0 | -- | 0 | Yibin Dai, Shaozhen Chen. Cryptanalysis of full PRIDE block cipher |
0 | -- | 0 | Di Lu, Jianfeng Ma, Cong Sun, XinDi Ma, Ning Xi. Credit-based scheme for security-aware and fairness-aware resource allocation in cloud computing |
0 | -- | 0 | Yupeng Jiang, Qun-Xiong Zheng, Dongdai Lin. On s-uniform property of compressing sequences derived from primitive sequences modulo odd prime powers |
0 | -- | 0 | Shuo Qiu, Jiqiang Liu, Yanfeng Shi, Rui Zhang. Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack |
0 | -- | 0 | Xiang Zhang, Yiyong Huang, Xiaoqian Chen. Analysis and design of parameters in soft docking of micro/small satellites |
0 | -- | 0 | Ding Wang, Chaoxu Mu. Developing nonlinear adaptive optimal regulators through an improved neural learning mechanism |
0 | -- | 0 | Zhongliang Jing, Bin Xu, Fuchun Sun, George Z. Zhu. Editorial |
0 | -- | 0 | Zhongliang Jing, Lingfeng Qiao, Han Pan, Yongsheng Yang, Wujun Chen. An overview of the configuration and manipulation of soft robotics for on-orbit servicing |
0 | -- | 0 | Zhejun Fang, Qixu Liu, Yuqing Zhang, Kai Wang, Zhiqiang Wang, Qianru Wu. A static technique for detecting input validation vulnerabilities in Android apps |
0 | -- | 0 | Deshan Meng, Houde Liu, Yanan Li, Wenfu Xu, Bin Liang. Vibration suppression of a large flexible spacecraft for on-orbit operation |
0 | -- | 0 | Fei Lyu, Feng Tian, Guozhong Dai, Hongan Wang. Tilting-Twisting-Rolling: a pen-based technique for compass geometric construction |
0 | -- | 0 | Yu Ding, Tao Wei, Hui Xue, Yulong Zhang, Chao Zhang, Xinhui Han. Accurate and efficient exploit capture and classification |
0 | -- | 0 | Haibo Hong, Licheng Wang, Haseeb Ahmad, Yixian Yang, Zhiguo Qu. Minimum length key in MST cryptosystems |
50202 | -- | 0 | Bin Xu 0003, Yuan Yuan. Two performance enhanced control of flexible-link manipulator with system uncertainty and disturbances |
52101 | -- | 0 | Huige Wang, Kefei Chen, Baodong Qin, Xuejia Lai, Yunhua Wen. A new construction on randomized message-locked encryption in the standard model via UCEs |
52104 | -- | 0 | Debiao He, Ding Wang, Qi Xie, Kefei Chen. Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation |
52107 | -- | 0 | Xuexian Hu, Jiang Zhang, Zhenfeng Zhang, Jing Xu. Universally composable anonymous password authenticated key exchange |
52109 | -- | 0 | Huafei Zhu. An efficient protocol for secure multicast key distribution in the presence of adaptive adversaries |
52201 | -- | 0 | Yi Zeng 0001, Tielin Zhang, Bo Xu. Improving multi-layer spiking neural networks by incorporating brain-inspired rules |
52501 | -- | 0 | Zhen Wang, Lixin He. Quantifying quantum information resources: a numerical study |
59101 | -- | 0 | Jingyu Feng, Guangyue Lu, Yuqing Zhang, Honggang Wang. Avoiding monopolization: mutual-aid collusive attack detection in cooperative spectrum sensing |
59102 | -- | 0 | Yong Li, Xiao-Feng Meng, Qiang Zhang, Jiang Zhang, Chang-Qing Wang. Common patterns of online collective attention flow |