Jianhua Chen

According to our database1, Jianhua Chen
  • authored at least 172 papers between 1990 and 2018.
  • has a "Dijkstra number"2 of three.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things.
IEEE Trans. Industrial Informatics, 2018

An enhanced authentication with key agreement scheme for satellite communication systems.
Int. J. Satellite Communications Networking, 2018

Certificateless searchable public key encryption scheme for mobile healthcare system.
Computers & Electrical Engineering, 2018

Existence of ground state solutions for quasilinear Schrödinger equations with super-quadratic condition.
Appl. Math. Lett., 2018

2017
Insecurity of a Pairing-Free Certificateless Ring Signcryption Scheme.
Wireless Personal Communications, 2017

An Enhanced Anonymous Password-based Authenticated Key Agreement Scheme with Formal Proof.
I. J. Network Security, 2017

An improved authenticated key agreement with anonymity for session initiation protocol.
IJESDF, 2017

An efficient two-party authentication key exchange protocol for mobile environment.
Int. J. Communication Systems, 2017

Provably Secure Three-party Password Authenticated Key Exchange Protocol Based On Ring Learning With Error.
IACR Cryptology ePrint Archive, 2017

Existence of multiple solutions for modified Schrödinger-Kirchhoff-Poisson type systems via perturbation method with sign-changing potential.
Computers & Mathematics with Applications, 2017

Existence of ground state sign-changing solutions for a class of generalized quasilinear Schrödinger-Maxwell system in ℝ3.
Computers & Mathematics with Applications, 2017

Non-Nehari manifold method for a class of generalized quasilinear Schrödinger equations.
Appl. Math. Lett., 2017

Multimodal Classification with Deep Convolutional-Recurrent Neural Networks for Electroencephalography.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

Application of artificial neural networks to wave load prediction for coastal bridges.
Proceedings of the 3rd International Conference on Communication and Information Processing, 2017

An assessment of coherent plane-wave compounding ultrasonography applied to detect the common carotid artery wall with the three-membrane structure.
Proceedings of the 10th International Congress on Image and Signal Processing, 2017

2016
A secure energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography.
Security and Communication Networks, 2016

Cryptanalysis of a certificateless aggregate signature scheme with efficient verification.
Security and Communication Networks, 2016

Generalizations of Darbo's fixed point theorem via simulation functions with application to functional integral equations.
J. Computational Applied Mathematics, 2016

Security analysis and enhancements of a multi-factor biometric authentication scheme.
IJESDF, 2016

Insecurity of a Certificateless Aggregate Signature Scheme.
IEICE Transactions, 2016

On the convergence of multivariant optimization algorithm.
Appl. Soft Comput., 2016

Affine Correction Based Image Watermarking Robust to Geometric Attacks.
Proceedings of the 17th International Conference on Parallel and Distributed Computing, 2016

Storm Surge Prediction for Louisiana Coast Using Artificial Neural Networks.
Proceedings of the Neural Information Processing - 23rd International Conference, 2016

2015
An Improved Two-Party Authentication Key Exchange Protocol for Mobile Environment.
Wireless Personal Communications, 2015

Properties of a new adaptive sampling method with applications to scalable learning.
Web Intelligence, 2015

Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks.
Multimedia Syst., 2015

An improved authentication scheme for mobile satellite communication systems.
Int. J. Satellite Communications Networking, 2015

Enhanced authentication protocol for session initiation protocol using smart card.
IJESDF, 2015

Robust Biometric-Based User Authentication Scheme for Wireless Sensor Networks.
Ad Hoc & Sensor Wireless Networks, 2015

A Scalable Boosting Learner Using Adaptive Sampling.
Proceedings of the Foundations of Intelligent Systems - 22nd International Symposium, 2015

Boosting with Adaptive Sampling for Multi-class Classification.
Proceedings of the 14th IEEE International Conference on Machine Learning and Applications, 2015

2014
Cryptanalysis and Improvement of an Anonymous Authentication Protocol for Wireless Access Networks.
Wireless Personal Communications, 2014

An Efficient Password Authentication Scheme Using Smart Card Based on Elliptic Curve Cryptography.
ITC, 2014

Insecurity of an efficient certificateless aggregate signature with constant pairing computations.
Inf. Sci., 2014

Cryptanalysis of a Three-party Password-based Authenticated Key Exchange Protocol.
I. J. Network Security, 2014

Security analysis of an authentication and key agreement protocol for satellite communications.
Int. J. Communication Systems, 2014

Neural Network Implementation of a Mesoscale Meteorological Model.
Proceedings of the Foundations of Intelligent Systems - 21st International Symposium, 2014

CrowdCleaner: A Data Cleaning System Based on Crowdsourcing.
Proceedings of the Web Technologies and Applications - 16th Asia-Pacific Web Conference, 2014

A Scalable Boosting Learner for Multi-class Classification Using Adaptive Sampling.
Proceedings of the Active Media Technology - 10th International Conference, 2014

2013
Object recognition by spectral feature derived from canonical shape representation.
Mach. Vis. Appl., 2013

An efficient certificateless proxy signature scheme without pairing.
Mathematical and Computer Modelling, 2013

On the security of an authentication scheme for multi-server architecture.
IJESDF, 2013

New certificateless short signature scheme.
IET Information Security, 2013

An efficient certificateless designated verifier signature scheme.
Int. Arab J. Inf. Technol., 2013

ECG compression using the context modeling arithmetic coding with dynamic learning vector-scalar quantization.
Biomed. Signal Proc. and Control, 2013

Properties of a New Adaptive Sampling Method with Applications to Scalable Learning.
Proceedings of the 2013 IEEE/WIC/ACM International Conferences on Web Intelligence, 2013

Context quantization based on the modified genetic algorithm with K-means.
Proceedings of the Ninth International Conference on Natural Computation, 2013

Sampling Adaptively Using the Massart Inequality for Scalable Learning.
Proceedings of the 12th International Conference on Machine Learning and Applications, 2013

Predicting movie sales revenue using online reviews.
Proceedings of the 2013 IEEE International Conference on Granular Computing, 2013

2012
A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography.
Security and Communication Networks, 2012

Note on 'Design of improved password authentication and update scheme based on elliptic curve cryptography'.
Mathematical and Computer Modelling, 2012

A More Secure Authentication Scheme for Telecare Medicine Information Systems.
J. Medical Systems, 2012

Learning non-taxonomical semantic relations from domain texts.
J. Intell. Inf. Syst., 2012

An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security.
Information Fusion, 2012

Efficient photometric feature extraction in a hierarchical learning scheme for nodule detection.
IJGCRSIS, 2012

Cryptanalysis of a three-party password-based authenticated key exchange protocol using Weil pairing.
IJESDF, 2012

A pairing-free certificateless authenticated key agreement protocol.
Int. J. Communication Systems, 2012

An efficient certificateless two-party authenticated key agreement protocol.
Computers & Mathematics with Applications, 2012

Discovering Semantic Relations Using Prepositional Phrases.
Proceedings of the Foundations of Intelligent Systems - 20th International Symposium, 2012

Scalable Ensemble Learning by Adaptive Sampling.
Proceedings of the 11th International Conference on Machine Learning and Applications, 2012

Learning taxonomical relations from domain texts using WordNet and word sense disambiguation.
Proceedings of the 2012 IEEE International Conference on Granular Computing, 2012

The simulation of the relevance of dose and Hill coefficient to drug effect.
Proceedings of the 5th International Conference on BioMedical Engineering and Informatics, 2012

Modeling and simulation for clinical trial of naratriptan based on proportional odds model.
Proceedings of the 5th International Conference on BioMedical Engineering and Informatics, 2012

2011
A new two-round certificateless authenticated key agreement protocol without bilinear pairings.
Mathematical and Computer Modelling, 2011

Weaknesses of a Remote User Password Authentication Scheme Using Smart Card.
I. J. Network Security, 2011

Identity-based Digital Signature Scheme Without Bilinear Pairings.
IACR Cryptology ePrint Archive, 2011

An efficient identity-based blind signature scheme without bilinear pairings.
Computers & Electrical Engineering, 2011

An ID-based proxy signature schemes without bilinear pairings.
Annales des Télécommunications, 2011

A New Method for Adaptive Sequential Sampling for Learning and Parameter Estimation.
Proceedings of the Foundations of Intelligent Systems - 19th International Symposium, 2011

A spatial data mining method for mineral resources potential assessment.
Proceedings of the IEEE International Conference on Spatial Data Mining and Geographical Knowledge Services, 2011

Multi-Projection-Based Thousand-Arm Guanyin DOM.
Proceedings of the Second International Conference on Digital Manufacturing and Automation, 2011

Unsupervised semantic classification methods.
Proceedings of the 2011 IEEE International Conference on Granular Computing, 2011

Recursive particle swarm optimization applications in radial basis function networks modeling system.
Proceedings of the 4th International Conference on Biomedical Engineering and Informatics, 2011

2010
No-reference perceptual image quality metric using gradient profiles for JPEG2000.
Sig. Proc.: Image Comm., 2010

Structure-Based Design of Peptides against G3BP with Cytotoxicity on Tumor Cells.
Journal of Chemical Information and Modeling, 2010

Cryptanalysis of a Simple Three-party Key Exchange Protocol.
Informatica (Slovenia), 2010

Service Science, Management and Engineering Education: A Unified Model for University.
IJSSMET, 2010

Weaknesses of a dynamic ID-based remote user authentication scheme.
IJESDF, 2010

Efficient and provably-secure certificateless signature scheme without bilinear pairings.
IACR Cryptology ePrint Archive, 2010

Weakness of two ID-based remote mutual authentication with key agreement protocols for mobile devices.
IACR Cryptology ePrint Archive, 2010

Weaknesses of a dynamic ID-based remote user authentication scheme.
IACR Cryptology ePrint Archive, 2010

On security of a remote user authentication scheme without using smart cards.
IACR Cryptology ePrint Archive, 2010

Cryptanalysis of an Exquisite Mutual Authentication Scheme with Key Agreement Using Smart Card.
IACR Cryptology ePrint Archive, 2010

Weaknesses of a dynamic ID-based remote user authentication scheme.
IACR Cryptology ePrint Archive, 2010

Cryptanalysis of a DoS-resistant ID-based password authentication.
IACR Cryptology ePrint Archive, 2010

A Random Number Generator Based on Isogenies Operations.
IACR Cryptology ePrint Archive, 2010

Transforms of pseudo-Boolean random variables.
Discrete Applied Mathematics, 2010

Weakness Analysis and Improvement of a Gateway-Oriented Password-Based Authenticated Key Exchange Protocol
CoRR, 2010

Mining metallogenic association rules combining cloud model with Apriori algorithm.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2010

Determination of Thermal Conductivity of Aloe in the Cooling and Thawing Process.
Proceedings of the Computer and Computing Technologies in Agriculture IV, 2010

Study on Thermal Conductivities Prediction for Apple Fruit Juice by Using Neural Network.
Proceedings of the Computer and Computing Technologies in Agriculture IV, 2010

An Image Processing Tool for Efficient Feature Extraction in Computer-Aided Detection Systems.
Proceedings of the 2010 IEEE International Conference on Granular Computing, 2010

Detecting Communities Using Social Ties.
Proceedings of the 2010 IEEE International Conference on Granular Computing, 2010

Case-based reasoning and GIS approach to regional metallogenic prediction.
Proceedings of the 18th International Conference on Geoinformatics: GIScience in Change, 2010

A Hierarchical Decision Engine for Computer Aided Lung Nodule Detection from CT Images.
Proceedings of the International Conference on Bioinformatics & Computational Biology, 2010

2009
2-D Compression of ECG Signals Using ROI Mask and Conditional Entropy Coding.
IEEE Trans. Biomed. Engineering, 2009

Fast Algorithm for Computing the Minimal Polynomials of Gaussian Periods.
Proceedings of the 2009 Second International Symposium on Computational Intelligence and Design, 2009

Learning Terrorist Profiles by Optimization with Two Objectives.
Proceedings of the 2009 International Conference on Information & Knowledge Engineering, 2009

Quantification Model for Estimating Temperature Field Distributions of Apple Fruit.
Proceedings of the Computer and Computing Technologies in Agriculture III, 2009

A no-reference perceptual blur metric using histogram of gradient profile sharpness.
Proceedings of the International Conference on Image Processing, 2009

Degree-based Approximate Sub-graph Matching for Social Network Analysis in Terrorist Detection.
Proceedings of the 2009 International Conference on Artificial Intelligence, 2009

Random forest for relational classification with application to terrorist profiling.
Proceedings of the 2009 IEEE International Conference on Granular Computing, 2009

Fabric Database and Fuzzy Logic Models for Evaluating Fabric Performance.
Proceedings of the Database Technologies: Concepts, 2009

2008
Extraction of mean frequency information from Doppler blood flow signals using a matching pursuit algorithm.
Signal Processing, 2008

Formulas for approximating pseudo-Boolean random variables.
Discrete Applied Mathematics, 2008

A No-Reference Blocking Artifacts Metric Using Selective Gradient and Plainness Measures.
Proceedings of the Advances in Multimedia Information Processing, 2008

Local Soft Belief Updating for Relational Classification.
Proceedings of the Foundations of Intelligent Systems, 17th International Symposium, 2008

A New Spectral Feature for Shape Comparison.
Proceedings of the 2008 International Conference on Image Processing, 2008

Empirical Comparison of Greedy Strategies for Learning Markov Networks of Treewidth k.
Proceedings of the Seventh International Conference on Machine Learning and Applications, 2008

Fuzzy Clustering and Iterative Relational Classification for Terrorist Profiling.
Proceedings of the 2008 IEEE International Conference on Granular Computing, 2008

Fabric Database and Fuzzy Logic Models for Evaluating Fabric Performance.
Proceedings of the Handbook of Research on Fuzzy Information Processing in Databases, 2008

2007
The Removal of Wall Components in Doppler Ultrasound Signals by Using the Empirical Mode Decomposition Algorithm.
IEEE Trans. Biomed. Engineering, 2007

Asymptotic Behavior of Linear Approximations of Pseudo-Boolean Functions.
JACIII, 2007

Graph-theoretic method for merging security system specifications.
Inf. Sci., 2007

Relative positioning for team robot navigation.
Auton. Robots, 2007

Comparison of Greedy Strategies for Learning Markov Networks of Treewidth k.
Proceedings of the 2007 International Conference on Machine Learning; Models, 2007

Matching Polygons Using Canonical String Representation.
Proceedings of the 2007 International Conference on Image Processing, 2007

Incremental Integration of Probabilistic Models Learned from Data.
Proceedings of the Workshops Proceedings of the 7th IEEE International Conference on Data Mining (ICDM 2007), 2007

Learning for Semantic Classification of Conceptual Terms.
Proceedings of the 2007 IEEE International Conference on Granular Computing, 2007

Extraction of Non-hierarchical Relations from Domain Texts.
Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, 2007

2006
Image coding based on wavelet transform and uniform scalar dead zone quantizer.
Sig. Proc.: Image Comm., 2006

Automatic De-noising of Doppler Ultrasound Signals Using Matching Pursuit Method.
Proceedings of the Independent Component Analysis and Blind Signal Separation, 2006

Automatic acquisition of concepts from domain texts.
Proceedings of the 2006 IEEE International Conference on Granular Computing, 2006

Application of kohonen self-organizing map for urban structure analysis.
Proceedings of the 2006 IEEE International Conference on Granular Computing, 2006

2005
New bounds for randomized busing.
Theor. Comput. Sci., 2005

Efficient Learning of Pseudo-Boolean Functions from Limited Training Data.
Proceedings of the Foundations of Intelligent Systems, 15th International Symposium, 2005

Approximating Pseudo-Boolean Functions on Non-Uniform Domains.
Proceedings of the IJCAI-05, Proceedings of the Nineteenth International Joint Conference on Artificial Intelligence, Edinburgh, Scotland, UK, July 30, 2005

Real-Time Implementation of High-Performance Spectral Estimation and Display on a Portable Doppler Device.
Proceedings of the Advances in Intelligent Computing, 2005

A Portable Doppler Device Based on a DSP with High- Performance Spectral Estimation and Output.
Proceedings of the Advances in Computer Systems Architecture, 10th Asia-Pacific Conference, 2005

2004
Context modeling based on context quantization with application in wavelet image coding.
IEEE Trans. Image Processing, 2004

Learning hidden Markov models from the state distribution oracle.
Proceedings of the 2004 International Conference on Machine Learning and Applications, 2004

2003
Rules and fuzzy rules in text: concept, extraction and usage.
Int. J. Approx. Reasoning, 2003

Two Extensions to NetSolve System.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

Fuzzy clustering and decision tree learning for time-series tidal data classification.
Proceedings of the 12th IEEE International Conference on Fuzzy Systems, 2003

Online Data Mining in Franchising Supply Chain Management: A Demonstration in the Apparel Industry.
Proceedings of the 9th Americas Conference on Information Systems, 2003

2002
User profiles and fuzzy logic for web retrieval issues.
Soft Comput., 2002

An incremental learning algorithm for constructing Boolean functions from positive and negative examples.
Computers & OR, 2002

2001
Vocabulary mining for information retrieval: rough sets and fuzzy sets.
Inf. Process. Manage., 2001

2000
Learning rules from numerical data by combining geometric and graph-theoretic approach.
Robotics and Autonomous Systems, 2000

Combining Description Logics with Stratified Logic Programs in Knowledge Representation.
Proceedings of the Foundations of Intelligent Systems, 12th International Symposium, 2000

Integrating and Extending Fuzzy Clustering and Inferencing to Improve Text Retrieval Performance.
Proceedings of the Flexible Query Answering Systems, 2000

1999
Embedding prioritized circumscription in disjunctive logic programs.
J. Exp. Theor. Artif. Intell., 1999

A Class of Stratified Programs in Autoepistemic Logic of Knowledge and Belief.
Proceedings of the Foundations of Intelligent Systems, 11th International Symposium, 1999

1998
A sound and complete proof theory for the generalized logic of only knowing.
J. Exp. Theor. Artif. Intell., 1998

Fuzzy logic or Lukasiewicz logic: A clarification.
Fuzzy Sets and Systems, 1998

1997
A pair of nonlinear operators and their applications in predictive image coding.
Signal Processing, 1997

The Generalized Logic of only Knowing (GOL) That Covers the Notion of Epistemic Specifications.
J. Log. Comput., 1997

A New Method of Circumscribing Beliefs: The Propositional Case.
Fundam. Inform., 1997

Embedding Prioritized Circumscription in Logic Programs.
Proceedings of the Foundations of Intelligent Systems, 10th International Symposium, 1997

The Contrast Pyramid Based Image Coding Method.
Proceedings of the Proceedings 1997 International Conference on Image Processing, 1997

Non-Embeded Wavelet Image Coding Scheme.
Proceedings of the Proceedings 1997 International Conference on Image Processing, 1997

Context modeling and entropy coding of wavelet coefficients for image compression.
Proceedings of the 1997 IEEE International Conference on Acoustics, 1997

1996
A new class of theories for which circumscription can be obtained via the predicate completion.
J. Exp. Theor. Artif. Intell., 1996

Automatic Correlation and Calibration of Noisy Sensor Readings Using Elite Genetic Algorithms.
Artif. Intell., 1996

A Sound and Complete Fuzzy Logic System Using Zadeh's Implication Operator.
Proceedings of the Foundations of Intelligent Systems, 9th International Symposium, 1996

1994
A refined semantics for disjunctive logic programs.
Meth. of Logic in CS, 1994

On the relationship between circumscription and well-founded semantics of logic programs.
Meth. of Logic in CS, 1994

Relating only knowing to minimal belief and negation as failure.
J. Exp. Theor. Artif. Intell., 1994

The Logic of Only Knowing as a Unified Framework for Non-Monotonic Reasoning.
Fundam. Inform., 1994

Application of Boolean expression minimization to learning via hierarchical generalization.
Proceedings of the 1994 ACM Symposium on Applied Computing, 1994

Fuzzy Logic or Lukasiewicz Logic: A Clarification.
Proceedings of the Methodologies for Intelligent Systems, 8th International Symposium, 1994

The Generalized Logic of only Knowing (GOL) that Covers the Notion of Epistemic Specifications.
Proceedings of the Methodologies for Intelligent Systems, 8th International Symposium, 1994

1993
Minimal Knowledge + Negation as Failure = Only Knowing (Sometimes).
Proceedings of the Logic Programming and Non-monotonic Reasoning, 1993

The Logic of Only Knowing as a Unified Framework for Non-Monotonic Reasoning.
Proceedings of the Methodologies for Intelligent Systems, 7th International Symposium, 1993

1992
Distributed algorithms for locating centers and medians in communication networks.
Proceedings of the 1992 ACM/SIGAPP Symposium on Applied Computing: Technological Challenges of the 1990's, 1992

A Refined Semantics for Disjunctive Logic Programs.
ECAI, 1992

The BLM semantics may be inconsistent.
Proceedings of the 30th Annual Southeast Regional Conference, 1992

1991
Learning by Discovering Problem Solving Heuristics Through Experience.
IEEE Trans. Knowl. Data Eng., 1991

Ordered seminormal default theories and their extensions.
J. Exp. Theor. Artif. Intell., 1991

The Strong Semantics for Logic Programs.
Proceedings of the Methodologies for Intelligent Systems, 6th International Symposium, 1991

Optimization of the decision tree.
Proceedings of the Third International Conference on Tools for Artificial Intelligence, 1991

1990
A New and Simple Method for Explicit Computation of a Circumscription.
Proceedings of the GWAI-90, 1990


  Loading...