Publication | Date of Publication | Type |
---|
Numerical Analysis for Convergence of a Sample-Wise Backpropagation Method for Training Stochastic Neural Networks | 2024-03-05 | Paper |
Transferable neural networks for partial differential equations | 2024-03-04 | Paper |
Approximating minimum keys and optimal substructure screens | 2024-01-29 | Paper |
A Unified Filter Method for Jointly Estimating State and Parameters of Stochastic Dynamical Systems via the Ensemble Score Filter | 2023-12-16 | Paper |
Broadcasting in hypercubes with randomly distributed Byzantine faults | 2023-12-01 | Paper |
Splitting scheme for backward doubly stochastic differential equations | 2023-09-22 | Paper |
A Sample-Wise Data Driven Control Solver for the Stochastic Optimal Control Problem with Unknown Model Parameters | 2023-07-06 | Paper |
A stochastic maximum principle approach for reinforcement learning with parameterized environment | 2023-06-16 | Paper |
A Score-based Nonlinear Filter for Data Assimilation | 2023-06-15 | Paper |
Parameter Estimation for the Truncated KdV Model through a Direct Filter Method | 2023-01-18 | Paper |
Convergence Analysis for Training Stochastic Neural Networks via Stochastic Gradient Descent | 2022-12-17 | Paper |
AN EFFICIENT MESH-FREE IMPLICIT FILTER FOR NONLINEAR FILTERING PROBLEMS | 2022-11-24 | Paper |
ADJOINT FORWARD BACKWARD STOCHASTIC DIFFERENTIAL EQUATIONS DRIVEN BY JUMP DIFFUSION PROCESSES AND ITS APPLICATION TO NONLINEAR FILTERING PROBLEMS | 2022-11-24 | Paper |
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles | 2022-10-28 | Paper |
A backward SDE method for uncertainty quantification in deep learning | 2022-09-27 | Paper |
Meshfree Approximation for Stochastic Optimal Control Problems | 2022-08-10 | Paper |
Kernel learning backward SDE filter for data assimilation | 2022-05-05 | Paper |
A drift homotopy implicit particle filter method for nonlinear filtering problems | 2022-04-22 | Paper |
Analytic continuation of noisy data using Adams Bashforth residual neural network | 2022-04-22 | Paper |
Private Information Retrieval Using Trusted Hardware | 2022-03-09 | Paper |
Augmented Oblivious Polynomial Evaluation Protocol and Its Applications | 2022-03-09 | Paper |
A PDE-based Adaptive Kernel Method for Solving Optimal Filtering Problems | 2022-03-09 | Paper |
A Kernel Learning Method for Backward SDE Filter | 2022-01-25 | Paper |
Lévy Backward SDE Filter for Jump Diffusion Processes and Its Applications in Material Sciences | 2021-11-01 | Paper |
A Backward Doubly Stochastic Differential Equation Approach for Nonlinear Filtering Problems | 2021-10-28 | Paper |
Computational Reconstruction of Missing Data in Biological Research | 2021-08-24 | Paper |
Data informed solution estimation for forward-backward stochastic differential equations | 2021-06-23 | Paper |
A Stochastic Gradient Descent Approach for Stochastic Optimal Control | 2021-04-27 | Paper |
Forward backward doubly stochastic differential equations and the optimal filtering of diffusion processes | 2021-03-25 | Paper |
A direct filter method for parameter estimation | 2021-01-27 | Paper |
Wake flow dynamic characteristics of triangular prisms | 2020-05-18 | Paper |
A Fully Computable A Posteriori Error Estimate for the Stokes Equations on Polytopal Meshes | 2019-03-22 | Paper |
Deep and Structured Robust Information Theoretic Learning for Image Analysis | 2019-02-04 | Paper |
Break Finite Automata Public Key Cryptosystem | 2019-01-10 | Paper |
Improved distributed particle filters for tracking in a wireless sensor network | 2018-08-17 | Paper |
A multi-scale cholera model linking between-host and within-host dynamics | 2018-04-20 | Paper |
Adaptive Meshfree Backward SDE Filter | 2017-12-06 | Paper |
An Implicit Algorithm of Solving Nonlinear Filtering Problems | 2017-10-27 | Paper |
Efficient particle filtering for stochastic Korteweg–de Vries equations | 2017-03-27 | Paper |
Hierarchical optimization for neutron scattering problems | 2016-12-05 | Paper |
A First Order Scheme for Backward Doubly Stochastic Differential Equations | 2016-07-22 | Paper |
Average competitive ratios of on-line spanning trees | 2016-05-26 | Paper |
A first order semi-discrete algorithm for backward doubly stochastic differential equations | 2016-03-10 | Paper |
A Hybrid Sparse-Grid Approach for Nonlinear Filtering Problems Based on Adaptive-Domain of the Zakai Equation Approximations | 2015-01-14 | Paper |
NUMERICAL SOLUTIONS FOR FORWARD BACKWARD DOUBLY STOCHASTIC DIFFERENTIAL EQUATIONS AND ZAKAI EQUATIONS | 2014-04-25 | Paper |
Error-free, Multi-bit Non-committing Encryption with Constant Round Complexity | 2011-07-29 | Paper |
Formal and Precise Analysis of Soundness of Several Shuffling Schemes | 2010-10-12 | Paper |
Batch Range Proof for Practical Small Ranges | 2010-05-04 | Paper |
Validating Digital Signatures without TTP’s Time-Stamping and Certificate Revocation | 2010-02-09 | Paper |
Security Analysis of a Password Authenticated Key Exchange Protocol | 2010-02-09 | Paper |
Non-committing Encryptions Based on Oblivious Naor-Pinkas Cryptosystems | 2009-12-17 | Paper |
Self-enforcing Private Inference Control | 2009-12-11 | Paper |
Multiuser private queries over encrypted databases | 2009-10-12 | Paper |
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security | 2009-09-29 | Paper |
Constructing Universally Composable Oblivious Transfers from Double Trap-Door Encryptions | 2009-07-07 | Paper |
Batch ZK Proof and Verification of OR Logic | 2009-04-29 | Paper |
Correction, Optimisation and Secure and Efficient Application of PBD Shuffling | 2009-04-29 | Paper |
Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme | 2009-03-06 | Paper |
https://portal.mardi4nfdi.de/entity/Q3610992 | 2009-03-06 | Paper |
Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes | 2009-01-15 | Paper |
An Efficient PIR Construction Using Trusted Hardware | 2008-11-20 | Paper |
Generic Constructions of Stateful Public Key Encryption and Their Applications | 2008-06-13 | Paper |
nPAKE + : A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords | 2008-03-25 | Paper |
Applied Cryptography and Network Security | 2008-02-19 | Paper |
Oblivious Scalar-Product Protocols | 2007-09-07 | Paper |
More on Stand-Alone and Setup-Free Verifiably Committed Signatures | 2007-09-07 | Paper |
On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures | 2007-09-04 | Paper |
Routing optimization security in mobile IPv6 | 2007-03-15 | Paper |
Topics in Cryptology – CT-RSA 2006 | 2007-02-12 | Paper |
Access control protocols with two-layer architecture for wireless networks | 2007-01-09 | Paper |
Information and Communications Security | 2006-10-24 | Paper |
Information and Communications Security | 2006-10-24 | Paper |
Information and Communications Security | 2006-10-24 | Paper |
Information and Communications Security | 2006-10-24 | Paper |
Information Security and Privacy | 2006-06-22 | Paper |
Cryptanalysis and improvement on batch verifying multiple RSA digital signatures | 2006-04-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q5718899 | 2006-01-16 | Paper |
Automata, Languages and Programming | 2006-01-10 | Paper |
Information Security and Cryptology - ICISC 2003 | 2005-12-27 | Paper |
Progress in Cryptology - INDOCRYPT 2004 | 2005-12-22 | Paper |
Progress in Cryptology - INDOCRYPT 2004 | 2005-12-22 | Paper |
Topics in Cryptology – CT-RSA 2005 | 2005-12-08 | Paper |
Information Security and Privacy | 2005-09-07 | Paper |
Information Security and Privacy | 2005-09-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q5314426 | 2005-09-05 | Paper |
Information and Communications Security | 2005-08-19 | Paper |
Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes | 2005-08-12 | Paper |
Efficient and robust key management for large mobile ad hoc networks | 2005-08-03 | Paper |
Applied Cryptography and Network Security | 2005-06-13 | Paper |
Applied Cryptography and Network Security | 2005-06-13 | Paper |
https://portal.mardi4nfdi.de/entity/Q3154880 | 2005-01-14 | Paper |
Highly reliable trust establishment scheme in ad hoc networks | 2004-11-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q4473595 | 2004-08-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4450774 | 2004-02-16 | Paper |
https://portal.mardi4nfdi.de/entity/Q4412957 | 2003-07-17 | Paper |
https://portal.mardi4nfdi.de/entity/Q4412972 | 2003-07-17 | Paper |
https://portal.mardi4nfdi.de/entity/Q3149731 | 2002-09-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q4544914 | 2002-08-05 | Paper |
https://portal.mardi4nfdi.de/entity/Q4501508 | 2002-07-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q2724593 | 2002-07-22 | Paper |
https://portal.mardi4nfdi.de/entity/Q2724591 | 2002-07-16 | Paper |
https://portal.mardi4nfdi.de/entity/Q4249261 | 2002-06-23 | Paper |
https://portal.mardi4nfdi.de/entity/Q4249262 | 2002-04-21 | Paper |
https://portal.mardi4nfdi.de/entity/Q4945385 | 2002-04-08 | Paper |
https://portal.mardi4nfdi.de/entity/Q2763029 | 2002-01-14 | Paper |
https://portal.mardi4nfdi.de/entity/Q4409354 | 2002-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4950034 | 2001-08-21 | Paper |
https://portal.mardi4nfdi.de/entity/Q2721124 | 2001-07-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q2721152 | 2001-07-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4525765 | 2001-01-24 | Paper |
https://portal.mardi4nfdi.de/entity/Q4263416 | 1999-11-29 | Paper |
https://portal.mardi4nfdi.de/entity/Q4253362 | 1999-11-08 | Paper |
https://portal.mardi4nfdi.de/entity/Q4312667 | 1999-11-08 | Paper |
https://portal.mardi4nfdi.de/entity/Q4250644 | 1999-11-02 | Paper |
https://portal.mardi4nfdi.de/entity/Q4251006 | 1999-09-09 | Paper |
Reliable broadcasting in product networks | 1998-07-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q3840078 | 1998-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4400577 | 1997-01-01 | Paper |
Increasing ranks of linear finite automata and complexity of FA public key cryptosystem | 1994-10-24 | Paper |