Vol. 62, No. 1, 2019 Cover Contents

HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 0

A formally verified transformation to unify multiple nested clocks for a Lustre-like language
Shi, Gang; Zhang, Yucheng; Shang, Shu; Wang, Shengyuan; Dong, Yuan; Yew, Pen-Chung
Sci China Inf Sci, 2019, 62(1): 012801
Keywords: synchronous data-flow languages; nested clocks; clock-unifying; certified compilers; Lustre; Coq
Cite as: Shi G, Zhang Y C, Shang S, et al. A formally verified transformation to unify multiple nested clocks for a Lustre-like language. Sci China Inf Sci, 2019, 62(1): 012801, doi: 10.1007/s11432-016-9270-0

Vol. 61, No. 11, 2018 Cover Contents

HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 0

Trivariate B-spline solid construction by pillow operation and geometric iterative fitting
Lin, Hongwei; Huang, Hao; Hu, Chuanfeng
Sci China Inf Sci, 2018, 61(11): 118103
Keywords: Trivariate B-splines; Positive Jacobian; Geometric iterative fitting; Geometric design; Isogeometric analysis
Cite as: Lin H W, Huang H, Hu C F. Trivariate B-spline solid construction by pillow operation and geometric iterative fitting. Sci China Inf Sci, 2018, 61(11): 118103, doi: 10.1007/s11432-017-9376-8

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 2

MILP-aided bit-based division property for ARX ciphers
Sun, Ling; Wang, Wei; Liu, Ru; Wang, Meiqin
Sci China Inf Sci, 2018, 61(11): 118102
Keywords: automatic search; division property; ARX; MILP; HIGHT
Cite as: Sun L, Wang W, Liu R, et al. MILP-aided bit-based division property for ARX ciphers. Sci China Inf Sci, 2018, 61(11): 118102, doi: 10.1007/s11432-017-9321-7

HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 0

Dual-mode broadcast encryption
Zhu, Yan; Yu, Ruyun; Chen, E.; Huang, Dijiang
Sci China Inf Sci, 2018, 61(11): 118101
Keywords: cryptography; broadcast encryption; provable security; revocation; designation; dual mode
Cite as: Zhu Y, Yu R Y, Chen E, et al. Dual-mode broadcast encryption. Sci China Inf Sci, 2018, 61(11): 118101, doi: 10.1007/s11432-017-9287-6

Vol. 61, No. 9, 2018 Cover Contents

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Predicting compositional time series via autoregressive Dirichlet estimation
Zhou, Ganbin; Luo, Ping; He, Qing
Sci China Inf Sci, 2018, 61(9): 098106
Keywords: time series analysis; machine learning; aritificial intelligence; regression estimation; probability and statistics
Cite as: Zhou G B, Luo P, He Q. Predicting compositional time series via autoregressive Dirichlet estimation. Sci China Inf Sci, 2018, 61(9): 098106, doi: 10.1007/s11432-017-9335-5

HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 0

Who will retweet? A prediction method for social hotspots based on dynamic tensor decomposition
Xiao, Yunpeng; Li, Xiaojuan; Yang, Shasha; Liu, Yanbing
Sci China Inf Sci, 2018, 61(9): 098105
Keywords: social network; hotspot topic; behavior analysis; retweeting prediction; tensor decomposition
Cite as: Xiao Y P, Li X J, Yang S S, et al. Who will retweet? A prediction method for social hotspots based on dynamic tensor decomposition. Sci China Inf Sci, 2018, 61(9): 098105, doi: 10.1007/s11432-017-9272-y

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 1

Efficient beyond-birthday-bound secure authenticated encryption modes
Zhang, Ping; Hu, Honggang; Wang, Peng
Sci China Inf Sci, 2018, 61(9): 098104
Keywords: authenticated encryption; keyed compression function; pseudorandom function; hash function; provable security; beyond-birthday-bound; optimal security
Cite as: Zhang P, Hu H G, Wang P. Efficient beyond-birthday-bound secure authenticated encryption modes. Sci China Inf Sci, 2018, 61(9): 098104, doi: 10.1007/s11432-017-9253-9

HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 0

Differential attacks on reduced SIMON versions with dynamic key-guessing techniques
Wang, Ning; Wang, Xiaoyun; Jia, Keting; Zhao, Jingyuan
Sci China Inf Sci, 2018, 61(9): 098103
Keywords: SIMON; lightweight block cipher; bit condition; differential attack; dynamic key-guessing
Cite as: Wang N, Wang X Y, Jia K T, et al. Differential attacks on reduced SIMON versions with dynamic key-guessing techniques. Sci China Inf Sci, 2018, 61(9): 098103, doi: 10.1007/s11432-017-9231-5

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

An advanced operating environment for mathematics education resources
Rao, Yongsheng; Zhang, Jingzhong; Zou, Yu; Sun, Yanchun; Chen, Xiangping; Xu, Songhua
Sci China Inf Sci, 2018, 61(9): 098102
Keywords: operating environment; mathematics education resource; knowledge enhancement; intelligent drawing; automated reasoning; Super Sketchpad
Cite as: Rao Y S, Zhang J Z, Zou Y, et al. An advanced operating environment for mathematics education resources. Sci China Inf Sci, 2018, 61(9): 098102, doi: 10.1007/s11432-017-9235-7

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Fully distributed certificateless threshold signature without random oracles
Yang, Wenjie; Luo, Weiqi; Luo, Xizhao; Weng, Jian; Yang, Anjia
Sci China Inf Sci, 2018, 61(9): 098101
Keywords: full distribution; threshold signature; certificateless setting; malicious key generation center; standard model
Cite as: Yang W J, Luo W Q, Luo X Z, et al. Fully distributed certificateless threshold signature without random oracles. Sci China Inf Sci, 2018, 61(9): 098101, doi: 10.1007/s11432-017-9244-9

Vol. 61, No. 7, 2018 Cover Contents

HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 2

Keywords: Hilger-type impulsive differential inequality; synchronization; complex network; delay; on time scales
Cite as: Huang Z K, Cao J D, Raffoul Y N. Hilger-type impulsive differential inequality and its application to impulsive synchronization of delayed complex networks on time scales. Sci China Inf Sci, 2018, 61(7): 078201, doi: 10.1007/s11432-017-9304-7

Special Focus on Learning and Real-time Optimization of Automotive Powertrain Systems
HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 1

Predictive safety control for road vehicles after a tire blowout
Wang, Fei; Chen, Hong; Guo, Lulu; Hu, Yunfeng
Sci China Inf Sci, 2018, 61(7): 070209
Keywords: Predictive safety control; Driving assistance system; Automotive active safety; Model predictive control; Road vehicles after a tire blowout
Cite as: Wang F, Chen H, Guo L L, et al. Predictive safety control for road vehicles after a tire blowout. Sci China Inf Sci, 2018, 61(7): 070209, doi: 10.1007/s11432-017-9330-6

Special Focus on Learning and Real-time Optimization of Automotive Powertrain Systems
HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 2

Relevance between fractional-order hybrid model and unified equivalent circuit model of electric vehicle power battery
Zhang, Qi; Cui, Naxin; Shang, Yunlong; Xing, Guojing; Zhang, Chenghui
Sci China Inf Sci, 2018, 61(7): 070208
Keywords: fractional order; electric vehicle power battery; hybrid battery model; equivalent circuit battery model; kinetic battery model
Cite as: Zhang Q, Cui N X, Shang Y L, et al. Relevance between fractional-order hybrid model and unified equivalent circuit model of electric vehicle power battery. Sci China Inf Sci, 2018, 61(7): 070208, doi: 10.1007/s11432-017-9364-2

Special Focus on Learning and Real-time Optimization of Automotive Powertrain Systems
HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 3

A stochastic logical model-based approximate solution for energy management problem of HEVs
Zhang, Jiangyan; Wu, Yuhu
Sci China Inf Sci, 2018, 61(7): 070207
Keywords: Transient Logical Model; HEV; Optimal Energy Management; Stochastic Control; Approximate Solution
Cite as: Zhang J Y, Wu Y H. A stochastic logical model-based approximate solution for energy management problem of HEVs. Sci China Inf Sci, 2018, 61(7): 070207, doi: 10.1007/s11432-017-9329-6

Vol. 61, No. 5, 2018 Cover Contents

HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 0

Modern physiognomy: an investigation on predicting personality traits and intelligence from the human face
Qin, Rizhen; Gao, Wei; Xu, Huarong; Hu, Zhanyi
Sci China Inf Sci, 2018, 61(5): 058105
Keywords: modern physiognomy; self-reported personality trait; measured intelligence; the facial feature; the classi cation method; the regression method
Cite as: Qin R Z, Gao W, Xu H R, et al. Modern physiognomy: an investigation on predicting personality traits and intelligence from the human face. Sci China Inf Sci, 2018, 61(5): 058105, doi: 10.1007/s11432-016-9174-0

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 3

Spatial image encryption algorithm based on chaotic map and pixel frequency
Ye, Guodong; Huang, Xiaoling
Sci China Inf Sci, 2018, 61(5): 058104
Keywords: Image encryption; pixel frequency; multimedia security; chaotic map; keystream
Cite as: Ye G D, Huang X L. Spatial image encryption algorithm based on chaotic map and pixel frequency. Sci China Inf Sci, 2018, 61(5): 058104, doi: 10.1007/s11432-017-9191-x

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Securely min and k-th min computations with fully homomorphic encryption
Jiang, Bingbing; Zhang, Yuan
Sci China Inf Sci, 2018, 61(5): 058103
Keywords: secure minimum computation; secure k-th minimum computation; FHE; lattice-based cryptosystem; GSW13 scheme
Cite as: Jiang B B, Zhang Y. Securely min and k-th min computations with fully homomorphic encryption. Sci China Inf Sci, 2018, 61(5): 058103, doi: 10.1007/s11432-017-9205-0

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Keywords: block cipher; 3D cipher; alternate structure; differential cryptanalysis; practical security; active S-box
Cite as: Wang Q, Jin C H. A non-alternate 3D structure and its practical security evaluation against differential and linear cryptanalysis. Sci China Inf Sci, 2018, 61(5): 058102, doi: 10.1007/s11432-017-9181-4

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

LR-RRA-CCA secure functional encryption for randomized functionalities from trapdoor HPS and LAF
Wang, Huige; Chen, Kefei; Qin, Baodong; Hu, Ziyuan
Sci China Inf Sci, 2018, 61(5): 058101
Keywords: functional encryption; related randomness attack; RRA; chosen-ciphertext attack; CCA; trapdoor hash proof system; THPS; differing-inputs obfuscation
Cite as: Wang H G, Chen K F, Qin B D, et al. LR-RRA-CCA secure functional encryption for randomized functionalities from trapdoor HPS and LAF. Sci China Inf Sci, 2018, 61(5): 058101, doi: 10.1007/s11432-017-9120-4

Vol. 61, No. 4, 2018 Cover Contents

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 2

Queue-aware energy-efficient scheduling and power allocation with feedback reduction in small-cell networks
Wei, Hongxin; Li, Yunzhou; Xiao, Limin; Zhou, Shidong
Sci China Inf Sci, 2018, 61(4): 048301
Keywords: energy efficient; power allocation; user scheduling; small-cell; interference; Lyapunov theory; resource allocation; mean rate stable; feedback
Cite as: Wei H X, Li Y Z, Xiao L M, et al. Queue-aware energy-efficient scheduling and power allocation with feedback reduction in small-cell networks. Sci China Inf Sci, 2018, 61(4): 048301, doi: 10.1007/s11432-017-9131-0

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Distribution-dependent concentration inequalities for tighter generalization bounds
Wu, Xinxing; Zhang, Junping
Sci China Inf Sci, 2018, 61(4): 048105
Keywords: learning theory; concentration inequality; distribution-dependent; statistical learning theory; generalization ability
Cite as: Wu X X, Zhang J P. Distribution-dependent concentration inequalities for tighter generalization bounds. Sci China Inf Sci, 2018, 61(4): 048105, doi: 10.1007/s11432-017-9225-2

HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 0

Packing unequal circles into a square container based on the narrow action spaces
He, Kun; Dosh, Mohammed; Jin, Yan; Zou, Shenghao
Sci China Inf Sci, 2018, 61(4): 048104
Keywords: global optimization; circle packing; narrow action space; partitioned circle; Quasi-physical
Cite as: He K, Dosh M, Jin Y, et al. Packing unequal circles into a square container based on the narrow action spaces. Sci China Inf Sci, 2018, 61(4): 048104, doi: 10.1007/s11432-017-9223-3

HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 13

Cross-cluster asymmetric group key agreement for wireless sensor networks
Zheng, Jiamin; Tan, Yu-An; Zhang, Qikun; Zhang, Xiaosong; Zhu, Liehuang; Zhang, Quanxin
Sci China Inf Sci, 2018, 61(4): 048103
Keywords: wireless sensor network; asymmetric group key agreement; authenticated protocol; key self-confirmation; asymmetric calculation
Cite as: Zheng J M, Tan Y A, Zhang Q K, et al. Cross-cluster asymmetric group key agreement for wireless sensor networks. Sci China Inf Sci, 2018, 61(4): 048103, doi: 10.1007/s11432-017-9212-2

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 2

Simulation-based security of function-hiding inner product encryption
Zhao, Qingsong; Zeng, Qingkai; Liu, Ximeng; Xu, Huanliang
Sci China Inf Sci, 2018, 61(4): 048102
Keywords: functional encryption; inner product; function privacy; simulation-based security; asymmetric bilinear group
Cite as: Zhao Q S, Zeng Q K, Liu X M, et al. Simulation-based security of function-hiding inner product encryption. Sci China Inf Sci, 2018, 61(4): 048102, doi: 10.1007/s11432-017-9224-9

HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 0

A novel anti-detection criterion for covert storage channel threat estimation
Wang, Chong; Zhang, Changyou; Wu, Bin; Tan, Yu'an; Wang, Yongji
Sci China Inf Sci, 2018, 61(4): 048101
Keywords: covert storage channel; information security; covert channel threat evaluation; anti-detection criterion; covert channel restriction
Cite as: Wang C, Zhang C Y, Wu B, et al. A novel anti-detection criterion for covert storage channel threat estimation. Sci China Inf Sci, 2018, 61(4): 048101, doi: 10.1007/s11432-017-9211-1

Vol. 61, No. 3, 2018 Cover Contents

Special Issue on Information Security
HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 5

Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation
Sun, Lixue; Xu, Chunxiang; Zhang, Mingwu; Chen, Kefei; Li, Hongwei
Sci China Inf Sci, 2018, 61(3): 038106
Keywords: Public key encryption with keyword search; Insider keyword guessing attack; Indistinguishability obfuscation; Cloud storage; Signcryption
Cite as: Sun L X, Xu C X, Zhang M W, et al. Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation. Sci China Inf Sci, 2018, 61(3): 038106, doi: 10.1007/s11432-017-9124-0

Special Issue on Information Security
HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 0

Improved cryptanalysis of step-reduced SM3
Shen, Yanzhao; Bai, Dongxia; Yu, Hongbo
Sci China Inf Sci, 2018, 61(3): 038105
Keywords: SM3; preimage attack; boomerang attack; differential meet-in-the-middle; hash function
Cite as: Shen Y Z, Bai D X, Yu H B. Improved cryptanalysis of step-reduced SM3. Sci China Inf Sci, 2018, 61(3): 038105, doi: 10.1007/s11432-017-9119-6

Special Issue on Information Security
HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

More permutation polynomials with differential uniformity six
Tu, Ziran; Zeng, Xiangyong; Zhang, Zhiyong
Sci China Inf Sci, 2018, 61(3): 038104
Keywords: permutation; differential uniformity; algebraic degree; differential attack; nonlinearity
Cite as: Tu Z R, Zeng X Y, Zhang Z Y. More permutation polynomials with differential uniformity six. Sci China Inf Sci, 2018, 61(3): 038104, doi: 10.1007/s11432-017-9118-5

Special Issue on Information Security
HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 1

Improved automatic search of impossible differentials for camellia with FL/FL-1 layers
Ding, Yaoling; Wang, Xiaoyun; Wang, Ning; Wang, Wei
Sci China Inf Sci, 2018, 61(3): 038103
Keywords: automatic search; impossible differentials; Camellia; weak key
Cite as: Ding Y L, Wang X Y, Wang N, et al. Improved automatic search of impossible differentials for camellia with FL/FL-1 layers. Sci China Inf Sci, 2018, 61(3): 038103, doi: 10.1007/s11432-016-9104-3

Special Issue on Information Security
HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Several classes of negabent functions over finite fields
Wu, Gaofei; Li, Nian; Zhang, Yuqing; Liu, Xuefeng
Sci China Inf Sci, 2018, 61(3): 038102
Keywords: Finite field; Negabent function; Nega-Hadamard transform; Bent function; Kloosterman sum; Niho exponent
Cite as: Wu G F, Li N, Zhang Y Q, et al. Several classes of negabent functions over finite fields. Sci China Inf Sci, 2018, 61(3): 038102, doi: 10.1007/s11432-017-9096-0

Special Issue on Information Security
HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 1

Construction of rotation symmetric bent functions with maximum algebraic degree
Zhang, Wenying; Han, Guoyong
Sci China Inf Sci, 2018, 61(3): 038101
Keywords: Cryptography; Boolean function; Bent function; Rotation symmetric function; Algebraic degree
Cite as: Zhang W Y, Han G Y. Construction of rotation symmetric bent functions with maximum algebraic degree. Sci China Inf Sci, 2018, 61(3): 038101, doi: 10.1007/s11432-017-9123-2

Vol. 61, No. 2, 2018 Cover Contents

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Network topology inference from incomplete observation data
Dou, Peng; Song, Guojie; Zhao, Tong
Sci China Inf Sci, 2018, 61(2): 028102
Keywords: Network inference; Incomplete cascade; Social influence; Information diffusion; Greedy algorithm
Cite as: Dou P, Song G J, Zhao T. Network topology inference from incomplete observation data. Sci China Inf Sci, 2018, 61(2): 028102, doi: 10.1007/s11432-017-9154-1

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 1

The verification of conversion algorithms between finite automata
Jiang, Dongchen; Li, Wei
Sci China Inf Sci, 2018, 61(2): 028101
Keywords: finite automata; conversion algorithm; algorithm verification; constructive proof; algorithm specification
Cite as: Jiang D C, Li W. The verification of conversion algorithms between finite automata. Sci China Inf Sci, 2018, 61(2): 028101, doi: 10.1007/s11432-017-9155-x

Vol. 61, No. 1, 2018 Cover Contents

HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 4

Two-stage local constrained sparse coding for fine-grained visual categorization
Guo, Lihua; Guo, Chenggang; Li, Lei; Huang, Qinghua; Li, Yanshan; Li, Xuelong
Sci China Inf Sci, 2018, 61(1): 018104
Keywords: Fine-grained visual categorization; Local Constrained Sparse Coding; Deep learning; Pose alignment; Dictionary learning
Cite as: Guo L H, Guo C G, Li L, et al. Two-stage local constrained sparse coding for fine-grained visual categorization. Sci China Inf Sci, 2018, 61(1): 018104, doi: 10.1007/s11432-017-9158-x

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Robust video denoising with sparse and dense noise modelings
Shen, Guiping; Han, Zhi; Chen, Xi'ai; Tang, Yandong
Sci China Inf Sci, 2018, 61(1): 018103
Keywords: low rank factorization; matrix completion; noise modeling; video denoising; mixture of Gaussians
Cite as: Shen G P, Han Z, Chen X A, et al. Robust video denoising with sparse and dense noise modelings. Sci China Inf Sci, 2018, 61(1): 018103, doi: 10.1007/s11432-017-9200-6

HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 1

Model-based variational fusion for reducing spectral distortion
Zhou, Zeming; Chen, Chaoqian; Meng, Yong; Hu, Biao
Sci China Inf Sci, 2018, 61(1): 018102
Keywords: pan-sharpening; variational fusion; model-based fusion; gradient descend flow; MTF
Cite as: Zhou Z M, Chen C Q, Meng Y, et al. Model-based variational fusion for reducing spectral distortion. Sci China Inf Sci, 2018, 61(1): 018102, doi: 10.1007/s11432-016-9085-y

HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 1

Accurate inference of user popularity preference in a large-scale online video streaming system
Tan, Xiaoying; Guo, Yuchun; Chen, Yishuai; Zhu, Wei
Sci China Inf Sci, 2018, 61(1): 018101
Keywords: video popularity; user preference; inference algorithm; recommendation algorithm; online video streaming system
Cite as: Tan X Y, Guo Y C, Chen Y S, et al. Accurate inference of user popularity preference in a large-scale online video streaming system. Sci China Inf Sci, 2018, 61(1): 018101, doi: 10.1007/s11432-016-9078-0