Jianwei Liu

According to our database1, Jianwei Liu authored at least 178 papers between 1995 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Accuracy-Enhanced Variance-Based Time-Skew Calibration Using SAR as Window Detector.
IEEE Trans. VLSI Syst., 2019

Sensors Information Fusion System with Fault Detection Based on Multi-Manifold Regularization Neighborhood Preserving Embedding.
Sensors, 2019

IND-secure quantum symmetric encryption based on point obfuscation.
Quantum Information Processing, 2019

Tolerable Data Transmission of Mobile Edge Computing Under Internet of Things.
IEEE Access, 2019

Efficient CCA2 Secure Flexible and Publicly-Verifiable Fine-Grained Access Control in Fog Computing.
IEEE Access, 2019

A Combined Micro-block Chain Truncation Attack on Bitcoin-NG.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

Security Against Subversion in a Multi-surveillant Setting.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
Blockchain-Based Solutions to Security and Privacy Issues in the Internet of Things.
IEEE Wireless Commun., 2018

Online Learning Algorithm Based on Adaptive Control Theory.
IEEE Trans. Neural Netw. Learning Syst., 2018

Efficient subtree-based encryption for fuzzy-entity data sharing.
Soft Comput., 2018

Energy-Aware Computation Offloading of IoT Sensors in Cloudlet-Based Mobile Edge Computing.
Sensors, 2018

A Compatible OpenFlow Platform for Enabling Security Enhancement in SDN.
Security and Communication Networks, 2018

Fault-tolerant anti-windup control for hypersonic vehicles in reentry based on ISMDO.
J. Franklin Institute, 2018

Lightweight and Manageable Digital Evidence Preservation System on Bitcoin.
J. Comput. Sci. Technol., 2018

Secure pay-TV for chained hotels.
Int. J. Inf. Sec., 2018

Measurement-Device Independency Analysis of Continuous-Variable Quantum Digital Signature.
Entropy, 2018

Understanding structure-based social network de-anonymization techniques via empirical analysis.
EURASIP J. Wireless Comm. and Networking, 2018

Privacy Preservation for Outsourced Medical Data With Flexible Access Control.
IEEE Access, 2018

OSCO: An Open Security-Enhanced Compatible OpenFlow Platform.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

Rank Pruning Approach for Noisy Multi-label Learning.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2018

Affine Transformation Capsule Net.
Proceedings of the Trends and Applications in Knowledge Discovery and Data Mining, 2018

Improving Wireless Network Performance under MPTCP based Multipath Access.
Proceedings of the 43rd IEEE Conference on Local Computer Networks, 2018

Multi-authority Fast Data Cloud-Outsourcing for Mobile Devices.
Proceedings of the Information Security - 21st International Conference, 2018

Clustering Algorithm for Privacy Preservation on MapReduce.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

FRDV: A DTN Routing Based on Human Moving Status in Urban Environments.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Improving Integrated LTE-WiFi Network Performance with SDN Based Flow Scheduling.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

On Design Challenges of an Endpoint Flow Association Optimization Service in a Multi-Provider Wireless Heterogeneous Network.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

MRAC-MU Online Learning.
Proceedings of the 15th International Conference on Control, 2018

Access Delay Analysis in String Multi-hop Wireless Network Under Jamming Attack.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

The Influence Maximization Problem in the Network Under Node Personalized Characteristics.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

Impact of Free Online Medical Consulting Service on Physician Performance.
Proceedings of the 24th Americas Conference on Information Systems, 2018

Auditable Hierarchy-Private Public-Key Encryption.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

Linkable Group Signature for Auditing Anonymous Communication.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

Revisiting the Incentive Mechanism of Bitcoin-NG.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Secure joint Bitcoin trading with partially blind fuzzy signatures.
Soft Comput., 2017

A position-aware Merkle tree for dynamic cloud data integrity verification.
Soft Comput., 2017

Co-Check: Collaborative Outsourced Data Auditing in Multicloud Environment.
Security and Communication Networks, 2017

Continuous-variable quantum network coding for coherent states.
Quantum Information Processing, 2017

Continuous-variable quantum homomorphic signature.
Quantum Information Processing, 2017

Quantum coordinated multi-point communication based on entanglement swapping.
Quantum Information Processing, 2017

Optimal fault-tolerant control for UAV systems with time delay and uncertainties over wireless network.
Peer-to-Peer Networking and Applications, 2017

Certificateless and identity-based authenticated asymmetric group key agreement.
Int. J. Inf. Sec., 2017

Parallel checking of content integrity in multi-cloud storage of heterogeneous sensor systems.
Int. J. Communication Systems, 2017

Auditing Revocable Privacy-Preserving Access Control for EHRs in Clouds.
Comput. J., 2017

A Reconfigurability-Based Security Service Path Construction Scheme.
IEEE Access, 2017

ThinGs In a Fog: System Illustration with Connected Vehicles.
Proceedings of the 85th IEEE Vehicular Technology Conference, 2017

Improved Two-Dimensional Otsu Based on Firefly Optimization for Low Signal-to-Noise Ratio Images.
Proceedings of the Advances in Swarm Intelligence - 8th International Conference, 2017

Medical Big Data Web Service Management Platform.
Proceedings of the 11th IEEE International Conference on Semantic Computing, 2017

Provably Secure Self-Extractable Encryption.
Proceedings of the Provable Security, 2017

Patch-Based Deep Convolutional Neural Network for Corneal Ulcer Area Segmentation.
Proceedings of the Fetal, Infant and Ophthalmic Medical Image Analysis, 2017

Continuous-Variable Quantum Network Coding Against Pollution Attacks.
Proceedings of the Quantum Technology and Optimization Problems, 2017

Deeply Understanding Structure-based Social Network De-anonymization.
Proceedings of the 2017 International Conference on Identification, 2017

A Remote Data Integrity Checking Scheme for Big Data Storage.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

Secure Role-Based Access Control over Outsourced EMRs Against Unwanted Leakage.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

A DP Canopy K-Means Algorithm for Privacy Preservation of Hadoop Platform.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Efficient CCA2 Secure Revocable Multi-authority Large-Universe Attribute-Based Encryption.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Predicate Fully Homomorphic Encryption: Achieving Fine-Grained Access Control over Manipulable Ciphertext.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

Named Entity Recognition in Chinese Electronic Medical Records Based on CRF.
Proceedings of the 14th Web Information Systems and Applications Conference, 2017

2016
Uniform Quantization Theory-Based Linearity Calibration for Split Capacitive DAC in an SAR ADC.
IEEE Trans. VLSI Syst., 2016

Reduced Daily Recalibration of Myoelectric Prosthesis Classifiers Based on Domain Adaptation.
IEEE J. Biomedical and Health Informatics, 2016

Large-Scale MIMO Detection Using MCMC Approach With Blockwise Sampling.
IEEE Trans. Communications, 2016

SAKE: scalable authenticated key exchange for mobile e-health networks.
Security and Communication Networks, 2016

Secure quantum network coding for controlled repeater networks.
Quantum Information Processing, 2016

Opportunistic quantum network coding based on quantum teleportation.
Quantum Information Processing, 2016

Anticollusion Attack Noninteractive Security Hierarchical Key Agreement Scheme in WHMS.
J. Electrical and Computer Engineering, 2016

Survey on key security technologies for space information networks.
J. Comm. Inform. Networks, 2016

Practical chosen-ciphertext secure Hierarchical Identity-Based Broadcast Encryption.
Int. J. Inf. Sec., 2016

Using cloud computing to support higher education in networks and systems.
IJCC, 2016

A One-Round Certificateless Authenticated Group Key Agreement Protocol for Mobile Ad Hoc Networks.
IEICE Transactions, 2016

Quantum Network Coding Against Pollution Attacks.
IEEE Communications Letters, 2016

Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing.
IACR Cryptology ePrint Archive, 2016

Identity-based proxy re-encryption version 2: Making mobile access easy in cloud.
Future Generation Comp. Syst., 2016

Batch Public Key Cryptosystem with batch multi-exponentiation.
Future Generation Comp. Syst., 2016

Global Robust Sliding Mode Control for Time-Delay Systems with Mismatched Uncertainties.
CSSP, 2016

Efficient group key management for secure big data in predictable large-scale networks.
Concurrency and Computation: Practice and Experience, 2016

Using MPTCP subflow association control for heterogeneous wireless network optimization.
Proceedings of the 14th International Symposium on Modeling and Optimization in Mobile, 2016

Distributed Bitcoin Account Management.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Stability analysis and stabilization for T-S fuzzy time-delay systems with mismatched premise membership functions.
Proceedings of the 2016 IEEE International Conference on Systems, Man, and Cybernetics, 2016

Homomorphic Signature for Generation-based Network Coding.
Proceedings of the 2016 IEEE International Conference on Smart Cloud, 2016

Secure and Anonymous Data Transmission System for Cluster Organised Space Information Network.
Proceedings of the 2016 IEEE International Conference on Smart Cloud, 2016

A Networked and Intelligent Regional Collaborative Treatment System for AMI.
Proceedings of the Smart Health - International Conference, 2016

Online/Offline Public-Index Predicate Encryption for Fine-Grained Mobile Access Control.
Proceedings of the Computer Security - ESORICS 2016, 2016

Anonymous Role-Based Access Control on E-Health Records.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

NSV-GUARD: Constructing Secure Routing Paths in Software Defined Networking.
Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), 2016

Accelerating Oblivious Transfer with Batch Multi-exponentiation.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Practical (fully) distributed signatures provably secure in the standard model.
Theor. Comput. Sci., 2015

SCPS: A Social-Aware Distributed Cyber-Physical Human-Centric Search Engine.
IEEE Trans. Computers, 2015

Quantum homomorphic signature.
Quantum Information Processing, 2015

Quantum network coding for general repeater networks.
Quantum Information Processing, 2015

Low-Complexity Power Allocation for Energy Efficiency Maximization in DAS.
IEEE Communications Letters, 2015

Further ideal multipartite access structures from integer polymatroids.
SCIENCE CHINA Information Sciences, 2015

A Study of Privacy Improvement Using a Randomized Blind Signature Scheme in Vehicular Networks.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

Rademacher complexity bound for domain adaptation regression.
Proceedings of the Conference on Technologies and Applications of Artificial Intelligence, 2015

Multiple source domain adaptation: A sharper bound using weighted Rademacher complexity.
Proceedings of the Conference on Technologies and Applications of Artificial Intelligence, 2015

Multiple source domain adaptation: A bound using p-norm covering numbers.
Proceedings of the Conference on Technologies and Applications of Artificial Intelligence, 2015

Power allocation for energy efficiency maximization in DAS with hybrid rate constraint.
Proceedings of the 26th IEEE Annual International Symposium on Personal, 2015

Non-interactive Revocable Identity-Based Access Control over e-Healthcare Records.
Proceedings of the Information Security Practice and Experience, 2015

Batch Blind Signatures on Elliptic Curves.
Proceedings of the Information Security Practice and Experience, 2015

How Price Affect Online Purchase Behavior in Online Healthcare Consulting? Perceived Quality as a Mediator.
Proceedings of the Smart Health - International Conference, 2015

Preliminary Testing of a Hand Gesture Recognition Wristband Based on EMG and Inertial Sensor Fusion.
Proceedings of the Intelligent Robotics and Applications - 8th International Conference, 2015

Antenna location optimization for hybrid user distribution.
Proceedings of the IEEE International Conference on Communication, 2015

Auditing and Revocation Enabled Role-Based Access Control over Outsourced Private EHRs.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Nonlinear Quantum Network Coding with Classical Communication Resource.
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015

Opportunistic Quantum Network Coding.
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015

Enhanced robustness of myoelectric pattern recognition to across-day variation through invariant feature extraction.
Proceedings of the 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2015

PERM-GUARD: Authenticating the Validity of Flow Rules in Software Defined Networking.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Combination in Advance Batch Multi-exponentiation on Elliptic Curve.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

A 89fJ-FOM 6-bit 3.4GS/s flash ADC with 4x time-domain interpolation.
Proceedings of the IEEE Asian Solid-State Circuits Conference, 2015

Towards zero training for myoelectric control based on a wearable wireless sEMG armband.
Proceedings of the IEEE International Conference on Advanced Intelligent Mechatronics, 2015

2014
Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts.
Inf. Sci., 2014

The effect of hexagonal grid topology on wireless communication networks based on network coding.
Int. J. Communication Systems, 2014

Quantum Network Coding Based on Controlled Teleportation.
IEEE Communications Letters, 2014

Continuous estimation of finger joint angles under different static wrist motions from surface EMG signals.
Biomed. Signal Proc. and Control, 2014

Quantification and solutions of arm movements effect on sEMG pattern recognition.
Biomed. Signal Proc. and Control, 2014

An OpenFlow Testbed for the Evaluation of Vertical Handover Decision Algorithms in Heterogeneous Wireless Networks.
Proceedings of the Testbeds and Research Infrastructure: Development of Networks and Communities, 2014

Hierarchical Solution for Access Control and Authentication in Software Defined Networks.
Proceedings of the Network and System Security - 8th International Conference, 2014

Provably Secure Certificateless Authenticated Asymmetric Group Key Agreement.
Proceedings of the Information Security Practice and Experience, 2014

Modeling of Temperature Control for an Intraperitoneal Hyperthermic Chemotherapy Machine.
Proceedings of the Intelligent Robotics and Applications - 7th International Conference, 2014

Design and stability analysis of networked control system with random delay and data dropout using a novel proactive strategy.
Proceedings of the 11th IEEE International Conference on Control & Automation, 2014

Practical Direct Chosen Ciphertext Secure Key-Policy Attribute-Based Encryption with Public Ciphertext Test.
Proceedings of the Computer Security - ESORICS 2014, 2014

Boosting training for myoelectric pattern recognition using Mixed-LDA.
Proceedings of the 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2014

Practical Distributed Signatures in the Standard Model.
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014

Hierarchical Identity-Based Broadcast Encryption.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
Throughput-delay analysis of one-to-many wireless multi-hop flows based on random linear network coding.
Journal of Communications and Networks, 2013

Output-Feedback and Inverse Optimal Control of a Class of Stochastic Nonlinear Systems with More General Growth Conditions.
J. Applied Mathematics, 2013

Iterative Reweighted Noninteger Norm Regularizing SVM for Gene Expression Data Classification.
Comp. Math. Methods in Medicine, 2013

Simultaneous authentication and secrecy in identity-based data upload to cloud.
Cluster Computing, 2013

The asymptotic connectivity of random cognitive radio networks.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

Connectivity of two nodes in cognitive radio ad hoc networks.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

A feature detector based on compressed sensing and wavelet transform for wideband cognitive radio.
Proceedings of the 24th IEEE Annual International Symposium on Personal, 2013

Identity-Based Dynamic Authenticated Group Key Agreement Protocol for Space Information Network.
Proceedings of the Network and System Security - 7th International Conference, 2013

Light Weight Network Coding Based Key Distribution Scheme for MANETs.
Proceedings of the Network and System Security - 7th International Conference, 2013

Finding Key Leakage in Hierarchical Distribution of Encrypted Data.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

A new feature extraction method based on autoregressive power spectrum for improving sEMG classification.
Proceedings of the 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2013

A Generic Construction of Proxy Signatures from Certificateless Signatures.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

2012
A key distribution scheme using network coding for mobile ad hoc network.
Security and Communication Networks, 2012

Security and privacy in emerging information technologies.
Security and Communication Networks, 2012

Using IT to engender trust in government-to-business relationships: The Authorized Economic Operator (AEO) as an example.
Government Information Quarterly, 2012

Effect of dynamic change of arm position on myoelectric pattern recognition.
Proceedings of the 2012 IEEE International Conference on Robotics and Biomimetics, 2012

A New Identity Based Signcryption Scheme in the Standard Model.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

ET-DMD: An Error-Tolerant Scheme to Detect Malicious File Deletion on Distributed Storage.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

2011
SCPS: A Social-Aware Distributed Cyber-Physical Human-Centric Search Engine.
Proceedings of the Global Communications Conference, 2011

Assessment of the benefit of regional flood resources utilization.
Proceedings of the Eighth International Conference on Fuzzy Systems and Knowledge Discovery, 2011

Beer Living Lab - Intelligent Data Sharing.
Proceedings of the Accelerating Global Supply Chains with IT-Innovation, 2011

Procedure Redesign Methods.
Proceedings of the Accelerating Global Supply Chains with IT-Innovation, 2011

2010
A Novel Clustering Topology Control for Reliable Multi-hop Routing in Wireless Sensor Networks.
JCM, 2010

Evaluating IT innovations in a business-to-government context: A framework and its applications.
Government Information Quarterly, 2010

Realising collaborative government-to-business business models: the case of the authorised economic operator.
EG, 2010

Shorter Verifier-Local Revocation Group Signature with Backward Unlinkability.
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010

A Probabilistic Approach for Improving TCP Fairness across Multiple Contending WLANs.
Proceedings of the Global Communications Conference, 2010

Marine stations real-time monitoring database management.
Proceedings of the 18th International Conference on Geoinformatics: GIScience in Change, 2010

IT enabled redesign of export procedure for high-value pharmaceutical product under temperature control: the case of drug living lab.
Proceedings of the 11th Annual International Conference on Digital Government Research, 2010

2009
Analyze a Privacy-Preserving Vehicular Communication Protocol and Propose a New One.
Proceedings of the 10th International Symposium on Pervasive Systems, 2009

IT Enabled Risk Management for Taxation and Customs: The Case of AEO Assessment in the Netherlands.
Proceedings of the Electronic Government, 8th International Conference, 2009

Early requirements engineering for e-customs decision support: Assessing overlap in mental models.
Proceedings of the Normative Multi-Agent Systems, 15.03. - 20.03.2009, 2009

Early Requirements Engineering for e-Customs Decision Support: Assessing Overlap in Mental Models.
Proceedings of the Forum at the CAiSE 2009 Conference, 2009

2008
Applications of AR*-GRNN model for financial time series forecasting.
Neural Computing and Applications, 2008

Preserving Control in Trade Procedure Redesign - The Beer Living Lab.
Electronic Markets, 2008

eGovernment Project Evaluation: An Integrated Framework.
Proceedings of the Electronic Government, 7th International Conference, 2008

Moral hazard and G2B control procedures redesign.
Proceedings of the 9th Annual International Conference on Digital Government Research, 2008

Delegation of Control in Administrative Procedures.
Proceedings of the Deontic Logic in Computer Science, 9th International Conference, 2008

Towards Asymmetric Information for the G2B Inter-Organizational Networks.
Proceedings of the 21st Bled eConference: eCollaboration: Overcoming Boundaries Through Multi-Channel Interaction, 2008

2007
Error modeling for five-axis laser processing robot.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2007

A Key Management and Authentication Model for Ad hoc Network.
Proceedings of the IEEE 18th International Symposium on Personal, 2007

Towards a Methodology for Designing E-Government Control Procedures.
Proceedings of the Electronic Government, 6th International Conference, 2007

E-Customs Control Procedures Redesign Methodology: Model-Based Application.
Proceedings of the Fifteenth European Conference on Information Systems, 2007

Design and Analysis of e-Government Control: the Green Corridor between Finland and Russia.
Proceedings of the 20th Bled eConference: eMergence: Merging and Emerging Technologies, 2007

Rethinking EU Trade Procedures - The Beer Living Lab.
Proceedings of the 20th Bled eConference: eMergence: Merging and Emerging Technologies, 2007

2006
Computing of Trust in Ad-Hoc Networks.
Proceedings of the Communications and Multimedia Security, 2006

2005
Using GARCH-GRNN Model to Forecast Financial Time Series.
Proceedings of the Computer and Information Sciences, 2005

2004
Intelligent Web Service Discovery in Large Distributed System.
Proceedings of the Intelligent Data Engineering and Automated Learning, 2004

Decentralized Web Service Organization Combining Semantic Web and Peer to Peer Computing.
Proceedings of the Web Services, European Conference, 2004

DHT Facilitated Web Service Discovery Incorporating Semantic Annotation.
Proceedings of the Discovery Science, 7th International Conference, 2004

2000
AMULET3i - An Asynchronous System-on-Chip.
Proceedings of the 6th International Symposium on Advanced Research in Asynchronous Circuits and Systems (ASYNC 2000), 2000

1998
A Low-Power, Low-Noise, Configurable Self-Timed DSP.
Proceedings of the 4th International Symposium on Advanced Research in Asynchronous Circuits and Systems (ASYNC '98), 30 March, 1998

1997
AMULET2e: An Asynchronous Embedded Controller.
Proceedings of the 3rd International Symposium on Advanced Research in Asynchronous Circuits and Systems (ASYNC '97), 1997

1996
Dynamic logic in four-phase micropipelines.
Proceedings of the 2nd International Symposium on Advanced Research in Asynchronous Circuits and Systems (ASYNC '96), 1996

1995
A hybrid asynchronous system design environment.
Proceedings of the Second Working Conference on Asynchronous Design Methodologies, 1995


  Loading...