Jian Guo

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Scrutinizing the security of AES-based hashing and one-way functions2026-03-31Paper
Distributed estimation with quantized measurements and communication over Markovian switching topologies
Automatica
2025-12-15Paper
Efficient mixed garbling from homomorphic secret sharing and GGM-tree2025-12-02Paper
Hard-label cryptanalytic extraction of neural network models2025-07-03Paper
Distributed output feedback indirect MRAC of continuous-time multiagent linear systems
SIAM Journal on Control and Optimization
2025-06-05Paper
Diving deep into the preimage security of AES-like hashing2024-11-12Paper
Exploring SAT for cryptanalysis: (quantum) collision attacks against 6-round SHA-3
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
Key structures: improved related-key boomerang attack against the full AES-256
Information Security and Privacy
2023-07-26Paper
Superposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashing
Advances in Cryptology – CRYPTO 2022
2023-06-12Paper
Triangulating rebound attack on AES-like hashing
Advances in Cryptology – CRYPTO 2022
2023-06-12Paper
Towards closing the security gap of Tweak-aNd-Tweak (TNT)2023-03-21Paper
Sliding mode control for networked control systems under DoS attacks via an event-triggered scheme
Journal of the Franklin Institute
2023-03-07Paper
Consensus tracking control for nonlinear multiagent systems with asymmetric state constraints and input delays
Journal of the Franklin Institute
2022-11-09Paper
Neural network-based adaptive finite-time tracking control of switched nonlinear systems with time-varying delay
Applied Mathematics and Computation
2022-06-03Paper
TNT: how to tweak a block cipher2022-03-23Paper
Dynamic event-triggered control design for a class of \(p\)-normal nonlinear time-delay systems with actuator failures
Applied Mathematics and Computation
2022-03-04Paper
New Constructions of Complete Permutations
IEEE Transactions on Information Theory
2022-02-17Paper
Disturbance-observer-based sampled-data adaptive output feedback control for a class of uncertain nonlinear systems
International Journal of Systems Science. Principles and Applications of Systems and Integration
2022-02-08Paper
Stabilisation for positive switched T-S fuzzy delayed systems under standard \(L_1\) and \(L_\infty\) performance
International Journal of Systems Science. Principles and Applications of Systems and Integration
2022-02-04Paper
Automatic search of meet-in-the-middle preimage attacks on AES-like hashing2021-12-08Paper
Distributed set-membership filtering for time-varying systems: a coding-decoding-based approach
Automatica
2021-11-18Paper
M-estimation based sparse grid quadrature filter and stochastic stability analysis
Journal of the Franklin Institute
2021-10-21Paper
Global adaptive finite-time stabilization for a class of \(p\)-normal nonlinear systems via an event-triggered strategy
International Journal of Robust and Nonlinear Control
2021-05-31Paper
Prediction of membrane protein types from sequences and position-specific scoring matrices
Journal of Theoretical Biology
2021-01-21Paper
Simultaneous variable selection and class fusion for high-dimensional linear discriminant analysis
Biostatistics
2020-08-04Paper
Generic attacks on hash combiners
Journal of Cryptology
2020-06-15Paper
Practical collision attacks against round-reduced SHA-3
Journal of Cryptology
2020-03-03Paper
Consensus control of networked multi-agent systems based on a novel hybrid transmission strategy
IMA Journal of Mathematical Control and Information
2019-07-02Paper
In vivo intravascular ultrasound-based 3D thin-walled model for human coronary plaque progression study: transforming research to potential commercialization
International Journal of Computational Methods
2019-03-27Paper
Sampled-data leader-following consensus of second-order nonlinear multiagent systems without velocity measurements
International Journal of Robust and Nonlinear Control
2019-02-28Paper
Displacement and stress analysis of thin plate for cement concrete pavement
Mathematical Problems in Engineering
2019-02-08Paper
New MILP modeling: improved conditional cube attacks on KECCAK-based constructions2019-01-23Paper
Global sampled-data output feedback stabilization for a class of stochastic nonlinear systems with time-varying delay
Journal of the Franklin Institute
2019-01-15Paper
Adaptive practical stabilization of a class of uncertain nonlinear systems via sampled-data control
Nonlinear Dynamics
2018-10-23Paper
Fuzzy adaptive unscented Kalman filter integrated navigation algorithm using Chi-square test2018-10-22Paper
User similarity-aware content sharing mechanism in mobile social networks2018-10-22Paper
Optimal formation control and collision avoidance in environment with multiple rectangle obstacles
Journal of the Franklin Institute
2018-10-18Paper
Robust adaptive attitude control for flexible spacecraft in the presence of SGCMG friction nonlinearity
International Journal of Robust and Nonlinear Control
2018-08-31Paper
Desired compensation adaptive robust control for control moment gyroscopes gimbal servo system2018-07-18Paper
Sampled-data control of a class of uncertain switched nonlinear systems in nonstrict-feedback form
International Journal of Robust and Nonlinear Control
2018-05-31Paper
Class-specific variable selection for multicategory support vector machines
Statistics and Its Interface
2018-03-15Paper
Functional graph revisited: updates on (second) preimage attacks on hash combiners2017-11-15Paper
Non-full Sbox linearization: applications to collision attacks on round-reduced \textsc{keccak}2017-11-15Paper
New collision attacks on round-reduced Keccak
Lecture Notes in Computer Science
2017-06-23Paper
A risk assessment approach for failure mode and effects analysis based on intuitionistic fuzzy sets and evidence theory
Journal of Intelligent & Fuzzy Systems
2017-05-19Paper
Adaptive finite-time control for a class of switched nonlinear systems using multiple Lyapunov functions
International Journal of Systems Science. Principles and Applications of Systems and Integration
2017-04-18Paper
How to build fully secure tweakable blockciphers from classical blockciphers
Advances in Cryptology – ASIACRYPT 2016
2017-02-01Paper
Linear structures: applications to cryptanalysis of round-reduced \textsc{Keccak}
Advances in Cryptology – ASIACRYPT 2016
2017-02-01Paper
Parameter sensitivity analysis for nonlinear terminal guidance system2017-01-06Paper
New insights on AES-like SPN ciphers
Advances in Cryptology – CRYPTO 2016
2016-11-30Paper
Provable security evaluation of structures against impossible differential and zero correlation linear cryptanalysis
Advances in Cryptology – EUROCRYPT 2016
2016-09-09Paper
Extended meet-in-the-middle attacks on some Feistel constructions
Designs, Codes and Cryptography
2016-07-21Paper
The usage of counter revisited: second-preimage attack on new Russian standardized hash function
Selected Areas in Cryptography -- SAC 2014
2016-04-13Paper
Identifying functional co-activation patterns in neuroimaging studies via Poisson graphical models
Biometrics
2016-01-21Paper
Discrete second-order sliding mode adaptive controller based on characteristic model for servo systems
Journal of Control Science and Engineering
2015-11-19Paper
Estimating heterogeneous graphical models for discrete data with an application to roll call voting
The Annals of Applied Statistics
2015-10-28Paper
Estimating heterogeneous graphical models for discrete data with an application to roll call voting
The Annals of Applied Statistics
2015-10-28Paper
Implementing lightweight block ciphers on \texttt{x86} architectures
Selected Areas in Cryptography -- SAC 2013
2015-10-01Paper
CLOC: authenticated encryption for short input
Fast Software Encryption
2015-09-18Paper
Equivalent key recovery attacks against HMAC and NMAC with whirlpool reduced to 7 rounds
Fast Software Encryption
2015-09-18Paper
Long-term passive distance-bounded relative motion in the presence of \(J_2\) perturbations
Celestial Mechanics and Dynamical Astronomy
2015-06-16Paper
Riemann-Stieltjes operators from Hardy spaces to Zygmund-type spaces2015-02-11Paper
Meet-in-the-middle attacks on generic Feistel constructions
Lecture Notes in Computer Science
2015-01-16Paper
An improved preimage attack against \texttt{HAVAL-3}
Information Processing Letters
2014-12-09Paper
Hybrid multicriteria group decision making method for information system project selection based on intuitionistic fuzzy theory
Mathematical Problems in Engineering
2014-11-24Paper
Updates on generic attacks against HMAC and NMAC
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Analysis of BLAKE2
Topics in Cryptology – CT-RSA 2014
2014-03-28Paper
Cryptanalysis of HMAC/NMAC-Whirlpool
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
Robust finite-time \(H_{\infty}\) control for impulsive switched nonlinear systems with state delay
Mathematical Problems in Engineering
2013-06-11Paper
Unaligned rebound attack: application to Keccak
Fast Software Encryption
2013-01-08Paper
(Pseudo) preimage attack on round-reduced Grøstl hash function and others
Fast Software Encryption
2013-01-08Paper
SPN-Hash: Improving the Provable Resistance against Differential Collision Attacks
Progress in Cryptology - AFRICACRYPT 2012
2012-07-23Paper
The LED block cipher
Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings
2011-10-07Paper
The PHOTON family of lightweight hash functions
Advances in Cryptology – CRYPTO 2011
2011-08-12Paper
Composition operators from \(B^0\) to \(Q_K\) and \(Q_{K,0}\) spaces2011-07-19Paper
Improved meet-in-the-middle cryptanalysis of KTANTAN (poster)
Information Security and Privacy
2011-07-07Paper
Joint estimation of multiple graphical models
Biometrika
2011-04-19Paper
Deterministic differential properties of the compression function of BMW
Selected Areas in Cryptography
2011-03-15Paper
Exothermic process of cast-in-place pile foundation and its thermal agitation of the frozen ground under a long dry bridge on the Qinghai-Tibet railway
Journal of Zhejiang University. Science A
2011-02-02Paper
Pairwise Variable Selection for High-Dimensional Model-Based Clustering
Biometrics
2010-12-21Paper
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
Advances in Cryptology - ASIACRYPT 2010
2010-12-07Paper
Differential and invertibility properties of BLAKE
Fast Software Encryption
2010-07-13Paper
Preimages for step-reduced SHA-2
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
Practical Pseudo-collisions for Hash Functions ARIRANG-224/384
Selected Areas in Cryptography
2009-12-09Paper
Cryptanalysis of the LAKE Hash Family
Fast Software Encryption
2009-08-11Paper
Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits
Cryptology and Network Security
2009-01-09Paper
Cryptanalysis of LASH
Fast Software Encryption
2008-09-18Paper
On the Improvement of the BDF Attack on LSBS-RSA
Information Security and Privacy
2008-07-08Paper
Fractal modelling of off-road terrain oriented to vehicle virtual test
Journal of Zhejiang University. Science A
2007-09-03Paper
scientific article; zbMATH DE number 5151501 (Why is no real title available?)2007-05-10Paper
Composition operators from spaces \({\mathcal B}^\alpha\) to \(B^0\) and \({\mathcal D}\)2007-02-12Paper
scientific article; zbMATH DE number 5009285 (Why is no real title available?)2006-03-01Paper
A two-stage algorithm of adaptive model-based parameter estimation and its application in the fast calculation of Green's function in multi-layer soils
Progress in Natural Science
2006-01-16Paper
scientific article; zbMATH DE number 2222270 (Why is no real title available?)2005-11-02Paper
scientific article; zbMATH DE number 1780108 (Why is no real title available?)2002-11-19Paper
scientific article; zbMATH DE number 1397259 (Why is no real title available?)2000-02-01Paper
scientific article; zbMATH DE number 3452 (Why is no real title available?)1992-06-25Paper
scientific article; zbMATH DE number 4202041 (Why is no real title available?)1991-01-01Paper
scientific article; zbMATH DE number 4204126 (Why is no real title available?)1990-01-01Paper
scientific article; zbMATH DE number 4085434 (Why is no real title available?)1988-01-01Paper
scientific article; zbMATH DE number 4123184 (Why is no real title available?)1988-01-01Paper
scientific article; zbMATH DE number 4057306 (Why is no real title available?)1987-01-01Paper
scientific article; zbMATH DE number 4024659 (Why is no real title available?)1986-01-01Paper


Research outcomes over time


This page was built for person: Jian Guo