Vol. 59, No. 1, 2016 Cover Contents

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 2
Transmission frequency-band hidden technology in physical layer security
Li, Xiangyu; Jin, Liang; Huang, Kaizhi; Liu, Lu
Sci China Inf Sci, 2016, 59(1): 019301
Keywords: Physical layer security; frequency-band hidden; artificial noise; secrecy rate; multiple-input multiple-output

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 1
Multi-target positioning for passive sensor network via bistatic range space projection
Shi, Jun; Fan, Ling; Zhang, Xiaoling; Shi, Tongyan
Sci China Inf Sci, 2016, 59(1): 019302
Keywords: bistatic range space; greedy and cleaning strategy; information projection; multi-target positioning; passive radar sensor network

Vol. 59, No. 2, 2016 Cover Contents

LETTER Website SpringerLink Google Scholar Cited in SCI: 1
A novel user behavioral aggregation method based on synonym groups in online video systems
Feng, Tingting; Guo, Yuchun; Chen, Yishuai
Sci China Inf Sci, 2016, 59(2): 029101
Keywords: user behavioral aggregation; synonym group; gender inference; user interest preference; personalized service

LETTER Website SpringerLink Google Scholar Cited in SCI: 3
A throughput aware with collision-free MAC for wireless LANs
Pei, Tingrui; Deng, Yafeng; Li, Zhetao; Zhu, Gengming; Pan, Gaofeng; Choi, Youngjune; Sekiya, Hiroo
Sci China Inf Sci, 2016, 59(2): 029301
Keywords: distributed wireless network; MAC; CSMA/CA; TDMA; collision-free

Vol. 59, No. 3, 2016 Cover Contents

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Public verifiability for shared data in cloud storage with a defense against collusion attacks
Wang, Zhonghua; Han, Zhen; Liu, Jiqiang
Sci China Inf Sci, 2016, 59(3): 039101
Keywords: cloud computing; public integrity verification; dynamic shared data; anti-collusion attack; user revocation

Vol. 59, No. 4, 2016 Cover Contents

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 1
Biclique cryptanalysis using balanced complete bipartite subgraphs
Gong, Zheng; Liu, Shusheng; Wen, Yamin; Luo, Yiyuan; Qiu, Weidong
Sci China Inf Sci, 2016, 59(4): 049101
Keywords: Cryptanalysis; Biclique; Balanced complete bipartite subgraph; Block cipher; Key recovery

Vol. 59, No. 5, 2016 Cover Contents

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 3
Spherical torus-based video hashing for near-duplicate video detection
Nie, Xiushan; Chai, Yane; Liu, Ju; Sun, Jiande; Yin, Yilong
Sci China Inf Sci, 2016, 59(5): 059101
Keywords: video hashing; near-duplicate video detection; spatiotemporal information; spherical torus; nonnegative matrix factorization

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Further results on constructions of generalized bent Boolean functions
Zhang, Fengrong; Xia, Shixiong; Stanica, Pantelimon; Zhou, Yu
Sci China Inf Sci, 2016, 59(5): 059102
Keywords: Boolean functions; generalized Boolean functions; bent functions; generalized bent functions; high nonlinearity

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 1
Novel cover selection criterion for spatial steganography using linear pixel prediction error
Huang, Wei; Zhao, Xianfeng
Sci China Inf Sci, 2016, 59(5): 059103
Keywords: Steganalysis; Steganography; Linear Pixel Prediction; Cover Selection; Information Hiding

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Semi-fragile watermarking for image authentication based on compressive sensing
Du, Ling; Cao, Xiaochun; Zhang, Wei; Zhang, Xinpeng; Liu, Na; Wei, Jianguo
Sci China Inf Sci, 2016, 59(5): 059104
Keywords: tamper localization; content recovery; compressive sensing; semi-fragile; watermarking

Vol. 59, No. 6, 2016 Cover Contents

LETTER Website SpringerLink Google Scholar Cited in SCI: 0
Flow-based queue management for fairness control in high-bandwidth network
Choi, Wonjun; Sekhon, Ramneek; Seok, Woojin
Sci China Inf Sci, 2016, 59(6): 069301
Keywords: Fairness; QoS; Flow control; Congestion; Network

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Design method for low index trench and rod assisted weakly-coupled multi-core fiber
Tu, Jiajing; Long, Keping
Sci China Inf Sci, 2016, 59(6): 069302
Keywords: Weakly-coupled multi-core fiber; Design method of core; Crosstalk; Cutoff wavelength; Bending loss

Vol. 59, No. 7, 2016 Cover Contents

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Sketch-based stroke generation in Chinese flower painting
Yang, Lijie; Xu, Tianchen; Du, Jixiang; Wu, Enhua
Sci China Inf Sci, 2016, 59(7): 079101
Keywords: interactive drawing; stroke generation; artistic stylization; non-photorealistic rendering; Chinese flower painting

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 1
New constructions of q-variable 1-resilient rotation symmetric functions over F-p
Du, Jiao; Fu, Shaojing; Qu, Longjiang; Li, Chao; Pang, Shanqi
Sci China Inf Sci, 2016, 59(7): 079102
Keywords: cryptography; rotation symmetry; support table; orthogonal array; resilient function

Vol. 59, No. 8, 2016 Cover Contents

LETTER Website SpringerLink Google Scholar Cited in SCI: 1
RMI-DRE: a redundancy-maximizing identification scheme for data redundancy elimination
Zhang, Nan; Yang, Xiaolong; Zhang, Min; Long, Keping
Sci China Inf Sci, 2016, 59(8): 089301
Keywords: redundancy; redundancy-maximizing; dynamic; match; elimination

Vol. 59, No. 9, 2016 Cover Contents

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Construction of MDS block diffusion matrices for block ciphers and hash functions
Zhao, Ruoxin; Zhang, Rui; Li, Yongqiang; Wu, Baofeng
Sci China Inf Sci, 2016, 59(9): 099101
Keywords: Diffusion layer; linear transformation; branch numbers; MDS matrix; minimal polynomial; equivalence relation

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Single-view determinacy and rewriting completeness for a fragment of XPath queries
Zheng, Lixiao; Ma, Shuai; Luo, Xiangyu; Ma, Tiejun
Sci China Inf Sci, 2016, 59(9): 099102
Keywords: views; XPath; view determinacy; rewriting; Completeness

LETTER Website SpringerLink Google Scholar Cited in SCI: 3
New algorithms for verifiable outsourcing of bilinear pairings
Ren, Yanli; Ding, Ning; Wang, Tianyin; Lu, Haining; Gu, Dawu
Sci China Inf Sci, 2016, 59(9): 099103
Keywords: cloud computing; verifiable; outsourcing computation; bilinear pairing; attribute based encryption

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 2
Algebraic techniques in slender-set differential cryptanalysis of PRESENT-like cipher
Liu, Guo-Qiang; Jin, Chen-Hui
Sci China Inf Sci, 2016, 59(9): 099104
Keywords: Algebraic attack; Differential cryptanalysis; Slender-set; PRESENT-like cipher; Magma

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 5
Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption
Zhang, Kai; Ma, Jianfeng; Liu, Jiajia; Li, Hui
Sci China Inf Sci, 2016, 59(9): 099105
Keywords: attribute-based encryption; multi-authority; ciphertext-policy; outsourced decryption , adaptively secure

Vol. 59, No. 10, 2016 Cover Contents

LETTER Website SpringerLink Google Scholar Cited in SCI: 0
Accurate non-contact retrieval in micro vibration by a 100GHz radar
Wang, Rui; Li, Aolin; Hu, Cheng; Zeng, Tao
Sci China Inf Sci, 2016, 59(10): 109301
Keywords: non-contact; micro vibration; W band radar; least squared error; bessel function; amplitude retrieval

LETTER Website SpringerLink Google Scholar Cited in SCI: 0
A compact SCR model using advanced BJT models and standard SPICE elements
Cao, Jian; Xu, Jingya; Wang, Yuan; Lu, Guangyi; Zhang, Xing
Sci China Inf Sci, 2016, 59(10): 109302
Keywords: silicon controlled rectifiers; electrostatic discharge; SPICE model; bipolar junction transistor; transmission line pulse

Vol. 59, No. 11, 2016 Cover Contents

LETTER Website SpringerLink Google Scholar Cited in SCI: 0
A greedy selection approach for query suggestion diversification in search systems
Cai, Fei; Chen, Honghui; Shu, Zhen
Sci China Inf Sci, 2016, 59(11): 119101
Keywords: information retrieval; query suggestion; diversification; query completion; web search

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 1
Traceable and revocable CP-ABE with shorter ciphertexts
Ning, Jianting; Cao, Zhenfu; Dong, Xiaolei; Wei, Lifei
Sci China Inf Sci, 2016, 59(11): 119102
Keywords: Ciphertext-Policy Attribute-Based Encryption; Black-box Traceablity; Revocation; Shorter Ciphertexts; Commercial Applications

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 10
Constructions of vectorial Boolean functions with good cryptographic properties
Li, Luyang; Zhang, Weiguo
Sci China Inf Sci, 2016, 59(11): 119103
Keywords: algebraic degree; balancedness; correlation immunity; nonlinearity; stream ciphers

Vol. 59, No. 12, 2016 Cover Contents

LETTER Website SpringerLink Google Scholar Cited in SCI: 0
Bi-conjugate gradient based computation of weight vector in space-time adaptive processing
Bai, Gatai; Tao, Ran; Wang, Yue
Sci China Inf Sci, 2016, 59(12): 129301
Keywords: space-time adaptive processing; clutter covariance matrix; bi-conjugate gradient; weight vector; computational complexity

LETTER Website SpringerLink Google Scholar Cited in SCI: 4
Feasibility study of inclined geosynchronous SAR focusing using Beidou IGSO signals
Dong, Xichao; Hu, Cheng; Tian, Weiming; Zhang, Tian; Li, Yuanhao
Sci China Inf Sci, 2016, 59(12): 129302
Keywords: GEO SAR; focusing; Beidou navigation satellite; SS-BISAR; Long integration time

Vol. 60, No. 1, 2017 Cover Contents

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Attribute-based non-interactive key exchange
Tang, Fei; Zhang, Rui; Li, Hongda
Sci China Inf Sci, 2017, 60(1): 019101
Keywords: Non-interactive key exchange; attribute-based cryptography; program obfuscation; punctured program; provable security

LETTER Website SpringerLink Google Scholar Cited in SCI: 0
MLXR: multi-layer obstacle-avoiding X-architecture Steiner tree construction for VLSI routing
Huang, Xing; Guo, Wenzhong; Liu, Genggeng; Chen, Guolong
Sci China Inf Sci, 2017, 60(1): 019102
Keywords: Multi-layer; obstacle-avoiding; X-architecture; Steiner tree; VLSI design

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Identifying superword level parallelism with extended directed dependence graph reachability
Zhao, Jie; Zhao, Rongcai
Sci China Inf Sci, 2017, 60(1): 019103
Keywords: Vectorizing compiler; Superword level parallelism; Data dependence; Directed dependence graph; Reachability

Vol. 60, No. 2, 2017 Cover Contents

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Soil moisture change estimation using InSAR coherence variations with preliminary laboratory measurements
Yin, Qiang; Hong, Wen; Lin, Yun; Li, Yang
Sci China Inf Sci, 2017, 60(2): 029301
Keywords: InSAR; Coherence; Soil Moisture; Change Detection; Laboratory Experiments

LETTER Website SpringerLink Google Scholar Cited in SCI: 0
A power manager system with 78% efficiency for high-voltage triboelectric nanogenerators
Luo, Lichuan; Bao, Dechun; Yu, Wuqi; Zhang, Zhaohua; Ren, Tianling
Sci China Inf Sci, 2017, 60(2): 029401
Keywords: Triboelectric Nanogenerators; High Input Voltage; Low Input Current; Power Manager; Buck Regulator

LETTER Website SpringerLink Google Scholar Cited in SCI: 0
Testing of 1TnR RRAM array with sneak path technique
Cui, Xiaole; Zhang, Qiang; Cui, Xiaoxin; Wang, Xinan; Kang, Jinfeng; Liu, Xiaoyan
Sci China Inf Sci, 2017, 60(2): 029402
Keywords: Resistive Random Access Memory; One-Transistor-n-Resistance RRAM cell; Test Method; Sneak Path; Resistance Variation

Vol. 60, No. 3, 2017 Cover Contents

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 1
Improved linear (hull) cryptanalysis of round-reduced versions of SIMON
Shi, Danping; Hu, Lei; Sun, Siwei; Song, Ling; Qiao, Kexin; Ma, Xiaoshuang
Sci China Inf Sci, 2017, 60(3): 039101
Keywords: linear cryptanalysis; linear hull; probability of success; key recovery; correlation; SIMON

LETTER Website SpringerLink Google Scholar Cited in SCI: 0
Linear invariant generation for verification of nonlinear hybrid systems via conservative approximation
Zeng, Xia; Lin, Wang; Yang, Zhengfeng; Zeng, Zhenbing
Sci China Inf Sci, 2017, 60(3): 039102
Keywords: Symbolic computation; Hybrid system; Invariant generation; Quantifier elimination; Linear approximation

Vol. 60, No. 4, 2017 Cover Contents

LETTER Website SpringerLink Google Scholar Cited in SCI: 0
A random linear code based secure transmission scheme for wireless fading channels
Olawoyin, Lukman A.; Zhang, Nana; Oloyede, A. O.; Faruk, Nasir; Yang, Hongwen
Sci China Inf Sci, 2017, 60(4): 049301
Keywords: Random network coding; Crack probability; Galios field; secure transmission; physical layer

LETTER Website SpringerLink Google Scholar Cited in SCI: 0
General, practical, and accurate models for the performance analysis of cache cascades
Huang, Haoqiu; Rui, Lanlan; Zheng, Weiwei; Niu, Danmei; Qiu, Xuesong
Sci China Inf Sci, 2017, 60(4): 049302
Keywords: Information-centric networking; Cache cascade; Approximate model; Replication strategy; Independent reference model

Vol. 60, No. 5, 2017 Cover Contents

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Avoiding monopolization: mutual-aid collusive attack detection in cooperative spectrum sensing
Feng, Jingyu; Lu, Guangyue; Zhang, Yuqing; Wang, Honggang
Sci China Inf Sci, 2017, 60(5): 059101
Keywords: Cooperative spectrum sensing; Cognitive radio; Trust; Collusive attack; Network security

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Common patterns of online collective attention flow
Li, Yong; Meng, Xiaofeng; Zhang, Qiang; Zhang, Jiang; Wang, Changqing
Sci China Inf Sci, 2017, 60(5): 059102
Keywords: attention flow network; allometric scaling laws; dissipation laws; gravity laws; online behavioral big data; Heaps' law

Vol. 60, No. 6, 2017 Cover Contents

LETTER Website SpringerLink Google Scholar Cited in SCI: 0
Linear precoding based on a non-ideal Nakagami-m channel in a massive MIMO system
Dai, Jianxin; Wang, Jun; Cheng, Chonghu; Chen, Ming; Zhou, Jin
Sci China Inf Sci, 2017, 60(6): 069301
Keywords: Massive MIMO; Imperfect channel state information; Nakagami-m channel; precoding algorithm; minimum mean square error

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
A novel sea-land segmentation based on integral image reconstruction in MWIR images
Zhuang, Yin; Guo, Dechun; Chen, He; Bi, Fukun; Ma, Long; Soomro, Nouman Q.
Sci China Inf Sci, 2017, 60(6): 069302
Keywords: Complex scene information; Low contrast ratio; Bipolar problem; GFM; SAT; Adaptive threshold; Morphology operations

LETTER Website SpringerLink Google Scholar Cited in SCI: 1
Impacts of outdated CSI for secure cooperative systems with opportunistic relay selection
Zhao, Rui; Lin, Hongxin; He, Yu-Cheng; Chen, Dong-Hua; Huang, Yongming
Sci China Inf Sci, 2017, 60(6): 069303
Keywords: decode-and-forward; relay selection; secrecy outage probability; outdated channel state information; Nakagami-m fading

Vol. 60, No. 7, 2017 Cover Contents

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Characteristic model-based control of robotic manipulators with dynamic uncertainties
Wang, Lijiao; Meng, Bin
Sci China Inf Sci, 2017, 60(7): 079201
Keywords: Robotic manipulators; Discrete-time; Characteristic Model; State-relevant Coefficient; Adaptive Control

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 1
Iterative learning control approach for consensus of multi-agent systems with regular linear dynamics
Fu, Qin; Gu, Panpan; Li, Xiangdong; Wu, Jianrong
Sci China Inf Sci, 2017, 60(7): 079202
Keywords: multi-agent system; iterative learning control; regular linear dynamics; consensus protocol; directed graphs

Vol. 60, No. 8, 2017 Cover Contents

Special Focus on Millimeter Wave Communications Techniques and Devices for 5G
LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
An 80-83 GHz CMOS DCO based on DiCAD technique for size, linearity and noise optimization
Wang, Zhiping; Jia, Haikun; Kuang, Lixue; Chi, Baoyong
Sci China Inf Sci, 2017, 60(8): 080401
Keywords: millimeter-wave oscillator; Digitally-Controlled Oscillator; CMOS Integrated Circuits; Millimeter-Wave ICs; On-Chip Transmission Lines

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Multisite computation offloading in dynamic mobile cloud environments
Jin, Xiaomin; Liu, Yuanan; Fan, Wenhao; Wu, Fan; Tang, Bihua
Sci China Inf Sci, 2017, 60(8): 089301
Keywords: multisite computation offloading; mobile cloud computing; runtime application repartitioning; concurrent multiple transfer; genetic algorithm

LETTER Website SpringerLink Google Scholar Cited in SCI: 0
A low power V-band LC VCO with high Q varactor technique in 40 nm CMOS process
ZHOU, Qian; HAN, Yan; ZHANG, Shifeng; HAN, Xiaoxia; JIE, Lu; CHEUNG, Ray C. C.; FENG, Guangtao
Sci China Inf Sci, 2017, 60(8): 089401
Keywords: V-band VCO; low power; high Q varactor; CMOS VCO; high performance

Vol. 60, No. 9, 2017 Cover Contents

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Single key recovery attacks on reduced AES-192 and Kalyna-128/256
Wang, Gaoli; Zhu, Chunbo
Sci China Inf Sci, 2017, 60(9): 099101
Keywords: AES-192; Kalyna; Single-Key Model; Meet-in-the-middle; Key recovery

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 1
Convergence analysis of ILC input sequence for underdetermined linear systems
Shen, Dong; Han, Jian; Wang, Youqing
Sci China Inf Sci, 2017, 60(9): 099201
Keywords: Iterative Learning Control; Almost Sure Convergence; Stochastic Approximation; Point-to-Point Control; Underdetermined System

Vol. 60, No. 10, 2017 Cover Contents

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
High-dynamics pulse-shaped signal simulation based on polynomial-based interpolation filters
Lu, Shaozhong; Wang, Yongqing; Li, Sheng; Wu, Siliang
Sci China Inf Sci, 2017, 60(10): 109301
Keywords: high-dynamics; pulse-shaping filter; interpolation; polynomial-based interpolation filter; Farrow structure; signal simulation

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
An efficient data compression technique based on BPDN for scattered fields from complex targets
Quan, Xiangyin; Zhang, Bingchen; Wang, Zhengdao; Gao, Chao; Wu, Yirong
Sci China Inf Sci, 2017, 60(10): 109302
Keywords: basis pursuit denoising; data compression; filtered backprojection; radar cross section; scattering center extraction; sparsity

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Transistor level SCA-resistant scheme based on fluctuating power logic
Geng, Liang; Zhang, Fan; Shen, Jizhong; He, Wei; Bhasin, Shivam; Zhao, Xinjie; Guo, Shize
Sci China Inf Sci, 2017, 60(10): 109401
Keywords: cryptography; side channel analysis; dual-rail precharge; wave dynamic differential logic; fluctuating power logic; flip-flop

Vol. 60, No. 11, 2017 Cover Contents

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 1
Generating pairing-friendly elliptic curves with fixed embedding degrees
Li, Liang
Sci China Inf Sci, 2017, 60(11): 119101
Keywords: ECDLP; embedding degree; pairing-based cryptographic system; generating elliptic curves; pairing-friendly

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
An efficient pairing-free certificateless signature scheme for resource-limited systems
Wang, Liangliang; Chen, Kefei; Long, Yu; Wang, Huige
Sci China Inf Sci, 2017, 60(11): 119102
Keywords: digital signature; certificateless public key cryptography; bilinear pairings; discrete logarithm; random oracle

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
APRS: a privacy-preserving location-aware recommender system based on differentially private histogram
Gao, Sheng; Ma, Xindi; Zhu, Jianming; Ma, Jianfeng
Sci China Inf Sci, 2017, 60(11): 119103
Keywords: Location-aware recommender system; Location privacy; Differential privacy , Location-based service; Geo-indistinguishability

LETTER Website SpringerLink Google Scholar Cited in SCI: 0
Direct constructions and proofs for CCA secure (LR)IBE with dual system encryption
Zhao, Yi; Yang, Bo
Sci China Inf Sci, 2017, 60(11): 119104
Keywords: Characteristic value; CCA security; IBE; LR-IBE; Dual system encryption

Vol. 60, No. 12, 2017 Cover Contents

LETTER Website SpringerLink Google Scholar Cited in SCI: 0
New strategy for searching disturbance vector of SHA-1 collision attack
Feng, Hao; Zeng, Guang; Han, Wenbao; Yang, Yang
Sci China Inf Sci, 2017, 60(12): 129101
Keywords: SHA-1; Disturbance Vectors; Hash function; tracking equation; constrained programming model

LETTER Website SpringerLink Google Scholar Cited in SCI: 1
A four-channel time-interleaved 30-GS/s 6-bit ADC in 0.18 mu m SiGe BiCMOS technology
Zhu, Xiaoge; Wu, Danyu; Zhou, Lei; Huang, Yinkun; Wu, Jin; Liu, Xinyu
Sci China Inf Sci, 2017, 60(12): 129401
Keywords: analog-to-digital converter; time-interleaved; bandwidth boosting; data interface; calibration

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Modeling the impact of process and operation variations on the soft error rate of digital circuits
Song, Ruiqiang; Chen, Shuming; Liang, Bin; Chi, Yaqing; Chen, Jianjun
Sci China Inf Sci, 2017, 60(12): 129402
Keywords: soft error; process parameter variation; SER variation; flip-flop; circuit-level simulation

Vol. 61, No. 1, 2018 Cover Contents

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Integral cryptanalysis of SPN ciphers with binary permutations
Song, Hailong; Wei, Yuechuan
Sci China Inf Sci, 2018, 61(1): 019101
Keywords: integral cryptanalysis; integral branch number; SPN ciphers; ARIA; Permutation

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
An imporosity message scheduling based on modified genetic algorithm for time-triggered Ethernet
Zhang, Yingjing; He, Feng; Lu, Guangshan; Xiong, Huagang
Sci China Inf Sci, 2018, 61(1): 019102
Keywords: genetic algorithm; schedule; Time-Trigger Ethernet; imporosity; latency

Vol. 61, No. 2, 2018 Cover Contents

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Multi-key FHE for multi-bit messages
Li, Zengpeng; Ma, Chunguang; Zhou, Hongsheng
Sci China Inf Sci, 2018, 61(2): 029101
Keywords: Multi-Key Homomorphic Encryption; Multi-Bit Homomorphic Encryption; Learning with Errors; Linear Combination Procedure; Multiparty Computation

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
A novel word length optimization method for radix-2(k) fixed-point FFT
Yang, Chen; Xie, Yizhuang; Chen, He
Sci China Inf Sci, 2018, 61(2): 029301
Keywords: FFT; fixed-point; quantization error analysis; radix-2k; word length optimization

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Resource allocation in multiple-relay systems exploiting opportunistic energy harvesting
Chen, Zeyu; Tang, Lan; Zhang, Xinggan; Bai, Yechao
Sci China Inf Sci, 2018, 61(2): 029302
Keywords: Cooperative transmission; Power control; Opportunistic energy harvesting; Relay selection; Fading channels

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Outage analysis of cognitive two-way relaying networks with SWIPT over Nakagami-m fading channels
Yang, Jing; Gao, Xiqi; Han, Shanyang; Peppas, Kostas P.; Mathiopoulos, P. Takis
Sci China Inf Sci, 2018, 61(2): 029303
Keywords: Simultaneous wireless information and power transfer technique; outage probability; cognitive two-way relaying; Nakagami-m; amplify-and-forward

LETTER Website SpringerLink Google Scholar Cited in SCI: 0
The design and performance analysis of optical wireless ACO-MC-CDMA system in the presence of clipping noise
Jia, Kejun; Hao, Li
Sci China Inf Sci, 2018, 61(2): 029304
Keywords: Optical wireless communication; ACO-OFDM; CDMA; Optical MC-CDMA; Clipping noise; Diversity combination

LETTER Website SpringerLink Google Scholar Cited in SCI: 0
Secure resource allocation for green and cognitive device-to-device communication
Xu, Chi; Zeng, Peng; Liang, Wei; Yu, Haibin
Sci China Inf Sci, 2018, 61(2): 029305
Keywords: D2D; small cell; cognitive radio; energy harvesting; green communication; resource allocation; secrecy throughput

Vol. 61, No. 3, 2018 Cover Contents

Special Issue on Information Security
LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Secure and efficient k-nearest neighbor query for location-based services in outsourced environments
Wu, Haiqin; Wang, Liangmin; Jiang, Tao
Sci China Inf Sci, 2018, 61(3): 039101
Keywords: data outsourcing; location privacy; k nearest neighbor query; query efficiency; Hilbert curve

Special Issue on Information Security
LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Efficient flush-reload cache attack on scalar multiplication based signature algorithm
Zhou, Ping; Wang, Tao; Lou, Xiaoxuan; Zhao, Xinjie; Zhang, Fan; Guo, Shize
Sci China Inf Sci, 2018, 61(3): 039102
Keywords: side channel attack; cache timing attack; ECDSA; flush-reload attack; public-key cryptography

Special Issue on Information Security
LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Protecting white-box cryptographic implementations with obfuscated round boundaries
Xu, Tao; Wu, Chuankun; Liu, Feng; Zhao, Ruoxin
Sci China Inf Sci, 2018, 61(3): 039103
Keywords: white-box cryptography; block cipher; obfuscated round boundaries; malware; space hardness; code lifting

Special Issue on Information Security
LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Efficient and secure outsourcing of bilinear pairings with single server
Dong, Min; Ren, Yanli
Sci China Inf Sci, 2018, 61(3): 039104
Keywords: Cloud computing; Bilinear pairings; Outsourcing computation; Verifiable; Single server

Special Issue on Information Security
LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Verifiable random functions with Boolean function constraints
Wang, Qianwen; Feng, Rongquan; Zhu, Yan
Sci China Inf Sci, 2018, 61(3): 039105
Keywords: Conditionally Verifiable Random Function; Verifiable Random Function; Access Constraints; full-DNF; Provable Security

Special Issue on Information Security
LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 1
Optimal model search for hardware-trojan-based bit-level fault attacks on block ciphers
Zhao, Xinjie; Zhang, Fan; Guo, Shize; Gong, Zheng
Sci China Inf Sci, 2018, 61(3): 039106
Keywords: optimal fault model; hardware trojan horse; fault injection; algebraic fault analysis; block cipher

Vol. 61, No. 4, 2018 Cover Contents

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Nonlocal image denoising using edge-based similarity metric and adaptive parameter selection
Fan, Linwei; Li, Xuemei; Guo, Qiang; Zhang, Caiming
Sci China Inf Sci, 2018, 61(4): 049101
Keywords: image denoising; edge detection; nonlocal denoising; difference operator; two-stage scheme

LETTER Website SpringerLink Google Scholar Cited in SCI: 0
DESC: enabling secure data exchange based on smart contracts
Liang, Jiao; Han, Weili; Guo, Zeqing; Chen, Yaoliang; Cao, Chang; Wang, Xiaoyang Sean; Li, Fenghua
Sci China Inf Sci, 2018, 61(4): 049102
Keywords: secure data exchange; access control; smart contract; Blockchain 2.0; data rights

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Visible and infrared image fusion using l0-generalized total variation model
Pan, Han; Jing, Zhongliang; Qiao, Lingfeng; Li, Minzhe
Sci China Inf Sci, 2018, 61(4): 049103
Keywords: image fusion; optimization method; equilibrium constraint; generalized total variation; L0 norm

Vol. 61, No. 5, 2018 Cover Contents

Special Focus on Internetware: Research Progress and Current Trend
LETTER Website SpringerLink Google Scholar Cited in SCI: 0
LogPruner: detect, analyze and prune logging calls in Android apps
Zhou, Xin; Wu, Kaidong; Cai, Huaqian; Lou, Shuai; Zhang, Ying; Huang, Gang
Sci China Inf Sci, 2018, 61(5): 050107
Keywords: logging call; Android App; log pruner; static analysis; logging class

Special Focus on Internetware: Research Progress and Current Trend
LETTER Website SpringerLink Google Scholar Cited in SCI: 0
Mining API usage change rules for software framework evolution
Yu, Ping; Yang, Fei; Cao, Chun; Hu, Hao; Ma, Xiaoxing
Sci China Inf Sci, 2018, 61(5): 050108
Keywords: software evolution; API usage change; call dependency; frequent itemset mining; text similarity

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
A lower dimension lattice attack on NTRU
Yang, Zhichao; Fu, Shaojing; Qu, Longjiang; Li, Chao
Sci China Inf Sci, 2018, 61(5): 059101
Keywords: NTRU; lattice reduction; polynomial ring; Gaussian heuristic; root Hermite factor

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
New constructions for (multiparty) one-round key exchange with strong security
Yang, Zheng; Lai, Junyu
Sci China Inf Sci, 2018, 61(5): 059102
Keywords: One Round; Key Exchange; Standard Model; DDH; Multilinear Map

LETTER Website SpringerLink Google Scholar Cited in SCI: 0
Fingerprint-based access to personally controlled health records in emergency situations
Guan, Shaopeng; Wang, Yongyu; Shen, Jian
Sci China Inf Sci, 2018, 61(5): 059103
Keywords: PCHR; privacy; fingerprint; access authorization; authentication

Vol. 61, No. 6, 2018 Cover Contents

Special Focus on Memristive Devices and Neuromorphic Computing
LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Morris-Lecar model of third-order barnacle muscle fiber is made of volatile memristors
Rajamani, Vetriveeran; Kim, Hyongsuk; Chua, Leon
Sci China Inf Sci, 2018, 61(6): 060426
Keywords: Memristive third-order Morris-Lecar Model; Power-Off Plot; Dynamic Route Map; Generic Memristor; Volatile Memristor

Special Focus on Memristive Devices and Neuromorphic Computing
LETTER Website SpringerLink Google Scholar Cited in SCI: 0
Excitatory and inhibitory actions of a memristor bridge synapse
Yang, Changju; Adhikari, Shyam Prasad; Kim, Hyongsuk
Sci China Inf Sci, 2018, 61(6): 060427
Keywords: Memristor bridge synapse; biological neuron; cell; Excitatory; Inhibitory

Special Focus on Memristive Devices and Neuromorphic Computing
LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Predicting spikes with artificial neural network
Cao, Lihong; Shen, Jiamin; Wang, Lei; Wang, Ye
Sci China Inf Sci, 2018, 61(6): 060428
Keywords: Spike; Hodgkin-Huxley model; Prediction; Artificial neural network; Action potential

LETTER Website SpringerLink Google Scholar Cited in SCI: 0
Evaluation of redundancy-based system: a model checking approach
Fang, Ling; Mu, Chunyan; Cheng, Zhuo; Li, Guoqiang
Sci China Inf Sci, 2018, 61(6): 069101
Keywords: Fault tolerance; multi-version redundancy; qualitative evaluation; quantitative evalutation; probabilistic model checking

LETTER Website SpringerLink Google Scholar Cited in SCI: 0
Transmission delay inconsistency in satellite array antennas cause elevation-dependent pseudorange biases in GNSS signals
Xu, Hailong; Cui, Xiaowei; Zhao, Sihao; Lu, Mingquan
Sci China Inf Sci, 2018, 61(6): 069301
Keywords: antenna array; BeiDou Navigation Satellite System; Global Positioning System; navigation satellite; pseudorange bias; transmitting link

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
A kind of compact ultra-broad bandpass planar terahertz filter
Zhong, Renbin; Ding, Hong; Liu, Yan; Liu, Shenggang
Sci China Inf Sci, 2018, 61(6): 069401
Keywords: terahertz; bandpass; filter; MSPPs; ultra-broad

LETTER Website SpringerLink Google Scholar Cited in SCI: 1
A study of residual characteristics in floating gate transistors
Wang, Jia; Zhao, Yiqiang; Xin, Ruishan; Ye, Mao
Sci China Inf Sci, 2018, 61(6): 069402
Keywords: Floating gate; program and erase cycles; data remanence; threshold voltage; overwriting operation

LETTER Website SpringerLink Google Scholar Cited in SCI: 0
Defect characterization of amorphous silicon thin film solar cell based on low frequency noise
Hu, Linna; He, Liang; Chen, Hua; Jia, Xiaofei; Hu, Ying; Ma, Hongmei; Guo, Dandan; Qin, Yu
Sci China Inf Sci, 2018, 61(6): 069403
Keywords: amorphous silicon solar cells; 1/f noise; GR noise; band-tail states; deep-level traps

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Design of mm-wave amplifiers based on over & under neutralization techniques
Li, Di; Zhang, Lei; Zhang, Li; Wang, Yan; Yu, Zhiping
Sci China Inf Sci, 2018, 61(6): 069404
Keywords: CMOS; low-noise amplifier; neutralization; noise figure; power amplifier

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
GeC film with high substitutional carbon concentration formed by ion implantation and solid phase epitaxy for strained Ge n-MOSFETs
Zhang, Bingxin; An, Xia; Hu, Xiangyang; Li, Ming; Zhang, Xing; Huang, Ru
Sci China Inf Sci, 2018, 61(6): 069405
Keywords: Ge; strained Ge n-MOSFET; GeC; ion implantation; solid phase epitaxy

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
6 Gbps 16QAM fully integrated receiver using optimized neutralization technique LNA in 90 nm CMOS
Li, Di; Zhang, Lei; Wang, Yan
Sci China Inf Sci, 2018, 61(6): 069406
Keywords: 60GHz; LNA; neutralization; PLL; receiver

Vol. 61, No. 7, 2018 Cover Contents

LETTER Website SpringerLink Google Scholar Supplementary
Multi-robot coordinated exploration of indoor environments using semantic information
Li G S, Chou W S, Yin F
Sci China Inf Sci, 2018, 61(7): 079201

Vol. 61, No. 8, 2018 Cover Contents

Special Focus on Photonic Devices and Integration
LETTER Website SpringerLink Google Scholar
A real-time tunable arbitrary power ratios graphene based power divider
Haowen SHU, Yuansheng TAO, Ming JIN, Xingjun WANG & Zhiping ZHOU
Sci China Inf Sci, 2018, 61(8): 080408

LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0
Energy efficient power allocation for underlaying mobile D2D communications with peak/average interference constraints
Zhang, Rui; Li, Yongzhao; Wang, Cheng-Xiang; Ruan, Yuhan; Zhang, Hailin
Sci China Inf Sci, 2018, 61(8): 089301
Keywords: Mobile Device-to-Device communication; energy efficiency; spectral efficiency , power allocation; interference constraint

LETTER Website SpringerLink Google Scholar Supplementary
Novel spectrum sensing and access in cognitive radio networks
Zhang S B, Hu Y D, Zhang L, et al
Sci China Inf Sci, 2018, 61(8): 089302

LETTER Website SpringerLink Google Scholar Supplementary
Nonbinary LDPC cycle codes: efficient search, design, and code optimization
Xu H Z, Chen C, Zhu M, et al
Sci China Inf Sci, 2018, 61(8): 089303

LETTER Website SpringerLink Google Scholar Supplementary
Adaptive network-aware FeLAA LBT strategy for fair uplink FeLAA-WiFi coexistence
Wang W, Xu P P, Zhang Y, et al
Sci China Inf Sci, 2018, 61(8): 089304

LETTER Website SpringerLink Google Scholar Supplementary
Multi-objective network optimization combining topology and routing algorithms in multi-layered satellite networks
Li Z M, Xia H Y, Zhang Y, et al
Sci China Inf Sci, 2018, 61(8): 089305

LETTER Website SpringerLink Google Scholar
Worst-case robust energy harvesting maximization in cellular networks
Chen D H, He Y C, Zhou L, et al
Sci China Inf Sci, 2018, 61(8): 089306

Vol. 61, No. 9, 2018

LETTER Website SpringerLink Google Scholar Supplementary
Small sample learning with high order contractive auto-encoders and application in SAR images
Yang Q W, Sun F C
Sci China Inf Sci, 2018, 61(9): 099101

LETTER Website SpringerLink Google Scholar Supplementary
Learned local similarity prior embedding active contour model for choroidal neovascularization segmentation in optical coherence tomography images
Xi X M, Meng X J, Yang L, et al
Sci China Inf Sci, 2018, 61(9): 099102

LETTER Website SpringerLink Google Scholar Supplementary
Chameleon all-but-one extractable hash proof and its applications
Han G, Li H, Qin B D, et al
Sci China Inf Sci, 2018, 61(9): 099103

LETTER Website SpringerLink Google Scholar Supplementary
Smooth fractal surfaces derived from bicubic rational fractal interpolation functions
Bao F X, Yao X X, Sun Q H, et al
Sci China Inf Sci, 2018, 61(9): 099104

Vol. 61, No. 10, 2018

LETTER Website SpringerLink Google Scholar Supplementary
Mainlobe jamming cancelation method for distributed monopulse arrays
Zhang Q L, Gao F F, Sun Q, et al
Sci China Inf Sci, 2018, 61(10): 109301

Vol. 61, No. 12, 2018

LETTER Website SpringerLink Google Scholar
An event summarizing algorithm based on the timeline relevance model in Sina Weibo
Lei K, Zhang L Z, Liu Y, et al
Sci China Inf Sci, 2018, 61(12): 129101

LETTER Website SpringerLink Google Scholar Supplementary
Expressivity issues in SPARQL: monotonicity and two-versus three-valued semantics
Zhang X W, Meng C H, Zou L
Sci China Inf Sci, 2018, 61(12): 129102

Vol. 62, No. 2, 2019

LETTER Website SpringerLink Google Scholar Supplementary
Pre-course student performance prediction with multi-instance multi-label learning
Ma Y L, Cui C R, Nie X S, et al
Sci China Inf Sci, 2019, 62(2): 029101