Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Wenfen Liu
@article{DBLP:journals/ipm/ZhangZHHYL23, author = {Mengli Zhang and Gang Zhou and Ningbo Huang and Peng He and Wanting Yu and Wenfen Liu}, title = {AsU-OSum: Aspect-augmented unsupervised opinion summarization}, journal = {Inf. Process. Manag.}, volume = {60}, number = {1}, pages = {103138}, year = {2023}, url = {https://doi.org/10.1016/j.ipm.2022.103138}, doi = {10.1016/J.IPM.2022.103138}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ipm/ZhangZHHYL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/talip/ZhangZYHL23, author = {Mengli Zhang and Gang Zhou and Wanting Yu and Ningbo Huang and Wenfen Liu}, title = {{GA-SCS:} Graph-Augmented Source Code Summarization}, journal = {{ACM} Trans. Asian Low Resour. Lang. Inf. Process.}, volume = {22}, number = {2}, pages = {53:1--53:19}, year = {2023}, url = {https://doi.org/10.1145/3554820}, doi = {10.1145/3554820}, timestamp = {Tue, 06 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/talip/ZhangZYHL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eitce/ZhaoLWLL23, author = {Jie Zhao and Wenfen Liu and Jing Wang and Song Li and Yongcan Lu}, title = {Blockchain-based Off-chain Extension Model for Geographic Information Data}, booktitle = {Proceedings of the 2023 7th International Conference on Electronic Information Technology and Computer Engineering, {EITCE} 2023, Xiamen, China, October 20-22, 2023}, pages = {1036--1041}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3650400.3650575}, doi = {10.1145/3650400.3650575}, timestamp = {Fri, 19 Apr 2024 08:09:03 +0200}, biburl = {https://dblp.org/rec/conf/eitce/ZhaoLWLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eitce/GaoLL23, author = {Shu Gao and Wenfen Liu and Yongcan Lu}, title = {Trajectory Privacy Protection Method Based on Sensitivity Analysis}, booktitle = {Proceedings of the 2023 7th International Conference on Electronic Information Technology and Computer Engineering, {EITCE} 2023, Xiamen, China, October 20-22, 2023}, pages = {1375--1380}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3650400.3650631}, doi = {10.1145/3650400.3650631}, timestamp = {Fri, 19 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eitce/GaoLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhangL22a, author = {Peng Zhang and Wenfen Liu}, title = {3FO: The Three-Frame-Only Approach for Fast and Accurate Monocular {SLAM} Initialization}, journal = {{IEEE} Access}, volume = {10}, pages = {108859--108869}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3213684}, doi = {10.1109/ACCESS.2022.3213684}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ZhangL22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YangHZWL22, author = {Kunyu Yang and Xuexian Hu and Qihui Zhang and Jianghong Wei and Wenfen Liu}, title = {VAEPass: {A} lightweight passwords guessing model based on variational auto-encoder}, journal = {Comput. Secur.}, volume = {114}, pages = {102587}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102587}, doi = {10.1016/J.COSE.2021.102587}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/YangHZWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/KuSZLZ22, author = {Hanchao Ku and Willy Susilo and Yudi Zhang and Wenfen Liu and Mingwu Zhang}, title = {Privacy-Preserving federated learning in medical diagnosis with homomorphic re-Encryption}, journal = {Comput. Stand. Interfaces}, volume = {80}, pages = {103583}, year = {2022}, url = {https://doi.org/10.1016/j.csi.2021.103583}, doi = {10.1016/J.CSI.2021.103583}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/KuSZLZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/finr/JiaL22, author = {Haoyang Jia and Wenfen Liu}, title = {Anomaly detection in images with shared autoencoders}, journal = {Frontiers Neurorobotics}, volume = {16}, year = {2022}, url = {https://doi.org/10.3389/fnbot.2022.1046867}, doi = {10.3389/FNBOT.2022.1046867}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/finr/JiaL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jiis/ZhangZYHL22, author = {Mengli Zhang and Gang Zhou and Wanting Yu and Ningbo Huang and Wenfen Liu}, title = {{MAA-PTG:} multimodal aspect-aware product title generation}, journal = {J. Intell. Inf. Syst.}, volume = {59}, number = {1}, pages = {213--235}, year = {2022}, url = {https://doi.org/10.1007/s10844-022-00695-8}, doi = {10.1007/S10844-022-00695-8}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jiis/ZhangZYHL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nca/ZhangZYLHY22, author = {Mengli Zhang and Gang Zhou and Wanting Yu and Wenfen Liu and Ningbo Huang and Ze Yu}, title = {{FCSF-TABS:} two-stage abstractive summarization with fact-aware reinforced content selection and fusion}, journal = {Neural Comput. Appl.}, volume = {34}, number = {13}, pages = {10547--10560}, year = {2022}, url = {https://doi.org/10.1007/s00521-021-06880-0}, doi = {10.1007/S00521-021-06880-0}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nca/ZhangZYLHY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/LiGLWL22, author = {Ji Li and Chunxiang Gu and Luan Luan and Fushan Wei and Wenfen Liu}, editor = {Sharief Oteafy and Eyuphan Bulut and Florian Tschorsch}, title = {Few-Shot Open-Set Traffic Classification Based on Self-Supervised Learning}, booktitle = {47th {IEEE} Conference on Local Computer Networks, {LCN} 2022, Edmonton, AB, Canada, September 26-29, 2022}, pages = {371--374}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/LCN53696.2022.9843450}, doi = {10.1109/LCN53696.2022.9843450}, timestamp = {Fri, 11 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lcn/LiGLWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipm/ZhangZYL21, author = {Mengli Zhang and Gang Zhou and Wanting Yu and Wenfen Liu}, title = {{FAR-ASS:} Fact-aware reinforced abstractive sentence summarization}, journal = {Inf. Process. Manag.}, volume = {58}, number = {3}, pages = {102478}, year = {2021}, url = {https://doi.org/10.1016/j.ipm.2020.102478}, doi = {10.1016/J.IPM.2020.102478}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipm/ZhangZYL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ZhangZYL21, author = {Mengli Zhang and Gang Zhou and Wanting Yu and Wenfen Liu}, title = {{KI-HABS:} Key Information Guided Hierarchical Abstractive Summarization}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {15}, number = {12}, pages = {4275--4291}, year = {2021}, url = {https://doi.org/10.3837/tiis.2021.12.001}, doi = {10.3837/TIIS.2021.12.001}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/ZhangZYL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eitce/LiuWH21, author = {Wenfen Liu and Nan Wang and Yuehua Huang}, title = {Outlier Detection Method based on Improved K-means Clustering Algorithm}, booktitle = {{EITCE} 2021: 5th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, October 22 - 24, 2021}, pages = {1350--1355}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3501409.3501648}, doi = {10.1145/3501409.3501648}, timestamp = {Fri, 04 Aug 2023 10:50:51 +0200}, biburl = {https://dblp.org/rec/conf/eitce/LiuWH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/YangHZWL21, author = {Kunyu Yang and Xuexian Hu and Qihui Zhang and Jianghong Wei and Wenfen Liu}, editor = {Debin Gao and Qi Li and Xiaohong Guan and Xiaofeng Liao}, title = {Studies of Keyboard Patterns in Passwords: Recognition, Characteristics and Strength Evolution}, booktitle = {Information and Communications Security - 23rd International Conference, {ICICS} 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12918}, pages = {153--168}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-86890-1\_9}, doi = {10.1007/978-3-030-86890-1\_9}, timestamp = {Tue, 21 Sep 2021 19:14:09 +0200}, biburl = {https://dblp.org/rec/conf/icics/YangHZWL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-05525, author = {Chun Liu and Xuexian Hu and Xiaofeng Chen and Jianghong Wei and Wenfen Liu}, title = {An Efficient Matrix Multiplication with Enhanced Privacy Protection in Cloud Computing and Its Applications}, journal = {CoRR}, volume = {abs/2105.05525}, year = {2021}, url = {https://arxiv.org/abs/2105.05525}, eprinttype = {arXiv}, eprint = {2105.05525}, timestamp = {Tue, 18 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-05525.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WangHLZ20a, author = {Fu Wang and Liu He and Wenfen Liu and Yanbin Zheng}, title = {Harden Deep Convolutional Classifiers via K-Means Reconstruction}, journal = {{IEEE} Access}, volume = {8}, pages = {168210--168218}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3024197}, doi = {10.1109/ACCESS.2020.3024197}, timestamp = {Tue, 06 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/WangHLZ20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dm/GaoLLW20, author = {Guangpu Gao and Dongdai Lin and Wenfen Liu and Yongjuan Wang}, title = {Composition of Boolean functions: An application to the secondary constructions of bent functions}, journal = {Discret. Math.}, volume = {343}, number = {3}, pages = {111711}, year = {2020}, url = {https://doi.org/10.1016/j.disc.2019.111711}, doi = {10.1016/J.DISC.2019.111711}, timestamp = {Mon, 20 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dm/GaoLLW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/LiWYLH20, author = {Ji Li and Jianghong Wei and Mao Ye and Wenfen Liu and Xuexian Hu}, title = {Privacy-preserving constrained spectral clustering algorithm for large-scale data sets}, journal = {{IET} Inf. Secur.}, volume = {14}, number = {3}, pages = {321--331}, year = {2020}, url = {https://doi.org/10.1049/iet-ifs.2019.0255}, doi = {10.1049/IET-IFS.2019.0255}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/LiWYLH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/YangHWZL20, author = {Ming Yang and Xuexian Hu and Jianghong Wei and Qihui Zhang and Wenfen Liu}, title = {Outsourced Secure {ID3} Decision Tree Algorithm over Horizontally Partitioned Datasets with Consortium Blockchain}, booktitle = {{ICCNS} 2020: The 10th International Conference on Communication and Network Security, Tokyo, Japan, November 27-29, 2020}, pages = {60--69}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3442520.3442534}, doi = {10.1145/3442520.3442534}, timestamp = {Thu, 12 Aug 2021 15:30:47 +0200}, biburl = {https://dblp.org/rec/conf/iccns/YangHWZL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LiuHZWL19, author = {Chun Liu and Xuexian Hu and Qihui Zhang and Jianghong Wei and Wenfen Liu}, title = {An Efficient Biometric Identification in Cloud Computing With Enhanced Privacy Security}, journal = {{IEEE} Access}, volume = {7}, pages = {105363--105375}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2931881}, doi = {10.1109/ACCESS.2019.2931881}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LiuHZWL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhangZKKHL19, author = {Mengli Zhang and Gang Zhou and Muhammad Khurram Khan and Saru Kumari and Xuexian Hu and Wenfen Liu}, title = {{SPSR-FSPG:} {A} Fast Simulative Password Set Generation Algorithm}, journal = {{IEEE} Access}, volume = {7}, pages = {155107--155119}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2948975}, doi = {10.1109/ACCESS.2019.2948975}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZhangZKKHL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ZhangZLHW19, author = {Mengli Zhang and Qihui Zhang and Wenfen Liu and Xuexian Hu and Jianghong Wei}, title = {{TG-SPSR:} {A} Systematic Targeted Password Attacking Model}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {13}, number = {5}, pages = {2674--2697}, year = {2019}, url = {https://doi.org/10.3837/tiis.2019.05.024}, doi = {10.3837/TIIS.2019.05.024}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/ZhangZLHW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jossac/GaoLL19, author = {Guangpu Gao and Dongdai Lin and Wenfen Liu}, title = {A Note on Rotation Symmetric S-boxes}, journal = {J. Syst. Sci. Complex.}, volume = {32}, number = {5}, pages = {1460--1472}, year = {2019}, url = {https://doi.org/10.1007/s11424-019-7263-8}, doi = {10.1007/S11424-019-7263-8}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jossac/GaoLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/WeiHLZ19, author = {Jianghong Wei and Xuexian Hu and Wenfen Liu and Qihui Zhang}, title = {Forward and backward secure fuzzy encryption for data sharing in cloud computing}, journal = {Soft Comput.}, volume = {23}, number = {2}, pages = {497--506}, year = {2019}, url = {https://doi.org/10.1007/s00500-017-2834-x}, doi = {10.1007/S00500-017-2834-X}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/soco/WeiHLZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ZhangLYHM19, author = {Qihui Zhang and Wenfen Liu and Kang Yang and Xuexian Hu and Ying Mei}, editor = {Zhe Liu and Moti Yung}, title = {Round-Efficient Anonymous Password-Authenticated Key Exchange Protocol in the Standard Model}, booktitle = {Information Security and Cryptology - 15th International Conference, Inscrypt 2019, Nanjing, China, December 6-8, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12020}, pages = {499--516}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-42921-8\_30}, doi = {10.1007/978-3-030-42921-8\_30}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/ZhangLYHM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/LinGHZL19, author = {Zijie Lin and Liangliang Gao and Xuexian Hu and Yuxuan Zhang and Wenfen Liu}, title = {Differentially Private Graph Clustering Algorithm Based on Structure Similarity}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {63--68}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371693}, doi = {10.1145/3371676.3371693}, timestamp = {Thu, 22 Apr 2021 19:04:09 +0200}, biburl = {https://dblp.org/rec/conf/iccns/LinGHZL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icycsee/ZhengYWDHL19, author = {Yanbin Zheng and Hongxu Yun and Fu Wang and Yong Ding and Yongzhong Huang and Wenfen Liu}, editor = {Xiaohui Cheng and Weipeng Jing and Xianhua Song and Zeguang Lu}, title = {Defence Against Adversarial Attacks Using Clustering Algorithm}, booktitle = {Data Science - 5th International Conference of Pioneering Computer Scientists, Engineers and Educators, {ICPCSEE} 2019, Guilin, China, September 20-23, 2019, Proceedings, Part {I}}, series = {Communications in Computer and Information Science}, volume = {1058}, pages = {323--333}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-0118-0\_25}, doi = {10.1007/978-981-15-0118-0\_25}, timestamp = {Thu, 15 Feb 2024 16:58:31 +0100}, biburl = {https://dblp.org/rec/conf/icycsee/ZhengYWDHL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/WeiLH18, author = {Jianghong Wei and Wenfen Liu and Xuexian Hu}, title = {On the security and improvement of privacy-preserving 3-factor authentication scheme for {TMIS}}, journal = {Int. J. Commun. Syst.}, volume = {31}, number = {15}, year = {2018}, url = {https://doi.org/10.1002/dac.3767}, doi = {10.1002/DAC.3767}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/WeiLH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itc/LiuZWHK18, author = {Wenfen Liu and Gang Zhou and Jianghong Wei and Xuexian Hu and Saru Kumari}, title = {Security Enhanced and Cost-effective User Authentication Scheme for Wireless Sensor Networks}, journal = {Inf. Technol. Control.}, volume = {47}, number = {2}, pages = {275--294}, year = {2018}, url = {https://doi.org/10.5755/j01.itc.47.2.16397}, doi = {10.5755/J01.ITC.47.2.16397}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itc/LiuZWHK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/WeiLH18, author = {Jianghong Wei and Wenfen Liu and Xuexian Hu}, title = {Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud Storage}, journal = {{IEEE} Syst. J.}, volume = {12}, number = {2}, pages = {1731--1742}, year = {2018}, url = {https://doi.org/10.1109/JSYST.2016.2633559}, doi = {10.1109/JSYST.2016.2633559}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/WeiLH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/WeiLH18, author = {Jianghong Wei and Wenfen Liu and Xuexian Hu}, title = {Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {6}, number = {4}, pages = {1136--1148}, year = {2018}, url = {https://doi.org/10.1109/TCC.2016.2545668}, doi = {10.1109/TCC.2016.2545668}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/WeiLH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ZhangZHL18, author = {Mengli Zhang and Qihui Zhang and Xuexian Hu and Wenfen Liu}, title = {A Password Cracking Method Based On Structure Partition and BiLSTM Recurrent Neural Network}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {79--83}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290501}, doi = {10.1145/3290480.3290501}, timestamp = {Thu, 22 Apr 2021 18:47:33 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ZhangZHL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ZhangWZHL18, author = {Yuxuan Zhang and Jianghong Wei and Xiaojian Zhang and Xuexian Hu and Wenfen Liu}, title = {A Two-Phase Algorithm for Generating Synthetic Graph Under Local Differential Privacy}, booktitle = {Proceedings of the 8th International Conference on Communication and Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018}, pages = {84--89}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3290480.3290503}, doi = {10.1145/3290480.3290503}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ZhangWZHL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cin/LiuYWH17, author = {Wenfen Liu and Mao Ye and Jianghong Wei and Xuexian Hu}, title = {Fast Constrained Spectral Clustering and Cluster Ensemble with Random Projection}, journal = {Comput. Intell. Neurosci.}, volume = {2017}, pages = {2658707:1--2658707:14}, year = {2017}, url = {https://doi.org/10.1155/2017/2658707}, doi = {10.1155/2017/2658707}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cin/LiuYWH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcm/WeiLH17, author = {Jianghong Wei and Wenfen Liu and Xuexian Hu}, title = {Forward-secure identity-based signature with efficient revocation}, journal = {Int. J. Comput. Math.}, volume = {94}, number = {7}, pages = {1390--1411}, year = {2017}, url = {https://doi.org/10.1080/00207160.2016.1190835}, doi = {10.1080/00207160.2016.1190835}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcm/WeiLH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/WeiHL17, author = {Jianghong Wei and Xuexian Hu and Wenfen Liu}, title = {Two-factor authentication scheme using attribute and password}, journal = {Int. J. Commun. Syst.}, volume = {30}, number = {1}, year = {2017}, url = {https://doi.org/10.1002/dac.2915}, doi = {10.1002/DAC.2915}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/WeiHL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijfcs/WeiHLH17, author = {Jianghong Wei and Xinyi Huang and Wenfen Liu and Xuexian Hu}, title = {Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security}, journal = {Int. J. Found. Comput. Sci.}, volume = {28}, number = {7}, pages = {843--868}, year = {2017}, url = {https://doi.org/10.1142/S0129054117500289}, doi = {10.1142/S0129054117500289}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijfcs/WeiHLH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kbs/LiuYWH17, author = {Wenfen Liu and Mao Ye and Jianghong Wei and Xuexian Hu}, title = {Compressed constrained spectral clustering framework for large-scale data sets}, journal = {Knowl. Based Syst.}, volume = {135}, pages = {77--88}, year = {2017}, url = {https://doi.org/10.1016/j.knosys.2017.08.003}, doi = {10.1016/J.KNOSYS.2017.08.003}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/kbs/LiuYWH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiWLH17, author = {Ji Li and Jianghong Wei and Wenfen Liu and Xuexian Hu}, title = {{PMDP:} {A} Framework for Preserving Multiparty Data Privacy in Cloud Computing}, journal = {Secur. Commun. Networks}, volume = {2017}, pages = {6097253:1--6097253:14}, year = {2017}, url = {https://doi.org/10.1155/2017/6097253}, doi = {10.1155/2017/6097253}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiWLH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ZhangHWL17, author = {Qihui Zhang and Xuexian Hu and Jianghong Wei and Wenfen Liu}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Universally Composable Three-Party Password Authenticated Key Exchange}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {123--137}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_11}, doi = {10.1007/978-3-319-68542-7\_11}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ZhangHWL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nlpcc/LuLZHW17, author = {Zhonglei Lu and Wenfen Liu and Yanfang Zhou and Xuexian Hu and Binyu Wang}, editor = {Xuanjing Huang and Jing Jiang and Dongyan Zhao and Yansong Feng and Yu Hong}, title = {An Effective Approach for Chinese News Headline Classification Based on Multi-representation Mixed Model with Attention and Ensemble Learning}, booktitle = {Natural Language Processing and Chinese Computing - 6th {CCF} International Conference, {NLPCC} 2017, Dalian, China, November 8-12, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10619}, pages = {339--350}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-73618-1\_29}, doi = {10.1007/978-3-319-73618-1\_29}, timestamp = {Fri, 16 Feb 2024 08:27:36 +0100}, biburl = {https://dblp.org/rec/conf/nlpcc/LuLZHW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smp/LuLZHW17, author = {Zhonglei Lu and Wenfen Liu and Yanfang Zhou and Xuexian Hu and Binyu Wang}, editor = {Xueqi Cheng and Wei{-}Ying Ma and Huan Liu and Huawei Shen and Shizheng Feng and Xing Xie}, title = {An Effective Approach of Sentence Compression Based on "Re-read" Mechanism and Bayesian Combination Model}, booktitle = {Social Media Processing - 6th National Conference, {SMP} 2017, Beijing, China, September 14-17, 2017, Proceedings}, series = {Communications in Computer and Information Science}, volume = {774}, pages = {129--140}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-981-10-6805-8\_11}, doi = {10.1007/978-981-10-6805-8\_11}, timestamp = {Tue, 03 Apr 2018 15:57:04 +0200}, biburl = {https://dblp.org/rec/conf/smp/LuLZHW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/WeiHLH16, author = {Jianghong Wei and Xinyi Huang and Wenfen Liu and Xuexian Hu}, title = {Practical Attribute-based Signature: Traceability and Revocability}, journal = {Comput. J.}, volume = {59}, number = {11}, pages = {1714--1734}, year = {2016}, url = {https://doi.org/10.1093/comjnl/bxw045}, doi = {10.1093/COMJNL/BXW045}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/WeiHLH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcm/GongGL16, author = {Xin Gong and Guangpu Gao and Wenfen Liu}, title = {On permutation polynomials of the form \emph{x\({}^{\mbox{1+2\({}^{\mbox{k}}\)}}\) + L(x)}}, journal = {Int. J. Comput. Math.}, volume = {93}, number = {10}, pages = {1715--1722}, year = {2016}, url = {https://doi.org/10.1080/00207160.2015.1072171}, doi = {10.1080/00207160.2015.1072171}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcm/GongGL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/WeiLH16, author = {Jianghong Wei and Wenfen Liu and Xuexian Hu}, title = {Secure and Efficient Smart Card Based Remote User Password Authentication Scheme}, journal = {Int. J. Netw. Secur.}, volume = {18}, number = {4}, pages = {782--792}, year = {2016}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v18-n4/ijns-2016-v18-n4-p782-792.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/WeiLH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WeiLH16, author = {Jianghong Wei and Wenfen Liu and Xuexian Hu}, title = {Security pitfalls of "ePASS: An expressive attribute-based signature scheme"}, journal = {J. Inf. Secur. Appl.}, volume = {30}, pages = {40--45}, year = {2016}, url = {https://doi.org/10.1016/j.jisa.2016.05.003}, doi = {10.1016/J.JISA.2016.05.003}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/WeiLH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/WeiLH15, author = {Jianghong Wei and Wenfen Liu and Xuexian Hu}, title = {Forward-Secure Threshold Attribute-Based Signature Scheme}, journal = {Comput. J.}, volume = {58}, number = {10}, pages = {2492--2506}, year = {2015}, url = {https://doi.org/10.1093/comjnl/bxu095}, doi = {10.1093/COMJNL/BXU095}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/WeiLH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-cdt/WeiLH15, author = {Jianghong Wei and Wenfen Liu and Xuexian Hu}, title = {Secure control protocol for universal serial bus mass storage devices}, journal = {{IET} Comput. Digit. Tech.}, volume = {9}, number = {6}, pages = {321--327}, year = {2015}, url = {https://doi.org/10.1049/iet-cdt.2014.0196}, doi = {10.1049/IET-CDT.2014.0196}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-cdt/WeiLH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsjkx/WangLG15, author = {Jun Wang and Wenfen Liu and Yan Gao}, title = {{\unicode{19968}}{\unicode{31181}}{\unicode{22810}}{\unicode{21442}}{\unicode{37327}}{\unicode{35780}}{\unicode{20272}}{\unicode{30340}}{\unicode{20113}}{\unicode{35745}}{\unicode{31639}}{\unicode{20449}}{\unicode{20219}}{\unicode{27169}}{\unicode{22411}} (Trust Model of Cloud Computing Based on Multi-parameters Evaluation)}, journal = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}}, volume = {42}, number = {{Z6}}, pages = {315--320}, year = {2015}, url = {http://www.jsjkx.com/CN/Y2015/V42/IZ6/315}, doi = {Y2015/V42/IZ6/315}, timestamp = {Mon, 27 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsjkx/WangLG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/WeiHHL15, author = {Jianghong Wei and Xinyi Huang and Xuexian Hu and Wenfen Liu}, editor = {Javier L{\'{o}}pez and Yongdong Wu}, title = {Revocable Threshold Attribute-Based Signature against Signing Key Exposure}, booktitle = {Information Security Practice and Experience - 11th International Conference, {ISPEC} 2015, Beijing, China, May 5-8, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9065}, pages = {316--330}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17533-1\_22}, doi = {10.1007/978-3-319-17533-1\_22}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/WeiHHL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/GaoCL14, author = {Guangpu Gao and Thomas W. Cusick and Wenfen Liu}, title = {Families of rotation symmetric functions with useful cryptographic properties}, journal = {{IET} Inf. Secur.}, volume = {8}, number = {6}, pages = {297--302}, year = {2014}, url = {https://doi.org/10.1049/iet-ifs.2013.0241}, doi = {10.1049/IET-IFS.2013.0241}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/GaoCL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jct/CarletGL14, author = {Claude Carlet and Guangpu Gao and Wenfen Liu}, title = {A secondary construction and a transformation on rotation symmetric functions, and their action on bent and semi-bent functions}, journal = {J. Comb. Theory, Ser. {A}}, volume = {127}, pages = {161--175}, year = {2014}, url = {https://doi.org/10.1016/j.jcta.2014.05.008}, doi = {10.1016/J.JCTA.2014.05.008}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jct/CarletGL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/js/GaoL14, author = {Yan Gao and Wenfen Liu}, title = {BeTrust: {A} Dynamic Trust Model Based on Bayesian Inference and Tsallis Entropy for Medical Sensor Networks}, journal = {J. Sensors}, volume = {2014}, pages = {649392:1--649392:10}, year = {2014}, url = {https://doi.org/10.1155/2014/649392}, doi = {10.1155/2014/649392}, timestamp = {Wed, 22 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/js/GaoL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WeiHL14, author = {Jianghong Wei and Xuexian Hu and Wenfen Liu}, title = {Traceable attribute-based signcryption}, journal = {Secur. Commun. Networks}, volume = {7}, number = {12}, pages = {2302--2317}, year = {2014}, url = {https://doi.org/10.1002/sec.940}, doi = {10.1002/SEC.940}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WeiHL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/WeiLH14, author = {Jianghong Wei and Wenfen Liu and Xuexian Hu}, title = {Cryptanalysis and Improvement of a Robust Smart Card Authentication Scheme for Multi-server Architecture}, journal = {Wirel. Pers. Commun.}, volume = {77}, number = {3}, pages = {2255--2269}, year = {2014}, url = {https://doi.org/10.1007/s11277-014-1636-z}, doi = {10.1007/S11277-014-1636-Z}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/WeiLH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/seta/CarletGL14, author = {Claude Carlet and Guangpu Gao and Wenfen Liu}, editor = {Kai{-}Uwe Schmidt and Arne Winterhof}, title = {Results on Constructions of Rotation Symmetric Bent and Semi-bent Functions}, booktitle = {Sequences and Their Applications - {SETA} 2014 - 8th International Conference, Melbourne, VIC, Australia, November 24-28, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8865}, pages = {21--33}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12325-7\_2}, doi = {10.1007/978-3-319-12325-7\_2}, timestamp = {Sat, 05 Sep 2020 18:00:18 +0200}, biburl = {https://dblp.org/rec/conf/seta/CarletGL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jms/WeiHL12, author = {Jianghong Wei and Xuexian Hu and Wenfen Liu}, title = {An Improved Authentication Scheme for Telecare Medicine Information Systems}, journal = {J. Medical Syst.}, volume = {36}, number = {6}, pages = {3597--3604}, year = {2012}, url = {https://doi.org/10.1007/s10916-012-9835-1}, doi = {10.1007/S10916-012-9835-1}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jms/WeiHL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/GaoZLC12, author = {Guangpu Gao and Xiyong Zhang and Wenfen Liu and Claude Carlet}, title = {Constructions of Quadratic and Cubic Rotation Symmetric Bent Functions}, journal = {{IEEE} Trans. Inf. Theory}, volume = {58}, number = {7}, pages = {4908--4913}, year = {2012}, url = {https://doi.org/10.1109/TIT.2012.2193377}, doi = {10.1109/TIT.2012.2193377}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/GaoZLC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/GaoLZ11, author = {Guangpu Gao and Wenfen Liu and Xiyong Zhang}, title = {The Degree of Balanced Elementary Symmetric Boolean Functions of bf 4k+bf 3 Variables}, journal = {{IEEE} Trans. Inf. Theory}, volume = {57}, number = {7}, pages = {4822--4825}, year = {2011}, url = {https://doi.org/10.1109/TIT.2011.2145910}, doi = {10.1109/TIT.2011.2145910}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/GaoLZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/HuL09, author = {Xuexian Hu and Wenfen Liu}, editor = {Feng Bao and Moti Yung and Dongdai Lin and Jiwu Jing}, title = {Efficient Password-Based Authenticated Key Exchange Protocol in the {UC} Framework}, booktitle = {Information Security and Cryptology - 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6151}, pages = {144--153}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-16342-5\_11}, doi = {10.1007/978-3-642-16342-5\_11}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/HuL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/HuMLL06, author = {Xuexian Hu and Yongtao Ming and Wenfen Liu and Shiqu Li}, editor = {Helger Lipmaa and Moti Yung and Dongdai Lin}, title = {On the Rate of Coincidence of Two Clock-Controlled Combiners}, booktitle = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4318}, pages = {54--65}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11937807\_5}, doi = {10.1007/11937807\_5}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/HuMLL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.