Jian Guo

From MaRDI portal
Revision as of 06:54, 7 October 2023 by Import231006081045 (talk | contribs) (Created automatically from import231006081045)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Person:249821

Available identifiers

zbMath Open guo.jianWikidataQ59552781 ScholiaQ59552781MaRDI QIDQ249821

List of research outcomes

PublicationDate of PublicationType
Exploring SAT for cryptanalysis: (quantum) collision attacks against 6-round SHA-32023-08-25Paper
Key structures: improved related-key boomerang attack against the full AES-2562023-07-26Paper
Superposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashing2023-06-12Paper
Triangulating rebound attack on AES-like hashing2023-06-12Paper
Towards closing the security gap of Tweak-aNd-Tweak (TNT)2023-03-21Paper
Sliding mode control for networked control systems under DoS attacks via an event-triggered scheme2023-03-07Paper
Consensus tracking control for nonlinear multiagent systems with asymmetric state constraints and input delays2022-11-09Paper
Neural network-based adaptive finite-time tracking control of switched nonlinear systems with time-varying delay2022-06-03Paper
TNT: how to tweak a block cipher2022-03-23Paper
Dynamic event-triggered control design for a class of \(p\)-normal nonlinear time-delay systems with actuator failures2022-03-04Paper
New Constructions of Complete Permutations2022-02-17Paper
Disturbance-observer-based sampled-data adaptive output feedback control for a class of uncertain nonlinear systems2022-02-08Paper
Stabilisation for positive switched T-S fuzzy delayed systems under standard L1 and L performance2022-02-04Paper
Automatic search of meet-in-the-middle preimage attacks on AES-like hashing2021-12-08Paper
Distributed set-membership filtering for time-varying systems: a coding-decoding-based approach2021-11-18Paper
M-estimation based sparse grid quadrature filter and stochastic stability analysis2021-10-21Paper
Global adaptive finite‐time stabilization for a class of p‐normal nonlinear systems via an event‐triggered strategy2021-05-31Paper
Prediction of membrane protein types from sequences and position-specific scoring matrices2021-01-21Paper
Simultaneous variable selection and class fusion for high-dimensional linear discriminant analysis2020-08-04Paper
Generic attacks on hash combiners2020-06-15Paper
Practical collision attacks against round-reduced SHA-32020-03-03Paper
Consensus control of networked multi-agent systems based on a novel hybrid transmission strategy2019-07-02Paper
In Vivo Intravascular Ultrasound-Based 3D Thin-Walled Model for Human Coronary Plaque Progression Study: Transforming Research to Potential Commercialization2019-03-27Paper
Sampled‐data leader‐following consensus of second‐order nonlinear multiagent systems without velocity measurements2019-02-28Paper
Displacement and stress analysis of thin plate for cement concrete pavement2019-02-08Paper
New MILP modeling: improved conditional cube attacks on KECCAK-based constructions2019-01-23Paper
Global sampled-data output feedback stabilization for a class of stochastic nonlinear systems with time-varying delay2019-01-15Paper
Adaptive practical stabilization of a class of uncertain nonlinear systems via sampled-data control2018-10-23Paper
https://portal.mardi4nfdi.de/entity/Q46879402018-10-22Paper
https://portal.mardi4nfdi.de/entity/Q46883172018-10-22Paper
Optimal formation control and collision avoidance in environment with multiple rectangle obstacles2018-10-18Paper
Robust adaptive attitude control for flexible spacecraft in the presence of SGCMG friction nonlinearity2018-08-31Paper
https://portal.mardi4nfdi.de/entity/Q45747352018-07-18Paper
Sampled‐data control of a class of uncertain switched nonlinear systems in nonstrict‐feedback form2018-05-31Paper
Class-specific variable selection for multicategory support vector machines2018-03-15Paper
Functional graph revisited: updates on (second) preimage attacks on hash combiners2017-11-15Paper
Non-full Sbox linearization: applications to collision attacks on round-reduced \textsc{keccak}2017-11-15Paper
New Collision Attacks on Round-Reduced Keccak2017-06-23Paper
A risk assessment approach for failure mode and effects analysis based on intuitionistic fuzzy sets and evidence theory2017-05-19Paper
Adaptive finite-time control for a class of switched nonlinear systems using multiple Lyapunov functions2017-04-18Paper
Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak2017-02-01Paper
How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers2017-02-01Paper
https://portal.mardi4nfdi.de/entity/Q31801612017-01-06Paper
New Insights on AES-Like SPN Ciphers2016-11-30Paper
Adaptive finite-time control for uncertain nonlinear systems with application to mechanical systems2016-11-09Paper
Provable Security Evaluation of Structures Against Impossible Differential and Zero Correlation Linear Cryptanalysis2016-09-09Paper
Generalized integration operators from mixed-norm to Zygmund-type spaces2016-09-08Paper
Extended meet-in-the-middle attacks on some Feistel constructions2016-07-21Paper
Adaptive finite-time fault-tolerant consensus protocols for multiple mechanical systems2016-05-19Paper
The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function2016-04-13Paper
High-order sliding mode-based synchronous control of a novel stair-climbing wheelchair robot2016-02-29Paper
Identifying functional co‐activation patterns in neuroimaging studies via poisson graphical models2016-01-21Paper
Discrete second-order sliding mode adaptive controller based on characteristic model for servo systems2015-11-19Paper
Estimating heterogeneous graphical models for discrete data with an application to roll call voting2015-10-28Paper
Implementing Lightweight Block Ciphers on x86 Architectures2015-10-01Paper
CLOC: Authenticated Encryption for Short Input2015-09-18Paper
Equivalent Key Recovery Attacks Against HMAC and NMAC with Whirlpool Reduced to 7 Rounds2015-09-18Paper
Long-term passive distance-bounded relative motion in the presence of \(J_2\) perturbations2015-06-16Paper
https://portal.mardi4nfdi.de/entity/Q54979112015-02-11Paper
Meet-in-the-Middle Attacks on Generic Feistel Constructions2015-01-16Paper
An improved preimage attack against \texttt{HAVAL-3}2014-12-09Paper
Hybrid multicriteria group decision making method for information system project selection based on intuitionistic fuzzy theory2014-11-24Paper
Hybrid multiattribute group decision making based on intuitionistic fuzzy information and GRA method2014-11-11Paper
https://portal.mardi4nfdi.de/entity/Q29235422014-11-03Paper
Updates on Generic Attacks against HMAC and NMAC2014-08-07Paper
Analysis of BLAKE22014-03-28Paper
Cryptanalysis of HMAC/NMAC-Whirlpool2013-12-10Paper
Robust finite-time \(H_{\infty}\) control for impulsive switched nonlinear systems with state delay2013-06-11Paper
(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others2013-01-08Paper
Unaligned Rebound Attack: Application to Keccak2013-01-08Paper
https://portal.mardi4nfdi.de/entity/Q29170602012-10-05Paper
SPN-Hash: Improving the Provable Resistance against Differential Collision Attacks2012-07-23Paper
The LED Block Cipher2011-10-07Paper
The PHOTON Family of Lightweight Hash Functions2011-08-12Paper
https://portal.mardi4nfdi.de/entity/Q30147282011-07-19Paper
Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster)2011-07-07Paper
Joint estimation of multiple graphical models2011-04-19Paper
Deterministic Differential Properties of the Compression Function of BMW2011-03-15Paper
Exothermic process of cast-in-place pile foundation and its thermal agitation of the frozen ground under a long dry bridge on the Qinghai-Tibet railway2011-02-02Paper
Pairwise Variable Selection for High-Dimensional Model-Based Clustering2010-12-21Paper
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-22010-12-07Paper
Differential and Invertibility Properties of BLAKE2010-07-13Paper
Preimages for Step-Reduced SHA-22009-12-15Paper
Practical Pseudo-collisions for Hash Functions ARIRANG-224/3842009-12-09Paper
Cryptanalysis of the LAKE Hash Family2009-08-11Paper
Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits2009-01-09Paper
Cryptanalysis of LASH2008-09-18Paper
On the Improvement of the BDF Attack on LSBS-RSA2008-07-08Paper
Fractal modelling of off-road terrain oriented to vehicle virtual test2007-09-03Paper
https://portal.mardi4nfdi.de/entity/Q34380342007-05-10Paper
https://portal.mardi4nfdi.de/entity/Q34211072007-02-12Paper
https://portal.mardi4nfdi.de/entity/Q33750112006-03-01Paper
A two-stage algorithm of adaptive model-based parameter estimation and its application in the fast calculation of Green's function in multi-layer soils2006-01-16Paper
https://portal.mardi4nfdi.de/entity/Q57010372005-11-02Paper
https://portal.mardi4nfdi.de/entity/Q45433602002-11-19Paper
https://portal.mardi4nfdi.de/entity/Q27644112002-03-24Paper
https://portal.mardi4nfdi.de/entity/Q27494022001-10-21Paper
https://portal.mardi4nfdi.de/entity/Q49368522000-02-01Paper
https://portal.mardi4nfdi.de/entity/Q47104031992-06-25Paper
https://portal.mardi4nfdi.de/entity/Q33511581991-01-01Paper
https://portal.mardi4nfdi.de/entity/Q33528521990-01-01Paper
https://portal.mardi4nfdi.de/entity/Q38151441988-01-01Paper
https://portal.mardi4nfdi.de/entity/Q42037221988-01-01Paper
https://portal.mardi4nfdi.de/entity/Q37925001987-01-01Paper
https://portal.mardi4nfdi.de/entity/Q37667341986-01-01Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Jian Guo