Vol. 60, No. 2, 2017 Cover Contents

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Cryptanalysis of a lattice based key exchange protocol
Mao, Shaowu; Zhang, Pei; Wang, Houzhen; Zhang, Huanguo; Wu, Wanqing
Sci China Inf Sci, 2017, 60(2): 028101
Keywords: Cryptanalysis; Key Exchange Protocol; Lattice; SIS; Lattice Based Cryptography
Citing as: Mao S W, Zhang P, Wang H Z, et al. Cryptanalysis of a lattice based key exchange protocol. Sci China Inf Sci, 2017, 60(2): 028101, doi: 10.1007/s11432-015-0721-4

HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 0

Principal basis analysis in sparse representation
Sun, Hong; Sang, Chengwei; Liu, Chenguang
Sci China Inf Sci, 2017, 60(2): 028102
Keywords: sparse representation; principal component analysis; principal basis; svd algorithm; denoising
Citing as: Sun H, Sang C W, Liu C G. Principal basis analysis in sparse representation. Sci China Inf Sci, 2017, 60(2): 028102, doi: 10.1007/s11432-015-0960-8

Vol. 60, No. 3, 2017 Cover Contents

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Global fusion of generalized camera model for efficient large-scale structure from motion
Cui, Hainan; Shen, Shuhan; Hu, Zhanyi
Sci China Inf Sci, 2017, 60(3): 038101
Keywords: Structure-from-Motion; Generalized Camera Model; Camera Calibration; Large-Scale Scene Reconstruction; Auxiliary Imaging Information Fusion
Citing as: Cui H N, Shen S H, Hu Z Y. Global fusion of generalized camera model for efficient large-scale structure from motion. Sci China Inf Sci, 2017, 60(3): 038101, doi: 10.1007/s11432-015-0792-1

HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 0

Cryptanalysis of round-reduced ASCON
Li, Yanbin; Zhang, Guoyan; Wang, Wei; Wang, Meiqin
Sci China Inf Sci, 2017, 60(3): 038102
Keywords: ASCON; authenticated encryption; CAESAR; cube; key recovery
Citing as: Li Y B, Zhang G Y, Wang W, et al. Cryptanalysis of round-reduced ASCON. Sci China Inf Sci, 2017, 60(3): 038102, doi: 10.1007/s11432-016-0283-3

Vol. 60, No. 4, 2017 Cover Contents

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 6

Collaborative representation Bayesian face recognition
Feng, Jufu; Ma, Xiao; Zhuang, Wenjing
Sci China Inf Sci, 2017, 60(4): 048101
Keywords: face recognition; collaborative representation; Bayesian residual model; intra-class and inter-class variations; under-sampled problem
Citing as: Feng J F, Ma X, Zhuang W J. Collaborative representation Bayesian face recognition. Sci China Inf Sci, 2017, 60(4): 048101, doi: 10.1007/s11432-015-0799-4

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 1

Low-cost design of stealthy hardware trojan for bit-level fault attacks on block ciphers
Zhang, Fan; Zhao, Xinjie; He, Wei; Bhasin, Shivam; Guo, Shize
Sci China Inf Sci, 2017, 60(4): 048102
Keywords: Block Cipher; Hardware Trojan; Algebraic Fault Analysis; Bit-level Fault Model; Hardware Security; DES
Citing as: Zhang F, Zhao X J, He W, et al. Low-cost design of stealthy hardware trojan for bit-level fault attacks on block ciphers. Sci China Inf Sci, 2017, 60(4): 048102, doi: 10.1007/s11432-016-0233-0

HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 0

Mixed H-/H-infinity fault detection filter design for the dynamics of high speed train
Bai, Weiqi; Yao, Xiuming; Dong, Hairong; Lin, Xue
Sci China Inf Sci, 2017, 60(4): 048201
Keywords: Fault detection filter; high speed train; multi-objective index; polytopic uncertainty; fault weighting system
Citing as: Bai W Q, Yao X M, Dong H R, et al. Mixed H-/H-infinity fault detection filter design for the dynamics of high speed train. Sci China Inf Sci, 2017, 60(4): 048201, doi: 10.1007/s11432-016-9023-1

Vol. 60, No. 5, 2017 Cover Contents

HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 2

Developing nonlinear adaptive optimal regulators through an improved neural learning mechanism
Wang, Ding; Mu, Chaoxu
Sci China Inf Sci, 2017, 60(5): 058201
Keywords: adaptive dynamic programming; adaptive system; neural network; optimal regulator; learning
Citing as: Wang D, Mu C X. Developing nonlinear adaptive optimal regulators through an improved neural learning mechanism. Sci China Inf Sci, 2017, 60(5): 058201, doi: 10.1007/s11432-016-9022-1

Vol. 60, No. 6, 2017 Cover Contents

HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 0

Practical two-dimensional correlation power analysis and its backward fault-tolerance
Wang, An; Hu, Wenjing; Tian, Weina; Zhang, Guoshuang; Zhu, Liehuang
Sci China Inf Sci, 2017, 60(6): 068101
Keywords: cryptography; side-channel analysis; correlation power analysis; fault-tolerance; AES
Citing as: Wang A, Hu W J, Tian W N, et al. Practical two-dimensional correlation power analysis and its backward fault-tolerance. Sci China Inf Sci, 2017, 60(6): 068101, doi: 10.1007/s11432-016-0398-y

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 29

Dynamic strategy based parallel ant colony optimization on GPUs for TSPs
Zhou, Yi; He, Fazhi; Qiu, Yimin
Sci China Inf Sci, 2017, 60(6): 068102
Keywords: ant colony optimization; GPU computing; TSP; performance evaluation; dynamic work-group
Citing as: Zhou Y, He F Z, Qiu Y M. Dynamic strategy based parallel ant colony optimization on GPUs for TSPs. Sci China Inf Sci, 2017, 60(6): 068102, doi: 10.1007/s11432-015-0594-2

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Two classes of rotation symmetric semi-bent functions
Zhao, Qinglan; Zheng, Dong
Sci China Inf Sci, 2017, 60(6): 068103
Keywords: Rotation symmetric Boolean functions; semi-bent functions; algebraic degree ; Walsh-Hadamard transform; cryptography
Citing as: Zhao Q L, Zheng D. Two classes of rotation symmetric semi-bent functions. Sci China Inf Sci, 2017, 60(6): 068103, doi: 10.1007/s11432-016-9036-y

Vol. 60, No. 7, 2017 Cover Contents

Special Focus on Formation Control of Unmanned Systems
HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 2

Keywords: Unmanned aerial vehicles; Cooperative formation control; Adaptive control; Tight formation; vortices effect
Citing as: Wang Y, Wang D B. Tight formation control of multiple unmanned aerial vehicles through an adaptive control method. Sci China Inf Sci, 2017, 60(7): 070207, doi: 10.1007/s11432-016-9092-y

HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 0

B-spline surface fitting to mesh vertices
Lu, Yang; Yong, Junhai; Shi, Kanle; Gu, Hejin; Zheng, Ping; Paul, Jean-Claude
Sci China Inf Sci, 2017, 60(7): 078101
Keywords: B-spline; surface fitting; parameterization; knot estimation; energy function minimization
Citing as: Lu Y, Yong J H, Shi K L, et al. B-spline surface fitting to mesh vertices. Sci China Inf Sci, 2017, 60(7): 078101, doi: 10.1007/s11432-016-0311-8

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Driving Android apps to trigger target API invocations based on activity and GUI filtering
Yue, Hongzhou; Zhang, Yuqing; Wang, Wenjie; Liu, Qixu
Sci China Inf Sci, 2017, 60(7): 078102
Keywords: Android Testing; GUI Exploration; Target API Invocation; A3E; Static Analysis
Citing as: Yue H Z, Zhang Y Q, Wang W J, et al. Driving Android apps to trigger target API invocations based on activity and GUI filtering. Sci China Inf Sci, 2017, 60(7): 078102, doi: 10.1007/s11432-015-0825-3

HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 1

Keywords: cardiovascular disease; ECG; deep learning; convolutional neural network; rule inference; classification; cloud computing
Citing as: Jin L P, Dong J. Classification of normal and abnormal ECG records using lead convolutional neural network and rule inference. Sci China Inf Sci, 2017, 60(7): 078103, doi: 10.1007/s11432-016-9047-6

Vol. 60, No. 8, 2017 Cover Contents

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 1

Reconstruction methodology for rational secret sharing based on mechanism design
Liu, Hai; Li, Xinghua; Ma, Jianfeng; Xu, Mengfan; Guo, Jingjing
Sci China Inf Sci, 2017, 60(8): 088101
Keywords: rational secret sharing; mechanism design; reference model; reconstruction framework; fairness; correctness
Citing as: Liu H, Li X H, Ma J F, et al. Reconstruction methodology for rational secret sharing based on mechanism design. Sci China Inf Sci, 2017, 60(8): 088101, doi: 10.1007/s11432-015-9066-9

HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 0

A novel DEM reconstruction strategy based on multi-frequency InSAR in highly sloped terrain
Zeng, Tao; Liu, Tiandong; Ding, Zegang; Zhang, Qi; Wang, Zhen; Long, Teng
Sci China Inf Sci, 2017, 60(8): 088301
Keywords: Multi-frequency InSAR; Maximum Likelihood; Local Adjacent Pixel Set; Isolate Region; Interferometric Phase Gradient
Citing as: Zeng T, Liu T D, Ding Z G, et al. A novel DEM reconstruction strategy based on multi-frequency InSAR in highly sloped terrain. Sci China Inf Sci, 2017, 60(8): 088301, doi: 10.1007/s11432-016-0085-4

HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 1

Design of low power 4x40 Gb/s laser diode driver for parallel optical transmission systems
CHEN, Yingmei; ZHANG, Zhen; L, Jiquan, I; WANG, Hui; WANG, Pengxia; L, Yanwei, I
Sci China Inf Sci, 2017, 60(8): 088401
Keywords: Parallel optical transmission; Laser diode driver; Pre-emphasis technique; BiCMOS; Technique of RC parallel negative feedback
Citing as: Chen Y M, Zhang Z, Li J Q, et al. Design of low power 4x40 Gb/s laser diode driver for parallel optical transmission systems. Sci China Inf Sci, 2017, 60(8): 088401, doi: 10.1007/s11432-016-0372-5

Vol. 60, No. 9, 2017 Cover Contents

HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 1

A privacy-preserving video subscription scheme with the limitation of expire date
Zhu, Liehuang; Chen, Mingxin; Zhang, Zijian; Tong, Ange; Xu, Chen
Sci China Inf Sci, 2017, 60(9): 098101
Keywords: anonymous subscription; video subscription; privacy-preserving; signature; zero-knowledge proof
Citing as: Zhu L H, Chen M X, Zhang Z J, et al. A privacy-preserving video subscription scheme with the limitation of expire date. Sci China Inf Sci, 2017, 60(9): 098101, doi: 10.1007/s11432-016-0305-5

HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 0

New observation on division property
Sun, Bing; Hai, Xin; Zhang, Wenyu; Cheng, Lei; Yang, Zhichao
Sci China Inf Sci, 2017, 60(9): 098102
Keywords: Feistel structure; Integral cryptanalysis; Division property; Multi-set; Sub-set
Citing as: Sun B, Hai X, Zhang W Y, et al. New observation on division property. Sci China Inf Sci, 2017, 60(9): 098102, doi: 10.1007/s11432-015-0376-x

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 3

Practical privacy-preserving compressed sensing image recovery in the cloud
Huang, Kai; Xu, Ming; Fu, Shaojing; Wang, Dongsheng
Sci China Inf Sci, 2017, 60(9): 098103
Keywords: Compressed sensing; image recovery; security and privacy; cloud computing; outsourcing
Citing as: Huang K, Xu M, Fu S J, et al. Practical privacy-preserving compressed sensing image recovery in the cloud. Sci China Inf Sci, 2017, 60(9): 098103, doi: 10.1007/s11432-016-9055-2

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Area-based mobile multicast group key management scheme for secure mobile cooperative sensing
Cui, Jie; Zhong, Hong; Luo, Weiya; Zhang, Jing
Sci China Inf Sci, 2017, 60(9): 098104
Keywords: group key management; rekeying; multicast; mobile cooperative sensing; wireless mobile network
Citing as: Cui J, Zhong H, Luo W Y, et al. Area-based mobile multicast group key management scheme for secure mobile cooperative sensing. Sci China Inf Sci, 2017, 60(9): 098104, doi: 10.1007/s11432-016-9048-8

Vol. 60, No. 10, 2017 Cover Contents

HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 0

Relative influence maximization in competitive social networks
Yang, Dingda; Liao, Xiangwen; Shen, Huawei; Cheng, Xueqi; Chen, Guolong
Sci China Inf Sci, 2017, 60(10): 108101
Keywords: social network; influence spread; relative influence; greedy algorithm; approximation; heuristic allgorithm
Citing as: Yang D D, Liao X W, Shen H W, et al. Relative influence maximization in competitive social networks. Sci China Inf Sci, 2017, 60(10): 108101, doi: 10.1007/s11432-016-9080-3

HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 0

A novel batch-based LKH tree balanced algorithm for group key management
Xu, Jie; Li, Linke; Lu, Sibian; Yin, Huayun
Sci China Inf Sci, 2017, 60(10): 108301
Keywords: Group Key Management; Logical Key Hierarchy; Tree Balanced Algorithm; Tree Merging Algorithm; Low Cost
Citing as: Xu J, Li L K, Lu S B, et al. A novel batch-based LKH tree balanced algorithm for group key management. Sci China Inf Sci, 2017, 60(10): 108301, doi: 10.1007/s11432-015-1045-1

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 4

Keywords: Cognitive radio; resource allocation; pricing; Stackelberg game; energy harvesting
Citing as: Xu D, Li Q. Price-based time and energy allocation in cognitive radio multiple access networks with energy harvesting. Sci China Inf Sci, 2017, 60(10): 108302, doi: 10.1007/s11432-016-9016-4

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Cost-effective SET-tolerant clock distribution network design by mitigating single event transient propagation
Hao, Peipei; Chen, Shuming; Huang, Pengcheng; Chen, Jianjun; Liang, Bin
Sci China Inf Sci, 2017, 60(10): 108401
Keywords: clock distribution network; single event transient; dual-in-and-dual-out inverter; charge sharing; SET-tolerant
Citing as: Hao P P, Chen S M, Huang P C, et al. Cost-effective SET-tolerant clock distribution network design by mitigating single event transient propagation. Sci China Inf Sci, 2017, 60(10): 108401, doi: 10.1007/s11432-016-9041-5

Vol. 60, No. 11, 2017 Cover Contents

HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 0

NetPro: detecting attacks in MANET routing with provenance and verification
Li, Teng; Ma, Jianfeng; Sun, Cong
Sci China Inf Sci, 2017, 60(11): 118101
Keywords: MANET; Provenance; Verification; Privacy; Diagnostics
Citing as: Li T, Ma J F, Sun C. NetPro: detecting attacks in MANET routing with provenance and verification. Sci China Inf Sci, 2017, 60(11): 118101, doi: 10.1007/s11432-016-0370-y

HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 1

Observable liveness of Petri nets with controllable and observable transitions
Liu, Guanjun; Jiang, Changjun
Sci China Inf Sci, 2017, 60(11): 118102
Keywords: Formal methods; Petri nets; interactional behavior; observable liveness; controllability
Citing as: Liu G J, Jiang C J. Observable liveness of Petri nets with controllable and observable transitions. Sci China Inf Sci, 2017, 60(11): 118102, doi: 10.1007/s11432-016-0241-y

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Keywords: high angles of attack; unsteady aerodynamics; aerodynamic modeling; wind tunnel tests; parameters estimation
Citing as: Hu S, Zhu J H. Longitudinal high incidence unsteady aerodynamic modeling for advanced combat aircraft configuration from wind tunnel data. Sci China Inf Sci, 2017, 60(11): 118201, doi: 10.1007/s11432-017-9095-7

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 1

Keywords: Optimal Control; Stochastic Evolution Equation; Verification Theorem; Stochastic Maximum Principle; Poisson Random Martingale Measure
Citing as: Tang M N , Meng Q X. Stochastic evolution equations of jump type with random coefficients: existence, uniqueness and optimal control. Sci China Inf Sci, 2017, 60(11): 118202, doi: 10.1007/s11432-016-9107-1

Vol. 60, No. 12, 2017 Cover Contents

Special Focus on Reliability of Micro- and Nano-Electronic Devices in Harsh Environment
HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 1

Total ionizing dose effects and annealing behaviors of HfO2-based MOS capacitor
Xu, Yannan; Bi, Jinshun; Xu, Gaobo; Xi, Kai; Li, Bo; Liu, Ming
Sci China Inf Sci, 2017, 60(12): 120401
Keywords: HfO2 dielectric; TID effect; annealing effect; trapping charge; effective trapping efficiency
Citing as: Xu Y N, Bi J S, Xu G B, et al. Total ionizing dose effects and annealing behaviors of HfO2-based MOS capacitor. Sci China Inf Sci, 2017, 60(12): 120401, doi: 10.1007/s11432-017-9239-5

Special Focus on Reliability of Micro- and Nano-Electronic Devices in Harsh Environment
HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 2

Research on proton radiation effects on CMOS image sensors with experimental and particle transport simulation methods
Xue, Yttanyuan; Wang, Zujun; Liu, Minbo; He, Baoping; Yao, Zhibin; Sheng, Jiangkun; Ma, Wuying; Dong, Guantao; Jin, Junshan
Sci China Inf Sci, 2017, 60(12): 120402
Keywords: CMOS image sensor; proton; radiation effects; dark signal; dark signal non-uniform
Citing as: Xue Y Y, Wang Z J, Liu M B, et al. Research on proton radiation effects on CMOS image sensors with experimental and particle transport simulation methods. Sci China Inf Sci, 2017, 60(12): 120402, doi: 10.1007/s11432-017-9250-7

Special Focus on Reliability of Micro- and Nano-Electronic Devices in Harsh Environment
HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 3

1-MeV electron irradiation effects on InGaAsP/InGaAs double-junction solar cell and its component subcells
Zhao, Xiaofan; Heini, Maliya; Sailai, Momin; Aierken, Abuduwayiti; Guo, Qi; Li, Yudong; Lu, Shulong; Dai, Pan; Wu, Yuanyuan; Tan, Ming
Sci China Inf Sci, 2017, 60(12): 120403
Keywords: solar cell; irradiation effects; electron; displacement damage dose; degradation
Citing as: Zhao X F, Heini M, Sailai M, et al. 1-MeV electron irradiation effects on InGaAsP/InGaAs double-junction solar cell and its component subcells. Sci China Inf Sci, 2017, 60(12): 120403, doi: 10.1007/s11432-017-9248-2

Special Focus on Reliability of Micro- and Nano-Electronic Devices in Harsh Environment
HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 0

Heavy ion micro-beam study of single-event transient (SET) in SiGe heterjunction bipolar transistor
Zhang, Jinxin; Guo, Hongxia; Zhang, Fengqi; He, Chaohui; Li, Pei; Yan, Yunyi; Wang, Hui; Zhang, Linxia
Sci China Inf Sci, 2017, 60(12): 120404
Keywords: SiGe HBT; single-event transient; heavy ion micro-beam test; simulation; radiation effect
Citing as: Zhang J X, Guo H X, Zhang F Q, et al. Heavy ion micro-beam study of single-event transient (SET) in SiGe heterjunction bipolar transistor. Sci China Inf Sci, 2017, 60(12): 120404, doi: 10.1007/s11432-017-9249-6

Special Focus on Reliability of Micro- and Nano-Electronic Devices in Harsh Environment
HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 0

High energy proton and heavy ion induced single event transient in 65-nm CMOS technology
Liu, Jiaqi; Zhao, Yuanfu; Wang, Liang; Wang, Dan; Zheng, Hongchao; Chen, Maoxin; Shu, Lei; Li, Tongde; Li, Dongqiang; Guo, Wei
Sci China Inf Sci, 2017, 60(12): 120405
Keywords: Single Event Transient; 65nm; heavy ion; high energy proton; pulse width
Citing as: Liu J Q, Zhao Y F, Wang L, et al. High energy proton and heavy ion induced single event transient in 65-nm CMOS technology. Sci China Inf Sci, 2017, 60(12): 120405, doi: 10.1007/s11432-017-9254-2

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Toward a further understanding of bit-based division property
Sun, Ling; Wang, Meiqin
Sci China Inf Sci, 2017, 60(12): 128101
Keywords: integral cryptanalysis; table-aided bit-based division property; early reduce; RECTANGLE; TWINE; Lblock
Citing as: Sun L, Wang M Q. Toward a further understanding of bit-based division property. Sci China Inf Sci, 2017, 60(12): 128101, doi: 10.1007/s11432-016-9170-y

Vol. 61, No. 1, 2018 Cover Contents

HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 0

Accurate inference of user popularity preference in a large-scale online video streaming system
Tan, Xiaoying; Guo, Yuchun; Chen, Yishuai; Zhu, Wei
Sci China Inf Sci, 2018, 61(1): 018101
Keywords: video popularity; user preference; inference algorithm; recommendation algorithm; online video streaming system
Citing as: Tan X Y, Guo Y C, Chen Y S, et al. Accurate inference of user popularity preference in a large-scale online video streaming system. Sci China Inf Sci, 2018, 61(1): 018101, doi: 10.1007/s11432-016-9078-0

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 1

Model-based variational fusion for reducing spectral distortion
Zhou, Zeming; Chen, Chaoqian; Meng, Yong; Hu, Biao
Sci China Inf Sci, 2018, 61(1): 018102
Keywords: pan-sharpening; variational fusion; model-based fusion; gradient descend flow; MTF
Citing as: Zhou Z M, Chen C Q, Meng Y, et al. Model-based variational fusion for reducing spectral distortion. Sci China Inf Sci, 2018, 61(1): 018102, doi: 10.1007/s11432-016-9085-y

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Robust video denoising with sparse and dense noise modelings
Shen, Guiping; Han, Zhi; Chen, Xi'ai; Tang, Yandong
Sci China Inf Sci, 2018, 61(1): 018103
Keywords: low rank factorization; matrix completion; noise modeling; video denoising; mixture of Gaussians
Citing as: Shen G P, Han Z, Chen X A, et al. Robust video denoising with sparse and dense noise modelings. Sci China Inf Sci, 2018, 61(1): 018103, doi: 10.1007/s11432-017-9200-6

HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 0

Two-stage local constrained sparse coding for fine-grained visual categorization
Guo, Lihua; Guo, Chenggang; Li, Lei; Huang, Qinghua; Li, Yanshan; Li, Xuelong
Sci China Inf Sci, 2018, 61(1): 018104
Keywords: Fine-grained visual categorization; Local Constrained Sparse Coding; Deep learning; Pose alignment; Dictionary learning
Citing as: Guo L H, Guo C G, Li L, et al. Two-stage local constrained sparse coding for fine-grained visual categorization. Sci China Inf Sci, 2018, 61(1): 018104, doi: 10.1007/s11432-017-9158-x

Vol. 61, No. 2, 2018 Cover Contents

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

The verification of conversion algorithms between finite automata
Jiang, Dongchen; Li, Wei
Sci China Inf Sci, 2018, 61(2): 028101
Keywords: finite automata; conversion algorithm; algorithm verification; constructive proof; algorithm specification
Citing as: Jiang D C, Li W. The verification of conversion algorithms between finite automata. Sci China Inf Sci, 2018, 61(2): 028101, doi: 10.1007/s11432-017-9155-x

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Network topology inference from incomplete observation data
Dou, Peng; Song, Guojie; Zhao, Tong
Sci China Inf Sci, 2018, 61(2): 028102
Keywords: Network inference; Incomplete cascade; Social influence; Information diffusion; Greedy algorithm
Citing as: Dou P, Song G J, Zhao T. Network topology inference from incomplete observation data. Sci China Inf Sci, 2018, 61(2): 028102, doi: 10.1007/s11432-017-9154-1

Vol. 61, No. 3, 2018 Cover Contents

Special Issue on Information Security
HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 0

Construction of rotation symmetric bent functions with maximum algebraic degree
Zhang, Wenying; Han, Guoyong
Sci China Inf Sci, 2018, 61(3): 038101
Keywords: Cryptography; Boolean function; Bent function; Rotation symmetric function; Algebraic degree
Citing as: Zhang W Y, Han G Y. Construction of rotation symmetric bent functions with maximum algebraic degree. Sci China Inf Sci, 2018, 61(3): 038101, doi: 10.1007/s11432-017-9123-2

Special Issue on Information Security
HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Several classes of negabent functions over finite fields
Wu, Gaofei; Li, Nian; Zhang, Yuqing; Liu, Xuefeng
Sci China Inf Sci, 2018, 61(3): 038102
Keywords: Finite field; Negabent function; Nega-Hadamard transform; Bent function; Kloosterman sum; Niho exponent
Citing as: Wu G F, Li N, Zhang Y Q, et al. Several classes of negabent functions over finite fields. Sci China Inf Sci, 2018, 61(3): 038102, doi: 10.1007/s11432-017-9096-0

Special Issue on Information Security
HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 1

Improved automatic search of impossible differentials for camellia with FL/FL-1 layers
Ding, Yaoling; Wang, Xiaoyun; Wang, Ning; Wang, Wei
Sci China Inf Sci, 2018, 61(3): 038103
Keywords: automatic search; impossible differentials; Camellia; weak key
Citing as: Ding Y L, Wang X Y, Wang N, et al. Improved automatic search of impossible differentials for camellia with FL/FL-1 layers. Sci China Inf Sci, 2018, 61(3): 038103, doi: 10.1007/s11432-016-9104-3

Special Issue on Information Security
HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

More permutation polynomials with differential uniformity six
Tu, Ziran; Zeng, Xiangyong; Zhang, Zhiyong
Sci China Inf Sci, 2018, 61(3): 038104
Keywords: permutation; differential uniformity; algebraic degree; differential attack; nonlinearity
Citing as: Tu Z R, Zeng X Y, Zhang Z Y. More permutation polynomials with differential uniformity six. Sci China Inf Sci, 2018, 61(3): 038104, doi: 10.1007/s11432-017-9118-5

Special Issue on Information Security
HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 0

Improved cryptanalysis of step-reduced SM3
Shen, Yanzhao; Bai, Dongxia; Yu, Hongbo
Sci China Inf Sci, 2018, 61(3): 038105
Keywords: SM3; preimage attack; boomerang attack; differential meet-in-the-middle; hash function
Citing as: Shen Y Z, Bai D X, Yu H B. Improved cryptanalysis of step-reduced SM3. Sci China Inf Sci, 2018, 61(3): 038105, doi: 10.1007/s11432-017-9119-6

Special Issue on Information Security
HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 3

Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation
Sun, Lixue; Xu, Chunxiang; Zhang, Mingwu; Chen, Kefei; Li, Hongwei
Sci China Inf Sci, 2018, 61(3): 038106
Keywords: Public key encryption with keyword search; Insider keyword guessing attack; Indistinguishability obfuscation; Cloud storage; Signcryption
Citing as: Sun L X, Xu C X, Zhang M W, et al. Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation. Sci China Inf Sci, 2018, 61(3): 038106, doi: 10.1007/s11432-017-9124-0

Vol. 61, No. 4, 2018 Cover Contents

HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 0

A novel anti-detection criterion for covert storage channel threat estimation
Wang, Chong; Zhang, Changyou; Wu, Bin; Tan, Yu'an; Wang, Yongji
Sci China Inf Sci, 2018, 61(4): 048101
Keywords: covert storage channel; information security; covert channel threat evaluation; anti-detection criterion; covert channel restriction
Citing as: Wang C, Zhang C Y, Wu B, et al. A novel anti-detection criterion for covert storage channel threat estimation. Sci China Inf Sci, 2018, 61(4): 048101, doi: 10.1007/s11432-017-9211-1

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 1

Simulation-based security of function-hiding inner product encryption
Zhao, Qingsong; Zeng, Qingkai; Liu, Ximeng; Xu, Huanliang
Sci China Inf Sci, 2018, 61(4): 048102
Keywords: functional encryption; inner product; function privacy; simulation-based security; asymmetric bilinear group
Citing as: Zhao Q S, Zeng Q K, Liu X M, et al. Simulation-based security of function-hiding inner product encryption. Sci China Inf Sci, 2018, 61(4): 048102, doi: 10.1007/s11432-017-9224-9

HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 3

Cross-cluster asymmetric group key agreement for wireless sensor networks
Zheng, Jiamin; Tan, Yu-An; Zhang, Qikun; Zhang, Xiaosong; Zhu, Liehuang; Zhang, Quanxin
Sci China Inf Sci, 2018, 61(4): 048103
Keywords: wireless sensor network; asymmetric group key agreement; authenticated protocol; key self-confirmation; asymmetric calculation
Citing as: Zheng J M, Tan Y A, Zhang Q K, et al. Cross-cluster asymmetric group key agreement for wireless sensor networks. Sci China Inf Sci, 2018, 61(4): 048103, doi: 10.1007/s11432-017-9212-2

HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 0

Packing unequal circles into a square container based on the narrow action spaces
He, Kun; Dosh, Mohammed; Jin, Yan; Zou, Shenghao
Sci China Inf Sci, 2018, 61(4): 048104
Keywords: global optimization; circle packing; narrow action space; partitioned circle; Quasi-physical
Citing as: He K, Dosh M, Jin Y, et al. Packing unequal circles into a square container based on the narrow action spaces. Sci China Inf Sci, 2018, 61(4): 048104, doi: 10.1007/s11432-017-9223-3

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Distribution-dependent concentration inequalities for tighter generalization bounds
Wu, Xinxing; Zhang, Junping
Sci China Inf Sci, 2018, 61(4): 048105
Keywords: learning theory; concentration inequality; distribution-dependent; statistical learning theory; generalization ability
Citing as: Wu X X, Zhang J P. Distribution-dependent concentration inequalities for tighter generalization bounds. Sci China Inf Sci, 2018, 61(4): 048105, doi: 10.1007/s11432-017-9225-2

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 1

Queue-aware energy-efficient scheduling and power allocation with feedback reduction in small-cell networks
Wei, Hongxin; Li, Yunzhou; Xiao, Limin; Zhou, Shidong
Sci China Inf Sci, 2018, 61(4): 048301
Keywords: energy efficient; power allocation; user scheduling; small-cell; interference; Lyapunov theory; resource allocation; mean rate stable; feedback
Citing as: Wei H X, Li Y Z, Xiao L M, et al. Queue-aware energy-efficient scheduling and power allocation with feedback reduction in small-cell networks. Sci China Inf Sci, 2018, 61(4): 048301, doi: 10.1007/s11432-017-9131-0

Vol. 61, No. 5, 2018 Cover Contents

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

LR-RRA-CCA secure functional encryption for randomized functionalities from trapdoor HPS and LAF
Wang, Huige; Chen, Kefei; Qin, Baodong; Hu, Ziyuan
Sci China Inf Sci, 2018, 61(5): 058101
Keywords: functional encryption; related randomness attack; RRA; chosen-ciphertext attack; CCA; trapdoor hash proof system; THPS; differing-inputs obfuscation
Citing as: Wang H G, Chen K F, Qin B D, et al. LR-RRA-CCA secure functional encryption for randomized functionalities from trapdoor HPS and LAF. Sci China Inf Sci, 2018, 61(5): 058101, doi: 10.1007/s11432-017-9120-4

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Keywords: block cipher; 3D cipher; alternate structure; differential cryptanalysis; practical security; active S-box
Citing as: Wang Q, Jin C H. A non-alternate 3D structure and its practical security evaluation against differential and linear cryptanalysis. Sci China Inf Sci, 2018, 61(5): 058102, doi: 10.1007/s11432-017-9181-4

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Securely min and k-th min computations with fully homomorphic encryption
Jiang, Bingbing; Zhang, Yuan
Sci China Inf Sci, 2018, 61(5): 058103
Keywords: secure minimum computation; secure k-th minimum computation; FHE; lattice-based cryptosystem; GSW13 scheme
Citing as: Jiang B B, Zhang Y. Securely min and k-th min computations with fully homomorphic encryption. Sci China Inf Sci, 2018, 61(5): 058103, doi: 10.1007/s11432-017-9205-0

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 3

Spatial image encryption algorithm based on chaotic map and pixel frequency
Ye, Guodong; Huang, Xiaoling
Sci China Inf Sci, 2018, 61(5): 058104
Keywords: Image encryption; pixel frequency; multimedia security; chaotic map; keystream
Citing as: Ye G D, Huang X L. Spatial image encryption algorithm based on chaotic map and pixel frequency. Sci China Inf Sci, 2018, 61(5): 058104, doi: 10.1007/s11432-017-9191-x

HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 0

Modern physiognomy: an investigation on predicting personality traits and intelligence from the human face
Qin, Rizhen; Gao, Wei; Xu, Huarong; Hu, Zhanyi
Sci China Inf Sci, 2018, 61(5): 058105
Keywords: modern physiognomy; self-reported personality trait; measured intelligence; the facial feature; the classi cation method; the regression method
Citing as: Qin R Z, Gao W, Xu H R, et al. Modern physiognomy: an investigation on predicting personality traits and intelligence from the human face. Sci China Inf Sci, 2018, 61(5): 058105, doi: 10.1007/s11432-016-9174-0

Vol. 61, No. 7, 2018 Cover Contents

Special Focus on Learning and Real-time Optimization of Automotive Powertrain Systems
HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 0

A stochastic logical model-based approximate solution for energy management problem of HEVs
Zhang, Jiangyan; Wu, Yuhu
Sci China Inf Sci, 2018, 61(7): 070207
Keywords: Transient Logical Model; HEV; Optimal Energy Management; Stochastic Control; Approximate Solution
Citing as: Zhang J Y, Wu Y H. A stochastic logical model-based approximate solution for energy management problem of HEVs. Sci China Inf Sci, 2018, 61(7): 070207, doi: 10.1007/s11432-017-9329-6

Special Focus on Learning and Real-time Optimization of Automotive Powertrain Systems
HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 0

Relevance between fractional-order hybrid model and unified equivalent circuit model of electric vehicle power battery
Zhang, Qi; Cui, Naxin; Shang, Yunlong; Xing, Guojing; Zhang, Chenghui
Sci China Inf Sci, 2018, 61(7): 070208
Keywords: fractional order; electric vehicle power battery; hybrid battery model; equivalent circuit battery model; kinetic battery model
Citing as: Zhang Q, Cui N X, Shang Y L, et al. Relevance between fractional-order hybrid model and unified equivalent circuit model of electric vehicle power battery. Sci China Inf Sci, 2018, 61(7): 070208, doi: 10.1007/s11432-017-9364-2

Special Focus on Learning and Real-time Optimization of Automotive Powertrain Systems
HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 0

Predictive safety control for road vehicles after a tire blowout
Wang, Fei; Chen, Hong; Guo, Lulu; Hu, Yunfeng
Sci China Inf Sci, 2018, 61(7): 070209
Keywords: Predictive safety control; Driving assistance system; Automotive active safety; Model predictive control; Road vehicles after a tire blowout
Citing as: Wang F, Chen H, Guo L L, et al. Predictive safety control for road vehicles after a tire blowout. Sci China Inf Sci, 2018, 61(7): 070209, doi: 10.1007/s11432-017-9330-6

HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 0

Keywords: Hilger-type impulsive differential inequality; synchronization; complex network; delay; on time scales
Citing as: Huang Z K, Cao J D, Raffoul Y N. Hilger-type impulsive differential inequality and its application to impulsive synchronization of delayed complex networks on time scales. Sci China Inf Sci, 2018, 61(7): 078201, doi: 10.1007/s11432-017-9304-7

Vol. 61, No. 9, 2018 Cover Contents

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Fully distributed certificateless threshold signature without random oracles
Yang, Wenjie; Luo, Weiqi; Luo, Xizhao; Weng, Jian; Yang, Anjia
Sci China Inf Sci, 2018, 61(9): 098101
Keywords: full distribution; threshold signature; certificateless setting; malicious key generation center; standard model
Citing as: Yang W J, Luo W Q, Luo X Z, et al. Fully distributed certificateless threshold signature without random oracles. Sci China Inf Sci, 2018, 61(9): 098101, doi: 10.1007/s11432-017-9244-9

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

An advanced operating environment for mathematics education resources
Rao, Yongsheng; Zhang, Jingzhong; Zou, Yu; Sun, Yanchun; Chen, Xiangping; Xu, Songhua
Sci China Inf Sci, 2018, 61(9): 098102
Keywords: operating environment; mathematics education resource; knowledge enhancement; intelligent drawing; automated reasoning; Super Sketchpad
Citing as: Rao Y S, Zhang J Z, Zou Y, et al. An advanced operating environment for mathematics education resources. Sci China Inf Sci, 2018, 61(9): 098102, doi: 10.1007/s11432-017-9235-7

HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 0

Differential attacks on reduced SIMON versions with dynamic key-guessing techniques
Wang, Ning; Wang, Xiaoyun; Jia, Keting; Zhao, Jingyuan
Sci China Inf Sci, 2018, 61(9): 098103
Keywords: SIMON; lightweight block cipher; bit condition; differential attack; dynamic key-guessing
Citing as: Wang N, Wang X Y, Jia K T, et al. Differential attacks on reduced SIMON versions with dynamic key-guessing techniques. Sci China Inf Sci, 2018, 61(9): 098103, doi: 10.1007/s11432-017-9231-5

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 1

Efficient beyond-birthday-bound secure authenticated encryption modes
Zhang, Ping; Hu, Honggang; Wang, Peng
Sci China Inf Sci, 2018, 61(9): 098104
Keywords: authenticated encryption; keyed compression function; pseudorandom function; hash function; provable security; beyond-birthday-bound; optimal security
Citing as: Zhang P, Hu H G, Wang P. Efficient beyond-birthday-bound secure authenticated encryption modes. Sci China Inf Sci, 2018, 61(9): 098104, doi: 10.1007/s11432-017-9253-9

HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 0

Who will retweet? A prediction method for social hotspots based on dynamic tensor decomposition
Xiao, Yunpeng; Li, Xiaojuan; Yang, Shasha; Liu, Yanbing
Sci China Inf Sci, 2018, 61(9): 098105
Keywords: social network; hotspot topic; behavior analysis; retweeting prediction; tensor decomposition
Citing as: Xiao Y P, Li X J, Yang S S, et al. Who will retweet? A prediction method for social hotspots based on dynamic tensor decomposition. Sci China Inf Sci, 2018, 61(9): 098105, doi: 10.1007/s11432-017-9272-y

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Predicting compositional time series via autoregressive Dirichlet estimation
Zhou, Ganbin; Luo, Ping; He, Qing
Sci China Inf Sci, 2018, 61(9): 098106
Keywords: time series analysis; machine learning; aritificial intelligence; regression estimation; probability and statistics
Citing as: Zhou G B, Luo P, He Q. Predicting compositional time series via autoregressive Dirichlet estimation. Sci China Inf Sci, 2018, 61(9): 098106, doi: 10.1007/s11432-017-9335-5

Vol. 61, No. 11, 2018 Cover Contents

HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 0

Dual-mode broadcast encryption
Zhu, Yan; Yu, Ruyun; Chen, E.; Huang, Dijiang
Sci China Inf Sci, 2018, 61(11): 118101
Keywords: cryptography; broadcast encryption; provable security; revocation; designation; dual mode
Citing as: Zhu Y, Yu R Y, Chen E, et al. Dual-mode broadcast encryption. Sci China Inf Sci, 2018, 61(11): 118101, doi: 10.1007/s11432-017-9287-6

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 1

MILP-aided bit-based division property for ARX ciphers
Sun, Ling; Wang, Wei; Liu, Ru; Wang, Meiqin
Sci China Inf Sci, 2018, 61(11): 118102
Keywords: automatic search; division property; ARX; MILP; HIGHT
Citing as: Sun L, Wang W, Liu R, et al. MILP-aided bit-based division property for ARX ciphers. Sci China Inf Sci, 2018, 61(11): 118102, doi: 10.1007/s11432-017-9321-7

HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 0

Trivariate B-spline solid construction by pillow operation and geometric iterative fitting
Lin, Hongwei; Huang, Hao; Hu, Chuanfeng
Sci China Inf Sci, 2018, 61(11): 118103
Keywords: Trivariate B-splines; Positive Jacobian; Geometric iterative fitting; Geometric design; Isogeometric analysis
Citing as: Lin H W, Huang H, Hu C F. Trivariate B-spline solid construction by pillow operation and geometric iterative fitting. Sci China Inf Sci, 2018, 61(11): 118103, doi: 10.1007/s11432-017-9376-8

Vol. 62, No. 1, 2019

HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 0

A formally verified transformation to unify multiple nested clocks for a Lustre-like language
Shi, Gang; Zhang, Yucheng; Shang, Shu; Wang, Shengyuan; Dong, Yuan; Yew, Pen-Chung
Sci China Inf Sci, 2019, 62(1): 012801
Keywords: synchronous data-flow languages; nested clocks; clock-unifying; certified compilers; Lustre; Coq
Citing as: Shi G, Zhang Y C, Shang S, et al. A formally verified transformation to unify multiple nested clocks for a Lustre-like language. Sci China Inf Sci, 2019, 62(1): 012801, doi: 10.1007/s11432-016-9270-0