Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Yixian Yang
@article{DBLP:journals/jocnet/CheZDCLLY24, author = {Bichen Che and Shuntian Zheng and Zhao Dou and Xiubo Chen and Lixiang Li and Jian Li and Yixian Yang}, title = {Controlled node dialogue in IoT networks based on nonlocal orthogonal product states}, journal = {J. Opt. Commun. Netw.}, volume = {16}, number = {3}, pages = {317--327}, year = {2024}, url = {https://doi.org/10.1364/JOCN.503353}, doi = {10.1364/JOCN.503353}, timestamp = {Thu, 04 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jocnet/CheZDCLLY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ZhuCY24, author = {Haihua Zhu and Xiubo Chen and Yixian Yang}, title = {A blind watermarking scheme for {TMQIR} images}, journal = {Multim. Tools Appl.}, volume = {83}, number = {8}, pages = {23109--23127}, year = {2024}, url = {https://doi.org/10.1007/s11042-023-15368-z}, doi = {10.1007/S11042-023-15368-Z}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mta/ZhuCY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmm/RenPLY24, author = {Yeqing Ren and Haipeng Peng and Lixiang Li and Yixian Yang}, title = {Lightweight Voice Spoofing Detection Using Improved One-Class Learning and Knowledge Distillation}, journal = {{IEEE} Trans. Multim.}, volume = {26}, pages = {4360--4374}, year = {2024}, url = {https://doi.org/10.1109/TMM.2023.3321505}, doi = {10.1109/TMM.2023.3321505}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmm/RenPLY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiXZYC23, author = {Xin Li and Yang Xin and Hongliang Zhu and Yixian Yang and Yuling Chen}, title = {Cross-domain vulnerability detection using graph embedding and domain adaptation}, journal = {Comput. Secur.}, volume = {125}, pages = {103017}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103017}, doi = {10.1016/J.COSE.2022.103017}, timestamp = {Mon, 06 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/LiXZYC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsa/RenPLXLY23, author = {Yeqing Ren and Haipeng Peng and Lixiang Li and Xiaopeng Xue and Yang Lan and Yixian Yang}, title = {A voice spoofing detection framework for IoT systems with feature pyramid and online knowledge distillation}, journal = {J. Syst. Archit.}, volume = {143}, pages = {102981}, year = {2023}, url = {https://doi.org/10.1016/j.sysarc.2023.102981}, doi = {10.1016/J.SYSARC.2023.102981}, timestamp = {Thu, 12 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsa/RenPLXLY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/ZhaoCXZY23, author = {Li{-}Yun Zhao and Xiu{-}Bo Chen and Gang Xu and Jing{-}Wen Zhang and Yi{-}Xian Yang}, title = {Fault-tolerant error correction for quantum Hamming codes with only two ancillary qudits}, journal = {Quantum Inf. Process.}, volume = {22}, number = {1}, pages = {70}, year = {2023}, url = {https://doi.org/10.1007/s11128-022-03796-z}, doi = {10.1007/S11128-022-03796-Z}, timestamp = {Tue, 07 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/qip/ZhaoCXZY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/CheZDCLY23, author = {Bichen Che and Yitong Zhang and Zhao Dou and Xiubo Chen and Jian Li and Yixian Yang}, title = {Multi-party quantum private information comparison based on nonlocal orthogonal product states}, journal = {Quantum Inf. Process.}, volume = {22}, number = {6}, pages = {231}, year = {2023}, url = {https://doi.org/10.1007/s11128-023-03973-8}, doi = {10.1007/S11128-023-03973-8}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/CheZDCLY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/taslp/RenPLXLY23, author = {Yeqing Ren and Haipeng Peng and Lixiang Li and Xiaopeng Xue and Yang Lan and Yixian Yang}, title = {Generalized Voice Spoofing Detection via Integral Knowledge Amalgamation}, journal = {{IEEE} {ACM} Trans. Audio Speech Lang. Process.}, volume = {31}, pages = {2461--2475}, year = {2023}, url = {https://doi.org/10.1109/TASLP.2023.3288416}, doi = {10.1109/TASLP.2023.3288416}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/taslp/RenPLXLY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/HuangYY23, author = {Qinlong Huang and Guanyu Yan and Yixian Yang}, title = {Privacy-Preserving Traceable Attribute-Based Keyword Search in Multi-Authority Medical Cloud}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {11}, number = {1}, pages = {678--691}, year = {2023}, url = {https://doi.org/10.1109/TCC.2021.3109282}, doi = {10.1109/TCC.2021.3109282}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/HuangYY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/HuangWYZY23, author = {Qinlong Huang and Qinglin Wei and Guanyu Yan and Lin Zou and Yixian Yang}, title = {Fast and Privacy-Preserving Attribute-Based Keyword Search in Cloud Document Services}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {16}, number = {5}, pages = {3348--3360}, year = {2023}, url = {https://doi.org/10.1109/TSC.2023.3265270}, doi = {10.1109/TSC.2023.3265270}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/HuangWYZY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/TianLPWY23, author = {Yanzhao Tian and Lixiang Li and Haipeng Peng and Ding Wang and Yixian Yang}, title = {Honeywords Generation Mechanism Based on Zero-Divisor Graph Sequences}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {16}, number = {6}, pages = {4567--4579}, year = {2023}, url = {https://doi.org/10.1109/TSC.2023.3329013}, doi = {10.1109/TSC.2023.3329013}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsc/TianLPWY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amc/LiangPLTY22, author = {Junying Liang and Haipeng Peng and Lixiang Li and Fenghua Tong and Yixian Yang}, title = {Flexible construction of measurement matrices in compressed sensing based on extensions of incidence matrices of combinatorial designs}, journal = {Appl. Math. Comput.}, volume = {420}, pages = {126901}, year = {2022}, url = {https://doi.org/10.1016/j.amc.2021.126901}, doi = {10.1016/J.AMC.2021.126901}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amc/LiangPLTY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/HongSWXWYHL22, author = {Haibo Hong and Jun Shao and Licheng Wang and Mande Xie and Guiyi Wei and Yixian Yang and Song Han and Jianhong Lin}, title = {A {CCA} secure public key encryption scheme based on finite groups of Lie type}, journal = {Sci. China Inf. Sci.}, volume = {65}, number = {1}, year = {2022}, url = {https://doi.org/10.1007/s11432-019-2704-7}, doi = {10.1007/S11432-019-2704-7}, timestamp = {Tue, 13 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/HongSWXWYHL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijis/ChenSYLNZ22, author = {Yuling Chen and Jing Sun and Yixian Yang and Tao Li and Xinxin Niu and Huiyu Zhou}, title = {{PSSPR:} {A} source location privacy protection scheme based on sector phantom routing in WSNs}, journal = {Int. J. Intell. Syst.}, volume = {37}, number = {2}, pages = {1204--1221}, year = {2022}, url = {https://doi.org/10.1002/int.22666}, doi = {10.1002/INT.22666}, timestamp = {Fri, 19 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijis/ChenSYLNZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijis/LiWCLJY22, author = {Tao Li and Zhaojie Wang and Yuling Chen and Chunmei Li and Yanling Jia and Yixian Yang}, title = {Is semi-selfish mining available without being detected?}, journal = {Int. J. Intell. Syst.}, volume = {37}, number = {12}, pages = {10576--10597}, year = {2022}, url = {https://doi.org/10.1002/int.22656}, doi = {10.1002/INT.22656}, timestamp = {Fri, 19 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijis/LiWCLJY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/DouCYL22, author = {Hui Dou and Yuling Chen and Yixian Yang and Yangyang Long}, title = {A secure and efficient privacy-preserving data aggregation algorithm}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {13}, number = {3}, pages = {1495--1503}, year = {2022}, url = {https://doi.org/10.1007/s12652-020-02801-6}, doi = {10.1007/S12652-020-02801-6}, timestamp = {Fri, 13 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jaihc/DouCYL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcloudc/YangYCLYQY22, author = {Manxiang Yang and Baopeng Ye and Yuling Chen and Tao Li and Yixian Yang and Xiaobin Qian and Xiaomei Yu}, title = {A trusted de-swinging k-anonymity scheme for location privacy protection}, journal = {J. Cloud Comput.}, volume = {11}, pages = {2}, year = {2022}, url = {https://doi.org/10.1186/s13677-021-00272-4}, doi = {10.1186/S13677-021-00272-4}, timestamp = {Fri, 19 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcloudc/YangYCLYQY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joeuc/LuoCLWYY22, author = {Yun Luo and Yuling Chen and Tao Li and Yilei Wang and Yixian Yang and Xiaomei Yu}, title = {An Entropy-View Secure Multiparty Computation Protocol Based on Semi-Honest Model}, journal = {J. Organ. End User Comput.}, volume = {34}, number = {10}, pages = {1--17}, year = {2022}, url = {https://doi.org/10.4018/joeuc.306752}, doi = {10.4018/JOEUC.306752}, timestamp = {Fri, 19 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joeuc/LuoCLWYY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/SunCSHHBY22, author = {Yi{-}Ru Sun and Xiu{-}Bo Chen and Jun Shao and Song Han and Haibo Hong and Haiyong Bao and Yixian Yang}, title = {Cyclic preparation of two-qubit state in two noisy environments}, journal = {Quantum Inf. Process.}, volume = {21}, number = {1}, pages = {40}, year = {2022}, url = {https://doi.org/10.1007/s11128-021-03373-w}, doi = {10.1007/S11128-021-03373-W}, timestamp = {Tue, 13 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/qip/SunCSHHBY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/ZhaoCXY22, author = {Liyun Zhao and Xiubo Chen and Gang Xu and Yixian Yang}, title = {Hat problem: a new strategy based on quantum stabilizer codes}, journal = {Quantum Inf. Process.}, volume = {21}, number = {3}, pages = {113}, year = {2022}, url = {https://doi.org/10.1007/s11128-022-03451-7}, doi = {10.1007/S11128-022-03451-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/ZhaoCXY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/GongCXCY22, author = {Li Gong and Xiu{-}Bo Chen and Gang Xu and Yan Chang and Yi{-}Xian Yang}, title = {Multi-party controlled cyclic hybrid quantum communication protocol in noisy environment}, journal = {Quantum Inf. Process.}, volume = {21}, number = {11}, pages = {375}, year = {2022}, url = {https://doi.org/10.1007/s11128-022-03725-0}, doi = {10.1007/S11128-022-03725-0}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/qip/GongCXCY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcbb/HuangYYC22, author = {Qinlong Huang and Wei Yue and Yixian Yang and Lixuan Chen}, title = {{P2GT:} Fine-Grained Genomic Data Access Control With Privacy-Preserving Testing in Cloud Computing}, journal = {{IEEE} {ACM} Trans. Comput. Biol. Bioinform.}, volume = {19}, number = {4}, pages = {2385--2398}, year = {2022}, url = {https://doi.org/10.1109/TCBB.2021.3063388}, doi = {10.1109/TCBB.2021.3063388}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcbb/HuangYYC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/ZuoLPLY22, author = {Xiangjian Zuo and Lixiang Li and Haipeng Peng and Shoushan Luo and Yixian Yang}, title = {Privacy-Preserving Subgraph Matching Scheme With Authentication in Social Networks}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {10}, number = {3}, pages = {2038--2049}, year = {2022}, url = {https://doi.org/10.1109/TCC.2020.3012999}, doi = {10.1109/TCC.2020.3012999}, timestamp = {Thu, 22 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/ZuoLPLY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcom/HaoZXFY22, author = {Jie Hao and Jun Zhang and Shu{-}Tao Xia and Fang{-}Wei Fu and Yixian Yang}, title = {Constructions and Weight Distributions of Optimal Locally Repairable Codes}, journal = {{IEEE} Trans. Commun.}, volume = {70}, number = {5}, pages = {2895--2908}, year = {2022}, url = {https://doi.org/10.1109/TCOMM.2022.3155165}, doi = {10.1109/TCOMM.2022.3155165}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcom/HaoZXFY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/HuangDYYW22, author = {Qinlong Huang and Jiabao Du and Guanyu Yan and Yixian Yang and Qinglin Wei}, title = {Privacy-Preserving Spatio-Temporal Keyword Search for Outsourced Location-Based Services}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {15}, number = {6}, pages = {3443--3456}, year = {2022}, url = {https://doi.org/10.1109/TSC.2021.3088131}, doi = {10.1109/TSC.2021.3088131}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsc/HuangDYYW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhangXGLY21, author = {Jiansheng Zhang and Yang Xin and Yulong Gao and Xiaohui Lei and Yixian Yang}, title = {Secure {ABE} Scheme for Access Management in Blockchain-Based IoT}, journal = {{IEEE} Access}, volume = {9}, pages = {54840--54849}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3071031}, doi = {10.1109/ACCESS.2021.3071031}, timestamp = {Mon, 06 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ZhangXGLY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TianLPY21, author = {Yanzhao Tian and Lixiang Li and Haipeng Peng and Yixian Yang}, title = {Achieving flatness: Graph labeling can generate graphical honeywords}, journal = {Comput. Secur.}, volume = {104}, pages = {102212}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102212}, doi = {10.1016/J.COSE.2021.102212}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TianLPY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ZuoLLPYG21, author = {Xiangjian Zuo and Lixiang Li and Shoushan Luo and Haipeng Peng and Yixian Yang and Linming Gong}, title = {Privacy-Preserving Verifiable Graph Intersection Scheme With Cryptographic Accumulators in Social Networks}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {6}, pages = {4590--4603}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2020.3028417}, doi = {10.1109/JIOT.2020.3028417}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/ZuoLLPYG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/LiCPY21, author = {Lixiang Li and Yixin Chen and Haipeng Peng and Yixian Yang}, title = {Chaotic Deep Network for Mobile {D2D} Communication}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {10}, pages = {8078--8096}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2020.3043360}, doi = {10.1109/JIOT.2020.3043360}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/LiCPY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/DengYG21, author = {Lunzhi Deng and Yixian Yang and Ronghai Gao}, title = {Certificateless Designated Verifier Anonymous Aggregate Signature Scheme for Healthcare Wireless Sensor Networks}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {11}, pages = {8897--8909}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2021.3056097}, doi = {10.1109/JIOT.2021.3056097}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/DengYG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/DangLNLPY21, author = {Zhongkai Dang and Lixiang Li and Wei Ni and Ren Ping Liu and Haipeng Peng and Yixian Yang}, title = {How does rumor spreading affect people inside and outside an institution}, journal = {Inf. Sci.}, volume = {574}, pages = {377--393}, year = {2021}, url = {https://doi.org/10.1016/j.ins.2021.05.085}, doi = {10.1016/J.INS.2021.05.085}, timestamp = {Mon, 15 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/DangLNLPY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mis/HuCRYQY21, author = {Jianwen Hu and Yuling Chen and Xiaojun Ren and Yixian Yang and Xiaobin Qian and Xiaomei Yu}, title = {Blockchain-Enhanced Fair and Efficient Energy Trading in Industrial Internet of Things}, journal = {Mob. Inf. Syst.}, volume = {2021}, pages = {7397926:1--7397926:13}, year = {2021}, url = {https://doi.org/10.1155/2021/7397926}, doi = {10.1155/2021/7397926}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mis/HuCRYQY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/PanXLCY21, author = {Xing{-}Bo Pan and Gang Xu and Zongpeng Li and Xiu{-}Bo Chen and Yi{-}Xian Yang}, title = {Quantum network coding without loss of information}, journal = {Quantum Inf. Process.}, volume = {20}, number = {2}, pages = {65}, year = {2021}, url = {https://doi.org/10.1007/s11128-020-02966-1}, doi = {10.1007/S11128-020-02966-1}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/qip/PanXLCY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/ZhuCY21, author = {Haihua Zhu and Xiu{-}Bo Chen and Yi{-}Xian Yang}, title = {A multimode quantum image representation and its encryption scheme}, journal = {Quantum Inf. Process.}, volume = {20}, number = {9}, pages = {315}, year = {2021}, url = {https://doi.org/10.1007/s11128-021-03255-1}, doi = {10.1007/S11128-021-03255-1}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/ZhuCY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiWXZTCYY21, author = {Mingzhen Li and Yunfeng Wang and Yang Xin and Hongliang Zhu and Qifeng Tang and Yuling Chen and Yixian Yang and Guangcan Yang}, title = {Cross-Platform Strong Privacy Protection Mechanism for Review Publication}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {5556155:1--5556155:22}, year = {2021}, url = {https://doi.org/10.1155/2021/5556155}, doi = {10.1155/2021/5556155}, timestamp = {Mon, 06 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/LiWXZTCYY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiCWWZZTYY21, author = {Tao Li and Yuling Chen and Yanli Wang and Yilei Wang and Minghao Zhao and Haojia Zhu and Youliang Tian and Xiaomei Yu and Yixian Yang}, title = {Corrigendum to "Rational Protocols and Attacks in Blockchain System"}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {9856969:1--9856969:2}, year = {2021}, url = {https://doi.org/10.1155/2021/9856969}, doi = {10.1155/2021/9856969}, timestamp = {Fri, 19 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/LiCWWZZTYY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/TongLPY21, author = {Fenghua Tong and Lixiang Li and Haipeng Peng and Yixian Yang}, title = {Flexible construction of compressed sensing matrices with low storage space and low coherence}, journal = {Signal Process.}, volume = {182}, pages = {107951}, year = {2021}, url = {https://doi.org/10.1016/j.sigpro.2020.107951}, doi = {10.1016/J.SIGPRO.2020.107951}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigpro/TongLPY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/ZuoLPLY21, author = {Xiangjian Zuo and Lixiang Li and Haipeng Peng and Shoushan Luo and Yixian Yang}, title = {Privacy-Preserving Multidimensional Data Aggregation Scheme Without Trusted Authority in Smart Grid}, journal = {{IEEE} Syst. J.}, volume = {15}, number = {1}, pages = {395--406}, year = {2021}, url = {https://doi.org/10.1109/JSYST.2020.2994363}, doi = {10.1109/JSYST.2020.2994363}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sj/ZuoLPLY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/HuangYYH21, author = {Qinlong Huang and Yixian Yang and Wei Yue and Yue He}, title = {Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in Cloud Computing}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {9}, number = {4}, pages = {1607--1618}, year = {2021}, url = {https://doi.org/10.1109/TCC.2019.2908163}, doi = {10.1109/TCC.2019.2908163}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/HuangYYH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/TongLPY21, author = {Fenghua Tong and Lixiang Li and Haipeng Peng and Yixian Yang}, title = {Deterministic Constructions of Compressed Sensing Matrices From Unitary Geometry}, journal = {{IEEE} Trans. Inf. Theory}, volume = {67}, number = {8}, pages = {5548--5561}, year = {2021}, url = {https://doi.org/10.1109/TIT.2021.3088090}, doi = {10.1109/TIT.2021.3088090}, timestamp = {Thu, 29 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/TongLPY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/HuangZY21, author = {Qinlong Huang and Zhicheng Zhang and Yixian Yang}, title = {Privacy-Preserving Media Sharing with Scalable Access Control and Secure Deduplication in Mobile Cloud Computing}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {20}, number = {5}, pages = {1951--1964}, year = {2021}, url = {https://doi.org/10.1109/TMC.2020.2970705}, doi = {10.1109/TMC.2020.2970705}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/HuangZY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/HuangYF21, author = {Qinlong Huang and Yixian Yang and Jingyi Fu}, title = {Secure Data Group Sharing and Dissemination with Attribute and Time Conditions in Public Cloud}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {14}, number = {4}, pages = {1013--1025}, year = {2021}, url = {https://doi.org/10.1109/TSC.2018.2850344}, doi = {10.1109/TSC.2018.2850344}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/HuangYF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasc/GuoYCLYQ21, author = {Ping Guo and Baopeng Ye and Yuling Chen and Tao Li and Yixian Yang and Xiaobin Qian}, title = {A location data protection protocol based on differential privacy}, booktitle = {{IEEE} Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2021, Canada, October 25-28, 2021}, pages = {306--311}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DASC-PICom-CBDCom-CyberSciTech52372.2021.00060}, doi = {10.1109/DASC-PICOM-CBDCOM-CYBERSCITECH52372.2021.00060}, timestamp = {Fri, 19 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dasc/GuoYCLYQ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasc/LuoCLWY21, author = {Yun Luo and Yuling Chen and Tao Li and Yilei Wang and Yixian Yang}, title = {Using information entropy to analyze secure multi-party computation protocol}, booktitle = {{IEEE} Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2021, Canada, October 25-28, 2021}, pages = {312--318}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DASC-PICom-CBDCom-CyberSciTech52372.2021.00061}, doi = {10.1109/DASC-PICOM-CBDCOM-CYBERSCITECH52372.2021.00061}, timestamp = {Fri, 19 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dasc/LuoCLWY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasc/HuCRYQ21, author = {Jianwen Hu and Yuling Chen and Xiaoiun Ren and Yixian Yang and Xiaobin Qian}, title = {ABlockchain-enabled Efficient and Fair Energy Trading Schemes in Industrial Internet of Things}, booktitle = {{IEEE} Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2021, Canada, October 25-28, 2021}, pages = {319--325}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DASC-PICom-CBDCom-CyberSciTech52372.2021.00062}, doi = {10.1109/DASC-PICOM-CBDCOM-CYBERSCITECH52372.2021.00062}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dasc/HuCRYQ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasc/YangYCLYQ21, author = {Manxiang Yang and Baopeng Ye and Yuling Chen and Tao Li and Yixian Yang and Xiaobin Qian}, title = {A De-swinging Scheme in Location Privacy Protection via Smart Contract}, booktitle = {{IEEE} Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2021, Canada, October 25-28, 2021}, pages = {326--333}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DASC-PICom-CBDCom-CyberSciTech52372.2021.00063}, doi = {10.1109/DASC-PICOM-CBDCOM-CYBERSCITECH52372.2021.00063}, timestamp = {Fri, 19 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dasc/YangYCLYQ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasc/SunCLLY21, author = {Jing Sun and Yuling Chen and Tao Li and Jia Liu and Yixian Yang}, title = {{PSSPR:} {A} Source Location Privacy Protection Scheme Based on Sector Phantom Routing in WSNs}, booktitle = {{IEEE} Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2021, Canada, October 25-28, 2021}, pages = {334--340}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DASC-PICom-CBDCom-CyberSciTech52372.2021.00064}, doi = {10.1109/DASC-PICOM-CBDCOM-CYBERSCITECH52372.2021.00064}, timestamp = {Fri, 19 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dasc/SunCLLY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/LiLZFY21, author = {Yixiao Li and Lixiang Li and Zirui Zhuang and Yuan Fang and Yixian Yang}, title = {ResNet Approach for Coding Unit Fast Splitting Decision of {HEVC} Intra Coding}, booktitle = {Sixth {IEEE} International Conference on Data Science in Cyberspace, {DSC} 2021, Shenzhen, China, October 9-11, 2021}, pages = {130--135}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC53577.2021.00025}, doi = {10.1109/DSC53577.2021.00025}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dsc/LiLZFY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iecon/YangGLLLH21, author = {Yixian Yang and Li Guo and Xialin Li and Jiaxin Li and Wei Liu and Huihui He}, title = {A Data-Driven Detection strategy of False Data in Cooperative {DC} Microgrids}, booktitle = {{IECON} 2021 - 47th Annual Conference of the {IEEE} Industrial Electronics Society, Toronto, ON, Canada, October 13-16, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/IECON48115.2021.9589318}, doi = {10.1109/IECON48115.2021.9589318}, timestamp = {Thu, 03 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iecon/YangGLLLH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/HaoSX0Y21, author = {Jie Hao and Kenneth W. Shum and Shu{-}Tao Xia and Fang{-}Wei Fu and Yixian Yang}, title = {On Optimal Quaternary Locally Repairable Codes}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2021, Melbourne, Australia, July 12-20, 2021}, pages = {3267--3272}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISIT45174.2021.9518245}, doi = {10.1109/ISIT45174.2021.9518245}, timestamp = {Fri, 03 Sep 2021 10:54:55 +0200}, biburl = {https://dblp.org/rec/conf/isit/HaoSX0Y21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-13774, author = {Yuling Chen and Jing Sun and Yixian Yang and Tao Li and Xinxin Niu and Huiyu Zhou}, title = {{PSSPR:} {A} Source Location Privacy Protection Scheme Based on Sector Phantom Routing in WSNs}, journal = {CoRR}, volume = {abs/2109.13774}, year = {2021}, url = {https://arxiv.org/abs/2109.13774}, eprinttype = {arXiv}, eprint = {2109.13774}, timestamp = {Fri, 19 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-13774.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/QiuLPYC20, author = {Baolin Qiu and Lixiang Li and Haipeng Peng and Yixian Yang and Chuan Chen}, title = {Intermittent Pinning Synchronization of Memristor-Based Switching Networks With Multi-Links and Mixed Delays}, journal = {{IEEE} Access}, volume = {8}, pages = {7103--7116}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2019.2941720}, doi = {10.1109/ACCESS.2019.2941720}, timestamp = {Sat, 13 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/QiuLPYC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/YangZWYW20, author = {Yanqing Yang and Kangfeng Zheng and Bin Wu and Yixian Yang and Xiujuan Wang}, title = {Network Intrusion Detection Based on Supervised Adversarial Variational Auto-Encoder With Regularization}, journal = {{IEEE} Access}, volume = {8}, pages = {42169--42184}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2977007}, doi = {10.1109/ACCESS.2020.2977007}, timestamp = {Thu, 27 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/YangZWYW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LiXZYLC20, author = {Xuefeng Li and Yang Xin and Chensu Zhao and Yixian Yang and Shoushan Luo and Yuling Chen}, title = {Using User Behavior to Measure Privacy on Online Social Networks}, journal = {{IEEE} Access}, volume = {8}, pages = {108387--108401}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3000780}, doi = {10.1109/ACCESS.2020.3000780}, timestamp = {Mon, 06 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/LiXZYLC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WangLPYZ20, author = {Shaofang Wang and Lixiang Li and Haipeng Peng and Yixian Yang and Mingwen Zheng}, title = {Finite-Time Synchronization of Multi-Linked Memristor-Based Neural Networks With Mixed Time-Varying Delays}, journal = {{IEEE} Access}, volume = {8}, pages = {169966--169981}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3023715}, doi = {10.1109/ACCESS.2020.3023715}, timestamp = {Tue, 06 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/WangLPYZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amc/TongLPY20, author = {Fenghua Tong and Lixiang Li and Haipeng Peng and Yixian Yang}, title = {An effective algorithm for the spark of sparse binary measurement matrices}, journal = {Appl. Math. Comput.}, volume = {371}, year = {2020}, url = {https://doi.org/10.1016/j.amc.2019.124965}, doi = {10.1016/J.AMC.2019.124965}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/amc/TongLPY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/asc/TangLCYN20, author = {Wei Tang and Yu{-}Jun Liu and Yu{-}Ling Chen and Yi{-}Xian Yang and Xinxin Niu}, title = {{SLBRS:} Network Virus Propagation Model based on Safety Entropy}, journal = {Appl. Soft Comput.}, volume = {97}, number = {Part}, pages = {106784}, year = {2020}, url = {https://doi.org/10.1016/j.asoc.2020.106784}, doi = {10.1016/J.ASOC.2020.106784}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/asc/TangLCYN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/PengYLY20, author = {Haipeng Peng and Bo Yang and Lixiang Li and Yixian Yang}, title = {Secure and Traceable Image Transmission Scheme Based on Semitensor Product Compressed Sensing in Telemedicine System}, journal = {{IEEE} Internet Things J.}, volume = {7}, number = {3}, pages = {2432--2451}, year = {2020}, url = {https://doi.org/10.1109/JIOT.2019.2957747}, doi = {10.1109/JIOT.2019.2957747}, timestamp = {Sat, 13 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/PengYLY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ShenZWY20, author = {Yanping Shen and Kangfeng Zheng and Chunhua Wu and Yixian Yang}, title = {A Nature-inspired Multiple Kernel Extreme Learning Machine Model for Intrusion Detection}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {14}, number = {2}, pages = {702--723}, year = {2020}, url = {https://doi.org/10.3837/tiis.2020.02.013}, doi = {10.3837/TIIS.2020.02.013}, timestamp = {Thu, 16 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/ShenZWY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nn/ChenLPYMZ20, author = {Chuan Chen and Lixiang Li and Haipeng Peng and Yixian Yang and Ling Mi and Hui Zhao}, title = {A new fixed-time stability theorem and its application to the fixed-time synchronization of neural networks}, journal = {Neural Networks}, volume = {123}, pages = {412--419}, year = {2020}, url = {https://doi.org/10.1016/j.neunet.2019.12.028}, doi = {10.1016/J.NEUNET.2019.12.028}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nn/ChenLPYMZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/DouXCNYY20, author = {Zhao Dou and Gang Xu and Xiu{-}Bo Chen and Xinxin Niu and Yi{-}Xian Yang and Yu Yang}, title = {Searching for optimal quantum secret sharing scheme based on local distinguishability}, journal = {Quantum Inf. Process.}, volume = {19}, number = {10}, pages = {368}, year = {2020}, url = {https://doi.org/10.1007/s11128-020-02809-z}, doi = {10.1007/S11128-020-02809-Z}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/qip/DouXCNYY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/GaoCXYLY20, author = {Yulong Gao and Xiu{-}Bo Chen and Gang Xu and Kaiguo Yuan and Wen Liu and Yi{-}Xian Yang}, title = {A novel quantum blockchain scheme base on quantum entanglement and DPoS}, journal = {Quantum Inf. Process.}, volume = {19}, number = {12}, pages = {420}, year = {2020}, url = {https://doi.org/10.1007/s11128-020-02915-y}, doi = {10.1007/S11128-020-02915-Y}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/qip/GaoCXYLY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiCWWZZTYY20, author = {Tao Li and Yuling Chen and Yanli Wang and Yilei Wang and Minghao Zhao and Haojia Zhu and Youliang Tian and Xiaomei Yu and Yixian Yang}, title = {Rational Protocols and Attacks in Blockchain System}, journal = {Secur. Commun. Networks}, volume = {2020}, pages = {8839047:1--8839047:11}, year = {2020}, url = {https://doi.org/10.1155/2020/8839047}, doi = {10.1155/2020/8839047}, timestamp = {Fri, 19 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/LiCWWZZTYY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/FangLLPY20, author = {Yuan Fang and Lixiang Li and Yixiao Li and Haipeng Peng and Yixian Yang}, title = {Low Energy Consumption Compressed Spectrum Sensing Based on Channel Energy Reconstruction in Cognitive Radio Network}, journal = {Sensors}, volume = {20}, number = {5}, pages = {1264}, year = {2020}, url = {https://doi.org/10.3390/s20051264}, doi = {10.3390/S20051264}, timestamp = {Sat, 13 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/FangLLPY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tie/WangCHMY20, author = {Yi{-}Feng Wang and Bo Chen and Yuqi Hou and Zhun Meng and Yixian Yang}, title = {Analysis and Design of a 1-MHz Bidirectional Multi-CLLC Resonant {DC-DC} Converter With GaN Devices}, journal = {{IEEE} Trans. Ind. Electron.}, volume = {67}, number = {2}, pages = {1425--1434}, year = {2020}, url = {https://doi.org/10.1109/TIE.2019.2899549}, doi = {10.1109/TIE.2019.2899549}, timestamp = {Wed, 26 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tie/WangCHMY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/HaoXSCFY20, author = {Jie Hao and Shu{-}Tao Xia and Kenneth W. Shum and Bin Chen and Fang{-}Wei Fu and Yixian Yang}, title = {Bounds and Constructions of Locally Repairable Codes: Parity-Check Matrix Approach}, journal = {{IEEE} Trans. Inf. Theory}, volume = {66}, number = {12}, pages = {7465--7474}, year = {2020}, url = {https://doi.org/10.1109/TIT.2020.3021707}, doi = {10.1109/TIT.2020.3021707}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/HaoXSCFY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmm/LiWWY20, author = {Lixiang Li and Guoqian Wen and Zeming Wang and Yixian Yang}, title = {Efficient and Secure Image Communication System Based on Compressed Sensing for IoT Monitoring Applications}, journal = {{IEEE} Trans. Multim.}, volume = {22}, number = {1}, pages = {82--95}, year = {2020}, url = {https://doi.org/10.1109/TMM.2019.2923111}, doi = {10.1109/TMM.2019.2923111}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmm/LiWWY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbct/0001YPY20, author = {Lixiang Li and Jin Yan and Haipeng Peng and Yixian Yang}, title = {An Improved Consensus Mechanism for the Blockchain Based on Credit Rewards and Punishments}, booktitle = {ICBCT'20: The 2nd International Conference on Blockchain Technology, Hilo, HI, USA, March 12-14, 2020}, pages = {105--109}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3390566.3391668}, doi = {10.1145/3390566.3391668}, timestamp = {Mon, 10 Aug 2020 13:47:33 +0200}, biburl = {https://dblp.org/rec/conf/icbct/0001YPY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/XuDXHCY20, author = {Zixiao Xu and Qin{-}yun Dai and Gang Xu and He Huang and Xiu{-}Bo Chen and Yi{-}Xian Yang}, editor = {Xingming Sun and Jinwei Wang and Elisa Bertino}, title = {IoT Device Recognition Framework Based on Network Protocol Keyword Query}, booktitle = {Artificial Intelligence and Security - 6th International Conference, {ICAIS} 2020, Hohhot, China, July 17-20, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12239}, pages = {219--231}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57884-8\_20}, doi = {10.1007/978-3-030-57884-8\_20}, timestamp = {Mon, 07 Sep 2020 19:48:41 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/XuDXHCY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/Hao0XFY20, author = {Jie Hao and Jun Zhang and Shu{-}Tao Xia and Fang{-}Wei Fu and Yi{-}Xian Yang}, title = {Weight Distributions of q-ary Optimal Locally Repairable Codes with Locality 2, Distance 5 and Even Dimension}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2020, Los Angeles, CA, USA, June 21-26, 2020}, pages = {611--615}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ISIT44484.2020.9174123}, doi = {10.1109/ISIT44484.2020.9174123}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isit/Hao0XFY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/SunXCYY19, author = {Yi{-}Ru Sun and Gang Xu and Xiu{-}Bo Chen and Yu Yang and Yi{-}Xian Yang}, title = {Asymmetric Controlled Bidirectional Remote Preparation of Single- and Three-Qubit Equatorial State in Noisy Environment}, journal = {{IEEE} Access}, volume = {7}, pages = {2811--2822}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2018.2885340}, doi = {10.1109/ACCESS.2018.2885340}, timestamp = {Fri, 18 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/SunXCYY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ChenWXY19, author = {Xiu{-}Bo Chen and Ya{-}Lan Wang and Gang Xu and Yi{-}Xian Yang}, title = {Quantum Network Communication With a Novel Discrete-Time Quantum Walk}, journal = {{IEEE} Access}, volume = {7}, pages = {13634--13642}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2018.2890719}, doi = {10.1109/ACCESS.2018.2890719}, timestamp = {Wed, 27 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ChenWXY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WangTPY19, author = {Licheng Wang and Yanmei Tian and Yun Pan and Yixian Yang}, title = {New Construction of Blind Signatures From Braid Groups}, journal = {{IEEE} Access}, volume = {7}, pages = {36549--36557}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2904146}, doi = {10.1109/ACCESS.2019.2904146}, timestamp = {Tue, 16 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/WangTPY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ChenLPLZY19, author = {Zigang Chen and Lixiang Li and Haipeng Peng and Yuhong Liu and Haihua Zhu and Yixian Yang}, title = {Sparse General Non-Negative Matrix Factorization Based on Left Semi-Tensor Product}, journal = {{IEEE} Access}, volume = {7}, pages = {81599--81611}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2924140}, doi = {10.1109/ACCESS.2019.2924140}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ChenLPLZY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/DengYC19, author = {Lunzhi Deng and Yixian Yang and Yuling Chen}, title = {Certificateless Short Aggregate Signature Scheme for Mobile Devices}, journal = {{IEEE} Access}, volume = {7}, pages = {87162--87168}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2923697}, doi = {10.1109/ACCESS.2019.2923697}, timestamp = {Thu, 08 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/DengYC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/BianLLY19, author = {Jianchao Bian and Shoushan Luo and Zhengwen Li and Yixian Yang}, title = {Optimal Weakly Secure Minimum Storage Regenerating Codes Scheme}, journal = {{IEEE} Access}, volume = {7}, pages = {151120--151130}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2947248}, doi = {10.1109/ACCESS.2019.2947248}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/BianLLY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WangLLXZCYY19, author = {Yunfeng Wang and Mingzhen Li and Shoushan Luo and Yang Xin and Hongliang Zhu and Yuling Chen and Guangcan Yang and Yixian Yang}, title = {{LRM:} {A} Location Recombination Mechanism for Achieving Trajectory k-Anonymity Privacy Protection}, journal = {{IEEE} Access}, volume = {7}, pages = {182886--182905}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2960008}, doi = {10.1109/ACCESS.2019.2960008}, timestamp = {Mon, 06 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/WangLLXZCYY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/LiXCQNY19, author = {Zhen{-}Zhen Li and Gang Xu and Xiu{-}Bo Chen and Zhiguo Qu and Xinxin Niu and Yi{-}Xian Yang}, title = {Efficient quantum state transmission via perfect quantum network coding}, journal = {Sci. China Inf. Sci.}, volume = {62}, number = {1}, pages = {12501:1--12501:14}, year = {2019}, url = {https://doi.org/10.1007/s11432-018-9592-9}, doi = {10.1007/S11432-018-9592-9}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/LiXCQNY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/ZhuCY19, author = {Haihua Zhu and Xiu{-}Bo Chen and Yi{-}Xian Yang}, title = {A quantum image dual-scrambling encryption scheme based on random permutation}, journal = {Sci. China Inf. Sci.}, volume = {62}, number = {12}, pages = {229501}, year = {2019}, url = {https://doi.org/10.1007/s11432-018-1514-y}, doi = {10.1007/S11432-018-1514-Y}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/ZhuCY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/HongWSYAWXY19, author = {Haibo Hong and Licheng Wang and Jun Shao and Jianhua Yan and Haseeb Ahmad and Guiyi Wei and Mande Xie and Yixian Yang}, title = {A Miniature {CCA} Public Key Encryption Scheme Based on Non-abelian Factorization Problem in Finite Groups of Lie Type}, journal = {Comput. J.}, volume = {62}, number = {12}, pages = {1840--1848}, year = {2019}, url = {https://doi.org/10.1093/comjnl/bxz068}, doi = {10.1093/COMJNL/BXZ068}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/HongWSYAWXY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/ZhuMDGY19, author = {Xiaoning Zhu and Qingyue Meng and Bojian Ding and Lize Gu and Yixian Yang}, title = {Weighted pooling for image recognition of deep convolutional neural networks}, journal = {Clust. Comput.}, volume = {22}, number = {Supplement}, pages = {9371--9383}, year = {2019}, url = {https://doi.org/10.1007/s10586-018-2165-4}, doi = {10.1007/S10586-018-2165-4}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/ZhuMDGY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cnsns/Zheng0PXYZ019, author = {Mingwen Zheng and Lixiang Li and Haipeng Peng and Jinghua Xiao and Yixian Yang and Yanping Zhang and Hui Zhao}, title = {General decay synchronization of complex multi-links time-varying dynamic network}, journal = {Commun. Nonlinear Sci. Numer. Simul.}, volume = {67}, pages = {108--123}, year = {2019}, url = {https://doi.org/10.1016/j.cnsns.2018.06.015}, doi = {10.1016/J.CNSNS.2018.06.015}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cnsns/Zheng0PXYZ019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/YangPCC19, author = {Yi{-}Xian Yang and Kung{-}Jui Pai and Ruay{-}Shiung Chang and Jou{-}Ming Chang}, title = {Constructing Two Completely Independent Spanning Trees in Balanced Hypercubes}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {102-D}, number = {12}, pages = {2409--2412}, year = {2019}, url = {https://doi.org/10.1587/transinf.2019PAL0001}, doi = {10.1587/TRANSINF.2019PAL0001}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/YangPCC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/ChenLPYMW19, author = {Chuan Chen and Lixiang Li and Haipeng Peng and Yixian Yang and Ling Mi and Lianhai Wang}, title = {A new fixed-time stability theorem and its application to the synchronization control of memristive neural networks}, journal = {Neurocomputing}, volume = {349}, pages = {290--300}, year = {2019}, url = {https://doi.org/10.1016/j.neucom.2019.03.040}, doi = {10.1016/J.NEUCOM.2019.03.040}, timestamp = {Sat, 13 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijon/ChenLPYMW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/LiLPYC19, author = {Lixiang Li and Lifei Liu and Haipeng Peng and Yixian Yang and Shizhuo Cheng}, title = {Flexible and Secure Data Transmission System Based on Semitensor Compressive Sensing in Wireless Body Area Networks}, journal = {{IEEE} Internet Things J.}, volume = {6}, number = {2}, pages = {3212--3227}, year = {2019}, url = {https://doi.org/10.1109/JIOT.2018.2881129}, doi = {10.1109/JIOT.2018.2881129}, timestamp = {Sat, 13 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/LiLPYC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/PengMLSY19, author = {Haipeng Peng and Yaqi Mi and Lixiang Li and Harry Eugene Stanley and Yixian Yang}, title = {P-Tensor Product in Compressed Sensing}, journal = {{IEEE} Internet Things J.}, volume = {6}, number = {2}, pages = {3492--3511}, year = {2019}, url = {https://doi.org/10.1109/JIOT.2018.2886841}, doi = {10.1109/JIOT.2018.2886841}, timestamp = {Sat, 13 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/PengMLSY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ChenSXY19, author = {Xiu{-}Bo Chen and Yi{-}Ru Sun and Gang Xu and Yi{-}Xian Yang}, title = {Quantum homomorphic encryption scheme with flexible number of evaluator based on (\emph{k, n})-threshold quantum state sharing}, journal = {Inf. Sci.}, volume = {501}, pages = {172--181}, year = {2019}, url = {https://doi.org/10.1016/j.ins.2019.06.009}, doi = {10.1016/J.INS.2019.06.009}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/ChenSXY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/BianLLZY19, author = {Jianchao Bian and Shoushan Luo and Wei Li and Yaxing Zha and Yixian Yang}, title = {{IR-RBT} Codes: {A} New Scheme of Regenerating Codes for Tolerating Node and Intra-node Failures in Distributed Storage Systems}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {13}, number = {10}, pages = {5058--5077}, year = {2019}, url = {https://doi.org/10.3837/tiis.2019.10.013}, doi = {10.3837/TIIS.2019.10.013}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/BianLLZY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/WangSLSY19, author = {Licheng Wang and Xiaoying Shen and Jing Li and Jun Shao and Yixian Yang}, title = {Cryptographic primitives in blockchains}, journal = {J. Netw. Comput. Appl.}, volume = {127}, pages = {43--58}, year = {2019}, url = {https://doi.org/10.1016/j.jnca.2018.11.003}, doi = {10.1016/J.JNCA.2018.11.003}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/WangSLSY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nca/QiuLPY19, author = {Baolin Qiu and Lixiang Li and Haipeng Peng and Yixian Yang}, title = {Asymptotic and finite-time synchronization of memristor-based switching networks with multi-links and impulsive perturbation}, journal = {Neural Comput. Appl.}, volume = {31}, number = {8}, pages = {4031--4047}, year = {2019}, url = {https://doi.org/10.1007/s00521-017-3312-1}, doi = {10.1007/S00521-017-3312-1}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nca/QiuLPY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nn/ChenLPY19, author = {Chuan Chen and Lixiang Li and Haipeng Peng and Yixian Yang}, title = {Fixed-time synchronization of inertial memristor-based neural networks with discrete delay}, journal = {Neural Networks}, volume = {109}, pages = {81--89}, year = {2019}, url = {https://doi.org/10.1016/j.neunet.2018.10.011}, doi = {10.1016/J.NEUNET.2018.10.011}, timestamp = {Sat, 13 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nn/ChenLPY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/LiXCY19, author = {Zhen{-}Zhen Li and Gang Xu and Xiu{-}Bo Chen and Yi{-}Xian Yang}, title = {Secure quantum network coding based on quantum homomorphic message authentication}, journal = {Quantum Inf. Process.}, volume = {18}, number = {1}, pages = {14}, year = {2019}, url = {https://doi.org/10.1007/s11128-018-2127-z}, doi = {10.1007/S11128-018-2127-Z}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/LiXCY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/SunXDXCY19, author = {Yi{-}Ru Sun and Nan Xiang and Zhao Dou and Gang Xu and Xiu{-}Bo Chen and Yi{-}Xian Yang}, title = {A universal protocol for controlled bidirectional quantum state transmission}, journal = {Quantum Inf. Process.}, volume = {18}, number = {9}, pages = {281}, year = {2019}, url = {https://doi.org/10.1007/s11128-019-2390-7}, doi = {10.1007/S11128-019-2390-7}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/SunXDXCY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ShenZWY19, author = {Yanping Shen and Kangfeng Zheng and Chunhua Wu and Yixian Yang}, title = {A Neighbor Prototype Selection Method Based on {CCHPSO} for Intrusion Detection}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {1283495:1--1283495:9}, year = {2019}, url = {https://doi.org/10.1155/2019/1283495}, doi = {10.1155/2019/1283495}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ShenZWY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/YangZWY19, author = {Yanqing Yang and Kangfeng Zheng and Chunhua Wu and Yixian Yang}, title = {Improving the Classification Effectiveness of Intrusion Detection by Using Improved Conditional Variational AutoEncoder and Deep Neural Network}, journal = {Sensors}, volume = {19}, number = {11}, pages = {2528}, year = {2019}, url = {https://doi.org/10.3390/s19112528}, doi = {10.3390/S19112528}, timestamp = {Sat, 30 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/YangZWY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/LuXLY19, author = {Yanrong Lu and Guangquan Xu and Lixiang Li and Yixian Yang}, title = {Robust Privacy-Preserving Mutual Authenticated Key Agreement Scheme in Roaming Service for Global Mobility Networks}, journal = {{IEEE} Syst. J.}, volume = {13}, number = {2}, pages = {1454--1465}, year = {2019}, url = {https://doi.org/10.1109/JSYST.2018.2883349}, doi = {10.1109/JSYST.2018.2883349}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/LuXLY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/LuXLY19, author = {Yanrong Lu and Guangquan Xu and Lixiang Li and Yixian Yang}, title = {Anonymous three-factor authenticated key agreement for wireless sensor networks}, journal = {Wirel. Networks}, volume = {25}, number = {4}, pages = {1461--1475}, year = {2019}, url = {https://doi.org/10.1007/s11276-017-1604-0}, doi = {10.1007/S11276-017-1604-0}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/LuXLY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HuangLZY19, author = {Qinlong Huang and Nan Li and Zhicheng Zhang and Yixian Yang}, title = {Secure and Privacy-Preserving Warning Message Dissemination in Cloud-Assisted Internet of Vehicles}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802649}, doi = {10.1109/CNS.2019.8802649}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cns/HuangLZY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/HaoSXY19, author = {Jie Hao and Kenneth W. Shum and Shu{-}Tao Xia and Yi{-}Xian Yang}, title = {Classification of Optimal Ternary (r, {\(\delta\)})-Locally Repairable Codes Attaining the Singleton-like Bound}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2019, Paris, France, July 7-12, 2019}, pages = {2828--2832}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISIT.2019.8849762}, doi = {10.1109/ISIT.2019.8849762}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/HaoSXY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhengLPXYZ18, author = {Mingwen Zheng and Lixiang Li and Haipeng Peng and Jinghua Xiao and Yixian Yang and Yanping Zhang}, title = {Fixed-Time Synchronization of Memristive Fuzzy {BAM} Cellular Neural Networks With Time-Varying Delays Based on Feedback Controllers}, journal = {{IEEE} Access}, volume = {6}, pages = {12085--12102}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2805183}, doi = {10.1109/ACCESS.2018.2805183}, timestamp = {Sat, 13 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZhengLPXYZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HuangYW18, author = {Qinlong Huang and Yixian Yang and Licheng Wang}, title = {Correction to "Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things"}, journal = {{IEEE} Access}, volume = {6}, pages = {17245}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2823178}, doi = {10.1109/ACCESS.2018.2823178}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/HuangYW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/GaoCCSNY18, author = {Yulong Gao and Xiu{-}Bo Chen and Yu{-}Ling Chen and Ying Sun and Xinxin Niu and Yi{-}Xian Yang}, title = {A Secure Cryptocurrency Scheme Based on Post-Quantum Blockchain}, journal = {{IEEE} Access}, volume = {6}, pages = {27205--27213}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2827203}, doi = {10.1109/ACCESS.2018.2827203}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/GaoCCSNY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HuangYHY18, author = {Qinlong Huang and Wei Yue and Yue He and Yixian Yang}, title = {Secure Identity-Based Data Sharing and Profile Matching for Mobile Healthcare Social Networks in Cloud Computing}, journal = {{IEEE} Access}, volume = {6}, pages = {36584--36594}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2852784}, doi = {10.1109/ACCESS.2018.2852784}, timestamp = {Tue, 17 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/HuangYHY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ChenLPY18, author = {Chuan Chen and Lixiang Li and Haipeng Peng and Yixian Yang}, title = {Adaptive Lag Synchronization of Memristive Neural Networks With Mixed Delays}, journal = {{IEEE} Access}, volume = {6}, pages = {40768--40777}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2858246}, doi = {10.1109/ACCESS.2018.2858246}, timestamp = {Sat, 13 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ChenLPY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amc/ChenLPY18, author = {Chuan Chen and Lixiang Li and Haipeng Peng and Yixian Yang}, title = {Adaptive synchronization of memristor-based {BAM} neural networks with mixed delays}, journal = {Appl. Math. Comput.}, volume = {322}, pages = {100--110}, year = {2018}, url = {https://doi.org/10.1016/j.amc.2017.11.037}, doi = {10.1016/J.AMC.2017.11.037}, timestamp = {Sat, 13 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amc/ChenLPY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/DingY18, author = {Hai{-}yang Ding and Yixian Yang}, title = {Data hiding in color halftone images based on new conjugate property}, journal = {Comput. Electr. Eng.}, volume = {70}, pages = {302--316}, year = {2018}, url = {https://doi.org/10.1016/j.compeleceng.2016.06.007}, doi = {10.1016/J.COMPELECENG.2016.06.007}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/DingY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/DouXCLY18, author = {Zhao Dou and Gang Xu and Xiu{-}Bo Chen and Xin Liu and Yi{-}Xian Yang}, title = {A secure rational quantum state sharing protocol}, journal = {Sci. China Inf. Sci.}, volume = {61}, number = {2}, pages = {022501:1--022501:12}, year = {2018}, url = {https://doi.org/10.1007/s11432-016-9151-x}, doi = {10.1007/S11432-016-9151-X}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/DouXCLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ShenZWZNY18, author = {Yanping Shen and Kangfeng Zheng and Chunhua Wu and Mingwu Zhang and Xinxin Niu and Yixian Yang}, title = {An Ensemble Method based on Selection Using Bat Algorithm for Intrusion Detection}, journal = {Comput. J.}, volume = {61}, number = {4}, pages = {526--538}, year = {2018}, url = {https://doi.org/10.1093/comjnl/bxx101}, doi = {10.1093/COMJNL/BXX101}, timestamp = {Tue, 24 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ShenZWZNY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/AhmadDWAHY18, author = {Haseeb Ahmad and Ali Daud and Licheng Wang and Ibrar Ahmad and Muhammad Hafeez and Yixian Yang}, title = {Quantifying team precedence in the game of cricket}, journal = {Clust. Comput.}, volume = {21}, number = {1}, pages = {523--537}, year = {2018}, url = {https://doi.org/10.1007/s10586-017-0919-z}, doi = {10.1007/S10586-017-0919-Z}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cluster/AhmadDWAHY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/WangZDWCY18, author = {Licheng Wang and Zonghua Zhang and Mianxiong Dong and Lihua Wang and Zhenfu Cao and Yixian Yang}, title = {Securing Named Data Networking: Attribute-Based Encryption and Beyond}, journal = {{IEEE} Commun. Mag.}, volume = {56}, number = {11}, pages = {76--81}, year = {2018}, url = {https://doi.org/10.1109/MCOM.2018.1701123}, doi = {10.1109/MCOM.2018.1701123}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/WangZDWCY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cnsns/Zheng0PXYZ018, author = {Mingwen Zheng and Lixiang Li and Haipeng Peng and Jinghua Xiao and Yixian Yang and Yanping Zhang and Hui Zhao}, title = {Finite-time stability and synchronization of memristor-based fractional-order fuzzy cellular neural networks}, journal = {Commun. Nonlinear Sci. Numer. Simul.}, volume = {59}, pages = {272--291}, year = {2018}, url = {https://doi.org/10.1016/j.cnsns.2017.11.025}, doi = {10.1016/J.CNSNS.2017.11.025}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cnsns/Zheng0PXYZ018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eaai/ChenLXYLL18, author = {Yonggang Chen and Lixiang Li and Jinghua Xiao and Yixian Yang and Jun Liang and Tao Li}, title = {Particle swarm optimizer with crossover operation}, journal = {Eng. Appl. Artif. Intell.}, volume = {70}, pages = {159--169}, year = {2018}, url = {https://doi.org/10.1016/j.engappai.2018.01.009}, doi = {10.1016/J.ENGAPPAI.2018.01.009}, timestamp = {Sat, 13 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eaai/ChenLXYLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejwcn/ZhuDLGY18, author = {Xiaoning Zhu and Bojian Ding and Wenjun Li and Lize Gu and Yixian Yang}, title = {On development of security monitoring system via wireless sensing network}, journal = {{EURASIP} J. Wirel. Commun. Netw.}, volume = {2018}, pages = {221}, year = {2018}, url = {https://doi.org/10.1186/s13638-018-1235-x}, doi = {10.1186/S13638-018-1235-X}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejwcn/ZhuDLGY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/AhmadWHLDAY18, author = {Haseeb Ahmad and Licheng Wang and Haibo Hong and Jing Li and Hassan Dawood and Manzoor Ahmed and Yixian Yang}, title = {Primitives towards verifiable computation: a survey}, journal = {Frontiers Comput. Sci.}, volume = {12}, number = {3}, pages = {451--478}, year = {2018}, url = {https://doi.org/10.1007/s11704-016-6148-4}, doi = {10.1007/S11704-016-6148-4}, timestamp = {Sat, 31 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fcsc/AhmadWHLDAY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/HuangYF18, author = {Qinlong Huang and Yixian Yang and Jingyi Fu}, title = {{PRECISE:} Identity-based private data sharing with conditional proxy re-encryption in online social networks}, journal = {Future Gener. Comput. Syst.}, volume = {86}, pages = {1523--1533}, year = {2018}, url = {https://doi.org/10.1016/j.future.2017.05.026}, doi = {10.1016/J.FUTURE.2017.05.026}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/HuangYF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/HuangYS18, author = {Qinlong Huang and Yixian Yang and Mansuo Shen}, title = {Corrigendum to "Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing" [Future Gener. Comput. Syst. 72 {(2017)} 239-249]}, journal = {Future Gener. Comput. Syst.}, volume = {86}, pages = {1534}, year = {2018}, url = {https://doi.org/10.1016/j.future.2018.05.041}, doi = {10.1016/J.FUTURE.2018.05.041}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/HuangYS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/DengYGC18, author = {Lunzhi Deng and Yixian Yang and Ronghai Gao and Yuling Chen}, title = {Certificateless short signature scheme from pairing in the standard model}, journal = {Int. J. Commun. Syst.}, volume = {31}, number = {17}, year = {2018}, url = {https://doi.org/10.1002/dac.3796}, doi = {10.1002/DAC.3796}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/DengYGC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/ChenLPLY18, author = {Zigang Chen and Lixiang Li and Haipeng Peng and Yuhong Liu and Yixian Yang}, title = {Incremental general non-negative matrix factorization without dimension matching constraints}, journal = {Neurocomputing}, volume = {311}, pages = {344--352}, year = {2018}, url = {https://doi.org/10.1016/j.neucom.2018.05.067}, doi = {10.1016/J.NEUCOM.2018.05.067}, timestamp = {Sat, 13 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijon/ChenLPLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jfi/ZhengLPXYZZ18, author = {Mingwen Zheng and Lixiang Li and Haipeng Peng and Jinghua Xiao and Yixian Yang and Yanping Zhang and Hui Zhao}, title = {Fixed-time synchronization of memristor-based fuzzy cellular neural network with time-varying delay}, journal = {J. Frankl. Inst.}, volume = {355}, number = {14}, pages = {6780--6809}, year = {2018}, url = {https://doi.org/10.1016/j.jfranklin.2018.06.041}, doi = {10.1016/J.JFRANKLIN.2018.06.041}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jfi/ZhengLPXYZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nca/ZhengLPXYZ18, author = {Mingwen Zheng and Lixiang Li and Haipeng Peng and Jinghua Xiao and Yixian Yang and Hui Zhao}, title = {Parameters estimation and synchronization of uncertain coupling recurrent dynamical neural networks with time-varying delays based on adaptive control}, journal = {Neural Comput. Appl.}, volume = {30}, number = {7}, pages = {2217--2227}, year = {2018}, url = {https://doi.org/10.1007/s00521-016-2822-6}, doi = {10.1007/S00521-016-2822-6}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nca/ZhengLPXYZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/YangNLP18, author = {Yixian Yang and Xinxin Niu and Lixiang Li and Haipeng Peng}, title = {A Secure and Efficient Transmission Method in Connected Vehicular Cloud Computing}, journal = {{IEEE} Netw.}, volume = {32}, number = {3}, pages = {14--19}, year = {2018}, url = {https://doi.org/10.1109/MNET.2018.1700324}, doi = {10.1109/MNET.2018.1700324}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/YangNLP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/npl/ZhaoLPKXY18, author = {Hui Zhao and Lixiang Li and Haipeng Peng and J{\"{u}}rgen Kurths and Jinghua Xiao and Yixian Yang}, title = {Finite-Time Robust Synchronization of Memrisive Neural Network with Perturbation}, journal = {Neural Process. Lett.}, volume = {47}, number = {2}, pages = {509--533}, year = {2018}, url = {https://doi.org/10.1007/s11063-017-9664-9}, doi = {10.1007/S11063-017-9664-9}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/npl/ZhaoLPKXY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/npl/ChenLPYL18, author = {Chuan Chen and Lixiang Li and Haipeng Peng and Yixian Yang and Tao Li}, title = {Synchronization Control of Coupled Memristor-Based Neural Networks with Mixed Delays and Stochastic Perturbations}, journal = {Neural Process. Lett.}, volume = {47}, number = {2}, pages = {679--696}, year = {2018}, url = {https://doi.org/10.1007/s11063-017-9675-6}, doi = {10.1007/S11063-017-9675-6}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/npl/ChenLPYL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/npl/QiuLPY18, author = {Baolin Qiu and Lixiang Li and Haipeng Peng and Yixian Yang}, title = {Synchronization of Multi-links Memristor-Based Switching Networks Under Uniform Random Attacks}, journal = {Neural Process. Lett.}, volume = {48}, number = {3}, pages = {1431--1458}, year = {2018}, url = {https://doi.org/10.1007/s11063-017-9779-z}, doi = {10.1007/S11063-017-9779-Z}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/npl/QiuLPY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/YangNLPRQ18, author = {Yixian Yang and Xinxin Niu and Lixiang Li and Haipeng Peng and Jingfeng Ren and Haochun Qi}, title = {General Theory of security and a study of hacker's behavior in big data era}, journal = {Peer-to-Peer Netw. Appl.}, volume = {11}, number = {2}, pages = {210--219}, year = {2018}, url = {https://doi.org/10.1007/s12083-016-0517-5}, doi = {10.1007/S12083-016-0517-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/YangNLPRQ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/DouXCNY18, author = {Zhao Dou and Gang Xu and Xiu{-}Bo Chen and Xinxin Niu and Yi{-}Xian Yang}, title = {Rational protocol of quantum secure multi-party computation}, journal = {Quantum Inf. Process.}, volume = {17}, number = {8}, pages = {199}, year = {2018}, url = {https://doi.org/10.1007/s11128-018-1967-x}, doi = {10.1007/S11128-018-1967-X}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/DouXCNY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/ChenTXDCY18, author = {Xiu{-}Bo Chen and Xin Tang and Gang Xu and Zhao Dou and Yu{-}Ling Chen and Yi{-}Xian Yang}, title = {Cryptanalysis of secret sharing with a single \emph{d}-level quantum system}, journal = {Quantum Inf. Process.}, volume = {17}, number = {9}, pages = {225}, year = {2018}, url = {https://doi.org/10.1007/s11128-018-1988-5}, doi = {10.1007/S11128-018-1988-5}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/ChenTXDCY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/QiXCWCY18, author = {Jia{-}Min Qi and Gang Xu and Xiu{-}Bo Chen and Tian{-}Yin Wang and Xiao{-}Qiu Cai and Yi{-}Xian Yang}, title = {Two authenticated quantum dialogue protocols based on three-particle entangled states}, journal = {Quantum Inf. Process.}, volume = {17}, number = {9}, pages = {247}, year = {2018}, url = {https://doi.org/10.1007/s11128-018-2005-8}, doi = {10.1007/S11128-018-2005-8}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/QiXCWCY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HuangHYY18, author = {Qinlong Huang and Yue He and Wei Yue and Yixian Yang}, title = {Adaptive Secure Cross-Cloud Data Collaboration with Identity-Based Cryptography and Conditional Proxy Re-Encryption}, journal = {Secur. Commun. Networks}, volume = {2018}, pages = {8932325:1--8932325:12}, year = {2018}, url = {https://doi.org/10.1155/2018/8932325}, doi = {10.1155/2018/8932325}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HuangHYY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/HuangYS18, author = {Qinlong Huang and Yixian Yang and Yuxiang Shi}, title = {SmartVeh: Secure and Efficient Message Access Control and Authentication for Vehicular Cloud Computing}, journal = {Sensors}, volume = {18}, number = {2}, pages = {666}, year = {2018}, url = {https://doi.org/10.3390/s18020666}, doi = {10.3390/S18020666}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/HuangYS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/ZhuDMGY18, author = {Xiaoning Zhu and Bojian Ding and Qingyue Meng and Lize Gu and Yixian Yang}, title = {Statistic Experience Based Adaptive One-Shot Detector {(EAO)} for Camera Sensing System}, journal = {Sensors}, volume = {18}, number = {9}, pages = {3041}, year = {2018}, url = {https://doi.org/10.3390/s18093041}, doi = {10.3390/S18093041}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/ZhuDMGY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmm/ChenLPLY18, author = {Zigang Chen and Lixiang Li and Haipeng Peng and Yuhong Liu and Yixian Yang}, title = {A Novel Digital Watermarking Based on General Non-Negative Matrix Factorization}, journal = {{IEEE} Trans. Multim.}, volume = {20}, number = {8}, pages = {1973--1986}, year = {2018}, url = {https://doi.org/10.1109/TMM.2018.2794985}, doi = {10.1109/TMM.2018.2794985}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmm/ChenLPLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/www/HuangWY18, author = {Qinlong Huang and Licheng Wang and Yixian Yang}, title = {{DECENT:} Secure and fine-grained data access control with policy updating for constrained IoT devices}, journal = {World Wide Web}, volume = {21}, number = {1}, pages = {151--167}, year = {2018}, url = {https://doi.org/10.1007/s11280-017-0462-0}, doi = {10.1007/S11280-017-0462-0}, timestamp = {Wed, 24 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/www/HuangWY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/YueLSZY18, author = {Zhen Yue and Zichen Li and Peifei Song and Shumei Zhang and Yixian Yang}, editor = {Sorel Reisman and Sheikh Iqbal Ahamed and Claudio Demartini and Thomas M. Conte and Ling Liu and William R. Claycomb and Motonori Nakamura and Edmundo Tovar and Stelvio Cimato and Chung{-}Horng Lung and Hiroki Takakura and Ji{-}Jiang Yang and Toyokazu Akiyama and Zhiyong Zhang and Kamrul Hasan}, title = {A high-Capacity Watermarking Algorithm Using two Bins Histogram Modification}, booktitle = {2018 {IEEE} 42nd Annual Computer Software and Applications Conference, {COMPSAC} 2018, Tokyo, Japan, 23-27 July 2018, Volume 2}, pages = {382--387}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/COMPSAC.2018.10262}, doi = {10.1109/COMPSAC.2018.10262}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/YueLSZY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/HuangLY18, author = {Qinlong Huang and Nan Li and Yixian Yang}, title = {{DACSC:} Dynamic and Fine-Grained Access Control for Secure Data Collaboration in Cloud Computing}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2018, Abu Dhabi, United Arab Emirates, December 9-13, 2018}, pages = {1--7}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/GLOCOM.2018.8648113}, doi = {10.1109/GLOCOM.2018.8648113}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globecom/HuangLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/SunXCY18, author = {Yi{-}Ru Sun and Gang Xu and Xiu{-}Bo Chen and Yi{-}Xian Yang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Controlled Bidirectional Remote Preparation of Single- and Two-Qubit State}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {541--553}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_49}, doi = {10.1007/978-3-030-00012-7\_49}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/SunXCY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/TangXLCY18, author = {Xin Tang and Gang Xu and Kun{-}Chang Li and Xiu{-}Bo Chen and Yi{-}Xian Yang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Secure Multiparty Quantum Summation Based on d-Level Single Particles}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11065}, pages = {680--690}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00012-7\_62}, doi = {10.1007/978-3-030-00012-7\_62}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/TangXLCY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/HaoYSX18, author = {Jie Hao and Yi{-}Xian Yang and Kenneth W. Shum and Shu{-}Tao Xia}, title = {On the Maximal Code Length of Optimal Linear Locally Repairable Codes}, booktitle = {2018 {IEEE} International Symposium on Information Theory, {ISIT} 2018, Vail, CO, USA, June 17-22, 2018}, pages = {1326--1330}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ISIT.2018.8437466}, doi = {10.1109/ISIT.2018.8437466}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/HaoYSX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialsec/LiPLY18, author = {Lixiang Li and Haipeng Peng and Liwei Liu and Yixian Yang}, title = {An Efficient and Secure Transmission Model Based on Compressive Sensing}, booktitle = {2018 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2018, Santa Clara, CA, USA, December 10-11, 2018}, pages = {27--32}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/SocialSec.2018.8760382}, doi = {10.1109/SOCIALSEC.2018.8760382}, timestamp = {Sat, 13 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/socialsec/LiPLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialsec/ChenLPLZY18, author = {Zigang Chen and Lixiang Li and Haipeng Peng and Yuhong Liu and Haihua Zhu and Yixian Yang}, title = {An evaluation method of image scrambling degree based on pixel distribution}, booktitle = {2018 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2018, Santa Clara, CA, USA, December 10-11, 2018}, pages = {33--38}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/SocialSec.2018.8760371}, doi = {10.1109/SOCIALSEC.2018.8760371}, timestamp = {Sat, 13 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/socialsec/ChenLPLZY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aaecc/HongWASY17, author = {Haibo Hong and Licheng Wang and Haseeb Ahmad and Jun Shao and Yixian Yang}, title = {Minimal logarithmic signatures for one type of classical groups}, journal = {Appl. Algebra Eng. Commun. Comput.}, volume = {28}, number = {2}, pages = {177--192}, year = {2017}, url = {https://doi.org/10.1007/s00200-016-0302-y}, doi = {10.1007/S00200-016-0302-Y}, timestamp = {Sat, 20 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aaecc/HongWASY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AhmadDWHDY17, author = {Haseeb Ahmad and Ali Daud and Licheng Wang and Haibo Hong and Hussain Dawood and Yixian Yang}, title = {Prediction of Rising Stars in the Game of Cricket}, journal = {{IEEE} Access}, volume = {5}, pages = {4104--4124}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2682162}, doi = {10.1109/ACCESS.2017.2682162}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/AhmadDWHDY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HuangYW17, author = {Qinlong Huang and Yixian Yang and Licheng Wang}, title = {Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things}, journal = {{IEEE} Access}, volume = {5}, pages = {12941--12950}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2727054}, doi = {10.1109/ACCESS.2017.2727054}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/HuangYW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/asc/ChenLPXYS17, author = {Yonggang Chen and Lixiang Li and Haipeng Peng and Jinghua Xiao and Yixian Yang and Yuhui Shi}, title = {Particle swarm optimizer with two differential mutation}, journal = {Appl. Soft Comput.}, volume = {61}, pages = {314--330}, year = {2017}, url = {https://doi.org/10.1016/j.asoc.2017.07.020}, doi = {10.1016/J.ASOC.2017.07.020}, timestamp = {Sat, 13 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/asc/ChenLPXYS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/HongWAYQ17, author = {Haibo Hong and Licheng Wang and Haseeb Ahmad and Yixian Yang and Zhiguo Qu}, title = {Minimum length key in {MST} cryptosystems}, journal = {Sci. China Inf. Sci.}, volume = {60}, number = {5}, pages = {052106:1--052106:11}, year = {2017}, url = {https://doi.org/10.1007/s11432-015-5479-3}, doi = {10.1007/S11432-015-5479-3}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/HongWAYQ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/HuangYS17, author = {Qinlong Huang and Yixian Yang and Mansuo Shen}, title = {Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing}, journal = {Future Gener. Comput. Syst.}, volume = {72}, pages = {239--249}, year = {2017}, url = {https://doi.org/10.1016/j.future.2016.09.021}, doi = {10.1016/J.FUTURE.2016.09.021}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/HuangYS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/XuWZNY17, author = {Yanping Xu and Chunhua Wu and Kangfeng Zheng and Xinxin Niu and Yixian Yang}, title = {Fuzzy-synthetic minority oversampling technique: Oversampling based on fuzzy set theory for Android malware detection in imbalanced datasets}, journal = {Int. J. Distributed Sens. Networks}, volume = {13}, number = {4}, year = {2017}, url = {https://doi.org/10.1177/1550147717703116}, doi = {10.1177/1550147717703116}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/XuWZNY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/ZhaoLPXYZ17, author = {Hui Zhao and Lixiang Li and Haipeng Peng and Jinghua Xiao and Yixian Yang and Mingwen Zheng}, title = {Finite-time topology identification and stochastic synchronization of complex network with multiple time delays}, journal = {Neurocomputing}, volume = {219}, pages = {39--49}, year = {2017}, url = {https://doi.org/10.1016/j.neucom.2016.09.014}, doi = {10.1016/J.NEUCOM.2016.09.014}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijon/ZhaoLPXYZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/ChenLPYL17, author = {Chuan Chen and Lixiang Li and Haipeng Peng and Yixian Yang and Tao Li}, title = {Finite-time synchronization of memristor-based neural networks with mixed delays}, journal = {Neurocomputing}, volume = {235}, pages = {83--89}, year = {2017}, url = {https://doi.org/10.1016/j.neucom.2016.12.061}, doi = {10.1016/J.NEUCOM.2016.12.061}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijon/ChenLPYL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/ZhengLPXYZ17, author = {Mingwen Zheng and Lixiang Li and Haipeng Peng and Jinghua Xiao and Yixian Yang and Hui Zhao}, title = {Finite-time stability analysis for neutral-type neural networks with hybrid time-varying delays without using Lyapunov method}, journal = {Neurocomputing}, volume = {238}, pages = {67--75}, year = {2017}, url = {https://doi.org/10.1016/j.neucom.2017.01.037}, doi = {10.1016/J.NEUCOM.2017.01.037}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijon/ZhengLPXYZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/YangPLN17, author = {Yixian Yang and Haipeng Peng and Lixiang Li and Xinxin Niu}, title = {General Theory of Security and a Study Case in Internet of Things}, journal = {{IEEE} Internet Things J.}, volume = {4}, number = {2}, pages = {592--600}, year = {2017}, url = {https://doi.org/10.1109/JIOT.2016.2597150}, doi = {10.1109/JIOT.2016.2597150}, timestamp = {Sat, 13 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/YangPLN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itc/XiePLY17, author = {Dong Xie and Haipeng Peng and Lixiang Li and Yixian Yang}, title = {Homomorphic Signatures from Chameleon Hash Functions}, journal = {Inf. Technol. Control.}, volume = {46}, number = {2}, pages = {274--286}, year = {2017}, url = {https://doi.org/10.5755/j01.itc.46.2.14320}, doi = {10.5755/J01.ITC.46.2.14320}, timestamp = {Tue, 30 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itc/XiePLY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/HuZWY17, author = {Yixun Hu and Kangfeng Zheng and Xu Wang and Yixian Yang}, title = {{WORM-HUNTER:} {A} Worm Guard System using Software-defined Networking}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {11}, number = {1}, pages = {484--510}, year = {2017}, url = {https://doi.org/10.3837/tiis.2017.01.026}, doi = {10.3837/TIIS.2017.01.026}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/HuZWY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/DengYC17, author = {Lunzhi Deng and Yixian Yang and Yuling Chen}, title = {Certificateless multi-signer universal designated multi-verifier signature from elliptic curve group}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {11}, number = {11}, pages = {5625--5641}, year = {2017}, url = {https://doi.org/10.3837/tiis.2017.11.025}, doi = {10.3837/TIIS.2017.11.025}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/DengYC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/LuLPY17, author = {Yanrong Lu and Lixiang Li and Haipeng Peng and Yixian Yang}, title = {An anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography}, journal = {Multim. Tools Appl.}, volume = {76}, number = {2}, pages = {1801--1815}, year = {2017}, url = {https://doi.org/10.1007/s11042-015-3166-4}, doi = {10.1007/S11042-015-3166-4}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/LuLPY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nn/ChenLPY17, author = {Chuan Chen and Lixiang Li and Haipeng Peng and Yixian Yang}, title = {Fixed-time synchronization of memristor-based {BAM} neural networks with time-varying discrete delay}, journal = {Neural Networks}, volume = {96}, pages = {47--54}, year = {2017}, url = {https://doi.org/10.1016/j.neunet.2017.08.012}, doi = {10.1016/J.NEUNET.2017.08.012}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nn/ChenLPY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/ChenSXJQY17, author = {Xiu{-}Bo Chen and Yi{-}Ru Sun and Gang Xu and Heng{-}Yue Jia and Zhiguo Qu and Yi{-}Xian Yang}, title = {Controlled bidirectional remote preparation of three-qubit state}, journal = {Quantum Inf. Process.}, volume = {16}, number = {10}, pages = {244}, year = {2017}, url = {https://doi.org/10.1007/s11128-017-1690-z}, doi = {10.1007/S11128-017-1690-Z}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/ChenSXJQY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhouNZLY17, author = {Yang Zhou and Wei Ni and Kangfeng Zheng and Ren Ping Liu and Yixian Yang}, title = {Scalable Node-Centric Route Mutation for Defense of Large-Scale Software-Defined Networks}, journal = {Secur. Commun. Networks}, volume = {2017}, pages = {4651395:1--4651395:13}, year = {2017}, url = {https://doi.org/10.1155/2017/4651395}, doi = {10.1155/2017/4651395}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhouNZLY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HuangWY17, author = {Qinlong Huang and Licheng Wang and Yixian Yang}, title = {Secure and Privacy-Preserving Data Sharing and Collaboration in Mobile Healthcare Social Networks of Smart Cities}, journal = {Secur. Commun. Networks}, volume = {2017}, pages = {6426495:1--6426495:12}, year = {2017}, url = {https://doi.org/10.1155/2017/6426495}, doi = {10.1155/2017/6426495}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HuangWY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tbcas/PengTKLYW17, author = {Haipeng Peng and Ye Tian and J{\"{u}}rgen Kurths and Lixiang Li and Yixian Yang and Daoshun Wang}, title = {Secure and Energy-Efficient Data Transmission System Based on Chaotic Compressive Sensing in Body-to-Body Networks}, journal = {{IEEE} Trans. Biomed. Circuits Syst.}, volume = {11}, number = {3}, pages = {558--573}, year = {2017}, url = {https://doi.org/10.1109/TBCAS.2017.2665659}, doi = {10.1109/TBCAS.2017.2665659}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tbcas/PengTKLYW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/LuLPY17, author = {Yanrong Lu and Lixiang Li and Haipeng Peng and Yixian Yang}, title = {A Novel Smart Card Based User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks}, journal = {Wirel. Pers. Commun.}, volume = {96}, number = {1}, pages = {813--832}, year = {2017}, url = {https://doi.org/10.1007/s11277-017-4203-6}, doi = {10.1007/S11277-017-4203-6}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/LuLPY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icycsee/ZhangLY17a, author = {Jing Zhang and Shoushan Luo and Yixian Yang}, editor = {Beiji Zou and Min Li and Hongzhi Wang and Xianhua Song and Wei Xie and Zeguang Lu}, title = {Secure Multi-party Comparison Protocol and Application}, booktitle = {Data Science - Third International Conference of Pioneering Computer Scientists, Engineers and Educators, {ICPCSEE} 2017, Changsha, China, September 22-24, 2017, Proceedings, Part {I}}, series = {Communications in Computer and Information Science}, volume = {727}, pages = {292--304}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-981-10-6385-5\_25}, doi = {10.1007/978-981-10-6385-5\_25}, timestamp = {Wed, 06 Jan 2021 14:57:34 +0100}, biburl = {https://dblp.org/rec/conf/icycsee/ZhangLY17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscit/0005NZLY17, author = {Yang Zhou and Wei Ni and Kangfeng Zheng and Ren Ping Liu and Yixian Yang}, title = {Node-centric route mutation for large-scale {SDN} based on 3D earth mover's distance model}, booktitle = {17th International Symposium on Communications and Information Technologies, {ISCIT} 2017, Cairns, Australia, September 25-27, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISCIT.2017.8261239}, doi = {10.1109/ISCIT.2017.8261239}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/iscit/0005NZLY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/LiCSLY16, author = {Jing Li and Xiubo Chen and Xingming Sun and Zongpeng Li and Yixian Yang}, title = {Quantum network coding for multi-unicast problem based on 2D and 3D cluster states}, journal = {Sci. China Inf. Sci.}, volume = {59}, number = {4}, pages = {042301:1--042301:15}, year = {2016}, url = {https://doi.org/10.1007/s11432-016-5539-3}, doi = {10.1007/S11432-016-5539-3}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/LiCSLY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cii/XieHYY16, author = {Min Xie and Wei Huang and Li Yang and Yixian Yang}, title = {VOAuth: {A} solution to protect OAuth against phishing}, journal = {Comput. Ind.}, volume = {82}, pages = {151--159}, year = {2016}, url = {https://doi.org/10.1016/j.compind.2016.06.001}, doi = {10.1016/J.COMPIND.2016.06.001}, timestamp = {Tue, 18 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cii/XieHYY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dsp/XiePLY16, author = {Dong Xie and Haipeng Peng and Lixiang Li and Yixian Yang}, title = {Semi-tensor compressed sensing}, journal = {Digit. Signal Process.}, volume = {58}, pages = {85--92}, year = {2016}, url = {https://doi.org/10.1016/j.dsp.2016.07.003}, doi = {10.1016/J.DSP.2016.07.003}, timestamp = {Tue, 30 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dsp/XiePLY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ffa/HongWALYW16, author = {Haibo Hong and Licheng Wang and Haseeb Ahmad and Jing Li and Yixian Yang and Changzhong Wu}, title = {Construction of {DNA} codes by using algebraic number theory}, journal = {Finite Fields Their Appl.}, volume = {37}, pages = {328--343}, year = {2016}, url = {https://doi.org/10.1016/j.ffa.2015.10.008}, doi = {10.1016/J.FFA.2015.10.008}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ffa/HongWALYW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/LiXCSY16, author = {Zhen{-}Zhen Li and Gang Xu and Xiu{-}Bo Chen and Xingming Sun and Yi{-}Xian Yang}, title = {Multi-User Quantum Wireless Network Communication Based on Multi-Qubit {GHZ} State}, journal = {{IEEE} Commun. Lett.}, volume = {20}, number = {12}, pages = {2470--2473}, year = {2016}, url = {https://doi.org/10.1109/LCOMM.2016.2610434}, doi = {10.1109/LCOMM.2016.2610434}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icl/LiXCSY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itc/LuLPY16, author = {Yanrong Lu and Lixiang Li and Haipeng Peng and Yixian Yang}, title = {An advanced elliptic curve cryptography based mutual authentication scheme for session initiation protocol}, journal = {Inf. Technol. Control.}, volume = {45}, number = {4}, pages = {393--400}, year = {2016}, url = {https://doi.org/10.5755/j01.itc.45.4.13401}, doi = {10.5755/J01.ITC.45.4.13401}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itc/LuLPY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LuLPY16, author = {Yanrong Lu and Lixiang Li and Haipeng Peng and Yixian Yang}, title = {Robust {ID} based mutual authentication and key agreement scheme preserving user anonymity in mobile networks}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {10}, number = {3}, pages = {1273--1288}, year = {2016}, url = {https://doi.org/10.3837/tiis.2016.03.018}, doi = {10.3837/TIIS.2016.03.018}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/LuLPY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/XiePLY16, author = {Dong Xie and Haipeng Peng and Lixiang Li and Yixian Yang}, title = {Efficient Post-Quantum Secure Network Coding Signatures in the Standard Model}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {10}, number = {5}, pages = {2427--2445}, year = {2016}, url = {https://doi.org/10.3837/tiis.2016.05.026}, doi = {10.3837/TIIS.2016.05.026}, timestamp = {Tue, 30 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/XiePLY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/npl/WangLPKXY16, author = {Weiping Wang and Lixiang Li and Haipeng Peng and J{\"{u}}rgen Kurths and Jinghua Xiao and Yixian Yang}, title = {Finite-Time Anti-synchronization Control of Memristive Neural Networks With Stochastic Perturbations}, journal = {Neural Process. Lett.}, volume = {43}, number = {1}, pages = {49--63}, year = {2016}, url = {https://doi.org/10.1007/s11063-014-9401-6}, doi = {10.1007/S11063-014-9401-6}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/npl/WangLPKXY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/npl/WangLPKXY16a, author = {Weiping Wang and Lixiang Li and Haipeng Peng and J{\"{u}}rgen Kurths and Jinghua Xiao and Yixian Yang}, title = {Anti-synchronization Control of Memristive Neural Networks with Multiple Proportional Delays}, journal = {Neural Process. Lett.}, volume = {43}, number = {1}, pages = {269--283}, year = {2016}, url = {https://doi.org/10.1007/s11063-015-9417-6}, doi = {10.1007/S11063-015-9417-6}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/npl/WangLPKXY16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/npl/ZhaoLPXY16, author = {Hui Zhao and Lixiang Li and Haipeng Peng and Jinghua Xiao and Yixian Yang}, title = {Finite-Time Boundedness Analysis of Memristive Neural Network with Time-Varying Delay}, journal = {Neural Process. Lett.}, volume = {44}, number = {3}, pages = {665--679}, year = {2016}, url = {https://doi.org/10.1007/s11063-015-9487-5}, doi = {10.1007/S11063-015-9487-5}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/npl/ZhaoLPXY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/LuLPY16, author = {Yanrong Lu and Lixiang Li and Haipeng Peng and Yixian Yang}, title = {A secure and efficient mutual authentication scheme for session initiation protocol}, journal = {Peer-to-Peer Netw. Appl.}, volume = {9}, number = {2}, pages = {449--459}, year = {2016}, url = {https://doi.org/10.1007/s12083-015-0363-x}, doi = {10.1007/S12083-015-0363-X}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/LuLPY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LuLPY16, author = {Yanrong Lu and Lixiang Li and Haipeng Peng and Yixian Yang}, title = {Cryptanalysis and improvement of a chaotic maps-based anonymous authenticated key agreement protocol for multiserver architecture}, journal = {Secur. Commun. Networks}, volume = {9}, number = {11}, pages = {1321--1330}, year = {2016}, url = {https://doi.org/10.1002/sec.1417}, doi = {10.1002/SEC.1417}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LuLPY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LuLPY16a, author = {Yanrong Lu and Lixiang Li and Haipeng Peng and Yixian Yang}, title = {Robust anonymous two-factor authenticated key exchange scheme for mobile client-server environment}, journal = {Secur. Commun. Networks}, volume = {9}, number = {11}, pages = {1331--1339}, year = {2016}, url = {https://doi.org/10.1002/sec.1419}, doi = {10.1002/SEC.1419}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LuLPY16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/XiePLY16, author = {Dong Xie and Haipeng Peng and Lixiang Li and Yixian Yang}, title = {Short lattice signatures with constant-size public keys}, journal = {Secur. Commun. Networks}, volume = {9}, number = {18}, pages = {5490--5501}, year = {2016}, url = {https://doi.org/10.1002/sec.1712}, doi = {10.1002/SEC.1712}, timestamp = {Tue, 30 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/XiePLY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/LuLPY16, author = {Yanrong Lu and Lixiang Li and Haipeng Peng and Yixian Yang}, title = {An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks}, journal = {Sensors}, volume = {16}, number = {6}, pages = {837}, year = {2016}, url = {https://doi.org/10.3390/s16060837}, doi = {10.3390/S16060837}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/LuLPY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/HongSWAY16, author = {Haibo Hong and Jun Shao and Licheng Wang and Haseeb Ahmad and Yixian Yang}, title = {Public Key Encryption in Non-Abelian Groups}, journal = {CoRR}, volume = {abs/1605.06608}, year = {2016}, url = {http://arxiv.org/abs/1605.06608}, eprinttype = {arXiv}, eprint = {1605.06608}, timestamp = {Sat, 20 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/HongSWAY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HongWY15, author = {Haibo Hong and Licheng Wang and Yixian Yang}, title = {Minimal logarithmic signatures for the unitary group U\({}_{\mbox{n}}\)(q)}, journal = {Des. Codes Cryptogr.}, volume = {77}, number = {1}, pages = {179--191}, year = {2015}, url = {https://doi.org/10.1007/s10623-014-9996-7}, doi = {10.1007/S10623-014-9996-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HongWY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/LiCXYL15, author = {Jing Li and Xiu{-}Bo Chen and Gang Xu and Yixian Yang and Zongpeng Li}, title = {Perfect Quantum Network Coding Independent of Classical Network Solutions}, journal = {{IEEE} Commun. Lett.}, volume = {19}, number = {2}, pages = {115--118}, year = {2015}, url = {https://doi.org/10.1109/LCOMM.2014.2379253}, doi = {10.1109/LCOMM.2014.2379253}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icl/LiCXYL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/LeiHFY15, author = {Xue Lei and Wei Huang and Wenqing Fan and Yixian Yang}, title = {Scaling Concolic Testing for the Environment-Intensive Program}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {98-D}, number = {10}, pages = {1755--1764}, year = {2015}, url = {https://doi.org/10.1587/transinf.2015EDP7037}, doi = {10.1587/TRANSINF.2015EDP7037}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/LeiHFY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/LuLPYY15, author = {Yanrong Lu and Lixiang Li and Haipeng Peng and Xing Yang and Yixian Yang}, title = {A Lightweight {ID} Based Authentication and Key Agreement Protocol for Multiserver Architecture}, journal = {Int. J. Distributed Sens. Networks}, volume = {11}, pages = {635890:1--635890:9}, year = {2015}, url = {https://doi.org/10.1155/2015/635890}, doi = {10.1155/2015/635890}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/LuLPYY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itc/LuLPY15, author = {Yanrong Lu and Lixiang Li and Haipeng Peng and Yixian Yang}, title = {A Three-Party Password-based Authenticated Key Exchange Protocol for Wireless Communications}, journal = {Inf. Technol. Control.}, volume = {44}, number = {4}, pages = {404--409}, year = {2015}, url = {https://doi.org/10.5755/j01.itc.44.4.9729}, doi = {10.5755/J01.ITC.44.4.9729}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itc/LuLPY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/WeiZLNY15, author = {Jinxia Wei and Ru Zhang and Jianyi Liu and Xinxin Niu and Yixian Yang}, title = {Defense Strategy of Network Security based on Dynamic Classification}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {12}, pages = {5116--5134}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.12.021}, doi = {10.3837/TIIS.2015.12.021}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/WeiZLNY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jms/LuLPY15, author = {Yanrong Lu and Lixiang Li and Haipeng Peng and Yixian Yang}, title = {An Enhanced Biometric-Based Authentication Scheme for Telecare Medicine Information Systems Using Elliptic Curve Cryptosystem}, journal = {J. Medical Syst.}, volume = {39}, number = {3}, pages = {32}, year = {2015}, url = {https://doi.org/10.1007/s10916-015-0221-7}, doi = {10.1007/S10916-015-0221-7}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jms/LuLPY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jms/LuLPXY15, author = {Yanrong Lu and Lixiang Li and Haipeng Peng and Dong Xie and Yixian Yang}, title = {Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps}, journal = {J. Medical Syst.}, volume = {39}, number = {6}, pages = {65:1--65:10}, year = {2015}, url = {https://doi.org/10.1007/s10916-015-0229-z}, doi = {10.1007/S10916-015-0229-Z}, timestamp = {Tue, 30 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jms/LuLPXY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kais/PingCZTYZ15, author = {Yuan Ping and Yun Feng Chang and Yajian Zhou and Yingjie Tian and Yixian Yang and Zhili Zhang}, title = {Fast and scalable support vector clustering for large-scale data analysis}, journal = {Knowl. Inf. Syst.}, volume = {43}, number = {2}, pages = {281--310}, year = {2015}, url = {https://doi.org/10.1007/s10115-013-0724-9}, doi = {10.1007/S10115-013-0724-9}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/kais/PingCZTYZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/npl/WangPLXY15, author = {Weiping Wang and Haipeng Peng and Lixiang Li and Jinghua Xiao and Yixian Yang}, title = {Finite-Time Function Projective Synchronization in Complex Multi-links Networks with Time-Varying Delay}, journal = {Neural Process. Lett.}, volume = {41}, number = {1}, pages = {71--88}, year = {2015}, url = {https://doi.org/10.1007/s11063-013-9335-4}, doi = {10.1007/S11063-013-9335-4}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/npl/WangPLXY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/XuCDYL15, author = {Gang Xu and Xiu{-}Bo Chen and Zhao Dou and Yixian Yang and Zongpeng Li}, title = {A novel protocol for multiparty quantum key management}, journal = {Quantum Inf. Process.}, volume = {14}, number = {8}, pages = {2959--2980}, year = {2015}, url = {https://doi.org/10.1007/s11128-015-1021-1}, doi = {10.1007/S11128-015-1021-1}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/XuCDYL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/WangCXMY15, author = {Jing{-}Tao Wang and Xiu{-}Bo Chen and Gang Xu and Xiang{-}Hua Meng and Yi{-}Xian Yang}, title = {A new quantum sealed-bid auction protocol with secret order in post-confirmation}, journal = {Quantum Inf. Process.}, volume = {14}, number = {10}, pages = {3899--3911}, year = {2015}, url = {https://doi.org/10.1007/s11128-015-1076-z}, doi = {10.1007/S11128-015-1076-Z}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/WangCXMY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/XuCLWYL15, author = {Gang Xu and Xiu{-}Bo Chen and Jing Li and Cong Wang and Yi{-}Xian Yang and Zongpeng Li}, title = {Network coding for quantum cooperative multicast}, journal = {Quantum Inf. Process.}, volume = {14}, number = {11}, pages = {4297--4322}, year = {2015}, url = {https://doi.org/10.1007/s11128-015-1098-6}, doi = {10.1007/S11128-015-1098-6}, timestamp = {Tue, 21 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/qip/XuCLWYL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/LiCY15, author = {Jian{-}Qiang Li and Xiu{-}Bo Chen and Yi{-}Xian Yang}, title = {Quantum state representation based on combinatorial Laplacian matrix of star-relevant graph}, journal = {Quantum Inf. Process.}, volume = {14}, number = {12}, pages = {4691--4713}, year = {2015}, url = {https://doi.org/10.1007/s11128-015-1134-6}, doi = {10.1007/S11128-015-1134-6}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/LiCY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LuLPY15, author = {Yanrong Lu and Lixiang Li and Haipeng Peng and Yixian Yang}, title = {A biometrics and smart cards-based authentication scheme for multi-server environments}, journal = {Secur. Commun. Networks}, volume = {8}, number = {17}, pages = {3219--3228}, year = {2015}, url = {https://doi.org/10.1002/sec.1246}, doi = {10.1002/SEC.1246}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LuLPY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YanWDYY15, author = {Jianhua Yan and Licheng Wang and Mianxiong Dong and Yixian Yang and Wenbin Yao}, title = {Identity-based signcryption from lattices}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3751--3770}, year = {2015}, url = {https://doi.org/10.1002/sec.1297}, doi = {10.1002/SEC.1297}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YanWDYY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/JingYLSY15, author = {Maohua Jing and Yixian Yang and Ning Lu and Wenbo Shi and Changyong Yu}, title = {Postfix automata}, journal = {Theor. Comput. Sci.}, volume = {562}, pages = {590--605}, year = {2015}, url = {https://doi.org/10.1016/j.tcs.2014.10.050}, doi = {10.1016/J.TCS.2014.10.050}, timestamp = {Tue, 13 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/JingYLSY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/HongWALY15, author = {Haibo Hong and Licheng Wang and Haseeb Ahmad and Jing Li and Yixian Yang}, title = {Minimal Logarithmic Signatures for Sporadic Groups}, journal = {CoRR}, volume = {abs/1507.01162}, year = {2015}, url = {http://arxiv.org/abs/1507.01162}, eprinttype = {arXiv}, eprint = {1507.01162}, timestamp = {Sat, 31 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/HongWALY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/HongWAY15, author = {Haibo Hong and Licheng Wang and Haseeb Ahmad and Yixian Yang}, title = {Minimal Logarithmic Signatures for one type of Classical Groups}, journal = {CoRR}, volume = {abs/1507.01163}, year = {2015}, url = {http://arxiv.org/abs/1507.01163}, eprinttype = {arXiv}, eprint = {1507.01163}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/HongWAY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/YuanLPKHY15, author = {Jing Yuan and Lixiang Li and Haipeng Peng and J{\"{u}}rgen Kurths and Xiaojing Hua and Yixian Yang}, title = {The effect of randomness for dependency map on the robustness of interdependent lattices}, journal = {CoRR}, volume = {abs/1509.05117}, year = {2015}, url = {http://arxiv.org/abs/1509.05117}, eprinttype = {arXiv}, eprint = {1509.05117}, timestamp = {Sat, 13 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/YuanLPKHY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aaecc/HongWYA14, author = {Haibo Hong and Licheng Wang and Yixian Yang and Haseeb Ahmad}, title = {All exceptional groups of lie type have minimal logarithmic signatures}, journal = {Appl. Algebra Eng. Commun. Comput.}, volume = {25}, number = {4}, pages = {287--296}, year = {2014}, url = {https://doi.org/10.1007/s00200-014-0226-3}, doi = {10.1007/S00200-014-0226-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aaecc/HongWYA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aaecc/ChangZGGY14, author = {Liwei Chang and Shihui Zheng and You Gao and Lize Gu and Yi{-}Xian Yang}, title = {A novel construction of optimal multi-sender authentication code from singular pseudo-symplectic geometry over finite fields}, journal = {Appl. Algebra Eng. Commun. Comput.}, volume = {25}, number = {6}, pages = {407--429}, year = {2014}, url = {https://doi.org/10.1007/s00200-014-0235-2}, doi = {10.1007/S00200-014-0235-2}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aaecc/ChangZGGY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amc/ZhouCY14, author = {Liqun Zhou and Xiubo Chen and Yixian Yang}, title = {Asymptotic stability of cellular neural networks with multiple proportional delays}, journal = {Appl. Math. Comput.}, volume = {229}, pages = {457--466}, year = {2014}, url = {https://doi.org/10.1016/j.amc.2013.12.061}, doi = {10.1016/J.AMC.2013.12.061}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/amc/ZhouCY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/apin/GuoZPZLY14, author = {Chun Guo and Yajian Zhou and Yuan Ping and Zhongkun Zhang and Guole Liu and Yixian Yang}, title = {A distance sum-based hybrid method for intrusion detection}, journal = {Appl. Intell.}, volume = {40}, number = {1}, pages = {178--188}, year = {2014}, url = {https://doi.org/10.1007/s10489-013-0452-6}, doi = {10.1007/S10489-013-0452-6}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/apin/GuoZPZLY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/ZhaoPLHY14, author = {Dawei Zhao and Haipeng Peng and Lixiang Li and SiLi Hui and Yixian Yang}, title = {Novel way to research nonlinear feedback shift register}, journal = {Sci. China Inf. Sci.}, volume = {57}, number = {9}, pages = {1--14}, year = {2014}, url = {https://doi.org/10.1007/s11432-013-5058-4}, doi = {10.1007/S11432-013-5058-4}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/ZhaoPLHY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/YangYCYL14, author = {Yu Yang and Xunrui Yin and Xiubo Chen and Yixian Yang and Zongpeng Li}, title = {A Note on the Multiple-Unicast Network Coding Conjecture}, journal = {{IEEE} Commun. Lett.}, volume = {18}, number = {5}, pages = {869--872}, year = {2014}, url = {https://doi.org/10.1109/LCOMM.2014.040214.140280}, doi = {10.1109/LCOMM.2014.040214.140280}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icl/YangYCYL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/GanWWPY14, author = {Yuanju Gan and Lihua Wang and Licheng Wang and Ping Pan and Yixian Yang}, title = {Efficient threshold public key encryption with full security based on dual pairing vector spaces}, journal = {Int. J. Commun. Syst.}, volume = {27}, number = {12}, pages = {4059--4077}, year = {2014}, url = {https://doi.org/10.1002/dac.2598}, doi = {10.1002/DAC.2598}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/GanWWPY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ChenSXSY14, author = {Xiu{-}Bo Chen and Yuan Su and Gang Xu and Ying Sun and Yixian Yang}, title = {Quantum state secure transmission in network communications}, journal = {Inf. Sci.}, volume = {276}, pages = {363--376}, year = {2014}, url = {https://doi.org/10.1016/j.ins.2013.12.034}, doi = {10.1016/J.INS.2013.12.034}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/ChenSXSY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LiWYNY14, author = {Jing Li and Licheng Wang and Jianhua Yan and Xinxin Niu and Yixian Yang}, title = {A (k, t, n) Verifiable Multi-secret Sharing Scheme Based on Adversary Structure}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {8}, number = {12}, pages = {4552--4567}, year = {2014}, url = {https://doi.org/10.3837/tiis.2014.12.018}, doi = {10.3837/TIIS.2014.12.018}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/LiWYNY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcn/YangZWLY14, author = {Chunli Yang and Shihui Zheng and Licheng Wang and Xiuhua Lu and Yixian Yang}, title = {Hierarchical identity-based broadcast encryption scheme from {LWE}}, journal = {J. Commun. Networks}, volume = {16}, number = {3}, pages = {258--263}, year = {2014}, url = {https://doi.org/10.1109/JCN.2014.000045}, doi = {10.1109/JCN.2014.000045}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcn/YangZWLY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmm2/YangYFHL14, author = {Yubo Yang and Yixian Yang and Wenqing Fan and Wei Huang and Zhong{-}Xian Li}, title = {Dynamic Obfuscation Algorithm based on Demand-Driven Symbolic Execution}, journal = {J. Multim.}, volume = {9}, number = {6}, pages = {843--850}, year = {2014}, url = {https://doi.org/10.4304/jmm.9.6.843-850}, doi = {10.4304/JMM.9.6.843-850}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmm2/YangYFHL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/XuYXZ14, author = {Yi Xu and Yixian Yang and Yang Xin and Hongliang Zhu}, title = {An Improved Directed Diffusion Protocol based on Opportunistic Routing}, journal = {J. Networks}, volume = {9}, number = {5}, pages = {1163--1168}, year = {2014}, url = {https://doi.org/10.4304/jnw.9.5.1163-1168}, doi = {10.4304/JNW.9.5.1163-1168}, timestamp = {Mon, 06 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/XuYXZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/FengXZY14, author = {Chao Feng and Yang Xin and Hongliang Zhu and Yixian Yang}, title = {A Weakly Homomorphic Encryption with {LDN}}, journal = {J. Networks}, volume = {9}, number = {6}, pages = {1464--1470}, year = {2014}, url = {https://doi.org/10.4304/jnw.9.6.1464-1470}, doi = {10.4304/JNW.9.6.1464-1470}, timestamp = {Mon, 06 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/FengXZY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nn/WangLPXY14, author = {Weiping Wang and Lixiang Li and Haipeng Peng and Jinghua Xiao and Yixian Yang}, title = {Synchronization control of memristor-based recurrent neural networks with perturbations}, journal = {Neural Networks}, volume = {53}, pages = {8--14}, year = {2014}, url = {https://doi.org/10.1016/j.neunet.2014.01.010}, doi = {10.1016/J.NEUNET.2014.01.010}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nn/WangLPXY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qic/ChenXSY14, author = {Xiu{-}Bo Chen and Gang Xu and Yuan Su and Yixian Yang}, title = {Robust variations of secret sharing through noisy quantum channel}, journal = {Quantum Inf. Comput.}, volume = {14}, number = {7-8}, pages = {589--607}, year = {2014}, url = {https://doi.org/10.26421/QIC14.7-8-4}, doi = {10.26421/QIC14.7-8-4}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qic/ChenXSY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/XuWY14, author = {Gang Xu and Cong Wang and Yixian Yang}, title = {Hierarchical quantum information splitting of an arbitrary two-qubit state via the cluster state}, journal = {Quantum Inf. Process.}, volume = {13}, number = {1}, pages = {43--57}, year = {2014}, url = {https://doi.org/10.1007/s11128-013-0670-1}, doi = {10.1007/S11128-013-0670-1}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/XuWY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/ChenDXWY14, author = {Xiubo Chen and Zhao Dou and Gang Xu and Cong Wang and Yixian Yang}, title = {A class of protocols for quantum private comparison based on the symmetry of states}, journal = {Quantum Inf. Process.}, volume = {13}, number = {1}, pages = {85--100}, year = {2014}, url = {https://doi.org/10.1007/s11128-013-0669-7}, doi = {10.1007/S11128-013-0669-7}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/ChenDXWY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/ChenSNY14, author = {Xiubo Chen and Yuan Su and Xinxin Niu and Yixian Yang}, title = {Efficient and feasible quantum private comparison of equality against the collective amplitude damping noise}, journal = {Quantum Inf. Process.}, volume = {13}, number = {1}, pages = {101--112}, year = {2014}, url = {https://doi.org/10.1007/s11128-012-0505-5}, doi = {10.1007/S11128-012-0505-5}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/ChenSNY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/WangCY14, author = {Mingming Wang and Xiu{-}Bo Chen and Yixian Yang}, title = {Quantum secret sharing for general access structures based on multiparticle entanglements}, journal = {Quantum Inf. Process.}, volume = {13}, number = {2}, pages = {429--443}, year = {2014}, url = {https://doi.org/10.1007/s11128-013-0660-3}, doi = {10.1007/S11128-013-0660-3}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/WangCY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/MaLCY14, author = {Song{-}Ya Ma and Mingxing Luo and Xiu{-}Bo Chen and Yixian Yang}, title = {Schemes for remotely preparing an arbitrary four-qubit {\(\chi\)}-state}, journal = {Quantum Inf. Process.}, volume = {13}, number = {9}, pages = {1951--1965}, year = {2014}, url = {https://doi.org/10.1007/s11128-014-0788-9}, doi = {10.1007/S11128-014-0788-9}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/MaLCY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/KangCY14, author = {Shuang{-}Yong Kang and Xiu{-}Bo Chen and Yixian Yang}, title = {Multi-party quantum state sharing of an arbitrary multi-qubit state via {\(\chi\)}-type entangled states}, journal = {Quantum Inf. Process.}, volume = {13}, number = {9}, pages = {2081--2098}, year = {2014}, url = {https://doi.org/10.1007/s11128-014-0800-4}, doi = {10.1007/S11128-014-0800-4}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/KangCY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/ZhaoPLY14, author = {Dawei Zhao and Haipeng Peng and Lixiang Li and Yixian Yang}, title = {A Secure and Effective Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks}, journal = {Wirel. Pers. Commun.}, volume = {78}, number = {1}, pages = {247--269}, year = {2014}, url = {https://doi.org/10.1007/s11277-014-1750-y}, doi = {10.1007/S11277-014-1750-Y}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/ZhaoPLY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/GanWWPY13, author = {Yuanju Gan and Lihua Wang and Licheng Wang and Ping Pan and Yixian Yang}, title = {Efficient Construction of CCA-Secure Threshold {PKE} Based on Hashed Diffie-Hellman Assumption}, journal = {Comput. J.}, volume = {56}, number = {10}, pages = {1249--1257}, year = {2013}, url = {https://doi.org/10.1093/comjnl/bxs167}, doi = {10.1093/COMJNL/BXS167}, timestamp = {Thu, 16 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/GanWWPY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cnsns/MaLWYX13, author = {Hongjing Ma and Weiqing Liu and Ye Wu and Yixian Yang and Jinghua Xiao}, title = {Effect of spatial distribution on the synchronization in rings of coupled oscillators}, journal = {Commun. Nonlinear Sci. Numer. Simul.}, volume = {18}, number = {10}, pages = {2769--2774}, year = {2013}, url = {https://doi.org/10.1016/j.cnsns.2013.02.014}, doi = {10.1016/J.CNSNS.2013.02.014}, timestamp = {Thu, 05 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cnsns/MaLWYX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cssp/TangMZY13, author = {Yinggan Tang and Weiwei Mu and Xiumei Zhang and Yixian Yang}, title = {Modified Fuzzy Linear Discriminant Analysis for Threshold Selection}, journal = {Circuits Syst. Signal Process.}, volume = {32}, number = {2}, pages = {711--726}, year = {2013}, url = {https://doi.org/10.1007/s00034-012-9476-0}, doi = {10.1007/S00034-012-9476-0}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cssp/TangMZY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/PanWYGWX13, author = {Ping Pan and Licheng Wang and Yixian Yang and Yuanju Gan and Lihua Wang and Chengqian Xu}, title = {Chameleon Hash Functions and One-Time Signature Schemes from Inner Automorphism Groups}, journal = {Fundam. Informaticae}, volume = {126}, number = {1}, pages = {103--119}, year = {2013}, url = {https://doi.org/10.3233/FI-2013-873}, doi = {10.3233/FI-2013-873}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/PanWYGWX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/GanWWPY13, author = {Yuanju Gan and Lihua Wang and Licheng Wang and Ping Pan and Yixian Yang}, title = {Publicly Verifiable Secret Sharing Scheme with Provable Security against Chosen Secret Attacks}, journal = {Int. J. Distributed Sens. Networks}, volume = {9}, year = {2013}, url = {https://doi.org/10.1155/2013/902462}, doi = {10.1155/2013/902462}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/GanWWPY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/SunSLGZY13, author = {Yanbin Sun and Yan Sun and Mingxing Luo and Lize Gu and Shihui Zheng and Yixian Yang}, title = {Comment on Lee et al.'s group signature and e-auction scheme}, journal = {Inf. Syst. Frontiers}, volume = {15}, number = {1}, pages = {133--139}, year = {2013}, url = {https://doi.org/10.1007/s10796-011-9312-2}, doi = {10.1007/S10796-011-9312-2}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/SunSLGZY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/CaoZZY13, author = {Chenlei Cao and Ru Zhang and Mengyi Zhang and Yixian Yang}, title = {IBC-Based Entity Authentication Protocols for Federated Cloud Systems}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {7}, number = {5}, pages = {1291--1312}, year = {2013}, url = {https://doi.org/10.3837/tiis.2013.05.020}, doi = {10.3837/TIIS.2013.05.020}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/CaoZZY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcp/HuangMFNY13, author = {Qinlong Huang and Zhaofeng Ma and Jingyi Fu and Xinxin Niu and Yixian Yang}, title = {Attribute Based {DRM} Scheme with Efficient Revocation in Cloud Computing}, journal = {J. Comput.}, volume = {8}, number = {11}, pages = {2776--2781}, year = {2013}, url = {http://www.jcomputers.us/index.php?m=content\&\#38;c=index\&\#38;a=show\&\#38;catid=115\&\#38;id=1600}, doi = {10.4304/JCP.8.11.2776-2781}, timestamp = {Thu, 25 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcp/HuangMFNY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmm2/DingZYZ13, author = {Hai{-}yang Ding and Yajian Zhou and Yixian Yang and Ru Zhang}, title = {Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation}, journal = {J. Multim.}, volume = {8}, number = {2}, pages = {161--167}, year = {2013}, url = {https://doi.org/10.4304/jmm.8.2.161-167}, doi = {10.4304/JMM.8.2.161-167}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmm2/DingZYZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/GanWYY13, author = {Yuanju Gan and Licheng Wang and Jianhua Yan and Yixian Yang}, title = {{CCA} Secure Threshold {KEM} Scheme Against Adaptive Corruption Attacks in Standard Model}, journal = {J. Softw.}, volume = {8}, number = {5}, pages = {1245--1253}, year = {2013}, url = {https://doi.org/10.4304/jsw.8.5.1245-1253}, doi = {10.4304/JSW.8.5.1245-1253}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/GanWYY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/MaHYN13, author = {Zhaofeng Ma and Jianqing Huang and Yixian Yang and Xinxin Niu}, title = {Verifiable Threshold Authorization for Scalable and Secure Digital Rights Management}, journal = {J. Softw.}, volume = {8}, number = {6}, pages = {1526--1535}, year = {2013}, url = {https://doi.org/10.4304/jsw.8.6.1526-1535}, doi = {10.4304/JSW.8.6.1526-1535}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/MaHYN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/LuoDCY13, author = {Mingxing Luo and Yun Deng and Xiu{-}Bo Chen and Yixian Yang}, title = {The faithful remote preparation of general quantum states}, journal = {Quantum Inf. Process.}, volume = {12}, number = {1}, pages = {279--294}, year = {2013}, url = {https://doi.org/10.1007/s11128-012-0374-y}, doi = {10.1007/S11128-012-0374-Y}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/LuoDCY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/LuoZZLSY13, author = {Yi Luo and Zhiwen Zhao and Zhangji Zhao and Haiming Long and Wen Su and Yixian Yang}, title = {The loophole of the improved secure quantum sealed-bid auction with post-confirmation and solution}, journal = {Quantum Inf. Process.}, volume = {12}, number = {1}, pages = {295--302}, year = {2013}, url = {https://doi.org/10.1007/s11128-012-0372-0}, doi = {10.1007/S11128-012-0372-0}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/LuoZZLSY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/ChenNZY13, author = {Xiu{-}Bo Chen and Xinxin Niu and Xinjie Zhou and Yixian Yang}, title = {Multi-party quantum secret sharing with the single-particle quantum state to encode the information}, journal = {Quantum Inf. Process.}, volume = {12}, number = {1}, pages = {365--380}, year = {2013}, url = {https://doi.org/10.1007/s11128-012-0379-6}, doi = {10.1007/S11128-012-0379-6}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/ChenNZY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/WangCY13, author = {Mingming Wang and Xiu{-}Bo Chen and Yixian Yang}, title = {Comment on "High-dimensional deterministic multiparty quantum secret sharing without unitary operations"}, journal = {Quantum Inf. Process.}, volume = {12}, number = {2}, pages = {785--792}, year = {2013}, url = {https://doi.org/10.1007/s11128-012-0417-4}, doi = {10.1007/S11128-012-0417-4}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/WangCY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/LuoDCYL13, author = {Mingxing Luo and Yun Deng and Xiu{-}Bo Chen and Yi{-}Xian Yang and Hongheng Li}, title = {Faithful quantum broadcast beyond the no-go theorem}, journal = {Quantum Inf. Process.}, volume = {12}, number = {5}, pages = {1969--1979}, year = {2013}, url = {https://doi.org/10.1007/s11128-012-0486-4}, doi = {10.1007/S11128-012-0486-4}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/LuoDCYL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/SunXCNY13, author = {Ying Sun and Shengwei Xu and Xiu{-}Bo Chen and Xinxin Niu and Yi{-}Xian Yang}, title = {Expansible quantum secret sharing network}, journal = {Quantum Inf. Process.}, volume = {12}, number = {8}, pages = {2877--2888}, year = {2013}, url = {https://doi.org/10.1007/s11128-013-0570-4}, doi = {10.1007/S11128-013-0570-4}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/SunXCNY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/LuoDCY13a, author = {Mingxing Luo and Yun Deng and Xiu{-}Bo Chen and Yi{-}Xian Yang}, title = {The rational approximations of the unitary groups}, journal = {Quantum Inf. Process.}, volume = {12}, number = {10}, pages = {3149--3166}, year = {2013}, url = {https://doi.org/10.1007/s11128-013-0588-7}, doi = {10.1007/S11128-013-0588-7}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/LuoDCY13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/GuWODCY13, author = {Lize Gu and Licheng Wang and Kaoru Ota and Mianxiong Dong and Zhenfu Cao and Yixian Yang}, title = {New public key cryptosystems based on non-Abelian factorization problems}, journal = {Secur. Commun. Networks}, volume = {6}, number = {7}, pages = {912--922}, year = {2013}, url = {https://doi.org/10.1002/sec.710}, doi = {10.1002/SEC.710}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/GuWODCY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sose/ZhuLYZX13, author = {Chunge Zhu and Xinran Liu and Yixian Yang and Hong Zhang and Qianhua Xu}, title = {An Application-Oriented Scheduling Optimization Algorithm for Internet-Based Virtual Computing Environment}, booktitle = {Seventh {IEEE} International Symposium on Service-Oriented System Engineering, {SOSE} 2013, San Francisco, CA, USA, March 25-28, 2013}, pages = {347--352}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SOSE.2013.49}, doi = {10.1109/SOSE.2013.49}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sose/ZhuLYZX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1305-6350, author = {Dawei Zhao and Haipeng Peng and Shudong Li and Yixian Yang}, title = {An efficient dynamic {ID} based remote user authentication scheme using self-certified public keys for multi-server environment}, journal = {CoRR}, volume = {abs/1305.6350}, year = {2013}, url = {http://arxiv.org/abs/1305.6350}, eprinttype = {arXiv}, eprint = {1305.6350}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1305-6350.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ZhaoPLY13, author = {Dawei Zhao and Haipeng Peng and Lixiang Li and Yixian Yang}, title = {A secure and effective anonymous authentication scheme for roaming service in global mobility networks}, journal = {CoRR}, volume = {abs/1306.4726}, year = {2013}, url = {http://arxiv.org/abs/1306.4726}, eprinttype = {arXiv}, eprint = {1306.4726}, timestamp = {Sat, 13 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ZhaoPLY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ZhaoLPLY13, author = {Dawei Zhao and Lixiang Li and Haipeng Peng and Qun Luo and Yixian Yang}, title = {Multiple Vectors Propagation of Epidemics in Complex Networks}, journal = {CoRR}, volume = {abs/1307.1834}, year = {2013}, url = {http://arxiv.org/abs/1307.1834}, eprinttype = {arXiv}, eprint = {1307.1834}, timestamp = {Sat, 13 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ZhaoLPLY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ZhaoLPLY13a, author = {Dawei Zhao and Lixiang Li and Haipeng Peng and Qun Luo and Yixian Yang}, title = {Multiple routes transmitted epidemics on multiplex networks}, journal = {CoRR}, volume = {abs/1312.6931}, year = {2013}, url = {http://arxiv.org/abs/1312.6931}, eprinttype = {arXiv}, eprint = {1312.6931}, timestamp = {Sat, 13 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ZhaoLPLY13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/asc/WanWLY12, author = {Miao Wan and Cong Wang and Lixiang Li and Yixian Yang}, title = {Chaotic ant swarm approach for data clustering}, journal = {Appl. Soft Comput.}, volume = {12}, number = {8}, pages = {2387--2393}, year = {2012}, url = {https://doi.org/10.1016/j.asoc.2012.03.037}, doi = {10.1016/J.ASOC.2012.03.037}, timestamp = {Sat, 13 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/asc/WanWLY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cai/PingZY12, author = {Yuan Ping and Yajian Zhou and Yixian Yang}, title = {A Novel Scheme for Accelerating Support Vector Clustering}, journal = {Comput. Informatics}, volume = {31}, number = {3}, pages = {613}, year = {2012}, url = {http://www.cai.sk/ojs/index.php/cai/article/view/1011}, timestamp = {Mon, 14 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cai/PingZY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cma/ZhaoPWY12, author = {Dawei Zhao and Haipeng Peng and Cong Wang and Yixian Yang}, title = {A secret sharing scheme with a short share realizing the (t, n) threshold and the adversary structure}, journal = {Comput. Math. Appl.}, volume = {64}, number = {4}, pages = {611--615}, year = {2012}, url = {https://doi.org/10.1016/j.camwa.2011.12.067}, doi = {10.1016/J.CAMWA.2011.12.067}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cma/ZhaoPWY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/XiaoYYWLY12, author = {Da Xiao and Yan Yang and Wenbin Yao and Chunhua Wu and Jianyi Liu and Yixian Yang}, title = {Multiple-File Remote Data Checking for cloud storage}, journal = {Comput. Secur.}, volume = {31}, number = {2}, pages = {192--205}, year = {2012}, url = {https://doi.org/10.1016/j.cose.2011.12.005}, doi = {10.1016/J.COSE.2011.12.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/XiaoYYWLY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/TangCHLY12, author = {Yinggan Tang and Mingyong Cui and Changchun Hua and Lixiang Li and Yixian Yang}, title = {Optimum design of fractional order PI\({}^{\mbox{{\(\lambda\)}}}\)D\({}^{\mbox{{\(\mu\)}}}\) controller for {AVR} system using chaotic ant swarm}, journal = {Expert Syst. Appl.}, volume = {39}, number = {8}, pages = {6887--6896}, year = {2012}, url = {https://doi.org/10.1016/j.eswa.2012.01.007}, doi = {10.1016/J.ESWA.2012.01.007}, timestamp = {Sat, 13 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/TangCHLY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcisys/YangR12, author = {Yixian Yang and Fuji Ren}, title = {Foreword: Computational Intelligence for Network Control and Security}, journal = {Int. J. Comput. Intell. Syst.}, volume = {5}, number = {5}, pages = {805--807}, year = {2012}, url = {https://doi.org/10.1080/18756891.2012.733201}, doi = {10.1080/18756891.2012.733201}, timestamp = {Tue, 16 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcisys/YangR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/WangWZYH12, author = {Zhiwei Wang and Licheng Wang and Shihui Zheng and Yixian Yang and Zhengming Hu}, title = {Provably Secure and Efficient Identity-based Signature Scheme Based on Cubic Residues}, journal = {Int. J. Netw. Secur.}, volume = {14}, number = {1}, pages = {33--38}, year = {2012}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v14-n1/ijns-2012-v14-n1-p33-38.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/WangWZYH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/LaiXLY12, author = {Hong Lai and Jinghua Xiao and Lixiang Li and Yixian Yang}, title = {Recursive hiding of biometrics-based secret sharing scheme using adversary structure}, journal = {Inf. Process. Lett.}, volume = {112}, number = {17-18}, pages = {683--687}, year = {2012}, url = {https://doi.org/10.1016/j.ipl.2012.06.006}, doi = {10.1016/J.IPL.2012.06.006}, timestamp = {Sat, 13 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/LaiXLY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcm/JiaLYLY12, author = {Zhongtian Jia and Lixiang Li and Zhuoran Yu and Shudong Li and Yixian Yang}, title = {A Secure Message Transaction Protocol for Delay Tolerant Networks}, journal = {J. Commun.}, volume = {7}, number = {8}, pages = {622--633}, year = {2012}, url = {https://doi.org/10.4304/jcm.7.8.622-633}, doi = {10.4304/JCM.7.8.622-633}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcm/JiaLYLY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/PingTZY12, author = {Yuan Ping and Yingjie Tian and Yajian Zhou and Yixian Yang}, title = {Convex Decomposition Based Cluster Labeling Method for Support Vector Clustering}, journal = {J. Comput. Sci. Technol.}, volume = {27}, number = {2}, pages = {428--442}, year = {2012}, url = {https://doi.org/10.1007/s11390-012-1232-1}, doi = {10.1007/S11390-012-1232-1}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcst/PingTZY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jiis/WanLXWY12, author = {Miao Wan and Lixiang Li and Jinghua Xiao and Cong Wang and Yixian Yang}, title = {Data clustering using bacterial foraging optimization}, journal = {J. Intell. Inf. Syst.}, volume = {38}, number = {2}, pages = {321--341}, year = {2012}, url = {https://doi.org/10.1007/s10844-011-0158-3}, doi = {10.1007/S10844-011-0158-3}, timestamp = {Sat, 13 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jiis/WanLXWY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/JiaLTLY12, author = {Zhongtian Jia and Xiaodong Lin and Seng{-}Hua Tan and Lixiang Li and Yixian Yang}, title = {Public key distribution scheme for delay tolerant networks based on two-channel cryptography}, journal = {J. Netw. Comput. Appl.}, volume = {35}, number = {3}, pages = {905--913}, year = {2012}, url = {https://doi.org/10.1016/j.jnca.2011.03.009}, doi = {10.1016/J.JNCA.2011.03.009}, timestamp = {Thu, 23 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/JiaLTLY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/YangW12a, author = {Yixian Yang and Xiaojun Wang}, title = {Guest Editorial}, journal = {J. Networks}, volume = {7}, number = {8}, pages = {1147--1149}, year = {2012}, url = {https://doi.org/10.4304/jnw.7.8.1147-1149}, doi = {10.4304/JNW.7.8.1147-1149}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/YangW12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/FuZLZY12, author = {Rongrong Fu and Kangfeng Zheng and Tianliang Lu and Dongmei Zhang and Yixian Yang}, title = {Biologically Inspired Anomaly Detection for Hierarchical Wireless Sensor Networks}, journal = {J. Networks}, volume = {7}, number = {8}, pages = {1214--1219}, year = {2012}, url = {https://doi.org/10.4304/jnw.7.8.1214-1219}, doi = {10.4304/JNW.7.8.1214-1219}, timestamp = {Fri, 24 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/FuZLZY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/LuoCYN12, author = {Mingxing Luo and Xiu{-}Bo Chen and Yi{-}Xian Yang and Xinxin Niu}, title = {Experimental architecture of joint remote state preparation}, journal = {Quantum Inf. Process.}, volume = {11}, number = {3}, pages = {751--767}, year = {2012}, url = {https://doi.org/10.1007/s11128-011-0283-5}, doi = {10.1007/S11128-011-0283-5}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/LuoCYN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/ChenMSZY12, author = {Xiu{-}Bo Chen and Song{-}Ya Ma and Yuan Su and Ru Zhang and Yi{-}Xian Yang}, title = {Controlled remote state preparation of arbitrary two and three qubit states via the Brown state}, journal = {Quantum Inf. Process.}, volume = {11}, number = {6}, pages = {1653--1667}, year = {2012}, url = {https://doi.org/10.1007/s11128-011-0326-y}, doi = {10.1007/S11128-011-0326-Y}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/ChenMSZY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/WangCLY12, author = {Mingming Wang and Xiu{-}Bo Chen and Shoushan Luo and Yi{-}Xian Yang}, title = {Efficient entanglement channel construction schemes for a theoretical quantum network model with \emph{d}-level system}, journal = {Quantum Inf. Process.}, volume = {11}, number = {6}, pages = {1715--1739}, year = {2012}, url = {https://doi.org/10.1007/s11128-011-0325-z}, doi = {10.1007/S11128-011-0325-Z}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/WangCLY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/JiaLPYG12, author = {Zhongtian Jia and Shudong Li and Haipeng Peng and Yixian Yang and Shize Guo}, title = {Modelling security message propagation in delay tolerant networks}, journal = {Secur. Commun. Networks}, volume = {5}, number = {1}, pages = {51--58}, year = {2012}, url = {https://doi.org/10.1002/sec.309}, doi = {10.1002/SEC.309}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/JiaLPYG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/PanWWLY12, author = {Ping Pan and Lihua Wang and Licheng Wang and Lixiang Li and Yixian Yang}, title = {{CSP-DHIES:} a new public-key encryption scheme from matrix conjugation}, journal = {Secur. Commun. Networks}, volume = {5}, number = {7}, pages = {809--822}, year = {2012}, url = {https://doi.org/10.1002/sec.376}, doi = {10.1002/SEC.376}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/PanWWLY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/WangTQYX12, author = {Baocheng Wang and Chunming Tang and Yanfeng Qi and Yixian Yang and Maozhi Xu}, title = {The Weight Distributions of Cyclic Codes and Elliptic Curves}, journal = {{IEEE} Trans. Inf. Theory}, volume = {58}, number = {12}, pages = {7253--7259}, year = {2012}, url = {https://doi.org/10.1109/TIT.2012.2210386}, doi = {10.1109/TIT.2012.2210386}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/WangTQYX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccis/ZhuLYZX12, author = {Chunge Zhu and Xinran Liu and Yixian Yang and Hong Zhang and Qianhua Xu}, title = {A trust mechanism in Internet-Based Virtual Computing Environment}, booktitle = {2nd {IEEE} International Conference on Cloud Computing and Intelligence Systems, {CCIS} 2012, Hangzhou, China, October 30 - November 1, 2012}, pages = {449--453}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CCIS.2012.6664446}, doi = {10.1109/CCIS.2012.6664446}, timestamp = {Sun, 08 Aug 2021 01:40:48 +0200}, biburl = {https://dblp.org/rec/conf/ccis/ZhuLYZX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccchina/JiaRLLY12, author = {Zhongtian Jia and Muhammad Ali Raffay and Lixiang Li and Xiaodong Lin and Yixian Yang}, title = {A secure message delivery scheme with path tracking for delay tolerant networks}, booktitle = {2012 1st {IEEE} International Conference on Communications in China (ICCC), Beijing, China, August 15-17, 2012}, pages = {161--166}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ICCChina.2012.6356871}, doi = {10.1109/ICCCHINA.2012.6356871}, timestamp = {Thu, 23 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccchina/JiaRLLY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1202-3514, author = {Baocheng Wang and Chunming Tang and Yanfeng Qi and Yixian Yang and Maozhi Xu}, title = {A Note on Weight Distributions of Irreducible Cyclic Codes}, journal = {CoRR}, volume = {abs/1202.3514}, year = {2012}, url = {http://arxiv.org/abs/1202.3514}, eprinttype = {arXiv}, eprint = {1202.3514}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1202-3514.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/MaoZNYZ11, author = {Jiafa Mao and Ru Zhang and Xinxin Niu and Yixian Yang and Linna Zhou}, title = {Research of Spatial Domain Image Digital Watermarking Payload}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2011}, year = {2011}, url = {https://doi.org/10.1155/2011/502748}, doi = {10.1155/2011/502748}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/MaoZNYZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijbc/GeWLLY11, author = {Fangzhen Ge and Zhen Wei and Yang Lu and Lixiang Li and Yixian Yang}, title = {Disturbance Chaotic Ant Swarm}, journal = {Int. J. Bifurc. Chaos}, volume = {21}, number = {9}, pages = {2597--2622}, year = {2011}, url = {https://doi.org/10.1142/S0218127411029963}, doi = {10.1142/S0218127411029963}, timestamp = {Tue, 24 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijbc/GeWLLY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/WangWPZY11, author = {Licheng Wang and Lihua Wang and Yun Pan and Zonghua Zhang and Yixian Yang}, title = {Discrete logarithm based additively homomorphic encryption and secure data aggregation}, journal = {Inf. Sci.}, volume = {181}, number = {16}, pages = {3308--3322}, year = {2011}, url = {https://doi.org/10.1016/j.ins.2011.04.002}, doi = {10.1016/J.INS.2011.04.002}, timestamp = {Thu, 16 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/WangWPZY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kais/WanJWLY11, author = {Miao Wan and Arne J{\"{o}}nsson and Cong Wang and Lixiang Li and Yixian Yang}, title = {Web user clustering and Web prefetching using Random Indexing with weight functions}, journal = {Knowl. Inf. Syst.}, volume = {33}, number = {1}, pages = {89--115}, year = {2011}, url = {https://doi.org/10.1007/s10115-011-0453-x}, doi = {10.1007/S10115-011-0453-X}, timestamp = {Sat, 13 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/kais/WanJWLY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/ChangTXYLCY11, author = {Xiangmao Chang and Rui Tan and Guoliang Xing and Zhaohui Yuan and Chenyang Lu and Yixin Chen and Yixian Yang}, title = {Sensor Placement Algorithms for Fusion-Based Surveillance Networks}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {22}, number = {8}, pages = {1407--1414}, year = {2011}, url = {https://doi.org/10.1109/TPDS.2011.115}, doi = {10.1109/TPDS.2011.115}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tpds/ChangTXYLCY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icica/GengLXDY11, author = {Tao Geng and Shoushan Luo and Yang Xin and Xiaofeng Du and Yixian Yang}, editor = {Baoxiang Liu and Chunlai Chai}, title = {Research on Secure Multi-party Computational Geometry}, booktitle = {Information Computing and Applications - Second International Conference, {ICICA} 2011, Qinhuangdao, China, October 28-31, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7030}, pages = {322--329}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25255-6\_41}, doi = {10.1007/978-3-642-25255-6\_41}, timestamp = {Mon, 06 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icica/GengLXDY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pakdd/WanJWLY11, author = {Miao Wan and Arne J{\"{o}}nsson and Cong Wang and Lixiang Li and Yixian Yang}, editor = {Longbing Cao and Joshua Zhexue Huang and James Bailey and Yun Sing Koh and Jun Luo}, title = {A Random Indexing Approach for Web User Clustering and Web Prefetching}, booktitle = {New Frontiers in Applied Data Mining - {PAKDD} 2011 International Workshops, Shenzhen, China, May 24-27, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7104}, pages = {40--52}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-28320-8\_4}, doi = {10.1007/978-3-642-28320-8\_4}, timestamp = {Sat, 13 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pakdd/WanJWLY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1109-0628, author = {Baocheng Wang and Chunming Tang and Yanfeng Qi and Yixian Yang and Maozhi Xu}, title = {The Weight Distributions of Cyclic Codes and Elliptic Curves}, journal = {CoRR}, volume = {abs/1109.0628}, year = {2011}, url = {http://arxiv.org/abs/1109.0628}, eprinttype = {arXiv}, eprint = {1109.0628}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1109-0628.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1112-0062, author = {Baocheng Wang and Chunming Tang and Yanfeng Qi and Yixian Yang and Maozhi Xu}, title = {A new class of hyper-bent Boolean functions in binomial forms}, journal = {CoRR}, volume = {abs/1112.0062}, year = {2011}, url = {http://arxiv.org/abs/1112.0062}, eprinttype = {arXiv}, eprint = {1112.0062}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1112-0062.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangTQYX11, author = {Baocheng Wang and Chunming Tang and Yanfeng Qi and Yixian Yang and Maozhi Xu}, title = {A New Class of Hyper-bent Boolean Functions with Multiple Trace Terms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {600}, year = {2011}, url = {http://eprint.iacr.org/2011/600}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/WangTQYX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangTQY11, author = {Baocheng Wang and Chunming Tang and Yanfeng Qi and Yixian Yang}, title = {A generalization of the class of hyper-bent Boolean functions in binomial forms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {698}, year = {2011}, url = {http://eprint.iacr.org/2011/698}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/WangTQY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/ZhengWY10, author = {Shihui Zheng and Licheng Wang and Yixian Yang}, title = {A new impossible differential attack on {SAFER} ciphers}, journal = {Comput. Electr. Eng.}, volume = {36}, number = {1}, pages = {180--189}, year = {2010}, url = {https://doi.org/10.1016/j.compeleceng.2009.08.004}, doi = {10.1016/J.COMPELECENG.2009.08.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/ZhengWY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/WangWCYN10, author = {Licheng Wang and Lihua Wang and Zhenfu Cao and Yixian Yang and Xinxin Niu}, title = {Conjugate adjoining problem in braid groups and new design of braid-based signatures}, journal = {Sci. China Inf. Sci.}, volume = {53}, number = {3}, pages = {524--536}, year = {2010}, url = {https://doi.org/10.1007/s11432-010-0046-4}, doi = {10.1007/S11432-010-0046-4}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/WangWCYN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/LuoYWN10, author = {Mingxing Luo and Yixian Yang and Licheng Wang and Xinxin Niu}, title = {Secure network coding in the presence of eavesdroppers}, journal = {Sci. China Inf. Sci.}, volume = {53}, number = {3}, pages = {648--658}, year = {2010}, url = {https://doi.org/10.1007/s11432-010-0052-6}, doi = {10.1007/S11432-010-0052-6}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/LuoYWN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejwcn/GuoLLY10, author = {Qin Guo and Mingxing Luo and Lixiang Li and Yixian Yang}, title = {Secure Network Coding against Wiretapping and Byzantine Attacks}, journal = {{EURASIP} J. Wirel. Commun. Netw.}, volume = {2010}, year = {2010}, url = {https://doi.org/10.1155/2010/216524}, doi = {10.1155/2010/216524}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejwcn/GuoLLY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/WangWYH10, author = {Zhiwei Wang and Licheng Wang and Yixian Yang and Zhengming Hu}, title = {Comment on Wu et al.'s Server-aided Verification Signature Schemes}, journal = {Int. J. Netw. Secur.}, volume = {10}, number = {2}, pages = {158--160}, year = {2010}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n2/ijns-2010-v10-n2-p158-160.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/WangWYH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcit/ZhaoZYSD10, author = {Mingfeng Zhao and Yajian Zhou and Yixian Yang and We Song and Yajun Du}, title = {A New Method to Detect Useless Service Failure Model in {SPN}}, journal = {J. Convergence Inf. Technol.}, volume = {5}, number = {3}, pages = {129--134}, year = {2010}, url = {http://www.aicit.org/jcit/ppl/may\_18.pdf}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcit/ZhaoZYSD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ZhangLY10, author = {Jianhong Zhang and Chenglian Liu and Yixian Yang}, title = {An efficient secure proxy verifiably encrypted signature scheme}, journal = {J. Netw. Comput. Appl.}, volume = {33}, number = {1}, pages = {29--34}, year = {2010}, url = {https://doi.org/10.1016/j.jnca.2009.07.003}, doi = {10.1016/J.JNCA.2009.07.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/ZhangLY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcit/ZhangYLP10, author = {Xiaohong Zhang and Yixian Yang and Lixiang Li and Haipeng Peng}, title = {An Extensible Hash Function Construction Based on Embedded Chaos Maps}, booktitle = {10th {IEEE} International Conference on Computer and Information Technology, {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010}, pages = {2407--2414}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CIT.2010.414}, doi = {10.1109/CIT.2010.414}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcit/ZhangYLP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/ChangWWLLY10, author = {Xiangmao Chang and Jin Wang and Jianping Wang and Victor C. S. Lee and Kejie Lu and Yixian Yang}, title = {On Achieving Maximum Secure Throughput Using Network Coding against Wiretap Attack}, booktitle = {2010 International Conference on Distributed Computing Systems, {ICDCS} 2010, Genova, Italy, June 21-25, 2010}, pages = {526--535}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ICDCS.2010.27}, doi = {10.1109/ICDCS.2010.27}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/ChangWWLLY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmlc/RenZLNY10, author = {Chuan{-}Lun Ren and Xiao{-}Hui Zuo and Zhong{-}Xian Li and Xinxin Niu and Yixian Yang}, title = {Towards Hierarchical-User {RBAC} model}, booktitle = {International Conference on Machine Learning and Cybernetics, {ICMLC} 2010, Qingdao, China, July 11-14, 2010, Proceedings}, pages = {2870--2874}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ICMLC.2010.5580774}, doi = {10.1109/ICMLC.2010.5580774}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icmlc/RenZLNY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mvhi/JianYZH10, author = {Jian Gao and Yixian Yang and Kangfeng Zheng and Zhengming Hu}, editor = {Honghua Tan}, title = {Research of an Innovative P2P-Based Botnet}, booktitle = {2010 International Conference on Machine Vision and Human-machine Interface, {MVHI} 2010, Kaifeng, China, April 24-25, 2010}, pages = {214--218}, publisher = {{IEEE} Computer Soceity}, year = {2010}, url = {https://doi.org/10.1109/MVHI.2010.135}, doi = {10.1109/MVHI.2010.135}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mvhi/JianYZH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnis/LiuGLY10, author = {Jin{-}ye Liu and Lize Gu and Shoushan Luo and Yixian Yang}, title = {An anonymous authentication scheme for mobile communication}, booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications, Networking and Information Security, {WCNIS} 2010, 25-27 June 2010, Beijing, China}, pages = {359--364}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WCINS.2010.5541800}, doi = {10.1109/WCINS.2010.5541800}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/wcnis/LiuGLY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnis/ZhangXYG10, author = {Jianwu Zhang and Guoai Xu and Yixian Yang and Shize Guo}, title = {A method for topology conformance tests under logical constraints}, booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications, Networking and Information Security, {WCNIS} 2010, 25-27 June 2010, Beijing, China}, pages = {386--390}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WCINS.2010.5541805}, doi = {10.1109/WCINS.2010.5541805}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wcnis/ZhangXYG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnis/GuoXNYL10, author = {Chengqing Guo and Guoai Xu and Xinxin Niu and Yixian Yang and Yang Li}, title = {A color image watermarking algorithm resistant to print-scan}, booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications, Networking and Information Security, {WCNIS} 2010, 25-27 June 2010, Beijing, China}, pages = {518--521}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WCINS.2010.5541833}, doi = {10.1109/WCINS.2010.5541833}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wcnis/GuoXNYL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/ZhangYN09, author = {Jianhong Zhang and Yixian Yang and Xinxin Niu}, title = {A Novel Identity-Based Multi-Signcryption Scheme}, journal = {Int. J. Distributed Sens. Networks}, volume = {5}, number = {1}, pages = {28}, year = {2009}, url = {https://doi.org/10.1080/15501320802520613}, doi = {10.1080/15501320802520613}, timestamp = {Mon, 14 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdsn/ZhangYN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/MaWGY09, author = {Xiao{-}Long Ma and Zhiwei Wang and Lize Gu and Yixian Yang}, title = {Remark on Yu et al.'s Online/Offline Signature Scheme in {CT-RSA} 2008}, booktitle = {Proceedings of the Fifth International Conference on Information Assurance and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009}, pages = {719--720}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/IAS.2009.318}, doi = {10.1109/IAS.2009.318}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/MaWGY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asian/ZhangCGY09, author = {Jianhong Zhang and Hua Chen and Shengnan Gao and Yixian Yang}, editor = {Anupam Datta}, title = {A Special Proxy Signature Scheme with Multi-warrant}, booktitle = {Advances in Computer Science - {ASIAN} 2009. Information Security and Privacy, 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5913}, pages = {147--157}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10622-4\_12}, doi = {10.1007/978-3-642-10622-4\_12}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/asian/ZhangCGY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csie/ChenLZNY09, author = {Ming Chen and Fan{-}fan Liu and Ru Zhang and Xinxin Niu and Yixian Yang}, editor = {Mark Burgin and Masud H. Chowdhury and Chan H. Ham and Simone A. Ludwig and Weilian Su and Sumanth Yenduri}, title = {Steganalysis of {LSB} Matching in Gray Images Based on Regional Correlation Analysis}, booktitle = {{CSIE} 2009, 2009 {WRI} World Congress on Computer Science and Information Engineering, March 31 - April 2, 2009, Los Angeles, California, USA, 7 Volumes}, pages = {490--494}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CSIE.2009.577}, doi = {10.1109/CSIE.2009.577}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csie/ChenLZNY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gcc/XiaoYWWY09, author = {Da Xiao and Wenbin Yao and Chunhua Wu and Cong Wang and Yixian Yang}, title = {{VAOFS:} {A} Verifiable Append-Only File System for Regulatory Compliance}, booktitle = {Eighth International Conference on Grid and Cooperative Computing, {GCC} 2009, Lanzhou, Gansu, China, August 27-29, 2009}, pages = {325--330}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/GCC.2009.52}, doi = {10.1109/GCC.2009.52}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gcc/XiaoYWWY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/WangWPZY09, author = {Licheng Wang and Lihua Wang and Yun Pan and Zonghua Zhang and Yixian Yang}, editor = {Sihan Qing and Chris J. Mitchell and Guilin Wang}, title = {Discrete-Log-Based Additively Homomorphic Encryption and Secure {WSN} Data Aggregation}, booktitle = {Information and Communications Security, 11th International Conference, {ICICS} 2009, Beijing, China, December 14-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5927}, pages = {493--502}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-11145-7\_39}, doi = {10.1007/978-3-642-11145-7\_39}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/WangWPZY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/QuFNYZ09, author = {Zhiguo Qu and Yu Fu and Xinxin Niu and Yixian Yang and Ru Zhang}, editor = {Jeng{-}Shyang Pan and Yen{-}Wei Chen and Lakhmi C. Jain}, title = {Improved {EMD} Steganography with Great Embedding Rate and High Embedding Efficiency}, booktitle = {Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing {(IIH-MSP} 2009), Kyoto, Japan, 12-14 September, 2009, Proceedings}, pages = {348--352}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/IIH-MSP.2009.290}, doi = {10.1109/IIH-MSP.2009.290}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/QuFNYZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isnn/ZhangYN09, author = {Jianhong Zhang and Yixian Yang and Xinxin Niu}, editor = {Wen Yu and Haibo He and Nian Zhang}, title = {Efficient Provable Secure ID-Based Directed Signature Scheme without Random Oracle}, booktitle = {Advances in Neural Networks - {ISNN} 2009, 6th International Symposium on Neural Networks, {ISNN} 2009, Wuhan, China, May 26-29, 2009, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {5553}, pages = {318--327}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01513-7\_34}, doi = {10.1007/978-3-642-01513-7\_34}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/isnn/ZhangYN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/ZhangYNGCG09, author = {Jianhong Zhang and Yixian Yang and Xinxin Niu and Shengnan Gao and Hua Chen and Qin Geng}, editor = {Jong Hyuk Park and Hsiao{-}Hwa Chen and Mohammed Atiquzzaman and Changhoon Lee and Tai{-}Hoon Kim and Sang{-}Soo Yeo}, title = {An Improved Secure Identity-Based On-Line/Off-Line Signature Scheme}, booktitle = {Advances in Information Security and Assurance, Third International Conference and Workshops, {ISA} 2009, Seoul, Korea, June 25-27, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5576}, pages = {588--597}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02617-1\_60}, doi = {10.1007/978-3-642-02617-1\_60}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/sersc-isa/ZhangYNGCG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssme/LongXY09, author = {Wen Long and Yang Xin and Yixian Yang}, title = {Vulnerabilities Analyzing Model for Alert Correlation in Distributed Environment}, booktitle = {2009 {IITA} International Conference on Services Science, Management and Engineering, {SSME} 2009, 11-12 July 2009, Zhangjiajie, China}, pages = {408--411}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/SSME.2009.132}, doi = {10.1109/SSME.2009.132}, timestamp = {Tue, 07 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ssme/LongXY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiWLY09, author = {Zhimin Li and Licheng Wang and Daofeng Li and Yixian Yang}, title = {Collision Attacks on NaSHA-384/512}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {26}, year = {2009}, url = {http://eprint.iacr.org/2009/026}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiWLY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/JiaQGY08, author = {Hong{-}Yong Jia and Sihan Qing and Lize Gu and Yixian Yang}, title = {Efficient Universally Composable Password-Based Key Exchange}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 2, Workshop Papers}, pages = {293--298}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.148}, doi = {10.1109/CIS.2008.148}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/JiaQGY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/MaCGYH08, author = {Xiao{-}Long Ma and Wei Cui and Lize Gu and Yixian Yang and Zhengming Hu}, title = {A Novel ID-Based Verifiably Encrypted Signature without Random Oracle}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 2, Workshop Papers}, pages = {359--363}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.168}, doi = {10.1109/CIS.2008.168}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/MaCGYH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiZY08, author = {Xin{-}lei Li and Kangfeng Zheng and Yixian Yang}, title = {A Simulation Platform of DDoS Attack Based on Network Processor}, booktitle = {2008 International Conference on Computational Intelligence and Security, {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference Papers}, pages = {421--426}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CIS.2008.190}, doi = {10.1109/CIS.2008.190}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiZY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csicc/YuZY08, author = {Yihua Yu and Shihui Zheng and Yixian Yang}, editor = {Hamid Sarbazi{-}Azad and Behrooz Parhami and Seyed Ghassem Miremadi and Shaahin Hessabi}, title = {ID-Based Blind Signature and Proxy Blind Signature without Trusted {PKG}}, booktitle = {Advances in Computer Science and Engineering - 13th International {CSI} Computer Conference, {CSICC} 2008, Kish Island, Iran, March 9-11, 2008 Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {6}, pages = {821--824}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89985-3\_111}, doi = {10.1007/978-3-540-89985-3\_111}, timestamp = {Thu, 23 Jun 2022 19:54:33 +0200}, biburl = {https://dblp.org/rec/conf/csicc/YuZY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cw/LiuZLLY08, author = {Yanfei Liu and Ziming Zhao and Hui Li and Qun Luo and Yixian Yang}, title = {An Efficient Remote User Authentication Scheme with Strong Anonymity}, booktitle = {International Conference on Cyberworlds 2008, Hangzhou, China, 22-24 September 2008, Proceedings}, pages = {180--185}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CW.2008.23}, doi = {10.1109/CW.2008.23}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cw/LiuZLLY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/WangNZYZ08, author = {Zhiwei Wang and Xuyun Nie and Shihui Zheng and Yixian Yang and Zhihui Zhang}, editor = {Osvaldo Gervasi and Beniamino Murgante and Antonio Lagan{\`{a}} and David Taniar and Youngsong Mun and Marina L. Gavrilova}, title = {A New Construction of Multivariate Public Key Encryption Scheme through Internally Perturbed Plus}, booktitle = {Computational Science and Its Applications - {ICCSA} 2008, International Conference, Perugia, Italy, June 30 - July 3, 2008, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {5073}, pages = {1--13}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-69848-7\_1}, doi = {10.1007/978-3-540-69848-7\_1}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/WangNZYZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icycs/ZhangGZY08, author = {Wei Zhang and Shize Guo and Kangfeng Zheng and Yixian Yang}, title = {A Defending Mechanism against DDoS Based on Registration and Authentication}, booktitle = {Proceedings of the 9th International Conference for Young Computer Scientists, {ICYCS} 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008}, pages = {2192--2197}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICYCS.2008.206}, doi = {10.1109/ICYCS.2008.206}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icycs/ZhangGZY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/YeFQNY08, author = {Tianyu Ye and Yu Fu and Zhiguo Qu and Xinxin Niu and Yixian Yang}, editor = {Jeng{-}Shyang Pan and Xiamu Niu and Hsiang{-}Cheh Huang and Lakhmi C. Jain}, title = {Multiplicative Watermark Detection Using Locally Optimum Nonlinearity}, booktitle = {4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing {(IIH-MSP} 2008), Harbin, China, 15-17 August 2008, Proceedings}, pages = {481--484}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IIH-MSP.2008.79}, doi = {10.1109/IIH-MSP.2008.79}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/YeFQNY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/FuYQNY08, author = {Yu Fu and Tianyu Ye and Zhiguo Qu and Xinxin Niu and Yixian Yang}, editor = {Jeng{-}Shyang Pan and Xiamu Niu and Hsiang{-}Cheh Huang and Lakhmi C. Jain}, title = {A Novel Relational Database Watermarking Algorithm for Joint Ownership}, booktitle = {4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing {(IIH-MSP} 2008), Harbin, China, 15-17 August 2008, Proceedings}, pages = {985--988}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IIH-MSP.2008.43}, doi = {10.1109/IIH-MSP.2008.43}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/FuYQNY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcnn/JiangZMWY08, author = {Nan Jiang and Zhaozhi Zhang and Xiaomin Ma and Jian Wang and Yixian Yang}, title = {Analysis of nonseparable property of multi-valued multi-threshold neuron}, booktitle = {Proceedings of the International Joint Conference on Neural Networks, {IJCNN} 2008, part of the {IEEE} World Congress on Computational Intelligence, {WCCI} 2008, Hong Kong, China, June 1-6, 2008}, pages = {413--419}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/IJCNN.2008.4633825}, doi = {10.1109/IJCNN.2008.4633825}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/ijcnn/JiangZMWY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isip/WangZYN08, author = {Jiao Wang and Yajian Zhou and Yixian Yang and Xinxin Niu}, editor = {Fei Yu and Qi Luo}, title = {Classify the Majority of the Total Bytes on the Internet}, booktitle = {International Symposium on Information Processing, {ISIP} 2008 / International Pacific Workshop on Web Mining, and Web-Based Application, {WMWA} 2008, Moscow, Russia, 23-25 May 2008}, pages = {68--72}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ISIP.2008.46}, doi = {10.1109/ISIP.2008.46}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isip/WangZYN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/paciia/LiY08a, author = {Jian Li and Yixian Yang}, title = {Design and Realization of a Large-Scale Distributed Intrusion Management System Module}, booktitle = {{PACIIA} 2008, Volume 2, 2008 {IEEE} Pacific-Asia Workshop on Computational Intelligence and Industrial Application, 19-20 December 2008, Wuhan, China}, pages = {537--540}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/PACIIA.2008.335}, doi = {10.1109/PACIIA.2008.335}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/paciia/LiY08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/MaYN07, author = {Zhaofeng Ma and Yixian Yang and Xinxin Niu}, title = {Secure and Flexible Digital Rights Management in a Pervasive Usage Mode}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2007, Harbin, Heilongjiang, China, December 15-19, 2007}, pages = {863--867}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/CIS.2007.210}, doi = {10.1109/CIS.2007.210}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/MaYN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsr/HuYN07, author = {Lanlan Hu and Yixian Yang and Xinxin Niu}, title = {Improved Remote User Authentication Scheme Preserving User Anonymity}, booktitle = {Fifth Annual Conference on Communication Networks and Services Research {(CNSR} 2007), 14-17 May 2006, Fredericton, New Brunswick, Canada}, pages = {323--328}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/CNSR.2007.38}, doi = {10.1109/CNSR.2007.38}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnsr/HuYN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iat/BinKY07, author = {Bin Wu and Kangfeng Zheng and Yixian Yang}, title = {A Data Safety Transmission Solution in Web Application}, booktitle = {Proceedings of the 2007 {IEEE/WIC/ACM} International Conference on Web Intelligence and International Conference on Intelligent Agent Technology - Workshops, 2-5 November 2007, Silicon Valley, CA, {USA}}, pages = {303--306}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/WIIATW.2007.4427594}, doi = {10.1109/WIIATW.2007.4427594}, timestamp = {Thu, 27 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iat/BinKY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iat/LiuYYX07, author = {Ming{-}hui Liu and Xin Yang and Yixian Yang and Xinxin Niu}, title = {Security Mechanism Research of {EMV2000}}, booktitle = {Proceedings of the 2007 {IEEE/WIC/ACM} International Conference on Web Intelligence and International Conference on Intelligent Agent Technology - Workshops, 2-5 November 2007, Silicon Valley, CA, {USA}}, pages = {307--310}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/WIIATW.2007.4427595}, doi = {10.1109/WIIATW.2007.4427595}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iat/LiuYYX07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iat/XuYGN07, author = {Guosheng Xu and Yixian Yang and Lize Gu and Xinxin Niu}, title = {ID-Based Multi-proxy Sequential Signature System from Bilinear Pairing}, booktitle = {Proceedings of the 2007 {IEEE/WIC/ACM} International Conference on Web Intelligence and International Conference on Intelligent Agent Technology - Workshops, 2-5 November 2007, Silicon Valley, CA, {USA}}, pages = {315--318}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/WIIATW.2007.4427597}, doi = {10.1109/WIIATW.2007.4427597}, timestamp = {Mon, 19 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iat/XuYGN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnc/WangYJZM07, author = {Jian Wang and Yixian Yang and Nan Jiang and Zhaozhi Zhang and Xiaomin Ma}, editor = {Jingsheng Lei and JingTao Yao and Qingfu Zhang}, title = {Using Three Layer Neural Networks to Compute Discrete Real Functions}, booktitle = {Third International Conference on Natural Computation, {ICNC} 2007, Haikou, Hainan, China, 24-27 August 2007, Volume 1}, pages = {446--450}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICNC.2007.807}, doi = {10.1109/ICNC.2007.807}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnc/WangYJZM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnc/LiLWY07, author = {Yu{-}Ying Li and Lixiang Li and Qiaoyan Wen and Yixian Yang}, editor = {Jingsheng Lei and JingTao Yao and Qingfu Zhang}, title = {Integer Programming via Chaotic Ant Swarm}, booktitle = {Third International Conference on Natural Computation, {ICNC} 2007, Haikou, Hainan, China, 24-27 August 2007, Volume 4}, pages = {489--493}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICNC.2007.444}, doi = {10.1109/ICNC.2007.444}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnc/LiLWY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/WangCZHY07, author = {Licheng Wang and Zhenfu Cao and Shihui Zheng and Xiaofang Huang and Yixian Yang}, editor = {K. Srinathan and C. Pandu Rangan and Moti Yung}, title = {Transitive Signatures from Braid Groups}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4859}, pages = {183--196}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77026-8\_14}, doi = {10.1007/978-3-540-77026-8\_14}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/WangCZHY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/LiJTYJWY07, author = {Liang Li and Wei{-}Qiang Jiang and Jie Tian and Yixian Yang and Cai{-}Ping Jiang and Zhe Wu and Xin Yang}, title = {A Networking Identity Authentication Scheme Combining Fingerprint Coding and Identity Based Encryption}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2007, New Brunswick, New Jersey, USA, May 23-24, 2007, Proceedings}, pages = {129--132}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ISI.2007.379545}, doi = {10.1109/ISI.2007.379545}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isi/LiJTYJWY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isnn/JiangYMZ07, author = {Nan Jiang and Yixian Yang and Xiaomin Ma and Zhaozhi Zhang}, editor = {Derong Liu and Shumin Fei and Zeng{-}Guang Hou and Huaguang Zhang and Changyin Sun}, title = {Using Three Layer Neural Network to Compute Multi-valued Functions}, booktitle = {Advances in Neural Networks - {ISNN} 2007, 4th International Symposium on Neural Networks, {ISNN} 2007, Nanjing, China, June 3-7, 2007, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {4493}, pages = {1--8}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72395-0\_1}, doi = {10.1007/978-3-540-72395-0\_1}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/isnn/JiangYMZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mue/HuNY07, author = {Lanlan Hu and Xinxin Niu and Yixian Yang}, title = {An Efficient Multi-server Password Authenticated Key Agreement Scheme Using Smart Cards}, booktitle = {2007 International Conference on Multimedia and Ubiquitous Engineering {(MUE} 2007), 26-28 April 2007, Seoul, Korea}, pages = {903--907}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/MUE.2007.70}, doi = {10.1109/MUE.2007.70}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mue/HuNY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijbc/LiYPW06, author = {Lixiang Li and Yixian Yang and Haipeng Peng and Xiangdong Wang}, title = {An Optimization Method Inspired by "chaotic" Ant Behavior}, journal = {Int. J. Bifurc. Chaos}, volume = {16}, number = {8}, pages = {2351--2364}, year = {2006}, url = {https://doi.org/10.1142/S0218127406016100}, doi = {10.1142/S0218127406016100}, timestamp = {Sat, 13 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijbc/LiYPW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icicic/JiangWNY06, author = {Nan Jiang and Jian Wang and Xinxin Niu and Yixian Yang}, title = {Symmetric Steganography Secure Against Chosen Message and Original Cover Attacks}, booktitle = {First International Conference on Innovative Computing, Information and Control {(ICICIC} 2006), 30 August - 1 September 2006, Beijing, China}, pages = {661--664}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ICICIC.2006.531}, doi = {10.1109/ICICIC.2006.531}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icicic/JiangWNY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnc/LiLWY06, author = {Yu{-}Ying Li and Lixiang Li and Qiao{-}Yan Wen and Yixian Yang}, editor = {Licheng Jiao and Lipo Wang and Xinbo Gao and Jing Liu and Feng Wu}, title = {Data Fitting Via Chaotic Ant Swarm}, booktitle = {Advances in Natural Computation, Second International Conference, {ICNC} 2006, Xi'an, China, September 24-28, 2006. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {4222}, pages = {180--183}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11881223\_23}, doi = {10.1007/11881223\_23}, timestamp = {Mon, 19 Apr 2021 14:35:00 +0200}, biburl = {https://dblp.org/rec/conf/icnc/LiLWY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/ChenZNY06, author = {Ming Chen and Ru Zhang and Xinxin Niu and Yixian Yang}, title = {Analysis of Current Steganography Tools: Classifications {\&} Features}, booktitle = {Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing {(IIH-MSP} 2006), Pasadena, California, USA, December 18-20, 2006, Proceedings}, pages = {384--387}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/IIH-MSP.2006.265023}, doi = {10.1109/IIH-MSP.2006.265023}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/ChenZNY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SuYYZ06, author = {Shenghui Su and Yixian Yang and Bo Yang and Shaolan Zhang}, title = {Design and Analysis of a Hash Ring-iterative Structure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {384}, year = {2006}, url = {http://eprint.iacr.org/2006/384}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SuYYZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmlc/LangLY05, author = {Fenghua Lang and Jian Li and Yixian Yang}, editor = {Daniel S. Yeung and Zhi{-}Qiang Liu and Xizhao Wang and Hong Yan}, title = {A Novel Fuzzy Anomaly Detection Method Based on Clonal Selection Clustering Algorithm}, booktitle = {Advances in Machine Learning and Cybernetics, 4th International Conference, {ICMLC} 2005, Guangzhou, China, August 18-21, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3930}, pages = {642--651}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11739685\_67}, doi = {10.1007/11739685\_67}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/icmlc/LangLY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdcat/ChuLY05, author = {Yonggang Chu and Jun Li and Yixian Yang}, title = {The Architecture of the Large-scale Distributed Intrusion Detection System}, booktitle = {Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies {(PDCAT} 2005), 5-8 December 2005, Dalian, China}, pages = {130--133}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/PDCAT.2005.233}, doi = {10.1109/PDCAT.2005.233}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pdcat/ChuLY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nn/ZhangMY04, author = {Zhaozhi Zhang and Xiaomin Ma and Yixian Yang}, title = {Erratum to: Bounds on the number of hidden neurons in three-layer binary neural networks [Neural Networks 16 {(7)} 995-1002]}, journal = {Neural Networks}, volume = {17}, number = {3}, pages = {465}, year = {2004}, url = {https://doi.org/10.1016/j.neunet.2004.01.001}, doi = {10.1016/J.NEUNET.2004.01.001}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nn/ZhangMY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijitdm/TaoYN03, author = {Wang Tao and Yixian Yang and Xinxin Niu}, title = {New Efficient Timed Commitment Schemes}, journal = {Int. J. Inf. Technol. Decis. Mak.}, volume = {2}, number = {2}, pages = {287--297}, year = {2003}, url = {https://doi.org/10.1142/S0219622003000616}, doi = {10.1142/S0219622003000616}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijitdm/TaoYN03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nn/ZhangMY03, author = {Zhaozhi Zhang and Xiaomin Ma and Yixian Yang}, title = {Bounds on the number of hidden neurons in three-layer binary neural networks}, journal = {Neural Networks}, volume = {16}, number = {7}, pages = {995--1002}, year = {2003}, url = {https://doi.org/10.1016/S0893-6080(03)00006-6}, doi = {10.1016/S0893-6080(03)00006-6}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nn/ZhangMY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pimrc/0037SY03, author = {Zhi Li and Ai Fen Sui and Yixian Yang}, title = {A {LSB} steganography detection algorithm}, booktitle = {Proceedings of the {IEEE} 14th International Symposium on Personal, Indoor and Mobile Radio Communications, {PIMRC} 2003, 7-10 September 2003, Beijing, China}, pages = {2780--2783}, publisher = {{IEEE}}, year = {2003}, url = {https://doi.org/10.1109/PIMRC.2003.1259249}, doi = {10.1109/PIMRC.2003.1259249}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/pimrc/0037SY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dm/ZhangMY01, author = {Zhaozhi Zhang and Xiaomin Ma and Yixian Yang}, title = {A unified method to construct neural network decoders for arbitrary codes and decoding rules}, journal = {Discret. Math.}, volume = {238}, number = {1-3}, pages = {171--181}, year = {2001}, url = {https://doi.org/10.1016/S0012-365X(00)00422-2}, doi = {10.1016/S0012-365X(00)00422-2}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dm/ZhangMY01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/SunKY01, author = {Wei Sun and Andrew Klapper and Yixian Yang}, title = {On correlations of a family of generalized geometric sequences}, journal = {{IEEE} Trans. Inf. Theory}, volume = {47}, number = {6}, pages = {2609--2618}, year = {2001}, url = {https://doi.org/10.1109/18.945278}, doi = {10.1109/18.945278}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/SunKY01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/YouYZ01, author = {Lin You and Yixian Yang and Chun Qi Zhang}, editor = {Sihan Qing and Tatsuaki Okamoto and Jianying Zhou}, title = {Generalization of Elliptic Curve Digital Signature Schemes}, booktitle = {Information and Communications Security, Third International Conference, {ICICS} 2001, Xian, China, November 13-16, 2001}, series = {Lecture Notes in Computer Science}, volume = {2229}, pages = {246--250}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45600-7\_28}, doi = {10.1007/3-540-45600-7\_28}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/icics/YouYZ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/ZhongFY00, author = {Ming Zhong and Yunbo Feng and Yixian Yang}, title = {Single-Term Divisible Electronic Cash Based on Bit Commitment}, booktitle = {Proceedings of the Fifth {IEEE} Symposium on Computers and Communications {(ISCC} 2000), 4-6 July 2000, Antibes, France}, pages = {280--285}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ISCC.2000.860651}, doi = {10.1109/ISCC.2000.860651}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/ZhongFY00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcom/LinXYH98, author = {Xiaodong Lin and YuSen Xing and Yixian Yang and Tzonelih Hwang}, title = {Comment on "Reparable key distribution protocols for Internet environments" [and reply]}, journal = {{IEEE} Trans. Commun.}, volume = {46}, number = {1}, pages = {20--22}, year = {1998}, url = {https://doi.org/10.1109/26.655398}, doi = {10.1109/26.655398}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcom/LinXYH98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/SunY97, author = {Wei Sun and Yixian Yang}, title = {Correlation Functions of a Family of Generalized Geometric Sequences}, journal = {Discret. Appl. Math.}, volume = {80}, number = {2-3}, pages = {193--201}, year = {1997}, url = {https://doi.org/10.1016/S0166-218X(97)00060-7}, doi = {10.1016/S0166-218X(97)00060-7}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dam/SunY97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcom/YangNX97, author = {Yixian Yang and Xinxin Niu and Chengqian Xu}, title = {Counterexample of truncated Costas optical orthogonal codes}, journal = {{IEEE} Trans. Commun.}, volume = {45}, number = {6}, pages = {640--643}, year = {1997}, url = {https://doi.org/10.1109/26.592598}, doi = {10.1109/26.592598}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcom/YangNX97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/YangG95, author = {Yixian Yang and Baoan Guo}, title = {Further Enumerating Boolean Functions of Cryptographic Significance}, journal = {J. Cryptol.}, volume = {8}, number = {3}, pages = {115--122}, year = {1995}, url = {https://doi.org/10.1007/BF00202268}, doi = {10.1007/BF00202268}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/YangG95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcom/WangY94a, author = {Xinmei Wang and Yixian Yang}, title = {On the undetected error probability of nonlinear binary constant weight codes}, journal = {{IEEE} Trans. Commun.}, volume = {42}, number = {7}, pages = {2390--2394}, year = {1994}, url = {https://doi.org/10.1109/26.297847}, doi = {10.1109/26.297847}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcom/WangY94a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/Yang93, author = {Yixian Yang}, title = {New Binary Sequences with Perfect Staircase Profile of Linear Complexity}, journal = {Inf. Process. Lett.}, volume = {46}, number = {1}, pages = {27--29}, year = {1993}, url = {https://doi.org/10.1016/0020-0190(93)90192-C}, doi = {10.1016/0020-0190(93)90192-C}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/Yang93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/Yang91, author = {Yixian Yang}, title = {New Enumeration Results About the Optical Orthogonal Codes}, journal = {Inf. Process. Lett.}, volume = {40}, number = {2}, pages = {85--87}, year = {1991}, url = {https://doi.org/10.1016/0020-0190(91)90014-9}, doi = {10.1016/0020-0190(91)90014-9}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/Yang91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Yang90, author = {Yixian Yang}, editor = {Jennifer Seberry and Josef Pieprzyk}, title = {{K-M} Sequence is Forwardly Predictable}, booktitle = {Advances in Cryptology - {AUSCRYPT} '90, International Conference on Cryptology, Sydney, Australia, January 8-11, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {453}, pages = {37--38}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/BFb0030349}, doi = {10.1007/BFB0030349}, timestamp = {Fri, 17 Jul 2020 16:12:46 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Yang90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Yang90a, author = {Yixian Yang}, editor = {Jennifer Seberry and Josef Pieprzyk}, title = {Dyadic Matrices and Their Potential Significance in Cryptography}, booktitle = {Advances in Cryptology - {AUSCRYPT} '90, International Conference on Cryptology, Sydney, Australia, January 8-11, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {453}, pages = {308--310}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/BFb0030370}, doi = {10.1007/BFB0030370}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Yang90a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.