Xi Chen

ORCID: 0000-0002-6874-663X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Coding theory and cryptography
  • graph theory and CDMA systems
  • Cryptographic Implementations and Security
  • Antenna Design and Optimization
  • Direction-of-Arrival Estimation Techniques
  • Robotic Path Planning Algorithms
  • Speech and Audio Processing
  • Machine Learning and Algorithms
  • Neural Networks and Applications
  • Algorithms and Data Compression
  • Geochemistry and Geologic Mapping
  • Advanced Malware Detection Techniques
  • Military Defense Systems Analysis
  • Complexity and Algorithms in Graphs
  • Oceanographic and Atmospheric Processes
  • Advanced Memory and Neural Computing
  • Security and Verification in Computing
  • Semiconductor materials and devices
  • Polynomial and algebraic computation
  • Radiation Effects in Electronics
  • Soil Geostatistics and Mapping
  • Model Reduction and Neural Networks
  • Advanced Clustering Algorithms Research
  • Advancements in PLL and VCO Technologies
  • Hate Speech and Cyberbullying Detection

Zhejiang University of Science and Technology
2024-2025

National University of Defense Technology
2015-2024

Southwest Petroleum University
2023

Columbia University
2013-2021

California University of Pennsylvania
2021

Shaanxi Provincial Land Engineering Construction Group
2018

Land Consolidation and Rehabilitation Center
2018

Ministry of Natural Resources
2018

China Land Surveying and Planning Institute
2018

Laboratoire Analyse, Géométrie et Applications
2017-2018

10.1016/j.ffa.2016.09.002 article EN publisher-specific-oa Finite Fields and Their Applications 2016-09-27

Continuous zeroing neural network (ZNN) and its discrete ZNN (DZNN) are comprehensively developed in many optimization systems. In this article, a Milne-Hamming method with DZNN classified as an implicit is proposed discussed upon the previous researches. Specifically, (MHDZNN) model aimed for time-varying nonlinear (TV-NO) problem functional limitations. This (MH) four-step discretized formula fixed parameters introduced to discretize model. Theoretical analyses of MHDZNN derive that...

10.1109/tnnls.2025.3563991 article EN IEEE Transactions on Neural Networks and Learning Systems 2025-01-01

We show that a canonical form for strongly regular (s.r.) graphs can be found in time exp(O~(n1/5)) and therefore isomorphism of s.r. tested within the same bound, where n is number vertices tilde hides polylogarithmic factor. The best previous bound testing s. r. was exp(O~(n1/3)) (Spiel man, STOC 1996) while GI general has been standing firmly at exp(O~(n1/2)) three decades. (These results, too, provided forms.) bounds on (Babai 1980 Spiel man were based analysis classical...

10.1109/focs.2013.25 article EN 2013-10-01

The correlation immunity of Boolean functions is a property related to cryptography, error correcting codes, orthogonal arrays (in combinatorics), and in slightly looser way sequences. Correlation-immune short, CI functions) have the keeping same output distribution when some input variables are fixed. They been widely used as combiners stream ciphers allow resistance Siegenthaler attack. Very recently, new use has appeared framework side channel attacks (SCA). To reduce cost overhead...

10.1109/tit.2017.2785775 article EN IEEE Transactions on Information Theory 2017-12-27

Many reverse engineering techniques for data structures rely on the knowledge of memory allocation routines. Typically, they interpose system’s malloc and free functions, track each chunk thus allocated as a structure. However, many performance-critical applications implement their own custom allocators. Examples include webservers, database management systems, compilers like gcc clang. As result, current binary analysis tracking fail such binaries. We present MemBrush, new tool to detect...

10.1007/s10664-015-9362-z article EN cc-by Empirical Software Engineering 2015-03-29

In this article, we derive the predictor-corrector (PC) methods with three-order convergent precision, together a class of specific general linear three-step (GLTS) rules provided. Afterward, time-varying optimization (TVO) problem, which is deemed as discrete TVO has been formulated and studied. The classical zeroing neural network via Zhang et al. discretization (ZD-DZNN) often utilized to obtain solution. Actually, stepsize domain DZNN model great factor for dynamical stability. To...

10.1109/tnnls.2024.3512505 article EN IEEE Transactions on Neural Networks and Learning Systems 2024-01-01

This paper analyzes the mixing characteristics of Subarctic Front (SAF) in Kuroshio-Oyashio Confluence Region based on temperature, salinity, and current data obtained from surveys remote sensing June 2016. The frontal zone observed area is at 145°–151°E, 38°–41°N. front distributed between 25.5–26.7 σθ a band pattern inclined north to south deeper south. region shallower than 200 m along isopycnal 25.9–26.1 has strongest horizontal temperature salinity gradients, largest former can reach...

10.1016/j.oceano.2018.07.004 article EN cc-by-nc-nd Oceanologia 2018-08-11

A fault-tolerant hardening-by-design frequency divider has been proposed for clock and data recovery in a 28-nm CMOS process. By means of the mandatory updating mechanism, can update state D flip-flops from an error to correct so as avoid single-event transient (SET) accumulation different finite-state machines (FSMs). Our also does not destroy original structure can, thus, greatly reduce performance degradation. Laser tests show that threshold be significantly improved. The heavy-ion...

10.1109/access.2019.2906884 article EN cc-by-nc-nd IEEE Access 2019-01-01

In this paper, a novel FSS radome is developed and measured. This has one transparent passband two absorptive bands. These bands are separated by the passband. The manufactured measured to verify its unique electromagnetic characteristics. passband, gain of antenna with our only 1~2dB lower than without any radome. bands, electric level reflected wave from can be 16.5dB metallic plane same size as

10.23919/eucap.2017.7928255 article EN 2022 16th European Conference on Antennas and Propagation (EuCAP) 2017-03-01

In order to improve the angle measurement performance of a coprime linear array, this paper proposes novel direction-of-arrival (DOA) estimation algorithm for array based on multiple invariance signal parameters via rotational techniques (MI-ESPRIT) and lookup table method. The proposed does not require spatial spectrum search uses solve ambiguity, which reduces computational complexity. To fully use subarray elements, DOA precision is higher compared with existing algorithms. Moreover,...

10.3390/s18093043 article EN cc-by Sensors 2018-09-12

A hardened phase frequency detector (PFD) employing double-loop self-sampling technology is proposed for clock and data recovery. The PFD can remove the error state maintain correct by use of sampler. laser experiment shows that threshold value has been greatly improved.

10.1109/tns.2019.2922673 article EN IEEE Transactions on Nuclear Science 2019-06-13

Satellite data products and high-resolution in situ observations were combined to investigate the evolution structure of Kuroshio Extension Front Spring 2019. The former reveals variation front is influenced by northward movement through transporting warm saline water a cold brackish region. latter indicates steep upward slopes isopycnals, tilting frontal zone, as well several ~300 m thick blobs North Pacific Intermediate Water between 26.25 26.75 kg/m3, where conspicuous thermohaline...

10.3390/jmse8070502 article EN cc-by Journal of Marine Science and Engineering 2020-07-08

Differentially 4-uniform permutations on F22k with high nonlinearity are often chosen as substitution boxes in block ciphers. Recently, Qu et al. used the powerful switching method to construct low differential uniformity from inverse function [Qu al., Constructing differentially over via method, IEEE Trans. Inform. Theory 59(7) (2013), pp. 4675–4686, More constructions of F22k, Des. Codes Cryptogr. DOI 10.1007/s10623-014-0006-x] and proposed a sufficient but not necessary condition for...

10.1080/00207160.2016.1167884 article EN International Journal of Computer Mathematics 2016-03-24

10.1016/j.aeue.2019.03.013 article EN AEU - International Journal of Electronics and Communications 2019-03-25

Permutation polynomials over finite fields play important roles in theory. They also have wide applications many areas of science and engineering such as coding theory, cryptography, combinatorial design, communication theory so on. binomials trinomials attract people's interest due to their simple algebraic form additional extraordinary properties. In this paper, several new classes permutation are constructed. Some these generalizations known ones.

10.48550/arxiv.1508.07590 preprint EN other-oa arXiv (Cornell University) 2015-01-01

The previous threshold proxy re-signature schemes have been mainly constructed with bilinear maps, the implementations of which are much more time-consuming than exponentiation operations. To solve this problem, we propose efficient El-Gamal signatures. performance analysis shows that our existing schemes. Based on discrete logarithm provable secure in random oracle model.

10.1080/02533839.2018.1437362 article EN Journal of the Chinese Institute of Engineers 2018-02-17

The development of hyperspectral remote sensing technology has been widely used in soil nutrient prediction. is the representative type Shaanxi Province. In this study, total nitrogen content was as research target, and samples were measured by reflectance spectroscopy using ASD method. Pre-treatment, first order differential, second differential logarithmic transformation reflected spectrum after pre-treatment, estimation model established least squares regression method principal component...

10.1088/1755-1315/108/4/042025 article EN IOP Conference Series Earth and Environmental Science 2018-01-01

A subset $S$ of the Boolean hypercube $\mathbb{F}_2^n$ is a sumset if $S = \{a + b : a, b\in A\}$ for some $A \subseteq \mathbb{F}_2^n$. Sumsets are central objects study in additive combinatorics, featuring several influential results. We prove lower bound $\Omega(2^{n/2})$ number queries needed to test whether function $f:\mathbb{F}_2^n \to \{0,1\}$ indicator sumset. Our testing sumsets follows from sharp bounds on related problem shift testing, which may be independent interest. also give...

10.48550/arxiv.2401.07242 preprint EN cc-by arXiv (Cornell University) 2024-01-01

A radiation-hardened phase-locked loop is proposed for phase interpolator clock and data recovery purposes. sensitive node-compressed charge pump multi-node cross coupling voltage-controlled oscillators are in this with the goal of achieving good jitter performance improving anti-SET (SET, single-event transient) capability. The root mean square (RMS) reduced from 3.7 ps to 2.58 at 2 GHz, while laser threshold improved 120 pJ 370 compared unhardened loop. hardened also does not lose its lock...

10.23919/cje.2022.00.017 article EN Chinese Journal of Electronics 2024-03-01

Abstract Time‐varying linear systems (TVLS) is a vital mathematical problem in many engineering fields. In this letter, Milne‐Hamming discretized zeroing neural networks (MHDZNN) presented to solve the TVLS, where high accurate convergence got by combing (MH) method. Theoretical analyses of its and precision are discussed illustrate validity DZNN (MHDZNN). Furthermore, numerical experiments compared with two existing models simulated verify superiority proposed MHDZNN model.

10.1049/ell2.13162 article EN cc-by-nc-nd Electronics Letters 2024-04-01
Coming Soon ...