Guangwu Xu
Citée par
Citée par
New bounds for restricted isometry constants
TT Cai, L Wang, G Xu
IEEE Transactions on Information Theory 56 (9), 4388-4394, 2010
On Recovery of Sparse Signals ViaMinimization
TT Cai, G Xu, J Zhang
IEEE Transactions on Information Theory 55 (7), 3388-3397, 2009
Shifting inequality and recovery of sparse signals
TT Cai, L Wang, G Xu
IEEE Transactions on Signal processing 58 (3), 1300-1308, 2009
Stable recovery of sparse signals and an oracle inequality
TT Cai, L Wang, G Xu
IEEE Transactions on Information Theory 56 (7), 3516-3522, 2010
Refinements of Miller's algorithm for computing the Weil/Tate pairing
IF Blake, VK Murty, G Xu
Journal of Algorithms 58 (2), 134-149, 2006
Conditional cube attack on reduced-round Keccak sponge function
S Huang, X Wang, G Xu, M Wang, J Zhao
Advances in Cryptology–EUROCRYPT 2017: 36th Annual International Conference …, 2017
Compressed Sensing Matrices from Fourier Matrices
G Xu, Z Xu
IEEE Transactions on Information Theory 61, 469-478, 2015
Virtual spectrophotometric measurements for biologically and physically based rendering
GVG Baranoski, JG Rokne, G Xu
The Visual Computer 17 (8), 506-518, 2001
A note on BDD problems with λ2-gap
M Liu, X Wang, G Xu, X Zheng
Information Processing Letters 114 (1-2), 9-12, 2014
Distinguishing and second-preimage attacks on CBC-like MACs
K Jia, X Wang, Z Yuan, G Xu
International Conference on Cryptology and Network Security, 349-361, 2009
Splitting properties of operator bimodules and operator amenability of Kac algebras
ZJ Ruan, G Xu
A. Gheondea, RN Gologan and D. Timotin, Operator theory, operator algebras …, 1997
Provably secure NTRU instances over prime cyclotomic rings
Y Yu, G Xu, X Wang
IACR International Workshop on Public Key Cryptography, 409-434, 2017
New birthday attacks on some MACs based on block ciphers
Z Yuan, W Wang, K Jia, G Xu, X Wang
Annual International Cryptology Conference, 209-230, 2009
Toeplitz random encoding MR imaging using compressed sensing
D Liang, G Xu, H Wang, KF King, D Xu, L Ying
2009 IEEE International Symposium on Biomedical Imaging: From Nano to Macro …, 2009
A note on window τ-NAF algorithm
IF Blake, VK Murty, G Xu
Information Processing Letters 95 (5), 496-502, 2005
Nonadjacent radix-τ expansions of integers in Euclidean imaginary quadratic number fields
IF Blake, VK Murty, G Xu
Canadian Journal of Mathematics 60 (6), 1267-1282, 2008
Mathematical foundations of public key cryptography
X Wang, G Xu, M Wang, X Meng
CRC Press, 2015
On the 1-Norm Invariant Convex k-Sparse Decomposition of Signals
G Xu, Z Xu
Journal of the Operations Research Society of China 1 (4), 537-541, 2013
Applying the exponential Chebyshev inequality to the nondeterministic computation of form factors
GVG Baranoski, JG Rokne, G Xu
Journal of Quantitative Spectroscopy and Radiative Transfer 69 (4), 447-467, 2001
Efficient algorithms for Koblitz curves over fields of characteristic three
IF Blake, VK Murty, G Xu
Journal of Discrete Algorithms 3 (1), 113-124, 2005
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20