Qixiang Mei

According to our database1, Qixiang Mei authored at least 18 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Noise-tolerate and adaptive coefficient zeroing neural network for solving dynamic matrix square root.
CAAI Trans. Intell. Technol., February, 2024

2021
Self-Adaptive Image Encryption Algorithm Based on Quantum Logistic Map.
Secur. Commun. Networks, 2021

Solving Time-Varying Complex-Valued Sylvester Equation via Adaptive Coefficient and Non-Convex Projection Zeroing Neural Network.
IEEE Access, 2021

Image Encryption Scheme Based on Quantum Logistic Map and Cellular Automata.
Proceedings of the 6th IEEE International Conference on Computer and Communication Systems, 2021

2019
迭代学习控制的最优学习律和简化学习律的频域研究 (Study of Optimal Learning Law and Simplified Learning Law of Iterative Learning Control in Frequency Domain).
计算机科学, 2019

Fault diagnosis of a transformer based on polynomial neural networks.
Clust. Comput., 2019

2016
Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption.
IEEE Trans. Dependable Secur. Comput., 2016

2015
Efficient revocable identity-based encryption from multilinear maps.
Secur. Commun. Networks, 2015

Complementary witness soundness for witness indistinguishable proof system and CCA2 public-key encryption schemes.
Int. J. Inf. Comput. Secur., 2015

2014
Related Key Secure PKE from Hash Proof Systems.
Proceedings of the Advances in Information and Computer Security, 2014

2013
Improving the Message-ciphertext Rate of Lewko's Fully Secure IBE Scheme.
IACR Cryptol. ePrint Arch., 2013

RKA Secure PKE Based on the DDH and HR Assumptions.
Proceedings of the Provable Security - 7th International Conference, 2013

2012
Improved Efficiency of Chosen Ciphertext Secure Encryption from Factoring.
Proceedings of the Information Security Practice and Experience, 2012

2011
Key-Dependent Message Security for Division Function: Discouraging Anonymous Credential Sharing.
Proceedings of the Provable Security - 5th International Conference, 2011

Chosen Ciphertext Secure Encryption under Factoring Assumption Revisited.
Proceedings of the Public Key Cryptography - PKC 2011, 2011

Improved Tradeoff between Encapsulation and Decapsulation of HK09.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011

2010
Chosen Ciphertext Secure Encryption over Semi-smooth Subgroup.
IACR Cryptol. ePrint Arch., 2010

2005
Direct Chosen Ciphertext Security from Identity-Based Techniques.
IACR Cryptol. ePrint Arch., 2005


  Loading...