Yixian Yang

According to our database1, Yixian Yang authored at least 258 papers between 1990 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
Anonymous three-factor authenticated key agreement for wireless sensor networks.
Wireless Networks, 2019

Robust Privacy-Preserving Mutual Authenticated Key Agreement Scheme in Roaming Service for Global Mobility Networks.
IEEE Systems Journal, 2019

Improving the Classification Effectiveness of Intrusion Detection by Using Improved Conditional Variational AutoEncoder and Deep Neural Network.
Sensors, 2019

A Neighbor Prototype Selection Method Based on CCHPSO for Intrusion Detection.
Security and Communication Networks, 2019

A universal protocol for controlled bidirectional quantum state transmission.
Quantum Information Processing, 2019

Secure quantum network coding based on quantum homomorphic message authentication.
Quantum Information Processing, 2019

Fixed-time synchronization of inertial memristor-based neural networks with discrete delay.
Neural Networks, 2019

Asymptotic and finite-time synchronization of memristor-based switching networks with multi-links and impulsive perturbation.
Neural Computing and Applications, 2019

Cryptographic primitives in blockchains.
J. Network and Computer Applications, 2019

Quantum homomorphic encryption scheme with flexible number of evaluator based on (k, n)-threshold quantum state sharing.
Inf. Sci., 2019

P-Tensor Product in Compressed Sensing.
IEEE Internet of Things Journal, 2019

Flexible and Secure Data Transmission System Based on Semitensor Compressive Sensing in Wireless Body Area Networks.
IEEE Internet of Things Journal, 2019

A new fixed-time stability theorem and its application to the synchronization control of memristive neural networks.
Neurocomputing, 2019

Efficient quantum state transmission via perfect quantum network coding.
SCIENCE CHINA Information Sciences, 2019

New Construction of Blind Signatures From Braid Groups.
IEEE Access, 2019

Asymmetric Controlled Bidirectional Remote Preparation of Single- and Three-Qubit Equatorial State in Noisy Environment.
IEEE Access, 2019

Certificateless Short Aggregate Signature Scheme for Mobile Devices.
IEEE Access, 2019

Quantum Network Communication With a Novel Discrete-Time Quantum Walk.
IEEE Access, 2019

Sparse General Non-Negative Matrix Factorization Based on Left Semi-Tensor Product.
IEEE Access, 2019

Secure and Privacy-Preserving Warning Message Dissemination in Cloud-Assisted Internet of Vehicles.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
DECENT: Secure and fine-grained data access control with policy updating for constrained IoT devices.
World Wide Web, 2018

A Novel Digital Watermarking Based on General Non-Negative Matrix Factorization.
IEEE Trans. Multimedia, 2018

Statistic Experience Based Adaptive One-Shot Detector (EAO) for Camera Sensing System.
Sensors, 2018

SmartVeh: Secure and Efficient Message Access Control and Authentication for Vehicular Cloud Computing.
Sensors, 2018

Adaptive Secure Cross-Cloud Data Collaboration with Identity-Based Cryptography and Conditional Proxy Re-Encryption.
Security and Communication Networks, 2018

Two authenticated quantum dialogue protocols based on three-particle entangled states.
Quantum Information Processing, 2018

Rational protocol of quantum secure multi-party computation.
Quantum Information Processing, 2018

Cryptanalysis of secret sharing with a single d-level quantum system.
Quantum Information Processing, 2018

General Theory of security and a study of hacker's behavior in big data era.
Peer-to-Peer Networking and Applications, 2018

Finite-Time Robust Synchronization of Memrisive Neural Network with Perturbation.
Neural Processing Letters, 2018

Synchronization of Multi-links Memristor-Based Switching Networks Under Uniform Random Attacks.
Neural Processing Letters, 2018

Synchronization Control of Coupled Memristor-Based Neural Networks with Mixed Delays and Stochastic Perturbations.
Neural Processing Letters, 2018

A Secure and Efficient Transmission Method in Connected Vehicular Cloud Computing.
IEEE Network, 2018

Parameters estimation and synchronization of uncertain coupling recurrent dynamical neural networks with time-varying delays based on adaptive control.
Neural Computing and Applications, 2018

Fixed-time synchronization of memristor-based fuzzy cellular neural network with time-varying delay.
J. Franklin Institute, 2018

Incremental general non-negative matrix factorization without dimension matching constraints.
Neurocomputing, 2018

Certificateless short signature scheme from pairing in the standard model.
Int. J. Communication Systems, 2018

Corrigendum to "Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing" [Future Gener. Comput. Syst. 72 (2017) 239-249].
Future Generation Comp. Syst., 2018

PRECISE: Identity-based private data sharing with conditional proxy re-encryption in online social networks.
Future Generation Comp. Syst., 2018

Primitives towards verifiable computation: a survey.
Frontiers Comput. Sci., 2018

On development of security monitoring system via wireless sensing network.
EURASIP J. Wireless Comm. and Networking, 2018

Particle swarm optimizer with crossover operation.
Eng. Appl. of AI, 2018

Securing Named Data Networking: Attribute-Based Encryption and Beyond.
IEEE Communications Magazine, 2018

Quantifying team precedence in the game of cricket.
Cluster Computing, 2018

An Ensemble Method based on Selection Using Bat Algorithm for Intrusion Detection.
Comput. J., 2018

A secure rational quantum state sharing protocol.
SCIENCE CHINA Information Sciences, 2018

Data hiding in color halftone images based on new conjugate property.
Computers & Electrical Engineering, 2018

Adaptive synchronization of memristor-based BAM neural networks with mixed delays.
Applied Mathematics and Computation, 2018

Fixed-Time Synchronization of Memristive Fuzzy BAM Cellular Neural Networks With Time-Varying Delays Based on Feedback Controllers.
IEEE Access, 2018

Correction to "Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things".
IEEE Access, 2018

Secure Identity-Based Data Sharing and Profile Matching for Mobile Healthcare Social Networks in Cloud Computing.
IEEE Access, 2018

A Secure Cryptocurrency Scheme Based on Post-Quantum Blockchain.
IEEE Access, 2018

Adaptive Lag Synchronization of Memristive Neural Networks With Mixed Delays.
IEEE Access, 2018

An Efficient and Secure Transmission Model Based on Compressive Sensing.
Proceedings of the 2018 International Symposium on Security and Privacy in Social Networks and Big Data, 2018

An evaluation method of image scrambling degree based on pixel distribution.
Proceedings of the 2018 International Symposium on Security and Privacy in Social Networks and Big Data, 2018

On the Maximal Code Length of Optimal Linear Locally Repairable Codes.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

Secure Multiparty Quantum Summation Based on d-Level Single Particles.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Controlled Bidirectional Remote Preparation of Single- and Two-Qubit State.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

DACSC: Dynamic and Fine-Grained Access Control for Secure Data Collaboration in Cloud Computing.
Proceedings of the IEEE Global Communications Conference, 2018

A high-Capacity Watermarking Algorithm Using two Bins Histogram Modification.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2017
A Novel Smart Card Based User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks.
Wireless Personal Communications, 2017

Secure and Energy-Efficient Data Transmission System Based on Chaotic Compressive Sensing in Body-to-Body Networks.
IEEE Trans. Biomed. Circuits and Systems, 2017

Scalable Node-Centric Route Mutation for Defense of Large-Scale Software-Defined Networks.
Security and Communication Networks, 2017

Secure and Privacy-Preserving Data Sharing and Collaboration in Mobile Healthcare Social Networks of Smart Cities.
Security and Communication Networks, 2017

Controlled bidirectional remote preparation of three-qubit state.
Quantum Information Processing, 2017

Fixed-time synchronization of memristor-based BAM neural networks with time-varying discrete delay.
Neural Networks, 2017

An anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography.
Multimedia Tools Appl., 2017

WORM-HUNTER: A Worm Guard System using Software-defined Networking.
TIIS, 2017

Certificateless multi-signer universal designated multi-verifier signature from elliptic curve group.
TIIS, 2017

Homomorphic Signatures from Chameleon Hash Functions.
ITC, 2017

General Theory of Security and a Study Case in Internet of Things.
IEEE Internet of Things Journal, 2017

Finite-time stability analysis for neutral-type neural networks with hybrid time-varying delays without using Lyapunov method.
Neurocomputing, 2017

Finite-time topology identification and stochastic synchronization of complex network with multiple time delays.
Neurocomputing, 2017

Finite-time synchronization of memristor-based neural networks with mixed delays.
Neurocomputing, 2017

Fuzzy-synthetic minority oversampling technique: Oversampling based on fuzzy set theory for Android malware detection in imbalanced datasets.
IJDSN, 2017

Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing.
Future Generation Comp. Syst., 2017

Minimum length key in MST cryptosystems.
SCIENCE CHINA Information Sciences, 2017

Particle swarm optimizer with two differential mutation.
Appl. Soft Comput., 2017

Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things.
IEEE Access, 2017

Prediction of Rising Stars in the Game of Cricket.
IEEE Access, 2017

Minimal logarithmic signatures for one type of classical groups.
Appl. Algebra Eng. Commun. Comput., 2017

Node-centric route mutation for large-scale SDN based on 3D earth mover's distance model.
Proceedings of the 17th International Symposium on Communications and Information Technologies, 2017

Secure Multi-party Comparison Protocol and Application.
Proceedings of the Data Science, 2017

2016
An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks.
Sensors, 2016

Short lattice signatures with constant-size public keys.
Security and Communication Networks, 2016

Robust anonymous two-factor authenticated key exchange scheme for mobile client-server environment.
Security and Communication Networks, 2016

Cryptanalysis and improvement of a chaotic maps-based anonymous authenticated key agreement protocol for multiserver architecture.
Security and Communication Networks, 2016

A secure and efficient mutual authentication scheme for session initiation protocol.
Peer-to-Peer Networking and Applications, 2016

Finite-Time Boundedness Analysis of Memristive Neural Network with Time-Varying Delay.
Neural Processing Letters, 2016

Anti-synchronization Control of Memristive Neural Networks with Multiple Proportional Delays.
Neural Processing Letters, 2016

Finite-Time Anti-synchronization Control of Memristive Neural Networks With Stochastic Perturbations.
Neural Processing Letters, 2016

Efficient Post-Quantum Secure Network Coding Signatures in the Standard Model.
TIIS, 2016

Robust ID based mutual authentication and key agreement scheme preserving user anonymity in mobile networks.
TIIS, 2016

An advanced elliptic curve cryptography based mutual authentication scheme for session initiation protocol.
ITC, 2016

Multi-User Quantum Wireless Network Communication Based on Multi-Qubit GHZ State.
IEEE Communications Letters, 2016

Construction of DNA codes by using algebraic number theory.
Finite Fields and Their Applications, 2016

Semi-tensor compressed sensing.
Digital Signal Processing, 2016

VOAuth: A solution to protect OAuth against phishing.
Computers in Industry, 2016

Quantum network coding for multi-unicast problem based on 2D and 3D cluster states.
SCIENCE CHINA Information Sciences, 2016

2015
Postfix automata.
Theor. Comput. Sci., 2015

Identity-based signcryption from lattices.
Security and Communication Networks, 2015

A biometrics and smart cards-based authentication scheme for multi-server environments.
Security and Communication Networks, 2015

Network coding for quantum cooperative multicast.
Quantum Information Processing, 2015

A novel protocol for multiparty quantum key management.
Quantum Information Processing, 2015

A new quantum sealed-bid auction protocol with secret order in post-confirmation.
Quantum Information Processing, 2015

Quantum state representation based on combinatorial Laplacian matrix of star-relevant graph.
Quantum Information Processing, 2015

Finite-Time Function Projective Synchronization in Complex Multi-links Networks with Time-Varying Delay.
Neural Processing Letters, 2015

Fast and scalable support vector clustering for large-scale data analysis.
Knowl. Inf. Syst., 2015

An Enhanced Biometric-Based Authentication Scheme for Telecare Medicine Information Systems Using Elliptic Curve Cryptosystem.
J. Medical Systems, 2015

Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps.
J. Medical Systems, 2015

Defense Strategy of Network Security based on Dynamic Classification.
TIIS, 2015

A Three-Party Password-based Authenticated Key Exchange Protocol for Wireless Communications.
ITC, 2015

A Lightweight ID Based Authentication and Key Agreement Protocol for Multiserver Architecture.
IJDSN, 2015

Scaling Concolic Testing for the Environment-Intensive Program.
IEICE Transactions, 2015

Perfect Quantum Network Coding Independent of Classical Network Solutions.
IEEE Communications Letters, 2015

Minimal logarithmic signatures for the unitary group Un(q).
Des. Codes Cryptogr., 2015

2014
A Secure and Effective Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks.
Wireless Personal Communications, 2014

Hierarchical quantum information splitting of an arbitrary two-qubit state via the cluster state.
Quantum Information Processing, 2014

Quantum secret sharing for general access structures based on multiparticle entanglements.
Quantum Information Processing, 2014

Schemes for remotely preparing an arbitrary four-qubit χ-state.
Quantum Information Processing, 2014

Multi-party quantum state sharing of an arbitrary multi-qubit state via χ-type entangled states.
Quantum Information Processing, 2014

Efficient and feasible quantum private comparison of equality against the collective amplitude damping noise.
Quantum Information Processing, 2014

A class of protocols for quantum private comparison based on the symmetry of states.
Quantum Information Processing, 2014

Robust variations of secret sharing through noisy quantum channel.
Quantum Information & Computation, 2014

Synchronization control of memristor-based recurrent neural networks with perturbations.
Neural Networks, 2014

An Improved Directed Diffusion Protocol based on Opportunistic Routing.
JNW, 2014

A Weakly Homomorphic Encryption with LDN.
JNW, 2014

Dynamic Obfuscation Algorithm based on Demand-Driven Symbolic Execution.
Journal of Multimedia, 2014

Hierarchical identity-based broadcast encryption scheme from LWE.
Journal of Communications and Networks, 2014

A (k, t, n) Verifiable Multi-secret Sharing Scheme Based on Adversary Structure.
TIIS, 2014

Quantum state secure transmission in network communications.
Inf. Sci., 2014

Efficient threshold public key encryption with full security based on dual pairing vector spaces.
Int. J. Communication Systems, 2014

A Note on the Multiple-Unicast Network Coding Conjecture.
IEEE Communications Letters, 2014

Novel way to research nonlinear feedback shift register.
SCIENCE CHINA Information Sciences, 2014

A distance sum-based hybrid method for intrusion detection.
Appl. Intell., 2014

Asymptotic stability of cellular neural networks with multiple proportional delays.
Applied Mathematics and Computation, 2014

All exceptional groups of lie type have minimal logarithmic signatures.
Appl. Algebra Eng. Commun. Comput., 2014

A novel construction of optimal multi-sender authentication code from singular pseudo-symplectic geometry over finite fields.
Appl. Algebra Eng. Commun. Comput., 2014

2013
New public key cryptosystems based on non-Abelian factorization problems.
Security and Communication Networks, 2013

Comment on "High-dimensional deterministic multiparty quantum secret sharing without unitary operations".
Quantum Information Processing, 2013

Expansible quantum secret sharing network.
Quantum Information Processing, 2013

The loophole of the improved secure quantum sealed-bid auction with post-confirmation and solution.
Quantum Information Processing, 2013

Faithful quantum broadcast beyond the no-go theorem.
Quantum Information Processing, 2013

The rational approximations of the unitary groups.
Quantum Information Processing, 2013

The faithful remote preparation of general quantum states.
Quantum Information Processing, 2013

Multi-party quantum secret sharing with the single-particle quantum state to encode the information.
Quantum Information Processing, 2013

Verifiable Threshold Authorization for Scalable and Secure Digital Rights Management.
JSW, 2013

CCA Secure Threshold KEM Scheme Against Adaptive Corruption Attacks in Standard Model.
JSW, 2013

Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation.
Journal of Multimedia, 2013

Attribute Based DRM Scheme with Efficient Revocation in Cloud Computing.
JCP, 2013

IBC-Based Entity Authentication Protocols for Federated Cloud Systems.
TIIS, 2013

Comment on Lee et al.'s group signature and e-auction scheme.
Information Systems Frontiers, 2013

Publicly Verifiable Secret Sharing Scheme with Provable Security against Chosen Secret Attacks.
IJDSN, 2013

Chameleon Hash Functions and One-Time Signature Schemes from Inner Automorphism Groups.
Fundam. Inform., 2013

Modified Fuzzy Linear Discriminant Analysis for Threshold Selection.
CSSP, 2013

Efficient Construction of CCA-Secure Threshold PKE Based on Hashed Diffie-Hellman Assumption.
Comput. J., 2013

An Application-Oriented Scheduling Optimization Algorithm for Internet-Based Virtual Computing Environment.
Proceedings of the Seventh IEEE International Symposium on Service-Oriented System Engineering, 2013

2012
The Weight Distributions of Cyclic Codes and Elliptic Curves.
IEEE Trans. Information Theory, 2012

CSP-DHIES: a new public-key encryption scheme from matrix conjugation.
Security and Communication Networks, 2012

Modelling security message propagation in delay tolerant networks.
Security and Communication Networks, 2012

Efficient entanglement channel construction schemes for a theoretical quantum network model with d-level system.
Quantum Information Processing, 2012

Experimental architecture of joint remote state preparation.
Quantum Information Processing, 2012

Controlled remote state preparation of arbitrary two and three qubit states via the Brown state.
Quantum Information Processing, 2012

Guest Editorial.
JNW, 2012

Biologically Inspired Anomaly Detection for Hierarchical Wireless Sensor Networks.
JNW, 2012

Public key distribution scheme for delay tolerant networks based on two-channel cryptography.
J. Network and Computer Applications, 2012

Data clustering using bacterial foraging optimization.
J. Intell. Inf. Syst., 2012

Convex Decomposition Based Cluster Labeling Method for Support Vector Clustering.
J. Comput. Sci. Technol., 2012

A Secure Message Transaction Protocol for Delay Tolerant Networks.
JCM, 2012

Recursive hiding of biometrics-based secret sharing scheme using adversary structure.
Inf. Process. Lett., 2012

Provably Secure and Efficient Identity-based Signature Scheme Based on Cubic Residues.
I. J. Network Security, 2012

Foreword: Computational Intelligence for Network Control and Security.
Int. J. Comput. Intell. Syst., 2012

Optimum design of fractional order PIλDμ controller for AVR system using chaotic ant swarm.
Expert Syst. Appl., 2012

Multiple-File Remote Data Checking for cloud storage.
Computers & Security, 2012

A secret sharing scheme with a short share realizing the (t, n) threshold and the adversary structure.
Computers & Mathematics with Applications, 2012

A Novel Scheme for Accelerating Support Vector Clustering.
Computing and Informatics, 2012

Chaotic ant swarm approach for data clustering.
Appl. Soft Comput., 2012

A secure message delivery scheme with path tracking for delay tolerant networks.
Proceedings of the 2012 1st IEEE International Conference on Communications in China (ICCC), 2012

A trust mechanism in Internet-Based Virtual Computing Environment.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

2011
Sensor Placement Algorithms for Fusion-Based Surveillance Networks.
IEEE Trans. Parallel Distrib. Syst., 2011

Web user clustering and Web prefetching using Random Indexing with weight functions.
Knowl. Inf. Syst., 2011

Discrete logarithm based additively homomorphic encryption and secure data aggregation.
Inf. Sci., 2011

Disturbance Chaotic Ant Swarm.
I. J. Bifurcation and Chaos, 2011

A New Class of Hyper-bent Boolean Functions with Multiple Trace Terms.
IACR Cryptology ePrint Archive, 2011

A generalization of the class of hyper-bent Boolean functions in binomial forms.
IACR Cryptology ePrint Archive, 2011

Research of Spatial Domain Image Digital Watermarking Payload.
EURASIP J. Information Security, 2011

A Random Indexing Approach for Web User Clustering and Web Prefetching.
Proceedings of the New Frontiers in Applied Data Mining, 2011

Research on Secure Multi-party Computational Geometry.
Proceedings of the Information Computing and Applications, 2011

2010
An efficient secure proxy verifiably encrypted signature scheme.
J. Network and Computer Applications, 2010

A New Method to Detect Useless Service Failure Model in SPN.
JCIT, 2010

Comment on Wu et al.'s Server-aided Verification Signature Schemes.
I. J. Network Security, 2010

Secure Network Coding against Wiretapping and Byzantine Attacks.
EURASIP J. Wireless Comm. and Networking, 2010

Conjugate adjoining problem in braid groups and new design of braid-based signatures.
SCIENCE CHINA Information Sciences, 2010

Secure network coding in the presence of eavesdroppers.
SCIENCE CHINA Information Sciences, 2010

A new impossible differential attack on SAFER ciphers.
Computers & Electrical Engineering, 2010

A method for topology conformance tests under logical constraints.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

An anonymous authentication scheme for mobile communication.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

A color image watermarking algorithm resistant to print-scan.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

Research of an Innovative P2P-Based Botnet.
Proceedings of the 2010 International Conference on Machine Vision and Human-machine Interface, 2010

Towards Hierarchical-User RBAC model.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010

On Achieving Maximum Secure Throughput Using Network Coding against Wiretap Attack.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010

An Extensible Hash Function Construction Based on Embedded Chaos Maps.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Collision Attacks on NaSHA-384/512.
IACR Cryptology ePrint Archive, 2009

Vulnerabilities Analyzing Model for Alert Correlation in Distributed Environment.
Proceedings of the 2009 IITA International Conference on Services Science, 2009

An Improved Secure Identity-Based On-Line/Off-Line Signature Scheme.
Proceedings of the Advances in Information Security and Assurance, 2009

Efficient Provable Secure ID-Based Directed Signature Scheme without Random Oracle.
Proceedings of the Advances in Neural Networks, 2009

Improved EMD Steganography with Great Embedding Rate and High Embedding Efficiency.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Discrete-Log-Based Additively Homomorphic Encryption and Secure WSN Data Aggregation.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

VAOFS: A Verifiable Append-Only File System for Regulatory Compliance.
Proceedings of the Eighth International Conference on Grid and Cooperative Computing, 2009

Steganalysis of LSB Matching in Gray Images Based on Regional Correlation Analysis.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

A Special Proxy Signature Scheme with Multi-warrant.
Proceedings of the Advances in Computer Science, 2009

Remark on Yu et al.'s Online/Offline Signature Scheme in CT-RSA 2008.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Design and Realization of a Large-Scale Distributed Intrusion Management System Module.
Proceedings of the PACIIA 2008, 2008

Classify the Majority of the Total Bytes on the Internet.
Proceedings of the International Symposium on Information Processing, 2008

Analysis of nonseparable property of multi-valued multi-threshold neuron.
Proceedings of the International Joint Conference on Neural Networks, 2008

Multiplicative Watermark Detection Using Locally Optimum Nonlinearity.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

A Novel Relational Database Watermarking Algorithm for Joint Ownership.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

A Defending Mechanism against DDoS Based on Registration and Authentication.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

A New Construction of Multivariate Public Key Encryption Scheme through Internally Perturbed Plus.
Proceedings of the Computational Science and Its Applications - ICCSA 2008, International Conference, Perugia, Italy, June 30, 2008

An Efficient Remote User Authentication Scheme with Strong Anonymity.
Proceedings of the International Conference on Cyberworlds 2008, 2008

A Novel ID-Based Verifiably Encrypted Signature without Random Oracle.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

A Simulation Platform of DDoS Attack Based on Network Processor.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

Efficient Universally Composable Password-Based Key Exchange.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2007
An Efficient Multi-server Password Authenticated Key Agreement Scheme Using Smart Cards.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Using Three Layer Neural Network to Compute Multi-valued Functions.
Proceedings of the Advances in Neural Networks, 2007

A Networking Identity Authentication Scheme Combining Fingerprint Coding and Identity Based Encryption.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007

Transitive Signatures from Braid Groups.
Proceedings of the Progress in Cryptology, 2007

Using Three Layer Neural Networks to Compute Discrete Real Functions.
Proceedings of the Third International Conference on Natural Computation, 2007

Integer Programming via Chaotic Ant Swarm.
Proceedings of the Third International Conference on Natural Computation, 2007

ID-Based Multi-proxy Sequential Signature System from Bilinear Pairing.
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2007

Security Mechanism Research of EMV2000.
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2007

A Data Safety Transmission Solution in Web Application.
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2007

Improved Remote User Authentication Scheme Preserving User Anonymity.
Proceedings of the Fifth Annual Conference on Communication Networks and Services Research (CNSR 2007), 2007

Secure and Flexible Digital Rights Management in a Pervasive Usage Mode.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

2006
An Optimization Method Inspired by "chaotic" Ant Behavior.
I. J. Bifurcation and Chaos, 2006

Design and Analysis of a Hash Ring-iterative Structure.
IACR Cryptology ePrint Archive, 2006

Analysis of Current Steganography Tools: Classifications & Features.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

Data Fitting Via Chaotic Ant Swarm.
Proceedings of the Advances in Natural Computation, Second International Conference, 2006

Symmetric Steganography Secure Against Chosen Message and Original Cover Attacks.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

2005
The Architecture of the Large-scale Distributed Intrusion Detection System.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

A Novel Fuzzy Anomaly Detection Method Based on Clonal Selection Clustering Algorithm.
Proceedings of the Advances in Machine Learning and Cybernetics, 2005

2004
Erratum to: Bounds on the number of hidden neurons in three-layer binary neural networks [Neural Networks 16 (7) 995-1002].
Neural Networks, 2004

2003
Bounds on the number of hidden neurons in three-layer binary neural networks.
Neural Networks, 2003

New Efficient Timed Commitment Schemes.
International Journal of Information Technology and Decision Making, 2003

A LSB steganography detection algorithm.
Proceedings of the IEEE 14th International Symposium on Personal, 2003

2001
On correlations of a family of generalized geometric sequences.
IEEE Trans. Information Theory, 2001

A unified method to construct neural network decoders for arbitrary codes and decoding rules.
Discrete Mathematics, 2001

Generalization of Elliptic Curve Digital Signature Schemes.
Proceedings of the Information and Communications Security, Third International Conference, 2001

2000
Single-Term Divisible Electronic Cash Based on Bit Commitment.
Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000), 2000

1998
Comment on "Reparable key distribution protocols for Internet environments" [and reply].
IEEE Trans. Communications, 1998

1997
Counterexample of truncated Costas optical orthogonal codes.
IEEE Trans. Communications, 1997

Correlation Functions of a Family of Generalized Geometric Sequences.
Discrete Applied Mathematics, 1997

1995
Further Enumerating Boolean Functions of Cryptographic Significance.
J. Cryptology, 1995

1994
On the undetected error probability of nonlinear binary constant weight codes.
IEEE Trans. Communications, 1994

1993
New Binary Sequences with Perfect Staircase Profile of Linear Complexity.
Inf. Process. Lett., 1993

1991
New Enumeration Results About the Optical Orthogonal Codes.
Inf. Process. Lett., 1991

1990
Dyadic Matrices and Their Potential Significance in Cryptography.
Proceedings of the Advances in Cryptology, 1990

K-M Sequence is Forwardly Predictable.
Proceedings of the Advances in Cryptology, 1990


  Loading...