New bounds for restricted isometry constants TT Cai, L Wang, G Xu
IEEE Transactions on Information Theory 56 (9), 4388-4394, 2010
294 2010 On Recovery of Sparse Signals Via Minimization TT Cai, G Xu, J Zhang
IEEE Transactions on Information Theory 55 (7), 3388-3397, 2009
268 2009 Shifting inequality and recovery of sparse signals TT Cai, L Wang, G Xu
IEEE Transactions on Signal processing 58 (3), 1300-1308, 2009
247 2009 Stable recovery of sparse signals and an oracle inequality TT Cai, L Wang, G Xu
IEEE Transactions on Information Theory 56 (7), 3516-3522, 2010
198 2010 Refinements of Miller's algorithm for computing the Weil/Tate pairing IF Blake, VK Murty, G Xu
Journal of Algorithms 58 (2), 134-149, 2006
99 * 2006 Conditional cube attack on reduced-round Keccak sponge function S Huang, X Wang, G Xu, M Wang, J Zhao
Advances in Cryptology–EUROCRYPT 2017: 36th Annual International Conference …, 2017
97 2017 Compressed Sensing Matrices from Fourier Matrices G Xu, Z Xu
IEEE Transactions on Information Theory 61, 469-478, 2015
67 2015 Virtual spectrophotometric measurements for biologically and physically based rendering GVG Baranoski, JG Rokne, G Xu
The Visual Computer 17 (8), 506-518, 2001
55 2001 A note on BDD problems with λ2-gap M Liu, X Wang, G Xu, X Zheng
Information Processing Letters 114 (1-2), 9-12, 2014
50 * 2014 Distinguishing and second-preimage attacks on CBC-like MACs K Jia, X Wang, Z Yuan, G Xu
International Conference on Cryptology and Network Security, 349-361, 2009
37 2009 Splitting properties of operator bimodules and operator amenability of Kac algebras ZJ Ruan, G Xu
A. Gheondea, RN Gologan and D. Timotin, Operator theory, operator algebras …, 1997
34 1997 New birthday attacks on some MACs based on block ciphers Z Yuan, W Wang, K Jia, G Xu, X Wang
Annual International Cryptology Conference, 209-230, 2009
31 2009 Toeplitz random encoding MR imaging using compressed sensing D Liang, G Xu, H Wang, KF King, D Xu, L Ying
2009 IEEE International Symposium on Biomedical Imaging: From Nano to Macro …, 2009
31 2009 Provably secure NTRU instances over prime cyclotomic rings Y Yu, G Xu, X Wang
IACR International Workshop on Public Key Cryptography, 409-434, 2017
30 2017 A note on window τ-NAF algorithm IF Blake, VK Murty, G Xu
Information Processing Letters 95 (5), 496-502, 2005
30 2005 Nonadjacent radix-τ expansions of integers in Euclidean imaginary quadratic number fields IF Blake, VK Murty, G Xu
Canadian Journal of Mathematics 60 (6), 1267-1282, 2008
29 2008 Mathematical foundations of public key cryptography X Wang, G Xu, M Wang, X Meng
CRC Press, 2015
27 2015 On the ℓ 1 -Norm Invariant Convex k -Sparse Decomposition of Signals G Xu, Z Xu
Journal of the Operations Research Society of China 1 (4), 537-541, 2013
24 2013 Applying the exponential Chebyshev inequality to the nondeterministic computation of form factors GVG Baranoski, JG Rokne, G Xu
Journal of Quantitative Spectroscopy and Radiative Transfer 69 (4), 447-467, 2001
22 2001 Efficient algorithms for Koblitz curves over fields of characteristic three IF Blake, VK Murty, G Xu
Journal of Discrete Algorithms 3 (1), 113-124, 2005
21 2005