Shaohui Wang

Orcid: 0000-0001-6941-3194

According to our database1, Shaohui Wang authored at least 56 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Comprehensive mining of information in Weakly Supervised Semantic Segmentation: Saliency semantics and edge semantics.
Neural Networks, January, 2024

2023
GaitSG: Gait Recognition with SMPLs in Graph Structure.
Sensors, October, 2023

HAVE-FUN: Human Avatar Reconstruction from Few-Shot Unconstrained Images.
CoRR, 2023

DT-NeRF: Decomposed Triplane-Hash Neural Radiance Fields for High-Fidelity Talking Portrait Synthesis.
CoRR, 2023

NeRF-MS: Neural Radiance Fields with Multi-Sequence.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

2022
The Laplacian Spectrum, Kirchhoff Index, and the Number of Spanning Trees of the Linear Heptagonal Networks.
Complex., 2022

2021
Complexity of Some Generalized Operations on Networks.
Complex., 2021

2020
Design of Intelligent Management and Service System for Gas Valve.
J. Inf. Process. Syst., 2020

Interval edge-coloring: A model of curriculum scheduling.
AKCE Int. J. Graphs Comb., 2020

2019
抗内部关键词猜测攻击的高效公钥可搜索加密方案 (Efficient Public-key Searchable Encryption Scheme Against Inside Keyword Guessing Attack).
计算机科学, 2019

On 2-rainbow domination of generalized Petersen graphs.
Discret. Appl. Math., 2019

Changing and Unchanging 2-Rainbow Independent Domination.
IEEE Access, 2019

Optimal Key-Tree for RFID Authentication Protocols with Storage Constraints.
Proceedings of the Science of Cyber Security - Second International Conference, 2019

2018
On the Topological Properties of the Certain Neural Networks.
J. Artif. Intell. Soft Comput. Res., 2018

The Domination Complexity and Related Extremal Values of Large 3D Torus.
Complex., 2018

On extremal multiplicative Zagreb indices of trees with given domination number.
Appl. Math. Comput., 2018

Resistance Distance and Kirchhoff Index of the Corona-Vertex and the Corona-Edge of Subdivision Graph.
IEEE Access, 2018

2017
基于多重映射的安全S盒构造方法 (Method to Construct Secure S-boxes Based on Multimap).
计算机科学, 2017

On extremal multiplicative Zagreb indices of trees with given number of vertices of maximum degree.
Discret. Appl. Math., 2017

Sharp upper bounds for multiplicative Zagreb indices of bipartite graphs with given diameter.
Discret. Appl. Math., 2017

Structure Properties of Koch Networks Based on Networks Dynamical Systems.
Complex., 2017

On the edge-version atom-bond connectivity and geometric arithmetic indices of certain graph operations.
Appl. Math. Comput., 2017

2016
基于重路由匿名通信系统的设计 (New Design of Rerouting-based Anonymous Communication System).
计算机科学, 2016

Multiplicative Zagreb indices of cacti.
Discret. Math. Algorithms Appl., 2016

The Values of Public Library in Promoting an Open Government Environment.
Proceedings of the 17th International Digital Government Research Conference on Digital Government Research, 2016

Privacy-preserving k-NN computation over encrypted cloud data without key sharing.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

2015
Security Analysis and Improvement on Two RFID Authentication Protocols.
Wirel. Pers. Commun., 2015

Multiplicative Zagreb indices of k-trees.
Discret. Appl. Math., 2015

A Hybrid Approach to Causality Analysis.
Proceedings of the Runtime Verification - 6th International Conference, 2015

2014
Security analysis of two lightweight RFID authentication protocols.
Ann. des Télécommunications, 2014

2013
Security Analysis of Lightweight Authentication Protocol from WISTP 2013.
IACR Cryptol. ePrint Arch., 2013

A Causality Analysis Framework for Component-Based Real-Time Systems.
Proceedings of the Runtime Verification - 4th International Conference, 2013

Contract-based blame assignment by trace analysis.
Proceedings of the 2nd ACM International Conference on High Confidence Networked Systems (part of CPS Week), 2013

Construction of Lightweight Certificate-Based Signature and Application in Cloud Computing.
Proceedings of the Advances in Wireless Sensor Networks, 2013

2012
Analysis and Construction of Efficient RFID Authentication Protocol with Backward Privacy.
IACR Cryptol. ePrint Arch., 2012

Security Analysis of RAPP An RFID Authentication Protocol based on Permutation.
IACR Cryptol. ePrint Arch., 2012

Public Auditing for Ensuring Cloud Data Storage Security With Zero Knowledge Privacy.
IACR Cryptol. ePrint Arch., 2012

2011
Runtime Verification of Traces under Recording Uncertainty.
Proceedings of the Runtime Verification - Second International Conference, 2011

Passive Attack on RFID LMAP++ Authentication Protocol.
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011

2010
A Safety-Assured Development Approach for Real-Time Software.
Proceedings of the 16th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, 2010

Research on mechanisms of providing electronic public services for information vulnerable groups in China.
Proceedings of the ICEGOV 2010, Proceedings of the 4th International Conference on Theory and Practice of Electronic Governance, Beijing, China, October 25, 2010

Improved Differential Cryptanalysis of Serpent.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

Differential Fault Analysis on PRESENT Key Schedule.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

2009
Model-Based Testing of GUI-Driven Applications.
Proceedings of the Software Technologies for Embedded and Ubiquitous Systems, 2009

A precise measurement of quality factor for Planar Microtoroid Resonators.
Proceedings of the 4th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2009

The analysis of microtoroid cavity coupling system based on fullwave.
Proceedings of the 4th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2009

Design of the miniature optical fiber voltage sensor.
Proceedings of the 4th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2009

Preimage Attack on Hash Function RIPEMD.
Proceedings of the Information Security Practice and Experience, 2009

Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL.
Proceedings of the Progress in Cryptology, 2009

2008
Modification and Improvement on Group Signature Scheme without Random Oracles.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

The Application of Blog in Modern Education.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

Aggregate and Separate of Signatures in Wireless Network.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

A Certificateless Signature and Group Signature Schemes against Malicious PKG.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Optimization of Position of Reflective Boards for Increasing Light Intensity Inside Chinese Lean-to Greenhouses.
Proceedings of the Computer And Computing Technologies In Agriculture, 2007

Effect of Image Processing of a Leaf Photograph on the Calculated Fractal Dimension of Leaf Veins.
Proceedings of the Computer And Computing Technologies In Agriculture, 2007

2006
The Probability Advantages of Two Linear Expressions in Symmetric Ciphers.
IACR Cryptol. ePrint Arch., 2006


  Loading...