Jianping Yu

According to our database1, Jianping Yu
  • authored at least 57 papers between 2004 and 2017.
  • has a "Dijkstra number"2 of four.



In proceedings 
PhD thesis 


On csauthors.net:


A Parallel Hash Function with Variable Initial Values.
Wireless Personal Communications, 2017

Research on the Hash Function Structures and its Application.
Wireless Personal Communications, 2017

Efficient Chosen-Ciphertext Secure Encryption from R-LWE.
Wireless Personal Communications, 2017

Utilizing fully homomorphic encryption to implement secure medical computation in smart cities.
Personal and Ubiquitous Computing, 2017

A note on the Gaussons of some new logarithmic evolution equations.
Computers & Mathematics with Applications, 2017

Anonymous Anti-Sybil Attack Protocol for Mobile Healthcare Networks Analytics.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

An Improved Leveled Fully Homomorphic Encryption Scheme over the Integers.
Proceedings of the Information Security Practice and Experience, 2017

An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing.
IEEE Trans. Information Forensics and Security, 2016

Attribute-Based Data Sharing Scheme Revisited in Cloud Computing.
IEEE Trans. Information Forensics and Security, 2016

Efficient identity-based leveled fully homomorphic encryption from RLWE.
Security and Communication Networks, 2016

Efficient multi-party quantum key agreement by cluster states.
Quantum Information Processing, 2016

A new approach of attribute partial order structure diagram for word sense disambiguation of English prepositions.
Knowl.-Based Syst., 2016

Efficient Signature Schemes from R-LWE.
TIIS, 2016

Optimizing security and quality of service in a Real-time database system using Multi-objective genetic algorithm.
Expert Syst. Appl., 2016

Modified method of simplest equation and its applications to the Bogoyavlenskii equation.
Computers & Mathematics with Applications, 2016

Rational solutions to two new KP-like equations.
Computers & Mathematics with Applications, 2016

(n+1)-Dimensional reduced differential transform method for solving partial differential equations.
Applied Mathematics and Computation, 2016

An accelerated fully homomorphic encryption scheme over the integers.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

Improved Hash Functions for Cancelable Fingerprint Encryption Schemes.
Wireless Personal Communications, 2015

Dynamic deployment of virtual machines in cloud computing using multi-objective optimization.
Soft Comput., 2015

Quantum private comparison with a malicious third party.
Quantum Information Processing, 2015

Research on Anonymization and De-anonymization in the Bitcoin System.
CoRR, 2015

A Blind-Mixing Scheme for Bitcoin based on an Elliptic Curve Cryptography Blind Digital Signature Algorithm.
CoRR, 2015

Transaction Remote Release (TRR): A New Anonymization Technology for Bitcoin.
CoRR, 2015

A novel hybrid multi-objective immune algorithm with adaptive differential evolution.
Computers & OR, 2015

A Fingerprint Encryption Scheme Based on Irreversible Function and Secure Authentication.
Comp. Math. Methods in Medicine, 2015

A new approach of rules extraction for word sense disambiguation by features of attributes.
Appl. Soft Comput., 2015

A double-module immune algorithm for multi-objective optimization problems.
Appl. Soft Comput., 2015

Efficient Linear Homomorphic Encryption from LWE Over Rings.
Wireless Personal Communications, 2014

Energy-efficient filtering for skyline queries in cluster-based sensor networks.
Computers & Electrical Engineering, 2014

Privacy-preserving Data Aggregation Scheme Based on the P-Function Set in Wireless Sensor Networks.
Ad Hoc & Sensor Wireless Networks, 2014

Improved Multi-objective Evolutionary Algorithm for Multi-agent Coalition Formation.
JSW, 2013

Hybrid Ant Algorithm Based Query Processing with Multiagents in Sensor Networks.
IJDSN, 2013

Skyline Monitoring in Wireless Sensor Networks.
IEICE Transactions, 2013

Unified analysis of statics of some limited-DOF parallel manipulators.
Robotica, 2012

Modelling the guaranteed QoS for wireless sensor networks: a network calculus approach.
EURASIP J. Wireless Comm. and Networking, 2011

Modeling on Guaranteed QoS for Wireless Sensor Networks: A Network Calculus Method
CoRR, 2011

The degree and connectivity of Internet's scale-free topology
CoRR, 2011

Solving Stiffness and Elastic Deformation of Two Limited-Degree-of-Freedom Parallel Manipulators with a Constrained Leg Based on Active/Constrained Wrench.
Advanced Robotics, 2011

Determination of singularities of some 4-DOF parallel manipulators by translational/rotational Jacobian matrices.
Robotica, 2010

Attack Model and Performance Evaluation of Text Digital Watermarking.
JCP, 2010

Simulation of normal machining of 3D free-form surface by an orthogonal 3-leg parallel machine tool with 5-DOF.
Computers & Industrial Engineering, 2010

Dynamics Analysis of Some Limited-Degree-of-Freedom Parallel Manipulators with n UPS Active Legs and a Passive Constraining Leg.
Advanced Robotics, 2010

Detection of Behavioral Contextual Properties in Asynchronous Pervasive Computing Environments.
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010

Middleware Support for Context-awareness in Asynchronous Pervasive Computing Environments.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

Kinematics and statics analysis of a novel 4-dof 2SPS+2SPR parallel manipulator and solving its workspace.
Robotica, 2009

Kinematic analysis of limited-dof parallel manipulators based on translational/rotational Jacobian and Hessian matrices.
Robotica, 2009

Using CAD variation geometry solving constrained wrench of some limited-dof parallel manipulators.
IJCAET, 2009

Checking Behavioral Consistency Constraints for Pervasive Context in Asynchronous Environments
CoRR, 2009

Word sense disambiguation of the English modal verb may by back propagation neural network.
Proceedings of the 4th International Conference on Natural Language Processing and Knowledge Engineering, 2008

Ant-based query processing for replicated events in wireless sensor networks.
Proceedings of the IEEE Congress on Evolutionary Computation, 2008

Implicitization of Parametric Curves via Lagrange Interpolation.
Computing, 2006

AINIDS: an immune-based network intrusion detection system.
Proceedings of the Data Mining, 2006

A Key Distribution Scheme Based on Public Key Cryptography for Sensor Networks.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

Implicitization of Rational Curves.
Proceedings of the Artificial Intelligence and Symbolic Computation, 2006

Reduction of training datasets via fuzzy entropy for support vector machines.
Proceedings of the IEEE International Conference on Systems, 2004

Hybrid Method for Solving New Pose Estimation Equation System.
Proceedings of the Computer Algebra and Geometric Algebra with Applications, 2004