Zheng-an Yao

Affiliations:
  • Sun Yat-Sen University, College of Mathematic and Computational Science, GuangZhou, China


According to our database1, Zheng-an Yao authored at least 40 papers between 2003 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Discrete gradient-zeroing neural network algorithms for handling future quadratic program as well as robot arm via ten-instant formula.
J. Frankl. Inst., November, 2023

Sharp Rates of Decay and Global-in-Time Stability of Large Solutions to The Three-Dimensional Incompressible Phan-Thien-Tanner System of Polymeric Flows.
SIAM J. Math. Anal., October, 2023

2022
The sharp time decay rates for the incompressible Phan-Thien-Tanner system with magnetic field in R2.
Appl. Math. Lett., 2022

2021
The Elliptic Net Algorithm Revisited.
CoRR, 2021

Blow up of classical solutions to the barotropic compressible fluid models of Korteweg type in bounded domains.
Appl. Math. Lett., 2021

2020
Decay rate of strong solution for the compressible magnetohydrodynamic equations with large initial data.
Appl. Math. Lett., 2020

2018
On the well-posedness of the ideal incompressible viscoelastic flow in the critical Besov spaces.
Comput. Math. Appl., 2018

A remark on the global regularity criterion for the 3D Navier-Stokes equations based on end-point Prodi-Serrin conditions.
Appl. Math. Lett., 2018

Remarks on global regularity for the 3D MHD system with damping.
Appl. Math. Comput., 2018

2017
Privacy-preserving outsourcing of image feature extraction in cloud computing.
Soft Comput., 2017

The weight distributions of two classes of p-ary cyclic codes with few weights.
Finite Fields Their Appl., 2017

Complete weight enumerators of a class of linear codes.
Discret. Math., 2017

Complete weight enumerators of a family of three-weight linear codes.
Des. Codes Cryptogr., 2017

3D axisymmetric MHD system with regularity in the swirl component of the vorticity.
Comput. Math. Appl., 2017

Well-posedness for density-dependent Boussinesq equations without dissipation terms in Besov spaces.
Comput. Math. Appl., 2017

A class of three-weight linear codes and their complete weight enumerators.
Cryptogr. Commun., 2017

2016
Complete weight enumerators of some linear codes and their applications.
Des. Codes Cryptogr., 2016

2015
Complete Weight Enumerator of a Family of Linear Codes from Cyclotomy.
CoRR, 2015

Complete Weight Enumerators of Some Linear Codes.
CoRR, 2015

The Complete Weight Enumerator of Several Cyclic Codes.
CoRR, 2015

Long-time behavior of solution for the compressible Navier-Stokes-Korteweg equations in R<sup>3</sup>.
Appl. Math. Lett., 2015

The weight enumerator of the duals of a class of cyclic codes with three zeros.
Appl. Algebra Eng. Commun. Comput., 2015

2014
Stochastic exact solutions of the Wick-type stochastic NLS equation.
Appl. Math. Comput., 2014

Cross-diffusion induced instability and pattern formation for a Holling type-II predator-prey model.
Appl. Math. Comput., 2014

2013
Two anisotropic fourth-order partial differential equations for image inpainting.
IET Image Process., 2013

2011
Secure multi-party computation protocol for sequencing problem.
Sci. China Inf. Sci., 2011

2010
Some alternative results for some nonlinear parabolic equations in the half cylinder.
J. Frankl. Inst., 2010

2009
Several cryptographic applications of <i>Σ</i>-protocol.
J. Syst. Sci. Complex., 2009

Fast Clustering-Based Kernel Foley-Sammon Transform.
Int. J. Wavelets Multiresolution Inf. Process., 2009

A Further Improved Online/Offline Signature Scheme.
Fundam. Informaticae, 2009

Nearest Neighbor Tour Circuit Encryption Algorithm Based Random Isomap Reduction.
Proceedings of the Advanced Data Mining and Applications, 5th International Conference, 2009

2008
Perfectly Hiding Commitment Scheme with Two-Round from Any One-Way Permutation.
IACR Cryptol. ePrint Arch., 2008

Note on non-simultaneous blow-up for a reaction-diffusion system.
Appl. Math. Lett., 2008

5-Round Computational Zero-Knowledge Proof with Negligible Error Probability for Any NP from Any One-Way Permutation.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

2007
Efficient Zaps and Signatures of Knowledge.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

2006
A landau-lifshitz-type equation in studying thin film micromagnetics.
Comput. Math. Appl., 2006

Improved Locally Linear Embedding Through New Distance Computing.
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006

2005
How to Authenticate Real Time Streams Using Improved Online/Offline Signatures.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

An Improved RSA-Based Access Control Scheme for Hierarchical Groups.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2003
A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme.
Proceedings of the Applied Cryptography and Network Security, 2003


  Loading...