Huaixi Wang

According to our database1, Huaixi Wang authored at least 20 papers between 2010 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
A Novel Faster All-Pair Shortest Path Algorithm Based on the Matrix Multiplication for GPUs.
CoRR, 2022

2021
Independent or Correlative: When the Betweenness Centrality Encounters Degree in the Networks?
Proceedings of the 21st International Conference on Communication Technology, 2021

Global Betweenness Identities in the Networks.
Proceedings of the 21st International Conference on Communication Technology, 2021

A distributed traffic classification model based on Federated Learning.
Proceedings of the 7th International Conference on Big Data Computing and Communications, 2021

2020
Dependency-Aware Dynamic Task Scheduling in Mobile-Edge Computing.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020

Identification of Key Nodes Based on Integrating of Global and Local Information.
Proceedings of the 20th IEEE International Conference on Communication Technology, 2020

The Betweenness Identities and Their Applications.
Proceedings of the 20th IEEE International Conference on Communication Technology, 2020

The Bridge and Link Betweenness in the Networks.
Proceedings of the 20th IEEE International Conference on Communication Technology, 2020

2019
A Practical Image Encryption Algorithm for Privacy Protection.
Proceedings of the 19th IEEE International Conference on Communication Technology, 2019

Identification of Critical Nodes in Ad Hoc Network Based on the Analysis of Network Partition.
Proceedings of the 19th IEEE International Conference on Communication Technology, 2019

2018
An Image Secret Sharing Method Based on Matrix Theory.
Symmetry, 2018

Greyscale-images-oriented progressive secret sharing based on the linear congruence equation.
Multim. Tools Appl., 2018

2017
A novel linear secret sharing scheme with multiple prime moduli.
Proceedings of the 13th International Conference on Natural Computation, 2017

2011
Provably Secure Role-Based Encryption with Revocation Mechanism.
J. Comput. Sci. Technol., 2011

Zero-knowledge proofs of retrievability.
Sci. China Inf. Sci., 2011

Dynamic audit services for integrity verification of outsourced storages in clouds.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

2010
Attribute-Based Signature with Policy-and-Endorsement Mechanism.
J. Comput. Sci. Technol., 2010

Efficient provable data possession for hybrid clouds.
IACR Cryptol. ePrint Arch., 2010

A Collaborative Framework for Privacy Protection in Online Social Networks.
IACR Cryptol. ePrint Arch., 2010

Cryptographic Role-based Security Mechanisms based on Role-Key Hierarchy.
IACR Cryptol. ePrint Arch., 2010


  Loading...