Chi-Jen Lu

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Multiagent learning for competitive opinion optimization
Theoretical Computer Science
2024-10-07Paper
Budget-constrained cost-covering job assignment for a total contribution-maximizing platform
Lecture Notes in Computer Science
2023-12-22Paper
On the Algorithmic Power of Spiking Neural Networks
(available as arXiv preprint)
2022-07-18Paper
An alternating algorithm for finding linear Arrow-Debreu market equilibria
Theory of Computing Systems
2022-02-14Paper
How good is a two-party election game?
Theoretical Computer Science
2021-06-08Paper
The communication complexity of graphical games on grid graphs2020-06-18Paper
Bounds on the price of anarchy for a more general class of directed graphs in opinion formation games
Operations Research Letters
2019-01-15Paper
Deterministic Extractors for Independent-Symbol Sources
IEEE Transactions on Information Theory
2017-07-27Paper
Extracting Computational Entropy and Learning Noisy Linear Functions
IEEE Transactions on Information Theory
2017-07-12Paper
Online learning in Markov decision processes with continuous actions
Lecture Notes in Computer Science
2016-11-30Paper
Generalized mirror descents in congestion games
Artificial Intelligence
2016-11-01Paper
A communication-efficient private matching scheme in client-server model
Information Sciences
2016-07-11Paper
scientific article; zbMATH DE number 6297735 (Why is no real title available?)2014-05-22Paper
Making profit in a prediction market
Lecture Notes in Computer Science
2012-09-25Paper
Complexity of hard-core set proofs
Computational Complexity
2012-09-21Paper
Tree decomposition for large-scale SVM problems
Journal of Machine Learning Research (JMLR)
2012-07-13Paper
Making online decisions with bounded memory
Lecture Notes in Computer Science
2011-10-19Paper
Adaptive prototype learning algorithms: theoretical and experimental studies2011-10-12Paper
Computational Randomness from Generalized Hardcore Sets
Fundamentals of Computation Theory
2011-08-19Paper
ON THE HARDNESS AGAINST CONSTANT-DEPTH LINEAR-SIZE CIRCUITS
Discrete Mathematics, Algorithms and Applications
2011-03-25Paper
Efficient string-commitment from weak bit-commitment
Advances in Cryptology - ASIACRYPT 2010
2010-12-07Paper
Extractors
Proceedings of the thirty-fifth annual ACM symposium on Theory of computing
2010-08-16Paper
On the hardness against constant-depth linear-size circuits
Lecture Notes in Computer Science
2010-07-20Paper
Communication requirements for stable marriages
Lecture Notes in Computer Science
2010-05-28Paper
Extracting Computational Entropy and Learning Noisy Linear Functions
Lecture Notes in Computer Science
2009-07-23Paper
On the Security Loss in Cryptographic Reductions
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
Efficient algorithms for two generalized 2-median problems and the group median problem on trees
Theoretical Computer Science
2009-03-17Paper
Deterministic Extractors for Independent-Symbol Sources
Automata, Languages and Programming
2009-03-12Paper
On the Complexity of Hardness Amplification
IEEE Transactions on Information Theory
2009-02-24Paper
Extracting Randomness from Multiple Independent Sources
IEEE Transactions on Information Theory
2008-12-21Paper
Secure PRNGs from Specialized Polynomial Maps over Any $\mathbb{F}_{q}$
Post-Quantum Cryptography
2008-11-11Paper
Impossibility Results on Weakly Black-Box Hardness Amplification
Fundamentals of Computation Theory
2008-02-26Paper
Conditional Computational Entropy, or Toward Separating Pseudoentropy from Compressibility
Advances in Cryptology - EUROCRYPT 2007
2007-11-29Paper
On the Complexity of Hard-Core Set Constructions
Automata, Languages and Programming
2007-11-28Paper
Improved hardness amplification in NP
Theoretical Computer Science
2007-02-26Paper
Theory of Cryptography
Lecture Notes in Computer Science
2007-02-12Paper
The impossibility of basing one-way permutations on central cryptographic primitives
Journal of Cryptology
2006-08-14Paper
Oblivious polynomial evaluation and oblivious neural learning
Theoretical Computer Science
2005-09-22Paper
Deterministic Hypergraph Coloring and Its Applications
SIAM Journal on Discrete Mathematics
2005-02-28Paper
Encryption against storage-bounded adversaries from on-line strong extractors
Journal of Cryptology
2004-09-22Paper
scientific article; zbMATH DE number 2080255 (Why is no real title available?)2004-08-04Paper
scientific article; zbMATH DE number 2081038 (Why is no real title available?)2004-08-04Paper
scientific article; zbMATH DE number 2081076 (Why is no real title available?)2004-08-04Paper
On the Impossibilities of Basing One-Way Permutations on Central Cryptographic Primitives
Lecture Notes in Computer Science
2003-07-16Paper
scientific article; zbMATH DE number 1942425 (Why is no real title available?)2003-06-30Paper
Improved pseudorandom generators for combinatorial rectangles
Combinatorica
2003-05-18Paper
New algorithmic aspects of the local lemma with applications to routing and partitioning
SIAM Journal on Computing
2002-04-23Paper
A note on iterating an \(\alpha\)-ary Gray code
SIAM Journal on Discrete Mathematics
2001-06-21Paper
scientific article; zbMATH DE number 1305459 (Why is no real title available?)2000-02-14Paper
scientific article; zbMATH DE number 1301963 (Why is no real title available?)1999-06-16Paper
scientific article; zbMATH DE number 1222830 (Why is no real title available?)1999-03-30Paper


Research outcomes over time


This page was built for person: Chi-Jen Lu