Jianhua Yan
Orcid: 0009-0001-8162-7897
  According to our database1,
  Jianhua Yan
  authored at least 27 papers
  between 2003 and 2025.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
  2025
    J. Intell. Fuzzy Syst., 2025
    
  
  2023
Insights into the Movement and Diffusion Accumulation Characteristics of a Catastrophic Rock Avalanche Debris - A Case Study.
    
  
    Remote. Sens., November, 2023
    
  
  2021
    Proceedings of the 14th International Conference on Human System Interaction, 2021
    
  
  2020
    Medical Image Anal., 2020
    
  
  2019
Secure and Efficient Identity-based Batch Verification Signature Scheme for ADS-B System.
    
  
    KSII Trans. Internet Inf. Syst., 2019
    
  
A Miniature CCA Public Key Encryption Scheme Based on Non-abelian Factorization Problem in Finite Groups of Lie Type.
    
  
    Comput. J., 2019
    
  
  2018
An Efficient Construction of Quantum Attack Resistant Proxy Re-Encryption Based on (Semi)group Factorization Problems.
    
  
    Fundam. Informaticae, 2018
    
  
  2017
Pre-image sample algorithm with irregular Gaussian distribution and construction of identity-based signature.
    
  
    Concurr. Comput. Pract. Exp., 2017
    
  
  2016
    Int. J. Netw. Secur., 2016
    
  
    Int. J. High Perform. Syst. Archit., 2016
    
  
    Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016
    
  
An ID-based Dynamic Authenticated Group Key Agreement Scheme with Optimal Round Complexity from Pairings.
    
  
    Proceedings of the 10th International Conference on Complex, 2016
    
  
  2015
Automatic Construction of 3-D Building Model From Airborne LIDAR Data Through 2-D Snake Algorithm.
    
  
    IEEE Trans. Geosci. Remote. Sens., 2015
    
  
A cheater identifiable multi-secret sharing scheme based on the Chinese remainder theorem.
    
  
    Secur. Commun. Networks, 2015
    
  
  2014
    KSII Trans. Internet Inf. Syst., 2014
    
  
  2013
CCA Secure Threshold KEM Scheme Against Adaptive Corruption Attacks in Standard Model.
    
  
    J. Softw., 2013
    
  
    Proceedings of the MapInteract 2013, 2013
    
  
  2012
    IEEE Trans. Medical Imaging, 2012
    
  
  2011
    Int. J. Comput. Sci. Eng., 2011
    
  
  2007
    Proceedings of the 2007 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2007), 2007
    
  
  2006
    IEEE Trans. Geosci. Remote. Sens., 2006
    
  
    Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006
    
  
    Proceedings of the 18th International Conference on Pattern Recognition (ICPR 2006), 2006
    
  
  2003
A progressive morphological filter for removing nonground measurements from airborne LIDAR data.
    
  
    IEEE Trans. Geosci. Remote. Sens., 2003