default search action
Dingyi Pei
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j28]Farshad Safavi, Parthan Olikkal, Dingyi Pei, Sadia Kamal, Helen Meyerson, Varsha Penumalee, Ramana Vinjamuri:
Emerging Frontiers in Human-Robot Interaction. J. Intell. Robotic Syst. 110(2): 45 (2024) - 2023
- [c22]Maibam Pooya Chanu, Dingyi Pei, Parthan Olikkal, Ramana Kumar Vinjamuri, Nayan M. Kakoty:
Electroencephalogram based Control of Prosthetic Hand using Optimizable Support Vector Machine. AIR 2023: 34:1-34:6 - [c21]Parthan Olikkal, Dingyi Pei, Bharat Kashyap Karri, Ashwin Satyanarayana, Nayan M. Kakoty, Ramana Vinjamuri:
Learning Hand Gestures using Synergies in a Humanoid Robot. ROBIO 2023: 1-6 - 2022
- [j27]Dingyi Pei, Parthan Olikkal, Tülay Adali, Ramana Vinjamuri:
Dynamical Synergies of Multidigit Hand Prehension. Sensors 22(11): 4177 (2022) - [j26]Dingyi Pei, Parthan Olikkal, Tülay Adali, Ramana Vinjamuri:
Reconstructing Synergy-Based Hand Grasp Kinematics from Electroencephalographic Signals. Sensors 22(14): 5349 (2022) - [j25]Parthan Olikkal, Dingyi Pei, Tülay Adali, Nilanjan Banerjee, Ramana Vinjamuri:
Data Fusion-Based Musculoskeletal Synergies in the Grasping Hand. Sensors 22(19): 7417 (2022) - [c20]Dingyi Pei, Koji Nakao, Heung Youl Youm, Chun-I Fan:
Message from the General Co-Chairs: AsiaJCIS 2022. AsiaJCIS 2022: vii - [c19]Dingyi Pei, Parthan Olikkal, Tülay Adali, Ramana Vinjamuri:
Dynamical Synergies in Multidigit Hand Prehension. EMBC 2022: 3203-3206 - [c18]Parthan Olikkal, Dingyi Pei, Tülay Adali, Nilanjan Banerjee, Ramana Vinjamuri:
Musculoskeletal Synergies in the Grasping Hand. EMBC 2022: 3649-3652 - 2021
- [c17]Dingyi Pei, Tülay Adali, Ramana Vinjamuri:
Generalizability of Hand Kinematic Synergies derived using Independent Component Analysis. EMBC 2021: 621-624 - [c16]Martin K. Burns, Rachel Rosa, Zamin Akmal, Joseph Conway, Dingyi Pei, Emily King, Nilanjan Banerjee, Ramana Vinjamuri:
Design and Implementation of an Instrumented Data Glove that measures Kinematics and Dynamics of Human Hand. EMBC 2021: 7229-7232 - 2020
- [j24]Raphael C.-W. Phan, Masayuki Abe, Lynn Batten, Jung Hee Cheon, Ed Dawson, Steven D. Galbraith, Jian Guo, Lucas C. K. Hui, Kwangjo Kim, Xuejia Lai, Dong Hoon Lee, Mitsuru Matsui, Tsutomu Matsumoto, Shiho Moriai, Phong Q. Nguyen, Dingyi Pei, Duong Hieu Phan, Josef Pieprzyk, Huaxiong Wang, Hank Wolfe, Duncan S. Wong, Tzong-Chen Wu, Bo-Yin Yang, Siu-Ming Yiu, Yu Yu, Jianying Zhou:
Advances in security research in the Asiacrypt region. Commun. ACM 63(4): 76-81 (2020) - [c15]Martin K. Burns, Julia Stika, Vrajeshri Patel, Dingyi Pei, Raviraj Nataraj, Ramana Vinjamuri:
Lateralization and Model Transference in a Bilateral Cursor Task*. EMBC 2020: 3240-3243
2010 – 2019
- 2019
- [j23]Dingyi Pei, Vrajeshri Patel, Martin K. Burns, Rajarathnam Chandramouli, Ramana Vinjamuri:
Neural Decoding of Synergy-Based Hand Movements Using Electroencephalography. IEEE Access 7: 18155-18163 (2019) - [j22]Martin K. Burns, Dingyi Pei, Ramana Vinjamuri:
Dynamic Control of Virtual Hand Grasp Using Spatiotemporal Synergies. IEEE Access 7: 112327-112338 (2019) - [j21]Martin K. Burns, Dingyi Pei, Ramana Vinjamuri:
Myoelectric Control of a Soft Hand Exoskeleton Using Kinematic Synergies. IEEE Trans. Biomed. Circuits Syst. 13(6): 1351-1361 (2019) - 2018
- [j20]Dingyi Pei, Martin K. Burns, Rajarathnam Chandramouli, Ramana Vinjamuri:
Decoding Asynchronous Reaching in Electroencephalography Using Stacked Autoencoders. IEEE Access 6: 52889-52898 (2018) - [j19]Zhiqiang Lin, Dingyi Pei, Dongdai Lin, Xiaolei Zhang:
Fast construction of binary ring FCSRs for hardware stream ciphers. Des. Codes Cryptogr. 86(4): 939-953 (2018) - [c14]Dingyi Pei, Jingang Liu:
A Note on the Sidelnikov-Shestakov Attack of Niederreiter Scheme. Inscrypt 2018: 621-625 - [c13]Vrajeshri Patel, Martin K. Burns, Dingyi Pei, Ramana Vinjamuri:
Decoding Synergy-Based Hand Movements using Electroencephalography. EMBC 2018: 4816-4819 - [i6]Zongxiang Yi, Dingyi Pei:
A Construction of Zero-Difference Functions. CoRR abs/1811.08132 (2018) - 2017
- [j18]Zhiqiang Lin, Dongdai Lin, Dingyi Pei:
Practical construction of ring LFSRs and ring FCSRs with low diffusion delay for hardware cryptographic applications. Cryptogr. Commun. 9(4): 431-443 (2017) - [j17]Junwu Dong, Dingyi Pei:
Construction for de Bruijn sequences with large stage. Des. Codes Cryptogr. 85(2): 343-358 (2017) - 2016
- [j16]Yanbin Zheng, Pingzhi Yuan, Dingyi Pei:
Large classes of permutation polynomials over Fq2. Des. Codes Cryptogr. 81(3): 505-521 (2016) - [j15]Yanbin Zheng, Yuyin Yu, Yuanping Zhang, Dingyi Pei:
Piecewise constructions of inverses of cyclotomic mapping permutation polynomials. Finite Fields Their Appl. 40: 1-9 (2016) - 2015
- [j14]Yanbin Zheng, Pingzhi Yuan, Dingyi Pei:
Piecewise constructions of inverses of some permutation polynomials. Finite Fields Their Appl. 36: 151-169 (2015) - [j13]Dingyi Pei, Zhiqiang Lin, Xiaolei Zhang:
Construction of Transition Matrices for Ternary Ring Feedback With Carry Shift Registers. IEEE Trans. Inf. Theory 61(5): 2942-2951 (2015) - [i5]Zhiqiang Lin, Dingyi Pei, Dongdai Lin:
Construction of Transition Matrices for Binary FCSRs. IACR Cryptol. ePrint Arch. 2015: 1181 (2015) - 2013
- [j12]Qi Chen, Dingyi Pei, Chunming Tang, Gansen Zhao:
Efficient integer span program for hierarchical threshold access structure. Inf. Process. Lett. 113(17): 621-627 (2013) - [j11]Qi Chen, Dingyi Pei, Chunming Tang, Qiang Yue, Tongkai Ji:
A note on ramp secret sharing schemes from error-correcting codes. Math. Comput. Model. 57(11-12): 2695-2702 (2013) - 2012
- [c12]Chunming Tang, Xing Hu, Duncan S. Wong, Dingyi Pei:
An efficient key distribution scheme in cloud computing. CloudCom 2012: 557-561 - 2011
- [j10]Meicheng Liu, Dongdai Lin, Dingyi Pei:
Fast Algebraic Attacks and Decomposition of Symmetric Boolean Functions. IEEE Trans. Inf. Theory 57(7): 4817-4821 (2011) - [c11]Meicheng Liu, Dongdai Lin, Dingyi Pei:
Results on the Immunity of Boolean Functions against Probabilistic Algebraic Attacks. ACISP 2011: 34-46 - [i4]Zhiqiang Lin, Dingyi Pei:
Constructing a Diversified FCSR with a Given Connection Integer. IACR Cryptol. ePrint Arch. 2011: 358 (2011) - 2010
- [j9]Dingyi Pei, Jun-Wu Dong, Chunming Rong:
A novel key pre-distribution scheme for wireless distributed sensor networks. Sci. China Inf. Sci. 53(2): 288-298 (2010) - [j8]Yusong Du, Dingyi Pei:
Construction of Boolean functions with maximum algebraic immunity and count of their annihilators at lowest degree. Sci. China Inf. Sci. 53(4): 780-787 (2010) - [j7]Meicheng Liu, Dingyi Pei, Yusong Du:
Identification and construction of Boolean functions with maximum algebraic immunity. Sci. China Inf. Sci. 53(7): 1379-1396 (2010) - [c10]Qi Chen, Dingyi Pei, Jun-Wu Dong:
Determining Parameters of Key Predistribution Schemes via Linear Codes in Wireless Sensor Networks. Inscrypt 2010: 284-299 - [c9]Yusong Du, Dingyi Pei:
Count of annihilators of Boolean functions with given algebraic immunity. WCNIS 2010: 640-643
2000 – 2009
- 2009
- [c8]Dingyi Pei:
New Family of Non-Cartesian Perfect Authentication Codes. IWCC 2009: 188-201 - 2008
- [j6]Chunming Tang, Dingyi Pei, Xiaofeng Wang, Zhuojun Liu:
Delegateable signatures based on non-interactive witness indistinguishable and non-interactive witness hiding proofs. Sci. China Ser. F Inf. Sci. 51(2): 128-144 (2008) - [j5]Jun-Wu Dong, Dingyi Pei, Xue-Li Wang:
A Class of Key Predistribution Schemes Based on Orthogonal Arrays. J. Comput. Sci. Technol. 23(5): 825-831 (2008) - [c7]Chunming Tang, Dingyi Pei, Zheng-an Yao:
5-Round Computational Zero-Knowledge Proof with Negligible Error Probability for Any NP from Any One-Way Permutation. ISECS 2008: 407-411 - [e2]Dingyi Pei, Moti Yung, Dongdai Lin, Chuankun Wu:
Information Security and Cryptology, Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers. Lecture Notes in Computer Science 4990, Springer 2008, ISBN 978-3-540-79498-1 [contents] - [i3]Chunming Tang, Dingyi Pei, Zhuojun Liu, Zheng-an Yao, Mingsheng Wang:
Perfectly Hiding Commitment Scheme with Two-Round from Any One-Way Permutation. IACR Cryptol. ePrint Arch. 2008: 34 (2008) - 2007
- [c6]Chunming Tang, Dingyi Pei, Zheng-an Yao:
Efficient Zaps and Signatures of Knowledge. CIS 2007: 637-641 - [c5]Jun-Wu Dong, Dingyi Pei, Xueli Wang:
A Key Predistribution Scheme Based on 3-Designs. Inscrypt 2007: 81-92 - [c4]Yong Li, Willy Susilo, Yi Mu, Dingyi Pei:
Designated Verifier Signature: Definition, Framework and New Constructions. UIC 2007: 1191-1200 - 2005
- [j4]Lei Hu, Jun-Wu Dong, Dingyi Pei:
Implementation of Cryptosystems Based on Tate Pairing. J. Comput. Sci. Technol. 20(2): 264-269 (2005) - [c3]Yong Li, Helger Lipmaa, Dingyi Pei:
On Delegatability of Four Designated Verifier Signatures. ICICS 2005: 61-71 - 2004
- [j3]Lei Hu, Dingyi Pei:
Generator polynomials of characteristic ideal of maximal periodic arrays over Galois rings. Discret. Math. 278(1-3): 139-149 (2004) - [i2]Chunming Tang, Dingyi Pei, Zhuojun Liu, Yong He:
Non-Interactive and Information-Theoretic Secure Publicly Verifiable Secret Sharing. IACR Cryptol. ePrint Arch. 2004: 201 (2004) - [i1]Chunming Tang, Dingyi Pei, Zhuojun Liu:
Delegateable Signature Using Witness Indistinguishable and Witness Hiding Proofs. IACR Cryptol. ePrint Arch. 2004: 373 (2004) - 2000
- [c2]Dingyi Pei, Wenliang Qin:
The Correlation of a Boolean Function with Its Variables. INDOCRYPT 2000: 1-8
1990 – 1999
- 1999
- [c1]Dingyi Pei, Yuqiang Li, Yejing Wang, Reihaneh Safavi-Naini:
Characterization of Optimal Authentication Codes with Arbitration. ACISP 1999: 303-313 - 1998
- [e1]Kazuo Ohta, Dingyi Pei:
Advances in Cryptology - ASIACRYPT '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings. Lecture Notes in Computer Science 1514, Springer 1998, ISBN 3-540-65109-8 [contents] - 1995
- [j2]Dingyi Pei:
Information-Theoretic Bounds for Authentication Codes and Block Designs. J. Cryptol. 8(4): 177-188 (1995) - 1990
- [j1]Charles C. Wang, Dingyi Pei:
A VLSI DEsign for Computing Exponentiations in GF(2^m) and Its Application to Generate Pseudorandom Number Sequences. IEEE Trans. Computers 39(2): 258-266 (1990)
Coauthor Index
aka: Ramana Kumar Vinjamuri
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint