BibTeX records: Wenfen Liu

download as .bib file

@article{DBLP:journals/ipm/ZhangZHHYL23,
  author       = {Mengli Zhang and
                  Gang Zhou and
                  Ningbo Huang and
                  Peng He and
                  Wanting Yu and
                  Wenfen Liu},
  title        = {AsU-OSum: Aspect-augmented unsupervised opinion summarization},
  journal      = {Inf. Process. Manag.},
  volume       = {60},
  number       = {1},
  pages        = {103138},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ipm.2022.103138},
  doi          = {10.1016/J.IPM.2022.103138},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ipm/ZhangZHHYL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/talip/ZhangZYHL23,
  author       = {Mengli Zhang and
                  Gang Zhou and
                  Wanting Yu and
                  Ningbo Huang and
                  Wenfen Liu},
  title        = {{GA-SCS:} Graph-Augmented Source Code Summarization},
  journal      = {{ACM} Trans. Asian Low Resour. Lang. Inf. Process.},
  volume       = {22},
  number       = {2},
  pages        = {53:1--53:19},
  year         = {2023},
  url          = {https://doi.org/10.1145/3554820},
  doi          = {10.1145/3554820},
  timestamp    = {Tue, 06 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/talip/ZhangZYHL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eitce/ZhaoLWLL23,
  author       = {Jie Zhao and
                  Wenfen Liu and
                  Jing Wang and
                  Song Li and
                  Yongcan Lu},
  title        = {Blockchain-based Off-chain Extension Model for Geographic Information
                  Data},
  booktitle    = {Proceedings of the 2023 7th International Conference on Electronic
                  Information Technology and Computer Engineering, {EITCE} 2023, Xiamen,
                  China, October 20-22, 2023},
  pages        = {1036--1041},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3650400.3650575},
  doi          = {10.1145/3650400.3650575},
  timestamp    = {Fri, 19 Apr 2024 08:09:03 +0200},
  biburl       = {https://dblp.org/rec/conf/eitce/ZhaoLWLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eitce/GaoLL23,
  author       = {Shu Gao and
                  Wenfen Liu and
                  Yongcan Lu},
  title        = {Trajectory Privacy Protection Method Based on Sensitivity Analysis},
  booktitle    = {Proceedings of the 2023 7th International Conference on Electronic
                  Information Technology and Computer Engineering, {EITCE} 2023, Xiamen,
                  China, October 20-22, 2023},
  pages        = {1375--1380},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3650400.3650631},
  doi          = {10.1145/3650400.3650631},
  timestamp    = {Fri, 19 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eitce/GaoLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhangL22a,
  author       = {Peng Zhang and
                  Wenfen Liu},
  title        = {3FO: The Three-Frame-Only Approach for Fast and Accurate Monocular
                  {SLAM} Initialization},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {108859--108869},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3213684},
  doi          = {10.1109/ACCESS.2022.3213684},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ZhangL22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YangHZWL22,
  author       = {Kunyu Yang and
                  Xuexian Hu and
                  Qihui Zhang and
                  Jianghong Wei and
                  Wenfen Liu},
  title        = {VAEPass: {A} lightweight passwords guessing model based on variational
                  auto-encoder},
  journal      = {Comput. Secur.},
  volume       = {114},
  pages        = {102587},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102587},
  doi          = {10.1016/J.COSE.2021.102587},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YangHZWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/KuSZLZ22,
  author       = {Hanchao Ku and
                  Willy Susilo and
                  Yudi Zhang and
                  Wenfen Liu and
                  Mingwu Zhang},
  title        = {Privacy-Preserving federated learning in medical diagnosis with homomorphic
                  re-Encryption},
  journal      = {Comput. Stand. Interfaces},
  volume       = {80},
  pages        = {103583},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.csi.2021.103583},
  doi          = {10.1016/J.CSI.2021.103583},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csi/KuSZLZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/finr/JiaL22,
  author       = {Haoyang Jia and
                  Wenfen Liu},
  title        = {Anomaly detection in images with shared autoencoders},
  journal      = {Frontiers Neurorobotics},
  volume       = {16},
  year         = {2022},
  url          = {https://doi.org/10.3389/fnbot.2022.1046867},
  doi          = {10.3389/FNBOT.2022.1046867},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/finr/JiaL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jiis/ZhangZYHL22,
  author       = {Mengli Zhang and
                  Gang Zhou and
                  Wanting Yu and
                  Ningbo Huang and
                  Wenfen Liu},
  title        = {{MAA-PTG:} multimodal aspect-aware product title generation},
  journal      = {J. Intell. Inf. Syst.},
  volume       = {59},
  number       = {1},
  pages        = {213--235},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10844-022-00695-8},
  doi          = {10.1007/S10844-022-00695-8},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jiis/ZhangZYHL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nca/ZhangZYLHY22,
  author       = {Mengli Zhang and
                  Gang Zhou and
                  Wanting Yu and
                  Wenfen Liu and
                  Ningbo Huang and
                  Ze Yu},
  title        = {{FCSF-TABS:} two-stage abstractive summarization with fact-aware reinforced
                  content selection and fusion},
  journal      = {Neural Comput. Appl.},
  volume       = {34},
  number       = {13},
  pages        = {10547--10560},
  year         = {2022},
  url          = {https://doi.org/10.1007/s00521-021-06880-0},
  doi          = {10.1007/S00521-021-06880-0},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nca/ZhangZYLHY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/LiGLWL22,
  author       = {Ji Li and
                  Chunxiang Gu and
                  Luan Luan and
                  Fushan Wei and
                  Wenfen Liu},
  editor       = {Sharief Oteafy and
                  Eyuphan Bulut and
                  Florian Tschorsch},
  title        = {Few-Shot Open-Set Traffic Classification Based on Self-Supervised
                  Learning},
  booktitle    = {47th {IEEE} Conference on Local Computer Networks, {LCN} 2022, Edmonton,
                  AB, Canada, September 26-29, 2022},
  pages        = {371--374},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/LCN53696.2022.9843450},
  doi          = {10.1109/LCN53696.2022.9843450},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lcn/LiGLWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipm/ZhangZYL21,
  author       = {Mengli Zhang and
                  Gang Zhou and
                  Wanting Yu and
                  Wenfen Liu},
  title        = {{FAR-ASS:} Fact-aware reinforced abstractive sentence summarization},
  journal      = {Inf. Process. Manag.},
  volume       = {58},
  number       = {3},
  pages        = {102478},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ipm.2020.102478},
  doi          = {10.1016/J.IPM.2020.102478},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipm/ZhangZYL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/ZhangZYL21,
  author       = {Mengli Zhang and
                  Gang Zhou and
                  Wanting Yu and
                  Wenfen Liu},
  title        = {{KI-HABS:} Key Information Guided Hierarchical Abstractive Summarization},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {15},
  number       = {12},
  pages        = {4275--4291},
  year         = {2021},
  url          = {https://doi.org/10.3837/tiis.2021.12.001},
  doi          = {10.3837/TIIS.2021.12.001},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/ZhangZYL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eitce/LiuWH21,
  author       = {Wenfen Liu and
                  Nan Wang and
                  Yuehua Huang},
  title        = {Outlier Detection Method based on Improved K-means Clustering Algorithm},
  booktitle    = {{EITCE} 2021: 5th International Conference on Electronic Information
                  Technology and Computer Engineering, Xiamen, China, October 22 - 24,
                  2021},
  pages        = {1350--1355},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3501409.3501648},
  doi          = {10.1145/3501409.3501648},
  timestamp    = {Fri, 04 Aug 2023 10:50:51 +0200},
  biburl       = {https://dblp.org/rec/conf/eitce/LiuWH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/YangHZWL21,
  author       = {Kunyu Yang and
                  Xuexian Hu and
                  Qihui Zhang and
                  Jianghong Wei and
                  Wenfen Liu},
  editor       = {Debin Gao and
                  Qi Li and
                  Xiaohong Guan and
                  Xiaofeng Liao},
  title        = {Studies of Keyboard Patterns in Passwords: Recognition, Characteristics
                  and Strength Evolution},
  booktitle    = {Information and Communications Security - 23rd International Conference,
                  {ICICS} 2021, Chongqing, China, November 19-21, 2021, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12918},
  pages        = {153--168},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-86890-1\_9},
  doi          = {10.1007/978-3-030-86890-1\_9},
  timestamp    = {Tue, 21 Sep 2021 19:14:09 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/YangHZWL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-05525,
  author       = {Chun Liu and
                  Xuexian Hu and
                  Xiaofeng Chen and
                  Jianghong Wei and
                  Wenfen Liu},
  title        = {An Efficient Matrix Multiplication with Enhanced Privacy Protection
                  in Cloud Computing and Its Applications},
  journal      = {CoRR},
  volume       = {abs/2105.05525},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.05525},
  eprinttype    = {arXiv},
  eprint       = {2105.05525},
  timestamp    = {Tue, 18 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-05525.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WangHLZ20a,
  author       = {Fu Wang and
                  Liu He and
                  Wenfen Liu and
                  Yanbin Zheng},
  title        = {Harden Deep Convolutional Classifiers via K-Means Reconstruction},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {168210--168218},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3024197},
  doi          = {10.1109/ACCESS.2020.3024197},
  timestamp    = {Tue, 06 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/WangHLZ20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dm/GaoLLW20,
  author       = {Guangpu Gao and
                  Dongdai Lin and
                  Wenfen Liu and
                  Yongjuan Wang},
  title        = {Composition of Boolean functions: An application to the secondary
                  constructions of bent functions},
  journal      = {Discret. Math.},
  volume       = {343},
  number       = {3},
  pages        = {111711},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.disc.2019.111711},
  doi          = {10.1016/J.DISC.2019.111711},
  timestamp    = {Mon, 20 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dm/GaoLLW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/LiWYLH20,
  author       = {Ji Li and
                  Jianghong Wei and
                  Mao Ye and
                  Wenfen Liu and
                  Xuexian Hu},
  title        = {Privacy-preserving constrained spectral clustering algorithm for large-scale
                  data sets},
  journal      = {{IET} Inf. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {321--331},
  year         = {2020},
  url          = {https://doi.org/10.1049/iet-ifs.2019.0255},
  doi          = {10.1049/IET-IFS.2019.0255},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/LiWYLH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/YangHWZL20,
  author       = {Ming Yang and
                  Xuexian Hu and
                  Jianghong Wei and
                  Qihui Zhang and
                  Wenfen Liu},
  title        = {Outsourced Secure {ID3} Decision Tree Algorithm over Horizontally
                  Partitioned Datasets with Consortium Blockchain},
  booktitle    = {{ICCNS} 2020: The 10th International Conference on Communication and
                  Network Security, Tokyo, Japan, November 27-29, 2020},
  pages        = {60--69},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3442520.3442534},
  doi          = {10.1145/3442520.3442534},
  timestamp    = {Thu, 12 Aug 2021 15:30:47 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/YangHWZL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LiuHZWL19,
  author       = {Chun Liu and
                  Xuexian Hu and
                  Qihui Zhang and
                  Jianghong Wei and
                  Wenfen Liu},
  title        = {An Efficient Biometric Identification in Cloud Computing With Enhanced
                  Privacy Security},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {105363--105375},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2931881},
  doi          = {10.1109/ACCESS.2019.2931881},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LiuHZWL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhangZKKHL19,
  author       = {Mengli Zhang and
                  Gang Zhou and
                  Muhammad Khurram Khan and
                  Saru Kumari and
                  Xuexian Hu and
                  Wenfen Liu},
  title        = {{SPSR-FSPG:} {A} Fast Simulative Password Set Generation Algorithm},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {155107--155119},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2948975},
  doi          = {10.1109/ACCESS.2019.2948975},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZhangZKKHL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/ZhangZLHW19,
  author       = {Mengli Zhang and
                  Qihui Zhang and
                  Wenfen Liu and
                  Xuexian Hu and
                  Jianghong Wei},
  title        = {{TG-SPSR:} {A} Systematic Targeted Password Attacking Model},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {13},
  number       = {5},
  pages        = {2674--2697},
  year         = {2019},
  url          = {https://doi.org/10.3837/tiis.2019.05.024},
  doi          = {10.3837/TIIS.2019.05.024},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itiis/ZhangZLHW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jossac/GaoLL19,
  author       = {Guangpu Gao and
                  Dongdai Lin and
                  Wenfen Liu},
  title        = {A Note on Rotation Symmetric S-boxes},
  journal      = {J. Syst. Sci. Complex.},
  volume       = {32},
  number       = {5},
  pages        = {1460--1472},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11424-019-7263-8},
  doi          = {10.1007/S11424-019-7263-8},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jossac/GaoLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/WeiHLZ19,
  author       = {Jianghong Wei and
                  Xuexian Hu and
                  Wenfen Liu and
                  Qihui Zhang},
  title        = {Forward and backward secure fuzzy encryption for data sharing in cloud
                  computing},
  journal      = {Soft Comput.},
  volume       = {23},
  number       = {2},
  pages        = {497--506},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00500-017-2834-x},
  doi          = {10.1007/S00500-017-2834-X},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/soco/WeiHLZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ZhangLYHM19,
  author       = {Qihui Zhang and
                  Wenfen Liu and
                  Kang Yang and
                  Xuexian Hu and
                  Ying Mei},
  editor       = {Zhe Liu and
                  Moti Yung},
  title        = {Round-Efficient Anonymous Password-Authenticated Key Exchange Protocol
                  in the Standard Model},
  booktitle    = {Information Security and Cryptology - 15th International Conference,
                  Inscrypt 2019, Nanjing, China, December 6-8, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12020},
  pages        = {499--516},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-42921-8\_30},
  doi          = {10.1007/978-3-030-42921-8\_30},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/ZhangLYHM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/LinGHZL19,
  author       = {Zijie Lin and
                  Liangliang Gao and
                  Xuexian Hu and
                  Yuxuan Zhang and
                  Wenfen Liu},
  title        = {Differentially Private Graph Clustering Algorithm Based on Structure
                  Similarity},
  booktitle    = {{ICCNS} 2019: The 9th International Conference on Communication and
                  Network Security, Chongqing, China, November 15-17, 2019},
  pages        = {63--68},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3371676.3371693},
  doi          = {10.1145/3371676.3371693},
  timestamp    = {Thu, 22 Apr 2021 19:04:09 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/LinGHZL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icycsee/ZhengYWDHL19,
  author       = {Yanbin Zheng and
                  Hongxu Yun and
                  Fu Wang and
                  Yong Ding and
                  Yongzhong Huang and
                  Wenfen Liu},
  editor       = {Xiaohui Cheng and
                  Weipeng Jing and
                  Xianhua Song and
                  Zeguang Lu},
  title        = {Defence Against Adversarial Attacks Using Clustering Algorithm},
  booktitle    = {Data Science - 5th International Conference of Pioneering Computer
                  Scientists, Engineers and Educators, {ICPCSEE} 2019, Guilin, China,
                  September 20-23, 2019, Proceedings, Part {I}},
  series       = {Communications in Computer and Information Science},
  volume       = {1058},
  pages        = {323--333},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-981-15-0118-0\_25},
  doi          = {10.1007/978-981-15-0118-0\_25},
  timestamp    = {Thu, 15 Feb 2024 16:58:31 +0100},
  biburl       = {https://dblp.org/rec/conf/icycsee/ZhengYWDHL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/WeiLH18,
  author       = {Jianghong Wei and
                  Wenfen Liu and
                  Xuexian Hu},
  title        = {On the security and improvement of privacy-preserving 3-factor authentication
                  scheme for {TMIS}},
  journal      = {Int. J. Commun. Syst.},
  volume       = {31},
  number       = {15},
  year         = {2018},
  url          = {https://doi.org/10.1002/dac.3767},
  doi          = {10.1002/DAC.3767},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/WeiLH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itc/LiuZWHK18,
  author       = {Wenfen Liu and
                  Gang Zhou and
                  Jianghong Wei and
                  Xuexian Hu and
                  Saru Kumari},
  title        = {Security Enhanced and Cost-effective User Authentication Scheme for
                  Wireless Sensor Networks},
  journal      = {Inf. Technol. Control.},
  volume       = {47},
  number       = {2},
  pages        = {275--294},
  year         = {2018},
  url          = {https://doi.org/10.5755/j01.itc.47.2.16397},
  doi          = {10.5755/J01.ITC.47.2.16397},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itc/LiuZWHK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/WeiLH18,
  author       = {Jianghong Wei and
                  Wenfen Liu and
                  Xuexian Hu},
  title        = {Secure and Efficient Attribute-Based Access Control for Multiauthority
                  Cloud Storage},
  journal      = {{IEEE} Syst. J.},
  volume       = {12},
  number       = {2},
  pages        = {1731--1742},
  year         = {2018},
  url          = {https://doi.org/10.1109/JSYST.2016.2633559},
  doi          = {10.1109/JSYST.2016.2633559},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/WeiLH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/WeiLH18,
  author       = {Jianghong Wei and
                  Wenfen Liu and
                  Xuexian Hu},
  title        = {Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based
                  Encryption},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {6},
  number       = {4},
  pages        = {1136--1148},
  year         = {2018},
  url          = {https://doi.org/10.1109/TCC.2016.2545668},
  doi          = {10.1109/TCC.2016.2545668},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/WeiLH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ZhangZHL18,
  author       = {Mengli Zhang and
                  Qihui Zhang and
                  Xuexian Hu and
                  Wenfen Liu},
  title        = {A Password Cracking Method Based On Structure Partition and BiLSTM
                  Recurrent Neural Network},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {79--83},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290501},
  doi          = {10.1145/3290480.3290501},
  timestamp    = {Thu, 22 Apr 2021 18:47:33 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ZhangZHL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccns/ZhangWZHL18,
  author       = {Yuxuan Zhang and
                  Jianghong Wei and
                  Xiaojian Zhang and
                  Xuexian Hu and
                  Wenfen Liu},
  title        = {A Two-Phase Algorithm for Generating Synthetic Graph Under Local Differential
                  Privacy},
  booktitle    = {Proceedings of the 8th International Conference on Communication and
                  Network Security, {ICCNS} 2018, Qingdao, China, November 02-04, 2018},
  pages        = {84--89},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3290480.3290503},
  doi          = {10.1145/3290480.3290503},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccns/ZhangWZHL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cin/LiuYWH17,
  author       = {Wenfen Liu and
                  Mao Ye and
                  Jianghong Wei and
                  Xuexian Hu},
  title        = {Fast Constrained Spectral Clustering and Cluster Ensemble with Random
                  Projection},
  journal      = {Comput. Intell. Neurosci.},
  volume       = {2017},
  pages        = {2658707:1--2658707:14},
  year         = {2017},
  url          = {https://doi.org/10.1155/2017/2658707},
  doi          = {10.1155/2017/2658707},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cin/LiuYWH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcm/WeiLH17,
  author       = {Jianghong Wei and
                  Wenfen Liu and
                  Xuexian Hu},
  title        = {Forward-secure identity-based signature with efficient revocation},
  journal      = {Int. J. Comput. Math.},
  volume       = {94},
  number       = {7},
  pages        = {1390--1411},
  year         = {2017},
  url          = {https://doi.org/10.1080/00207160.2016.1190835},
  doi          = {10.1080/00207160.2016.1190835},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcm/WeiLH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/WeiHL17,
  author       = {Jianghong Wei and
                  Xuexian Hu and
                  Wenfen Liu},
  title        = {Two-factor authentication scheme using attribute and password},
  journal      = {Int. J. Commun. Syst.},
  volume       = {30},
  number       = {1},
  year         = {2017},
  url          = {https://doi.org/10.1002/dac.2915},
  doi          = {10.1002/DAC.2915},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/WeiHL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijfcs/WeiHLH17,
  author       = {Jianghong Wei and
                  Xinyi Huang and
                  Wenfen Liu and
                  Xuexian Hu},
  title        = {Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical
                  Attribute-Based Encryption with Forward Security},
  journal      = {Int. J. Found. Comput. Sci.},
  volume       = {28},
  number       = {7},
  pages        = {843--868},
  year         = {2017},
  url          = {https://doi.org/10.1142/S0129054117500289},
  doi          = {10.1142/S0129054117500289},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijfcs/WeiHLH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kbs/LiuYWH17,
  author       = {Wenfen Liu and
                  Mao Ye and
                  Jianghong Wei and
                  Xuexian Hu},
  title        = {Compressed constrained spectral clustering framework for large-scale
                  data sets},
  journal      = {Knowl. Based Syst.},
  volume       = {135},
  pages        = {77--88},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.knosys.2017.08.003},
  doi          = {10.1016/J.KNOSYS.2017.08.003},
  timestamp    = {Tue, 25 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/kbs/LiuYWH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiWLH17,
  author       = {Ji Li and
                  Jianghong Wei and
                  Wenfen Liu and
                  Xuexian Hu},
  title        = {{PMDP:} {A} Framework for Preserving Multiparty Data Privacy in Cloud
                  Computing},
  journal      = {Secur. Commun. Networks},
  volume       = {2017},
  pages        = {6097253:1--6097253:14},
  year         = {2017},
  url          = {https://doi.org/10.1155/2017/6097253},
  doi          = {10.1155/2017/6097253},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiWLH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/ZhangHWL17,
  author       = {Qihui Zhang and
                  Xuexian Hu and
                  Jianghong Wei and
                  Wenfen Liu},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Universally Composable Three-Party Password Authenticated Key Exchange},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {123--137},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_11},
  doi          = {10.1007/978-3-319-68542-7\_11},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/ZhangHWL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nlpcc/LuLZHW17,
  author       = {Zhonglei Lu and
                  Wenfen Liu and
                  Yanfang Zhou and
                  Xuexian Hu and
                  Binyu Wang},
  editor       = {Xuanjing Huang and
                  Jing Jiang and
                  Dongyan Zhao and
                  Yansong Feng and
                  Yu Hong},
  title        = {An Effective Approach for Chinese News Headline Classification Based
                  on Multi-representation Mixed Model with Attention and Ensemble Learning},
  booktitle    = {Natural Language Processing and Chinese Computing - 6th {CCF} International
                  Conference, {NLPCC} 2017, Dalian, China, November 8-12, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10619},
  pages        = {339--350},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-73618-1\_29},
  doi          = {10.1007/978-3-319-73618-1\_29},
  timestamp    = {Fri, 16 Feb 2024 08:27:36 +0100},
  biburl       = {https://dblp.org/rec/conf/nlpcc/LuLZHW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smp/LuLZHW17,
  author       = {Zhonglei Lu and
                  Wenfen Liu and
                  Yanfang Zhou and
                  Xuexian Hu and
                  Binyu Wang},
  editor       = {Xueqi Cheng and
                  Wei{-}Ying Ma and
                  Huan Liu and
                  Huawei Shen and
                  Shizheng Feng and
                  Xing Xie},
  title        = {An Effective Approach of Sentence Compression Based on "Re-read"
                  Mechanism and Bayesian Combination Model},
  booktitle    = {Social Media Processing - 6th National Conference, {SMP} 2017, Beijing,
                  China, September 14-17, 2017, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {774},
  pages        = {129--140},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-981-10-6805-8\_11},
  doi          = {10.1007/978-981-10-6805-8\_11},
  timestamp    = {Tue, 03 Apr 2018 15:57:04 +0200},
  biburl       = {https://dblp.org/rec/conf/smp/LuLZHW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/WeiHLH16,
  author       = {Jianghong Wei and
                  Xinyi Huang and
                  Wenfen Liu and
                  Xuexian Hu},
  title        = {Practical Attribute-based Signature: Traceability and Revocability},
  journal      = {Comput. J.},
  volume       = {59},
  number       = {11},
  pages        = {1714--1734},
  year         = {2016},
  url          = {https://doi.org/10.1093/comjnl/bxw045},
  doi          = {10.1093/COMJNL/BXW045},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/WeiHLH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcm/GongGL16,
  author       = {Xin Gong and
                  Guangpu Gao and
                  Wenfen Liu},
  title        = {On permutation polynomials of the form \emph{x\({}^{\mbox{1+2\({}^{\mbox{k}}\)}}\)
                  + L(x)}},
  journal      = {Int. J. Comput. Math.},
  volume       = {93},
  number       = {10},
  pages        = {1715--1722},
  year         = {2016},
  url          = {https://doi.org/10.1080/00207160.2015.1072171},
  doi          = {10.1080/00207160.2015.1072171},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcm/GongGL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WeiLH16,
  author       = {Jianghong Wei and
                  Wenfen Liu and
                  Xuexian Hu},
  title        = {Secure and Efficient Smart Card Based Remote User Password Authentication
                  Scheme},
  journal      = {Int. J. Netw. Secur.},
  volume       = {18},
  number       = {4},
  pages        = {782--792},
  year         = {2016},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v18-n4/ijns-2016-v18-n4-p782-792.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/WeiLH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/WeiLH16,
  author       = {Jianghong Wei and
                  Wenfen Liu and
                  Xuexian Hu},
  title        = {Security pitfalls of "ePASS: An expressive attribute-based signature
                  scheme"},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {30},
  pages        = {40--45},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jisa.2016.05.003},
  doi          = {10.1016/J.JISA.2016.05.003},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/WeiLH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/WeiLH15,
  author       = {Jianghong Wei and
                  Wenfen Liu and
                  Xuexian Hu},
  title        = {Forward-Secure Threshold Attribute-Based Signature Scheme},
  journal      = {Comput. J.},
  volume       = {58},
  number       = {10},
  pages        = {2492--2506},
  year         = {2015},
  url          = {https://doi.org/10.1093/comjnl/bxu095},
  doi          = {10.1093/COMJNL/BXU095},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/WeiLH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-cdt/WeiLH15,
  author       = {Jianghong Wei and
                  Wenfen Liu and
                  Xuexian Hu},
  title        = {Secure control protocol for universal serial bus mass storage devices},
  journal      = {{IET} Comput. Digit. Tech.},
  volume       = {9},
  number       = {6},
  pages        = {321--327},
  year         = {2015},
  url          = {https://doi.org/10.1049/iet-cdt.2014.0196},
  doi          = {10.1049/IET-CDT.2014.0196},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-cdt/WeiLH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsjkx/WangLG15,
  author       = {Jun Wang and
                  Wenfen Liu and
                  Yan Gao},
  title        = {{\unicode{19968}}{\unicode{31181}}{\unicode{22810}}{\unicode{21442}}{\unicode{37327}}{\unicode{35780}}{\unicode{20272}}{\unicode{30340}}{\unicode{20113}}{\unicode{35745}}{\unicode{31639}}{\unicode{20449}}{\unicode{20219}}{\unicode{27169}}{\unicode{22411}}
                  (Trust Model of Cloud Computing Based on Multi-parameters Evaluation)},
  journal      = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}},
  volume       = {42},
  number       = {{Z6}},
  pages        = {315--320},
  year         = {2015},
  url          = {http://www.jsjkx.com/CN/Y2015/V42/IZ6/315},
  doi          = {Y2015/V42/IZ6/315},
  timestamp    = {Mon, 27 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsjkx/WangLG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/WeiHHL15,
  author       = {Jianghong Wei and
                  Xinyi Huang and
                  Xuexian Hu and
                  Wenfen Liu},
  editor       = {Javier L{\'{o}}pez and
                  Yongdong Wu},
  title        = {Revocable Threshold Attribute-Based Signature against Signing Key
                  Exposure},
  booktitle    = {Information Security Practice and Experience - 11th International
                  Conference, {ISPEC} 2015, Beijing, China, May 5-8, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9065},
  pages        = {316--330},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-17533-1\_22},
  doi          = {10.1007/978-3-319-17533-1\_22},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/WeiHHL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/GaoCL14,
  author       = {Guangpu Gao and
                  Thomas W. Cusick and
                  Wenfen Liu},
  title        = {Families of rotation symmetric functions with useful cryptographic
                  properties},
  journal      = {{IET} Inf. Secur.},
  volume       = {8},
  number       = {6},
  pages        = {297--302},
  year         = {2014},
  url          = {https://doi.org/10.1049/iet-ifs.2013.0241},
  doi          = {10.1049/IET-IFS.2013.0241},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/GaoCL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jct/CarletGL14,
  author       = {Claude Carlet and
                  Guangpu Gao and
                  Wenfen Liu},
  title        = {A secondary construction and a transformation on rotation symmetric
                  functions, and their action on bent and semi-bent functions},
  journal      = {J. Comb. Theory, Ser. {A}},
  volume       = {127},
  pages        = {161--175},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jcta.2014.05.008},
  doi          = {10.1016/J.JCTA.2014.05.008},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jct/CarletGL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/js/GaoL14,
  author       = {Yan Gao and
                  Wenfen Liu},
  title        = {BeTrust: {A} Dynamic Trust Model Based on Bayesian Inference and Tsallis
                  Entropy for Medical Sensor Networks},
  journal      = {J. Sensors},
  volume       = {2014},
  pages        = {649392:1--649392:10},
  year         = {2014},
  url          = {https://doi.org/10.1155/2014/649392},
  doi          = {10.1155/2014/649392},
  timestamp    = {Wed, 22 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/js/GaoL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WeiHL14,
  author       = {Jianghong Wei and
                  Xuexian Hu and
                  Wenfen Liu},
  title        = {Traceable attribute-based signcryption},
  journal      = {Secur. Commun. Networks},
  volume       = {7},
  number       = {12},
  pages        = {2302--2317},
  year         = {2014},
  url          = {https://doi.org/10.1002/sec.940},
  doi          = {10.1002/SEC.940},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WeiHL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/WeiLH14,
  author       = {Jianghong Wei and
                  Wenfen Liu and
                  Xuexian Hu},
  title        = {Cryptanalysis and Improvement of a Robust Smart Card Authentication
                  Scheme for Multi-server Architecture},
  journal      = {Wirel. Pers. Commun.},
  volume       = {77},
  number       = {3},
  pages        = {2255--2269},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11277-014-1636-z},
  doi          = {10.1007/S11277-014-1636-Z},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/WeiLH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/seta/CarletGL14,
  author       = {Claude Carlet and
                  Guangpu Gao and
                  Wenfen Liu},
  editor       = {Kai{-}Uwe Schmidt and
                  Arne Winterhof},
  title        = {Results on Constructions of Rotation Symmetric Bent and Semi-bent
                  Functions},
  booktitle    = {Sequences and Their Applications - {SETA} 2014 - 8th International
                  Conference, Melbourne, VIC, Australia, November 24-28, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8865},
  pages        = {21--33},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12325-7\_2},
  doi          = {10.1007/978-3-319-12325-7\_2},
  timestamp    = {Sat, 05 Sep 2020 18:00:18 +0200},
  biburl       = {https://dblp.org/rec/conf/seta/CarletGL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jms/WeiHL12,
  author       = {Jianghong Wei and
                  Xuexian Hu and
                  Wenfen Liu},
  title        = {An Improved Authentication Scheme for Telecare Medicine Information
                  Systems},
  journal      = {J. Medical Syst.},
  volume       = {36},
  number       = {6},
  pages        = {3597--3604},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10916-012-9835-1},
  doi          = {10.1007/S10916-012-9835-1},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jms/WeiHL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/GaoZLC12,
  author       = {Guangpu Gao and
                  Xiyong Zhang and
                  Wenfen Liu and
                  Claude Carlet},
  title        = {Constructions of Quadratic and Cubic Rotation Symmetric Bent Functions},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {58},
  number       = {7},
  pages        = {4908--4913},
  year         = {2012},
  url          = {https://doi.org/10.1109/TIT.2012.2193377},
  doi          = {10.1109/TIT.2012.2193377},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/GaoZLC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/GaoLZ11,
  author       = {Guangpu Gao and
                  Wenfen Liu and
                  Xiyong Zhang},
  title        = {The Degree of Balanced Elementary Symmetric Boolean Functions of bf
                  4k+bf 3 Variables},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {57},
  number       = {7},
  pages        = {4822--4825},
  year         = {2011},
  url          = {https://doi.org/10.1109/TIT.2011.2145910},
  doi          = {10.1109/TIT.2011.2145910},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/GaoLZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/HuL09,
  author       = {Xuexian Hu and
                  Wenfen Liu},
  editor       = {Feng Bao and
                  Moti Yung and
                  Dongdai Lin and
                  Jiwu Jing},
  title        = {Efficient Password-Based Authenticated Key Exchange Protocol in the
                  {UC} Framework},
  booktitle    = {Information Security and Cryptology - 5th International Conference,
                  Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6151},
  pages        = {144--153},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-16342-5\_11},
  doi          = {10.1007/978-3-642-16342-5\_11},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/HuL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/HuMLL06,
  author       = {Xuexian Hu and
                  Yongtao Ming and
                  Wenfen Liu and
                  Shiqu Li},
  editor       = {Helger Lipmaa and
                  Moti Yung and
                  Dongdai Lin},
  title        = {On the Rate of Coincidence of Two Clock-Controlled Combiners},
  booktitle    = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt
                  2006, Beijing, China, November 29 - December 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4318},
  pages        = {54--65},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11937807\_5},
  doi          = {10.1007/11937807\_5},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/HuMLL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics