Research

Share       

Recent Publications

Name Recent Publications
BEI Xiaohui
  1. Chaoli Zhang, Xiang Wang, Fan Wu, and Xiaohui Bei, Efficient Auctions with Identity-Dependent Mixed Externalities, International Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2018, extended abstract (accepted).
  2. Xiaohui Bei and Shengyu Zhang, Algorithms for Trip-Vehicle Assignment in Ride-Sharing, AAAI Conference on Artificial Intelligence (AAAI), 2018.
  3. Xiaohui Bei, Jugal Garg, Martin Hoefer, and Kurt Mehlhorn, Earning Limits in Fisher Markets with Spending-Constraint Uti​​​lities, International Symposium on Algorithmic Game Theory (SAGT), 2017.
  4. Xiaohui Bei, Ning Chen, Nikolai Gravin, and Pinyan Lu, Worst-Case Mechanism Design via Bayesian Analysis, SIAM Journal on Computing (SICOMP) 46, 1428–1448 (2017).
  5. Xiaohui Bei, Youming Qiao, and Shengyu Zhang, Networked Fairness in Cake Cutting, International Joint Conference on Artificial Intelligence (IJCAI), 2017
  6. Guangda Huzhang, Xin Huang, Shengyu Zhang, and Xiaohui Bei, Online Roommate Allocation Problem, International Joint Conference on Artificial Intelligence (IJCAI), 2017
  7. Xiaohui Bei, Ning Chen, Guangda Huzhang, Biaoshuai Tao, and Jiajun Wu, Cake Cutting: Envy and TruthInternational Joint Conference on Artificial Intelligence (IJCAI), 2017
CHAN Song Heng
  1. S. H. Chan, T. P. N. Ho  and R. Mao, Truncated series from the quintuple product identity, J. Number Theory 169 420–438 (2016).
CHEE Yeow Meng
  1. ​Y. M. Chee, H. M. Kiah, S. Ling, and H. Wei, Geometric orthogonal codes of size larger than optical orthogonal codes, IEEE Transactions on Information Theory, 2017.
  2. Y. M. Chee, T. Etzion, H. M. Kiah, and A. Vardy, Cooling codes: Thermal-management coding for high-performance interconnects, IEEE Transactions on Information Theory, 2017.
  3. Y. M. Chee and X. Zhang, Linear size constant-composition codes meeting the Johnson bound, IEEE Transactions on Information Theory 64, 909 (2018).
  4. Y. M. Chee, H. M. Kiah, H. Zhang, and X. Zhang, Constructions of optimal and near-optimal multiply constant-weight codes, IEEE Transactions on Information Theory 63, 3621–3629 (2017).
CHUA Chek Beng
  1. C. B. Chua and L. T. K. Hien, A superlinearly convergent smoothing Newton continuation algorithm for variational inequalities over definable sets, SIAM Journal on Optimization 25, 1034–1063 (2015).
Fedor DUZHIN
  1. F. ​Duzhin and A. Gustafsson, Machine Learning-Based App for Self-Evaluation of Teacher-Specific Instructional Style and Tools. Education Sciences 8, 7 (2018).
  2. A. V. Smarun, F. Duzhin, M. Petković, and D. Vidović, Alkene-assisted cis-to-trans isomerization of non-conjugated polyunsaturated alkenes, Dalton Transactions 46, 14244-14250 (2017).
Gary Greaves
  1. ​​G. R. W. Greaves, Equiangular line systems and switching classes containing regular graphs, Linear Algebra Appl. 536, 31-51 (2018).
  2. X.-M. Cheng, G. R. W. Greaves, and J. H. Koolen, Graphs with three eigenvalues and second largest eigenvalue at most 1, J. Combin. Theory Ser. B 129, 55 (2018).
  3. G. Greaves and S. Suda, Symmetric and skew-symmetric {0,±1}-matrices with large determinants, J.Combin. Designs 25, 507–522 (2017).
  4. G. R. W. Greaves, A. Munemasa, and A. Peng, On a lower bound for the Laplacian eigenvalues of a graph, Graphs Combin. 33, 1509–1519 (2017).
GUO Jian
  1. ​Zhenzhen Bao, Jian Guo, and Lei Wang, SoK: Functional Graphs and Their Applications in Generic Attacks on Iterated Hash Constructions, FSE 2018.
  2. Colin Chaigneau, Thomas Fuhr, Henri Gilbert, Jian Guo, Jeremy Jean, Jean.-Rene Reinhard, and Ling Song, Key-Recovery Attacks on Full Kravatte, FSE 2018.
  3. Subhadeep Banik, Takanori Isobe, Tingting Cui, and Jian Guo, Some Cryptanalysis Results on Lizard, FSE 2018.
  4. Zhenzhen Bao, Lei Wang, Jian Guo, and Dawu Gu, Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners, CRYPTO 2, 404–427 (2017).
  5. Ling Song, Guohong Liao, and Jian Guo, Non-full Sbox Linearization: Applications to Collision Attacks on Round-Reduced Keccak, CRYPTO 2, 428–451 (2017).
Erik Anders Mikael GUSTAVSSON
  1. A. Gustafsson, Approximation with Rational Interpolants in for Dini Domains, Computational Methods and Function Theory 17, 381 (2017)
  2. F. Duzhin and A. Gustafsson, Machine Learning-Based App for Self-Evaluation of Teacher-Specific Instructional Style and Tools, Education Sciences 8, 7 (2018).
HOANG Viet Ha
  1. ​D. M. Brown and V. H. Hoang, A hierachical finite element Monte Carlo method for stochastic two-scale elliptic equation, Journal of Computational and Applied Mathematics 323, 16 (2017). 
  2. Y. Efendiev, W. T. Leung, S. W. Cheung, N. Guha, V. H. Hoang and B. Mallick, Bayesian multiscale finite element methods. Modeling missing subgrid information probabilistically, International Journal for Multiscale Computational Engineering (accepted) (2017).
  3. V. T. Chu and V. H. Hoang (2017), High dimensional finite elements for multiscale Maxwell type equations, IMA Journal of Numerical Analysis 38, 227 (2018).
KIAH Han Mao
  1. ​Y. M. Chee, H. M. Kiah, S. Vardy, V. K. Wu and E. Yaakobi, Coding for Racetrack Memories, IEEE Transactions on Information Theory, Accepted Feb 2018
  2. S. M. T. Yazdi, H. M. Kiah, R. Gabrys, and O. Milenkovic, Mutually Uncorrelated Primers for DNA-Based Data Storage, IEEE Transactions on Information Theory, Accepted Dec 2017.
  3. Y. M. Chee, H. M. Kiah, S. Ling, and H. Wei, Geometric Orthogonal Codes of Size Larger than Optical Orthogonal Codes, IEEE Transactions on Information Theory, Accepted Dec 2017.
  4. Y. M. Chee, T. Etzion, H. M. Kiah, and A. Vardy, Cooling Codes: Thermal-Management Coding for High-Performance Interconnects, IEEE Transactions on Information Theory, Accepted Nov 2017.
  5. Z. Chang, J. Chrisnata, M. F. Ezerman, and H. M. Kiah, Rates of DNA Sequence Profiles for Practical Values of Read Lengths, IEEE Transactions on Information Theory 63, 7166–7177 (2017).
  6. R. Gabrys, H. M. Kiah, and O. Milenkovic Asymmetric Lee Distance Codes for DNA-Based Storage, IEEE Transactions on Information Theory 63, 4982–4995 (2017).
  7. Y. M. Chee, H. M. Kiah, H. Zhang, and X. Zhang, Constructions of Optimal and Near- Optimal Multiply Constant-Weight Codes, IEEE Transactions on Information Theory 63, 3621–3629 (2017).
  8. Z. Wang, H. M. Kiah, Y. Cassuto, J. Bruck, Switch Codes: Codes for Fully Parallel Reconstruction, IEEE Transactions on Information Theory 63 2061–2075 (2017).
​Hartmut KLAUK
  1. ​Hartmut Klauck, The Complexity of Quantum Disjointness, 42nd International Symposium on Mathematical Foundations of Computer Science (MFCS), 2017.
  2. D. Gavinsky, R. Jain, H. Klauck, S. Kundu, T. Lee, M. Santha, S. Sanyal, and J. Vihrovs, Quadratically Tight Relations for Randomized Query Complexity, 13th International Computer Science Symposium in Russia, 2018.
Andrew ​ James KRICKER
  1. A. ​Kricker, Non-commutative Chern-Weil theory and the combina­torics of wheeling, Duke Math. Journal, 157 223–281 (2011).
KU Cheng Yeaw
  1. ​C. Y. Ku, T. Lau, and K. B. Wong, The spectrum of eigenvalues for certain subgraphs of the k-point fixing graph, Linear Algebra and its Applications 543, 72–91 (2018).
  2. C. Y. Ku and K. B. Wong, An Erdős-Ko-Rado theorem For Minimal Covers, Bulletin of the Korean Mathematical Society 54, 875–894 (2017).
  3. C. Y. Ku, T. Lau, and K. B. Wong, On the partition associated to the smallest eigenvalues of the k-point fixing graph, European Journal of Combinatorics 63, 70–94 (2017).
​LE Hai Khoi
  1. ​Le Hai Khoi, On N_p-spaces in the ball, in Geometric Analysis, Proceedings of KSCV12, in press (2018).
  2. Pham Trong Tien and Le Hai Khoi, Differences of weighted composition operators between the Fock spaces, Monatshefte fur Mathematik, doi:10.1007/s00605-018-1179-6 (2018).
  3. E. ​Fricain, Le Hai Khoi, and P. Lefevre, Representing systems generated by reproducing kernels, Indagationes Mathematicae (in press, 2018).
  4. Pham Trong Tien and Le Hai Khoi, Weighted composition operators between different Fock spaces, Potential Analysis (in press, 2018).
  5. B. Y. Hu, Le Hai Khoi, and T. Le, On the structure of Np spaces in the ball, Acta Mathematica Vietnamica, doi:10.1007/s40306-017-0232-1 (2017).
  6. P. V. Hai and Le Hai Khoi, Complex symmetric weighted composition operators on the Fock space in several variables, Complex Variables & Elliptic Equations 63, 391–405 (2018).
  7. M. L. Doan, Le Hai Khoi, and Trieu Le, Composition operators on Hilbert spaces of entire functions of several variables, Integral Equations & Operator Theory 88, 301–330 (2017).
  8. M. L. Doan, B. Y. Hu, Le Hai Khoi, and H. Queffelec, Approximation numbers for composition operators on spaces of entire functions, Indagationes Mathematicae 28, 294–305 (2017).
  9. P. V. Hai and Le Hai Khoi, Complex symmetric C0-semigroups on the Fock space, Journal of Mathematical Analysis & Applications 435, 1367–1389 (2017).
  10. M. L. Doan and Le Hai Khoi, Closed range and cyclicity of composition operators on Hilbert spaces of entire functions, Complex Variables & Elliptic Equations, doi:10.1080/17476933.2017.1391799 (2017).
​Troy LEE
  1. ​G. Braun, R. Jain, T. Lee, and S. Pokutta, Information-theoretic approximations of the nonnegative rank, Computational Complexity 26, 147 (2017).
  2. T. Lee, Z. Wei, and R. de Wolf, Some upper and lower bounds on positive semide nite rank.Mathematical Programming 162, 495 (2017).
Li Yi
  1. Anna Gilbert, Yi Li, Ely Porat and Martin Strauss, For-all Sparse Recovery in Near-Optimal Time, ACM Transactions on Algorithms 13, 32 (2017).
  2. Yi Li and David Woodruff, Embeddings of Schatten Norms with Applications to Data Streams, Proceedings of ICALP2017, 60:1–60:14 (2017).
  3. Sudipto Guha, Yi Li and Qin Zhang, Clustering Distributed Data with Outliers, Proceedings of SPAA 2017. [Best paper award]
LIM Kay Jin
  1. ​S. Danz and K. J. Lim, Signed Young modules and simple Specht modules, Adv. Math. 307, 369-416 (2017). 
  2. E. Giannelli, K. J. Lim, W. O’Donovan and M. Wildon, On signed p-Kostka numbers and the indecomposable signed Young permutation modules, J. Group Theory. http://dx.doi.org/10.1515/jgth-2017-0007. 
  3. K. J. Lim and K. M. Tan, Signed Young Rule and semistandard homomorphisms, submitted.
  4. K. J. Lim, Straightening rule for an m-truncated polynomial ring, submitted.
  5. Y. Jiang, K. J. Lim and J. L. Wang, On the Brauer constructions and generic Jordan types of Young modules, submitted.
LING San
  1. ​B. Chen, L. Lin, S. Ling, and H. Liu, Three new classes of optimal frequency-hopping sequence sets, Designs, Codes and Cryptography 83, 219 – 232 (2017).
  2. B. Chen, L. Lin and S. Ling, External difference families from finite fields, Journal of Combinatorial Designs 25, 36–48 (2017).
  3. S. Ling, D. H. Phan, D. Stehlé, and R. Steinfeld, Hardness of k-LWE and applications in traitor tracing, Algorithmica 79, 1318–1352 (2017).
  4. Z. Chang, M.F. Ezerman, S. Ling, and H. Wang, Construction of de Bruijn sequences from product of two irreducible polynomials, Cryptography and Communications 10, 251–274 (2018).
  5. Z. Chang, M.F. Ezerman, S. Ling, and H. Wang, The cycle structure of LFSR with arbitrary characteristic polynomial over finite fields, Cryptography and Communications 10, 251–275 (2018).
  6. M. Kim, H. T. Lee, S. Lingm and H. Wang, On the efficiency of FHE-based private queries, IEEE Transactions on Dependable and Secure Computing 15, 357 (2018).
  7. M. Kim, H.T. Lee, S. Ling, B.H.M. Tan, and H. Wang, Private compound wildcard queries using fully homomorphic encryption, IEEE Transactions on Dependable and Secure Computing, to appear 
  8. Y. M. Chee, H.M. Kiah, S. Ling & H. Wei, Geometric orthogonal codes of size larger than optical orthogonal codes, IEEE Transactions on Information Theory, to appear.
NG Keng Meng
  1. ​Effective domination and the bounded jump (with Hongyuan Yu). Submitted.
  2. Automatic and polynomial-time algebraic structures (with Nikolay Bazhenov, Matthew Harrison-Trainor, Iskander Kalimullin and Alexander Melnikov). Submitted.
  3. The back-and-forth method and computability without delay (with Alexander Melnikov).Submitted.
  4. On the degree structure of equivalence relations under computable reducibility (with Hongyuan Yu). Submitted.
  5. Multiple genericity (with Michael McInerney).Submitted.
  6. A. Melnikov and K. M. Ng, Computable torsion abelian groups, Advances in Mathematics 325, 864–907 (2017).
  7. R. Downey and K. M. Ng, Splitting into degrees with low computational strength. Submitted.
  8. I. S. Kalimullin, A. Melnikov, and K. M. Ng, The diversity of categoricity without delay, Algebra and Logic 56, 256–266 (2017).
  9. R. G. Downey, M. McInerney, and K. M. Ng,  Lowness and logical depth, Theoretical Computer Science 702, 23 (2017).
  10. Minimal weak truth table degrees and computably enumerable Turing degrees (with Rod Downey and Reed Solomon). Memoirs of the American Mathematical Society. To appear.
  11. R. G. Downey, M. McInerney, and K. M. Ng,  A Friedberg enumeration of equivalence structures, Journal of Mathematical Logic 17, 1750008 (2017).
  12. W. Peng, N. Peng, K. M. Ng, K. Tanaka, and Y. Yang Optimal depth-first algorithms and equilibria of independent distributions on multi-branching trees, Information Processing Letters 125, 41-45 (2017).
  13. Turing degrees in Polish spaces and decomposability of Borel functions (with Vassilios Gregoriades and Takayuki Kihara). Submitted.
  14. I. S. Kalimullin, A. Melnikov, and K. M. Ng,  Algebraic structures computable without delay, Theoretical Computer Science 674, 73–98 (2017).
  15. A normal form theorem on computable functions over real numbers (with Nazanin R. Tavana and Yue Yang). Submitted.
Frédérique OGGIER
  1. ​F. Oggier and J.-C. Belfiore, On the Secrecy Gain of Extremal Even l-modular Lattices, Experimental Mathematics, doi:10.1080/10586458.2017.1423249 (2018)
  2. C. Maire and F. Oggier, Maximal Order Codes over Number Fields, Journal of Pure and Applied Algebra 222, 1827 (2018).
  3. X. Hou and F. Oggier, Modular Lattices from a Variation of Construction A over Number Fields, Advances in Mathematics of Communication 11, 719 (2017).
Thomas PEYRIN
  1. ​J. Jean, T. Peyrin and S. M. Sim, Optimizing Implementations of Lightweight Building Blocks,  in Fast Software Encryption - FSE 2018 and Transactions on Symmetric Cryptology - ToSC 2017-4 eprint
  2. S. Bhasin, D. Jap and T. Peyrin, Practical Evaluation of FSE 2016 Customized Encoding Countermeasure, in Fast Software Encryption - FSE 2018 and Transactions on Symmetric Cryptology - ToSC 2017-3 paper 
  3. C. Cid, T. Huang, T. Peyrin, Y. Sasaki and L. Song, Cryptanalysis of Deoxys and its Internal Tweakable Block Ciphers, in Fast Software Encryption - FSE 2018 and Transactions on Symmetric Cryptology - ToSC 2017-3 eprint 
  4. K. Khoo, E. Lee, T. Peyrin and S. M. Sim, Human-readable Proof of the Related-Key Security of AES-128, in Fast Software Encryption - FSE 2018 and Transactions on Symmetric Cryptology - ToSC 2017-2 eprint 
Nicolas PRIVAULT
  1. ​​Y. Liu and N. Privault, A recursive algorithm for optimal exercise pricing in regime-switching models. Methodology and Computing in Applied Probability 20, 369-384 (2018).
  2. G. Serafin and N. Privault, Stein approximation for functionals of uniform random sequences. Electronic Journal of Probability 23, 1-34 (2018).
  3. N. Privault and X. Wei, Fast computation of risk measures for variable annuities with additional earnings by conditional moment matching. ASTIN Bulletin - The Journal of the International Actuarial Association 48, 171-196 (2018).
  4. I. Flint, H.-B. Kong, N. Privault, P. Wang, and D. Niyato, Analysis of heterogeneous wireless networks with Poisson hard-core point process. IEEE Transactions on Wireless Communications 16, 7152-7167 (2017).
  5. Y. Liu and N. Privault, An integration by parts formula in a Markovian regime switching model and application to sensitivity analysis. Stochastic Analysis and Applications 35, 919-940 (2017).
  6. N. Privault and Q.H. She, Conditional Stein approximation for Ito and Skorohod integrals. Statistics & Probability Letters 128, 1-7 (2017).
  7. I. Flint, H.-B. Kong, N. Privault, P. Wang and D. Niyato, Wireless energy harvesting sensor networks: Boolean-Poisson modeling and analysis. IEEE Transactions on Wireless Communications 16, 7108-7122 (2017).
  8. Y. Liu and N. Privault, Selling at the ultimate maximum in a regime-switching model, International Journal of Theoretical and Applied Finance 20, 1750018 (2017).
  9. A. Prayoga and N. Privault, Pricing CIR yield options by conditional moment matching, Asia-Pacific Financial Markets 24, 19-38 (2017).
PUN Chi Seng
  1. M.C. Chiu, C.S. Pun, and H.Y. Wong, Big Data Challenges of High-Dimensional Continuous-Time Mean-Variance Portfolio Selection and a Remedy, Risk Analysis 37, 1532 (2017).
Bernhard SCHMIDT
  1. ​K. H. Leung and B. Schmidt, Structure of Group Invariant Weighing Matrices of Small Weight. J. Comb. Theory Ser. A 154, 114-128 (2018). 
  2. T. D. Duc and B. Schmidt, Unique Differences in Symmetric Subsets of Fp, Combinatorica 37, 167-182 (2017).
TANG Wee Kee
  1. D. H. Leung and W. K. Tang, Nonlinear Order Isomorphism of Function Spaces, Dissertationes Math. 517, 1-75 (2016).
  2. W. K. Tang, Persistence of Banach lattices under nonlinear order isomorphisms, Positivity 20, 709-717 (2016).
  3. D. H. Leung and W. K. Tang, Functions that are Lipschitz in the small, Revista Math. Complutense 20, 709-717 (2016).
TONG Ping
  1. L. ​Chai, P. Tong, and X. Yang, Frozen Gaussian approximation for three-dimensional seismic wave propagation, Geophysical Journal International 208, 59-74 (2017).
  2. P. Tong, D. H. Yang, D. Li, and Q. Liu, Time-evolving seismic tomography: The method and its application to the 1989 Loma Prieta and 2014 South Napa earthquake area, California, Geophysical Research Letters 44, 3165-3175 (2017).
  3. L. Chai, P. Tong, and X. Yang, Frozen Gaussian approximation for 3-D seismic tomography, Inverse Problems (in press).
WANG Huaxiong
  1. Zuling Chang, San Ling, and Huaxiong Wang, Construction of de Bruijn Sequences from Product of Two Irreducible Polynomials, Cryptography and Communications 10, 251 (2018).
  2. Chang Xu, Rongxing Lu, Huaxiong Wang, Liehuang Zhu & Cheng Huang, PAVS: A New Privacy-Preserving Data Aggregation Scheme for Vehicle Sensing Systems, Sensors (Basel) 17, E500 (2017).
WANG Li-Lian
  1. ​Chuanli Wang, Zhongqing Wang and Li-Lian Wang, A spectral collocation method for nonlinear fractional boundary value problems with a Caputo derivative. Journal of Scientific Computing, DOI: https://doi.org/10.1007/s10915-017-0616-3, 2017.
  2. Bo Wang, Li-Lian Wang and Ziqing Xie. Accurate calculation of spherical and vector sphericalharmonic expansions via spectral element grids, Advances in Computational Mathematics, DOI:https://doi.org/10.1007/s10444-017-9569-1, 2017.
  3. Jingliang Li, Heping Ma, Li-Lian Wang and Hua Wu, Spectral element methods on hybridtriangular and quadrilateral meshes, International Journal of Numerical Analysis and Modelling 15 111-133 (2018)
  4. Sheng Chen, Jie Shen and Li-Lian Wang, Laguerre functions and their applications to tempered fractional differential equations on infinite intervals. Journal of Scientific Computing, DOI:https://doi.org/10.1007/s10915-017-0495-7, 2017.
  5. Li-Lian Wang and Zhiguo Yang. A perfect absorbing layer for high-order simulation of wave scattering problems, pp. 81-101. M.L. Bittencourt et al. (eds.), Spectral and High-Order Methods for Partial Differential Equations ICOSAHOM 2016, Lecture Notes in Computational Sciences and Engineering 119, 2017. [Part of the plenary lecture at ICOSAHOM2016, Brazil].
  6. Li-Lian Wang. A review of prolate spheroidal wave functions from the perspective of spectral methods. Journal of Mathematical Study 50, 101-143 (2017).
  7. Lina Ma, Jie Shen, Li-Lian Wang and Zhiguo Yang. Wavenumber explicit analysis for timeharmonic Maxwell equations in a spherical shell and spectral approximations. IMA Journal of Numerical Analysis, DOI: https://doi.org/10.1093/imanum/drx014, 2017.
  8. Ying Gu, Wei Xiong, Li-Lian Wang and Jierong Cheng, Generalizing Mumford-Shah model for multiphase piecewise smooth image segmentation, IEEE Transactions on Image Processing 26, 942-952 (2017).
  9. Xiaojun Tang, Yang Shi and Li-Lian Wang. Equivalent fractional pseudospectral methods for solving fractional optimal control problems. Automatica 78, 333-340 (2017).
  10. Chao Zhang, Wenjie Liu and Li-Lian Wang, A new collocation scheme using non-polynomial basis functions, Journal of Scientific Computing 70, 793-818 (2017).
  11. Jing Zhang, Li-Lian Wang, Huiyuan Li and Zhimin Zhang. Optimal spectral schemes based on generalized prolate spheroidal wave functions of order −1, Journal of Scientific Computing 70, 451-477 (2017).
  12. Haixia Dong, Bo Wang, Ziqing Xie and Li-Lian Wang. An unfitted hybridizable discontinuous Galerkin method for the Poisson interface problem and its error analysis, IMA Journal of Numerical Analysis 37, 444-476 (2017).
WU Guohua
  1. G. Li, J. Ru, and G. Wu, Rudin's Lemma and Reverse Mathematics, Annals of the Japanese Association for Philosophy of Science 25, 57–66 (2017).
WU Hongjun
  1. ​Huang Tao, Ivan Tjuawinata, and Hongjun Wu, Differential-Linear Cryptanalysis of ICEPOLE, Fast Software Encryption -- FSE 2015. 
  2. Ivan Tjuawinata, Tao Huang, and Hongjun Wu, Cryptanalysis of the Authenticated Encryption Algorithm COFFE, Selected Areas in Cryptography -- SAC 2015.
  3. B. Tao and H. Wu, Improving the Biclique Cryptanalysis of AES, Australasian Conference on Information Security and Privacy -- ACISP 39 (2015).
  4. Jing Wang and Hongjun Wu, URFDS: Systematic discovery of Unvalidated Redirects and Forwards in web applications. IEEE Conference on Communications and Network Security -- CNS 2015, 697-698.
Xia Kelin
  1. Kelin Xia, Sequence-based Multiscale Modeling for high-throughput Chromosome Conformation Capture (Hi-C) Data Analysis, PLOS ONE 13, e0191899 (2018).
  2. Kelin Xia, Multiscale virtual particle based elastic network model (MVP-ENM) for biomolecular normal mode analysis, Physical Chemistry Chemical Physics 20, 658–669 (2018).
  3. Kelin Xia, Zhiming Li, and Lin Mu, Multiscale persistent functions for biomolecular structure characterization, Bulletin of Mathematical Biology 80, 1–30 (2018).
  4. Yin Cao, Bao Wang, Kelin Xia and Guo-Wei Wei, Finite volume formulation of the MIB method for elliptic interface problems, Journal of Computational and Applied Mathematics 321, 60–77 (2017).
XIANG Liming
  1. S. ​Wang and L. Xiang, Two-layer EM algorithm for ALD mixture regression: a new solution to composite quantile regression, Computational Statistics and Data Analysis 115, 136 (2017)
  2. B. B. Kanbur, L. Xiang, S. Dubey, F. H. Choo, and F. Duan, Thermoeconomic and environmental assessments of a combined cycle for the small scale LNG cold utilization, Applied Energy 204, 1148 (2017).
  3. A. Yang, X. Jiang, L. Xiang, and J. Lin, Sparse Bayesian Variable Selection in Multinomial Probit Regression Model with Application to High-dimensional Data, Communications in Statistics – Theory and Methods 46, 6137–6150 (2017).
XING Chaoping
  1. ​V. Guruswami, Chaoping Xing and C. Yuan, Subspace design based on function fields, Trans. of the AMS, to appear.
  2. S. Liu, Chaoping Xing and C. Yuan, List Decoding of Cover Metric Codes up to the Singleton Bound, IEEE Transactions on Information Theory, to appear.
  3. Chaoping Xing and C. Yuan, A new class of rank-metric codes and their list decoding beyond the unique decoding radius, IEEE Transactions on Information Theory, to appear.
  4. L. Jin and Chaoping Xing, Algebraic geometry codes with complementary duals exceed the asymptotic Gilbert-Varshamov bound,  IEEE Transactions on Information Theory, to appear.
  5. Y. Luo, L. Jin and Chaoping Xing, Repairing algebraic geometry codes, IEEE Transactions on Information Theory, 64(2018), 900-908.
  6. V. Guruswami, Chaoping Xing and C. Yuan, Subspace Designs based on Algebraic Function Fields, in Proceedings of ICALP 2017, July, 2017.
  7. R. Cramer, I. Damgard, Chaoping Xing, C. Yuan, Amortized complexity of zero-knowledge proofs revisited: achieving linear soundness slack, in proceedings of Eurocrypt 2017, April/May, 2017. 
  8. R. Cramer and Chaoping Xing, An improvement to the Hasse-Weil bound and applications to character sum, cryptography and coding, Advances in Mathematics, 309(2017), 238-253. 
  9. Y. Luo, Chaoping Xing and L You, Construction of Sequences With High Nonlinear Complexity From Function Fields, IEEE Transactions on Information Theory, 63(2017), 7646-7650.
  10. K. Feng, L. Jin, Chaoping Xing and C. Yuan, Multipartite Entangled States, Symmetric Matrices, and Error-Correcting Codes, IEEE Transactions on Information Theory, 63(2017), 5618-5627.
  11. V. Guruswami, L. Jin and Chaoping Xing, Efficient list decoding of punctured Reed-Muller codes, IEEE Transactions on Information Theory, 63(2017), 4317-4324. 
  12. L. Jin and Chaoping Xing, New MDS codes from generalized Reed-Solomon codes, IEEE Transactions on Information Theory, 63(2017), 1434-1438. 
  13. S. Liu Shu, Chaoping Xing and C. Yuan, List decodability of random subcodes of Gabidulin codes, IEEE Transactions on Information Theory, 63(2017), 159-163.