Skip to main content

and
  1. Article

    Open Access

    Segmentation of void defects in X-ray images of chip solder joints based on PCB-DeepLabV3 algorithm

    Defects within chip solder joints are usually inspected visually for defects using X-ray imaging to obtain images. The phenomenon of voids inside solder joints is one of the most likely types of defects in the...

    Defeng Kong, **nyu Hu, Ziang Gong, Daode Zhang in Scientific Reports (2024)

  2. No Access

    Article

    Multiscale fire image detection method based on CNN and Transformer

    Fire is one of the most harmful hazards that affect daily life. The existing fire detection methods have the problems of large computation, slow detection speed, and low detection accuracy to varying degrees, ...

    Shengbao Wu, Buyun Sheng, Gaocai Fu, Daode Zhang in Multimedia Tools and Applications (2024)

  3. No Access

    Article

    Effect of Ultrasonic Impact Treatment with Different Impact Energy and Head Shape on Surface Properties of U75V Heavy Rail

    Surface properties directly affect the service life of heavy rail. The effect of ultrasonic impact energy and head shape on surface hardness, residual stress, morphology of heavy rail was investigated in this ...

    Huan Xue, Shengnan Liu, Daode Zhang in Journal of Materials Engineering and Perfo… (2023)

  4. No Access

    Article

    Effects of multi-pass turning on surface properties of AISI 52100 bearing steel

    Hard turning is extensively used in the machining of bearings. The turning process has a significant influence on the properties of machined surface. In this paper, multi-pass turning experiments were machined...

    Huan Xue, Yansong Zhang, Daode Zhang in The International Journal of Advanced Manu… (2023)

  5. No Access

    Article

    Study on Wet Chemical Etching of Flexible Printed Circuit Board with 16-μm Line Pitch

    As high-precision flexible printed circuit boards (FPCBs) are required in electronic products, it is necessary to study wet chemical etching to obtain precise FPCBs with a 16-μm line pitch. First, a π-shaped FPCB...

    Yinggang Tang, Hui Li, Jiazheng Sheng, Bin Sun in Journal of Electronic Materials (2023)

  6. No Access

    Article

    Distribution, Source Apportionment and Risk Assessment of Polycyclic Aromatic Hydrocarbons (PAHs) in Surface Sediments at the Basin Scale: A Case Study in Taihu Basin, China

    As a systematic research at basin scale, this study investigated the spatial distribution, source apportionment and ecological risks of eighteen polycyclic aromatic hydrocarbons (PAHs) in surface sediments at ...

    Fazhi **e, Gege Cai, Daode Zhang, Guolian Li in Bulletin of Environmental Contamination an… (2022)

  7. No Access

    Article

    A modified hybrid rice optimization algorithm for solving 0-1 knapsack problem

    The 0-1 knapsack problem (KP) is a classic NP-hard problem and could be handled by swarm intelligence algorithms. However, most of these algorithms might be trapped in the local optima as the scale increases. ...

    Zhe Shu, Zhiwei Ye, **nlu Zong, Shiqin Liu, Daode Zhang in Applied Intelligence (2022)

  8. Article

    Open Access

    (Identity-based) dual receiver encryption from lattice-based programmable hash functions with high min-entropy

    Dual receiver encryption (DRE) is an important cryptographic primitive introduced by Diament et al. at CCS’04, which allows two independent receivers to decrypt a same ciphertext to obtain the same plaintext. ...

    Yanyan Liu, Daode Zhang, Yi Deng, Bao Li in Cybersecurity (2019)

  9. No Access

    Chapter and Conference Paper

    Preprocess-then-NTT Technique and Its Applications to Kyber and NewHope

    The Number Theoretic Transform (NTT) provides efficient algorithm for multiplying large degree polynomials. It is commonly used in cryptographic schemes that are based on the hardness of the Ring Learning With...

    Shuai Zhou, Haiyang Xue, Daode Zhang, Kunpeng Wang in Information Security and Cryptology (2019)

  10. Chapter and Conference Paper

    Towards Tightly Secure Deterministic Public Key Encryption

    In this paper, we formally consider the construction of tightly secure deterministic public key encryption (D-PKE). Initially, we compare the security loss amongst the D-PKE schemes under the concrete assumpti...

    Daode Zhang, Bao Li, Yamin Liu, Haiyang Xue in Information and Communications Security (2018)

  11. Chapter and Conference Paper

    Compact Hierarchical IBE from Lattices in the Standard Model

    At Crypto’10, Agrawal et al. proposed a lattice-based selectively secure Hierarchical Identity-based Encryption (HIBE) scheme (ABB10b) with small ciphertext on the condition that

    Daode Zhang, Fuyang Fang, Bao Li, Haiyang Xue in Information and Communications Security (2018)

  12. Chapter and Conference Paper

    Compact (Targeted Homomorphic) Inner Product Encryption from LWE

    Inner product encryption (IPE) is a public-key encryption mechanism that supports fine-grained access control. Agrawal et al. (ASIACRYPT 2011) proposed the first IPE scheme from the Learning With Errors (LWE) ...

    Jie Li, Daode Zhang, **anhui Lu, Kunpeng Wang in Information and Communications Security (2018)

  13. No Access

    Chapter and Conference Paper

    Lattice-Based Dual Receiver Encryption and More

    Dual receiver encryption (DRE), proposed by Diament et al. at ACM CCS 2004, is a special extension notion of public-key encryption, which enables two independent receivers to decrypt a ciphertext into a same p...

    Daode Zhang, Kai Zhang, Bao Li, **anhui Lu, Haiyang Xue in Information Security and Privacy (2018)

  14. No Access

    Chapter and Conference Paper

    Deterministic Identity-Based Encryption from Lattices with More Compact Public Parameters

    **e et al. (SCN 2012) proposed the first deterministic identity-based encryption (DIBE) scheme with an adaptive security in the auxiliary-input setting, under the learning with errors (LWE) assumption. However...

    Daode Zhang, Fuyang Fang, Bao Li, **n Wang in Advances in Information and Computer Security (2017)