Feng Bao

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Numerical Analysis for Convergence of a Sample-Wise Backpropagation Method for Training Stochastic Neural Networks
SIAM Journal on Numerical Analysis
2024-03-05Paper
Transferable neural networks for partial differential equations
Journal of Scientific Computing
2024-03-04Paper
Approximating minimum keys and optimal substructure screens
Lecture Notes in Computer Science
2024-01-29Paper
A Unified Filter Method for Jointly Estimating State and Parameters of Stochastic Dynamical Systems via the Ensemble Score Filter
 
2023-12-16Paper
Broadcasting in hypercubes with randomly distributed Byzantine faults
Distributed Algorithms
2023-12-01Paper
Splitting scheme for backward doubly stochastic differential equations
Advances in Computational Mathematics
2023-09-22Paper
A Sample-Wise Data Driven Control Solver for the Stochastic Optimal Control Problem with Unknown Model Parameters
Communications in Computational Physics
2023-07-06Paper
A stochastic maximum principle approach for reinforcement learning with parameterized environment
Journal of Computational Physics
2023-06-16Paper
A Score-based Nonlinear Filter for Data Assimilation
 
2023-06-15Paper
Parameter Estimation for the Truncated KdV Model through a Direct Filter Method
 
2023-01-18Paper
Convergence Analysis for Training Stochastic Neural Networks via Stochastic Gradient Descent
 
2022-12-17Paper
AN EFFICIENT MESH-FREE IMPLICIT FILTER FOR NONLINEAR FILTERING PROBLEMS
International Journal for Uncertainty Quantification
2022-11-24Paper
ADJOINT FORWARD BACKWARD STOCHASTIC DIFFERENTIAL EQUATIONS DRIVEN BY JUMP DIFFUSION PROCESSES AND ITS APPLICATION TO NONLINEAR FILTERING PROBLEMS
International Journal for Uncertainty Quantification
2022-11-24Paper
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles
Science China Information Sciences
2022-10-28Paper
A backward SDE method for uncertainty quantification in deep learning
Discrete and Continuous Dynamical Systems. Series S
2022-09-27Paper
Meshfree approximation for stochastic optimal control problems
Communications in Mathematical Research
2022-08-10Paper
Kernel learning backward SDE filter for data assimilation
Journal of Computational Physics
2022-05-05Paper
A drift homotopy implicit particle filter method for nonlinear filtering problems
Discrete and Continuous Dynamical Systems. Series S
2022-04-22Paper
Analytic continuation of noisy data using Adams Bashforth residual neural network
Discrete and Continuous Dynamical Systems. Series S
2022-04-22Paper
A PDE-based Adaptive Kernel Method for Solving Optimal Filtering Problems
 
2022-03-09Paper
Augmented oblivious polynomial evaluation protocol and its applications
Computer Security – ESORICS 2005
2022-03-09Paper
Private information retrieval using trusted hardware
Computer Security – ESORICS 2006
2022-03-09Paper
A Kernel Learning Method for Backward SDE Filter
 
2022-01-25Paper
Lévy backward SDE filter for jump diffusion processes and its applications in material sciences
Communications in Computational Physics
2021-11-01Paper
A backward doubly stochastic differential equation approach for nonlinear filtering problems
Communications in Computational Physics
2021-10-28Paper
Computational reconstruction of missing data in biological research
Springer Theses
2021-08-24Paper
Data informed solution estimation for forward-backward stochastic differential equations
Analysis and Applications
2021-06-23Paper
A Stochastic Gradient Descent Approach for Stochastic Optimal Control
East Asian Journal on Applied Mathematics
2021-04-27Paper
Forward backward doubly stochastic differential equations and the optimal filtering of diffusion processes
Communications in Mathematical Sciences
2021-03-25Paper
A direct filter method for parameter estimation
Journal of Computational Physics
2021-01-27Paper
Wake flow dynamic characteristics of triangular prisms
Fluid Dynamics
2020-05-18Paper
A Fully Computable A Posteriori Error Estimate for the Stokes Equations on Polytopal Meshes
SIAM Journal on Numerical Analysis
2019-03-22Paper
Deep and Structured Robust Information Theoretic Learning for Image Analysis
IEEE Transactions on Image Processing
2019-02-04Paper
Break finite automata public key cryptosystem
Automata, Languages and Programming
2019-01-10Paper
Improved distributed particle filters for tracking in a wireless sensor network
Computational Statistics and Data Analysis
2018-08-17Paper
A multi-scale cholera model linking between-host and within-host dynamics
International Journal of Biomathematics
2018-04-20Paper
Adaptive meshfree backward SDE filter
SIAM Journal on Scientific Computing
2017-12-06Paper
An implicit algorithm of solving nonlinear filtering problems
Communications in Computational Physics
2017-10-27Paper
Efficient particle filtering for stochastic Korteweg-de Vries equations
Stochastics and Dynamics
2017-03-27Paper
Hierarchical optimization for neutron scattering problems
Journal of Computational Physics
2016-12-05Paper
A first order scheme for backward doubly stochastic differential equations
SIAM/ASA Journal on Uncertainty Quantification
2016-07-22Paper
Average competitive ratios of on-line spanning trees
Information Processing Letters
2016-05-26Paper
A first order semi-discrete algorithm for backward doubly stochastic differential equations
Discrete and Continuous Dynamical Systems. Series B
2016-03-10Paper
A hybrid sparse-grid approach for nonlinear filtering problems based on adaptive-domain of the Zakai equation approximations
SIAM/ASA Journal on Uncertainty Quantification
2015-01-14Paper
NUMERICAL SOLUTIONS FOR FORWARD BACKWARD DOUBLY STOCHASTIC DIFFERENTIAL EQUATIONS AND ZAKAI EQUATIONS
International Journal for Uncertainty Quantification
2014-04-25Paper
Error-free, Multi-bit Non-committing Encryption with Constant Round Complexity
Information Security and Cryptology
2011-07-29Paper
Formal and precise analysis of soundness of several shuffling schemes
Provable Security
2010-10-12Paper
Batch range proof for practical small ranges
Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
2010-05-04Paper
Security Analysis of a Password Authenticated Key Exchange Protocol
Lecture Notes in Computer Science
2010-02-09Paper
Validating digital signatures without TTP's time-stamping and certificate revocation
Lecture Notes in Computer Science
2010-02-09Paper
Non-committing encryptions based on oblivious Naor-Pinkas cryptosystems
Progress in Cryptology - INDOCRYPT 2009
2009-12-17Paper
Self-enforcing private inference control
Provable Security
2009-12-11Paper
Multiuser private queries over encrypted databases
International Journal of Applied Cryptography
2009-10-12Paper
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security
Lecture Notes in Computer Science
2009-09-29Paper
Constructing Universally Composable Oblivious Transfers from Double Trap-Door Encryptions
Progress in Cryptology – AFRICACRYPT 2009
2009-07-07Paper
Batch ZK Proof and Verification of OR Logic
Information Security and Cryptology
2009-04-29Paper
Correction, Optimisation and Secure and Efficient Application of PBD Shuffling
Information Security and Cryptology
2009-04-29Paper
Parameter optimization-based batching TLS protocol
 
2009-03-06Paper
Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme
Information Security and Privacy
2009-03-06Paper
Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes
Information Security and Cryptology
2009-01-15Paper
An Efficient PIR Construction Using Trusted Hardware
Lecture Notes in Computer Science
2008-11-20Paper
Generic Constructions of Stateful Public Key Encryption and Their Applications
Applied Cryptography and Network Security
2008-06-13Paper
nPAKE + : A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords
Information and Communications Security
2008-03-25Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2008-02-19Paper
More on Stand-Alone and Setup-Free Verifiably Committed Signatures
Information Security and Privacy
2007-09-07Paper
Oblivious Scalar-Product Protocols
Information Security and Privacy
2007-09-07Paper
On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures
Public Key Cryptography – PKC 2007
2007-09-04Paper
Routing optimization security in mobile IPv6
Computer Networks
2007-03-15Paper
Topics in Cryptology – CT-RSA 2006
Lecture Notes in Computer Science
2007-02-12Paper
Access control protocols with two-layer architecture for wireless networks
Computer Networks
2007-01-09Paper
Information and Communications Security
Lecture Notes in Computer Science
2006-10-24Paper
Information and Communications Security
Lecture Notes in Computer Science
2006-10-24Paper
Information and Communications Security
Lecture Notes in Computer Science
2006-10-24Paper
Information and Communications Security
Lecture Notes in Computer Science
2006-10-24Paper
Information Security and Privacy
Lecture Notes in Computer Science
2006-06-22Paper
Cryptanalysis and improvement on batch verifying multiple RSA digital signatures
Applied Mathematics and Computation
2006-04-28Paper
scientific article; zbMATH DE number 2247709 (Why is no real title available?)
 
2006-01-16Paper
Automata, Languages and Programming
Lecture Notes in Computer Science
2006-01-10Paper
Information Security and Cryptology - ICISC 2003
Lecture Notes in Computer Science
2005-12-27Paper
Progress in Cryptology - INDOCRYPT 2004
Lecture Notes in Computer Science
2005-12-22Paper
Progress in Cryptology - INDOCRYPT 2004
Lecture Notes in Computer Science
2005-12-22Paper
Topics in Cryptology – CT-RSA 2005
Lecture Notes in Computer Science
2005-12-08Paper
Information Security and Privacy
Lecture Notes in Computer Science
2005-09-07Paper
Information Security and Privacy
Lecture Notes in Computer Science
2005-09-07Paper
scientific article; zbMATH DE number 2202215 (Why is no real title available?)
 
2005-09-05Paper
Information and Communications Security
Lecture Notes in Computer Science
2005-08-19Paper
Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes
 
2005-08-12Paper
Efficient and robust key management for large mobile ad hoc networks
Computer Networks
2005-08-03Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2005-06-13Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2005-06-13Paper
scientific article; zbMATH DE number 2127887 (Why is no real title available?)
 
2005-01-14Paper
Highly reliable trust establishment scheme in ad hoc networks
Computer Networks
2004-11-12Paper
scientific article; zbMATH DE number 2080692 (Why is no real title available?)
 
2004-08-04Paper
scientific article; zbMATH DE number 2043340 (Why is no real title available?)
 
2004-02-16Paper
scientific article; zbMATH DE number 1950339 (Why is no real title available?)
 
2003-07-17Paper
scientific article; zbMATH DE number 1950329 (Why is no real title available?)
 
2003-07-17Paper
scientific article; zbMATH DE number 1808261 (Why is no real title available?)
 
2002-09-26Paper
scientific article; zbMATH DE number 1776364 (Why is no real title available?)
 
2002-08-05Paper
scientific article; zbMATH DE number 1500496 (Why is no real title available?)
 
2002-07-28Paper
scientific article; zbMATH DE number 1618048 (Why is no real title available?)
 
2002-07-22Paper
scientific article; zbMATH DE number 1618046 (Why is no real title available?)
 
2002-07-16Paper
scientific article; zbMATH DE number 1302789 (Why is no real title available?)
 
2002-06-23Paper
scientific article; zbMATH DE number 1302790 (Why is no real title available?)
 
2002-04-21Paper
scientific article; zbMATH DE number 1424187 (Why is no real title available?)
 
2002-04-08Paper
scientific article; zbMATH DE number 1689863 (Why is no real title available?)
 
2002-01-14Paper
scientific article; zbMATH DE number 1942817 (Why is no real title available?)
 
2002-01-01Paper
scientific article; zbMATH DE number 1440048 (Why is no real title available?)
 
2001-08-21Paper
scientific article; zbMATH DE number 1612504 (Why is no real title available?)
 
2001-07-01Paper
scientific article; zbMATH DE number 1612518 (Why is no real title available?)
 
2001-07-01Paper
scientific article; zbMATH DE number 1555990 (Why is no real title available?)
 
2001-01-24Paper
scientific article; zbMATH DE number 1341862 (Why is no real title available?)
 
1999-11-29Paper
scientific article; zbMATH DE number 1322340 (Why is no real title available?)
 
1999-11-08Paper
scientific article; zbMATH DE number 683533 (Why is no real title available?)
 
1999-11-08Paper
scientific article; zbMATH DE number 1303976 (Why is no real title available?)
 
1999-11-02Paper
scientific article; zbMATH DE number 1304284 (Why is no real title available?)
 
1999-09-09Paper
Reliable broadcasting in product networks
Discrete Applied Mathematics
1998-07-28Paper
scientific article; zbMATH DE number 1186868 (Why is no real title available?)
 
1998-01-01Paper
scientific article; zbMATH DE number 1182512 (Why is no real title available?)
 
1997-01-01Paper
Increasing ranks of linear finite automata and complexity of FA public key cryptosystem
Science in China. Series A
1994-10-24Paper
Solving high dimensional FBSDE with deep signature techniques with application to nonlinear options pricing
 
N/APaper
Nonlinear ensemble filtering with diffusion models: Application to the surface quasi-geostrophic dynamics
 
N/APaper
An Online Algorithm for Solving Feedback Optimal Control Problems with Partial Observations
 
N/APaper


Research outcomes over time


This page was built for person: Feng Bao