| Publication | Date of Publication | Type |
|---|
| Supply chain pricing strategies for advance selling with a deposit | 2024-11-13 | Paper |
| A preconditioned iterative method for coupled fractional partial differential equation in European option pricing | 2024-09-26 | Paper |
| Non-commutative probability insights into the double-scaling limit SYK model with constant perturbations: moments, cumulants and \(q\)-independence | 2024-08-08 | Paper |
| Non-commutative probability insights into the double-scaling limit SYK Model with constant perturbations: moments, cumulants, and $q$-independence | 2023-12-07 | Paper |
| Influences of information sharing and online recommendations in a supply chain: reselling versus agency selling | 2023-11-16 | Paper |
| Event-based distributed resilient control strategy for microgrids subject to disturbances and hybrid attacks | 2023-10-11 | Paper |
| Linear-Quadratic Non-Zero Sum Backward Stochastic Differential Game With Overlapping Information | 2023-09-28 | Paper |
| Presence of piracy and legal protection: decisions in the digital goods market under different contracts | 2023-07-10 | Paper |
| Minimizers of \(L^2\)-subcritical inhomogeneous variational problems with a spatially decaying nonlinearity | 2023-04-19 | Paper |
| Numerical simulation for 2D double-diffusive convection (DDC) in rectangular enclosures based on a high resolution upwind compact streamfunction model. I: Numerical method and code validation | 2023-03-14 | Paper |
| Sachdev–Ye–Kitaev model with an extra diagonal perturbation: phase transition in the eigenvalue spectrum | 2023-02-06 | Paper |
| The algebraic area of closed lattice random walks | 2022-12-07 | Paper |
| Pribank: confidential blockchain scaling using short commit-and-proof NIZK argument | 2022-07-06 | Paper |
| SYK model with an extra diagonal perturbation: phase transition in the eigenvalue spectrum | 2022-04-21 | Paper |
| Mathematics of Reinforcement Learning | 2022-02-25 | Paper |
| Minimizers of $L^2$-Subcritical Inhomogeneous Variational Problems with A Spatially Decaying Nonlinearity | 2021-11-30 | Paper |
| A nonhomogeneous mean-field linear-quadratic optimal control problem and application | 2021-11-04 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4998250 | 2021-07-01 | Paper |
| Max–Min Fair Sensor Scheduling: Game-Theoretic Perspective and Algorithmic Solution | 2021-05-28 | Paper |
| Optimal Scheduling of Multiple Sensors Over Lossy and Bandwidth Limited Channels | 2020-10-05 | Paper |
| Crowd behavior analysis via curl and divergence of motion trajectories | 2020-08-20 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5195921 | 2019-10-02 | Paper |
| Optimal scheduling of multiple sensors over shared channels with packet transmission constraint | 2019-02-05 | Paper |
| Thouless bandwidth formula in the Hofstadter model | 2018-01-18 | Paper |
| Partially observed linear quadratic control problem with delay via backward separation method | 2017-11-02 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5371416 | 2017-10-20 | Paper |
| Maximum principle for partially-observed optimal control problems of stochastic delay systems | 2017-09-01 | Paper |
| A maximum principle for general backward stochastic differential equation | 2017-08-25 | Paper |
| Non-Zero Sum Differential Games of Backward Stochastic Differential Delay Equations Under Partial Information | 2017-03-31 | Paper |
| https://portal.mardi4nfdi.de/entity/Q2992693 | 2016-08-10 | Paper |
| Optimal control problem of backward stochastic differential delay equation under partial information | 2015-12-21 | Paper |
| LHash: A Lightweight Hash Function | 2015-12-02 | Paper |
| Cryptanalysis of the Round-Reduced GOST Hash Function | 2015-12-02 | Paper |
| Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes | 2015-11-20 | Paper |
| The parallel-cut meet-in-the-middle attack | 2015-11-19 | Paper |
| A New Information Criterion Based on Langevin Mixture Distribution for Clustering Circular Data with Application to Time Course Genomic Data | 2015-10-26 | Paper |
| Cryptanalysis of Round-Reduced $$\mathtt{LED}$$ | 2015-09-18 | Paper |
| Security Analysis of PRINCE | 2015-09-18 | Paper |
| Variable selection for sparse high-dimensional nonlinear regression models by combining nonnegative garrote and sure independence screening | 2015-04-28 | Paper |
| Analysis of BLAKE2 | 2014-03-28 | Paper |
| Improved Cryptanalysis of Reduced RIPEMD-160 | 2013-12-10 | Paper |
| Cryptanalysis of HMAC/NMAC-Whirlpool | 2013-12-10 | Paper |
| Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks | 2013-03-19 | Paper |
| Functional data analysis for point processes with rare events | 2013-03-07 | Paper |
| (Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others | 2013-01-08 | Paper |
| Preimage Attacks on Step-Reduced SM3 Hash Function | 2012-11-01 | Paper |
| Response-Adaptive Regression for Longitudinal Data | 2011-11-21 | Paper |
| Hyper-Sbox View of AES-like Permutations: A Generalized Distinguisher | 2011-07-29 | Paper |
| Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE | 2010-12-07 | Paper |
| https://portal.mardi4nfdi.de/entity/Q3164678 | 2010-11-05 | Paper |
| Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited | 2010-07-13 | Paper |
| Cryptanalysis of the LANE Hash Function | 2009-12-09 | Paper |
| https://portal.mardi4nfdi.de/entity/Q5472495 | 2006-06-12 | Paper |