Xiaofeng Chen

From MaRDI portal
(Redirected from Person:301842)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Iterative neural networks for improving memory capacity
Neural Networks
2025-01-17Paper
Robust decentralized multi-client functional encryption: motivation, definition, and inner-product constructions2024-09-13Paper
Maximum correntropy quaternion Kalman filter
IEEE Transactions on Signal Processing
2024-09-12Paper
Towards secure asynchronous messaging with forward secrecy and mutual authentication
Information Sciences
2024-05-02Paper
Certainty Equivalence Control of Discrete-Time Multiagent Systems: A Framework for Uniform Global Exponential Stability
IEEE Transactions on Automatic Control
2024-02-29Paper
Synchronization of heterogeneous harmonic oscillators for generalized uniformly jointly connected networks
Electronic Research Archive
2024-02-13Paper
Distributed dual objective control of an energy storage system under jointly connected switching networks
Automatica
2023-06-26Paper
Lattice-Based Group Encryption with Full Dynamicity and Message Filtering Policy
Lecture Notes in Computer Science
2023-05-26Paper
Multistability analysis of quaternion-valued neural networks with cosine activation functions
Applied Mathematics and Computation
2023-04-21Paper
Forward-Secure Group Encryptions from Lattices2023-04-13Paper
Additive properties for the pseudo core inverse of morphisms in an additive category
Journal of Algebra and its Applications
2023-01-02Paper
New Practical Public-Key Deniable Encryption
1515.94059
2022-12-21Paper
Attribute based broadcast encryption with short ciphertext and decryption key2022-08-19Paper
The pseudo core inverses of differences and products of projections in rings with involution
Filomat
2022-06-29Paper
On the weighted pseudo Drazin invertible elements in associative rings and Banach algebras
Filomat
2022-06-07Paper
Rank equalities related to a class of outer generalized inverse
Filomat
2022-06-03Paper
Robust stability analysis of impulsive quaternion-valued neural networks with distributed delays and parameter uncertainties
Advances in Difference Equations
2022-03-07Paper
Effects of parallel importation and power structures on price competition in duopolistic supply chains
Mathematical Problems in Engineering
2022-01-24Paper
Location-price game in a dual-circle market with different demand levels
Mathematical Problems in Engineering
2022-01-24Paper
Exclusivity or competitor retail? Impacts of channel structures on multinational supply chains considering green manufacturing
Mathematical Problems in Engineering
2022-01-21Paper
Robust asymptotical stability and stabilization of fractional-order complex-valued neural networks with delay
Discrete Dynamics in Nature and Society
2022-01-11Paper
Two-player location-price game in a spoke market with linear transportation cost
Discrete Dynamics in Nature and Society
2022-01-11Paper
An Efficient Contact Search Algorithm for Three-Dimensional Sphere Discontinuous Deformation Analysis
International Journal of Computational Methods
2021-12-16Paper
Global exponential synchronization via nonlinear feedback control for delayed inertial memristor-based quaternion-valued neural networks with impulses
Applied Mathematics and Computation
2021-11-10Paper
Generalized WG inverse
Journal of Algebra and its Applications
2021-11-05Paper
Neural network tracking control of hypersonic vehicle2021-09-29Paper
Right core inverses of a product and a companion matrix
Linear and Multilinear Algebra
2021-09-13Paper
The \((b, c)\)-inverse in semigroups and rings with involution
Frontiers of Mathematics in China
2021-06-24Paper
Optimal preventive ``maintenance-first or -last policies with generalized imperfect maintenance models
Journal of Industrial and Management Optimization
2021-06-09Paper
Stability of nonhyperbolic singular point and bifurcation in a class of four dimensional polynomial systems2021-04-26Paper
Global Analysis of an Asymmetric Continuous Piecewise Linear Differential System with Three Linear Zones
International Journal of Bifurcation and Chaos in Applied Sciences and Engineering
2021-03-12Paper
Two-player location game in a closed-loop market with quantity competition
Complexity
2020-10-21Paper
New publicly verifiable computation for batch matrix multiplication
Information Sciences
2020-10-07Paper
Privacy preserving multi-party computation delegation for deep learning in cloud computing
Information Sciences
2020-09-09Paper
Global dynamics of a planar Filippov system with symmetry
International Journal of Bifurcation and Chaos in Applied Sciences and Engineering
2020-08-18Paper
Robust stability analysis of quaternion-valued neural networks with time delays and parameter uncertainties
Neural Networks
2020-05-18Paper
Complete bifurcation diagram and global phase portraits of Liénard differential equations of degree four
Journal of Mathematical Analysis and Applications
2020-03-09Paper
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
Information Sciences
2020-02-06Paper
A Lotka-Volterra prey-predator system with feedback control effect2019-09-20Paper
\(L(2,1)\)-labelling of Halin graphs with a maximum degree of seven2019-09-20Paper
Parameter-range-dependent robust stability conditions for quaternion-valued neural networks with time delays
Advances in Difference Equations
2019-05-20Paper
Multistability of complex-valued neural networks with time-varying delays
Applied Mathematics and Computation
2019-03-27Paper
Global \(\mu\)-stability of complex-valued neural networks with unbounded time-varying delays
Abstract and Applied Analysis
2019-02-14Paper
Global \(\mu\)-stability of impulsive complex-valued neural networks with leakage delay and mixed delays
Abstract and Applied Analysis
2019-02-14Paper
Robust stability analysis of quaternion-valued neural networks via LMI approach
Advances in Difference Equations
2019-01-21Paper
Robust stability analysis of impulsive complex-valued neural networks with mixed time delays and parameter uncertainties
Advances in Difference Equations
2019-01-17Paper
Secure publicly verifiable computation with polynomial commitment in cloud computing2018-09-26Paper
Efficient request-based comparable encryption scheme based on sliding window method
Soft Computing
2017-09-08Paper
Stability analysis of nonlinear fractional-order systems with variable-time impulses
Journal of the Franklin Institute
2017-06-07Paper
Verifiable Computation over Large Database with Incremental Updates
IEEE Transactions on Computers
2017-05-16Paper
Secure Distributed Deduplication Systems with Improved Reliability
IEEE Transactions on Computers
2017-05-16Paper
Identity-Based Encryption with Outsourced Revocation in Cloud Computing
IEEE Transactions on Computers
2017-05-16Paper
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
IEEE Transactions on Computers
2017-05-16Paper
Accountable large-universe attribute-based encryption supporting any monotone access structures
Information Security and Privacy
2016-08-31Paper
Towards efficient fully randomized message-locked encryption
Information Security and Privacy
2016-08-31Paper
An efficient CCA-secure cryptosystem over ideal lattices from identity-based encryption
Computers & Mathematics with Applications
2016-07-06Paper
Essential sign change numbers of full sign pattern matrices
Special Matrices
2016-07-04Paper
N-Mobishare: new privacy-preserving location-sharing system for mobile online social networks
International Journal of Computer Mathematics
2016-05-06Paper
Lightweight anonymous authentication for ad hoc group: a ring signature approach
Provable Security
2016-01-27Paper
Identity-based chameleon hashing and signatures without key exposure
Information Sciences
2016-01-14Paper
Computationally efficient ciphertext-policy attribute-based encryption with constant-size ciphertexts
Provable Security
2015-09-29Paper
Secure deduplication storage systems supporting keyword search
Journal of Computer and System Sciences
2015-08-31Paper
Verifiable computation over large database with incremental updates
Computer Security - ESORICS 2014
2015-07-24Paper
Efficient algorithms for secure outsourcing of bilinear pairings
Theoretical Computer Science
2014-12-02Paper
A new signature scheme without random oracles from bilinear pairings
Progress in Cryptology - VIETCRYPT 2006
2014-08-21Paper
A secure three-party computational protocol for triangle area
Information Security and Privacy
2014-07-24Paper
TMDS: thin-model data sharing scheme supporting keyword search in cloud storage
Information Security and Privacy
2014-07-24Paper
Multistability of neural networks with discontinuous activation functions2014-06-30Paper
Quantum artificial fish school algorithm
Journal of Northeastern University. Natural Science
2013-11-19Paper
New algorithms for secure outsourcing of modular exponentiations
Computer Security – ESORICS 2012
2013-10-23Paper
Discrete logarithm based chameleon hashing and signatures without key exposure
Computers and Electrical Engineering
2013-05-31Paper
Non-interactive Deniable Authentication Protocols
Information Security and Cryptology
2013-01-07Paper
Non-delegatable strong designated verifier signature on elliptic curves
Information Security and Cryptology - ICISC 2011
2012-11-01Paper
Generic security-amplifying methods of ordinary digital signatures
Information Sciences
2012-10-17Paper
A short non-delegatable strong designated verifier signature
Information Security and Privacy
2012-09-07Paper
Global exponential stability of antiperiodic solutions for discrete-time neural networks with mixed delays and impulses
Discrete Dynamics in Nature and Society
2012-08-14Paper
Identity-based trapdoor mercurial commitments and applications
Theoretical Computer Science
2011-10-10Paper
Comments and improvements on key-exposure free chameleon hashing based on factoring
Information Security and Cryptology
2011-07-29Paper
An ID-based chameleon hash scheme and signature without key escrow2011-07-19Paper
New receipt-free voting scheme using double-trapdoor commitment
Information Sciences
2011-06-17Paper
Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification scheme at CT-RSA 05
Information Processing Letters
2010-08-20Paper
scientific article; zbMATH DE number 5733196 (Why is no real title available?)2010-07-08Paper
Attack on an ID-based authenticated group key agreement scheme from PKC 2004
Information Processing Letters
2009-07-21Paper
The ring authenticated encryption scheme-how to provide a clue wisely
Information Sciences
2009-03-24Paper
Efficient Generic On-Line/Off-Line Signatures Without Key Exposure
Applied Cryptography and Network Security
2009-03-10Paper
A Tamper-Evident Voting Machine Resistant to Covert Channels
Provable Security
2009-01-27Paper
Efficient generic on-line/off-line (threshold) signatures without key exposure
Information Sciences
2008-11-20Paper
Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings
Financial Cryptography and Data Security
2008-09-09Paper
Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature
Provable Security
2008-06-10Paper
Generalization of functional equation for the square root spiral
Applied Mathematics and Computation
2007-01-11Paper
Information Security
Lecture Notes in Computer Science
2006-10-16Paper
Information Security
Lecture Notes in Computer Science
2006-10-16Paper
scientific article; zbMATH DE number 2247106 (Why is no real title available?)2006-01-16Paper
Information Security and Cryptology - ICISC 2003
Lecture Notes in Computer Science
2005-12-27Paper
Progress in Cryptology - INDOCRYPT 2004
Lecture Notes in Computer Science
2005-12-22Paper
Information Security Practice and Experience
Lecture Notes in Computer Science
2005-09-13Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2005-06-13Paper
scientific article; zbMATH DE number 2140683 (Why is no real title available?)2005-03-04Paper
scientific article; zbMATH DE number 2111173 (Why is no real title available?)2004-10-28Paper
scientific article; zbMATH DE number 1874154 (Why is no real title available?)2003-10-20Paper
scientific article; zbMATH DE number 1930395 (Why is no real title available?)2003-06-18Paper
A sum analogous to Dedekind sums and its mean value formula
Chinese Annals of Mathematics. Series A
2001-07-26Paper
On the fourth weighted mean value formulas of Dirichlet \(L\)-functions
Journal of Northwest University. Natural Sciences Edition
2001-06-25Paper
scientific article; zbMATH DE number 4162298 (Why is no real title available?)1989-01-01Paper


Research outcomes over time


This page was built for person: Xiaofeng Chen