| Publication | Date of Publication | Type |
|---|
| Scrutinizing the security of AES-based hashing and one-way functions | 2026-03-31 | Paper |
Distributed estimation with quantized measurements and communication over Markovian switching topologies Automatica | 2025-12-15 | Paper |
| Efficient mixed garbling from homomorphic secret sharing and GGM-tree | 2025-12-02 | Paper |
| Hard-label cryptanalytic extraction of neural network models | 2025-07-03 | Paper |
Distributed output feedback indirect MRAC of continuous-time multiagent linear systems SIAM Journal on Control and Optimization | 2025-06-05 | Paper |
| Diving deep into the preimage security of AES-like hashing | 2024-11-12 | Paper |
Exploring SAT for cryptanalysis: (quantum) collision attacks against 6-round SHA-3 Advances in Cryptology – ASIACRYPT 2022 | 2023-08-25 | Paper |
Key structures: improved related-key boomerang attack against the full AES-256 Information Security and Privacy | 2023-07-26 | Paper |
Superposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashing Advances in Cryptology – CRYPTO 2022 | 2023-06-12 | Paper |
Triangulating rebound attack on AES-like hashing Advances in Cryptology – CRYPTO 2022 | 2023-06-12 | Paper |
| Towards closing the security gap of Tweak-aNd-Tweak (TNT) | 2023-03-21 | Paper |
Sliding mode control for networked control systems under DoS attacks via an event-triggered scheme Journal of the Franklin Institute | 2023-03-07 | Paper |
Consensus tracking control for nonlinear multiagent systems with asymmetric state constraints and input delays Journal of the Franklin Institute | 2022-11-09 | Paper |
Neural network-based adaptive finite-time tracking control of switched nonlinear systems with time-varying delay Applied Mathematics and Computation | 2022-06-03 | Paper |
| TNT: how to tweak a block cipher | 2022-03-23 | Paper |
Dynamic event-triggered control design for a class of \(p\)-normal nonlinear time-delay systems with actuator failures Applied Mathematics and Computation | 2022-03-04 | Paper |
New Constructions of Complete Permutations IEEE Transactions on Information Theory | 2022-02-17 | Paper |
Disturbance-observer-based sampled-data adaptive output feedback control for a class of uncertain nonlinear systems International Journal of Systems Science. Principles and Applications of Systems and Integration | 2022-02-08 | Paper |
Stabilisation for positive switched T-S fuzzy delayed systems under standard \(L_1\) and \(L_\infty\) performance International Journal of Systems Science. Principles and Applications of Systems and Integration | 2022-02-04 | Paper |
| Automatic search of meet-in-the-middle preimage attacks on AES-like hashing | 2021-12-08 | Paper |
Distributed set-membership filtering for time-varying systems: a coding-decoding-based approach Automatica | 2021-11-18 | Paper |
M-estimation based sparse grid quadrature filter and stochastic stability analysis Journal of the Franklin Institute | 2021-10-21 | Paper |
Global adaptive finite-time stabilization for a class of \(p\)-normal nonlinear systems via an event-triggered strategy International Journal of Robust and Nonlinear Control | 2021-05-31 | Paper |
Prediction of membrane protein types from sequences and position-specific scoring matrices Journal of Theoretical Biology | 2021-01-21 | Paper |
Simultaneous variable selection and class fusion for high-dimensional linear discriminant analysis Biostatistics | 2020-08-04 | Paper |
Generic attacks on hash combiners Journal of Cryptology | 2020-06-15 | Paper |
Practical collision attacks against round-reduced SHA-3 Journal of Cryptology | 2020-03-03 | Paper |
Consensus control of networked multi-agent systems based on a novel hybrid transmission strategy IMA Journal of Mathematical Control and Information | 2019-07-02 | Paper |
In vivo intravascular ultrasound-based 3D thin-walled model for human coronary plaque progression study: transforming research to potential commercialization International Journal of Computational Methods | 2019-03-27 | Paper |
Sampled-data leader-following consensus of second-order nonlinear multiagent systems without velocity measurements International Journal of Robust and Nonlinear Control | 2019-02-28 | Paper |
Displacement and stress analysis of thin plate for cement concrete pavement Mathematical Problems in Engineering | 2019-02-08 | Paper |
| New MILP modeling: improved conditional cube attacks on KECCAK-based constructions | 2019-01-23 | Paper |
Global sampled-data output feedback stabilization for a class of stochastic nonlinear systems with time-varying delay Journal of the Franklin Institute | 2019-01-15 | Paper |
Adaptive practical stabilization of a class of uncertain nonlinear systems via sampled-data control Nonlinear Dynamics | 2018-10-23 | Paper |
| Fuzzy adaptive unscented Kalman filter integrated navigation algorithm using Chi-square test | 2018-10-22 | Paper |
| User similarity-aware content sharing mechanism in mobile social networks | 2018-10-22 | Paper |
Optimal formation control and collision avoidance in environment with multiple rectangle obstacles Journal of the Franklin Institute | 2018-10-18 | Paper |
Robust adaptive attitude control for flexible spacecraft in the presence of SGCMG friction nonlinearity International Journal of Robust and Nonlinear Control | 2018-08-31 | Paper |
| Desired compensation adaptive robust control for control moment gyroscopes gimbal servo system | 2018-07-18 | Paper |
Sampled-data control of a class of uncertain switched nonlinear systems in nonstrict-feedback form International Journal of Robust and Nonlinear Control | 2018-05-31 | Paper |
Class-specific variable selection for multicategory support vector machines Statistics and Its Interface | 2018-03-15 | Paper |
| Functional graph revisited: updates on (second) preimage attacks on hash combiners | 2017-11-15 | Paper |
| Non-full Sbox linearization: applications to collision attacks on round-reduced \textsc{keccak} | 2017-11-15 | Paper |
New collision attacks on round-reduced Keccak Lecture Notes in Computer Science | 2017-06-23 | Paper |
A risk assessment approach for failure mode and effects analysis based on intuitionistic fuzzy sets and evidence theory Journal of Intelligent & Fuzzy Systems | 2017-05-19 | Paper |
Adaptive finite-time control for a class of switched nonlinear systems using multiple Lyapunov functions International Journal of Systems Science. Principles and Applications of Systems and Integration | 2017-04-18 | Paper |
How to build fully secure tweakable blockciphers from classical blockciphers Advances in Cryptology – ASIACRYPT 2016 | 2017-02-01 | Paper |
Linear structures: applications to cryptanalysis of round-reduced \textsc{Keccak} Advances in Cryptology – ASIACRYPT 2016 | 2017-02-01 | Paper |
| Parameter sensitivity analysis for nonlinear terminal guidance system | 2017-01-06 | Paper |
New insights on AES-like SPN ciphers Advances in Cryptology – CRYPTO 2016 | 2016-11-30 | Paper |
Provable security evaluation of structures against impossible differential and zero correlation linear cryptanalysis Advances in Cryptology – EUROCRYPT 2016 | 2016-09-09 | Paper |
Extended meet-in-the-middle attacks on some Feistel constructions Designs, Codes and Cryptography | 2016-07-21 | Paper |
The usage of counter revisited: second-preimage attack on new Russian standardized hash function Selected Areas in Cryptography -- SAC 2014 | 2016-04-13 | Paper |
Identifying functional co-activation patterns in neuroimaging studies via Poisson graphical models Biometrics | 2016-01-21 | Paper |
Discrete second-order sliding mode adaptive controller based on characteristic model for servo systems Journal of Control Science and Engineering | 2015-11-19 | Paper |
Estimating heterogeneous graphical models for discrete data with an application to roll call voting The Annals of Applied Statistics | 2015-10-28 | Paper |
Estimating heterogeneous graphical models for discrete data with an application to roll call voting The Annals of Applied Statistics | 2015-10-28 | Paper |
Implementing lightweight block ciphers on \texttt{x86} architectures Selected Areas in Cryptography -- SAC 2013 | 2015-10-01 | Paper |
CLOC: authenticated encryption for short input Fast Software Encryption | 2015-09-18 | Paper |
Equivalent key recovery attacks against HMAC and NMAC with whirlpool reduced to 7 rounds Fast Software Encryption | 2015-09-18 | Paper |
Long-term passive distance-bounded relative motion in the presence of \(J_2\) perturbations Celestial Mechanics and Dynamical Astronomy | 2015-06-16 | Paper |
| Riemann-Stieltjes operators from Hardy spaces to Zygmund-type spaces | 2015-02-11 | Paper |
Meet-in-the-middle attacks on generic Feistel constructions Lecture Notes in Computer Science | 2015-01-16 | Paper |
An improved preimage attack against \texttt{HAVAL-3} Information Processing Letters | 2014-12-09 | Paper |
Hybrid multicriteria group decision making method for information system project selection based on intuitionistic fuzzy theory Mathematical Problems in Engineering | 2014-11-24 | Paper |
Updates on generic attacks against HMAC and NMAC Advances in Cryptology – CRYPTO 2014 | 2014-08-07 | Paper |
Analysis of BLAKE2 Topics in Cryptology – CT-RSA 2014 | 2014-03-28 | Paper |
Cryptanalysis of HMAC/NMAC-Whirlpool Advances in Cryptology - ASIACRYPT 2013 | 2013-12-10 | Paper |
Robust finite-time \(H_{\infty}\) control for impulsive switched nonlinear systems with state delay Mathematical Problems in Engineering | 2013-06-11 | Paper |
Unaligned rebound attack: application to Keccak Fast Software Encryption | 2013-01-08 | Paper |
(Pseudo) preimage attack on round-reduced Grøstl hash function and others Fast Software Encryption | 2013-01-08 | Paper |
SPN-Hash: Improving the Provable Resistance against Differential Collision Attacks Progress in Cryptology - AFRICACRYPT 2012 | 2012-07-23 | Paper |
The LED block cipher Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings | 2011-10-07 | Paper |
The PHOTON family of lightweight hash functions Advances in Cryptology – CRYPTO 2011 | 2011-08-12 | Paper |
| Composition operators from \(B^0\) to \(Q_K\) and \(Q_{K,0}\) spaces | 2011-07-19 | Paper |
Improved meet-in-the-middle cryptanalysis of KTANTAN (poster) Information Security and Privacy | 2011-07-07 | Paper |
Joint estimation of multiple graphical models Biometrika | 2011-04-19 | Paper |
Deterministic differential properties of the compression function of BMW Selected Areas in Cryptography | 2011-03-15 | Paper |
Exothermic process of cast-in-place pile foundation and its thermal agitation of the frozen ground under a long dry bridge on the Qinghai-Tibet railway Journal of Zhejiang University. Science A | 2011-02-02 | Paper |
Pairwise Variable Selection for High-Dimensional Model-Based Clustering Biometrics | 2010-12-21 | Paper |
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2 Advances in Cryptology - ASIACRYPT 2010 | 2010-12-07 | Paper |
Differential and invertibility properties of BLAKE Fast Software Encryption | 2010-07-13 | Paper |
Preimages for step-reduced SHA-2 Advances in Cryptology – ASIACRYPT 2009 | 2009-12-15 | Paper |
Practical Pseudo-collisions for Hash Functions ARIRANG-224/384 Selected Areas in Cryptography | 2009-12-09 | Paper |
Cryptanalysis of the LAKE Hash Family Fast Software Encryption | 2009-08-11 | Paper |
Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits Cryptology and Network Security | 2009-01-09 | Paper |
Cryptanalysis of LASH Fast Software Encryption | 2008-09-18 | Paper |
On the Improvement of the BDF Attack on LSBS-RSA Information Security and Privacy | 2008-07-08 | Paper |
Fractal modelling of off-road terrain oriented to vehicle virtual test Journal of Zhejiang University. Science A | 2007-09-03 | Paper |
| scientific article; zbMATH DE number 5151501 (Why is no real title available?) | 2007-05-10 | Paper |
| Composition operators from spaces \({\mathcal B}^\alpha\) to \(B^0\) and \({\mathcal D}\) | 2007-02-12 | Paper |
| scientific article; zbMATH DE number 5009285 (Why is no real title available?) | 2006-03-01 | Paper |
A two-stage algorithm of adaptive model-based parameter estimation and its application in the fast calculation of Green's function in multi-layer soils Progress in Natural Science | 2006-01-16 | Paper |
| scientific article; zbMATH DE number 2222270 (Why is no real title available?) | 2005-11-02 | Paper |
| scientific article; zbMATH DE number 1780108 (Why is no real title available?) | 2002-11-19 | Paper |
| scientific article; zbMATH DE number 1397259 (Why is no real title available?) | 2000-02-01 | Paper |
| scientific article; zbMATH DE number 3452 (Why is no real title available?) | 1992-06-25 | Paper |
| scientific article; zbMATH DE number 4202041 (Why is no real title available?) | 1991-01-01 | Paper |
| scientific article; zbMATH DE number 4204126 (Why is no real title available?) | 1990-01-01 | Paper |
| scientific article; zbMATH DE number 4085434 (Why is no real title available?) | 1988-01-01 | Paper |
| scientific article; zbMATH DE number 4123184 (Why is no real title available?) | 1988-01-01 | Paper |
| scientific article; zbMATH DE number 4057306 (Why is no real title available?) | 1987-01-01 | Paper |
| scientific article; zbMATH DE number 4024659 (Why is no real title available?) | 1986-01-01 | Paper |