


Остановите войну!
for scientists:


default search action
Kunpeng Wang
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j30]Zhengzheng Tu, Wenfang Yang, Kunpeng Wang, Amir Hussain, Bin Luo
, Chenglong Li:
Multimodal salient object detection via adversarial learning with collaborative generator. Eng. Appl. Artif. Intell. 119: 105707 (2023) - [j29]Xinghua Feng, Kunpeng Wang, Jiangmei Zhang, Jiayue Guan:
A New Measure for Determining the Equivalent Symmetry of Decomposed Subsystems from Large Complex Cyber-Physical Systems. Symmetry 15(1): 37 (2023) - 2022
- [j28]Lingyun Li
, Xianhui Lu, Kunpeng Wang:
Hash-based signature revisited. Cybersecur. 5(1): 13 (2022) - [j27]Lei Bi
, Xianhui Lu, Junjie Luo, Kunpeng Wang, Zhenfei Zhang:
Hybrid dual attack on LWE with arbitrary secrets. Cybersecur. 5(1): 15 (2022) - [j26]Yu Wang, Shunping Zhou, Yuanyuan Liu, Kunpeng Wang, Fang Fang, Haoyue Qian:
ConGNN: Context-consistent cross-graph neural network for group emotion recognition in the wild. Inf. Sci. 610: 707-724 (2022) - [j25]Bin Lin, Xia Yang, Jie Wang, Yangyang Wang, Kunpeng Wang, Xiaohu Zhang
:
A Robust Space Target Detection Algorithm Based on Target Characteristics. IEEE Geosci. Remote. Sens. Lett. 19: 1-5 (2022) - [j24]Guanqiu Qi
, Yuanchuan Zhang
, Kunpeng Wang, Neal Mazur, Yang Liu, Devanshi Malaviya:
Small Object Detection Method Based on Adaptive Spatial Parallel Convolution and Fast Multi-Scale Fusion. Remote. Sens. 14(2): 420 (2022) - [j23]Shuang Li
, Fan Li, Kunpeng Wang, Guanqiu Qi
, Huafeng Li
:
Mutual prediction learning and mixed viewpoints for unsupervised-domain adaptation person re-identification on blockchain. Simul. Model. Pract. Theory 119: 102568 (2022) - [j22]Kunpeng Wang, Zhongren Liu, Zhiqin Zhu
, Guanqiu Qi
, Juan Yao, Guozhen Miao:
Formation optimization of blockchain-assisted swarm robotics systems against failures based on energy balance. Simul. Model. Pract. Theory 120: 102599 (2022) - [j21]Kunpeng Wang
, Wenjing Lu, Hao Zhou, Juan Yao:
Speech Enhancement Model Synthesis Based on Federal Learning for Industrial CPS in Multiple Noise Conditions. Symmetry 14(11): 2285 (2022) - [j20]Jianghong Han
, Gang Li
, Kunpeng Wang, Meiya Duan, Xiao-Ping Zhang
:
1-Bit Radar Imaging Based on Adversarial Samples. IEEE Trans. Geosci. Remote. Sens. 60: 1-13 (2022) - [j19]Bin Lin
, Lijun Zhong, Sheng Zhuge
, Xia Yang, Yang Yang
, Kunpeng Wang, Xiaohu Zhang
:
A New Pattern for Detection of Streak-Like Space Target From Single Optical Images. IEEE Trans. Geosci. Remote. Sens. 60: 1-13 (2022) - [j18]Jianwen Wang
, Gang Li
, Zhichun Zhao
, Jian Jiao, Shuai Ding, Kunpeng Wang, Meiya Duan:
Space Target Anomaly Detection Based on Gaussian Mixture Model and Micro-Doppler Features. IEEE Trans. Geosci. Remote. Sens. 60: 1-11 (2022) - [c47]Lei Bi, Xianhui Lu, Junjie Luo, Kunpeng Wang:
Hybrid Dual and Meet-LWE Attack. ACISP 2022: 168-188 - [c46]Zhili Dong, Shixin Tian, Kunpeng Wang, Chang Lv:
Subfield Attacks on HSVP in Ideal Lattices. Inscrypt 2022: 447-462 - [c45]Simeng Yuan, Wei Yu, Kunpeng Wang, Xiuxiu Li:
Partial Key Exposure Attacks on RSA with Moduli N=prqs. ISIT 2022: 1436-1440 - [c44]Xiuxiu Li
, Wei Yu
, Kunpeng Wang:
Efficient Scalar Multiplication on Koblitz Curves with Pre-computation. ISC 2022: 162-172 - [i8]Kunpeng Wang, Yuexi Dong, Yunpu Zeng, Zhichun Ye, Yangzhe Wang:
A CT-Based Airway Segmentation Using U2-net Trained by the Dice Loss Function. CoRR abs/2209.10796 (2022) - [i7]Lei Bi, Xianhui Lu, Junjie Luo, Kunpeng Wang:
Hybrid Dual and Meet-LWE Attack. IACR Cryptol. ePrint Arch. 2022: 1330 (2022) - 2021
- [j17]Kunpeng Wang
, Jingxiang Cai
, Juan Yao
, Peng Liu
, Zhiqin Zhu
:
Co-teaching based pseudo label refinery for cross-domain object detection. IET Image Process. 15(13): 3189-3199 (2021) - [j16]Qiang He, Yu Chen, Kunpeng Wang:
Study on the hydrodynamic behaviour of journal bearing with herringbone grooved sleeve considering cavitation. Int. J. Comput. Sci. Math. 13(3): 283-300 (2021) - [j15]Shuo Wang
, Tonghai Wu
, Kunpeng Wang
, Zhongxiao Peng
, Ngaiming Kwok
, Thompson Sarkodie-Gyan
:
3-D Particle Surface Reconstruction From Multiview 2-D Images With Structure From Motion and Shape From Shading (January 2020). IEEE Trans. Ind. Electron. 68(2): 1626-1635 (2021) - [i6]Lei Bi
, Xianhui Lu, Junjie Luo, Kunpeng Wang, Zhenfei Zhang:
Hybrid Dual Attack on LWE with Arbitrary Secrets. IACR Cryptol. ePrint Arch. 2021: 152 (2021) - 2020
- [j14]Haipeng Liu, Yuheng Wang, Anfu Zhou, Hanyue He, Wei Wang, Kunpeng Wang, Peilin Pan, Yixuan Lu, Liang Liu, Huadong Ma:
Real-time Arm Gesture Recognition in Smart Home Scenarios via Millimeter Wave Sensing. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 4(4): 140:1-140:28 (2020) - [j13]Shuo Wang, Tonghai Wu, Kunpeng Wang, Thompson Sarkodie-Gyan:
Ferrograph Analysis With Improved Particle Segmentation and Classification Methods. J. Comput. Inf. Sci. Eng. 20(2) (2020) - [j12]Qinju Liu
, Xianhui Lu, Fucai Luo, Shuai Zhou, Jingnan He, Kunpeng Wang:
SecureBP from Homomorphic Encryption. Secur. Commun. Networks 2020: 5328059:1-5328059:9 (2020) - [j11]Kunpeng Wang
, Mingyao Zheng, Hongyan Wei, Guanqiu Qi
, Yuanyuan Li:
Multi-Modality Medical Image Fusion Using Convolutional Neural Network and Contrast Pyramid. Sensors 20(8): 2169 (2020)
2010 – 2019
- 2019
- [j10]Chuanxiao Yang
, Liang Ding, Kunpeng Wang, Rong Song
, Dewei Tang, Haibo Gao, Zongquan Deng:
The Effects of Walking Speed and Hardness of Terrain on the Foot-Terrain Interaction and Driving Torque for Planar Human Walking. IEEE Access 7: 56174-56189 (2019) - [j9]Tongchen Shen
, Fuqun Wang
, Kefei Chen, Kunpeng Wang, Bao Li:
Efficient Leveled (Multi) Identity-Based Fully Homomorphic Encryption Schemes. IEEE Access 7: 79299-79310 (2019) - [j8]Yan Zhao, Yujie Ning, Feng Zhang
, Miao Ding, Yan Wen, Liang Shi, Kunpeng Wang, Mengnan Lu, Jingyan Sun, Menglu Wu, Bolun Cheng, Mei Ma, Lu Zhang, Shiqiang Cheng, Hui Shen, Qing Tian, Xiong Guo, Hong-Wen Deng:
PCA-based GRS analysis enhances the effectiveness for genetic correlation detection. Briefings Bioinform. 20(6): 2291-2298 (2019) - [j7]Fucai Luo, Fuqun Wang, Kunpeng Wang, Kefei Chen:
Fully homomorphic encryption based on the ring learning with rounding problem. IET Inf. Secur. 13(6): 639-648 (2019) - [j6]Fucai Luo, Fuqun Wang, Kunpeng Wang, Kefei Chen:
A more efficient leveled strongly-unforgeable fully homomorphic signature scheme. Inf. Sci. 480: 70-89 (2019) - [c43]Xiu Xu, Haiyang Xue, Kunpeng Wang, Man Ho Au, Song Tian:
Strongly Secure Authenticated Key Exchange from Supersingular Isogenies. ASIACRYPT (1) 2019: 278-308 - [c42]Liang Qiao, Hongkun Yu, Kunpeng Wang, Ruixin Sun, Wenlai Zhao, Haohuan Fu, Guangwen Yang:
Large-scale Parallel Design for Cryo-EM Structure Determination on Heterogeneous Many-core Architectures. BIBM 2019: 711-716 - [c41]Lei Shi, Kunpeng Wang, Zhen Liu:
Design, Development and Testing of a Wearable sEMG Acquisition System. DASC/PiCom/DataCom/CyberSciTech 2019: 527-532 - [c40]Guanyu Wang, Kunpeng Wang, Liang Ding, Haibo Gao, Haitao Yu, Zongquan Deng:
Analysis of Joint Torque under Single Movement Cycle of Underwater Legged Robot. ICARM 2019: 773-779 - [c39]Kunpeng Wang, Shizhen Xu, Haohuan Fu, Hongkun Yu, Wenlai Zhao, Guangwen Yang:
Parallelizing cryo-EM 3D reconstruction on GPU cluster with a partitioned and streamed model. ICS 2019: 13-23 - [c38]Xiu Xu, Christopher Leonardi, Anzo Teh, David Jao
, Kunpeng Wang, Wei Yu, Reza Azarderakhsh:
Improved Digital Signatures Based on Elliptic Curve Endomorphism Rings. ISPEC 2019: 293-309 - [c37]Kunpeng Wang, Shizhen Xu, Hongkun Yu, Haohuan Fu, Guangwen Yang:
GPU-based 3D cryo-EM reconstruction with key-value streams: poster. PPoPP 2019: 421-422 - 2018
- [j5]Song Tian, Bao Li, Kunpeng Wang, Wei Yu:
Cover attacks for elliptic curves with cofactor two. Des. Codes Cryptogr. 86(11): 2451-2468 (2018) - [j4]Fucai Luo
, Fuqun Wang, Kunpeng Wang, Jie Li, Kefei Chen:
LWR-Based Fully Homomorphic Encryption, Revisited. Secur. Commun. Networks 2018: 5967635:1-5967635:12 (2018) - [c36]Shuai Zhou
, Haiyang Xue, Daode Zhang, Kunpeng Wang, Xianhui Lu, Bao Li, Jingnan He:
Preprocess-then-NTT Technique and Its Applications to Kyber and NewHope. Inscrypt 2018: 117-137 - [c35]Yuanyuan Gao, Kunpeng Wang:
Probability Preservation Property with Relative Error and Its Applications. ICISSP 2018: 461-468 - [c34]Fucai Luo, Kunpeng Wang, Changlu Lin:
Leveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with Rounding. ISPEC 2018: 101-115 - [c33]Fucai Luo, Kunpeng Wang:
Verifiable Decryption for Fully Homomorphic Encryption. ISC 2018: 347-365 - [i5]Xiu Xu, Haiyang Xue, Kunpeng Wang, Song Tian, Bei Liang, Wei Yu:
Strongly Secure Authenticated Key Exchange from Supersingular Isogeny. IACR Cryptol. ePrint Arch. 2018: 760 (2018) - [i4]Shuai Zhou, Haiyang Xue, Daode Zhang, Kunpeng Wang, Xianhui Lu, Bao Li, Jingnan He:
Preprocess-then-NTT Technique and Its Applications to KYBER and NEWHOPE. IACR Cryptol. ePrint Arch. 2018: 995 (2018) - 2017
- [j3]Kunpeng Wang, Guanqiu Qi
, Zhiqin Zhu
, Yi Chai:
A Novel Geometric Dictionary Construction Approach for Sparse Representation Based Image Fusion. Entropy 19(7): 306 (2017) - [c32]Xiaoyang He, Wei Yu, Kunpeng Wang:
Hashing into Twisted Jacobi Intersection Curves. Inscrypt 2017: 117-138 - [c31]Jie Li, Daode Zhang, Xianhui Lu, Kunpeng Wang:
Compact (Targeted Homomorphic) Inner Product Encryption from LWE. ICICS 2017: 132-140 - 2016
- [c30]Wei Yu, Kunpeng Wang, Bao Li, Xiaoyang He, Song Tian:
Deterministic Encoding into Twisted Edwards Curves. ACISP (2) 2016: 285-297 - [c29]Xiu Xu, Wei Yu, Kunpeng Wang, Xiaoyang He:
Constructing Isogenies on Extended Jacobi Quartic Curves. Inscrypt 2016: 416-427 - [c28]Jie Li, Yuanhong Zhong, Zhongyou Song, Yao Zhou, Tao Chen, Kunpeng Wang:
Management of Machine Room in Power System Based on Intelligent Monitoring. iThings/GreenCom/CPSCom/SmartData 2016: 631-635 - 2015
- [c27]Xiaoyang He, Wei Yu, Kunpeng Wang:
Hashing into Generalized Huff Curves. Inscrypt 2015: 22-44 - [c26]Weixuan Li, Wei Yu, Kunpeng Wang:
Improved Tripling on Elliptic Curves. Inscrypt 2015: 193-205 - [c25]Weixuan Li, Wei Yu, Kunpeng Wang:
Analysis of Fractional ωmbNAF for Scalar Multiplication. ISPEC 2015: 109-120 - [c24]Song Tian, Wei Yu, Bao Li, Kunpeng Wang:
Models of Curves from GHS Attack in Odd Characteristic. ISPEC 2015: 171-180 - [c23]Song Tian, Wei Yu, Bao Li, Kunpeng Wang:
Some Elliptic Subcovers of Genus 3 Hyperelliptic Curves. ISPEC 2015: 181-191 - [c22]Fuqun Wang, Kunpeng Wang, Bao Li, Yuanyuan Gao:
Leveled Strongly-Unforgeable Identity-Based Fully Homomorphic Signatures. ISC 2015: 42-60 - [c21]Wei Yu, Kunpeng Wang, Bao Li, Xiaoyang He, Song Tian:
Hashing into Jacobi Quartic Curves. ISC 2015: 355-375 - [c20]Fuqun Wang, Kunpeng Wang, Bao Li:
LWE-Based FHE with Better Parameters. IWSEC 2015: 175-192 - [c19]Fuqun Wang, Kunpeng Wang, Bao Li:
An Efficient Leveled Identity-Based FHE. NSS 2015: 303-315 - 2014
- [c18]Haiyang Xue, Bao Li, Xianhui Lu, Kunpeng Wang, Yamin Liu:
On the Lossiness of 2 k -th Power and the Instantiability of Rabin-OAEP. CANS 2014: 34-49 - [c17]Fuqun Wang, Kunpeng Wang:
Fully Homomorphic Encryption with Auxiliary Inputs. Inscrypt 2014: 220-238 - [c16]Song Tian, Kunpeng Wang, Bao Li, Wei Yu:
A Note on Diem's Proof. Inscrypt 2014: 463-471 - 2013
- [c15]Wei Yu, Kunpeng Wang, Bao Li, Song Tian:
On the Expansion Length Of Triple-Base Number Systems. AFRICACRYPT 2013: 424-432 - [c14]Wei Yu, Kunpeng Wang, Bao Li, Song Tian:
Triple-Base Number System for Scalar Multiplication. AFRICACRYPT 2013: 433-451 - [c13]Shan Chen, Kunpeng Wang, Dongdai Lin, Tao Wang:
Omega Pairing on Hyperelliptic Curves. Inscrypt 2013: 167-184 - [c12]Bo Li, Jingjie Zhang, Mingyu Chen, Jinchao Zhang, Kunpeng Wang, Dan Meng:
DIFTSAS: A DIstributed Full Text Search and Analysis System for Big Data. CSE 2013: 1303-1309 - [c11]Neal S. Wade, Kunpeng Wang, Matthieu Michel, Tom Willis:
Demonstration of a 200 kW/200 kWh energy storage system on an 11kV UK distribution feeder. ISGT Europe 2013: 1-5 - [c10]Wei Yu, Kunpeng Wang, Bao Li, Song Tian:
About Hash into Montgomery Form Elliptic Curves. ISPEC 2013: 147-159 - [c9]Wei Yu, Kunpeng Wang, Bao Li, Song Tian:
Joint Triple-Base Number System for Multi-Scalar Multiplication. ISPEC 2013: 160-173 - [c8]Xusheng Zhang, Kunpeng Wang:
Fast Symmetric Pairing Revisited. Pairing 2013: 131-148 - 2012
- [c7]Xusheng Zhang, Kunpeng Wang, Dongdai Lin:
On Efficient Pairings on Elliptic Curves over Extension Fields. Pairing 2012: 1-18 - [c6]Shan Chen, Kunpeng Wang, Dongdai Lin:
An Improved Twisted Ate Pairing over KSS Curves with k = 18. Pairing 2012: 35-45 - [i3]Xusheng Zhang, Kunpeng Wang, Dongdai Lin:
On Efficient Pairings on Elliptic Curves over Extension Fields. IACR Cryptol. ePrint Arch. 2012: 247 (2012) - 2011
- [c5]Lijun Zhang, Kunpeng Wang, Hong Wang, Dingfeng Ye:
Another Elliptic Curve Model for Faster Pairing Computation. ISPEC 2011: 432-446 - 2010
- [j2]Xuemei Li, Caiming Zhang, Yizhen Yue, Kunpeng Wang:
Cubic surface fitting to image by combination. Sci. China Inf. Sci. 53(7): 1287-1295 (2010) - [c4]Yazhe Zhang, Kunpeng Wang, Bao Li:
A Deniable Group Key Establishment Protocol in the Standard Model. ISPEC 2010: 308-323 - [i2]Hong Wang, Kunpeng Wang, Lijun Zhang, Bao Li:
Pairing Computation on Elliptic Curves of Jacobi Quartic Form. IACR Cryptol. ePrint Arch. 2010: 475 (2010)
2000 – 2009
- 2009
- [c3]Ming Li, Kunpeng Wang:
New Greedy Algorithm for Computing Double-Base Chains. IAS 2009: 445-450 - 2007
- [j1]Quanlong Wang, Kunpeng Wang, Zongduo Dai:
On optimal simultaneous rational approximation to (omega, omega2)tau with omega being some kind of cubic algebraic function. J. Approx. Theory 148(2): 194-210 (2007) - 2006
- [c2]Zhiqiang Gu, Gangyan Li, Kunpeng Wang:
A Workflow Management System for Dynamic Alliance. PROLAMAT 2006: 950-959 - [c1]Quanlong Wang, Kunpeng Wang, Zongduo Dai:
Implementation of Multi-continued Fraction Algorithm and Application to Multi-sequence Linear Synthesis. SETA 2006: 248-258 - 2005
- [i1]Kunpeng Wang, Bao Li:
Computation of Tate Pairing for Supersingular Curves over characteristic 5 and 7. IACR Cryptol. ePrint Arch. 2005: 374 (2005)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-03-26 00:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint