default search action
Zhuojun Liu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j25]Zhuojun Liu, Jing Chen, Claver Diallo, Uday Venkatadri:
Optimal extended warranty pricing and retailing strategies in a closed-loop supply chain. Int. J. Prod. Res. 61(10): 3435-3458 (2023) - 2022
- [i13]Jianhua Wang, Baofeng Wu, Zhuojun Liu:
Improved Degree Evaluation and Superpoly Recovery methods with Application to Trivium. CoRR abs/2201.06394 (2022)
2010 – 2019
- 2019
- [j24]Claver Diallo, Uday Venkatadri, Abdelhakim Khatab, Zhuojun Liu, El-Houssaine Aghezzaf:
Optimal joint selective imperfect maintenance and multiple repairpersons assignment strategy for complex multicomponent systems. Int. J. Prod. Res. 57(13): 4098-4117 (2019) - [j23]Zhuojun Liu, Baofeng Wu:
Recent Results on Constructing Boolean Functions with (Potentially) Optimal Algebraic Immunity Based on Decompositions of Finite Fields. J. Syst. Sci. Complex. 32(1): 356-374 (2019) - 2018
- [j22]Abdelhakim Khatab, Claver Diallo, Uday Venkatadri, Zhuojun Liu, El Houssaine Aghezzaf:
Optimization of the joint selective maintenance and repairperson assignment problem under imperfect maintenance. Comput. Ind. Eng. 125: 413-422 (2018) - [j21]Libo Wang, Baofeng Wu, Zhuojun Liu, Dongdai Lin:
Three new infinite families of bent functions. Sci. China Inf. Sci. 61(3): 032104:1-032104:14 (2018) - [j20]Claver Diallo, Uday Venkatadri, Abdelhakim Khatab, Zhuojun Liu:
Optimal selective maintenance decisions for large serial k-out-of-n: G systems under imperfect maintenance. Reliab. Eng. Syst. Saf. 175: 234-245 (2018) - [c11]Qiuping Li, Baofeng Wu, Zhuojun Liu:
Lightweight Recursive MDS Matrices with Generalized Feistel Network. IWSEC 2018: 262-278 - [c10]Qiuping Li, Baofeng Wu, Zhuojun Liu:
Direct Constructions of (Involutory) MDS Matrices from Block Vandermonde and Cauchy-Like Matrices. WAIFI 2018: 275-290 - 2017
- [j19]Libo Wang, Baofeng Wu, Zhuojun Liu:
Further results on permutation polynomials of the form (xpm-x+δ)s+L(x) over Fp2m. Finite Fields Their Appl. 44: 92-112 (2017) - 2016
- [j18]Xiaoming Zhang, Baofeng Wu, Zhuojun Liu:
Dembowski-Ostrom polynomials from reversed Dickson polynomials. J. Syst. Sci. Complex. 29(1): 259-271 (2016) - 2015
- [j17]Qingfang Jin, Zhuojun Liu, Baofeng Wu, Xiaoming Zhang:
A combinatorial condition and Boolean functions with optimal algebraic immunity. J. Syst. Sci. Complex. 28(3): 725-742 (2015) - 2014
- [j16]Jia Zheng, Baofeng Wu, Yufu Chen, Zhuojun Liu:
Constructing 2M-variable Boolean Functionswith Optimal Algebraic Immunity Based on Polar Decomposition of. Int. J. Found. Comput. Sci. 25(5): 537-552 (2014) - [j15]Baofeng Wu, Zhuojun Liu, Qingfang Jin, Xiaoming Zhang:
A note on two classes of Boolean functions with optimal algebraic immunity. J. Syst. Sci. Complex. 27(4): 785-794 (2014) - [c9]Baofeng Wu, Qingfang Jin, Zhuojun Liu, Dongdai Lin:
Constructing Boolean functions with potentially optimal algebraic immunity based on additive decompositions of finite fields (extended abstract). ISIT 2014: 1361-1365 - [i12]Baofeng Wu, Qingfang Jin, Zhuojun Liu, Dongdai Lin:
Constructing Boolean Functions With Potential Optimal Algebraic Immunity Based on Additive Decompositions of Finite Fields. CoRR abs/1401.6604 (2014) - 2013
- [j14]Baofeng Wu, Zhuojun Liu:
Linearized polynomials over finite fields revisited. Finite Fields Their Appl. 22: 79-100 (2013) - [j13]Baofeng Wu, Zhuojun Liu:
The compositional inverse of a class of bilinear permutation polynomials over finite fields of characteristic 2. Finite Fields Their Appl. 24: 136-147 (2013) - [i11]Jia Zheng, Baofeng Wu, Yufu Chen, Zhuojun Liu:
Constructing $2m$-variable Boolean functions with optimal algebraic immunity based on polar decomposition of $\mathbb{F}_{2^{2m}}^*$. CoRR abs/1304.2946 (2013) - 2012
- [c8]Xiaoming Zhang, Baofeng Wu, Qingfang Jin, Zhuojun Liu:
Constructing Generalized Bent Functions from Trace Forms of Galois Rings. ASCM 2012: 467-477 - 2011
- [i10]Baofeng Wu, Kai Zhou, Zhuojun Liu:
A new proof to the complexity of the dual basis of a type I optimal normal basis. CoRR abs/1112.3153 (2011) - [i9]Qingfang Jin, Zhuojun Liu, Baofeng Wu, Xiaoming Zhang:
A general conjecture similar to T-D conjecture and its applications in constructing Boolean functions with optimal algebraic immunity. IACR Cryptol. ePrint Arch. 2011: 515 (2011) - [i8]Zhaopeng Dai, Zhuojun Liu:
The Single Cycle T-functions. IACR Cryptol. ePrint Arch. 2011: 547 (2011) - [i7]Qingfang Jin, Zhuojun Liu, Baofeng Wu:
1-Resilient Boolean Function with Optimal Algebraic Immunity. IACR Cryptol. ePrint Arch. 2011: 549 (2011)
2000 – 2009
- 2009
- [j12]Zuowen Tan, Zhuojun Liu:
Cryptanalysis and Improvement on a Threshold Proxy Signature Scheme. J. Inf. Sci. Eng. 25(2): 619-631 (2009) - [c7]Chengxiong Zhou, Lanxiang Zhao, Zhuojun Liu:
Credit Risk and Policy of Digital Content Production Online Trading. BIFE 2009: 579-582 - 2008
- [j11]Chunming Tang, Dingyi Pei, Xiaofeng Wang, Zhuojun Liu:
Delegateable signatures based on non-interactive witness indistinguishable and non-interactive witness hiding proofs. Sci. China Ser. F Inf. Sci. 51(2): 128-144 (2008) - [c6]Yanshuo Zhang, Zhuojun Liu, Guifang Huang:
Sure Interpolation and Its Application to Hierarchical Threshold Secret Sharing Scheme. ISCSCT (1) 2008: 447-450 - [i6]Chunming Tang, Dingyi Pei, Zhuojun Liu, Zheng-an Yao, Mingsheng Wang:
Perfectly Hiding Commitment Scheme with Two-Round from Any One-Way Permutation. IACR Cryptol. ePrint Arch. 2008: 34 (2008) - 2007
- [j10]Shengqiang Liu, Zhuojun Liu, Jianliang Tang:
A delayed marine bacteriophage infection model. Appl. Math. Lett. 20(6): 702-706 (2007) - [j9]Yanshuo Zhang, Zhuojun Liu:
Dynamic and Verifiable Secret Sharing Among Weighted Participants. J. Syst. Sci. Complex. 20(4): 481-485 (2007) - [j8]Bingyu Li, Zhuojun Liu, Lihong Zhi:
A fast algorithm for solving the Sylvester structured total least squares problem. Signal Process. 87(10): 2313-2319 (2007) - 2005
- [c5]Zuowen Tan, Zhuojun Liu, Mingsheng Wang:
On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes. ISPEC 2005: 374-385 - 2004
- [c4]Zuowen Tan, Zhuojun Liu:
Provably secure delegation-by-certification proxy signature schemes. InfoSecu 2004: 38-43 - [i5]Zuowen Tan, Zhuojun Liu:
Provably Secure Delegation-by-Certification Proxy Signature Schemes. IACR Cryptol. ePrint Arch. 2004: 148 (2004) - [i4]Chunming Tang, Dingyi Pei, Zhuojun Liu, Yong He:
Non-Interactive and Information-Theoretic Secure Publicly Verifiable Secret Sharing. IACR Cryptol. ePrint Arch. 2004: 201 (2004) - [i3]Chunming Tang, Dingyi Pei, Zhuojun Liu:
Delegateable Signature Using Witness Indistinguishable and Witness Hiding Proofs. IACR Cryptol. ePrint Arch. 2004: 373 (2004) - 2003
- [j7]Jinwang Liu, Zhuojun Liu, Mingsheng Wang:
The term orderings which are compatible with composition II. J. Symb. Comput. 35(2): 153-168 (2003) - [i2]Chunming Tang, Zhuojun Liu, Mingsheng Wang:
A Verifiable Secret Sharing Scheme with Statistical zero-knowledge. IACR Cryptol. ePrint Arch. 2003: 222 (2003) - [i1]Chunming Tang, Zhuojun Liu, Jinwang Liu:
The Statistical Zero-knowledge Proof for Blum Integer Based on Discrete Logarithm. IACR Cryptol. ePrint Arch. 2003: 232 (2003) - 2001
- [c3]Jinwang Liu, Zhuojun Liu, Xiaoqi Liu, Mingsheng Wang:
The membership problem for ideals of binomial skew polynomial rings. ISSAC 2001: 192-195 - [c2]Mingsheng Wang, Zhuojun Liu:
Remarks on Gröbner basis for ideals under composition. ISSAC 2001: 237-244 - 2000
- [j6]Jinzhao Wu, Zhuojun Liu:
Linear Strategy for Boolean Ring Based Theorem Proving. J. Comput. Sci. Technol. 15(3): 271-279 (2000)
1990 – 1999
- 1999
- [j5]Guojie Li, Zhuojun Liu:
Preface. J. Comput. Sci. Technol. 14(5): 433 (1999) - [j4]Dongdai Lin, Zhuojun Liu:
Object-oriented analysis of ELIMINO. J. Comput. Sci. Technol. 14(5): 487-494 (1999) - 1998
- [j3]Jinzhao Wu, Zhuojun Liu:
Well-Behaved Inference Rules for First-Order Theorem Proving. J. Autom. Reason. 21(3): 381-400 (1998) - 1994
- [j2]Zhuojun Liu, Paul S. Wang:
Height as a coefficient bound for univariate polynomial factors. SIGSAM Bull. 28(2): 20-27 (1994) - [j1]Zhuojun Liu, Paul S. Wang:
Height as a coefficient bound for univariate polynomial factors, part II. SIGSAM Bull. 28(3-4): 1-9 (1994) - 1993
- [c1]Dongdai Lin, Zhuojun Liu:
Some Results on Theorem Proving in Geometry over Finite Fields. ISSAC 1993: 292-300
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint