New bounds for restricted isometry constants TT Cai, L Wang, G Xu IEEE Transactions on Information Theory 56 (9), 4388-4394, 2010 | 299 | 2010 |
On Recovery of Sparse Signals ViaMinimization TT Cai, G Xu, J Zhang IEEE Transactions on Information Theory 55 (7), 3388-3397, 2009 | 273 | 2009 |
Shifting inequality and recovery of sparse signals TT Cai, L Wang, G Xu IEEE Transactions on Signal processing 58 (3), 1300-1308, 2009 | 249 | 2009 |
Stable recovery of sparse signals and an oracle inequality TT Cai, L Wang, G Xu IEEE Transactions on Information Theory 56 (7), 3516-3522, 2010 | 199 | 2010 |
Conditional cube attack on reduced-round Keccak sponge function S Huang, X Wang, G Xu, M Wang, J Zhao Advances in Cryptology–EUROCRYPT 2017: 36th Annual International Conference …, 2017 | 101 | 2017 |
Refinements of Miller's algorithm for computing the Weil/Tate pairing IF Blake, VK Murty, G Xu Journal of Algorithms 58 (2), 134-149, 2006 | 99* | 2006 |
Compressed Sensing Matrices from Fourier Matrices G Xu, Z Xu IEEE Transactions on Information Theory 61, 469-478, 2015 | 72 | 2015 |
Virtual spectrophotometric measurements for biologically and physically based rendering GVG Baranoski, JG Rokne, G Xu The Visual Computer 17 (8), 506-518, 2001 | 56 | 2001 |
A note on BDD problems with λ2-gap M Liu, X Wang, G Xu, X Zheng Information Processing Letters 114 (1-2), 9-12, 2014 | 51* | 2014 |
Distinguishing and second-preimage attacks on CBC-like MACs K Jia, X Wang, Z Yuan, G Xu International Conference on Cryptology and Network Security, 349-361, 2009 | 38 | 2009 |
Splitting properties of operator bimodules and operator amenability of Kac algebras ZJ Ruan, G Xu A. Gheondea, RN Gologan and D. Timotin, Operator theory, operator algebras …, 1997 | 34 | 1997 |
Provably secure NTRU instances over prime cyclotomic rings Y Yu, G Xu, X Wang IACR International Workshop on Public Key Cryptography, 409-434, 2017 | 31 | 2017 |
New birthday attacks on some MACs based on block ciphers Z Yuan, W Wang, K Jia, G Xu, X Wang Annual International Cryptology Conference, 209-230, 2009 | 31 | 2009 |
Toeplitz random encoding MR imaging using compressed sensing D Liang, G Xu, H Wang, KF King, D Xu, L Ying 2009 IEEE International Symposium on Biomedical Imaging: From Nano to Macro …, 2009 | 31 | 2009 |
A note on window τ-NAF algorithm IF Blake, VK Murty, G Xu Information Processing Letters 95 (5), 496-502, 2005 | 31 | 2005 |
Nonadjacent radix-τ expansions of integers in Euclidean imaginary quadratic number fields IF Blake, VK Murty, G Xu Canadian Journal of Mathematics 60 (6), 1267-1282, 2008 | 30 | 2008 |
Mathematical foundations of public key cryptography X Wang, G Xu, M Wang, X Meng CRC Press, 2015 | 27 | 2015 |
On the ℓ1-Norm Invariant Convex k-Sparse Decomposition of Signals G Xu, Z Xu Journal of the Operations Research Society of China 1 (4), 537-541, 2013 | 26 | 2013 |
Applying the exponential Chebyshev inequality to the nondeterministic computation of form factors GVG Baranoski, JG Rokne, G Xu Journal of Quantitative Spectroscopy and Radiative Transfer 69 (4), 447-467, 2001 | 22 | 2001 |
Efficient algorithms for Koblitz curves over fields of characteristic three IF Blake, VK Murty, G Xu Journal of Discrete Algorithms 3 (1), 113-124, 2005 | 21 | 2005 |