default search action
Jinhai Chen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j34]Weizheng Wang, Jinhai Chen, Xianmin Pan:
A secure scan architecture using dynamic key to thwart scan-based side-channel attacks. Microelectron. J. 143: 106050 (2024) - 2023
- [j33]Yufeng Tang, Zheng Gong, Jinhai Chen, Nanjiang Xie:
Higher-Order DCA Attacks on White-Box Implementations with Masking and Shuffling Countermeasures. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(1): 369-400 (2023) - 2022
- [j32]Zongjiang Gao, Jinhai Chen:
Maritime Infrared Image Super-Resolution Using Cascaded Residual Network and Novel Evaluation Metric. IEEE Access 10: 17760-17767 (2022) - [j31]Jinhai Chen, Zheng Gong, Yufeng Tang, Xinfeng Dong:
A comprehensive analysis of lightweight 8-bit sboxes from iterative structures. J. Inf. Secur. Appl. 70: 103302 (2022) - [j30]Yongfeng Suo, Yuxiang Ji, Zhenye Zhang, Jinhai Chen, Christophe Claramunt:
A Formal and Visual Data-Mining Model for Complex Ship Behaviors and Patterns. Sensors 22(14): 5281 (2022) - [j29]Yufeng Tang, Zheng Gong, Tao Sun, Jinhai Chen, Zhe Liu:
WBMatrix: An Optimized Matrix Library for White-Box Block Cipher Implementations. IEEE Trans. Computers 71(12): 3375-3388 (2022) - [c6]Jinhai Chen, Zheng Gong, Yufeng Tang, Yupeng Zhang, Bin Li:
optimizing Diffusion Layer with AVX Shuffling: A Study on SKINNY. DSC 2022: 227-233 - 2021
- [j28]Naixia Mou, Haonan Ren, Yunhao Zheng, Jinhai Chen, Jiqiang Niu, Tengfei Yang, Lingxian Zhang, Feng Liu:
Traffic Inequality and Relations in Maritime Silk Road: A Network Flow Analysis. ISPRS Int. J. Geo Inf. 10(1): 40 (2021) - [j27]Jinhai Chen, Wenyuan Zhang, Heng Wang:
Intelligent bearing structure and temperature field analysis based on finite element simulation for sustainable and green manufacturing. J. Intell. Manuf. 32(3): 745-756 (2021) - [c5]Yufeng Tang, Zheng Gong, Tao Sun, Jinhai Chen, Fan Zhang:
Adaptive Side-Channel Analysis Model and Its Applications to White-Box Block Cipher Implementations. Inscrypt 2021: 399-417 - [c4]Junjie Zhao, Shaofu Lin, Xiliang Liu, Jinhai Chen, Yumin Zhang, Qiang Mei:
ST-CCN-PM2.5: fine-grained PM2.5 concentration prediction via spatial-temporal causal convolution network. ARIC@SIGSPATIAL 2021: 48-55 - 2020
- [j26]Naixia Mou, Shuyue Sun, Tengfei Yang, Zhipeng Wang, Yunhao Zheng, Jinhai Chen, Lingxian Zhang:
Assessment of the Resilience of a Complex Network for Crude Oil Transportation on the Maritime Silk Road. IEEE Access 8: 181311-181325 (2020) - [c3]Chenxin Wen, Hui Zhang, Honghao Li, Hongwen Li, Jinhai Chen, Hangge Guo, Shihui Cheng:
Multi-scene citrus detection based on multi-task deep learning network. SMC 2020: 912-919
2010 – 2019
- 2019
- [j25]Jinhai Chen, Herschel Rabitz:
On Lifting Operators and Regularity of Nonsmooth Newton Methods for Optimal Control Problems of Differential Algebraic Equations. J. Optim. Theory Appl. 180(2): 518-535 (2019) - 2016
- [c2]Jinhai Chen, Feng Lu, Mingxiao Li, Pengfei Huang, Xiliang Liu, Qiang Mei:
Optimization on Arrangement of Precaution Areas Serving for Ships' Routeing in the Taiwan Strait Based on Massive AIS Data. DMBD 2016: 123-133 - 2015
- [j24]Jinhai Chen, Hans Josef Pesch:
Revisiting Estimates for Domains of Invertibility of Diffeomorphisms. J. Optim. Theory Appl. 165(1): 1-13 (2015) - 2012
- [j23]Jinhai Chen:
Estimating Invertible Domains of Diffeomorphisms. J. Optim. Theory Appl. 154(3): 818-829 (2012) - [j22]Jinhai Chen, Matthias Gerdts:
Smoothing Technique of Nonsmooth Newton Methods for Control-State Constrained Optimal Control Problems. SIAM J. Numer. Anal. 50(4): 1982-2011 (2012) - 2010
- [j21]Ravi P. Agarwal, Jinhai Chen:
Periodic solutions for first order differential systems. Appl. Math. Lett. 23(3): 337-341 (2010) - [j20]Jinhai Chen, Ioannis K. Argyros:
Improved results on estimating and extending the radius of an attraction ball. Appl. Math. Lett. 23(4): 404-408 (2010) - [j19]Jinhai Chen, Ioannis K. Argyros, Ravi P. Agarwal:
Majorizing functions and two-point Newton-type methods. J. Comput. Appl. Math. 234(5): 1473-1484 (2010) - [j18]Jinhai Chen, Liqun Qi:
Globally and superlinearly convergent inexact Newton-Krylov algorithms for solving nonsmooth equations. Numer. Linear Algebra Appl. 17(1): 155-174 (2010)
2000 – 2009
- 2009
- [j17]Ravi P. Agarwal, Jinhai Chen:
On the solvability of the higher order elliptic boundary value problem. Appl. Math. Lett. 22(8): 1195-1199 (2009) - [j16]Ioannis K. Argyros, Jinhai Chen:
On local convergence of a Newton-type method in Banach space. Int. J. Comput. Math. 86(8): 1366-1374 (2009) - [j15]Jinhai Chen, Ravi P. Agarwal:
Finite termination and global monotonicity of Newton-type methods for solving hybrid piecewise linear systems. Int. J. Comput. Math. 86(12): 2236-2247 (2009) - 2008
- [j14]Jinhai Chen:
The convergence analysis of inexact Gauss-Newton methods for nonlinear problems. Comput. Optim. Appl. 40(1): 97-118 (2008) - [c1]Jinhai Chen, Qinyou Hu, Renyu Zhao, Peng Guojun, Chun Yang:
Tracking a Vessel by Combining Video and AIS Reports. FGCN (2) 2008: 374-378 - 2007
- [j13]Jinhai Chen:
New modified regula falsi method for nonlinear equations. Appl. Math. Comput. 184(2): 965-971 (2007) - [j12]Emin Kahya, Jinhai Chen:
A modified Secant method for unconstrained optimization. Appl. Math. Comput. 186(2): 1000-1004 (2007) - [j11]Jinhai Chen, Zuhe Shen:
Regularized conjugate gradient method for skew-symmetric indefinite system of linear equations and applications. Appl. Math. Comput. 187(2): 1484-1494 (2007) - [j10]Jinhai Chen, Zuhe Shen:
Convergence analysis of the secant type methods. Appl. Math. Comput. 188(1): 514-524 (2007) - [j9]Jinhai Chen, Zuhe Shen:
On third-order convergent regula falsi method. Appl. Math. Comput. 188(2): 1592-1596 (2007) - [j8]Jinhai Chen:
Pre-symmetric approach and applications to indefinite non-symmetric problems. Appl. Math. Comput. 192(2): 457-465 (2007) - [j7]Jinhai Chen, Donal O'Regan:
The periodic boundary value problem for semilinear elastic beam equations: The resonance case. Comput. Math. Appl. 53(8): 1284-1292 (2007) - [j6]Jinhai Chen, Weiguo Li:
Equivalent Conditions for Convergence of Splittings of Non-Hermitian Indefinite Matrices. J. Sci. Comput. 30(1): 117-130 (2007) - [j5]Jinhai Chen:
A new family of exponential iteration methods with quadratic convergence of both diameters and points for enclosing zeros of nonlinear equations. Math. Comput. Model. 45(5-6): 544-552 (2007) - 2006
- [j4]Jinhai Chen, Weiguo Li:
On new exponential quadratically convergent iterative formulae. Appl. Math. Comput. 180(1): 242-246 (2006) - [j3]Jinhai Chen:
Some new iterative methods with three-order convergence. Appl. Math. Comput. 181(2): 1519-1522 (2006) - [j2]Jinhai Chen, Weiguo Li:
An exponential regula falsi method for solving nonlinear equations. Numer. Algorithms 41(4): 327-338 (2006) - 2005
- [j1]Jinhai Chen, Weiguo Li:
Convergence of Gauss-Newton's method and uniqueness of the solution. Appl. Math. Comput. 170(1): 686-705 (2005)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint