| Publication | Date of Publication | Type |
|---|
Recursive filtering for discrete-time stochastic complex networks under bit-rate constraints: a locally minimum variance approach IEEE Transactions on Automatic Control | 2024-08-16 | Paper |
Post-quantum \(\kappa\)-to-1 trapdoor claw-free functions from extrapolated dihedral cosets Quantum Information Processing | 2024-06-05 | Paper |
Group public key encryption supporting equality test without bilinear pairings Information Sciences | 2024-03-07 | Paper |
Distributed secure balancing control for battery energy storage systems subject to random denial‐of‐service attacks International Journal of Robust and Nonlinear Control | 2024-02-06 | Paper |
Joint estimation of state, parameter, and unknown input for nonlinear systems: A composite estimation scheme International Journal of Robust and Nonlinear Control | 2023-11-29 | Paper |
Finite-Horizon $H_{\infty }$ Filtering via a High-Rate Network With the FlexRay Protocol IEEE Transactions on Automatic Control | 2023-10-02 | Paper |
Stabilization of linear discrete-time systems over resource-constrained networks under dynamical multiple description coding scheme Automatica | 2023-08-28 | Paper |
Pinning synchronization control for a class of dynamical networks with coupled time-varying delays: an interval-observer-based approach Circuits, Systems, and Signal Processing | 2023-08-25 | Paper |
Quantum algorithms for typical hard problems: a perspective of cryptanalysis Quantum Information Processing | 2023-01-13 | Paper |
Leveraging the hardness of dihedral coset problem for quantum cryptography Quantum Information Processing | 2022-12-07 | Paper |
Secure network coding in the presence of eavesdroppers Science China Information Sciences | 2022-10-28 | Paper |
Conjugate adjoining problem in braid groups and new design of braid-based signatures Science China Information Sciences | 2022-10-28 | Paper |
Non-fragile l2-l∞ state estimation for time-delayed artificial neural networks: an adaptive event-triggered approach International Journal of Systems Science. Principles and Applications of Systems and Integration | 2022-09-01 | Paper |
Event-based state estimation under constrained bit rate: an encoding-decoding approach Automatica | 2022-07-26 | Paper |
Event-based joint state and fault estimation: the envelope-constrained \(H_\infty\) criterion Applied Mathematics and Computation | 2022-03-03 | Paper |
Recursive Filtering With Measurement Fading: A Multiple Description Coding Scheme IEEE Transactions on Automatic Control | 2022-02-24 | Paper |
| scientific article; zbMATH DE number 7478142 (Why is no real title available?) | 2022-02-22 | Paper |
Event-triggered control for discrete-time systems with unknown nonlinearities: an interval observer-based approach International Journal of Systems Science. Principles and Applications of Systems and Integration | 2022-02-08 | Paper |
Distributed set-membership filtering for discrete-time systems subject to denial-of-service attacks and fading measurements: a zonotopic approach Information Sciences | 2021-12-02 | Paper |
| Image mosaic based on structural similarity and fuzzy reasoning | 2021-10-28 | Paper |
| New assumptions and efficient cryptosystems from the \(e\)-th power residue symbol | 2021-06-08 | Paper |
Stability of two weakly coupled elastic beams with partially local damping Mathematical Problems in Engineering | 2021-05-14 | Paper |
Variance-constrained \(H_\infty\) state estimation for time-varying multi-rate systems with redundant channels: the finite-horizon case Information Sciences | 2021-02-04 | Paper |
On quantized \(\mathcal{H}_\infty\) filtering for multi-rate systems under stochastic communication protocols: the finite-horizon case Information Sciences | 2020-09-09 | Paper |
Distributed resilient filtering of large-scale systems with channel scheduling Kybernetika | 2020-07-02 | Paper |
Fairness analysis for multiparty nonrepudiation protocols based on improved strand space Discrete Dynamics in Nature and Society | 2019-08-23 | Paper |
Deconvolution filtering for nonlinear stochastic systems with randomly occurring sensor delays via probability-dependent method Abstract and Applied Analysis | 2019-08-16 | Paper |
STP-LWE: A variant of learning with error for a flexible encryption Mathematical Problems in Engineering | 2019-02-08 | Paper |
Star-topological encryption: talking to the sever but hiding identities to others Fundamenta Informaticae | 2018-05-03 | Paper |
An Efficient Construction of Quantum Attack Resistant Proxy Re-Encryption Based on (Semi)group Factorization Problems* Fundamenta Informaticae | 2018-05-03 | Paper |
Minimal logarithmic signatures for one type of classical groups Applicable Algebra in Engineering, Communication and Computing | 2017-06-14 | Paper |
| scientific article; zbMATH DE number 6672421 (Why is no real title available?) | 2017-01-06 | Paper |
Event-based distributed set-membership filtering for a class of time-varying non-linear systems over sensor networks with saturation effects International Journal of General Systems | 2016-08-29 | Paper |
Construction of DNA codes by using algebraic number theory Finite Fields and their Applications | 2015-12-17 | Paper |
Minimal logarithmic signatures for the unitary group \(U_n(q)\) Designs, Codes and Cryptography | 2015-09-30 | Paper |
Certificate-based proxy decryption systems with revocability in the standard model Information Sciences | 2015-09-24 | Paper |
A lattice-based signcryption scheme without random oracles Frontiers of Computer Science | 2015-08-05 | Paper |
All exceptional groups of Lie type have minimal logarithmic signatures Applicable Algebra in Engineering, Communication and Computing | 2014-10-02 | Paper |
ReliableH∞filtering for discrete piecewise linear systems with infinite distributed delays International Journal of General Systems | 2014-05-16 | Paper |
Chameleon hash functions and one-time signature schemes from inner automorphism groups Fundamenta Informaticae | 2014-02-11 | Paper |
Probability-dependent static output feedback control for discrete-time nonlinear stochastic systems with missing measurements Mathematical Problems in Engineering | 2013-06-11 | Paper |
Discrete logarithm based additively homomorphic encryption and secure data aggregation Information Sciences | 2012-07-13 | Paper |
Provably secure and efficient proxy signature with untrustworthy proxy signer Journal of Shanghai Jiaotong University (Science) | 2012-01-01 | Paper |
New constructions of public-key encryption schemes from conjugacy search problems Information Security and Cryptology | 2011-07-29 | Paper |
New identity-based proxy re-encryption schemes to prevent collusion attacks Lecture Notes in Computer Science | 2010-11-26 | Paper |
Multi-use and unidirectional identity-based proxy re-encryption schemes Information Sciences | 2010-09-15 | Paper |
A new impossible differential attack on SAFER ciphers Computers and Electrical Engineering | 2010-04-07 | Paper |
Regularity and Green's relations for finite \(E\)-order-preserving transformations semigroups. Semigroup Forum | 2010-03-02 | Paper |
New designing of cryptosystems based on quadratic fields Science in China. Series F | 2008-11-10 | Paper |
Transitive Signatures from Braid Groups Lecture Notes in Computer Science | 2008-04-11 | Paper |
Proxy Re-signature Schemes Without Random Oracles Lecture Notes in Computer Science | 2008-04-11 | Paper |
Developing semantic business model for VO construction on semantic grid Wuhan University Journal of Natural Sciences | 2007-06-08 | Paper |
Simulatability and security of certificateless threshold signatures Information Sciences | 2007-02-20 | Paper |
The braid-based bit commitment protocol Journal of Shanghai Jiaotong University (Science) | 2006-11-15 | Paper |
| scientific article; zbMATH DE number 54568 (Why is no real title available?) | 1992-09-26 | Paper |