Search

Your search keyword '"Fu, Fang"' showing total 2,538 results

Search Constraints

Start Over You searched for: Author "Fu, Fang" Remove constraint Author: "Fu, Fang"
2,538 results on '"Fu, Fang"'

Search Results

1. Association schemes arising from non-weakly regular bent functions

2. Self-Orthogonal Codes from Vectorial Dual-Bent Functions

8. Learning with Errors over Group Rings Constructed by Semi-direct Product

9. Linear codes with few weights from non-weakly regular plateaued functions

10. New Lower Bounds for the Minimum Distance of Cyclic Codes and Applications to Locally Repairable Codes

11. A Further Study of Vectorial Dual-Bent Functions

12. Some new constructions of optimal linear codes and alphabet-optimal $(r,\delta)$-locally repairable codes

21. Singleton-Optimal LRCs and Perfect LRCs via Cyclic and Constacyclic Codes

22. Bent Partitions, Vectorial Dual-Bent Functions and Partial Difference Sets

23. Higher protein intake may benefit in patients with prolonged mechanical ventilation

24. Alert Interaction Service Design for AI Face Swap Video Scams

26. Constructions of linear codes with two or three weights from vectorial dual-bent functions

27. Bounds and Constructions of Singleton-Optimal Locally Repairable Codes with Small Localities

28. On generalized quasi-cyclic codes over $\mathbb{Z}_4$

32. Fine particulate matter contributes to COPD-like pathophysiology: experimental evidence from rats exposed to diesel exhaust particles

33. Post-quantum Multi-stage Secret Sharing Schemes using Inhomogeneous Linear Recursion and Ajtai's Function

34. New results on vectorial dual-bent functions and partial difference sets

35. Some Results on the Improved Bound and Construction of Optimal $(r,\delta)$ LRCs

36. Icariin restrains NLRP3 inflammasome-mediated Th2 immune responses and ameliorates atopic dermatitis through modulating a novel lncRNA MALAT1/miR-124-3p axis

37. Polynomial-Time Key Recovery Attack on the Lau-Tan Cryptosystem Based on Gabidulin Codes

44. Advances in nuclear detection and readout techniques

46. Decoding Error Probability of the Random Matrix Ensemble over the Erasure Channel

47. On pure MDS asymmetric entanglement-assisted quantum error-correcting codes

48. Semilinear Transformations in Coding Theory: A New Technique in Code-Based Cryptography

49. Two Public-Key Cryptosystems Based on Expanded Gabidulin Codes

50. On the Dual of Generalized Bent Functions

Catalog

Books, media, physical & digital resources