


default search action
Xiaohu Tang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Xiaohu Tang 0001
— Guangxi Normal University, China - Xiaohu Tang 0002
— Nanjing University of Aeronautics and Astronautics, Nanjing, China - Xiaohu Tang 0003
— Microsoft Research, Beijing, China (and 1 more) - Xiaohu Tang 0004
— Southwest Jiaotong University, Chengdu, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j45]Shuangrong Peng
, Ling Xiong
, Xiaohu Tang:
EPPMRRS: An Efficient and Privacy-Preserving Medical Record Retrieval Scheme in WBAN. Comput. Electr. Eng. 123: 109997 (2025)
[j44]Zhao Hu, Mingxiu Qiu, Nian Li, Xiaohu Tang, Liwei Wu:
Several classes of linear codes with few weights derived from Weil sums. Finite Fields Their Appl. 108: 102679 (2025)
[i26]Zhao Hu, Mingxiu Qiu, Nian Li, Xiaohu Tang, Liwei Wu:
Several classes of linear codes with few weights derived from Weil sums. CoRR abs/2501.11282 (2025)
[i25]Zhao Hu, Liang Wang, Nian Li, Xiangyong Zeng, Xiaohu Tang:
On (ℒ,𝒫)-Twisted Generalized Reed-Solomon Codes. CoRR abs/2502.04746 (2025)
[i24]Zhexin Wang, Nian Li, Xiangyong Zeng, Xiaohu Tang:
The Lee weight distributions of several classes of linear codes over ℤ4. CoRR abs/2502.10697 (2025)
[i23]Qinghui Gong, Xue Yang, Xiaohu Tang:
Orthogonal Soft Pruning for Efficient Class Unlearning. CoRR abs/2506.19891 (2025)
[i22]Jie Li, Xiaohu Tang:
Efficient Repair of (k+2, k) Degraded Read Friendly MDS Array Codes With Sub-packetization 2. CoRR abs/2510.23316 (2025)- 2024
[j43]Xiaohu Tang, Won-jun Chung:
Automated urban landscape design: an AI-driven model for emotion-based layout generation and appraisal. PeerJ Comput. Sci. 10: e2426 (2024)
[c21]Fumin Zhang, Yang Cao, Yanyan Wang, Xiaohu Tang:
Deep Learning Empowered Spectrum Prediction with Wavelet Decomposition. ICCT 2024: 1827-1832
[c20]Zikun Yuan, Weijia Zhu, Yuwen He, Li Zhang, Xiaohu Tang:
Spatial Neighbor Information Assisted Motion Compensated Temporal Filter for Video Coding. PCS 2024: 1-5
[c19]Haiying Xia, Jingwen Chen, Yumei Tan, Xiaohu Tang:
CFMISA: Cross-Modal Fusion of Modal Invariant and Specific Representations for Multimodal Sentiment Analysis. PRCV (3) 2024: 423-437
[i21]Zhen Li, Xuan He, Xiaohu Tang:
Marker+Codeword+Marker: A Coding Structure for Segmented single-indel/single-edit Channels. CoRR abs/2402.04890 (2024)
[i20]Teng Lu, Xuan He, Xiaohu Tang:
Two Classes of Optimal Multi-Input Structures for Node Computations in Message Passing Algorithms. CoRR abs/2407.08941 (2024)- 2023
[j42]Hui Zhu, Xiaohu Tang, Laurence Tianruo Yang
, Chao Fu, Shuangrong Peng:
Key-value data collection and statistical analysis with local differential privacy. Inf. Sci. 640: 119058 (2023)
[j41]Shuangrong Peng, Xiaohu Tang, Ling Xiong, Hui Zhu:
LGAAFS: A lightweight group anonymous mutual authentication and forward security scheme for wireless body area networks. Peer Peer Netw. Appl. 16(5): 2474-2491 (2023)
[c18]Fuyun He, Yao Zhang, Yan Wei, Youwei Qian, Cong Hu, Xiaohu Tang:
Brain Tumor Image Segmentation Network Based on Dual Attention Mechanism. ICIC (5) 2023: 125-136
[c17]Zikun Yuan, Xiaohu Tang:
Multi-Zone Division-Based Inter Prediction for Versatile Video Coding. ISCAS 2023: 1-5
[i19]Qifa Yan, Xiaohu Tang, Zhengchun Zhou:
Robust, Private and Secure Cache-Aided Scalar Linear Function Retrieval from Blind Servers. CoRR abs/2301.08711 (2023)
[i18]Zhao Hu, Yunge Xu, Nian Li, Xiangyong Zeng, Lisha Wang, Xiaohu Tang:
New constructions of optimal linear codes from simplicial complexes. CoRR abs/2305.07206 (2023)- 2022
[j40]Haiying Xia, Bo Wu, Yumei Tan, Xiaohu Tang, Shuxiang Song
:
MFC-Net: Multi-scale fusion coding network for Image Deblurring. Appl. Intell. 52(11): 13232-13249 (2022)
[j39]Hui Zhu
, Fan Yin, Shuangrong Peng, Xiaohu Tang:
Differentially private hierarchical tree with high efficiency. Comput. Secur. 118: 102727 (2022)
[c16]Yajuan Liu
, Xuan He, Xiaohu Tang:
Capacity-Achieving Constrained Codes with GC-Content and Runlength Limits for DNA Storage. ISIT 2022: 198-203
[c15]Nian Li, Yanan Wu, Xiangyong Zeng, Xiaohu Tang:
A note on the differential spectrum of a class of power functions. IWSDA 2022: 1-5
[c14]Qidi Li, Yanyan Wang, Li Li, Xiaohu Tang, Xike Ren:
Angular Domain Channel Estimation for Symmetrical Nonuniform Linear Array in Communication Systems. WCSP 2022: 978-983
[i17]Zhao Hu, Nian Li, Linjie Xu, Xiangyong Zeng, Xiaohu Tang:
The differential spectrum and boomerang spectrum of a class of locally-APN functions. CoRR abs/2206.14613 (2022)
[i16]Xi Xie, Nian Li, Linjie Xu, Xiangyong Zeng, Xiaohu Tang:
Two new classes of permutation trinomials over 픽q3 with odd characteristic. IACR Cryptol. ePrint Arch. 2022: 485 (2022)- 2021
[c13]LingHan Zhang, F. Jiang, Xiaohu Tang:
Verifiable Conjunctive Keyword Search with Certificateless Searchable. TrustCom 2021: 9-16
[i15]Ziran Tu, Xiangyong Zeng, Yupeng Jiang, Xiaohu Tang:
A class of APcN power functions over finite fields of even characteristic. CoRR abs/2107.06464 (2021)
[i14]Xi Xie, Nian Li, Xiangyong Zeng, Xiaohu Tang, Yao Yao:
Several classes of bent functions over finite fields. CoRR abs/2108.00612 (2021)
[i13]Zhao Hu, Nian Li, Xiangyong Zeng, Lisha Wang, Xiaohu Tang:
A subfield-based construction of optimal linear codes over finite fields. CoRR abs/2108.09428 (2021)- 2020
[c12]Wuyunbilige, Licai Liu, Rui Wang, Shuai Gao, Ze Mao, Xiaohu Tang:
Adaptive Image Defogging Algorithm Based on DCNN. DSIT 2020: 42-46
[i12]Hankun Cao, Qifa Yan, Xiaohu Tang:
Adaptive Gradient Coding. CoRR abs/2006.04845 (2020)
[i11]Nian Li, Yanan Wu, Xiangyong Zeng, Xiaohu Tang:
On the differential spectrum of a class of power functions over finite fields. CoRR abs/2012.04316 (2020)
2010 – 2019
- 2017
[j38]Dan Zhang, Cuiling Fan, Daiyuan Peng, Xiaohu Tang:
Complete weight enumerators of some linear codes from quadratic forms. Cryptogr. Commun. 9(1): 151-163 (2017)
[j37]Lisha Wang, Xiaohu Tang:
On the correlation distribution of the generalized maximal length ℤ4-sequences. Cryptogr. Commun. 9(2): 199-215 (2017)
[j36]Sihong Su
, Xiaohu Tang:
Systematic Constructions of Rotation Symmetric Bent Functions, 2-Rotation Symmetric Bent Functions, and Bent Idempotent Functions. IEEE Trans. Inf. Theory 63(7): 4658-4667 (2017)
[j35]Deng Tang
, Claude Carlet, Xiaohu Tang, Zhengchun Zhou
:
Construction of Highly Nonlinear 1-Resilient Boolean Functions With Optimal Algebraic Immunity and Provably High Fast Algebraic Immunity. IEEE Trans. Inf. Theory 63(9): 6113-6125 (2017)
[i10]Jinyu Wang, Minquan Cheng, Qifa Yan, Xiaohu Tang:
On the Placement Delivery Array Design for Coded Caching Scheme in D2D Networks. CoRR abs/1712.06212 (2017)- 2015
[j34]Deng Tang
, Claude Carlet, Xiaohu Tang:
Differentially 4-uniform bijections by permuting the inverse function. Des. Codes Cryptogr. 77(1): 117-141 (2015)
[i9]Sihong Su, Xiaohu Tang:
On the Systematic Constructions of Rotation Symmetric Bent Functions with Any Possible Algebraic Degrees. CoRR abs/1505.02875 (2015)
[i8]Sihong Su, Xiaohu Tang:
On the Systematic Constructions of Rotation Symmetric Bent Functions with Any Possible Algebraic Degrees. IACR Cryptol. ePrint Arch. 2015: 451 (2015)- 2014
[j33]Li Kang, Xiaohu Tang, Jiafen Liu:
Tight chosen ciphertext attack (CCA)-secure hybrid encryption scheme with full public verifiability. Sci. China Inf. Sci. 57(11): 1-14 (2014)
[j32]Sihong Su, Xiaohu Tang:
Construction of rotation symmetric Boolean functions with optimal algebraic immunity and high nonlinearity. Des. Codes Cryptogr. 71(2): 183-199 (2014)
[j31]Sihong Su, Xiaohu Tang, Xiangyong Zeng:
A systematic method of constructing Boolean functions with optimal algebraic immunity based on the generator matrix of the Reed-Muller code. Des. Codes Cryptogr. 72(3): 653-673 (2014)
[j30]Jia Fan, Yuliang Zheng
, Xiaohu Tang:
A New Construction of Identity-Based Signcryption without Random Oracles. Int. J. Found. Comput. Sci. 25(1): 1-24 (2014)
[j29]Deng Tang
, Claude Carlet, Xiaohu Tang:
A class of 1-Resilient Boolean Functions with Optimal Algebraic Immunity and Good Behavior against Fast Algebraic Attacks. Int. J. Found. Comput. Sci. 25(6): 763-780 (2014)
[c11]Yong Wang, Xiaohu Tang, Lijuan Zhang:
Group strategy for remaining tags in anti-collision algorithm for RFID system. CCIS 2014: 165-169
[c10]Yong Wang, Xiaohu Tang, Lijuan Zhang:
Prefix-maximized query-tree anti-collision algorithm with robust estimation for RFID system. CCIS 2014: 170-174- 2013
[j28]Fang Liu, Daiyuan Peng, Zhengchun Zhou
, Xiaohu Tang:
New constructions of optimal frequency hopping sequences with new parameters. Adv. Math. Commun. 7(1): 91-101 (2013)
[j27]Deng Tang
, WeiGuo Zhang, Xiaohu Tang:
Construction of balanced Boolean functions with high nonlinearity and good autocorrelation properties. Des. Codes Cryptogr. 67(1): 77-91 (2013)
[j26]Fang Liu, Daiyuan Peng, Zhengchun Zhou
, Xiaohu Tang:
A new frequency-hopping sequence set based upon generalized cyclotomy. Des. Codes Cryptogr. 69(2): 247-259 (2013)
[j25]Deng Tang
, Claude Carlet, Xiaohu Tang:
On the second-order nonlinearities of some bent functions. Inf. Sci. 223: 322-330 (2013)
[j24]Jia Fan, Yuliang Zheng, Xiaohu Tang:
Key-Insulated Signcryption. J. Univers. Comput. Sci. 19(10): 1351-1374 (2013)
[j23]Deng Tang
, Claude Carlet, Xiaohu Tang:
Highly Nonlinear Boolean Functions With Optimal Algebraic Immunity and Good Behavior Against Fast Algebraic Attacks. IEEE Trans. Inf. Theory 59(1): 653-664 (2013)
[j22]Wei Su, Xiaohu Tang, Alexander Pott:
A Note on a Conjecture for Balanced Elementary Symmetric Boolean Functions. IEEE Trans. Inf. Theory 59(1): 665-671 (2013)
[j21]Wei Su, Alexander Pott, Xiaohu Tang:
Characterization of Negabent Functions and Construction of Bent-Negabent Functions With Maximum Algebraic Degree. IEEE Trans. Inf. Theory 59(6): 3387-3395 (2013)
[c9]Claude Carlet, Deng Tang
, Xiaohu Tang, Qunying Liao:
New Construction of Differentially 4-Uniform Bijections. Inscrypt 2013: 22-38
[i7]Deng Tang, Claude Carlet, Xiaohu Tang:
Differentially 4-Uniform Bijections by Permuting the Inverse Function. IACR Cryptol. ePrint Arch. 2013: 639 (2013)- 2012
[c8]Lijuan Zhang, Jin Zhang, Xiaohu Tang, Yong Wang:
An efficient tag anti-collision protocol for RFID systems. CCIS 2012: 999-1004
[i6]Wei Su, Xiaohu Tang, Alexander Pott:
A Note on a Conjecture for Balanced Elementary Symmetric Boolean Functions. CoRR abs/1203.1418 (2012)
[i5]Wei Su, Alexander Pott, Xiaohu Tang:
Characterization of Negabent Functions and Construction of Bent-Negabent Functions with Maximum Algebraic Degree. CoRR abs/1205.6568 (2012)- 2011
[j20]Zhengchun Zhou
, Xiaohu Tang:
New nearly optimal codebooks from relative difference sets. Adv. Math. Commun. 5(3): 521-527 (2011)
[j19]Zhengchun Zhou, Xiaohu Tang:
New nonbinary sequence families with low correlation, large size, and large linear span. Appl. Math. Lett. 24(7): 1105-1110 (2011)
[j18]Zhengchun Zhou
, Xiaohu Tang:
Generalized modified Gold sequences. Des. Codes Cryptogr. 60(3): 241-253 (2011)
[j17]Nian Li, Xiaohu Tang, Xiangyong Zeng, Lei Hu:
On the Correlation Distributions of the Optimal Quaternary Sequence Family U and the Optimal Binary Sequence Family V. IEEE Trans. Inf. Theory 57(6): 3815-3824 (2011)
[j16]Nian Li, Xiaohu Tang:
On the Linear Complexity of Binary Sequences of Period $4N$ With Optimal Autocorrelation Value/Magnitude. IEEE Trans. Inf. Theory 57(11): 7597-7604 (2011)
[c7]Jia Fan, Yuliang Zheng
, Xiaohu Tang:
A Single Key Pair is Adequate for the Zheng Signcryption. ACISP 2011: 371-388
[i4]Deng Tang, Claude Carlet, Xiaohu Tang:
Highly Nonlinear Boolean Functions with Optimal Algebraic Immunity and Good Behavior Against Fast Algebraic Attacks. IACR Cryptol. ePrint Arch. 2011: 366 (2011)- 2010
[j15]Zhengchun Zhou
, Xiaohu Tang:
Optimal and perfect difference systems of sets from q-ary sequences with difference-balanced property. Des. Codes Cryptogr. 57(2): 215-223 (2010)
[j14]Fang Liu, Daiyuan Peng, Xiaohu Tang, Xianhua Niu:
New p-Ary Sequences with Low Correlation and Large Family Size. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(11): 2245-2250 (2010)
[j13]Fang Liu, Daiyuan Peng, Xiaohu Tang:
A New Set of Optimal Frequency-Hopping Sequences. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(11): 2332-2336 (2010)
[j12]Jia Fan, Yuliang Zheng
, Xiaohu Tang:
Signcryption with Non-interactive Non-repudiation without Random Oracles. Trans. Comput. Sci. 10: 202-230 (2010)
[j11]Xiaohu Tang, Guang Gong:
New constructions of binary sequences with optimal autocorrelation value/magnitude. IEEE Trans. Inf. Theory 56(3): 1278-1286 (2010)
[c6]Fang Liu, Daiyuan Peng, Xiaohu Tang, Xianhua Niu:
On the Autocorrelation and the Linear Complexity of q-Ary Prime n-Square Sequences. SETA 2010: 139-150
[c5]Zhen Pan, Wei Su, Xiaohu Tang:
Clock-Controlled FCSR Sequence with Large Linear Complexity. SETA 2010: 229-239
[i3]Fang Liu, Daiyuan Peng, Zhengchun Zhou, Xiaohu Tang:
Construction of Frequency Hopping Sequence Set Based upon Generalized Cyclotomy. CoRR abs/1009.3602 (2010)
[i2]Deng Tang, WeiGuo Zhang, Xiaohu Tang:
Construction of Balanced Boolean Functions with High Nonlinearity and Good Autocorrelation Properties. IACR Cryptol. ePrint Arch. 2010: 362 (2010)
[i1]Xiaohu Tang, Deng Tang, Xiangyong Zeng, Lei Hu:
Balanced Boolean Functions with (Almost) Optimal Algebraic Immunity and Very High Nonlinearity. IACR Cryptol. ePrint Arch. 2010: 443 (2010)
2000 – 2009
- 2009
[j10]Zhengchun Zhou
, Xiaohu Tang:
New Families of Binary Sequences with Low Correlation and Large Size. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(1): 291-297 (2009)
[j9]Xiaohu Tang, Jürgen Lindner:
Almost Quadriphase Sequence With Ideal Autocorrelation Property. IEEE Signal Process. Lett. 16(1): 38-40 (2009)
[j8]Zhengchun Zhou
, Xiaohu Tang, Daiyuan Peng:
New Optimal Quadriphase Zero Correlation Zone Sequence Sets With Mismatched Filtering. IEEE Signal Process. Lett. 16(7): 636-639 (2009)
[j7]Wenfeng Jiang, Lei Hu, Xiaohu Tang, Xiangyong Zeng:
New Optimal Quadriphase Sequences With Larger Linear Span. IEEE Trans. Inf. Theory 55(1): 458-470 (2009)- 2008
[j6]Wenfeng Jiang, Lei Hu, Xiaohu Tang, Xiangyong Zeng:
New family of binary sequences of period 4(2 n - 1) with low correlation. Appl. Algebra Eng. Commun. Comput. 19(5): 429-439 (2008)
[j5]Zhengchun Zhou, Xiaohu Tang:
New Families of Binary Low Correlation Zone Sequences Based on Interleaved Quadratic Form Sequences. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(11): 3406-3409 (2008)
[j4]Zhengchun Zhou, Zhen Pan, Xiaohu Tang:
New Families of Optimal Zero Correlation Zone Sequences Based on Interleaved Technique and Perfect Sequences. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(12): 3691-3697 (2008)
[j3]Zhengchun Zhou
, Xiaohu Tang, Guang Gong:
A New Class of Sequences With Zero or Low Correlation Zone Based on Interleaving Technique. IEEE Trans. Inf. Theory 54(9): 4267-4273 (2008)
[c4]Daiyuan Peng, Tu Peng, Xiaohu Tang, Xianhua Niu:
A Class of Optimal Frequency Hopping Sequences Based upon the Theory of Power Residues. SETA 2008: 188-196- 2007
[j2]Xiaohu Tang:
On the linear span of the p -ary cascaded GMW sequences. Sci. China Ser. F Inf. Sci. 50(4): 551-560 (2007)
[j1]Ji-Woong Jang, Jong-Seon No, Habong Chung, Xiaohu Tang:
New Sets of Optimal p-ary Low-Correlation Zone Sequences. IEEE Trans. Inf. Theory 53(2): 815-821 (2007)
[c3]Wenfeng Jiang, Lei Hu, Xiaohu Tang, Xiangyong Zeng:
New Optimal Quadriphase Sequences with Larger Lnear Span. ITW 2007: 1-5- 2005
[c2]Ji-Woong Jang, Jong-Seon No, Habong Chung, Xiaohu Tang:
Binary sequence sets with low correlation zone. ISIT 2005: 487-490
[c1]Yu Zheng, Dake He, Weichi Yu, Xiaohu Tang:
Trusted Computing-Based Security Architecture For 4G Mobile Networks. PDCAT 2005: 251-255
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-12-12 02:39 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







