Jianhua Yan

Orcid: 0000-0001-7826-5509

According to our database1, Jianhua Yan authored at least 26 papers between 2003 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Practical NTRU Signcryption in the Standard Model.
Entropy, December, 2023

Insights into the Movement and Diffusion Accumulation Characteristics of a Catastrophic Rock Avalanche Debris - A Case Study.
Remote. Sens., November, 2023

2021
Model guided DLP 3D printing for solid and hollow structure.
Proceedings of the 14th International Conference on Human System Interaction, 2021

2020
Supervised learning with cyclegan for low-dose FDG PET image denoising.
Medical Image Anal., 2020

2019
Secure and Efficient Identity-based Batch Verification Signature Scheme for ADS-B System.
KSII Trans. Internet Inf. Syst., 2019

A Miniature CCA Public Key Encryption Scheme Based on Non-abelian Factorization Problem in Finite Groups of Lie Type.
Comput. J., 2019

Attribute-Based Signcryption From Lattices in the Standard Model.
IEEE Access, 2019

2018
An Efficient Construction of Quantum Attack Resistant Proxy Re-Encryption Based on (Semi)group Factorization Problems.
Fundam. Informaticae, 2018

2017
Pre-image sample algorithm with irregular Gaussian distribution and construction of identity-based signature.
Concurr. Comput. Pract. Exp., 2017

2016
A Joint Random Secret Sharing Scheme with Public Verifiability.
Int. J. Netw. Secur., 2016

Round-optimal ID-based dynamic authenticated group key agreement.
Int. J. High Perform. Syst. Archit., 2016

An Efficient Proxy Re-Encryption Based on (Semi) Group Factorization Problems.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

An ID-based Dynamic Authenticated Group Key Agreement Scheme with Optimal Round Complexity from Pairings.
Proceedings of the 10th International Conference on Complex, 2016

2015
Automatic Construction of 3-D Building Model From Airborne LIDAR Data Through 2-D Snake Algorithm.
IEEE Trans. Geosci. Remote. Sens., 2015

Identity-based signcryption from lattices.
Secur. Commun. Networks, 2015

A cheater identifiable multi-secret sharing scheme based on the Chinese remainder theorem.
Secur. Commun. Networks, 2015

2014
A (k, t, n) Verifiable Multi-secret Sharing Scheme Based on Adversary Structure.
KSII Trans. Internet Inf. Syst., 2014

2013
CCA Secure Threshold KEM Scheme Against Adaptive Corruption Attacks in Standard Model.
J. Softw., 2013

A GUI based LIDAR data processing system for model generation and mapping.
Proceedings of the MapInteract 2013, 2013

2012
Direct 4-D PET List Mode Parametric Reconstruction With a Novel EM Algorithm.
IEEE Trans. Medical Imaging, 2012

2011
Emission image reconstruction based on incremental optimisation transfer algorithm.
Int. J. Comput. Sci. Eng., 2011

2007
A Graph Reduction Method for 2D Snake Problems.
Proceedings of the 2007 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2007), 2007

2006
Automatic Construction of Building Footprints From Airborne LIDAR Data.
IEEE Trans. Geosci. Remote. Sens., 2006

Emission Image Reconstruction Based on Incremental Optimization Transfer Algorithm.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

A Nonlinear Variational Model for PET Reconstruction.
Proceedings of the 18th International Conference on Pattern Recognition (ICPR 2006), 2006

2003
A progressive morphological filter for removing nonground measurements from airborne LIDAR data.
IEEE Trans. Geosci. Remote. Sens., 2003


  Loading...