pay-TV systems
0 -- 0Fei Yan, Abdullah M. Iliyasu, Huamin Yang, Kaoru Hirota. Strategy for quantum image stabilization
0 -- 0Zhenfu Cao. New trends of information security - how to change people's life style?
0 -- 0Wei Huang, Xianfeng Zhao. Novel cover selection criterion for spatial steganography using linear pixel prediction error
0 -- 0Eric Madelaine, Min Zhang. Towards a bisimulation theory for open synchronized networks of automata
0 -- 0Xiao-Shan Gao, Zhenyu Huang. Solving Boolean equation systems and applications in cryptanalysis