Vol. 59, No. 1, 2016 Cover Contents

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 2
Transmission frequency-band hidden technology in physical layer security
Li, Xiangyu; Jin, Liang; Huang, Kaizhi; Liu, Lu
Sci China Inf Sci, 2016, 59(1): 019301

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 1
Multi-target positioning for passive sensor network via bistatic range space projection
Shi, Jun; Fan, Ling; Zhang, Xiaoling; Shi, Tongyan
Sci China Inf Sci, 2016, 59(1): 019302

Vol. 59, No. 2, 2016 Cover Contents

LETTER Website SpringerLink Google Scholar Cited in SCI: 0
A novel user behavioral aggregation method based on synonym groups in online video systems
Feng, Tingting; Guo, Yuchun; Chen, Yishuai
Sci China Inf Sci, 2016, 59(2): 029101

LETTER Website SpringerLink Google Scholar Cited in SCI: 3
A throughput aware with collision-free MAC for wireless LANs
Pei, Tingrui; Deng, Yafeng; Li, Zhetao; Zhu, Gengming; Pan, Gaofeng; Choi, Youngjune; Sekiya, Hiroo
Sci China Inf Sci, 2016, 59(2): 029301

Vol. 59, No. 3, 2016 Cover Contents

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Public verifiability for shared data in cloud storage with a defense against collusion attacks
Wang, Zhonghua; Han, Zhen; Liu, Jiqiang
Sci China Inf Sci, 2016, 59(3): 039101

Vol. 59, No. 4, 2016 Cover Contents

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 1
Biclique cryptanalysis using balanced complete bipartite subgraphs
Gong, Zheng; Liu, Shusheng; Wen, Yamin; Luo, Yiyuan; Qiu, Weidong
Sci China Inf Sci, 2016, 59(4): 049101

Vol. 59, No. 5, 2016 Cover Contents

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 3
Spherical torus-based video hashing for near-duplicate video detection
Nie, Xiushan; Chai, Yane; Liu, Ju; Sun, Jiande; Yin, Yilong
Sci China Inf Sci, 2016, 59(5): 059101

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Further results on constructions of generalized bent Boolean functions
Zhang, Fengrong; Xia, Shixiong; Stanica, Pantelimon; Zhou, Yu
Sci China Inf Sci, 2016, 59(5): 059102

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 1
Novel cover selection criterion for spatial steganography using linear pixel prediction error
Huang, Wei; Zhao, Xianfeng
Sci China Inf Sci, 2016, 59(5): 059103

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Semi-fragile watermarking for image authentication based on compressive sensing
Du, Ling; Cao, Xiaochun; Zhang, Wei; Zhang, Xinpeng; Liu, Na; Wei, Jianguo
Sci China Inf Sci, 2016, 59(5): 059104

Vol. 59, No. 6, 2016 Cover Contents

LETTER Website SpringerLink Google Scholar Cited in SCI: 0
Flow-based queue management for fairness control in high-bandwidth network
Choi, Wonjun; Sekhon, Ramneek; Seok, Woojin
Sci China Inf Sci, 2016, 59(6): 069301

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Design method for low index trench and rod assisted weakly-coupled multi-core fiber
Tu, Jiajing; Long, Keping
Sci China Inf Sci, 2016, 59(6): 069302

Vol. 59, No. 7, 2016 Cover Contents

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Sketch-based stroke generation in Chinese flower painting
Yang, Lijie; Xu, Tianchen; Du, Jixiang; Wu, Enhua
Sci China Inf Sci, 2016, 59(7): 079101

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
New constructions of q-variable 1-resilient rotation symmetric functions over F-p
Du, Jiao; Fu, Shaojing; Qu, Longjiang; Li, Chao; Pang, Shanqi
Sci China Inf Sci, 2016, 59(7): 079102

Vol. 59, No. 8, 2016 Cover Contents

LETTER Website SpringerLink Google Scholar Cited in SCI: 1
RMI-DRE: a redundancy-maximizing identification scheme for data redundancy elimination
Zhang, Nan; Yang, Xiaolong; Zhang, Min; Long, Keping
Sci China Inf Sci, 2016, 59(8): 089301

Vol. 59, No. 9, 2016 Cover Contents

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Construction of MDS block diffusion matrices for block ciphers and hash functions
Zhao, Ruoxin; Zhang, Rui; Li, Yongqiang; Wu, Baofeng
Sci China Inf Sci, 2016, 59(9): 099101

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Single-view determinacy and rewriting completeness for a fragment of XPath queries
Zheng, Lixiao; Ma, Shuai; Luo, Xiangyu; Ma, Tiejun
Sci China Inf Sci, 2016, 59(9): 099102

LETTER Website SpringerLink Google Scholar Cited in SCI: 3
New algorithms for verifiable outsourcing of bilinear pairings
Ren, Yanli; Ding, Ning; Wang, Tianyin; Lu, Haining; Gu, Dawu
Sci China Inf Sci, 2016, 59(9): 099103

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 2
Algebraic techniques in slender-set differential cryptanalysis of PRESENT-like cipher
Liu, Guo-Qiang; Jin, Chen-Hui
Sci China Inf Sci, 2016, 59(9): 099104

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 3
Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption
Zhang, Kai; Ma, Jianfeng; Liu, Jiajia; Li, Hui
Sci China Inf Sci, 2016, 59(9): 099105

Vol. 59, No. 10, 2016 Cover Contents

LETTER Website SpringerLink Google Scholar Cited in SCI: 0
Accurate non-contact retrieval in micro vibration by a 100GHz radar
Wang, Rui; Li, Aolin; Hu, Cheng; Zeng, Tao
Sci China Inf Sci, 2016, 59(10): 109301

LETTER Website SpringerLink Google Scholar Cited in SCI: 0
A compact SCR model using advanced BJT models and standard SPICE elements
Cao, Jian; Xu, Jingya; Wang, Yuan; Lu, Guangyi; Zhang, Xing
Sci China Inf Sci, 2016, 59(10): 109302

Vol. 59, No. 11, 2016 Cover Contents

LETTER Website SpringerLink Google Scholar Cited in SCI: 0
A greedy selection approach for query suggestion diversification in search systems
Cai, Fei; Chen, Honghui; Shu, Zhen
Sci China Inf Sci, 2016, 59(11): 119101

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 1
Traceable and revocable CP-ABE with shorter ciphertexts
Ning, Jianting; Cao, Zhenfu; Dong, Xiaolei; Wei, Lifei
Sci China Inf Sci, 2016, 59(11): 119102

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 6
Constructions of vectorial Boolean functions with good cryptographic properties
Li, Luyang; Zhang, Weiguo
Sci China Inf Sci, 2016, 59(11): 119103

Vol. 59, No. 12, 2016 Cover Contents

LETTER Website SpringerLink Google Scholar Cited in SCI: 0
Bi-conjugate gradient based computation of weight vector in space-time adaptive processing
Bai, Gatai; Tao, Ran; Wang, Yue
Sci China Inf Sci, 2016, 59(12): 129301

LETTER Website SpringerLink Google Scholar Cited in SCI: 4
Feasibility study of inclined geosynchronous SAR focusing using Beidou IGSO signals
Dong, Xichao; Hu, Cheng; Tian, Weiming; Zhang, Tian; Li, Yuanhao
Sci China Inf Sci, 2016, 59(12): 129302

Vol. 60, No. 1, 2017 Cover Contents

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Attribute-based non-interactive key exchange
Tang, Fei; Zhang, Rui; Li, Hongda
Sci China Inf Sci, 2017, 60(1): 019101

LETTER Website SpringerLink Google Scholar Cited in SCI: 0
MLXR: multi-layer obstacle-avoiding X-architecture Steiner tree construction for VLSI routing
Huang, Xing; Guo, Wenzhong; Liu, Genggeng; Chen, Guolong
Sci China Inf Sci, 2017, 60(1): 019102

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Identifying superword level parallelism with extended directed dependence graph reachability
Zhao, Jie; Zhao, Rongcai
Sci China Inf Sci, 2017, 60(1): 019103

Vol. 60, No. 2, 2017 Cover Contents

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Soil moisture change estimation using InSAR coherence variations with preliminary laboratory measurements
Yin, Qiang; Hong, Wen; Lin, Yun; Li, Yang
Sci China Inf Sci, 2017, 60(2): 029301

LETTER Website SpringerLink Google Scholar Cited in SCI: 0
A power manager system with 78% efficiency for high-voltage triboelectric nanogenerators
Luo, Lichuan; Bao, Dechun; Yu, Wuqi; Zhang, Zhaohua; Ren, Tianling
Sci China Inf Sci, 2017, 60(2): 029401

LETTER Website SpringerLink Google Scholar Cited in SCI: 0
Testing of 1TnR RRAM array with sneak path technique
Cui, Xiaole; Zhang, Qiang; Cui, Xiaoxin; Wang, Xinan; Kang, Jinfeng; Liu, Xiaoyan
Sci China Inf Sci, 2017, 60(2): 029402

Vol. 60, No. 3, 2017 Cover Contents

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 1
Improved linear (hull) cryptanalysis of round-reduced versions of SIMON
Shi, Danping; Hu, Lei; Sun, Siwei; Song, Ling; Qiao, Kexin; Ma, Xiaoshuang
Sci China Inf Sci, 2017, 60(3): 039101

LETTER Website SpringerLink Google Scholar Cited in SCI: 0
Linear invariant generation for verification of nonlinear hybrid systems via conservative approximation
Zeng, Xia; Lin, Wang; Yang, Zhengfeng; Zeng, Zhenbing
Sci China Inf Sci, 2017, 60(3): 039102

Vol. 60, No. 4, 2017 Cover Contents

LETTER Website SpringerLink Google Scholar Cited in SCI: 0
A random linear code based secure transmission scheme for wireless fading channels
Olawoyin, Lukman A.; Zhang, Nana; Oloyede, A. O.; Faruk, Nasir; Yang, Hongwen
Sci China Inf Sci, 2017, 60(4): 049301

LETTER Website SpringerLink Google Scholar Cited in SCI: 0
General, practical, and accurate models for the performance analysis of cache cascades
Huang, Haoqiu; Rui, Lanlan; Zheng, Weiwei; Niu, Danmei; Qiu, Xuesong
Sci China Inf Sci, 2017, 60(4): 049302

Vol. 60, No. 5, 2017 Cover Contents

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Avoiding monopolization: mutual-aid collusive attack detection in cooperative spectrum sensing
Feng, Jingyu; Lu, Guangyue; Zhang, Yuqing; Wang, Honggang
Sci China Inf Sci, 2017, 60(5): 059101

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Common patterns of online collective attention flow
Li, Yong; Meng, Xiaofeng; Zhang, Qiang; Zhang, Jiang; Wang, Changqing
Sci China Inf Sci, 2017, 60(5): 059102

Vol. 60, No. 6, 2017 Cover Contents

LETTER Website SpringerLink Google Scholar Cited in SCI: 0
Linear precoding based on a non-ideal Nakagami-m channel in a massive MIMO system
Dai, Jianxin; Wang, Jun; Cheng, Chonghu; Chen, Ming; Zhou, Jin
Sci China Inf Sci, 2017, 60(6): 069301

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
A novel sea-land segmentation based on integral image reconstruction in MWIR images
Zhuang, Yin; Guo, Dechun; Chen, He; Bi, Fukun; Ma, Long; Soomro, Nouman Q.
Sci China Inf Sci, 2017, 60(6): 069302

LETTER Website SpringerLink Google Scholar Cited in SCI: 1
Impacts of outdated CSI for secure cooperative systems with opportunistic relay selection
Zhao, Rui; Lin, Hongxin; He, Yu-Cheng; Chen, Dong-Hua; Huang, Yongming
Sci China Inf Sci, 2017, 60(6): 069303

Vol. 60, No. 7, 2017 Cover Contents

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Characteristic model-based control of robotic manipulators with dynamic uncertainties
Wang, Lijiao; Meng, Bin
Sci China Inf Sci, 2017, 60(7): 079201

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Iterative learning control approach for consensus of multi-agent systems with regular linear dynamics
Fu, Qin; Gu, Panpan; Li, Xiangdong; Wu, Jianrong
Sci China Inf Sci, 2017, 60(7): 079202

Vol. 60, No. 8, 2017 Cover Contents

Special Focus on Millimeter Wave Communications Techniques and Devices for 5G
LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
An 80-83 GHz CMOS DCO based on DiCAD technique for size, linearity and noise optimization
Wang, Zhiping; Jia, Haikun; Kuang, Lixue; Chi, Baoyong
Sci China Inf Sci, 2017, 60(8): 080401

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Multisite computation offloading in dynamic mobile cloud environments
Jin, Xiaomin; Liu, Yuanan; Fan, Wenhao; Wu, Fan; Tang, Bihua
Sci China Inf Sci, 2017, 60(8): 089301

LETTER Website SpringerLink Google Scholar Cited in SCI: 0
A low power V-band LC VCO with high Q varactor technique in 40 nm CMOS process
ZHOU, Qian; HAN, Yan; ZHANG, Shifeng; HAN, Xiaoxia; JIE, Lu; CHEUNG, Ray C. C.; FENG, Guangtao
Sci China Inf Sci, 2017, 60(8): 089401

Vol. 60, No. 9, 2017 Cover Contents

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Single key recovery attacks on reduced AES-192 and Kalyna-128/256
Wang, Gaoli; Zhu, Chunbo
Sci China Inf Sci, 2017, 60(9): 099101

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Convergence analysis of ILC input sequence for underdetermined linear systems
Shen, Dong; Han, Jian; Wang, Youqing
Sci China Inf Sci, 2017, 60(9): 099201

Vol. 60, No. 10, 2017 Cover Contents

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
High-dynamics pulse-shaped signal simulation based on polynomial-based interpolation filters
Lu, Shaozhong; Wang, Yongqing; Li, Sheng; Wu, Siliang
Sci China Inf Sci, 2017, 60(10): 109301

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
An efficient data compression technique based on BPDN for scattered fields from complex targets
Quan, Xiangyin; Zhang, Bingchen; Wang, Zhengdao; Gao, Chao; Wu, Yirong
Sci China Inf Sci, 2017, 60(10): 109302

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Transistor level SCA-resistant scheme based on fluctuating power logic
Geng, Liang; Zhang, Fan; Shen, Jizhong; He, Wei; Bhasin, Shivam; Zhao, Xinjie; Guo, Shize
Sci China Inf Sci, 2017, 60(10): 109401

Vol. 60, No. 11, 2017 Cover Contents

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 1
Generating pairing-friendly elliptic curves with fixed embedding degrees
Li, Liang
Sci China Inf Sci, 2017, 60(11): 119101

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
An efficient pairing-free certificateless signature scheme for resource-limited systems
Wang, Liangliang; Chen, Kefei; Long, Yu; Wang, Huige
Sci China Inf Sci, 2017, 60(11): 119102

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
APRS: a privacy-preserving location-aware recommender system based on differentially private histogram
Gao, Sheng; Ma, Xindi; Zhu, Jianming; Ma, Jianfeng
Sci China Inf Sci, 2017, 60(11): 119103

LETTER Website SpringerLink Google Scholar Cited in SCI: 0
Direct constructions and proofs for CCA secure (LR)IBE with dual system encryption
Zhao, Yi; Yang, Bo
Sci China Inf Sci, 2017, 60(11): 119104

Vol. 60, No. 12, 2017 Cover Contents

LETTER Website SpringerLink Google Scholar Cited in SCI: 0
New strategy for searching disturbance vector of SHA-1 collision attack
Feng, Hao; Zeng, Guang; Han, Wenbao; Yang, Yang
Sci China Inf Sci, 2017, 60(12): 129101

LETTER Website SpringerLink Google Scholar Cited in SCI: 1
A four-channel time-interleaved 30-GS/s 6-bit ADC in 0.18 mu m SiGe BiCMOS technology
Zhu, Xiaoge; Wu, Danyu; Zhou, Lei; Huang, Yinkun; Wu, Jin; Liu, Xinyu
Sci China Inf Sci, 2017, 60(12): 129401

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Modeling the impact of process and operation variations on the soft error rate of digital circuits
Song, Ruiqiang; Chen, Shuming; Liang, Bin; Chi, Yaqing; Chen, Jianjun
Sci China Inf Sci, 2017, 60(12): 129402

Vol. 61, No. 1, 2018 Cover Contents

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Integral cryptanalysis of SPN ciphers with binary permutations
Song, Hailong; Wei, Yuechuan
Sci China Inf Sci, 2018, 61(1): 019101

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
An imporosity message scheduling based on modified genetic algorithm for time-triggered Ethernet
Zhang, Yingjing; He, Feng; Lu, Guangshan; Xiong, Huagang
Sci China Inf Sci, 2018, 61(1): 019102

Vol. 61, No. 2, 2018 Cover Contents

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Multi-key FHE for multi-bit messages
Li, Zengpeng; Ma, Chunguang; Zhou, Hongsheng
Sci China Inf Sci, 2018, 61(2): 029101

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
A novel word length optimization method for radix-2(k) fixed-point FFT
Yang, Chen; Xie, Yizhuang; Chen, He
Sci China Inf Sci, 2018, 61(2): 029301

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Resource allocation in multiple-relay systems exploiting opportunistic energy harvesting
Chen, Zeyu; Tang, Lan; Zhang, Xinggan; Bai, Yechao
Sci China Inf Sci, 2018, 61(2): 029302

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Outage analysis of cognitive two-way relaying networks with SWIPT over Nakagami-m fading channels
Yang, Jing; Gao, Xiqi; Han, Shanyang; Peppas, Kostas P.; Mathiopoulos, P. Takis
Sci China Inf Sci, 2018, 61(2): 029303

LETTER Website SpringerLink Google Scholar Cited in SCI: 0
The design and performance analysis of optical wireless ACO-MC-CDMA system in the presence of clipping noise
Jia, Kejun; Hao, Li
Sci China Inf Sci, 2018, 61(2): 029304

LETTER Website SpringerLink Google Scholar Cited in SCI: 0
Secure resource allocation for green and cognitive device-to-device communication
Xu, Chi; Zeng, Peng; Liang, Wei; Yu, Haibin
Sci China Inf Sci, 2018, 61(2): 029305

Vol. 61, No. 3, 2018 Cover Contents

Special Issue on Information Security
LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Secure and efficient k-nearest neighbor query for location-based services in outsourced environments
Wu, Haiqin; Wang, Liangmin; Jiang, Tao
Sci China Inf Sci, 2018, 61(3): 039101

Special Issue on Information Security
LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Efficient flush-reload cache attack on scalar multiplication based signature algorithm
Zhou, Ping; Wang, Tao; Lou, Xiaoxuan; Zhao, Xinjie; Zhang, Fan; Guo, Shize
Sci China Inf Sci, 2018, 61(3): 039102

Special Issue on Information Security
LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Protecting white-box cryptographic implementations with obfuscated round boundaries
Xu, Tao; Wu, Chuankun; Liu, Feng; Zhao, Ruoxin
Sci China Inf Sci, 2018, 61(3): 039103

Special Issue on Information Security
LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Efficient and secure outsourcing of bilinear pairings with single server
Dong, Min; Ren, Yanli
Sci China Inf Sci, 2018, 61(3): 039104

Special Issue on Information Security
LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Verifiable random functions with Boolean function constraints
Wang, Qianwen; Feng, Rongquan; Zhu, Yan
Sci China Inf Sci, 2018, 61(3): 039105

Special Issue on Information Security
LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 1
Optimal model search for hardware-trojan-based bit-level fault attacks on block ciphers
Zhao, Xinjie; Zhang, Fan; Guo, Shize; Gong, Zheng
Sci China Inf Sci, 2018, 61(3): 039106

Vol. 61, No. 4, 2018 Cover Contents

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Nonlocal image denoising using edge-based similarity metric and adaptive parameter selection
Fan, Linwei; Li, Xuemei; Guo, Qiang; Zhang, Caiming
Sci China Inf Sci, 2018, 61(4): 049101

LETTER Website SpringerLink Google Scholar Cited in SCI: 0
DESC: enabling secure data exchange based on smart contracts
Liang, Jiao; Han, Weili; Guo, Zeqing; Chen, Yaoliang; Cao, Chang; Wang, Xiaoyang Sean; Li, Fenghua
Sci China Inf Sci, 2018, 61(4): 049102

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Visible and infrared image fusion using l0-generalized total variation model
Pan, Han; Jing, Zhongliang; Qiao, Lingfeng; Li, Minzhe
Sci China Inf Sci, 2018, 61(4): 049103

Vol. 61, No. 5, 2018

Special Focus on Internetware: Research Progress and Current Trend
LETTER Website SpringerLink Google Scholar
LogPruner: detect, analyze and prune logging calls in Android apps
Zhou X, Wu K D, Cai H Q, et al
Sci China Inf Sci, 2018, 61(5): 050107

Special Focus on Internetware: Research Progress and Current Trend
LETTER Website SpringerLink Google Scholar
Mining API usage change rules for software framework evolution
Yu P, Yang F, Cao C, et al
Sci China Inf Sci, 2018, 61(5): 050108

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
A lower dimension lattice attack on NTRU
Yang, Zhichao; Fu, Shaojing; Qu, Longjiang; Li, Chao
Sci China Inf Sci, 2018, 61(5): 059101

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
New constructions for (multiparty) one-round key exchange with strong security
Yang, Zheng; Lai, Junyu
Sci China Inf Sci, 2018, 61(5): 059102

LETTER Website SpringerLink Google Scholar Cited in SCI: 0
Fingerprint-based access to personally controlled health records in emergency situations
Guan, Shaopeng; Wang, Yongyu; Shen, Jian
Sci China Inf Sci, 2018, 61(5): 059103

Vol. 61, No. 6, 2018

Special Focus on Memristive Devices and Neuromorphic Computing
LETTER Website SpringerLink Google Scholar
Excitatory and inhibitory actions of a memristor bridge synapse
Yang C J, Adhikari S P, Kim H S
Sci China Inf Sci, 2018, 61(6): 060427

LETTER Website SpringerLink Google Scholar
Evaluation of redundancy-based system: a model checking approach
Fang L, Mu C Y, Cheng Z, et al
Sci China Inf Sci, 2018, 61(6): 069101

LETTER Website SpringerLink Google Scholar Cited in SCI: 0
Transmission delay inconsistency in satellite array antennas cause elevation-dependent pseudorange biases in GNSS signals
Xu, Hailong; Cui, Xiaowei; Zhao, Sihao; Lu, Mingquan
Sci China Inf Sci, 2018, 61(6): 069301

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
A kind of compact ultra-broad bandpass planar terahertz filter
Zhong, Renbin; Ding, Hong; Liu, Yan; Liu, Shenggang
Sci China Inf Sci, 2018, 61(6): 069401

LETTER Website SpringerLink Google Scholar Cited in SCI: 0
A study of residual characteristics in floating gate transistors
Wang, Jia; Zhao, Yiqiang; Xin, Ruishan; Ye, Mao
Sci China Inf Sci, 2018, 61(6): 069402

LETTER Website SpringerLink Google Scholar
Defect characterization of amorphous silicon thin film solar cell based on low frequency noise
Hu L N, He L, Chen H, et al
Sci China Inf Sci, 2018, 61(6): 069403

LETTER Website SpringerLink Google Scholar Supplementary
Design of mm-wave amplifiers based on over & under neutralization techniques
Li D, Zhang L, Zhang L, et al
Sci China Inf Sci, 2018, 61(6): 069404

LETTER Website SpringerLink Google Scholar Supplementary
GeC film with high substitutional carbon concentration formed by ion implantation and solid phase epitaxy for strained Ge n-MOSFETs
Zhang B X, An X, Hu X Y, et al
Sci China Inf Sci, 2018, 61(6): 069405

Vol. 61, No. 8, 2018

LETTER Website SpringerLink Google Scholar Supplementary
Energy efficient power allocation for underlaying mobile D2D communications with peak/average interference constraints
Zhang R, Li Y Z, Wang C-X, et al
Sci China Inf Sci, 2018, 61(8): 089301

LETTER Website SpringerLink Google Scholar Supplementary
Nonbinary LDPC cycle codes: efficient search, design, and code optimization
Xu H Z, Chen C, Zhu M, et al
Sci China Inf Sci, 2018, 61(8): 089303

Vol. 61, No. 9, 2018

LETTER Website SpringerLink Google Scholar Supplementary
Smooth fractal surfaces derived from bicubic rational fractal interpolation functions
Bao F X, Yao X X, Sun Q H, et al
Sci China Inf Sci, 2018, 61(9): 099104