Xiaofeng Chen

From MaRDI portal
Person:301842

Available identifiers

zbMath Open chen.xiaofengMaRDI QIDQ301842

List of research outcomes





PublicationDate of PublicationType
Iterative neural networks for improving memory capacity2025-01-17Paper
Robust decentralized multi-client functional encryption: motivation, definition, and inner-product constructions2024-09-13Paper
Maximum correntropy quaternion Kalman filter2024-09-12Paper
Towards secure asynchronous messaging with forward secrecy and mutual authentication2024-05-02Paper
Certainty Equivalence Control of Discrete-Time Multiagent Systems: A Framework for Uniform Global Exponential Stability2024-02-29Paper
Synchronization of heterogeneous harmonic oscillators for generalized uniformly jointly connected networks2024-02-13Paper
Distributed dual objective control of an energy storage system under jointly connected switching networks2023-06-26Paper
Lattice-Based Group Encryption with Full Dynamicity and Message Filtering Policy2023-05-26Paper
Multistability analysis of quaternion-valued neural networks with cosine activation functions2023-04-21Paper
Forward-Secure Group Encryptions from Lattices2023-04-13Paper
Additive properties for the pseudo core inverse of morphisms in an additive category2023-01-02Paper
New Practical Public-Key Deniable Encryption2022-12-21Paper
Attribute based broadcast encryption with short ciphertext and decryption key2022-08-19Paper
The pseudo core inverses of differences and products of projections in rings with involution2022-06-29Paper
On the weighted pseudo Drazin invertible elements in associative rings and Banach algebras2022-06-07Paper
Rank equalities related to a class of outer generalized inverse2022-06-03Paper
Robust stability analysis of impulsive quaternion-valued neural networks with distributed delays and parameter uncertainties2022-03-07Paper
Effects of parallel importation and power structures on price competition in duopolistic supply chains2022-01-24Paper
Location-price game in a dual-circle market with different demand levels2022-01-24Paper
Exclusivity or competitor retail? Impacts of channel structures on multinational supply chains considering green manufacturing2022-01-21Paper
Robust asymptotical stability and stabilization of fractional-order complex-valued neural networks with delay2022-01-11Paper
Two-player location-price game in a spoke market with linear transportation cost2022-01-11Paper
An Efficient Contact Search Algorithm for Three-Dimensional Sphere Discontinuous Deformation Analysis2021-12-16Paper
Global exponential synchronization via nonlinear feedback control for delayed inertial memristor-based quaternion-valued neural networks with impulses2021-11-10Paper
Generalized WG inverse2021-11-05Paper
https://portal.mardi4nfdi.de/entity/Q33811152021-09-29Paper
Right core inverses of a product and a companion matrix2021-09-13Paper
The \((b, c)\)-inverse in semigroups and rings with involution2021-06-24Paper
Optimal preventive ``maintenance-first or -last policies with generalized imperfect maintenance models2021-06-09Paper
https://portal.mardi4nfdi.de/entity/Q49846182021-04-26Paper
Global Analysis of an Asymmetric Continuous Piecewise Linear Differential System with Three Linear Zones2021-03-12Paper
Two-player location game in a closed-loop market with quantity competition2020-10-21Paper
New publicly verifiable computation for batch matrix multiplication2020-10-07Paper
Privacy preserving multi-party computation delegation for deep learning in cloud computing2020-09-09Paper
Global Dynamics of a Planar Filippov System with Symmetry2020-08-18Paper
Robust stability analysis of quaternion-valued neural networks with time delays and parameter uncertainties2020-05-18Paper
Complete bifurcation diagram and global phase portraits of Liénard differential equations of degree four2020-03-09Paper
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing2020-02-06Paper
https://portal.mardi4nfdi.de/entity/Q51937162019-09-20Paper
https://portal.mardi4nfdi.de/entity/Q51941202019-09-20Paper
Parameter-range-dependent robust stability conditions for quaternion-valued neural networks with time delays2019-05-20Paper
Multistability of complex-valued neural networks with time-varying delays2019-03-27Paper
Global \(\mu\)-stability of complex-valued neural networks with unbounded time-varying delays2019-02-14Paper
Global \(\mu\)-stability of impulsive complex-valued neural networks with leakage delay and mixed delays2019-02-14Paper
Robust stability analysis of quaternion-valued neural networks via LMI approach2019-01-21Paper
Robust stability analysis of impulsive complex-valued neural networks with mixed time delays and parameter uncertainties2019-01-17Paper
Secure publicly verifiable computation with polynomial commitment in cloud computing2018-09-26Paper
Efficient request-based comparable encryption scheme based on sliding window method2017-09-08Paper
Stability analysis of nonlinear fractional-order systems with variable-time impulses2017-06-07Paper
Verifiable Computation over Large Database with Incremental Updates2017-05-16Paper
Secure Distributed Deduplication Systems with Improved Reliability2017-05-16Paper
Identity-Based Encryption with Outsourced Revocation in Cloud Computing2017-05-16Paper
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation2017-05-16Paper
Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures2016-08-31Paper
Towards Efficient Fully Randomized Message-Locked Encryption2016-08-31Paper
An efficient CCA-secure cryptosystem over ideal lattices from identity-based encryption2016-07-06Paper
Essential sign change numbers of full sign pattern matrices2016-07-04Paper
N-Mobishare: new privacy-preserving location-sharing system for mobile online social networks2016-05-06Paper
Lightweight Anonymous Authentication for Ad Hoc Group: A Ring Signature Approach2016-01-27Paper
Identity-based chameleon hashing and signatures without key exposure2016-01-14Paper
Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts2015-09-29Paper
Secure deduplication storage systems supporting keyword search2015-08-31Paper
Verifiable Computation over Large Database with Incremental Updates2015-07-24Paper
Efficient algorithms for secure outsourcing of bilinear pairings2014-12-02Paper
A New Signature Scheme Without Random Oracles from Bilinear Pairings2014-08-21Paper
A Secure Three-Party Computational Protocol for Triangle Area2014-07-24Paper
TMDS: Thin-Model Data Sharing Scheme Supporting Keyword Search in Cloud Storage2014-07-24Paper
https://portal.mardi4nfdi.de/entity/Q51661532014-06-30Paper
Quantum artificial fish school algorithm2013-11-19Paper
New Algorithms for Secure Outsourcing of Modular Exponentiations2013-10-23Paper
Discrete logarithm based chameleon hashing and signatures without key exposure2013-05-31Paper
Non-interactive Deniable Authentication Protocols2013-01-07Paper
Non-delegatable Strong Designated Verifier Signature on Elliptic Curves2012-11-01Paper
Generic security-amplifying methods of ordinary digital signatures2012-10-17Paper
A Short Non-delegatable Strong Designated Verifier Signature2012-09-07Paper
Global exponential stability of antiperiodic solutions for discrete-time neural networks with mixed delays and impulses2012-08-14Paper
Identity-based trapdoor mercurial commitments and applications2011-10-10Paper
Comments and improvements on key-exposure free chameleon hashing based on factoring2011-07-29Paper
An ID-based chameleon hash scheme and signature without key escrow2011-07-19Paper
New receipt-free voting scheme using double-trapdoor commitment2011-06-17Paper
Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification scheme at CT-RSA 052010-08-20Paper
https://portal.mardi4nfdi.de/entity/Q35709912010-07-08Paper
Attack on an ID-based authenticated group key agreement scheme from PKC 20042009-07-21Paper
The ring authenticated encryption scheme-how to provide a clue wisely2009-03-24Paper
Efficient Generic On-Line/Off-Line Signatures Without Key Exposure2009-03-10Paper
A Tamper-Evident Voting Machine Resistant to Covert Channels2009-01-27Paper
Efficient generic on-line/off-line (threshold) signatures without key exposure2008-11-20Paper
Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings2008-09-09Paper
Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature2008-06-10Paper
Generalization of functional equation for the square root spiral2007-01-11Paper
Information Security2006-10-16Paper
Information Security2006-10-16Paper
https://portal.mardi4nfdi.de/entity/Q57184102006-01-16Paper
Information Security and Cryptology - ICISC 20032005-12-27Paper
Progress in Cryptology - INDOCRYPT 20042005-12-22Paper
Information Security Practice and Experience2005-09-13Paper
Applied Cryptography and Network Security2005-06-13Paper
https://portal.mardi4nfdi.de/entity/Q46544532005-03-04Paper
https://portal.mardi4nfdi.de/entity/Q48252582004-10-28Paper
https://portal.mardi4nfdi.de/entity/Q47956672003-10-20Paper
https://portal.mardi4nfdi.de/entity/Q47087472003-06-18Paper
A sum analogous to Dedekind sums and its mean value formula2001-07-26Paper
On the fourth weighted mean value formulas of Dirichlet \(L\)-functions2001-06-25Paper
https://portal.mardi4nfdi.de/entity/Q34894881989-01-01Paper

Research outcomes over time

This page was built for person: Xiaofeng Chen