


Остановите войну!
for scientists:


default search action
Mingyuan Wang
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c29]Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, Yinuo Zhang:
Cryptography with Weights: MPC, Encryption and Signatures. CRYPTO (1) 2023: 295-327 - [c28]Vipul Goyal, Akshayaram Srinivasan, Mingyuan Wang:
Reusable Secure Computation in the Plain Model. CRYPTO (1) 2023: 427-458 - [c27]Leemon Baird, Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, Yinuo Zhang:
Threshold Signatures in the Multiverse. SP 2023: 1454-1470 - [i17]Haowen Wang, Zhengping Che, Mingyuan Wang, Zhiyuan Xu, Xiuquan Qiao, Mengshi Qi, Feifei Feng, Jian Tang:
RDFC-GAN: RGB-Depth Fusion CycleGAN for Indoor Depth Completion. CoRR abs/2306.03584 (2023) - [i16]Leemon Baird, Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, Yinuo Zhang:
Threshold Signatures in the Multiverse. IACR Cryptol. ePrint Arch. 2023: 63 (2023) - [i15]Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, Yinuo Zhang:
hinTS: Threshold Signatures with Silent Setup. IACR Cryptol. ePrint Arch. 2023: 567 (2023) - [i14]Vipul Goyal, Akshayaram Srinivasan, Mingyuan Wang:
Reusable Secure Computation in the Plain Model. IACR Cryptol. ePrint Arch. 2023: 1006 (2023) - 2022
- [c26]Hemanta K. Maji, Hai H. Nguyen, Anat Paskin-Cherniavsky, Tom Suad, Mingyuan Wang, Xiuyu Ye, Albert Yu:
Tight Estimate of the Local Leakage Resilience of the Additive Secret-Sharing Scheme & Its Consequences. ITC 2022: 16:1-16:19 - [c25]Haowen Wang, Mingyuan Wang, Zhengping Che, Zhiyuan Xu, Xiuquan Qiao, Mengshi Qi, Feifei Feng, Jian Tang:
RGB-Depth Fusion GAN for Indoor Depth Completion. CVPR 2022: 6199-6208 - [c24]Mingyuan Wang, Liang Du, Sheng Bao, Jianjun Yuan, Jinshu Zhou, Shugen Ma:
Design of a modular continuum robot with alterable compliance using tubular-actuation. IROS 2022: 1923-1928 - [c23]Hemanta K. Maji, Hai H. Nguyen, Anat Paskin-Cherniavsky, Mingyuan Wang:
Improved Bound on the Local Leakage-resilience of Shamir's Secret Sharing. ISIT 2022: 2678-2683 - [c22]Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, Mingyuan Wang:
Overparameterization from Computational Constraints. NeurIPS 2022 - [c21]Zechao Wang, Mingyuan Wang, Jianjun Yuan, Shiqiang Wang, Liang Du, Sheng Bao, Weiwei Wan:
Structural design and analysis of a permanent-magnet wheeled pipe robot with pipe diameter adaption capability. ROBIO 2022: 2039-2044 - [c20]Hemanta K. Maji, Hai H. Nguyen, Anat Paskin-Cherniavsky, Tom Suad, Mingyuan Wang, Xiuyu Ye, Albert Yu:
Leakage-resilient Linear Secret-sharing Against Arbitrary Bounded-size Leakage Family. TCC (1) 2022: 355-383 - [c19]Nico Döttling, Sanjam Garg, Sruthi Sekar, Mingyuan Wang:
IBE with Incompressible Master Secret and Small Identity Secrets. TCC (1) 2022: 588-617 - [i13]Haowen Wang, Mingyuan Wang, Zhengping Che, Zhiyuan Xu, Xiuquan Qiao, Mengshi Qi, Feifei Feng, Jian Tang:
RGB-Depth Fusion GAN for Indoor Depth Completion. CoRR abs/2203.10856 (2022) - [i12]Sanjam Garg
, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, Mingyuan Wang:
Overparameterized (robust) models from computational constraints. CoRR abs/2208.12926 (2022) - [i11]Nico Döttling, Sanjam Garg
, Sruthi Sekar, Mingyuan Wang:
IBE with Incompressible Master Secret and Small Identity Secrets. IACR Cryptol. ePrint Arch. 2022: 649 (2022) - [i10]Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, Yinuo Zhang:
Cryptography with Weights: MPC, Encryption and Signatures. IACR Cryptol. ePrint Arch. 2022: 1632 (2022) - 2021
- [c18]Hemanta K. Maji, Mingyuan Wang:
Computational Hardness of Optimal Fair Computation: Beyond Minicrypt. CRYPTO (2) 2021: 33-63 - [c17]Hemanta K. Maji, Anat Paskin-Cherniavsky, Tom Suad, Mingyuan Wang:
Constructing Locally Leakage-Resilient Linear Secret-Sharing Schemes. CRYPTO (3) 2021: 779-808 - [c16]Hemanta K. Maji, Hai H. Nguyen, Anat Paskin-Cherniavsky, Tom Suad, Mingyuan Wang:
Leakage-Resilience of the Shamir Secret-Sharing Scheme Against Physical-Bit Leakages. EUROCRYPT (2) 2021: 344-374 - [c15]Mingyuan Wang
, Sheng Bao, Jianjun Yuan, Shugen Ma, Shijie Guo, Weiwei Wan
:
Design and analysis of a robotic out-pipe grinding system with friction actuating. IROS 2021: 2467-2472 - [c14]Donald Q. Adams, Hemanta K. Maji, Hai H. Nguyen, Minh L. Nguyen, Anat Paskin-Cherniavsky, Tom Suad, Mingyuan Wang:
Lower Bounds for Leakage-Resilient Secret-Sharing Schemes against Probing Attacks. ISIT 2021: 976-981 - [c13]Hamidreza Amini Khorasgani, Hemanta K. Maji, Himanshi K. Mehta, Mingyuan Wang:
Efficient Distributed Coin-tossing Protocols. ISIT 2021: 2852-2857 - [c12]Hamidreza Amini Khorasgani, Hemanta K. Maji, Mingyuan Wang:
Optimally-secure Coin-tossing against a Byzantine Adversary. ISIT 2021: 2858-2863 - [c11]Mingyuan Wang
, Liang Du, Jianjun Yuan, Shugen Ma, Sheng Bao:
A bio-inspired continuum robot for out-pipe climbing and confined space navigating. ROBIO 2021: 74-79 - [i9]Mingyuan Wang, Adrian Barbu:
Online Feature Screening for Data Streams with Concept Drift. CoRR abs/2104.02883 (2021) - [i8]Hemanta K. Maji, Hai H. Nguyen, Anat Paskin-Cherniavsky, Tom Suad, Mingyuan Wang:
Leakage-resilience of the Shamir Secret-sharing Scheme against Physical-bit Leakages. IACR Cryptol. ePrint Arch. 2021: 186 (2021) - [i7]Hemanta K. Maji, Mingyuan Wang:
Computational Hardness of Optimal FairComputation: Beyond Minicrypt. IACR Cryptol. ePrint Arch. 2021: 882 (2021) - 2020
- [c10]Hemanta K. Maji, Mingyuan Wang:
Black-Box Use of One-Way Functions is Useless for Optimal Fair Coin-Tossing. CRYPTO (2) 2020: 593-617 - [c9]Yinxue Yuan, Qiao Yan, Guiqing Zhang, Hao Chen, Mingyuan Wang:
Design of Automated Demand Response Management System on User Side for Office Buildings. CSAE 2020: 70:1-70:7 - [c8]Borui Wu, Lubin Hang, Xiaojie Huang, Sulong Li, Xiaobo Huang, Mingyuan Wang, Chuanlei Zhong, Zhiyang Qu:
Double Loops Mechanism with Multi-Mode Motion Applied in The Vehicle Door Latch. RICAI 2020: 69-73 - [c7]Chuanlei Zhong, Lubin Hang, Mingyuan Wang, Sulong Li, Xiaobo Huang, Xiaojie Huang, Zhe Liu, Yong Chen:
Research on A Spatial Compliant Mechanism for the Power Release Branch in Vehicle Side Door Latch. RICAI 2020: 435-439 - [c6]Zhiyang Qu, Lubin Hang, Huiyu Deng, Xiaobo Huang, Mingyuan Wang, Xiaojie Huang, Zhe Liu, Yong Chen, Yong Hua, Jinliang Du:
Control System of Single-drive Double-branch Electric Vehicle Door Latch. RICAI 2020: 440-444 - [i6]Hamidreza Amini Khorasgani, Hemanta K. Maji, Mingyuan Wang:
Coin Tossing with Lazy Defense: Hardness of Computation Results. IACR Cryptol. ePrint Arch. 2020: 131 (2020) - [i5]Hemanta K. Maji, Mingyuan Wang:
Black-box use of One-way Functions is Useless for Optimal Fair Coin-Tossing. IACR Cryptol. ePrint Arch. 2020: 253 (2020) - [i4]Hamidreza Amini Khorasgani, Hemanta K. Maji, Mingyuan Wang:
Design & Analysis of Optimal Coin-tossing: New Techniques. IACR Cryptol. ePrint Arch. 2020: 519 (2020) - [i3]Hemanta K. Maji, Anat Paskin-Cherniavsky, Tom Suad, Mingyuan Wang:
On Leakage-Resilient Secret Sharing. IACR Cryptol. ePrint Arch. 2020: 1517 (2020)
2010 – 2019
- 2019
- [j1]Jidong Zhang, Jinsong Ping, Zhaofa Zeng, Yongzhang Yang
, Xiangyue Li, Mingyuan Wang:
Surface Temperature Simulation of Lunar Dayside and Its Geological Applications: A Case in Sinus Iridum. Sensors 19(24): 5545 (2019) - [c5]Divya Gupta, Hemanta K. Maji, Mingyuan Wang:
Explicit Rate-1 Non-malleable Codes for Local Tampering. CRYPTO (1) 2019: 435-466 - [c4]Xu Su, Lubin Hang, Hui Guo
, Mingyuan Wang
, Zhe Liu, Yong Chen, Yong Hua, Jinliang Du:
Simulation Research of Gear Recovery Noise in Electric Opening Branch with the Vehicle Door Latch. RICAI 2019: 122-126 - [c3]Xiaojie Huang, Lubin Hang, Mingyuan Wang
, Xiaobo Huang, Qiansheng Wang, Zhe Liu, Yong Chen, Yong Hua, Jinliang Du:
Analysis of Multi-mode Inertial Mechanism of Automotive Door Lock Based on ADAMS. RICAI 2019: 132-136 - [c2]Sulong Li, Lubin Hang, Mingyuan Wang
, Lele Bai, Xiaobo Huang, Huiyu Deng, Zhe Liu, Yong Chen, Yong Hua, Jinliang Du:
Research on Four-bar Linkage with Variable Axis Torsion Spring for Vehicle Latch Lock/Unlock. RICAI 2019: 153-158 - 2018
- [c1]Divya Gupta, Hemanta K. Maji, Mingyuan Wang:
Non-malleable Codes Against Lookahead Tampering. INDOCRYPT 2018: 307-328 - [i2]Mingyuan Wang, Adrian Barbu:
Are screening methods useful in feature selection? An empirical study. CoRR abs/1809.05465 (2018) - 2017
- [i1]Divya Gupta, Hemanta K. Maji, Mingyuan Wang:
Constant-rate Non-malleable Codes in the Split-state Model. IACR Cryptol. ePrint Arch. 2017: 1048 (2017)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-09-27 22:45 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint