default search action
Yupeng Jiang
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j28]Yupeng Jiang, Ming Li, Ying Gao, Dongdai Lin:
On prefer-one sequences. Des. Codes Cryptogr. 92(10): 3017-3032 (2024) - [c11]Yupeng Jiang, Lijun Zhang:
A Dynamic Adaptive SCL Decoding for Polar Codes Based on Frozen Bits. VTC Fall 2024: 1-5 - 2023
- [j27]Ming Li, Yupeng Jiang, Dongdai Lin:
Properties of the cycles that contain all vectors of weight $\le k$. Des. Codes Cryptogr. 91(1): 221-239 (2023) - [j26]Yupeng Jiang:
A relation between sequences generated by Golomb's preference algorithm. Des. Codes Cryptogr. 91(1): 285-291 (2023) - [j25]Ziran Tu, Nian Li, Yanan Wu, Xiangyong Zeng, Xiaohu Tang, Yupeng Jiang:
On the Differential Spectrum and the APcN Property of a Class of Power Functions Over Finite Fields. IEEE Trans. Inf. Theory 69(1): 582-597 (2023) - [j24]Yupeng Jiang, Ming Li, Dongdai Lin:
Proofs of Conjectures on Extremal Weight De Bruijn Sequences. IEEE Trans. Inf. Theory 69(8): 5357-5363 (2023) - [c10]Yupeng Jiang, Lijun Zhang:
A Fano Decoding for Polar Codes Based on Node Acceleration. VTC Fall 2023: 1-5 - 2022
- [j23]Jun Che, Chengliang Tian, Yupeng Jiang, Guangwu Xu:
Algorithms for the Minimal Rational Fraction Representation of Sequences Revisited. IEEE Trans. Inf. Theory 68(2): 1316-1328 (2022) - 2021
- [j22]Ziran Tu, Xiangyong Zeng, Yupeng Jiang, Yan Li:
Binomial permutations over finite fields with even characteristic. Des. Codes Cryptogr. 89(12): 2869-2888 (2021) - [c9]Qun-Xiong Zheng, Yupeng Jiang, Dongdai Lin, Wen-Feng Qi:
Binary Sequences Derived from Monomial Permutation Polynomials over GF(2p). Inscrypt 2021: 371-383 - [c8]Ming Li, Yupeng Jiang, Dongdai Lin:
Construction of De Bruijn Sequences from l-sequences. ISIT 2021: 1522-1527 - [c7]Yupeng Jiang, Yong Li, Yipeng Zhou, Xi Zheng:
Sybil Attacks and Defense on Differential Privacy based Federated Learning. TrustCom 2021: 355-362 - [i11]Jinhyun Choo, Yidong Zhao, Yupeng Jiang, Minchen Li, Chenfanfu Jiang, Kenichi Soga:
A barrier method for frictional contact on embedded interfaces. CoRR abs/2107.05814 (2021) - [i10]Ziran Tu, Xiangyong Zeng, Yupeng Jiang, Xiaohu Tang:
A class of APcN power functions over finite fields of even characteristic. CoRR abs/2107.06464 (2021) - 2020
- [j21]Yupeng Jiang, Dongdai Lin:
Longest subsequences shared by two de Bruijn sequences. Des. Codes Cryptogr. 88(7): 1463-1475 (2020) - [j20]Yupeng Jiang:
Weak Grain-Like Structures. IEEE Trans. Inf. Theory 66(12): 7717-7723 (2020) - [c6]Ming Li, Yupeng Jiang, Dongdai Lin:
On the k-Error Linear Complexities of De Bruijn Sequences. Inscrypt 2020: 344-356 - [c5]Ming Li, Yupeng Jiang, Dongdai Lin:
The Numbers of De Bruijn Sequences in Extremal Weight Classes. ISIT 2020: 2909-2914 - [i9]Yupeng Jiang, Yong Li, Yipeng Zhou, Xi Zheng:
Mitigating Sybil Attacks on Differential Privacy based Federated Learning. CoRR abs/2010.10572 (2020)
2010 – 2019
- 2019
- [j19]Zibi Xiao, Xiangyong Zeng, Chaoyun Li, Yupeng Jiang:
Binary sequences with period N and nonlinear complexity N - 2. Cryptogr. Commun. 11(4): 735-757 (2019) - [j18]Junying Liu, Yupeng Jiang, Qunxiong Zheng, Dongdai Lin:
A new construction of zero-difference balanced functions and two applications. Des. Codes Cryptogr. 87(10): 2251-2265 (2019) - [i8]Yupeng Jiang, Minchen Li, Chenfanfu Jiang, Fernando Alonso-marroquin:
A hybrid material-point spheropolygon-element method for solid and granular material interaction. CoRR abs/1909.13655 (2019) - 2018
- [j17]Yupeng Jiang, Dongdai Lin:
Lower and Upper Bounds on the Density of Irreducible NFSRs. IEEE Trans. Inf. Theory 64(5): 3944-3952 (2018) - [i7]Lakshmi Sirisha Revadi, Xi Zheng, Yupeng Jiang:
Investigating Key User Experiencing Engineering Aspects in Software-as-a-Service Service Delivery Model. CoRR abs/1812.03660 (2018) - 2017
- [j16]Luca Capriotti, Yupeng Jiang, Andrea Macrina:
AAD and least-square Monte Carlo: Fast Bermudan-style options and XVA Greeks. Algorithmic Finance 6(1-2): 35-49 (2017) - [j15]Yupeng Jiang, Qun-Xiong Zheng, Dongdai Lin:
On s-uniform property of compressing sequences derived from primitive sequences modulo odd prime powers. Sci. China Inf. Sci. 60(5): 052102:1-052102:12 (2017) - [j14]Yupeng Jiang, Dongdai Lin:
On affine sub-families of Grain-like structures. Des. Codes Cryptogr. 82(3): 531-542 (2017) - [j13]Ming Li, Yupeng Jiang, Dongdai Lin:
The adjacency graphs of some feedback shift registers. Des. Codes Cryptogr. 82(3): 695-713 (2017) - [j12]Yupeng Jiang, Jiangshuai Yang:
On the number of irreducible linear transformation shift registers. Des. Codes Cryptogr. 83(2): 445-454 (2017) - [j11]Ming Li, Yupeng Jiang, Dongdai Lin, Qiuyan Wang:
Transition Mappings between De Bruijn Sequences. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(5): 1254-1256 (2017) - 2016
- [j10]Mingxing Wang, Yupeng Jiang, Dongdai Lin:
Further results on the nonlinearity of maximum-length NFSR feedbacks. Cryptogr. Commun. 8(1): 1-6 (2016) - [j9]Qiuyan Wang, Yupeng Jiang, Dongdai Lin:
Linear complexity of Ding-Helleseth sequences of order 2 over GF(l). Cryptogr. Commun. 8(1): 33-49 (2016) - [j8]Jing Wu, Hongxu Hou, Feilong Bao, Yupeng Jiang:
Template-Based Model for Mongolian-Chinese Machine Translation. J. Adv. Comput. Intell. Intell. Informatics 20(6): 893-901 (2016) - 2015
- [j7]Yupeng Jiang, Yingpu Deng:
New results on nonexistence of generalized bent functions. Des. Codes Cryptogr. 75(3): 375-385 (2015) - [j6]Ziran Tu, Xiangyong Zeng, Yupeng Jiang:
Two classes of permutation polynomials having the form (x2m+x+δ)s+x. Finite Fields Their Appl. 31: 12-24 (2015) - [j5]Qiuyan Wang, Yupeng Jiang, Dongdai Lin:
Linear complexity of binary generalized cyclotomic sequences over GF(q). J. Complex. 31(5): 731-740 (2015) - [c4]Yupeng Jiang, Hongxu Hou, Ping Yang:
LSA-Based Chinese-Slavic Mongolian NER Disambiguation. CIT/IUCC/DASC/PICom 2015: 703-708 - [c3]Xiangdong Su, Guanglai Gao, Yupeng Jiang, Jing Wu, Feilong Bao:
Mongolian Inflection Suffix Processing in NLP: A Case Study. NLPCC 2015: 347-352 - [c2]Jing Wu, Hongxu Hou, Feilong Bao, Yupeng Jiang:
Template-based model for Mongolian - Chinese machine translation. TAAI 2015: 352-357 - [i6]Ming Li, Yupeng Jiang, Dongdai Lin:
A Group-theory Method to The Cycle Structures of Feedback Shift Registers. IACR Cryptol. ePrint Arch. 2015: 357 (2015) - 2014
- [j4]Qiuyan Wang, Yupeng Jiang, Dongdai Lin, Xuan Guang:
On the Linear Complexity of New Modified Jacobi Sequences. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(11): 2263-2266 (2014) - [j3]Yupeng Jiang, Yingpu Deng:
Strong pseudoprimes to the first eight prime bases. Math. Comput. 83(290): 2915-2924 (2014) - [j2]Yupeng Jiang, Dongdai Lin:
Distribution Properties of Compressing Sequences Derived From Primitive Sequences Modulo Odd Prime Powers. IEEE Trans. Inf. Theory 60(10): 6602-6608 (2014) - [i5]Yupeng Jiang, Dongdai Lin:
Distribution properties of compressing sequences derived from primitive sequences modulo odd prime powers. CoRR abs/1401.5874 (2014) - [i4]Yupeng Jiang, Dongdai Lin:
On the distinctness of binary sequences derived from $2$-adic expansion of m-sequences over finite prime fields. CoRR abs/1402.4590 (2014) - 2013
- [j1]Ziran Tu, Yupeng Jiang, Xiangyong Zeng:
Constructing odd Variable Boolean Functions with Optimal Algebraic Immunity. Int. J. Found. Comput. Sci. 24(3): 409- (2013) - 2012
- [i3]Yupeng Jiang, Yingpu Deng:
New results on nonexistence of generalized bent functions. IACR Cryptol. ePrint Arch. 2012: 467 (2012) - 2011
- [c1]Yanbin Pan, Yingpu Deng, Yupeng Jiang, Ziran Tu:
A New Lattice-Based Public-Key Cryptosystem Mixed with a Knapsack. CANS 2011: 126-137
2000 – 2009
- 2009
- [i2]Yanbin Pan, Yingpu Deng, Yupeng Jiang, Ziran Tu:
A New Lattice-Based Cryptosystem Mixed with a Knapsack. IACR Cryptol. ePrint Arch. 2009: 337 (2009) - [i1]Yupeng Jiang, Yingpu Deng, Yanbin Pan:
Covering Radius of Two-dimensional Lattices. IACR Cryptol. ePrint Arch. 2009: 539 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:43 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint