PPRU: A privacy-preserving reputation updating scheme for cloud-assisted vehicular networks Z Liu, L Wan, J Guo, F Huang, X Feng, L Wang, J Ma IEEE Transactions on Vehicular Technology, 2023 | 38 | 2023 |
Further results on generalized bent functions and their complete characterization S Mesnager, C Tang, Y Qi, L Wang, B Wu, K Feng IEEE Transactions on Information Theory 64 (7), 5441-5452, 2018 | 25 | 2018 |
On the fundamental limit of orthogonal matching pursuit for multiple measurement vector H Li, L Wang, X Zhan, DK Jain Ieee Access 7, 48860-48866, 2019 | 22 | 2019 |
Further results on permutation polynomials of the form (xpm− x+ δ) s+ L (x) over Fp2m L Wang, B Wu, Z Liu Finite Fields and Their Applications 44, 92-112, 2017 | 20 | 2017 |
Coefficient grouping: Breaking chaghri and more F Liu, R Anand, L Wang, W Meier, T Isobe Annual International Conference on the Theory and Applications of …, 2023 | 18 | 2023 |
General constructions of permutation polynomials of the form (x2m+ x+ δ) i (2m− 1)+ 1+ x over F22m L Wang, B Wu Finite Fields and Their Applications 52, 137-155, 2018 | 17 | 2018 |
An RIP condition for exact support recovery with covariance-assisted matching pursuit H Ge, L Wang, J Wen, J Xian IEEE Signal Processing Letters 26 (3), 520-524, 2019 | 11 | 2019 |
Three new infinite families of bent functions L Wang, B Wu, Z Liu, D Lin Science China Information Sciences 61, 1-14, 2018 | 10 | 2018 |
Sparse recovery with block multiple measurement vectors algorithm Y Shi, L Wang, R Luo IEEE Access 7, 9470-9475, 2019 | 9 | 2019 |
Antitampering scheme of evidence transfer information in judicial system based on blockchain J Guo, X Wei, Y Zhang, J Ma, H Gao, L Wang, Z Liu Security and Communication Networks 2022, 2022 | 7 | 2022 |
Efficient Anonymous Authentication and Privacy-Preserving Reliability Evaluation for Mobile Crowdsensing in Vehicular Networks Y Cheng, J Ma, Z Liu, L Wang, Z Ying, X Chen IEEE Internet of Things Journal 10 (17), 14925-14939, 2023 | 5 | 2023 |
Further results on permutation trinomials with Niho exponents L Wang, B Wu, X Yue, Y Zheng Cryptography and Communications 11, 1057-1068, 2019 | 5 | 2019 |
On inverses of some permutation polynomials over finite fields of characteristic three Y Zheng, F Wang, L Wang, W Wei Finite Fields and Their Applications 66, 101670, 2020 | 3 | 2020 |
Revisiting the Boomerang Attack from a Perspective of 3-differential L Wang, L Song, B Wu, M Rahman, T Isobe IEEE Transactions on Information Theory, 2023 | 2 | 2023 |
A new class of generalized almost perfect nonlinear power function L Wang, L Wang, B Zhang Finite Fields and Their Applications 82, 102051, 2022 | 2 | 2022 |
Secure transmissions in wireless multiuser networks using message correlation H He, L Wang China Communications 19 (2), 186-200, 2022 | 2 | 2022 |
A Trusted and Privacy-Preserving Carpooling Matching Scheme in Vehicular Networks H Sun, L Wei, L Wang, J Yin, W Ma Journal of Information Security 13 (1), 1-22, 2022 | 2 | 2022 |
Two Physics-Based Schwarz Preconditioners for Three-Temperature Radiation Diffusion Equations in High Dimensions X Yue, J He, X Xu, S Shu, L Wang Communications in Computational Physics 32 (3), 829-849, 2022 | 1 | 2022 |
A New Relaxed Splitting Preconditioner for Multidimensional Multi-Group Radiation Diffusion Equations X Yue, C Wang, X Xu, L Wang, S Shu EAST ASIAN JOURNAL ON APPLIED MATHEMATICS 12 (1), 163-184, 2022 | 1 | 2022 |
Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery Q Yang, L Song, N Zhang, D Shi, L Wang, J Zhao, L Hu, J Weng Journal of Cryptology 37 (2), 1-62, 2024 | | 2024 |