Lianhai Wang
Orcid: 0000-0002-5701-3465
  According to our database1,
  Lianhai Wang
  authored at least 88 papers
  between 2009 and 2026.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
  2026
EIVBoost: An efficient and interpretable gradient boosting framework for Vertical Federated Learning.
    
  
    Comput. Stand. Interfaces, 2026
    
  
  2025
    IEEE Trans. Dependable Secur. Comput., 2025
    
  
Secure color image encryption algorithm for face recognition using Zaslavsky and Arnold cat maps with binary bit-plane decomposition.
    
  
    Inf. Sci., 2025
    
  
    IEEE Internet Things J., 2025
    
  
Distributed privacy-preserving keyword querying for integrated data in IoT networks via function secret sharing.
    
  
    Inf. Fusion, 2025
    
  
Blockchain-based secure data sharing with overlapping clustering and searchable encryption.
    
  
    Comput. Stand. Interfaces, 2025
    
  
An Integer Erasure Correction Coding and Its Application for Security Enhancement of Encryption.
    
  
    IEEE Access, 2025
    
  
    Proceedings of the Information and Communications Security - 27th International Conference, 2025
    
  
    Proceedings of the 28th International Conference on Computer Supported Cooperative Work in Design, 2025
    
  
Cross-Chain Identity Authentication Protocol based on Group Signature and Zero-Knowledge Proof.
    
  
    Proceedings of the 28th International Conference on Computer Supported Cooperative Work in Design, 2025
    
  
A Decentralized Federated Learning Framework with Enhanced Privacy and Optimized Fairness.
    
  
    Proceedings of the 28th International Conference on Computer Supported Cooperative Work in Design, 2025
    
  
A Lightweight Identity Privacy Protection Scheme For Electric Vehicles Based On Consortium Blockchain.
    
  
    Proceedings of the 28th International Conference on Computer Supported Cooperative Work in Design, 2025
    
  
  2024
    Connect. Sci., December, 2024
    
  
    IEEE Wirel. Commun., October, 2024
    
  
Efficient Certificateless Online/Offline Signcryption Scheme Without Bilinear Pairing for Smart Home Consumer Electronics.
    
  
    IEEE Trans. Consumer Electron., February, 2024
    
  
    Comput. Stand. Interfaces, January, 2024
    
  
    Comput. Stand. Interfaces, January, 2024
    
  
A Blockchain-Based Privacy-Preserving Healthcare Data Sharing Scheme for Incremental Updates.
    
  
    Symmetry, 2024
    
  
    Comput. Electr. Eng., 2024
    
  
    Proceedings of the 2024 4th International Conference on Control and Intelligent Robotics, 2024
    
  
Infringement Detection and Traceability Scheme Based on Ciphertext Feature Extraction.
    
  
    Proceedings of the 9th IEEE International Conference on Data Science in Cyberspace, 2024
    
  
    Proceedings of the 9th IEEE International Conference on Data Science in Cyberspace, 2024
    
  
  2023
A privacy-preserving and efficient data sharing scheme with trust authentication based on blockchain for mHealth.
    
  
    Connect. Sci., December, 2023
    
  
Isoga: An Isogeny-Based Quantum-Resist Searchable Encryption Scheme Against Keyword Guessing Attacks.
    
  
    IEEE Syst. J., June, 2023
    
  
    Symmetry, February, 2023
    
  
An Approach for Blockchain and Symmetric Keys Broadcast Encryption Based Access Control in IoT.
    
  
    Symmetry, February, 2023
    
  
Auditable Blockchain Rewriting in Permissioned Setting With Mandatory Revocability for IoT.
    
  
    IEEE Internet Things J., 2023
    
  
    Proceedings of the 22nd IEEE International Conference on Trust, 2023
    
  
    Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023
    
  
  2022
Privacy protection in social applications: A ciphertext policy attribute-based encryption with keyword search.
    
  
    Int. J. Intell. Syst., December, 2022
    
  
Outsourced Data Integrity Checking with Practical Key Update in Edge-Cloud Resilient Networks.
    
  
    IEEE Wirel. Commun., 2022
    
  
An Approach for Blockchain Pool Mining Employing the Consensus Protocol Robust against Block Withholding and Selfish Mining Attacks.
    
  
    Symmetry, 2022
    
  
Security Enhanced Symmetric Key Encryption Employing an Integer Code for the Erasure Channel.
    
  
    Symmetry, 2022
    
  
A Quantum Secure and Noninteractive Identity-Based Aggregate Signature Protocol From Lattices.
    
  
    IEEE Syst. J., 2022
    
  
    IEEE Netw., 2022
    
  
A Secure and Efficient Multiserver Authentication and Key Agreement Protocol for Internet of Vehicles.
    
  
    IEEE Internet Things J., 2022
    
  
An Approach for Security Enhancement of Certain Encryption Schemes Employing Error Correction Coding and Simulated Synchronization Errors.
    
  
    Entropy, 2022
    
  
    Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022
    
  
    Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022
    
  
  2021
Minimum Dominating Set of Multiplex Networks: Definition, Application, and Identification.
    
  
    IEEE Trans. Syst. Man Cybern. Syst., 2021
    
  
    Secur. Commun. Networks, 2021
    
  
    Secur. Commun. Networks, 2021
    
  
    J. Inf. Secur. Appl., 2021
    
  
    Proceedings of the ACM ICEA '21: 2021 ACM International Conference on Intelligent Computing and its Emerging Applications, Jinan, China, December 28, 2021
    
  
Supervisory Scheme for Blockchain Privacy Protection Technique Based on Group Signature.
    
  
    Proceedings of the ACM ICEA '21: 2021 ACM International Conference on Intelligent Computing and its Emerging Applications, Jinan, China, December 28, 2021
    
  
  2020
Blockchain-Based Anonymous Authentication With Selective Revocation for Smart Industrial Applications.
    
  
    IEEE Trans. Ind. Informatics, 2020
    
  
    Inf. Sci., 2020
    
  
Improved Security of a Pairing-Free Certificateless Aggregate Signature in Healthcare Wireless Medical Sensor Networks.
    
  
    IEEE Internet Things J., 2020
    
  
Linear Complexity of Two Classes of Binary Interleaved Sequences with Low Autocorrelation.
    
  
    Int. J. Netw. Secur., 2020
    
  
PLC-SEIFF: A programmable logic controller security incident forensics framework based on automatic construction of security constraints.
    
  
    Comput. Secur., 2020
    
  
The 2-adic complexity of a class of binary sequences with optimal autocorrelation magnitude.
    
  
    Cryptogr. Commun., 2020
    
  
  2019
Virus Propagation and Patch Distribution in Multiplex Networks: Modeling, Analysis, and Optimal Allocation.
    
  
    IEEE Trans. Inf. Forensics Secur., 2019
    
  
A new fixed-time stability theorem and its application to the synchronization control of memristive neural networks.
    
  
    Neurocomputing, 2019
    
  
Recognizing roles of online illegal gambling participants: An ensemble learning approach.
    
  
    Comput. Secur., 2019
    
  
Deformable Convolutional Matrix Factorization for Document Context-Aware Recommendation in Social Networks.
    
  
    IEEE Access, 2019
    
  
    Proceedings of the 2019 International Conference on Networking and Network Applications, 2019
    
  
    Proceedings of the 2nd International Conference on Big Data Technologies, 2019
    
  
Research on the Quality Prediction of Online Chinese Question Answering Community Answers Based on Comments.
    
  
    Proceedings of the 2nd International Conference on Big Data Technologies, 2019
    
  
Analysis of the Influence of Individual Web Behavior Pattern on Group Behavior Simulation.
    
  
    Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019
    
  
    Proceedings of the Information Retrieval - 25th China Conference, 2019
    
  
  2018
Optimal Dismantling of Interdependent Networks Based on Inverse Explosive Percolation.
    
  
    IEEE Trans. Circuits Syst. II Express Briefs, 2018
    
  
    Secur. Commun. Networks, 2018
    
  
A Sparse Grid Stochastic Collocation Upwind Finite Volume Element Method for the Constrained Optimal Control Problem Governed by Random Convection Diffusion Equations.
    
  
    J. Sci. Comput., 2018
    
  
    Proceedings of the Tenth International Conference on Soft Computing and Pattern Recognition, 2018
    
  
Role Recognition of Illegal Online Gambling Participants Using Monetary Transaction Data.
    
  
    Proceedings of the Information and Communications Security - 20th International Conference, 2018
    
  
  2017
Linking Multiple Online Identities in Criminal Investigations: A Spectral Co-Clustering Framework.
    
  
    IEEE Trans. Inf. Forensics Secur., 2017
    
  
    Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017
    
  
    Proceedings of the Data Science, 2017
    
  
    Proceedings of the Cloud Computing and Security - Third International Conference, 2017
    
  
  2016
    EURASIP J. Inf. Secur., 2016
    
  
The robustness of interdependent networks under the interplay between cascading failures and virus propagation.
    
  
    CoRR, 2016
    
  
    Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016
    
  
    Proceedings of the IEEE International Conference on Information and Automation, 2016
    
  
  2015
  2014
Robust palmprint identification based on directional representations and compressed sensing.
    
  
    Multim. Tools Appl., 2014
    
  
    Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014
    
  
  2013
    Proceedings of the Sixth International Conference on Machine Vision, 2013
    
  
    Proceedings of the Sixth International Conference on Machine Vision, 2013
    
  
Research on Extracting System Logged-In Password Forensically from Windows Memory Image File.
    
  
    Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013
    
  
  2012
    Proceedings of the Intelligent Information Processing VI, 2012
    
  
  2010
    Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010
    
  
Acquisition of Network Connection Status Information from Physical Memory on Windows Vista Operating System.
    
  
    Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010
    
  
    Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010
    
  
  2009
    Proceedings of the Business Intelligence: Artificial Intelligence in Business, 2009
    
  
    Proceedings of the Fifth International Conference on Information Assurance and Security, 2009