跳到主要导航
跳到搜索
跳到主要内容
北京理工大学 首页
English
中文
首页
师资队伍
研究单位
科研成果
奖项
按专业知识、名称或附属进行搜索
查看 Scopus 资料
乔 珂欣
网络空间安全学院
h-index
464
引用
8
H-指数
根据储存在 Pure 的刊物以及来自 Scopus 的引用文献数量计算
2014
2024
每年的科研成果
概览
指纹图谱
合作网络
科研成果
(25)
相似学者
(1)
指纹图谱
深入其中 Kexin Qiao 为活跃的研究主题。这些主题标签来自此人的成果。它们共同形成唯一的指纹。
分类
加权
按字母排序
Computer Science
Attackers
5%
Automatic Search
6%
Belief Propagation
13%
Block Cipher
100%
Collision Detection
13%
Collision Information
6%
Cryptanalysis
30%
Cryptanalyst
6%
Cryptographic Algorithm
6%
Cryptography
6%
Data Complexity
6%
Differential Cryptanalysis
46%
Distance Metric
6%
Essential Property
9%
Experimental Result
15%
Field Programmable Gate Arrays
6%
Hamming Weight
13%
Hash Function
26%
Internal State
26%
Linear Cryptanalysis
13%
Linear Equation
26%
Linear Inequality
8%
Linear Programming Problem
14%
Memory Access
6%
Mixed-Integer Linear Programming
58%
Noise-to-Signal Ratio
13%
Power Analysis
13%
Power Consumption
5%
Programming Method
17%
Programming Model
6%
Propagation Algorithm
13%
Quantum Cryptography
13%
Search Strategies
13%
Security Application
13%
Security Countermeasure
13%
Security Evaluation
49%
Side Channel
6%
side-channel
39%
Storage Requirement
6%
Success Probability
13%
Symmetric Cipher
8%
Symmetric Key Cipher
6%
Time Complexity
6%
Mathematics
Additional Condition
6%
Advanced Encryption Standard
17%
Block Cipher
89%
Cipher Key
6%
Convex Hull
8%
Cryptanalysis
25%
Cube Attack
13%
Degree of Freedom
13%
Differential Cryptanalysis
49%
Distinguishing Attack
6%
Fast Walsh
6%
Feistel Cipher
13%
Hamming Weight
13%
Hash Function
19%
Integer
46%
Internal State
6%
Internet of Things
5%
Key Bit
6%
Linear Inequality
6%
Linear Programming
41%
Linear Programming Problem
10%
Neural Network
13%
Probability Theory
7%
Round Key
6%
S-Box
39%
Systems of Linear Equation
6%
Engineering
Addition Operation
6%
Applicability
13%
Block Cipher
47%
Degree of Freedom
26%
Exhaustive Search
6%
Experimental Result
15%
Extractor
13%
Feasible Region
6%
Filtration
6%
Internal State
19%
Linear Equation
19%
Linear Programming Problem
6%
Mixed-Integer Linear Programming
17%
Mixed-Integer Programming Model
6%
Search Method
6%
Search Strategies
13%
Side Channel
13%
Side Channel Attack
13%
Signal-to-Noise Ratio
13%
Success Probability
13%