| Publication | Date of Publication | Type |
|---|
Numerical Analysis for Convergence of a Sample-Wise Backpropagation Method for Training Stochastic Neural Networks SIAM Journal on Numerical Analysis | 2024-03-05 | Paper |
Transferable neural networks for partial differential equations Journal of Scientific Computing | 2024-03-04 | Paper |
Approximating minimum keys and optimal substructure screens Lecture Notes in Computer Science | 2024-01-29 | Paper |
A Unified Filter Method for Jointly Estimating State and Parameters of Stochastic Dynamical Systems via the Ensemble Score Filter | 2023-12-16 | Paper |
Broadcasting in hypercubes with randomly distributed Byzantine faults Distributed Algorithms | 2023-12-01 | Paper |
Splitting scheme for backward doubly stochastic differential equations Advances in Computational Mathematics | 2023-09-22 | Paper |
A Sample-Wise Data Driven Control Solver for the Stochastic Optimal Control Problem with Unknown Model Parameters Communications in Computational Physics | 2023-07-06 | Paper |
A stochastic maximum principle approach for reinforcement learning with parameterized environment Journal of Computational Physics | 2023-06-16 | Paper |
A Score-based Nonlinear Filter for Data Assimilation | 2023-06-15 | Paper |
Parameter Estimation for the Truncated KdV Model through a Direct Filter Method | 2023-01-18 | Paper |
Convergence Analysis for Training Stochastic Neural Networks via Stochastic Gradient Descent | 2022-12-17 | Paper |
AN EFFICIENT MESH-FREE IMPLICIT FILTER FOR NONLINEAR FILTERING PROBLEMS International Journal for Uncertainty Quantification | 2022-11-24 | Paper |
ADJOINT FORWARD BACKWARD STOCHASTIC DIFFERENTIAL EQUATIONS DRIVEN BY JUMP DIFFUSION PROCESSES AND ITS APPLICATION TO NONLINEAR FILTERING PROBLEMS International Journal for Uncertainty Quantification | 2022-11-24 | Paper |
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles Science China Information Sciences | 2022-10-28 | Paper |
A backward SDE method for uncertainty quantification in deep learning Discrete and Continuous Dynamical Systems. Series S | 2022-09-27 | Paper |
Meshfree approximation for stochastic optimal control problems Communications in Mathematical Research | 2022-08-10 | Paper |
Kernel learning backward SDE filter for data assimilation Journal of Computational Physics | 2022-05-05 | Paper |
A drift homotopy implicit particle filter method for nonlinear filtering problems Discrete and Continuous Dynamical Systems. Series S | 2022-04-22 | Paper |
Analytic continuation of noisy data using Adams Bashforth residual neural network Discrete and Continuous Dynamical Systems. Series S | 2022-04-22 | Paper |
A PDE-based Adaptive Kernel Method for Solving Optimal Filtering Problems | 2022-03-09 | Paper |
Augmented oblivious polynomial evaluation protocol and its applications Computer Security – ESORICS 2005 | 2022-03-09 | Paper |
Private information retrieval using trusted hardware Computer Security – ESORICS 2006 | 2022-03-09 | Paper |
A Kernel Learning Method for Backward SDE Filter | 2022-01-25 | Paper |
Lévy backward SDE filter for jump diffusion processes and its applications in material sciences Communications in Computational Physics | 2021-11-01 | Paper |
A backward doubly stochastic differential equation approach for nonlinear filtering problems Communications in Computational Physics | 2021-10-28 | Paper |
Computational reconstruction of missing data in biological research Springer Theses | 2021-08-24 | Paper |
Data informed solution estimation for forward-backward stochastic differential equations Analysis and Applications | 2021-06-23 | Paper |
A Stochastic Gradient Descent Approach for Stochastic Optimal Control East Asian Journal on Applied Mathematics | 2021-04-27 | Paper |
Forward backward doubly stochastic differential equations and the optimal filtering of diffusion processes Communications in Mathematical Sciences | 2021-03-25 | Paper |
A direct filter method for parameter estimation Journal of Computational Physics | 2021-01-27 | Paper |
Wake flow dynamic characteristics of triangular prisms Fluid Dynamics | 2020-05-18 | Paper |
A Fully Computable A Posteriori Error Estimate for the Stokes Equations on Polytopal Meshes SIAM Journal on Numerical Analysis | 2019-03-22 | Paper |
Deep and Structured Robust Information Theoretic Learning for Image Analysis IEEE Transactions on Image Processing | 2019-02-04 | Paper |
Break finite automata public key cryptosystem Automata, Languages and Programming | 2019-01-10 | Paper |
Improved distributed particle filters for tracking in a wireless sensor network Computational Statistics and Data Analysis | 2018-08-17 | Paper |
A multi-scale cholera model linking between-host and within-host dynamics International Journal of Biomathematics | 2018-04-20 | Paper |
Adaptive meshfree backward SDE filter SIAM Journal on Scientific Computing | 2017-12-06 | Paper |
An implicit algorithm of solving nonlinear filtering problems Communications in Computational Physics | 2017-10-27 | Paper |
Efficient particle filtering for stochastic Korteweg-de Vries equations Stochastics and Dynamics | 2017-03-27 | Paper |
Hierarchical optimization for neutron scattering problems Journal of Computational Physics | 2016-12-05 | Paper |
A first order scheme for backward doubly stochastic differential equations SIAM/ASA Journal on Uncertainty Quantification | 2016-07-22 | Paper |
Average competitive ratios of on-line spanning trees Information Processing Letters | 2016-05-26 | Paper |
A first order semi-discrete algorithm for backward doubly stochastic differential equations Discrete and Continuous Dynamical Systems. Series B | 2016-03-10 | Paper |
A hybrid sparse-grid approach for nonlinear filtering problems based on adaptive-domain of the Zakai equation approximations SIAM/ASA Journal on Uncertainty Quantification | 2015-01-14 | Paper |
NUMERICAL SOLUTIONS FOR FORWARD BACKWARD DOUBLY STOCHASTIC DIFFERENTIAL EQUATIONS AND ZAKAI EQUATIONS International Journal for Uncertainty Quantification | 2014-04-25 | Paper |
Error-free, Multi-bit Non-committing Encryption with Constant Round Complexity Information Security and Cryptology | 2011-07-29 | Paper |
Formal and precise analysis of soundness of several shuffling schemes Provable Security | 2010-10-12 | Paper |
Batch range proof for practical small ranges Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings | 2010-05-04 | Paper |
Security Analysis of a Password Authenticated Key Exchange Protocol Lecture Notes in Computer Science | 2010-02-09 | Paper |
Validating digital signatures without TTP's time-stamping and certificate revocation Lecture Notes in Computer Science | 2010-02-09 | Paper |
Non-committing encryptions based on oblivious Naor-Pinkas cryptosystems Progress in Cryptology - INDOCRYPT 2009 | 2009-12-17 | Paper |
Self-enforcing private inference control Provable Security | 2009-12-11 | Paper |
Multiuser private queries over encrypted databases International Journal of Applied Cryptography | 2009-10-12 | Paper |
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security Lecture Notes in Computer Science | 2009-09-29 | Paper |
Constructing Universally Composable Oblivious Transfers from Double Trap-Door Encryptions Progress in Cryptology – AFRICACRYPT 2009 | 2009-07-07 | Paper |
Batch ZK Proof and Verification of OR Logic Information Security and Cryptology | 2009-04-29 | Paper |
Correction, Optimisation and Secure and Efficient Application of PBD Shuffling Information Security and Cryptology | 2009-04-29 | Paper |
Parameter optimization-based batching TLS protocol | 2009-03-06 | Paper |
Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme Information Security and Privacy | 2009-03-06 | Paper |
Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes Information Security and Cryptology | 2009-01-15 | Paper |
An Efficient PIR Construction Using Trusted Hardware Lecture Notes in Computer Science | 2008-11-20 | Paper |
Generic Constructions of Stateful Public Key Encryption and Their Applications Applied Cryptography and Network Security | 2008-06-13 | Paper |
nPAKE + : A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords Information and Communications Security | 2008-03-25 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2008-02-19 | Paper |
More on Stand-Alone and Setup-Free Verifiably Committed Signatures Information Security and Privacy | 2007-09-07 | Paper |
Oblivious Scalar-Product Protocols Information Security and Privacy | 2007-09-07 | Paper |
On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures Public Key Cryptography – PKC 2007 | 2007-09-04 | Paper |
Routing optimization security in mobile IPv6 Computer Networks | 2007-03-15 | Paper |
Topics in Cryptology – CT-RSA 2006 Lecture Notes in Computer Science | 2007-02-12 | Paper |
Access control protocols with two-layer architecture for wireless networks Computer Networks | 2007-01-09 | Paper |
Information and Communications Security Lecture Notes in Computer Science | 2006-10-24 | Paper |
Information and Communications Security Lecture Notes in Computer Science | 2006-10-24 | Paper |
Information and Communications Security Lecture Notes in Computer Science | 2006-10-24 | Paper |
Information and Communications Security Lecture Notes in Computer Science | 2006-10-24 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2006-06-22 | Paper |
Cryptanalysis and improvement on batch verifying multiple RSA digital signatures Applied Mathematics and Computation | 2006-04-28 | Paper |
scientific article; zbMATH DE number 2247709 (Why is no real title available?) | 2006-01-16 | Paper |
Automata, Languages and Programming Lecture Notes in Computer Science | 2006-01-10 | Paper |
Information Security and Cryptology - ICISC 2003 Lecture Notes in Computer Science | 2005-12-27 | Paper |
Progress in Cryptology - INDOCRYPT 2004 Lecture Notes in Computer Science | 2005-12-22 | Paper |
Progress in Cryptology - INDOCRYPT 2004 Lecture Notes in Computer Science | 2005-12-22 | Paper |
Topics in Cryptology – CT-RSA 2005 Lecture Notes in Computer Science | 2005-12-08 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2005-09-07 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2005-09-07 | Paper |
scientific article; zbMATH DE number 2202215 (Why is no real title available?) | 2005-09-05 | Paper |
Information and Communications Security Lecture Notes in Computer Science | 2005-08-19 | Paper |
Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes | 2005-08-12 | Paper |
Efficient and robust key management for large mobile ad hoc networks Computer Networks | 2005-08-03 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2005-06-13 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2005-06-13 | Paper |
scientific article; zbMATH DE number 2127887 (Why is no real title available?) | 2005-01-14 | Paper |
Highly reliable trust establishment scheme in ad hoc networks Computer Networks | 2004-11-12 | Paper |
scientific article; zbMATH DE number 2080692 (Why is no real title available?) | 2004-08-04 | Paper |
scientific article; zbMATH DE number 2043340 (Why is no real title available?) | 2004-02-16 | Paper |
scientific article; zbMATH DE number 1950339 (Why is no real title available?) | 2003-07-17 | Paper |
scientific article; zbMATH DE number 1950329 (Why is no real title available?) | 2003-07-17 | Paper |
scientific article; zbMATH DE number 1808261 (Why is no real title available?) | 2002-09-26 | Paper |
scientific article; zbMATH DE number 1776364 (Why is no real title available?) | 2002-08-05 | Paper |
scientific article; zbMATH DE number 1500496 (Why is no real title available?) | 2002-07-28 | Paper |
scientific article; zbMATH DE number 1618048 (Why is no real title available?) | 2002-07-22 | Paper |
scientific article; zbMATH DE number 1618046 (Why is no real title available?) | 2002-07-16 | Paper |
scientific article; zbMATH DE number 1302789 (Why is no real title available?) | 2002-06-23 | Paper |
scientific article; zbMATH DE number 1302790 (Why is no real title available?) | 2002-04-21 | Paper |
scientific article; zbMATH DE number 1424187 (Why is no real title available?) | 2002-04-08 | Paper |
scientific article; zbMATH DE number 1689863 (Why is no real title available?) | 2002-01-14 | Paper |
scientific article; zbMATH DE number 1942817 (Why is no real title available?) | 2002-01-01 | Paper |
scientific article; zbMATH DE number 1440048 (Why is no real title available?) | 2001-08-21 | Paper |
scientific article; zbMATH DE number 1612504 (Why is no real title available?) | 2001-07-01 | Paper |
scientific article; zbMATH DE number 1612518 (Why is no real title available?) | 2001-07-01 | Paper |
scientific article; zbMATH DE number 1555990 (Why is no real title available?) | 2001-01-24 | Paper |
scientific article; zbMATH DE number 1341862 (Why is no real title available?) | 1999-11-29 | Paper |
scientific article; zbMATH DE number 1322340 (Why is no real title available?) | 1999-11-08 | Paper |
scientific article; zbMATH DE number 683533 (Why is no real title available?) | 1999-11-08 | Paper |
scientific article; zbMATH DE number 1303976 (Why is no real title available?) | 1999-11-02 | Paper |
scientific article; zbMATH DE number 1304284 (Why is no real title available?) | 1999-09-09 | Paper |
Reliable broadcasting in product networks Discrete Applied Mathematics | 1998-07-28 | Paper |
scientific article; zbMATH DE number 1186868 (Why is no real title available?) | 1998-01-01 | Paper |
scientific article; zbMATH DE number 1182512 (Why is no real title available?) | 1997-01-01 | Paper |
Increasing ranks of linear finite automata and complexity of FA public key cryptosystem Science in China. Series A | 1994-10-24 | Paper |
Solving high dimensional FBSDE with deep signature techniques with application to nonlinear options pricing | N/A | Paper |
Nonlinear ensemble filtering with diffusion models: Application to the surface quasi-geostrophic dynamics | N/A | Paper |
An Online Algorithm for Solving Feedback Optimal Control Problems with Partial Observations | N/A | Paper |