Yumin Wang
Orcid: 0000-0002-4739-0419
According to our database1,
Yumin Wang authored at least 122 papers
between 1995 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Exploring the potential mechanism of action of Wutou-Guizhi decoction in the treatment of rheumatoid arthritis through network pharmacology analysis.
Comput. Biol. Chem., 2025
2024
Signal-interference-based quasi-reflectionless bandpass filter for wideband and high-selectivity.
Int. J. Circuit Theory Appl., July, 2024
2023
IEEE Trans. Geosci. Remote. Sens., 2023
Research on Improved Algorithm of UAV Swarm Target Search Strategy Based on Freshness and Target Density.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023
2022
Protecting the Intellectual Property of Speaker Recognition Model by Black-Box Watermarking in the Frequency Domain.
Symmetry, 2022
2021
Proceedings of the IPEC 2021: 2nd Asia-Pacific Conference on Image Processing, 2021
The Teaching System of IT Support Course Group of Economics and Management Majors Based on Big Data Technology.
Proceedings of the Cyber Security Intelligence and Analytics, 2021
Proceedings of the ACM TURC 2021: ACM Turing Award Celebration Conference - Hefei, China, 30 July 2021, 2021
2019
J. Appl. Math. Comput., June, 2019
Coupling effect of regional industrial cluster and innovation based on complex system metric and fuzzy mathematics.
J. Intell. Fuzzy Syst., 2019
Design of computer interactive system for sports training based on artificial intelligence and improved support vector.
J. Intell. Fuzzy Syst., 2019
J. Intell. Fuzzy Syst., 2019
Health Risk Assessment Model of Drinking Water Sources Based on Combination of Bayesian and Triangle Fuzzy Number.
Proceedings of the ICAIP 2019: 3rd International Conference on Advances in Image Processing, 2019
2018
Fundam. Informaticae, 2018
2017
IET Inf. Secur., 2017
2016
Int. J. Netw. Secur., 2016
Cooperative downloading with privacy preservation and access control for value-added services in VANETs.
Int. J. Grid Util. Comput., 2016
Int. Arab J. Inf. Technol., 2016
2015
Int. J. Netw. Secur., 2015
Int. J. Embed. Syst., 2015
2014
Int. J. Grid Util. Comput., 2014
Int. J. Grid Util. Comput., 2014
Secure and efficient lightweight RFID authentication protocol based on fast tag indexing.
Int. J. Commun. Syst., 2014
2013
Inf. Process. Lett., 2013
IEICE Trans. Inf. Syst., 2013
Secure and efficient mutual authentication protocol for RFID conforming to the EPC C-1 G-2 standard.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Hadoop-RINS - A Hadoop Accelerated Pipeline for Rapid Nonhuman Sequence Identification.
Proceedings of the BIOINFORMATICS 2013 - Proceedings of the International Conference on Bioinformatics Models, Methods and Algorithms, Barcelona, Spain, 11, 2013
2012
Comparison of trends in the quantity and variety of Science Citation Index (SCI) literature on human pathogens between China and the United States.
Scientometrics, 2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
End-to-End Security Scheme for Machine Type Communication Based on Generic Authentication Architecture.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
An Efficient Probably CP-CM-Secure Identity-Based Signature Scheme Applicable to Authentication in Multiuser Settings.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
2011
Numerical solutions of quantile hedging for guaranteed minimum death benefits under a regime-switching jump-diffusion formulation.
J. Comput. Appl. Math., 2011
Proceedings of the Information Computing and Applications, 2011
2010
Proceedings of the Symposia and Workshops on Ubiquitous, 2010
2009
IEEE Trans. Veh. Technol., 2009
Int. J. Netw. Secur., 2009
Investigations on Simultaneously Secure IBE Scheme and Security Proofs under RO and Non-RO Model.
Intell. Inf. Manag., 2009
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
A Provable Secure ID-Based Explicit Authenticated Key Agreement Protocol Without Random Oracles.
J. Comput. Sci. Technol., 2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
Proceedings of The International Symposium on Electronic Commerce and Security, 2008
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
2007
Sci. China Ser. F Inf. Sci., 2007
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2007
Proceedings of the Integration and Innovation Orient to E-Society, 2007
2006
Informatica, 2006
Analysis and Improvements of Two Identity-Based Perfect Concurrent Signature Schemes.
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Topics in Cryptology, 2006
Security Analysis of the Digital Transmission Copy Protection Specification.
Proceedings of the 2006 International Conference on Security & Management, 2006
Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme).
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006
Proceedings of The 1st IEEE Asia-Pacific Services Computing Conference, 2006
2005
IEEE Trans. Consumer Electron., 2005
IEEE Trans. Broadcast., 2005
J. Comput. Sci. Technol., 2005
On the Security of a Digital Signature with Message Recovery Using Self-certified Public Key.
Informatica (Slovenia), 2005
Appl. Math. Comput., 2005
Two methods of directly constructing probabilistic public-key encryption primitives based on third-order LFSR sequences.
Appl. Math. Comput., 2005
Appl. Math. Comput., 2005
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005
Proceedings of the Information Security Practice and Experience, 2005
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005
Simultaneous Divisor Class Addition-Subtraction Algorithm and Its Applications to Hyperelliptic Curve Cryptosystem.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005
2004
A New Efficient Group Signature With Forward Security.
Informatica (Slovenia), 2004
IACR Cryptol. ePrint Arch., 2004
Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group.
Proceedings of the Information Security, 7th International Conference, 2004
Proceedings of the 3rd International Conference on Information Security, 2004
Proceedings of IEEE International Conference on Communications, 2004
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004
Use of Cryptographic Technologies for Privacy Protection of Watermarks in Internet Retails of Digital Contents.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
2003
J. Comput. Sci. Technol., 2003
IACR Cryptol. ePrint Arch., 2003
IACR Cryptol. ePrint Arch., 2003
Proceedings of the Proceedings 2003 IEEE Information Theory Workshop, 2003
Proceedings of the Information Security and Cryptology, 2003
Proceedings of the Information Security and Cryptology, 2003
Proceedings of the Information and Communications Security, 5th International Conference, 2003
Proceedings of the Information and Communications Security, 5th International Conference, 2003
Proceedings of the 17th International Conference on Advanced Information Networking and Applications (AINA'03), 2003
Proceedings of the 17th International Conference on Advanced Information Networking and Applications (AINA'03), 2003
Proceedings of the 17th International Conference on Advanced Information Networking and Applications (AINA'03), 2003
Proceedings of the 17th International Conference on Advanced Information Networking and Applications (AINA'03), 2003
2002
J. Comput. Sci. Technol., 2002
An Anonymous Mobile Agents Scheme for Secure Web Transaction over the Internet.
Informatica (Slovenia), 2002
SAWT: A New System for Secure and Anonymous Web Transactions over the Internet.
J. Res. Pract. Inf. Technol., 2002
2001
Proceedings of the Information and Communications Security, Third International Conference, 2001
Proceedings of the Information and Communications Security, Third International Conference, 2001
2000
Fair Electronic Cash Systems with Multiple Banks.
Proceedings of the Information Security for Global Information Infrastructures, 2000
1999
An Authetnication Scheme over Non-Authentic Public Channel in Information-Theoretic Secret-Key Agreement.
Proceedings of the Applied Algebra, 1999
1996
Proceedings of the 7th IEEE International Symposium on Personal, 1996
1995
Proceedings of the 6th IEEE International Symposium on Personal, 1995