default search action
Xuan Shen
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Lingling Chen, Xuan Shen, Xiaohui Zhao, Ziwei Wang, Wei He, Guoji Xu, Yiyang Chen:
Defending dominant cooperative probabilistic attack in CRNs by JS-divergence-based improved reputation algorithm. Pervasive Mob. Comput. 101: 101921 (2024) - [j12]Lingling Chen, Ziwei Wang, Xiaohui Zhao, Xuan Shen, Wei He:
A dynamic spectrum access algorithm based on deep reinforcement learning with novel multi-vehicle reward functions in cognitive vehicular networks. Telecommun. Syst. 87(2): 359-383 (2024) - [j11]Zejun Xiang, Xiaoyu Wang, Bo Yu, Bing Sun, Shasha Zhang, Xiangyong Zeng, Xuan Shen, Nian Li:
Links between Quantum Distinguishers Based on Simon's Algorithm and Truncated Differentials. IACR Trans. Symmetric Cryptol. 2024(2): 296-321 (2024) - [c22]Xuan Shen, Peiyan Dong, Lei Lu, Zhenglun Kong, Zhengang Li, Ming Lin, Chao Wu, Yanzhi Wang:
Agile-Quant: Activation-Guided Quantization for Faster Inference of LLMs on the Edge. AAAI 2024: 18944-18951 - [c21]Bing Sun, Zejun Xiang, Zhengyi Dai, Guoqiang Liu, Xuan Shen, Longjiang Qu, Shaojing Fu:
Feistel-Like Structures Revisited: Classification and Cryptanalysis. CRYPTO (4) 2024: 275-304 - [c20]Zhengang Li, Xuan Shen, Geng Yuan, Masoud Zabihi, Tomoharu Yamauchi, Yanzhi Wang, Olivia Chen:
Late Breaking Result: AQFP-aware Binary Neural Network Architecture Search. DAC 2024: 354:1-354:2 - [c19]Zheng Zhan, Yushu Wu, Zhenglun Kong, Changdi Yang, Yifan Gong, Xuan Shen, Xue Lin, Pu Zhao, Yanzhi Wang:
Rethinking Token Reduction for State Space Models. EMNLP 2024: 1686-1697 - [c18]Pu Zhao, Fei Sun, Xuan Shen, Pinrui Yu, Zhenglun Kong, Yanzhi Wang, Xue Lin:
Pruning Foundation Models for High Accuracy without Retraining. EMNLP (Findings) 2024: 9681-9694 - [c17]Gang Yang, Bo Wu, Weifeng Mou, Linna Fan, Xuan Shen, Jun He:
DAS-Gen: Continual Signature Generation for Evolving Malicious Traffic. ICIC (9) 2024: 352-362 - [i19]Xuan Shen, Zhenglun Kong, Changdi Yang, Zhaoyang Han, Lei Lu, Peiyan Dong, Cheng Lyu, Chih-hsiang Li, Xuehang Guo, Zhihao Shu, Wei Niu, Miriam Leeser, Pu Zhao, Yanzhi Wang:
EdgeQAT: Entropy and Distribution Guided Quantization-Aware Training for the Acceleration of Lightweight LLMs on the Edge. CoRR abs/2402.10787 (2024) - [i18]Chao Wu, Yifan Gong, Liangkai Liu, Mengquan Li, Yushu Wu, Xuan Shen, Zhimin Li, Geng Yuan, Weisong Shi, Yanzhi Wang:
AyE-Edge: Automated Deployment Space Search Empowering Accuracy yet Efficient Real-Time Object Detection on the Edge. CoRR abs/2408.05363 (2024) - [i17]Xuan Shen, Pu Zhao, Yifan Gong, Zhenglun Kong, Zheng Zhan, Yushu Wu, Ming Lin, Chao Wu, Xue Lin, Yanzhi Wang:
Search for Efficient Large Language Models. CoRR abs/2409.17372 (2024) - [i16]Zheng Zhan, Zhenglun Kong, Yifan Gong, Yushu Wu, Zichong Meng, Hangyu Zheng, Xuan Shen, Stratis Ioannidis, Wei Niu, Pu Zhao, Yanzhi Wang:
Exploring Token Pruning in Vision State Space Models. CoRR abs/2409.18962 (2024) - [i15]Zheng Zhan, Yushu Wu, Zhenglun Kong, Changdi Yang, Yifan Gong, Xuan Shen, Xue Lin, Pu Zhao, Yanzhi Wang:
Rethinking Token Reduction for State Space Models. CoRR abs/2410.14725 (2024) - [i14]Pu Zhao, Fei Sun, Xuan Shen, Pinrui Yu, Zhenglun Kong, Yanzhi Wang, Xue Lin:
Pruning Foundation Models for High Accuracy without Retraining. CoRR abs/2410.15567 (2024) - [i13]Chien Van Nguyen, Xuan Shen, Ryan Aponte, Yu Xia, Samyadeep Basu, Zhengmian Hu, Jian Chen, Mihir Parmar, Sasidhar Kunapuli, Joe Barrow, Junda Wu, Ashish Singh, Yu Wang, Jiuxiang Gu, Franck Dernoncourt, Nesreen K. Ahmed, Nedim Lipka, Ruiyi Zhang, Xiang Chen, Tong Yu, Sungchul Kim, Hanieh Deilamsalehy, Namyong Park, Mike Rimer, Zhehao Zhang, Huanrui Yang, Ryan A. Rossi, Thien Huu Nguyen:
A Survey of Small Language Models. CoRR abs/2410.20011 (2024) - [i12]Chunling Chen, Xianhui Lu, Ruida Wang, Zhihao Li, Xuan Shen, Benqiang Wei:
Free-XOR Gate Bootstrapping. IACR Cryptol. ePrint Arch. 2024: 1703 (2024) - 2023
- [c16]Zhenglun Kong, Haoyu Ma, Geng Yuan, Mengshu Sun, Yanyue Xie, Peiyan Dong, Xin Meng, Xuan Shen, Hao Tang, Minghai Qin, Tianlong Chen, Xiaolong Ma, Xiaohui Xie, Zhangyang Wang, Yanzhi Wang:
Peeling the Onion: Hierarchical Reduction of Data Redundancy for Efficient Vision Transformer Training. AAAI 2023: 8360-8368 - [c15]Bo Yu, Tairong Shi, Xiaoyang Dong, Xuan Shen, Yiyuan Luo, Bing Sun:
Quantum Attacks: A View of Data Complexity on Offline Simon's Algorithm. Inscrypt (2) 2023: 329-342 - [c14]Xuan Shen, Yaohua Wang, Ming Lin, Yilun Huang, Hao Tang, Xiuyu Sun, Yanzhi Wang:
DeepMAD: Mathematical Architecture Design for Deep Convolutional Neural Network. CVPR 2023: 6163-6173 - [c13]Xuan Shen, Zhenglun Kong, Minghai Qin, Peiyan Dong, Geng Yuan, Xin Meng, Hao Tang, Xiaolong Ma, Yanzhi Wang:
Data Level Lottery Ticket Hypothesis for Vision Transformers. IJCAI 2023: 1378-1386 - [i11]Xuan Shen, Yaohua Wang, Ming Lin, Yilun Huang, Hao Tang, Xiuyu Sun, Yanzhi Wang:
DeepMAD: Mathematical Architecture Design for Deep Convolutional Neural Network. CoRR abs/2303.02165 (2023) - [i10]Xuan Shen, Peiyan Dong, Lei Lu, Zhenglun Kong, Zhengang Li, Ming Lin, Chao Wu, Yanzhi Wang:
Agile-Quant: Activation-Guided Quantization for Faster Inference of LLMs on the Edge. CoRR abs/2312.05693 (2023) - 2022
- [j10]Haipeng Tong, Xuan Shen, Chao Li, Yunwen Liu:
Improved nonlinear invariant attack. Sci. China Inf. Sci. 65(3) (2022) - [j9]Xuan Shen, Guoqiang Liu, Xiaofeng Wang, Bing Sun, Jun He:
Security evaluation on type-1 and type-1-like 4-branch generalized Feistel structures and application to reduced-round Lesamnta-LW-BC. IET Inf. Secur. 16(5): 390-400 (2022) - [j8]Yan Zhou, Xuan Shen, Chen Wang, Yixue Liao, Junli Li:
Mining the Spatial Distribution Pattern of the Typical Fast-Food Industry Based on Point-of-Interest Data: The Case Study of Hangzhou, China. ISPRS Int. J. Geo Inf. 11(11): 559 (2022) - [j7]Yi Zhang, Guoqiang Liu, Chao Li, Xuan Shen:
Impossible differential cryptanalysis of FBC-128. J. Inf. Secur. Appl. 69: 103279 (2022) - [c12]Zhenglun Kong, Peiyan Dong, Xiaolong Ma, Xin Meng, Wei Niu, Mengshu Sun, Xuan Shen, Geng Yuan, Bin Ren, Hao Tang, Minghai Qin, Yanzhi Wang:
SPViT: Enabling Faster Vision Transformers via Latency-Aware Soft Token Pruning. ECCV (11) 2022: 620-640 - [c11]Yanyu Li, Xuan Shen, Geng Yuan, Jiexiong Guan, Wei Niu, Hao Tang, Bin Ren, Yanzhi Wang:
Real-Time Portrait Stylization on the Edge. IJCAI 2022: 5928-5931 - [i9]Yanyu Li, Xuan Shen, Geng Yuan, Jiexiong Guan, Wei Niu, Hao Tang, Bin Ren, Yanzhi Wang:
Real-Time Portrait Stylization on the Edge. CoRR abs/2206.01244 (2022) - [i8]Xuan Shen, Zhenglun Kong, Minghai Qin, Peiyan Dong, Geng Yuan, Xin Meng, Hao Tang, Xiaolong Ma, Yanzhi Wang:
The Lottery Ticket Hypothesis for Vision Transformers. CoRR abs/2211.01484 (2022) - [i7]Zhenglun Kong, Haoyu Ma, Geng Yuan, Mengshu Sun, Yanyue Xie, Peiyan Dong, Xin Meng, Xuan Shen, Hao Tang, Minghai Qin, Tianlong Chen, Xiaolong Ma, Xiaohui Xie, Zhangyang Wang, Yanzhi Wang:
Peeling the Onion: Hierarchical Reduction of Data Redundancy for Efficient Vision Transformer Training. CoRR abs/2211.10801 (2022) - 2021
- [j6]Xuan Shen, Lei Cheng, Bing Sun, Jun He:
Revisiting Impossible Differential Distinguishers of Two Generalized Feistel Structures. Secur. Commun. Networks 2021: 5582711:1-5582711:10 (2021) - [j5]Jun He, Xuan Shen, Guoqiang Liu:
Improved Impossible Differentials and Zero-Correlation Linear Hulls of New Structure III. Secur. Commun. Networks 2021: 6515844:1-6515844:11 (2021) - [c10]Zhengang Li, Geng Yuan, Wei Niu, Pu Zhao, Yanyu Li, Yuxuan Cai, Xuan Shen, Zheng Zhan, Zhenglun Kong, Qing Jin, Zhiyu Chen, Sijia Liu, Kaiyuan Yang, Bin Ren, Yanzhi Wang, Xue Lin:
NPAS: A Compiler-Aware Framework of Unified Network Pruning and Architecture Search for Beyond Real-Time Mobile Acceleration. CVPR 2021: 14255-14266 - [c9]Ning Liu, Geng Yuan, Zhengping Che, Xuan Shen, Xiaolong Ma, Qing Jin, Jian Ren, Jian Tang, Sijia Liu, Yanzhi Wang:
Lottery Ticket Preserves Weight Correlation: Is It Desirable or Not? ICML 2021: 7011-7020 - [c8]Xuan Shen, Geng Yuan, Wei Niu, Xiaolong Ma, Jiexiong Guan, Zhengang Li, Bin Ren, Yanzhi Wang:
Towards Fast and Accurate Multi-Person Pose Estimation on Mobile Devices. IJCAI 2021: 5012-5015 - [c7]Yunxiao Yang, Xuan Shen, Bing Sun:
Out of Non-linearity: Search Impossible Differentials by the Bitwise Characteristic Matrix. ISPEC 2021: 69-89 - [c6]Geng Yuan, Zhiheng Liao, Xiaolong Ma, Yuxuan Cai, Zhenglun Kong, Xuan Shen, Jingyan Fu, Zhengang Li, Chengming Zhang, Hongwu Peng, Ning Liu, Ao Ren, Jinhui Wang, Yanzhi Wang:
Improving DNN Fault Tolerance using Weight Pruning and Differential Crossbar Mapping for ReRAM-based Edge AI. ISQED 2021: 135-141 - [c5]Xiaolong Ma, Geng Yuan, Xuan Shen, Tianlong Chen, Xuxi Chen, Xiaohan Chen, Ning Liu, Minghai Qin, Sijia Liu, Zhangyang Wang, Yanzhi Wang:
Sanity Checks for Lottery Tickets: Does Your Winning Ticket Really Win the Jackpot? NeurIPS 2021: 12749-12760 - [i6]Wenjie Song, Xuan Shen:
Vertical federated learning based on DFP and BFGS. CoRR abs/2101.09428 (2021) - [i5]Ning Liu, Geng Yuan, Zhengping Che, Xuan Shen, Xiaolong Ma, Qing Jin, Jian Ren, Jian Tang, Sijia Liu, Yanzhi Wang:
Lottery Ticket Implies Accuracy Degradation, Is It a Desirable Phenomenon? CoRR abs/2102.11068 (2021) - [i4]Geng Yuan, Zhiheng Liao, Xiaolong Ma, Yuxuan Cai, Zhenglun Kong, Xuan Shen, Jingyan Fu, Zhengang Li, Chengming Zhang, Hongwu Peng, Ning Liu, Ao Ren, Jinhui Wang, Yanzhi Wang:
Improving DNN Fault Tolerance using Weight Pruning and Differential Crossbar Mapping for ReRAM-based Edge AI. CoRR abs/2106.09166 (2021) - [i3]Xuan Shen, Geng Yuan, Wei Niu, Xiaolong Ma, Jiexiong Guan, Zhengang Li, Bin Ren, Yanzhi Wang:
Towards Fast and Accurate Multi-Person Pose Estimation on Mobile Devices. CoRR abs/2106.15304 (2021) - [i2]Xiaolong Ma, Geng Yuan, Xuan Shen, Tianlong Chen, Xuxi Chen, Xiaohan Chen, Ning Liu, Minghai Qin, Sijia Liu, Zhangyang Wang, Yanzhi Wang:
Sanity Checks for Lottery Tickets: Does Your Winning Ticket Really Win the Jackpot? CoRR abs/2107.00166 (2021) - 2020
- [j4]Dejian Dai, Tao Jiang, Wei Lu, Xuan Shen, Rui Xiu, Jingwei Zhang:
Nondestructive Detection for Egg Freshness Based on Hyperspectral Scattering Image Combined with Ensemble Learning. Sensors 20(19): 5484 (2020) - [i1]Zhengang Li, Geng Yuan, Wei Niu, Yanyu Li, Pu Zhao, Yuxuan Cai, Xuan Shen, Zheng Zhan, Zhenglun Kong, Qing Jin, Zhiyu Chen, Sijia Liu, Kaiyuan Yang, Bin Ren, Yanzhi Wang, Xue Lin:
6.7ms on Mobile with over 78% ImageNet Accuracy: Unified Network Pruning and Architecture Search for Beyond Real-Time Mobile Acceleration. CoRR abs/2012.00596 (2020)
2010 – 2019
- 2019
- [j3]Xuan Shen, Jun He:
Improved Impossible Differential Attack on 7-round Reduced ARIA-256. KSII Trans. Internet Inf. Syst. 13(11): 5773-5784 (2019) - 2018
- [j2]Xuan Shen, Guoqiang Liu, Chao Li, Longjiang Qu:
Impossible Differential Cryptanalysis of Fantomas and Robin. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(5): 863-866 (2018) - 2017
- [c4]Jun Shen, Xuan Shen, Wen Gao, Yong Zhang:
Simulation and Verification of Software Architecture for Loosely-Coupled Distributed System. CSA/CUTE 2017: 624-630 - [c3]Xuan Shen, Ruilin Li, Bing Sun, Lei Cheng, Chao Li, Maodong Liao:
Dual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-Like Ciphers. ISPEC 2017: 237-255 - 2016
- [c2]Xuan Shen, Guoqiang Liu, Bing Sun, Chao Li:
Impossible Differentials of SPN Ciphers. Inscrypt 2016: 47-63 - 2015
- [j1]Beibei Li, Zhihong Zhao, Xuan Shen, Cendi Xue, Liwei Zhong:
Fitting α β-crystalline structure onto electron microscopy based on SO(3) rotation group theory. J. Comb. Optim. 30(4): 906-919 (2015) - 2014
- [c1]Guangyao Zhao, Lei Cheng, Chao Li, Ruilin Li, Xuan Shen:
On the Practical Security Bound of GF-NLFSR Structure with SPN Round Function. ProvSec 2014: 40-54
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-03 20:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint