Feng Bao

From MaRDI portal
(Redirected from Person:256812)


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Numerical Analysis for Convergence of a Sample-Wise Backpropagation Method for Training Stochastic Neural Networks
SIAM Journal on Numerical Analysis
2024-03-05Paper
Transferable neural networks for partial differential equations
Journal of Scientific Computing
2024-03-04Paper
Approximating minimum keys and optimal substructure screens
Lecture Notes in Computer Science
2024-01-29Paper
A Unified Filter Method for Jointly Estimating State and Parameters of Stochastic Dynamical Systems via the Ensemble Score Filter
 
2023-12-16Paper
Broadcasting in hypercubes with randomly distributed Byzantine faults
Distributed Algorithms
2023-12-01Paper
Splitting scheme for backward doubly stochastic differential equations
Advances in Computational Mathematics
2023-09-22Paper
A Sample-Wise Data Driven Control Solver for the Stochastic Optimal Control Problem with Unknown Model Parameters
Communications in Computational Physics
2023-07-06Paper
A stochastic maximum principle approach for reinforcement learning with parameterized environment
Journal of Computational Physics
2023-06-16Paper
A Score-based Nonlinear Filter for Data Assimilation
 
2023-06-15Paper
Parameter Estimation for the Truncated KdV Model through a Direct Filter Method
 
2023-01-18Paper
Convergence Analysis for Training Stochastic Neural Networks via Stochastic Gradient Descent
 
2022-12-17Paper
AN EFFICIENT MESH-FREE IMPLICIT FILTER FOR NONLINEAR FILTERING PROBLEMS
International Journal for Uncertainty Quantification
2022-11-24Paper
ADJOINT FORWARD BACKWARD STOCHASTIC DIFFERENTIAL EQUATIONS DRIVEN BY JUMP DIFFUSION PROCESSES AND ITS APPLICATION TO NONLINEAR FILTERING PROBLEMS
International Journal for Uncertainty Quantification
2022-11-24Paper
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles
Science China Information Sciences
2022-10-28Paper
A backward SDE method for uncertainty quantification in deep learning
Discrete and Continuous Dynamical Systems. Series S
2022-09-27Paper
Meshfree approximation for stochastic optimal control problems
Communications in Mathematical Research
2022-08-10Paper
Kernel learning backward SDE filter for data assimilation
Journal of Computational Physics
2022-05-05Paper
A drift homotopy implicit particle filter method for nonlinear filtering problems
Discrete and Continuous Dynamical Systems. Series S
2022-04-22Paper
Analytic continuation of noisy data using Adams Bashforth residual neural network
Discrete and Continuous Dynamical Systems. Series S
2022-04-22Paper
A PDE-based Adaptive Kernel Method for Solving Optimal Filtering Problems
 
2022-03-09Paper
Augmented oblivious polynomial evaluation protocol and its applications
Computer Security – ESORICS 2005
2022-03-09Paper
Private information retrieval using trusted hardware
Computer Security – ESORICS 2006
2022-03-09Paper
A Kernel Learning Method for Backward SDE Filter
 
2022-01-25Paper
Lévy backward SDE filter for jump diffusion processes and its applications in material sciences
Communications in Computational Physics
2021-11-01Paper
A backward doubly stochastic differential equation approach for nonlinear filtering problems
Communications in Computational Physics
2021-10-28Paper
Computational reconstruction of missing data in biological research
Springer Theses
2021-08-24Paper
Data informed solution estimation for forward-backward stochastic differential equations
Analysis and Applications
2021-06-23Paper
A Stochastic Gradient Descent Approach for Stochastic Optimal Control
East Asian Journal on Applied Mathematics
2021-04-27Paper
Forward backward doubly stochastic differential equations and the optimal filtering of diffusion processes
Communications in Mathematical Sciences
2021-03-25Paper
A direct filter method for parameter estimation
Journal of Computational Physics
2021-01-27Paper
Wake flow dynamic characteristics of triangular prisms
Fluid Dynamics
2020-05-18Paper
A Fully Computable A Posteriori Error Estimate for the Stokes Equations on Polytopal Meshes
SIAM Journal on Numerical Analysis
2019-03-22Paper
Deep and Structured Robust Information Theoretic Learning for Image Analysis
IEEE Transactions on Image Processing
2019-02-04Paper
Break finite automata public key cryptosystem
Automata, Languages and Programming
2019-01-10Paper
Improved distributed particle filters for tracking in a wireless sensor network
Computational Statistics and Data Analysis
2018-08-17Paper
A multi-scale cholera model linking between-host and within-host dynamics
International Journal of Biomathematics
2018-04-20Paper
Adaptive meshfree backward SDE filter
SIAM Journal on Scientific Computing
2017-12-06Paper
An implicit algorithm of solving nonlinear filtering problems
Communications in Computational Physics
2017-10-27Paper
Efficient particle filtering for stochastic Korteweg-de Vries equations
Stochastics and Dynamics
2017-03-27Paper
Hierarchical optimization for neutron scattering problems
Journal of Computational Physics
2016-12-05Paper
A first order scheme for backward doubly stochastic differential equations
SIAM/ASA Journal on Uncertainty Quantification
2016-07-22Paper
Average competitive ratios of on-line spanning trees
Information Processing Letters
2016-05-26Paper
A first order semi-discrete algorithm for backward doubly stochastic differential equations
Discrete and Continuous Dynamical Systems. Series B
2016-03-10Paper
A hybrid sparse-grid approach for nonlinear filtering problems based on adaptive-domain of the Zakai equation approximations
SIAM/ASA Journal on Uncertainty Quantification
2015-01-14Paper
NUMERICAL SOLUTIONS FOR FORWARD BACKWARD DOUBLY STOCHASTIC DIFFERENTIAL EQUATIONS AND ZAKAI EQUATIONS
International Journal for Uncertainty Quantification
2014-04-25Paper
Error-free, Multi-bit Non-committing Encryption with Constant Round Complexity
Information Security and Cryptology
2011-07-29Paper
Formal and precise analysis of soundness of several shuffling schemes
Provable Security
2010-10-12Paper
Batch range proof for practical small ranges
Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
2010-05-04Paper
Security Analysis of a Password Authenticated Key Exchange Protocol
Lecture Notes in Computer Science
2010-02-09Paper
Validating digital signatures without TTP's time-stamping and certificate revocation
Lecture Notes in Computer Science
2010-02-09Paper
Non-committing encryptions based on oblivious Naor-Pinkas cryptosystems
Progress in Cryptology - INDOCRYPT 2009
2009-12-17Paper
Self-enforcing private inference control
Provable Security
2009-12-11Paper
Multiuser private queries over encrypted databases
International Journal of Applied Cryptography
2009-10-12Paper
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security
Lecture Notes in Computer Science
2009-09-29Paper
Constructing Universally Composable Oblivious Transfers from Double Trap-Door Encryptions
Progress in Cryptology – AFRICACRYPT 2009
2009-07-07Paper
Batch ZK Proof and Verification of OR Logic
Information Security and Cryptology
2009-04-29Paper
Correction, Optimisation and Secure and Efficient Application of PBD Shuffling
Information Security and Cryptology
2009-04-29Paper
Parameter optimization-based batching TLS protocol
 
2009-03-06Paper
Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme
Information Security and Privacy
2009-03-06Paper
Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes
Information Security and Cryptology
2009-01-15Paper
An Efficient PIR Construction Using Trusted Hardware
Lecture Notes in Computer Science
2008-11-20Paper
Generic Constructions of Stateful Public Key Encryption and Their Applications
Applied Cryptography and Network Security
2008-06-13Paper
nPAKE + : A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords
Information and Communications Security
2008-03-25Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2008-02-19Paper
More on Stand-Alone and Setup-Free Verifiably Committed Signatures
Information Security and Privacy
2007-09-07Paper
Oblivious Scalar-Product Protocols
Information Security and Privacy
2007-09-07Paper
On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures
Public Key Cryptography – PKC 2007
2007-09-04Paper
Routing optimization security in mobile IPv6
Computer Networks
2007-03-15Paper
Topics in Cryptology – CT-RSA 2006
Lecture Notes in Computer Science
2007-02-12Paper
Access control protocols with two-layer architecture for wireless networks
Computer Networks
2007-01-09Paper
Information and Communications Security
Lecture Notes in Computer Science
2006-10-24Paper
Information and Communications Security
Lecture Notes in Computer Science
2006-10-24Paper
Information and Communications Security
Lecture Notes in Computer Science
2006-10-24Paper
Information and Communications Security
Lecture Notes in Computer Science
2006-10-24Paper
Information Security and Privacy
Lecture Notes in Computer Science
2006-06-22Paper
Cryptanalysis and improvement on batch verifying multiple RSA digital signatures
Applied Mathematics and Computation
2006-04-28Paper
scientific article; zbMATH DE number 2247709 (Why is no real title available?)
 
2006-01-16Paper
Automata, Languages and Programming
Lecture Notes in Computer Science
2006-01-10Paper
Information Security and Cryptology - ICISC 2003
Lecture Notes in Computer Science
2005-12-27Paper
Progress in Cryptology - INDOCRYPT 2004
Lecture Notes in Computer Science
2005-12-22Paper
Progress in Cryptology - INDOCRYPT 2004
Lecture Notes in Computer Science
2005-12-22Paper
Topics in Cryptology – CT-RSA 2005
Lecture Notes in Computer Science
2005-12-08Paper
Information Security and Privacy
Lecture Notes in Computer Science
2005-09-07Paper
Information Security and Privacy
Lecture Notes in Computer Science
2005-09-07Paper
scientific article; zbMATH DE number 2202215 (Why is no real title available?)
 
2005-09-05Paper
Information and Communications Security
Lecture Notes in Computer Science
2005-08-19Paper
Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes
 
2005-08-12Paper
Efficient and robust key management for large mobile ad hoc networks
Computer Networks
2005-08-03Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2005-06-13Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2005-06-13Paper
scientific article; zbMATH DE number 2127887 (Why is no real title available?)
 
2005-01-14Paper
Highly reliable trust establishment scheme in ad hoc networks
Computer Networks
2004-11-12Paper
scientific article; zbMATH DE number 2080692 (Why is no real title available?)
 
2004-08-04Paper
scientific article; zbMATH DE number 2043340 (Why is no real title available?)
 
2004-02-16Paper
scientific article; zbMATH DE number 1950339 (Why is no real title available?)
 
2003-07-17Paper
scientific article; zbMATH DE number 1950329 (Why is no real title available?)
 
2003-07-17Paper
scientific article; zbMATH DE number 1808261 (Why is no real title available?)
 
2002-09-26Paper
scientific article; zbMATH DE number 1776364 (Why is no real title available?)
 
2002-08-05Paper
scientific article; zbMATH DE number 1500496 (Why is no real title available?)
 
2002-07-28Paper
scientific article; zbMATH DE number 1618048 (Why is no real title available?)
 
2002-07-22Paper
scientific article; zbMATH DE number 1618046 (Why is no real title available?)
 
2002-07-16Paper
scientific article; zbMATH DE number 1302789 (Why is no real title available?)
 
2002-06-23Paper
scientific article; zbMATH DE number 1302790 (Why is no real title available?)
 
2002-04-21Paper
scientific article; zbMATH DE number 1424187 (Why is no real title available?)
 
2002-04-08Paper
scientific article; zbMATH DE number 1689863 (Why is no real title available?)
 
2002-01-14Paper
scientific article; zbMATH DE number 1942817 (Why is no real title available?)
 
2002-01-01Paper
scientific article; zbMATH DE number 1440048 (Why is no real title available?)
 
2001-08-21Paper
scientific article; zbMATH DE number 1612504 (Why is no real title available?)
 
2001-07-01Paper
scientific article; zbMATH DE number 1612518 (Why is no real title available?)
 
2001-07-01Paper
scientific article; zbMATH DE number 1555990 (Why is no real title available?)
 
2001-01-24Paper
scientific article; zbMATH DE number 1341862 (Why is no real title available?)
 
1999-11-29Paper
scientific article; zbMATH DE number 1322340 (Why is no real title available?)
 
1999-11-08Paper
scientific article; zbMATH DE number 683533 (Why is no real title available?)
 
1999-11-08Paper
scientific article; zbMATH DE number 1303976 (Why is no real title available?)
 
1999-11-02Paper
scientific article; zbMATH DE number 1304284 (Why is no real title available?)
 
1999-09-09Paper
Reliable broadcasting in product networks
Discrete Applied Mathematics
1998-07-28Paper
scientific article; zbMATH DE number 1186868 (Why is no real title available?)
 
1998-01-01Paper
scientific article; zbMATH DE number 1182512 (Why is no real title available?)
 
1997-01-01Paper
Increasing ranks of linear finite automata and complexity of FA public key cryptosystem
Science in China. Series A
1994-10-24Paper
Solving high dimensional FBSDE with deep signature techniques with application to nonlinear options pricing
 
N/APaper
Nonlinear ensemble filtering with diffusion models: Application to the surface quasi-geostrophic dynamics
 
N/APaper
An Online Algorithm for Solving Feedback Optimal Control Problems with Partial Observations
 
N/APaper


Research outcomes over time


This page was built for person: Feng Bao