Feng Bao

From MaRDI portal
Person:256812

Available identifiers

zbMath Open bao.fengMaRDI QIDQ256812

List of research outcomes

PublicationDate of PublicationType
Numerical Analysis for Convergence of a Sample-Wise Backpropagation Method for Training Stochastic Neural Networks2024-03-05Paper
Transferable neural networks for partial differential equations2024-03-04Paper
Approximating minimum keys and optimal substructure screens2024-01-29Paper
A Unified Filter Method for Jointly Estimating State and Parameters of Stochastic Dynamical Systems via the Ensemble Score Filter2023-12-16Paper
Broadcasting in hypercubes with randomly distributed Byzantine faults2023-12-01Paper
Splitting scheme for backward doubly stochastic differential equations2023-09-22Paper
A Sample-Wise Data Driven Control Solver for the Stochastic Optimal Control Problem with Unknown Model Parameters2023-07-06Paper
A stochastic maximum principle approach for reinforcement learning with parameterized environment2023-06-16Paper
A Score-based Nonlinear Filter for Data Assimilation2023-06-15Paper
Parameter Estimation for the Truncated KdV Model through a Direct Filter Method2023-01-18Paper
Convergence Analysis for Training Stochastic Neural Networks via Stochastic Gradient Descent2022-12-17Paper
AN EFFICIENT MESH-FREE IMPLICIT FILTER FOR NONLINEAR FILTERING PROBLEMS2022-11-24Paper
ADJOINT FORWARD BACKWARD STOCHASTIC DIFFERENTIAL EQUATIONS DRIVEN BY JUMP DIFFUSION PROCESSES AND ITS APPLICATION TO NONLINEAR FILTERING PROBLEMS2022-11-24Paper
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles2022-10-28Paper
A backward SDE method for uncertainty quantification in deep learning2022-09-27Paper
Meshfree Approximation for Stochastic Optimal Control Problems2022-08-10Paper
Kernel learning backward SDE filter for data assimilation2022-05-05Paper
A drift homotopy implicit particle filter method for nonlinear filtering problems2022-04-22Paper
Analytic continuation of noisy data using Adams Bashforth residual neural network2022-04-22Paper
Private Information Retrieval Using Trusted Hardware2022-03-09Paper
Augmented Oblivious Polynomial Evaluation Protocol and Its Applications2022-03-09Paper
A PDE-based Adaptive Kernel Method for Solving Optimal Filtering Problems2022-03-09Paper
A Kernel Learning Method for Backward SDE Filter2022-01-25Paper
Lévy Backward SDE Filter for Jump Diffusion Processes and Its Applications in Material Sciences2021-11-01Paper
A Backward Doubly Stochastic Differential Equation Approach for Nonlinear Filtering Problems2021-10-28Paper
Computational Reconstruction of Missing Data in Biological Research2021-08-24Paper
Data informed solution estimation for forward-backward stochastic differential equations2021-06-23Paper
A Stochastic Gradient Descent Approach for Stochastic Optimal Control2021-04-27Paper
Forward backward doubly stochastic differential equations and the optimal filtering of diffusion processes2021-03-25Paper
A direct filter method for parameter estimation2021-01-27Paper
Wake flow dynamic characteristics of triangular prisms2020-05-18Paper
A Fully Computable A Posteriori Error Estimate for the Stokes Equations on Polytopal Meshes2019-03-22Paper
Deep and Structured Robust Information Theoretic Learning for Image Analysis2019-02-04Paper
Break Finite Automata Public Key Cryptosystem2019-01-10Paper
Improved distributed particle filters for tracking in a wireless sensor network2018-08-17Paper
A multi-scale cholera model linking between-host and within-host dynamics2018-04-20Paper
Adaptive Meshfree Backward SDE Filter2017-12-06Paper
An Implicit Algorithm of Solving Nonlinear Filtering Problems2017-10-27Paper
Efficient particle filtering for stochastic Korteweg–de Vries equations2017-03-27Paper
Hierarchical optimization for neutron scattering problems2016-12-05Paper
A First Order Scheme for Backward Doubly Stochastic Differential Equations2016-07-22Paper
Average competitive ratios of on-line spanning trees2016-05-26Paper
A first order semi-discrete algorithm for backward doubly stochastic differential equations2016-03-10Paper
A Hybrid Sparse-Grid Approach for Nonlinear Filtering Problems Based on Adaptive-Domain of the Zakai Equation Approximations2015-01-14Paper
NUMERICAL SOLUTIONS FOR FORWARD BACKWARD DOUBLY STOCHASTIC DIFFERENTIAL EQUATIONS AND ZAKAI EQUATIONS2014-04-25Paper
Error-free, Multi-bit Non-committing Encryption with Constant Round Complexity2011-07-29Paper
Formal and Precise Analysis of Soundness of Several Shuffling Schemes2010-10-12Paper
Batch Range Proof for Practical Small Ranges2010-05-04Paper
Validating Digital Signatures without TTP’s Time-Stamping and Certificate Revocation2010-02-09Paper
Security Analysis of a Password Authenticated Key Exchange Protocol2010-02-09Paper
Non-committing Encryptions Based on Oblivious Naor-Pinkas Cryptosystems2009-12-17Paper
Self-enforcing Private Inference Control2009-12-11Paper
Multiuser private queries over encrypted databases2009-10-12Paper
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security2009-09-29Paper
Constructing Universally Composable Oblivious Transfers from Double Trap-Door Encryptions2009-07-07Paper
Batch ZK Proof and Verification of OR Logic2009-04-29Paper
Correction, Optimisation and Secure and Efficient Application of PBD Shuffling2009-04-29Paper
Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme2009-03-06Paper
https://portal.mardi4nfdi.de/entity/Q36109922009-03-06Paper
Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes2009-01-15Paper
An Efficient PIR Construction Using Trusted Hardware2008-11-20Paper
Generic Constructions of Stateful Public Key Encryption and Their Applications2008-06-13Paper
nPAKE + : A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords2008-03-25Paper
Applied Cryptography and Network Security2008-02-19Paper
Oblivious Scalar-Product Protocols2007-09-07Paper
More on Stand-Alone and Setup-Free Verifiably Committed Signatures2007-09-07Paper
On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures2007-09-04Paper
Routing optimization security in mobile IPv62007-03-15Paper
Topics in Cryptology – CT-RSA 20062007-02-12Paper
Access control protocols with two-layer architecture for wireless networks2007-01-09Paper
Information and Communications Security2006-10-24Paper
Information and Communications Security2006-10-24Paper
Information and Communications Security2006-10-24Paper
Information and Communications Security2006-10-24Paper
Information Security and Privacy2006-06-22Paper
Cryptanalysis and improvement on batch verifying multiple RSA digital signatures2006-04-28Paper
https://portal.mardi4nfdi.de/entity/Q57188992006-01-16Paper
Automata, Languages and Programming2006-01-10Paper
Information Security and Cryptology - ICISC 20032005-12-27Paper
Progress in Cryptology - INDOCRYPT 20042005-12-22Paper
Progress in Cryptology - INDOCRYPT 20042005-12-22Paper
Topics in Cryptology – CT-RSA 20052005-12-08Paper
Information Security and Privacy2005-09-07Paper
Information Security and Privacy2005-09-07Paper
https://portal.mardi4nfdi.de/entity/Q53144262005-09-05Paper
Information and Communications Security2005-08-19Paper
Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes2005-08-12Paper
Efficient and robust key management for large mobile ad hoc networks2005-08-03Paper
Applied Cryptography and Network Security2005-06-13Paper
Applied Cryptography and Network Security2005-06-13Paper
https://portal.mardi4nfdi.de/entity/Q31548802005-01-14Paper
Highly reliable trust establishment scheme in ad hoc networks2004-11-12Paper
https://portal.mardi4nfdi.de/entity/Q44735952004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44507742004-02-16Paper
https://portal.mardi4nfdi.de/entity/Q44129572003-07-17Paper
https://portal.mardi4nfdi.de/entity/Q44129722003-07-17Paper
https://portal.mardi4nfdi.de/entity/Q31497312002-09-26Paper
https://portal.mardi4nfdi.de/entity/Q45449142002-08-05Paper
https://portal.mardi4nfdi.de/entity/Q45015082002-07-28Paper
https://portal.mardi4nfdi.de/entity/Q27245932002-07-22Paper
https://portal.mardi4nfdi.de/entity/Q27245912002-07-16Paper
https://portal.mardi4nfdi.de/entity/Q42492612002-06-23Paper
https://portal.mardi4nfdi.de/entity/Q42492622002-04-21Paper
https://portal.mardi4nfdi.de/entity/Q49453852002-04-08Paper
https://portal.mardi4nfdi.de/entity/Q27630292002-01-14Paper
https://portal.mardi4nfdi.de/entity/Q44093542002-01-01Paper
https://portal.mardi4nfdi.de/entity/Q49500342001-08-21Paper
https://portal.mardi4nfdi.de/entity/Q27211242001-07-01Paper
https://portal.mardi4nfdi.de/entity/Q27211522001-07-01Paper
https://portal.mardi4nfdi.de/entity/Q45257652001-01-24Paper
https://portal.mardi4nfdi.de/entity/Q42634161999-11-29Paper
https://portal.mardi4nfdi.de/entity/Q42533621999-11-08Paper
https://portal.mardi4nfdi.de/entity/Q43126671999-11-08Paper
https://portal.mardi4nfdi.de/entity/Q42506441999-11-02Paper
https://portal.mardi4nfdi.de/entity/Q42510061999-09-09Paper
Reliable broadcasting in product networks1998-07-28Paper
https://portal.mardi4nfdi.de/entity/Q38400781998-01-01Paper
https://portal.mardi4nfdi.de/entity/Q44005771997-01-01Paper
Increasing ranks of linear finite automata and complexity of FA public key cryptosystem1994-10-24Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Feng Bao