| Publication | Date of Publication | Type |
|---|
Iterative neural networks for improving memory capacity Neural Networks | 2025-01-17 | Paper |
| Robust decentralized multi-client functional encryption: motivation, definition, and inner-product constructions | 2024-09-13 | Paper |
Maximum correntropy quaternion Kalman filter IEEE Transactions on Signal Processing | 2024-09-12 | Paper |
Towards secure asynchronous messaging with forward secrecy and mutual authentication Information Sciences | 2024-05-02 | Paper |
Certainty Equivalence Control of Discrete-Time Multiagent Systems: A Framework for Uniform Global Exponential Stability IEEE Transactions on Automatic Control | 2024-02-29 | Paper |
Synchronization of heterogeneous harmonic oscillators for generalized uniformly jointly connected networks Electronic Research Archive | 2024-02-13 | Paper |
Distributed dual objective control of an energy storage system under jointly connected switching networks Automatica | 2023-06-26 | Paper |
Lattice-Based Group Encryption with Full Dynamicity and Message Filtering Policy Lecture Notes in Computer Science | 2023-05-26 | Paper |
Multistability analysis of quaternion-valued neural networks with cosine activation functions Applied Mathematics and Computation | 2023-04-21 | Paper |
| Forward-Secure Group Encryptions from Lattices | 2023-04-13 | Paper |
Additive properties for the pseudo core inverse of morphisms in an additive category Journal of Algebra and its Applications | 2023-01-02 | Paper |
New Practical Public-Key Deniable Encryption 1515.94059 | 2022-12-21 | Paper |
| Attribute based broadcast encryption with short ciphertext and decryption key | 2022-08-19 | Paper |
The pseudo core inverses of differences and products of projections in rings with involution Filomat | 2022-06-29 | Paper |
On the weighted pseudo Drazin invertible elements in associative rings and Banach algebras Filomat | 2022-06-07 | Paper |
Rank equalities related to a class of outer generalized inverse Filomat | 2022-06-03 | Paper |
Robust stability analysis of impulsive quaternion-valued neural networks with distributed delays and parameter uncertainties Advances in Difference Equations | 2022-03-07 | Paper |
Effects of parallel importation and power structures on price competition in duopolistic supply chains Mathematical Problems in Engineering | 2022-01-24 | Paper |
Location-price game in a dual-circle market with different demand levels Mathematical Problems in Engineering | 2022-01-24 | Paper |
Exclusivity or competitor retail? Impacts of channel structures on multinational supply chains considering green manufacturing Mathematical Problems in Engineering | 2022-01-21 | Paper |
Robust asymptotical stability and stabilization of fractional-order complex-valued neural networks with delay Discrete Dynamics in Nature and Society | 2022-01-11 | Paper |
Two-player location-price game in a spoke market with linear transportation cost Discrete Dynamics in Nature and Society | 2022-01-11 | Paper |
An Efficient Contact Search Algorithm for Three-Dimensional Sphere Discontinuous Deformation Analysis International Journal of Computational Methods | 2021-12-16 | Paper |
Global exponential synchronization via nonlinear feedback control for delayed inertial memristor-based quaternion-valued neural networks with impulses Applied Mathematics and Computation | 2021-11-10 | Paper |
Generalized WG inverse Journal of Algebra and its Applications | 2021-11-05 | Paper |
| Neural network tracking control of hypersonic vehicle | 2021-09-29 | Paper |
Right core inverses of a product and a companion matrix Linear and Multilinear Algebra | 2021-09-13 | Paper |
The \((b, c)\)-inverse in semigroups and rings with involution Frontiers of Mathematics in China | 2021-06-24 | Paper |
Optimal preventive ``maintenance-first or -last policies with generalized imperfect maintenance models Journal of Industrial and Management Optimization | 2021-06-09 | Paper |
| Stability of nonhyperbolic singular point and bifurcation in a class of four dimensional polynomial systems | 2021-04-26 | Paper |
Global Analysis of an Asymmetric Continuous Piecewise Linear Differential System with Three Linear Zones International Journal of Bifurcation and Chaos in Applied Sciences and Engineering | 2021-03-12 | Paper |
Two-player location game in a closed-loop market with quantity competition Complexity | 2020-10-21 | Paper |
New publicly verifiable computation for batch matrix multiplication Information Sciences | 2020-10-07 | Paper |
Privacy preserving multi-party computation delegation for deep learning in cloud computing Information Sciences | 2020-09-09 | Paper |
Global dynamics of a planar Filippov system with symmetry International Journal of Bifurcation and Chaos in Applied Sciences and Engineering | 2020-08-18 | Paper |
Robust stability analysis of quaternion-valued neural networks with time delays and parameter uncertainties Neural Networks | 2020-05-18 | Paper |
Complete bifurcation diagram and global phase portraits of Liénard differential equations of degree four Journal of Mathematical Analysis and Applications | 2020-03-09 | Paper |
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing Information Sciences | 2020-02-06 | Paper |
| A Lotka-Volterra prey-predator system with feedback control effect | 2019-09-20 | Paper |
| \(L(2,1)\)-labelling of Halin graphs with a maximum degree of seven | 2019-09-20 | Paper |
Parameter-range-dependent robust stability conditions for quaternion-valued neural networks with time delays Advances in Difference Equations | 2019-05-20 | Paper |
Multistability of complex-valued neural networks with time-varying delays Applied Mathematics and Computation | 2019-03-27 | Paper |
Global \(\mu\)-stability of complex-valued neural networks with unbounded time-varying delays Abstract and Applied Analysis | 2019-02-14 | Paper |
Global \(\mu\)-stability of impulsive complex-valued neural networks with leakage delay and mixed delays Abstract and Applied Analysis | 2019-02-14 | Paper |
Robust stability analysis of quaternion-valued neural networks via LMI approach Advances in Difference Equations | 2019-01-21 | Paper |
Robust stability analysis of impulsive complex-valued neural networks with mixed time delays and parameter uncertainties Advances in Difference Equations | 2019-01-17 | Paper |
| Secure publicly verifiable computation with polynomial commitment in cloud computing | 2018-09-26 | Paper |
Efficient request-based comparable encryption scheme based on sliding window method Soft Computing | 2017-09-08 | Paper |
Stability analysis of nonlinear fractional-order systems with variable-time impulses Journal of the Franklin Institute | 2017-06-07 | Paper |
Verifiable Computation over Large Database with Incremental Updates IEEE Transactions on Computers | 2017-05-16 | Paper |
Secure Distributed Deduplication Systems with Improved Reliability IEEE Transactions on Computers | 2017-05-16 | Paper |
Identity-Based Encryption with Outsourced Revocation in Cloud Computing IEEE Transactions on Computers | 2017-05-16 | Paper |
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation IEEE Transactions on Computers | 2017-05-16 | Paper |
Accountable large-universe attribute-based encryption supporting any monotone access structures Information Security and Privacy | 2016-08-31 | Paper |
Towards efficient fully randomized message-locked encryption Information Security and Privacy | 2016-08-31 | Paper |
An efficient CCA-secure cryptosystem over ideal lattices from identity-based encryption Computers & Mathematics with Applications | 2016-07-06 | Paper |
Essential sign change numbers of full sign pattern matrices Special Matrices | 2016-07-04 | Paper |
N-Mobishare: new privacy-preserving location-sharing system for mobile online social networks International Journal of Computer Mathematics | 2016-05-06 | Paper |
Lightweight anonymous authentication for ad hoc group: a ring signature approach Provable Security | 2016-01-27 | Paper |
Identity-based chameleon hashing and signatures without key exposure Information Sciences | 2016-01-14 | Paper |
Computationally efficient ciphertext-policy attribute-based encryption with constant-size ciphertexts Provable Security | 2015-09-29 | Paper |
Secure deduplication storage systems supporting keyword search Journal of Computer and System Sciences | 2015-08-31 | Paper |
Verifiable computation over large database with incremental updates Computer Security - ESORICS 2014 | 2015-07-24 | Paper |
Efficient algorithms for secure outsourcing of bilinear pairings Theoretical Computer Science | 2014-12-02 | Paper |
A new signature scheme without random oracles from bilinear pairings Progress in Cryptology - VIETCRYPT 2006 | 2014-08-21 | Paper |
A secure three-party computational protocol for triangle area Information Security and Privacy | 2014-07-24 | Paper |
TMDS: thin-model data sharing scheme supporting keyword search in cloud storage Information Security and Privacy | 2014-07-24 | Paper |
| Multistability of neural networks with discontinuous activation functions | 2014-06-30 | Paper |
Quantum artificial fish school algorithm Journal of Northeastern University. Natural Science | 2013-11-19 | Paper |
New algorithms for secure outsourcing of modular exponentiations Computer Security – ESORICS 2012 | 2013-10-23 | Paper |
Discrete logarithm based chameleon hashing and signatures without key exposure Computers and Electrical Engineering | 2013-05-31 | Paper |
Non-interactive Deniable Authentication Protocols Information Security and Cryptology | 2013-01-07 | Paper |
Non-delegatable strong designated verifier signature on elliptic curves Information Security and Cryptology - ICISC 2011 | 2012-11-01 | Paper |
Generic security-amplifying methods of ordinary digital signatures Information Sciences | 2012-10-17 | Paper |
A short non-delegatable strong designated verifier signature Information Security and Privacy | 2012-09-07 | Paper |
Global exponential stability of antiperiodic solutions for discrete-time neural networks with mixed delays and impulses Discrete Dynamics in Nature and Society | 2012-08-14 | Paper |
Identity-based trapdoor mercurial commitments and applications Theoretical Computer Science | 2011-10-10 | Paper |
Comments and improvements on key-exposure free chameleon hashing based on factoring Information Security and Cryptology | 2011-07-29 | Paper |
| An ID-based chameleon hash scheme and signature without key escrow | 2011-07-19 | Paper |
New receipt-free voting scheme using double-trapdoor commitment Information Sciences | 2011-06-17 | Paper |
Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification scheme at CT-RSA 05 Information Processing Letters | 2010-08-20 | Paper |
| scientific article; zbMATH DE number 5733196 (Why is no real title available?) | 2010-07-08 | Paper |
Attack on an ID-based authenticated group key agreement scheme from PKC 2004 Information Processing Letters | 2009-07-21 | Paper |
The ring authenticated encryption scheme-how to provide a clue wisely Information Sciences | 2009-03-24 | Paper |
Efficient Generic On-Line/Off-Line Signatures Without Key Exposure Applied Cryptography and Network Security | 2009-03-10 | Paper |
A Tamper-Evident Voting Machine Resistant to Covert Channels Provable Security | 2009-01-27 | Paper |
Efficient generic on-line/off-line (threshold) signatures without key exposure Information Sciences | 2008-11-20 | Paper |
Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings Financial Cryptography and Data Security | 2008-09-09 | Paper |
Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature Provable Security | 2008-06-10 | Paper |
Generalization of functional equation for the square root spiral Applied Mathematics and Computation | 2007-01-11 | Paper |
Information Security Lecture Notes in Computer Science | 2006-10-16 | Paper |
Information Security Lecture Notes in Computer Science | 2006-10-16 | Paper |
| scientific article; zbMATH DE number 2247106 (Why is no real title available?) | 2006-01-16 | Paper |
Information Security and Cryptology - ICISC 2003 Lecture Notes in Computer Science | 2005-12-27 | Paper |
Progress in Cryptology - INDOCRYPT 2004 Lecture Notes in Computer Science | 2005-12-22 | Paper |
Information Security Practice and Experience Lecture Notes in Computer Science | 2005-09-13 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2005-06-13 | Paper |
| scientific article; zbMATH DE number 2140683 (Why is no real title available?) | 2005-03-04 | Paper |
| scientific article; zbMATH DE number 2111173 (Why is no real title available?) | 2004-10-28 | Paper |
| scientific article; zbMATH DE number 1874154 (Why is no real title available?) | 2003-10-20 | Paper |
| scientific article; zbMATH DE number 1930395 (Why is no real title available?) | 2003-06-18 | Paper |
A sum analogous to Dedekind sums and its mean value formula Chinese Annals of Mathematics. Series A | 2001-07-26 | Paper |
On the fourth weighted mean value formulas of Dirichlet \(L\)-functions Journal of Northwest University. Natural Sciences Edition | 2001-06-25 | Paper |
| scientific article; zbMATH DE number 4162298 (Why is no real title available?) | 1989-01-01 | Paper |