BibTeX records: Yixian Yang

download as .bib file

@article{DBLP:journals/jocnet/CheZDCLLY24,
  author       = {Bichen Che and
                  Shuntian Zheng and
                  Zhao Dou and
                  Xiubo Chen and
                  Lixiang Li and
                  Jian Li and
                  Yixian Yang},
  title        = {Controlled node dialogue in IoT networks based on nonlocal orthogonal
                  product states},
  journal      = {J. Opt. Commun. Netw.},
  volume       = {16},
  number       = {3},
  pages        = {317--327},
  year         = {2024},
  url          = {https://doi.org/10.1364/JOCN.503353},
  doi          = {10.1364/JOCN.503353},
  timestamp    = {Thu, 04 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jocnet/CheZDCLLY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ZhuCY24,
  author       = {Haihua Zhu and
                  Xiubo Chen and
                  Yixian Yang},
  title        = {A blind watermarking scheme for {TMQIR} images},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {8},
  pages        = {23109--23127},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-15368-z},
  doi          = {10.1007/S11042-023-15368-Z},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/ZhuCY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmm/RenPLY24,
  author       = {Yeqing Ren and
                  Haipeng Peng and
                  Lixiang Li and
                  Yixian Yang},
  title        = {Lightweight Voice Spoofing Detection Using Improved One-Class Learning
                  and Knowledge Distillation},
  journal      = {{IEEE} Trans. Multim.},
  volume       = {26},
  pages        = {4360--4374},
  year         = {2024},
  url          = {https://doi.org/10.1109/TMM.2023.3321505},
  doi          = {10.1109/TMM.2023.3321505},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmm/RenPLY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiXZYC23,
  author       = {Xin Li and
                  Yang Xin and
                  Hongliang Zhu and
                  Yixian Yang and
                  Yuling Chen},
  title        = {Cross-domain vulnerability detection using graph embedding and domain
                  adaptation},
  journal      = {Comput. Secur.},
  volume       = {125},
  pages        = {103017},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103017},
  doi          = {10.1016/J.COSE.2022.103017},
  timestamp    = {Mon, 06 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/LiXZYC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/RenPLXLY23,
  author       = {Yeqing Ren and
                  Haipeng Peng and
                  Lixiang Li and
                  Xiaopeng Xue and
                  Yang Lan and
                  Yixian Yang},
  title        = {A voice spoofing detection framework for IoT systems with feature
                  pyramid and online knowledge distillation},
  journal      = {J. Syst. Archit.},
  volume       = {143},
  pages        = {102981},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.sysarc.2023.102981},
  doi          = {10.1016/J.SYSARC.2023.102981},
  timestamp    = {Thu, 12 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsa/RenPLXLY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/ZhaoCXZY23,
  author       = {Li{-}Yun Zhao and
                  Xiu{-}Bo Chen and
                  Gang Xu and
                  Jing{-}Wen Zhang and
                  Yi{-}Xian Yang},
  title        = {Fault-tolerant error correction for quantum Hamming codes with only
                  two ancillary qudits},
  journal      = {Quantum Inf. Process.},
  volume       = {22},
  number       = {1},
  pages        = {70},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11128-022-03796-z},
  doi          = {10.1007/S11128-022-03796-Z},
  timestamp    = {Tue, 07 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/qip/ZhaoCXZY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/CheZDCLY23,
  author       = {Bichen Che and
                  Yitong Zhang and
                  Zhao Dou and
                  Xiubo Chen and
                  Jian Li and
                  Yixian Yang},
  title        = {Multi-party quantum private information comparison based on nonlocal
                  orthogonal product states},
  journal      = {Quantum Inf. Process.},
  volume       = {22},
  number       = {6},
  pages        = {231},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11128-023-03973-8},
  doi          = {10.1007/S11128-023-03973-8},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/CheZDCLY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/taslp/RenPLXLY23,
  author       = {Yeqing Ren and
                  Haipeng Peng and
                  Lixiang Li and
                  Xiaopeng Xue and
                  Yang Lan and
                  Yixian Yang},
  title        = {Generalized Voice Spoofing Detection via Integral Knowledge Amalgamation},
  journal      = {{IEEE} {ACM} Trans. Audio Speech Lang. Process.},
  volume       = {31},
  pages        = {2461--2475},
  year         = {2023},
  url          = {https://doi.org/10.1109/TASLP.2023.3288416},
  doi          = {10.1109/TASLP.2023.3288416},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/taslp/RenPLXLY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/HuangYY23,
  author       = {Qinlong Huang and
                  Guanyu Yan and
                  Yixian Yang},
  title        = {Privacy-Preserving Traceable Attribute-Based Keyword Search in Multi-Authority
                  Medical Cloud},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {11},
  number       = {1},
  pages        = {678--691},
  year         = {2023},
  url          = {https://doi.org/10.1109/TCC.2021.3109282},
  doi          = {10.1109/TCC.2021.3109282},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/HuangYY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/HuangWYZY23,
  author       = {Qinlong Huang and
                  Qinglin Wei and
                  Guanyu Yan and
                  Lin Zou and
                  Yixian Yang},
  title        = {Fast and Privacy-Preserving Attribute-Based Keyword Search in Cloud
                  Document Services},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {16},
  number       = {5},
  pages        = {3348--3360},
  year         = {2023},
  url          = {https://doi.org/10.1109/TSC.2023.3265270},
  doi          = {10.1109/TSC.2023.3265270},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/HuangWYZY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/TianLPWY23,
  author       = {Yanzhao Tian and
                  Lixiang Li and
                  Haipeng Peng and
                  Ding Wang and
                  Yixian Yang},
  title        = {Honeywords Generation Mechanism Based on Zero-Divisor Graph Sequences},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {16},
  number       = {6},
  pages        = {4567--4579},
  year         = {2023},
  url          = {https://doi.org/10.1109/TSC.2023.3329013},
  doi          = {10.1109/TSC.2023.3329013},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsc/TianLPWY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/LiangPLTY22,
  author       = {Junying Liang and
                  Haipeng Peng and
                  Lixiang Li and
                  Fenghua Tong and
                  Yixian Yang},
  title        = {Flexible construction of measurement matrices in compressed sensing
                  based on extensions of incidence matrices of combinatorial designs},
  journal      = {Appl. Math. Comput.},
  volume       = {420},
  pages        = {126901},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.amc.2021.126901},
  doi          = {10.1016/J.AMC.2021.126901},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amc/LiangPLTY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/HongSWXWYHL22,
  author       = {Haibo Hong and
                  Jun Shao and
                  Licheng Wang and
                  Mande Xie and
                  Guiyi Wei and
                  Yixian Yang and
                  Song Han and
                  Jianhong Lin},
  title        = {A {CCA} secure public key encryption scheme based on finite groups
                  of Lie type},
  journal      = {Sci. China Inf. Sci.},
  volume       = {65},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11432-019-2704-7},
  doi          = {10.1007/S11432-019-2704-7},
  timestamp    = {Tue, 13 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/HongSWXWYHL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijis/ChenSYLNZ22,
  author       = {Yuling Chen and
                  Jing Sun and
                  Yixian Yang and
                  Tao Li and
                  Xinxin Niu and
                  Huiyu Zhou},
  title        = {{PSSPR:} {A} source location privacy protection scheme based on sector
                  phantom routing in WSNs},
  journal      = {Int. J. Intell. Syst.},
  volume       = {37},
  number       = {2},
  pages        = {1204--1221},
  year         = {2022},
  url          = {https://doi.org/10.1002/int.22666},
  doi          = {10.1002/INT.22666},
  timestamp    = {Fri, 19 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijis/ChenSYLNZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijis/LiWCLJY22,
  author       = {Tao Li and
                  Zhaojie Wang and
                  Yuling Chen and
                  Chunmei Li and
                  Yanling Jia and
                  Yixian Yang},
  title        = {Is semi-selfish mining available without being detected?},
  journal      = {Int. J. Intell. Syst.},
  volume       = {37},
  number       = {12},
  pages        = {10576--10597},
  year         = {2022},
  url          = {https://doi.org/10.1002/int.22656},
  doi          = {10.1002/INT.22656},
  timestamp    = {Fri, 19 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijis/LiWCLJY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/DouCYL22,
  author       = {Hui Dou and
                  Yuling Chen and
                  Yixian Yang and
                  Yangyang Long},
  title        = {A secure and efficient privacy-preserving data aggregation algorithm},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {13},
  number       = {3},
  pages        = {1495--1503},
  year         = {2022},
  url          = {https://doi.org/10.1007/s12652-020-02801-6},
  doi          = {10.1007/S12652-020-02801-6},
  timestamp    = {Fri, 13 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jaihc/DouCYL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcloudc/YangYCLYQY22,
  author       = {Manxiang Yang and
                  Baopeng Ye and
                  Yuling Chen and
                  Tao Li and
                  Yixian Yang and
                  Xiaobin Qian and
                  Xiaomei Yu},
  title        = {A trusted de-swinging k-anonymity scheme for location privacy protection},
  journal      = {J. Cloud Comput.},
  volume       = {11},
  pages        = {2},
  year         = {2022},
  url          = {https://doi.org/10.1186/s13677-021-00272-4},
  doi          = {10.1186/S13677-021-00272-4},
  timestamp    = {Fri, 19 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcloudc/YangYCLYQY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joeuc/LuoCLWYY22,
  author       = {Yun Luo and
                  Yuling Chen and
                  Tao Li and
                  Yilei Wang and
                  Yixian Yang and
                  Xiaomei Yu},
  title        = {An Entropy-View Secure Multiparty Computation Protocol Based on Semi-Honest
                  Model},
  journal      = {J. Organ. End User Comput.},
  volume       = {34},
  number       = {10},
  pages        = {1--17},
  year         = {2022},
  url          = {https://doi.org/10.4018/joeuc.306752},
  doi          = {10.4018/JOEUC.306752},
  timestamp    = {Fri, 19 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joeuc/LuoCLWYY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/SunCSHHBY22,
  author       = {Yi{-}Ru Sun and
                  Xiu{-}Bo Chen and
                  Jun Shao and
                  Song Han and
                  Haibo Hong and
                  Haiyong Bao and
                  Yixian Yang},
  title        = {Cyclic preparation of two-qubit state in two noisy environments},
  journal      = {Quantum Inf. Process.},
  volume       = {21},
  number       = {1},
  pages        = {40},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11128-021-03373-w},
  doi          = {10.1007/S11128-021-03373-W},
  timestamp    = {Tue, 13 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/qip/SunCSHHBY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/ZhaoCXY22,
  author       = {Liyun Zhao and
                  Xiubo Chen and
                  Gang Xu and
                  Yixian Yang},
  title        = {Hat problem: a new strategy based on quantum stabilizer codes},
  journal      = {Quantum Inf. Process.},
  volume       = {21},
  number       = {3},
  pages        = {113},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11128-022-03451-7},
  doi          = {10.1007/S11128-022-03451-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/ZhaoCXY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/GongCXCY22,
  author       = {Li Gong and
                  Xiu{-}Bo Chen and
                  Gang Xu and
                  Yan Chang and
                  Yi{-}Xian Yang},
  title        = {Multi-party controlled cyclic hybrid quantum communication protocol
                  in noisy environment},
  journal      = {Quantum Inf. Process.},
  volume       = {21},
  number       = {11},
  pages        = {375},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11128-022-03725-0},
  doi          = {10.1007/S11128-022-03725-0},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/qip/GongCXCY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcbb/HuangYYC22,
  author       = {Qinlong Huang and
                  Wei Yue and
                  Yixian Yang and
                  Lixuan Chen},
  title        = {{P2GT:} Fine-Grained Genomic Data Access Control With Privacy-Preserving
                  Testing in Cloud Computing},
  journal      = {{IEEE} {ACM} Trans. Comput. Biol. Bioinform.},
  volume       = {19},
  number       = {4},
  pages        = {2385--2398},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCBB.2021.3063388},
  doi          = {10.1109/TCBB.2021.3063388},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcbb/HuangYYC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/ZuoLPLY22,
  author       = {Xiangjian Zuo and
                  Lixiang Li and
                  Haipeng Peng and
                  Shoushan Luo and
                  Yixian Yang},
  title        = {Privacy-Preserving Subgraph Matching Scheme With Authentication in
                  Social Networks},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {10},
  number       = {3},
  pages        = {2038--2049},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCC.2020.3012999},
  doi          = {10.1109/TCC.2020.3012999},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/ZuoLPLY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcom/HaoZXFY22,
  author       = {Jie Hao and
                  Jun Zhang and
                  Shu{-}Tao Xia and
                  Fang{-}Wei Fu and
                  Yixian Yang},
  title        = {Constructions and Weight Distributions of Optimal Locally Repairable
                  Codes},
  journal      = {{IEEE} Trans. Commun.},
  volume       = {70},
  number       = {5},
  pages        = {2895--2908},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCOMM.2022.3155165},
  doi          = {10.1109/TCOMM.2022.3155165},
  timestamp    = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcom/HaoZXFY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/HuangDYYW22,
  author       = {Qinlong Huang and
                  Jiabao Du and
                  Guanyu Yan and
                  Yixian Yang and
                  Qinglin Wei},
  title        = {Privacy-Preserving Spatio-Temporal Keyword Search for Outsourced Location-Based
                  Services},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {15},
  number       = {6},
  pages        = {3443--3456},
  year         = {2022},
  url          = {https://doi.org/10.1109/TSC.2021.3088131},
  doi          = {10.1109/TSC.2021.3088131},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsc/HuangDYYW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhangXGLY21,
  author       = {Jiansheng Zhang and
                  Yang Xin and
                  Yulong Gao and
                  Xiaohui Lei and
                  Yixian Yang},
  title        = {Secure {ABE} Scheme for Access Management in Blockchain-Based IoT},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {54840--54849},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3071031},
  doi          = {10.1109/ACCESS.2021.3071031},
  timestamp    = {Mon, 06 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ZhangXGLY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TianLPY21,
  author       = {Yanzhao Tian and
                  Lixiang Li and
                  Haipeng Peng and
                  Yixian Yang},
  title        = {Achieving flatness: Graph labeling can generate graphical honeywords},
  journal      = {Comput. Secur.},
  volume       = {104},
  pages        = {102212},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102212},
  doi          = {10.1016/J.COSE.2021.102212},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TianLPY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ZuoLLPYG21,
  author       = {Xiangjian Zuo and
                  Lixiang Li and
                  Shoushan Luo and
                  Haipeng Peng and
                  Yixian Yang and
                  Linming Gong},
  title        = {Privacy-Preserving Verifiable Graph Intersection Scheme With Cryptographic
                  Accumulators in Social Networks},
  journal      = {{IEEE} Internet Things J.},
  volume       = {8},
  number       = {6},
  pages        = {4590--4603},
  year         = {2021},
  url          = {https://doi.org/10.1109/JIOT.2020.3028417},
  doi          = {10.1109/JIOT.2020.3028417},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/ZuoLLPYG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LiCPY21,
  author       = {Lixiang Li and
                  Yixin Chen and
                  Haipeng Peng and
                  Yixian Yang},
  title        = {Chaotic Deep Network for Mobile {D2D} Communication},
  journal      = {{IEEE} Internet Things J.},
  volume       = {8},
  number       = {10},
  pages        = {8078--8096},
  year         = {2021},
  url          = {https://doi.org/10.1109/JIOT.2020.3043360},
  doi          = {10.1109/JIOT.2020.3043360},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/LiCPY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/DengYG21,
  author       = {Lunzhi Deng and
                  Yixian Yang and
                  Ronghai Gao},
  title        = {Certificateless Designated Verifier Anonymous Aggregate Signature
                  Scheme for Healthcare Wireless Sensor Networks},
  journal      = {{IEEE} Internet Things J.},
  volume       = {8},
  number       = {11},
  pages        = {8897--8909},
  year         = {2021},
  url          = {https://doi.org/10.1109/JIOT.2021.3056097},
  doi          = {10.1109/JIOT.2021.3056097},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/DengYG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/DangLNLPY21,
  author       = {Zhongkai Dang and
                  Lixiang Li and
                  Wei Ni and
                  Ren Ping Liu and
                  Haipeng Peng and
                  Yixian Yang},
  title        = {How does rumor spreading affect people inside and outside an institution},
  journal      = {Inf. Sci.},
  volume       = {574},
  pages        = {377--393},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ins.2021.05.085},
  doi          = {10.1016/J.INS.2021.05.085},
  timestamp    = {Mon, 15 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/DangLNLPY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mis/HuCRYQY21,
  author       = {Jianwen Hu and
                  Yuling Chen and
                  Xiaojun Ren and
                  Yixian Yang and
                  Xiaobin Qian and
                  Xiaomei Yu},
  title        = {Blockchain-Enhanced Fair and Efficient Energy Trading in Industrial
                  Internet of Things},
  journal      = {Mob. Inf. Syst.},
  volume       = {2021},
  pages        = {7397926:1--7397926:13},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/7397926},
  doi          = {10.1155/2021/7397926},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mis/HuCRYQY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/PanXLCY21,
  author       = {Xing{-}Bo Pan and
                  Gang Xu and
                  Zongpeng Li and
                  Xiu{-}Bo Chen and
                  Yi{-}Xian Yang},
  title        = {Quantum network coding without loss of information},
  journal      = {Quantum Inf. Process.},
  volume       = {20},
  number       = {2},
  pages        = {65},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11128-020-02966-1},
  doi          = {10.1007/S11128-020-02966-1},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/qip/PanXLCY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/ZhuCY21,
  author       = {Haihua Zhu and
                  Xiu{-}Bo Chen and
                  Yi{-}Xian Yang},
  title        = {A multimode quantum image representation and its encryption scheme},
  journal      = {Quantum Inf. Process.},
  volume       = {20},
  number       = {9},
  pages        = {315},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11128-021-03255-1},
  doi          = {10.1007/S11128-021-03255-1},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/ZhuCY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiWXZTCYY21,
  author       = {Mingzhen Li and
                  Yunfeng Wang and
                  Yang Xin and
                  Hongliang Zhu and
                  Qifeng Tang and
                  Yuling Chen and
                  Yixian Yang and
                  Guangcan Yang},
  title        = {Cross-Platform Strong Privacy Protection Mechanism for Review Publication},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {5556155:1--5556155:22},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/5556155},
  doi          = {10.1155/2021/5556155},
  timestamp    = {Mon, 06 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/LiWXZTCYY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiCWWZZTYY21,
  author       = {Tao Li and
                  Yuling Chen and
                  Yanli Wang and
                  Yilei Wang and
                  Minghao Zhao and
                  Haojia Zhu and
                  Youliang Tian and
                  Xiaomei Yu and
                  Yixian Yang},
  title        = {Corrigendum to "Rational Protocols and Attacks in Blockchain
                  System"},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {9856969:1--9856969:2},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/9856969},
  doi          = {10.1155/2021/9856969},
  timestamp    = {Fri, 19 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/LiCWWZZTYY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigpro/TongLPY21,
  author       = {Fenghua Tong and
                  Lixiang Li and
                  Haipeng Peng and
                  Yixian Yang},
  title        = {Flexible construction of compressed sensing matrices with low storage
                  space and low coherence},
  journal      = {Signal Process.},
  volume       = {182},
  pages        = {107951},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.sigpro.2020.107951},
  doi          = {10.1016/J.SIGPRO.2020.107951},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigpro/TongLPY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/ZuoLPLY21,
  author       = {Xiangjian Zuo and
                  Lixiang Li and
                  Haipeng Peng and
                  Shoushan Luo and
                  Yixian Yang},
  title        = {Privacy-Preserving Multidimensional Data Aggregation Scheme Without
                  Trusted Authority in Smart Grid},
  journal      = {{IEEE} Syst. J.},
  volume       = {15},
  number       = {1},
  pages        = {395--406},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSYST.2020.2994363},
  doi          = {10.1109/JSYST.2020.2994363},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sj/ZuoLPLY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/HuangYYH21,
  author       = {Qinlong Huang and
                  Yixian Yang and
                  Wei Yue and
                  Yue He},
  title        = {Secure Data Group Sharing and Conditional Dissemination with Multi-Owner
                  in Cloud Computing},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {9},
  number       = {4},
  pages        = {1607--1618},
  year         = {2021},
  url          = {https://doi.org/10.1109/TCC.2019.2908163},
  doi          = {10.1109/TCC.2019.2908163},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/HuangYYH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/TongLPY21,
  author       = {Fenghua Tong and
                  Lixiang Li and
                  Haipeng Peng and
                  Yixian Yang},
  title        = {Deterministic Constructions of Compressed Sensing Matrices From Unitary
                  Geometry},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {67},
  number       = {8},
  pages        = {5548--5561},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIT.2021.3088090},
  doi          = {10.1109/TIT.2021.3088090},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/TongLPY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/HuangZY21,
  author       = {Qinlong Huang and
                  Zhicheng Zhang and
                  Yixian Yang},
  title        = {Privacy-Preserving Media Sharing with Scalable Access Control and
                  Secure Deduplication in Mobile Cloud Computing},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {20},
  number       = {5},
  pages        = {1951--1964},
  year         = {2021},
  url          = {https://doi.org/10.1109/TMC.2020.2970705},
  doi          = {10.1109/TMC.2020.2970705},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/HuangZY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/HuangYF21,
  author       = {Qinlong Huang and
                  Yixian Yang and
                  Jingyi Fu},
  title        = {Secure Data Group Sharing and Dissemination with Attribute and Time
                  Conditions in Public Cloud},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {14},
  number       = {4},
  pages        = {1013--1025},
  year         = {2021},
  url          = {https://doi.org/10.1109/TSC.2018.2850344},
  doi          = {10.1109/TSC.2018.2850344},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/HuangYF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dasc/GuoYCLYQ21,
  author       = {Ping Guo and
                  Baopeng Ye and
                  Yuling Chen and
                  Tao Li and
                  Yixian Yang and
                  Xiaobin Qian},
  title        = {A location data protection protocol based on differential privacy},
  booktitle    = {{IEEE} Intl Conf on Dependable, Autonomic and Secure Computing, Intl
                  Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and
                  Big Data Computing, Intl Conf on Cyber Science and Technology Congress,
                  DASC/PiCom/CBDCom/CyberSciTech 2021, Canada, October 25-28, 2021},
  pages        = {306--311},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DASC-PICom-CBDCom-CyberSciTech52372.2021.00060},
  doi          = {10.1109/DASC-PICOM-CBDCOM-CYBERSCITECH52372.2021.00060},
  timestamp    = {Fri, 19 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dasc/GuoYCLYQ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dasc/LuoCLWY21,
  author       = {Yun Luo and
                  Yuling Chen and
                  Tao Li and
                  Yilei Wang and
                  Yixian Yang},
  title        = {Using information entropy to analyze secure multi-party computation
                  protocol},
  booktitle    = {{IEEE} Intl Conf on Dependable, Autonomic and Secure Computing, Intl
                  Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and
                  Big Data Computing, Intl Conf on Cyber Science and Technology Congress,
                  DASC/PiCom/CBDCom/CyberSciTech 2021, Canada, October 25-28, 2021},
  pages        = {312--318},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DASC-PICom-CBDCom-CyberSciTech52372.2021.00061},
  doi          = {10.1109/DASC-PICOM-CBDCOM-CYBERSCITECH52372.2021.00061},
  timestamp    = {Fri, 19 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dasc/LuoCLWY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dasc/HuCRYQ21,
  author       = {Jianwen Hu and
                  Yuling Chen and
                  Xiaoiun Ren and
                  Yixian Yang and
                  Xiaobin Qian},
  title        = {ABlockchain-enabled Efficient and Fair Energy Trading Schemes in Industrial
                  Internet of Things},
  booktitle    = {{IEEE} Intl Conf on Dependable, Autonomic and Secure Computing, Intl
                  Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and
                  Big Data Computing, Intl Conf on Cyber Science and Technology Congress,
                  DASC/PiCom/CBDCom/CyberSciTech 2021, Canada, October 25-28, 2021},
  pages        = {319--325},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DASC-PICom-CBDCom-CyberSciTech52372.2021.00062},
  doi          = {10.1109/DASC-PICOM-CBDCOM-CYBERSCITECH52372.2021.00062},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dasc/HuCRYQ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dasc/YangYCLYQ21,
  author       = {Manxiang Yang and
                  Baopeng Ye and
                  Yuling Chen and
                  Tao Li and
                  Yixian Yang and
                  Xiaobin Qian},
  title        = {A De-swinging Scheme in Location Privacy Protection via Smart Contract},
  booktitle    = {{IEEE} Intl Conf on Dependable, Autonomic and Secure Computing, Intl
                  Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and
                  Big Data Computing, Intl Conf on Cyber Science and Technology Congress,
                  DASC/PiCom/CBDCom/CyberSciTech 2021, Canada, October 25-28, 2021},
  pages        = {326--333},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DASC-PICom-CBDCom-CyberSciTech52372.2021.00063},
  doi          = {10.1109/DASC-PICOM-CBDCOM-CYBERSCITECH52372.2021.00063},
  timestamp    = {Fri, 19 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dasc/YangYCLYQ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dasc/SunCLLY21,
  author       = {Jing Sun and
                  Yuling Chen and
                  Tao Li and
                  Jia Liu and
                  Yixian Yang},
  title        = {{PSSPR:} {A} Source Location Privacy Protection Scheme Based on Sector
                  Phantom Routing in WSNs},
  booktitle    = {{IEEE} Intl Conf on Dependable, Autonomic and Secure Computing, Intl
                  Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and
                  Big Data Computing, Intl Conf on Cyber Science and Technology Congress,
                  DASC/PiCom/CBDCom/CyberSciTech 2021, Canada, October 25-28, 2021},
  pages        = {334--340},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DASC-PICom-CBDCom-CyberSciTech52372.2021.00064},
  doi          = {10.1109/DASC-PICOM-CBDCOM-CYBERSCITECH52372.2021.00064},
  timestamp    = {Fri, 19 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dasc/SunCLLY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsc/LiLZFY21,
  author       = {Yixiao Li and
                  Lixiang Li and
                  Zirui Zhuang and
                  Yuan Fang and
                  Yixian Yang},
  title        = {ResNet Approach for Coding Unit Fast Splitting Decision of {HEVC}
                  Intra Coding},
  booktitle    = {Sixth {IEEE} International Conference on Data Science in Cyberspace,
                  {DSC} 2021, Shenzhen, China, October 9-11, 2021},
  pages        = {130--135},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DSC53577.2021.00025},
  doi          = {10.1109/DSC53577.2021.00025},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dsc/LiLZFY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iecon/YangGLLLH21,
  author       = {Yixian Yang and
                  Li Guo and
                  Xialin Li and
                  Jiaxin Li and
                  Wei Liu and
                  Huihui He},
  title        = {A Data-Driven Detection strategy of False Data in Cooperative {DC}
                  Microgrids},
  booktitle    = {{IECON} 2021 - 47th Annual Conference of the {IEEE} Industrial Electronics
                  Society, Toronto, ON, Canada, October 13-16, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/IECON48115.2021.9589318},
  doi          = {10.1109/IECON48115.2021.9589318},
  timestamp    = {Thu, 03 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iecon/YangGLLLH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/HaoSX0Y21,
  author       = {Jie Hao and
                  Kenneth W. Shum and
                  Shu{-}Tao Xia and
                  Fang{-}Wei Fu and
                  Yixian Yang},
  title        = {On Optimal Quaternary Locally Repairable Codes},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2021,
                  Melbourne, Australia, July 12-20, 2021},
  pages        = {3267--3272},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISIT45174.2021.9518245},
  doi          = {10.1109/ISIT45174.2021.9518245},
  timestamp    = {Fri, 03 Sep 2021 10:54:55 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/HaoSX0Y21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2109-13774,
  author       = {Yuling Chen and
                  Jing Sun and
                  Yixian Yang and
                  Tao Li and
                  Xinxin Niu and
                  Huiyu Zhou},
  title        = {{PSSPR:} {A} Source Location Privacy Protection Scheme Based on Sector
                  Phantom Routing in WSNs},
  journal      = {CoRR},
  volume       = {abs/2109.13774},
  year         = {2021},
  url          = {https://arxiv.org/abs/2109.13774},
  eprinttype    = {arXiv},
  eprint       = {2109.13774},
  timestamp    = {Fri, 19 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-13774.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/QiuLPYC20,
  author       = {Baolin Qiu and
                  Lixiang Li and
                  Haipeng Peng and
                  Yixian Yang and
                  Chuan Chen},
  title        = {Intermittent Pinning Synchronization of Memristor-Based Switching
                  Networks With Multi-Links and Mixed Delays},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {7103--7116},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2019.2941720},
  doi          = {10.1109/ACCESS.2019.2941720},
  timestamp    = {Sat, 13 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/QiuLPYC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/YangZWYW20,
  author       = {Yanqing Yang and
                  Kangfeng Zheng and
                  Bin Wu and
                  Yixian Yang and
                  Xiujuan Wang},
  title        = {Network Intrusion Detection Based on Supervised Adversarial Variational
                  Auto-Encoder With Regularization},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {42169--42184},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2977007},
  doi          = {10.1109/ACCESS.2020.2977007},
  timestamp    = {Thu, 27 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/YangZWYW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LiXZYLC20,
  author       = {Xuefeng Li and
                  Yang Xin and
                  Chensu Zhao and
                  Yixian Yang and
                  Shoushan Luo and
                  Yuling Chen},
  title        = {Using User Behavior to Measure Privacy on Online Social Networks},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {108387--108401},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3000780},
  doi          = {10.1109/ACCESS.2020.3000780},
  timestamp    = {Mon, 06 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/LiXZYLC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WangLPYZ20,
  author       = {Shaofang Wang and
                  Lixiang Li and
                  Haipeng Peng and
                  Yixian Yang and
                  Mingwen Zheng},
  title        = {Finite-Time Synchronization of Multi-Linked Memristor-Based Neural
                  Networks With Mixed Time-Varying Delays},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {169966--169981},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3023715},
  doi          = {10.1109/ACCESS.2020.3023715},
  timestamp    = {Tue, 06 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/WangLPYZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/TongLPY20,
  author       = {Fenghua Tong and
                  Lixiang Li and
                  Haipeng Peng and
                  Yixian Yang},
  title        = {An effective algorithm for the spark of sparse binary measurement
                  matrices},
  journal      = {Appl. Math. Comput.},
  volume       = {371},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.amc.2019.124965},
  doi          = {10.1016/J.AMC.2019.124965},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/amc/TongLPY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/asc/TangLCYN20,
  author       = {Wei Tang and
                  Yu{-}Jun Liu and
                  Yu{-}Ling Chen and
                  Yi{-}Xian Yang and
                  Xinxin Niu},
  title        = {{SLBRS:} Network Virus Propagation Model based on Safety Entropy},
  journal      = {Appl. Soft Comput.},
  volume       = {97},
  number       = {Part},
  pages        = {106784},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.asoc.2020.106784},
  doi          = {10.1016/J.ASOC.2020.106784},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/asc/TangLCYN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/PengYLY20,
  author       = {Haipeng Peng and
                  Bo Yang and
                  Lixiang Li and
                  Yixian Yang},
  title        = {Secure and Traceable Image Transmission Scheme Based on Semitensor
                  Product Compressed Sensing in Telemedicine System},
  journal      = {{IEEE} Internet Things J.},
  volume       = {7},
  number       = {3},
  pages        = {2432--2451},
  year         = {2020},
  url          = {https://doi.org/10.1109/JIOT.2019.2957747},
  doi          = {10.1109/JIOT.2019.2957747},
  timestamp    = {Sat, 13 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/PengYLY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/ShenZWY20,
  author       = {Yanping Shen and
                  Kangfeng Zheng and
                  Chunhua Wu and
                  Yixian Yang},
  title        = {A Nature-inspired Multiple Kernel Extreme Learning Machine Model for
                  Intrusion Detection},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {14},
  number       = {2},
  pages        = {702--723},
  year         = {2020},
  url          = {https://doi.org/10.3837/tiis.2020.02.013},
  doi          = {10.3837/TIIS.2020.02.013},
  timestamp    = {Thu, 16 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/ShenZWY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nn/ChenLPYMZ20,
  author       = {Chuan Chen and
                  Lixiang Li and
                  Haipeng Peng and
                  Yixian Yang and
                  Ling Mi and
                  Hui Zhao},
  title        = {A new fixed-time stability theorem and its application to the fixed-time
                  synchronization of neural networks},
  journal      = {Neural Networks},
  volume       = {123},
  pages        = {412--419},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.neunet.2019.12.028},
  doi          = {10.1016/J.NEUNET.2019.12.028},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nn/ChenLPYMZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/DouXCNYY20,
  author       = {Zhao Dou and
                  Gang Xu and
                  Xiu{-}Bo Chen and
                  Xinxin Niu and
                  Yi{-}Xian Yang and
                  Yu Yang},
  title        = {Searching for optimal quantum secret sharing scheme based on local
                  distinguishability},
  journal      = {Quantum Inf. Process.},
  volume       = {19},
  number       = {10},
  pages        = {368},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11128-020-02809-z},
  doi          = {10.1007/S11128-020-02809-Z},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/qip/DouXCNYY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/GaoCXYLY20,
  author       = {Yulong Gao and
                  Xiu{-}Bo Chen and
                  Gang Xu and
                  Kaiguo Yuan and
                  Wen Liu and
                  Yi{-}Xian Yang},
  title        = {A novel quantum blockchain scheme base on quantum entanglement and
                  DPoS},
  journal      = {Quantum Inf. Process.},
  volume       = {19},
  number       = {12},
  pages        = {420},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11128-020-02915-y},
  doi          = {10.1007/S11128-020-02915-Y},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/qip/GaoCXYLY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiCWWZZTYY20,
  author       = {Tao Li and
                  Yuling Chen and
                  Yanli Wang and
                  Yilei Wang and
                  Minghao Zhao and
                  Haojia Zhu and
                  Youliang Tian and
                  Xiaomei Yu and
                  Yixian Yang},
  title        = {Rational Protocols and Attacks in Blockchain System},
  journal      = {Secur. Commun. Networks},
  volume       = {2020},
  pages        = {8839047:1--8839047:11},
  year         = {2020},
  url          = {https://doi.org/10.1155/2020/8839047},
  doi          = {10.1155/2020/8839047},
  timestamp    = {Fri, 19 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/LiCWWZZTYY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/FangLLPY20,
  author       = {Yuan Fang and
                  Lixiang Li and
                  Yixiao Li and
                  Haipeng Peng and
                  Yixian Yang},
  title        = {Low Energy Consumption Compressed Spectrum Sensing Based on Channel
                  Energy Reconstruction in Cognitive Radio Network},
  journal      = {Sensors},
  volume       = {20},
  number       = {5},
  pages        = {1264},
  year         = {2020},
  url          = {https://doi.org/10.3390/s20051264},
  doi          = {10.3390/S20051264},
  timestamp    = {Sat, 13 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/FangLLPY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tie/WangCHMY20,
  author       = {Yi{-}Feng Wang and
                  Bo Chen and
                  Yuqi Hou and
                  Zhun Meng and
                  Yixian Yang},
  title        = {Analysis and Design of a 1-MHz Bidirectional Multi-CLLC Resonant {DC-DC}
                  Converter With GaN Devices},
  journal      = {{IEEE} Trans. Ind. Electron.},
  volume       = {67},
  number       = {2},
  pages        = {1425--1434},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIE.2019.2899549},
  doi          = {10.1109/TIE.2019.2899549},
  timestamp    = {Wed, 26 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tie/WangCHMY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/HaoXSCFY20,
  author       = {Jie Hao and
                  Shu{-}Tao Xia and
                  Kenneth W. Shum and
                  Bin Chen and
                  Fang{-}Wei Fu and
                  Yixian Yang},
  title        = {Bounds and Constructions of Locally Repairable Codes: Parity-Check
                  Matrix Approach},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {66},
  number       = {12},
  pages        = {7465--7474},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIT.2020.3021707},
  doi          = {10.1109/TIT.2020.3021707},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/HaoXSCFY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmm/LiWWY20,
  author       = {Lixiang Li and
                  Guoqian Wen and
                  Zeming Wang and
                  Yixian Yang},
  title        = {Efficient and Secure Image Communication System Based on Compressed
                  Sensing for IoT Monitoring Applications},
  journal      = {{IEEE} Trans. Multim.},
  volume       = {22},
  number       = {1},
  pages        = {82--95},
  year         = {2020},
  url          = {https://doi.org/10.1109/TMM.2019.2923111},
  doi          = {10.1109/TMM.2019.2923111},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmm/LiWWY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icbct/0001YPY20,
  author       = {Lixiang Li and
                  Jin Yan and
                  Haipeng Peng and
                  Yixian Yang},
  title        = {An Improved Consensus Mechanism for the Blockchain Based on Credit
                  Rewards and Punishments},
  booktitle    = {ICBCT'20: The 2nd International Conference on Blockchain Technology,
                  Hilo, HI, USA, March 12-14, 2020},
  pages        = {105--109},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3390566.3391668},
  doi          = {10.1145/3390566.3391668},
  timestamp    = {Mon, 10 Aug 2020 13:47:33 +0200},
  biburl       = {https://dblp.org/rec/conf/icbct/0001YPY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/XuDXHCY20,
  author       = {Zixiao Xu and
                  Qin{-}yun Dai and
                  Gang Xu and
                  He Huang and
                  Xiu{-}Bo Chen and
                  Yi{-}Xian Yang},
  editor       = {Xingming Sun and
                  Jinwei Wang and
                  Elisa Bertino},
  title        = {IoT Device Recognition Framework Based on Network Protocol Keyword
                  Query},
  booktitle    = {Artificial Intelligence and Security - 6th International Conference,
                  {ICAIS} 2020, Hohhot, China, July 17-20, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12239},
  pages        = {219--231},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-57884-8\_20},
  doi          = {10.1007/978-3-030-57884-8\_20},
  timestamp    = {Mon, 07 Sep 2020 19:48:41 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/XuDXHCY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/Hao0XFY20,
  author       = {Jie Hao and
                  Jun Zhang and
                  Shu{-}Tao Xia and
                  Fang{-}Wei Fu and
                  Yi{-}Xian Yang},
  title        = {Weight Distributions of q-ary Optimal Locally Repairable Codes with
                  Locality 2, Distance 5 and Even Dimension},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2020,
                  Los Angeles, CA, USA, June 21-26, 2020},
  pages        = {611--615},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ISIT44484.2020.9174123},
  doi          = {10.1109/ISIT44484.2020.9174123},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isit/Hao0XFY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/SunXCYY19,
  author       = {Yi{-}Ru Sun and
                  Gang Xu and
                  Xiu{-}Bo Chen and
                  Yu Yang and
                  Yi{-}Xian Yang},
  title        = {Asymmetric Controlled Bidirectional Remote Preparation of Single-
                  and Three-Qubit Equatorial State in Noisy Environment},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {2811--2822},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2018.2885340},
  doi          = {10.1109/ACCESS.2018.2885340},
  timestamp    = {Fri, 18 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/SunXCYY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ChenWXY19,
  author       = {Xiu{-}Bo Chen and
                  Ya{-}Lan Wang and
                  Gang Xu and
                  Yi{-}Xian Yang},
  title        = {Quantum Network Communication With a Novel Discrete-Time Quantum Walk},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {13634--13642},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2018.2890719},
  doi          = {10.1109/ACCESS.2018.2890719},
  timestamp    = {Wed, 27 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ChenWXY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WangTPY19,
  author       = {Licheng Wang and
                  Yanmei Tian and
                  Yun Pan and
                  Yixian Yang},
  title        = {New Construction of Blind Signatures From Braid Groups},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {36549--36557},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2904146},
  doi          = {10.1109/ACCESS.2019.2904146},
  timestamp    = {Tue, 16 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/WangTPY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ChenLPLZY19,
  author       = {Zigang Chen and
                  Lixiang Li and
                  Haipeng Peng and
                  Yuhong Liu and
                  Haihua Zhu and
                  Yixian Yang},
  title        = {Sparse General Non-Negative Matrix Factorization Based on Left Semi-Tensor
                  Product},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {81599--81611},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2924140},
  doi          = {10.1109/ACCESS.2019.2924140},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ChenLPLZY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/DengYC19,
  author       = {Lunzhi Deng and
                  Yixian Yang and
                  Yuling Chen},
  title        = {Certificateless Short Aggregate Signature Scheme for Mobile Devices},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {87162--87168},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2923697},
  doi          = {10.1109/ACCESS.2019.2923697},
  timestamp    = {Thu, 08 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/DengYC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/BianLLY19,
  author       = {Jianchao Bian and
                  Shoushan Luo and
                  Zhengwen Li and
                  Yixian Yang},
  title        = {Optimal Weakly Secure Minimum Storage Regenerating Codes Scheme},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {151120--151130},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2947248},
  doi          = {10.1109/ACCESS.2019.2947248},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/BianLLY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WangLLXZCYY19,
  author       = {Yunfeng Wang and
                  Mingzhen Li and
                  Shoushan Luo and
                  Yang Xin and
                  Hongliang Zhu and
                  Yuling Chen and
                  Guangcan Yang and
                  Yixian Yang},
  title        = {{LRM:} {A} Location Recombination Mechanism for Achieving Trajectory
                  k-Anonymity Privacy Protection},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {182886--182905},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2960008},
  doi          = {10.1109/ACCESS.2019.2960008},
  timestamp    = {Mon, 06 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/WangLLXZCYY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/LiXCQNY19,
  author       = {Zhen{-}Zhen Li and
                  Gang Xu and
                  Xiu{-}Bo Chen and
                  Zhiguo Qu and
                  Xinxin Niu and
                  Yi{-}Xian Yang},
  title        = {Efficient quantum state transmission via perfect quantum network coding},
  journal      = {Sci. China Inf. Sci.},
  volume       = {62},
  number       = {1},
  pages        = {12501:1--12501:14},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11432-018-9592-9},
  doi          = {10.1007/S11432-018-9592-9},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/LiXCQNY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/ZhuCY19,
  author       = {Haihua Zhu and
                  Xiu{-}Bo Chen and
                  Yi{-}Xian Yang},
  title        = {A quantum image dual-scrambling encryption scheme based on random
                  permutation},
  journal      = {Sci. China Inf. Sci.},
  volume       = {62},
  number       = {12},
  pages        = {229501},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11432-018-1514-y},
  doi          = {10.1007/S11432-018-1514-Y},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/ZhuCY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/HongWSYAWXY19,
  author       = {Haibo Hong and
                  Licheng Wang and
                  Jun Shao and
                  Jianhua Yan and
                  Haseeb Ahmad and
                  Guiyi Wei and
                  Mande Xie and
                  Yixian Yang},
  title        = {A Miniature {CCA} Public Key Encryption Scheme Based on Non-abelian
                  Factorization Problem in Finite Groups of Lie Type},
  journal      = {Comput. J.},
  volume       = {62},
  number       = {12},
  pages        = {1840--1848},
  year         = {2019},
  url          = {https://doi.org/10.1093/comjnl/bxz068},
  doi          = {10.1093/COMJNL/BXZ068},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/HongWSYAWXY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/ZhuMDGY19,
  author       = {Xiaoning Zhu and
                  Qingyue Meng and
                  Bojian Ding and
                  Lize Gu and
                  Yixian Yang},
  title        = {Weighted pooling for image recognition of deep convolutional neural
                  networks},
  journal      = {Clust. Comput.},
  volume       = {22},
  number       = {Supplement},
  pages        = {9371--9383},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10586-018-2165-4},
  doi          = {10.1007/S10586-018-2165-4},
  timestamp    = {Tue, 29 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/ZhuMDGY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cnsns/Zheng0PXYZ019,
  author       = {Mingwen Zheng and
                  Lixiang Li and
                  Haipeng Peng and
                  Jinghua Xiao and
                  Yixian Yang and
                  Yanping Zhang and
                  Hui Zhao},
  title        = {General decay synchronization of complex multi-links time-varying
                  dynamic network},
  journal      = {Commun. Nonlinear Sci. Numer. Simul.},
  volume       = {67},
  pages        = {108--123},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.cnsns.2018.06.015},
  doi          = {10.1016/J.CNSNS.2018.06.015},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cnsns/Zheng0PXYZ019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YangPCC19,
  author       = {Yi{-}Xian Yang and
                  Kung{-}Jui Pai and
                  Ruay{-}Shiung Chang and
                  Jou{-}Ming Chang},
  title        = {Constructing Two Completely Independent Spanning Trees in Balanced
                  Hypercubes},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {102-D},
  number       = {12},
  pages        = {2409--2412},
  year         = {2019},
  url          = {https://doi.org/10.1587/transinf.2019PAL0001},
  doi          = {10.1587/TRANSINF.2019PAL0001},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/YangPCC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijon/ChenLPYMW19,
  author       = {Chuan Chen and
                  Lixiang Li and
                  Haipeng Peng and
                  Yixian Yang and
                  Ling Mi and
                  Lianhai Wang},
  title        = {A new fixed-time stability theorem and its application to the synchronization
                  control of memristive neural networks},
  journal      = {Neurocomputing},
  volume       = {349},
  pages        = {290--300},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.neucom.2019.03.040},
  doi          = {10.1016/J.NEUCOM.2019.03.040},
  timestamp    = {Sat, 13 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijon/ChenLPYMW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LiLPYC19,
  author       = {Lixiang Li and
                  Lifei Liu and
                  Haipeng Peng and
                  Yixian Yang and
                  Shizhuo Cheng},
  title        = {Flexible and Secure Data Transmission System Based on Semitensor Compressive
                  Sensing in Wireless Body Area Networks},
  journal      = {{IEEE} Internet Things J.},
  volume       = {6},
  number       = {2},
  pages        = {3212--3227},
  year         = {2019},
  url          = {https://doi.org/10.1109/JIOT.2018.2881129},
  doi          = {10.1109/JIOT.2018.2881129},
  timestamp    = {Sat, 13 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/LiLPYC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/PengMLSY19,
  author       = {Haipeng Peng and
                  Yaqi Mi and
                  Lixiang Li and
                  Harry Eugene Stanley and
                  Yixian Yang},
  title        = {P-Tensor Product in Compressed Sensing},
  journal      = {{IEEE} Internet Things J.},
  volume       = {6},
  number       = {2},
  pages        = {3492--3511},
  year         = {2019},
  url          = {https://doi.org/10.1109/JIOT.2018.2886841},
  doi          = {10.1109/JIOT.2018.2886841},
  timestamp    = {Sat, 13 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/PengMLSY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ChenSXY19,
  author       = {Xiu{-}Bo Chen and
                  Yi{-}Ru Sun and
                  Gang Xu and
                  Yi{-}Xian Yang},
  title        = {Quantum homomorphic encryption scheme with flexible number of evaluator
                  based on (\emph{k, n})-threshold quantum state sharing},
  journal      = {Inf. Sci.},
  volume       = {501},
  pages        = {172--181},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ins.2019.06.009},
  doi          = {10.1016/J.INS.2019.06.009},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/ChenSXY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/BianLLZY19,
  author       = {Jianchao Bian and
                  Shoushan Luo and
                  Wei Li and
                  Yaxing Zha and
                  Yixian Yang},
  title        = {{IR-RBT} Codes: {A} New Scheme of Regenerating Codes for Tolerating
                  Node and Intra-node Failures in Distributed Storage Systems},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {13},
  number       = {10},
  pages        = {5058--5077},
  year         = {2019},
  url          = {https://doi.org/10.3837/tiis.2019.10.013},
  doi          = {10.3837/TIIS.2019.10.013},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/BianLLZY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/WangSLSY19,
  author       = {Licheng Wang and
                  Xiaoying Shen and
                  Jing Li and
                  Jun Shao and
                  Yixian Yang},
  title        = {Cryptographic primitives in blockchains},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {127},
  pages        = {43--58},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jnca.2018.11.003},
  doi          = {10.1016/J.JNCA.2018.11.003},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/WangSLSY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nca/QiuLPY19,
  author       = {Baolin Qiu and
                  Lixiang Li and
                  Haipeng Peng and
                  Yixian Yang},
  title        = {Asymptotic and finite-time synchronization of memristor-based switching
                  networks with multi-links and impulsive perturbation},
  journal      = {Neural Comput. Appl.},
  volume       = {31},
  number       = {8},
  pages        = {4031--4047},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00521-017-3312-1},
  doi          = {10.1007/S00521-017-3312-1},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nca/QiuLPY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nn/ChenLPY19,
  author       = {Chuan Chen and
                  Lixiang Li and
                  Haipeng Peng and
                  Yixian Yang},
  title        = {Fixed-time synchronization of inertial memristor-based neural networks
                  with discrete delay},
  journal      = {Neural Networks},
  volume       = {109},
  pages        = {81--89},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.neunet.2018.10.011},
  doi          = {10.1016/J.NEUNET.2018.10.011},
  timestamp    = {Sat, 13 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nn/ChenLPY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/LiXCY19,
  author       = {Zhen{-}Zhen Li and
                  Gang Xu and
                  Xiu{-}Bo Chen and
                  Yi{-}Xian Yang},
  title        = {Secure quantum network coding based on quantum homomorphic message
                  authentication},
  journal      = {Quantum Inf. Process.},
  volume       = {18},
  number       = {1},
  pages        = {14},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11128-018-2127-z},
  doi          = {10.1007/S11128-018-2127-Z},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/LiXCY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/SunXDXCY19,
  author       = {Yi{-}Ru Sun and
                  Nan Xiang and
                  Zhao Dou and
                  Gang Xu and
                  Xiu{-}Bo Chen and
                  Yi{-}Xian Yang},
  title        = {A universal protocol for controlled bidirectional quantum state transmission},
  journal      = {Quantum Inf. Process.},
  volume       = {18},
  number       = {9},
  pages        = {281},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11128-019-2390-7},
  doi          = {10.1007/S11128-019-2390-7},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/SunXDXCY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ShenZWY19,
  author       = {Yanping Shen and
                  Kangfeng Zheng and
                  Chunhua Wu and
                  Yixian Yang},
  title        = {A Neighbor Prototype Selection Method Based on {CCHPSO} for Intrusion
                  Detection},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {1283495:1--1283495:9},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/1283495},
  doi          = {10.1155/2019/1283495},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ShenZWY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/YangZWY19,
  author       = {Yanqing Yang and
                  Kangfeng Zheng and
                  Chunhua Wu and
                  Yixian Yang},
  title        = {Improving the Classification Effectiveness of Intrusion Detection
                  by Using Improved Conditional Variational AutoEncoder and Deep Neural
                  Network},
  journal      = {Sensors},
  volume       = {19},
  number       = {11},
  pages        = {2528},
  year         = {2019},
  url          = {https://doi.org/10.3390/s19112528},
  doi          = {10.3390/S19112528},
  timestamp    = {Sat, 30 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/YangZWY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/LuXLY19,
  author       = {Yanrong Lu and
                  Guangquan Xu and
                  Lixiang Li and
                  Yixian Yang},
  title        = {Robust Privacy-Preserving Mutual Authenticated Key Agreement Scheme
                  in Roaming Service for Global Mobility Networks},
  journal      = {{IEEE} Syst. J.},
  volume       = {13},
  number       = {2},
  pages        = {1454--1465},
  year         = {2019},
  url          = {https://doi.org/10.1109/JSYST.2018.2883349},
  doi          = {10.1109/JSYST.2018.2883349},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/LuXLY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/LuXLY19,
  author       = {Yanrong Lu and
                  Guangquan Xu and
                  Lixiang Li and
                  Yixian Yang},
  title        = {Anonymous three-factor authenticated key agreement for wireless sensor
                  networks},
  journal      = {Wirel. Networks},
  volume       = {25},
  number       = {4},
  pages        = {1461--1475},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11276-017-1604-0},
  doi          = {10.1007/S11276-017-1604-0},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/LuXLY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HuangLZY19,
  author       = {Qinlong Huang and
                  Nan Li and
                  Zhicheng Zhang and
                  Yixian Yang},
  title        = {Secure and Privacy-Preserving Warning Message Dissemination in Cloud-Assisted
                  Internet of Vehicles},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802649},
  doi          = {10.1109/CNS.2019.8802649},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/HuangLZY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/HaoSXY19,
  author       = {Jie Hao and
                  Kenneth W. Shum and
                  Shu{-}Tao Xia and
                  Yi{-}Xian Yang},
  title        = {Classification of Optimal Ternary (r, {\(\delta\)})-Locally Repairable
                  Codes Attaining the Singleton-like Bound},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2019,
                  Paris, France, July 7-12, 2019},
  pages        = {2828--2832},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ISIT.2019.8849762},
  doi          = {10.1109/ISIT.2019.8849762},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/HaoSXY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhengLPXYZ18,
  author       = {Mingwen Zheng and
                  Lixiang Li and
                  Haipeng Peng and
                  Jinghua Xiao and
                  Yixian Yang and
                  Yanping Zhang},
  title        = {Fixed-Time Synchronization of Memristive Fuzzy {BAM} Cellular Neural
                  Networks With Time-Varying Delays Based on Feedback Controllers},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {12085--12102},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2805183},
  doi          = {10.1109/ACCESS.2018.2805183},
  timestamp    = {Sat, 13 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZhengLPXYZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HuangYW18,
  author       = {Qinlong Huang and
                  Yixian Yang and
                  Licheng Wang},
  title        = {Correction to "Secure Data Access Control With Ciphertext Update
                  and Computation Outsourcing in Fog Computing for Internet of Things"},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {17245},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2823178},
  doi          = {10.1109/ACCESS.2018.2823178},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/HuangYW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/GaoCCSNY18,
  author       = {Yulong Gao and
                  Xiu{-}Bo Chen and
                  Yu{-}Ling Chen and
                  Ying Sun and
                  Xinxin Niu and
                  Yi{-}Xian Yang},
  title        = {A Secure Cryptocurrency Scheme Based on Post-Quantum Blockchain},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {27205--27213},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2827203},
  doi          = {10.1109/ACCESS.2018.2827203},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/GaoCCSNY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HuangYHY18,
  author       = {Qinlong Huang and
                  Wei Yue and
                  Yue He and
                  Yixian Yang},
  title        = {Secure Identity-Based Data Sharing and Profile Matching for Mobile
                  Healthcare Social Networks in Cloud Computing},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {36584--36594},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2852784},
  doi          = {10.1109/ACCESS.2018.2852784},
  timestamp    = {Tue, 17 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/HuangYHY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ChenLPY18,
  author       = {Chuan Chen and
                  Lixiang Li and
                  Haipeng Peng and
                  Yixian Yang},
  title        = {Adaptive Lag Synchronization of Memristive Neural Networks With Mixed
                  Delays},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {40768--40777},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2858246},
  doi          = {10.1109/ACCESS.2018.2858246},
  timestamp    = {Sat, 13 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ChenLPY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/ChenLPY18,
  author       = {Chuan Chen and
                  Lixiang Li and
                  Haipeng Peng and
                  Yixian Yang},
  title        = {Adaptive synchronization of memristor-based {BAM} neural networks
                  with mixed delays},
  journal      = {Appl. Math. Comput.},
  volume       = {322},
  pages        = {100--110},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.amc.2017.11.037},
  doi          = {10.1016/J.AMC.2017.11.037},
  timestamp    = {Sat, 13 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amc/ChenLPY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/DingY18,
  author       = {Hai{-}yang Ding and
                  Yixian Yang},
  title        = {Data hiding in color halftone images based on new conjugate property},
  journal      = {Comput. Electr. Eng.},
  volume       = {70},
  pages        = {302--316},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.compeleceng.2016.06.007},
  doi          = {10.1016/J.COMPELECENG.2016.06.007},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/DingY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/DouXCLY18,
  author       = {Zhao Dou and
                  Gang Xu and
                  Xiu{-}Bo Chen and
                  Xin Liu and
                  Yi{-}Xian Yang},
  title        = {A secure rational quantum state sharing protocol},
  journal      = {Sci. China Inf. Sci.},
  volume       = {61},
  number       = {2},
  pages        = {022501:1--022501:12},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11432-016-9151-x},
  doi          = {10.1007/S11432-016-9151-X},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/DouXCLY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ShenZWZNY18,
  author       = {Yanping Shen and
                  Kangfeng Zheng and
                  Chunhua Wu and
                  Mingwu Zhang and
                  Xinxin Niu and
                  Yixian Yang},
  title        = {An Ensemble Method based on Selection Using Bat Algorithm for Intrusion
                  Detection},
  journal      = {Comput. J.},
  volume       = {61},
  number       = {4},
  pages        = {526--538},
  year         = {2018},
  url          = {https://doi.org/10.1093/comjnl/bxx101},
  doi          = {10.1093/COMJNL/BXX101},
  timestamp    = {Tue, 24 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/ShenZWZNY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/AhmadDWAHY18,
  author       = {Haseeb Ahmad and
                  Ali Daud and
                  Licheng Wang and
                  Ibrar Ahmad and
                  Muhammad Hafeez and
                  Yixian Yang},
  title        = {Quantifying team precedence in the game of cricket},
  journal      = {Clust. Comput.},
  volume       = {21},
  number       = {1},
  pages        = {523--537},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10586-017-0919-z},
  doi          = {10.1007/S10586-017-0919-Z},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cluster/AhmadDWAHY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/WangZDWCY18,
  author       = {Licheng Wang and
                  Zonghua Zhang and
                  Mianxiong Dong and
                  Lihua Wang and
                  Zhenfu Cao and
                  Yixian Yang},
  title        = {Securing Named Data Networking: Attribute-Based Encryption and Beyond},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {56},
  number       = {11},
  pages        = {76--81},
  year         = {2018},
  url          = {https://doi.org/10.1109/MCOM.2018.1701123},
  doi          = {10.1109/MCOM.2018.1701123},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/WangZDWCY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cnsns/Zheng0PXYZ018,
  author       = {Mingwen Zheng and
                  Lixiang Li and
                  Haipeng Peng and
                  Jinghua Xiao and
                  Yixian Yang and
                  Yanping Zhang and
                  Hui Zhao},
  title        = {Finite-time stability and synchronization of memristor-based fractional-order
                  fuzzy cellular neural networks},
  journal      = {Commun. Nonlinear Sci. Numer. Simul.},
  volume       = {59},
  pages        = {272--291},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cnsns.2017.11.025},
  doi          = {10.1016/J.CNSNS.2017.11.025},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cnsns/Zheng0PXYZ018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eaai/ChenLXYLL18,
  author       = {Yonggang Chen and
                  Lixiang Li and
                  Jinghua Xiao and
                  Yixian Yang and
                  Jun Liang and
                  Tao Li},
  title        = {Particle swarm optimizer with crossover operation},
  journal      = {Eng. Appl. Artif. Intell.},
  volume       = {70},
  pages        = {159--169},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.engappai.2018.01.009},
  doi          = {10.1016/J.ENGAPPAI.2018.01.009},
  timestamp    = {Sat, 13 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eaai/ChenLXYLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejwcn/ZhuDLGY18,
  author       = {Xiaoning Zhu and
                  Bojian Ding and
                  Wenjun Li and
                  Lize Gu and
                  Yixian Yang},
  title        = {On development of security monitoring system via wireless sensing
                  network},
  journal      = {{EURASIP} J. Wirel. Commun. Netw.},
  volume       = {2018},
  pages        = {221},
  year         = {2018},
  url          = {https://doi.org/10.1186/s13638-018-1235-x},
  doi          = {10.1186/S13638-018-1235-X},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejwcn/ZhuDLGY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/AhmadWHLDAY18,
  author       = {Haseeb Ahmad and
                  Licheng Wang and
                  Haibo Hong and
                  Jing Li and
                  Hassan Dawood and
                  Manzoor Ahmed and
                  Yixian Yang},
  title        = {Primitives towards verifiable computation: a survey},
  journal      = {Frontiers Comput. Sci.},
  volume       = {12},
  number       = {3},
  pages        = {451--478},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11704-016-6148-4},
  doi          = {10.1007/S11704-016-6148-4},
  timestamp    = {Sat, 31 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fcsc/AhmadWHLDAY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/HuangYF18,
  author       = {Qinlong Huang and
                  Yixian Yang and
                  Jingyi Fu},
  title        = {{PRECISE:} Identity-based private data sharing with conditional proxy
                  re-encryption in online social networks},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {86},
  pages        = {1523--1533},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2017.05.026},
  doi          = {10.1016/J.FUTURE.2017.05.026},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/HuangYF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/HuangYS18,
  author       = {Qinlong Huang and
                  Yixian Yang and
                  Mansuo Shen},
  title        = {Corrigendum to "Secure and efficient data collaboration with
                  hierarchical attribute-based encryption in cloud computing" [Future
                  Gener. Comput. Syst. 72 {(2017)} 239-249]},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {86},
  pages        = {1534},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2018.05.041},
  doi          = {10.1016/J.FUTURE.2018.05.041},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/HuangYS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/DengYGC18,
  author       = {Lunzhi Deng and
                  Yixian Yang and
                  Ronghai Gao and
                  Yuling Chen},
  title        = {Certificateless short signature scheme from pairing in the standard
                  model},
  journal      = {Int. J. Commun. Syst.},
  volume       = {31},
  number       = {17},
  year         = {2018},
  url          = {https://doi.org/10.1002/dac.3796},
  doi          = {10.1002/DAC.3796},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/DengYGC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijon/ChenLPLY18,
  author       = {Zigang Chen and
                  Lixiang Li and
                  Haipeng Peng and
                  Yuhong Liu and
                  Yixian Yang},
  title        = {Incremental general non-negative matrix factorization without dimension
                  matching constraints},
  journal      = {Neurocomputing},
  volume       = {311},
  pages        = {344--352},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.neucom.2018.05.067},
  doi          = {10.1016/J.NEUCOM.2018.05.067},
  timestamp    = {Sat, 13 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijon/ChenLPLY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jfi/ZhengLPXYZZ18,
  author       = {Mingwen Zheng and
                  Lixiang Li and
                  Haipeng Peng and
                  Jinghua Xiao and
                  Yixian Yang and
                  Yanping Zhang and
                  Hui Zhao},
  title        = {Fixed-time synchronization of memristor-based fuzzy cellular neural
                  network with time-varying delay},
  journal      = {J. Frankl. Inst.},
  volume       = {355},
  number       = {14},
  pages        = {6780--6809},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jfranklin.2018.06.041},
  doi          = {10.1016/J.JFRANKLIN.2018.06.041},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jfi/ZhengLPXYZZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nca/ZhengLPXYZ18,
  author       = {Mingwen Zheng and
                  Lixiang Li and
                  Haipeng Peng and
                  Jinghua Xiao and
                  Yixian Yang and
                  Hui Zhao},
  title        = {Parameters estimation and synchronization of uncertain coupling recurrent
                  dynamical neural networks with time-varying delays based on adaptive
                  control},
  journal      = {Neural Comput. Appl.},
  volume       = {30},
  number       = {7},
  pages        = {2217--2227},
  year         = {2018},
  url          = {https://doi.org/10.1007/s00521-016-2822-6},
  doi          = {10.1007/S00521-016-2822-6},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nca/ZhengLPXYZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/YangNLP18,
  author       = {Yixian Yang and
                  Xinxin Niu and
                  Lixiang Li and
                  Haipeng Peng},
  title        = {A Secure and Efficient Transmission Method in Connected Vehicular
                  Cloud Computing},
  journal      = {{IEEE} Netw.},
  volume       = {32},
  number       = {3},
  pages        = {14--19},
  year         = {2018},
  url          = {https://doi.org/10.1109/MNET.2018.1700324},
  doi          = {10.1109/MNET.2018.1700324},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/YangNLP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/npl/ZhaoLPKXY18,
  author       = {Hui Zhao and
                  Lixiang Li and
                  Haipeng Peng and
                  J{\"{u}}rgen Kurths and
                  Jinghua Xiao and
                  Yixian Yang},
  title        = {Finite-Time Robust Synchronization of Memrisive Neural Network with
                  Perturbation},
  journal      = {Neural Process. Lett.},
  volume       = {47},
  number       = {2},
  pages        = {509--533},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11063-017-9664-9},
  doi          = {10.1007/S11063-017-9664-9},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/npl/ZhaoLPKXY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/npl/ChenLPYL18,
  author       = {Chuan Chen and
                  Lixiang Li and
                  Haipeng Peng and
                  Yixian Yang and
                  Tao Li},
  title        = {Synchronization Control of Coupled Memristor-Based Neural Networks
                  with Mixed Delays and Stochastic Perturbations},
  journal      = {Neural Process. Lett.},
  volume       = {47},
  number       = {2},
  pages        = {679--696},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11063-017-9675-6},
  doi          = {10.1007/S11063-017-9675-6},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/npl/ChenLPYL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/npl/QiuLPY18,
  author       = {Baolin Qiu and
                  Lixiang Li and
                  Haipeng Peng and
                  Yixian Yang},
  title        = {Synchronization of Multi-links Memristor-Based Switching Networks
                  Under Uniform Random Attacks},
  journal      = {Neural Process. Lett.},
  volume       = {48},
  number       = {3},
  pages        = {1431--1458},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11063-017-9779-z},
  doi          = {10.1007/S11063-017-9779-Z},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/npl/QiuLPY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/YangNLPRQ18,
  author       = {Yixian Yang and
                  Xinxin Niu and
                  Lixiang Li and
                  Haipeng Peng and
                  Jingfeng Ren and
                  Haochun Qi},
  title        = {General Theory of security and a study of hacker's behavior in big
                  data era},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {11},
  number       = {2},
  pages        = {210--219},
  year         = {2018},
  url          = {https://doi.org/10.1007/s12083-016-0517-5},
  doi          = {10.1007/S12083-016-0517-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/YangNLPRQ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/DouXCNY18,
  author       = {Zhao Dou and
                  Gang Xu and
                  Xiu{-}Bo Chen and
                  Xinxin Niu and
                  Yi{-}Xian Yang},
  title        = {Rational protocol of quantum secure multi-party computation},
  journal      = {Quantum Inf. Process.},
  volume       = {17},
  number       = {8},
  pages        = {199},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11128-018-1967-x},
  doi          = {10.1007/S11128-018-1967-X},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/DouXCNY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/ChenTXDCY18,
  author       = {Xiu{-}Bo Chen and
                  Xin Tang and
                  Gang Xu and
                  Zhao Dou and
                  Yu{-}Ling Chen and
                  Yi{-}Xian Yang},
  title        = {Cryptanalysis of secret sharing with a single \emph{d}-level quantum
                  system},
  journal      = {Quantum Inf. Process.},
  volume       = {17},
  number       = {9},
  pages        = {225},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11128-018-1988-5},
  doi          = {10.1007/S11128-018-1988-5},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/ChenTXDCY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/QiXCWCY18,
  author       = {Jia{-}Min Qi and
                  Gang Xu and
                  Xiu{-}Bo Chen and
                  Tian{-}Yin Wang and
                  Xiao{-}Qiu Cai and
                  Yi{-}Xian Yang},
  title        = {Two authenticated quantum dialogue protocols based on three-particle
                  entangled states},
  journal      = {Quantum Inf. Process.},
  volume       = {17},
  number       = {9},
  pages        = {247},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11128-018-2005-8},
  doi          = {10.1007/S11128-018-2005-8},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/QiXCWCY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HuangHYY18,
  author       = {Qinlong Huang and
                  Yue He and
                  Wei Yue and
                  Yixian Yang},
  title        = {Adaptive Secure Cross-Cloud Data Collaboration with Identity-Based
                  Cryptography and Conditional Proxy Re-Encryption},
  journal      = {Secur. Commun. Networks},
  volume       = {2018},
  pages        = {8932325:1--8932325:12},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/8932325},
  doi          = {10.1155/2018/8932325},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HuangHYY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/HuangYS18,
  author       = {Qinlong Huang and
                  Yixian Yang and
                  Yuxiang Shi},
  title        = {SmartVeh: Secure and Efficient Message Access Control and Authentication
                  for Vehicular Cloud Computing},
  journal      = {Sensors},
  volume       = {18},
  number       = {2},
  pages        = {666},
  year         = {2018},
  url          = {https://doi.org/10.3390/s18020666},
  doi          = {10.3390/S18020666},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/HuangYS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/ZhuDMGY18,
  author       = {Xiaoning Zhu and
                  Bojian Ding and
                  Qingyue Meng and
                  Lize Gu and
                  Yixian Yang},
  title        = {Statistic Experience Based Adaptive One-Shot Detector {(EAO)} for
                  Camera Sensing System},
  journal      = {Sensors},
  volume       = {18},
  number       = {9},
  pages        = {3041},
  year         = {2018},
  url          = {https://doi.org/10.3390/s18093041},
  doi          = {10.3390/S18093041},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/ZhuDMGY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmm/ChenLPLY18,
  author       = {Zigang Chen and
                  Lixiang Li and
                  Haipeng Peng and
                  Yuhong Liu and
                  Yixian Yang},
  title        = {A Novel Digital Watermarking Based on General Non-Negative Matrix
                  Factorization},
  journal      = {{IEEE} Trans. Multim.},
  volume       = {20},
  number       = {8},
  pages        = {1973--1986},
  year         = {2018},
  url          = {https://doi.org/10.1109/TMM.2018.2794985},
  doi          = {10.1109/TMM.2018.2794985},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmm/ChenLPLY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/www/HuangWY18,
  author       = {Qinlong Huang and
                  Licheng Wang and
                  Yixian Yang},
  title        = {{DECENT:} Secure and fine-grained data access control with policy
                  updating for constrained IoT devices},
  journal      = {World Wide Web},
  volume       = {21},
  number       = {1},
  pages        = {151--167},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11280-017-0462-0},
  doi          = {10.1007/S11280-017-0462-0},
  timestamp    = {Wed, 24 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/www/HuangWY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/YueLSZY18,
  author       = {Zhen Yue and
                  Zichen Li and
                  Peifei Song and
                  Shumei Zhang and
                  Yixian Yang},
  editor       = {Sorel Reisman and
                  Sheikh Iqbal Ahamed and
                  Claudio Demartini and
                  Thomas M. Conte and
                  Ling Liu and
                  William R. Claycomb and
                  Motonori Nakamura and
                  Edmundo Tovar and
                  Stelvio Cimato and
                  Chung{-}Horng Lung and
                  Hiroki Takakura and
                  Ji{-}Jiang Yang and
                  Toyokazu Akiyama and
                  Zhiyong Zhang and
                  Kamrul Hasan},
  title        = {A high-Capacity Watermarking Algorithm Using two Bins Histogram Modification},
  booktitle    = {2018 {IEEE} 42nd Annual Computer Software and Applications Conference,
                  {COMPSAC} 2018, Tokyo, Japan, 23-27 July 2018, Volume 2},
  pages        = {382--387},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/COMPSAC.2018.10262},
  doi          = {10.1109/COMPSAC.2018.10262},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/YueLSZY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/HuangLY18,
  author       = {Qinlong Huang and
                  Nan Li and
                  Yixian Yang},
  title        = {{DACSC:} Dynamic and Fine-Grained Access Control for Secure Data Collaboration
                  in Cloud Computing},
  booktitle    = {{IEEE} Global Communications Conference, {GLOBECOM} 2018, Abu Dhabi,
                  United Arab Emirates, December 9-13, 2018},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/GLOCOM.2018.8648113},
  doi          = {10.1109/GLOCOM.2018.8648113},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/HuangLY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/SunXCY18,
  author       = {Yi{-}Ru Sun and
                  Gang Xu and
                  Xiu{-}Bo Chen and
                  Yi{-}Xian Yang},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {Controlled Bidirectional Remote Preparation of Single- and Two-Qubit
                  State},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11065},
  pages        = {541--553},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00012-7\_49},
  doi          = {10.1007/978-3-030-00012-7\_49},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/SunXCY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/TangXLCY18,
  author       = {Xin Tang and
                  Gang Xu and
                  Kun{-}Chang Li and
                  Xiu{-}Bo Chen and
                  Yi{-}Xian Yang},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {Secure Multiparty Quantum Summation Based on d-Level Single Particles},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11065},
  pages        = {680--690},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00012-7\_62},
  doi          = {10.1007/978-3-030-00012-7\_62},
  timestamp    = {Thu, 13 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/TangXLCY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/HaoYSX18,
  author       = {Jie Hao and
                  Yi{-}Xian Yang and
                  Kenneth W. Shum and
                  Shu{-}Tao Xia},
  title        = {On the Maximal Code Length of Optimal Linear Locally Repairable Codes},
  booktitle    = {2018 {IEEE} International Symposium on Information Theory, {ISIT}
                  2018, Vail, CO, USA, June 17-22, 2018},
  pages        = {1326--1330},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ISIT.2018.8437466},
  doi          = {10.1109/ISIT.2018.8437466},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/HaoYSX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialsec/LiPLY18,
  author       = {Lixiang Li and
                  Haipeng Peng and
                  Liwei Liu and
                  Yixian Yang},
  title        = {An Efficient and Secure Transmission Model Based on Compressive Sensing},
  booktitle    = {2018 International Symposium on Security and Privacy in Social Networks
                  and Big Data, SocialSec 2018, Santa Clara, CA, USA, December 10-11,
                  2018},
  pages        = {27--32},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/SocialSec.2018.8760382},
  doi          = {10.1109/SOCIALSEC.2018.8760382},
  timestamp    = {Sat, 13 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/socialsec/LiPLY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialsec/ChenLPLZY18,
  author       = {Zigang Chen and
                  Lixiang Li and
                  Haipeng Peng and
                  Yuhong Liu and
                  Haihua Zhu and
                  Yixian Yang},
  title        = {An evaluation method of image scrambling degree based on pixel distribution},
  booktitle    = {2018 International Symposium on Security and Privacy in Social Networks
                  and Big Data, SocialSec 2018, Santa Clara, CA, USA, December 10-11,
                  2018},
  pages        = {33--38},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/SocialSec.2018.8760371},
  doi          = {10.1109/SOCIALSEC.2018.8760371},
  timestamp    = {Sat, 13 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/socialsec/ChenLPLZY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aaecc/HongWASY17,
  author       = {Haibo Hong and
                  Licheng Wang and
                  Haseeb Ahmad and
                  Jun Shao and
                  Yixian Yang},
  title        = {Minimal logarithmic signatures for one type of classical groups},
  journal      = {Appl. Algebra Eng. Commun. Comput.},
  volume       = {28},
  number       = {2},
  pages        = {177--192},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00200-016-0302-y},
  doi          = {10.1007/S00200-016-0302-Y},
  timestamp    = {Sat, 20 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aaecc/HongWASY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AhmadDWHDY17,
  author       = {Haseeb Ahmad and
                  Ali Daud and
                  Licheng Wang and
                  Haibo Hong and
                  Hussain Dawood and
                  Yixian Yang},
  title        = {Prediction of Rising Stars in the Game of Cricket},
  journal      = {{IEEE} Access},
  volume       = {5},
  pages        = {4104--4124},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACCESS.2017.2682162},
  doi          = {10.1109/ACCESS.2017.2682162},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/AhmadDWHDY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HuangYW17,
  author       = {Qinlong Huang and
                  Yixian Yang and
                  Licheng Wang},
  title        = {Secure Data Access Control With Ciphertext Update and Computation
                  Outsourcing in Fog Computing for Internet of Things},
  journal      = {{IEEE} Access},
  volume       = {5},
  pages        = {12941--12950},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACCESS.2017.2727054},
  doi          = {10.1109/ACCESS.2017.2727054},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/HuangYW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/asc/ChenLPXYS17,
  author       = {Yonggang Chen and
                  Lixiang Li and
                  Haipeng Peng and
                  Jinghua Xiao and
                  Yixian Yang and
                  Yuhui Shi},
  title        = {Particle swarm optimizer with two differential mutation},
  journal      = {Appl. Soft Comput.},
  volume       = {61},
  pages        = {314--330},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.asoc.2017.07.020},
  doi          = {10.1016/J.ASOC.2017.07.020},
  timestamp    = {Sat, 13 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/asc/ChenLPXYS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/HongWAYQ17,
  author       = {Haibo Hong and
                  Licheng Wang and
                  Haseeb Ahmad and
                  Yixian Yang and
                  Zhiguo Qu},
  title        = {Minimum length key in {MST} cryptosystems},
  journal      = {Sci. China Inf. Sci.},
  volume       = {60},
  number       = {5},
  pages        = {052106:1--052106:11},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11432-015-5479-3},
  doi          = {10.1007/S11432-015-5479-3},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/HongWAYQ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/HuangYS17,
  author       = {Qinlong Huang and
                  Yixian Yang and
                  Mansuo Shen},
  title        = {Secure and efficient data collaboration with hierarchical attribute-based
                  encryption in cloud computing},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {72},
  pages        = {239--249},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.future.2016.09.021},
  doi          = {10.1016/J.FUTURE.2016.09.021},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/HuangYS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/XuWZNY17,
  author       = {Yanping Xu and
                  Chunhua Wu and
                  Kangfeng Zheng and
                  Xinxin Niu and
                  Yixian Yang},
  title        = {Fuzzy-synthetic minority oversampling technique: Oversampling based
                  on fuzzy set theory for Android malware detection in imbalanced datasets},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {13},
  number       = {4},
  year         = {2017},
  url          = {https://doi.org/10.1177/1550147717703116},
  doi          = {10.1177/1550147717703116},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/XuWZNY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijon/ZhaoLPXYZ17,
  author       = {Hui Zhao and
                  Lixiang Li and
                  Haipeng Peng and
                  Jinghua Xiao and
                  Yixian Yang and
                  Mingwen Zheng},
  title        = {Finite-time topology identification and stochastic synchronization
                  of complex network with multiple time delays},
  journal      = {Neurocomputing},
  volume       = {219},
  pages        = {39--49},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.neucom.2016.09.014},
  doi          = {10.1016/J.NEUCOM.2016.09.014},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijon/ZhaoLPXYZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijon/ChenLPYL17,
  author       = {Chuan Chen and
                  Lixiang Li and
                  Haipeng Peng and
                  Yixian Yang and
                  Tao Li},
  title        = {Finite-time synchronization of memristor-based neural networks with
                  mixed delays},
  journal      = {Neurocomputing},
  volume       = {235},
  pages        = {83--89},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.neucom.2016.12.061},
  doi          = {10.1016/J.NEUCOM.2016.12.061},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijon/ChenLPYL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijon/ZhengLPXYZ17,
  author       = {Mingwen Zheng and
                  Lixiang Li and
                  Haipeng Peng and
                  Jinghua Xiao and
                  Yixian Yang and
                  Hui Zhao},
  title        = {Finite-time stability analysis for neutral-type neural networks with
                  hybrid time-varying delays without using Lyapunov method},
  journal      = {Neurocomputing},
  volume       = {238},
  pages        = {67--75},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.neucom.2017.01.037},
  doi          = {10.1016/J.NEUCOM.2017.01.037},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijon/ZhengLPXYZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/YangPLN17,
  author       = {Yixian Yang and
                  Haipeng Peng and
                  Lixiang Li and
                  Xinxin Niu},
  title        = {General Theory of Security and a Study Case in Internet of Things},
  journal      = {{IEEE} Internet Things J.},
  volume       = {4},
  number       = {2},
  pages        = {592--600},
  year         = {2017},
  url          = {https://doi.org/10.1109/JIOT.2016.2597150},
  doi          = {10.1109/JIOT.2016.2597150},
  timestamp    = {Sat, 13 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/YangPLN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itc/XiePLY17,
  author       = {Dong Xie and
                  Haipeng Peng and
                  Lixiang Li and
                  Yixian Yang},
  title        = {Homomorphic Signatures from Chameleon Hash Functions},
  journal      = {Inf. Technol. Control.},
  volume       = {46},
  number       = {2},
  pages        = {274--286},
  year         = {2017},
  url          = {https://doi.org/10.5755/j01.itc.46.2.14320},
  doi          = {10.5755/J01.ITC.46.2.14320},
  timestamp    = {Tue, 30 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itc/XiePLY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/HuZWY17,
  author       = {Yixun Hu and
                  Kangfeng Zheng and
                  Xu Wang and
                  Yixian Yang},
  title        = {{WORM-HUNTER:} {A} Worm Guard System using Software-defined Networking},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {11},
  number       = {1},
  pages        = {484--510},
  year         = {2017},
  url          = {https://doi.org/10.3837/tiis.2017.01.026},
  doi          = {10.3837/TIIS.2017.01.026},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/HuZWY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/DengYC17,
  author       = {Lunzhi Deng and
                  Yixian Yang and
                  Yuling Chen},
  title        = {Certificateless multi-signer universal designated multi-verifier signature
                  from elliptic curve group},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {11},
  number       = {11},
  pages        = {5625--5641},
  year         = {2017},
  url          = {https://doi.org/10.3837/tiis.2017.11.025},
  doi          = {10.3837/TIIS.2017.11.025},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/DengYC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/LuLPY17,
  author       = {Yanrong Lu and
                  Lixiang Li and
                  Haipeng Peng and
                  Yixian Yang},
  title        = {An anonymous two-factor authenticated key agreement scheme for session
                  initiation protocol using elliptic curve cryptography},
  journal      = {Multim. Tools Appl.},
  volume       = {76},
  number       = {2},
  pages        = {1801--1815},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11042-015-3166-4},
  doi          = {10.1007/S11042-015-3166-4},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/LuLPY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nn/ChenLPY17,
  author       = {Chuan Chen and
                  Lixiang Li and
                  Haipeng Peng and
                  Yixian Yang},
  title        = {Fixed-time synchronization of memristor-based {BAM} neural networks
                  with time-varying discrete delay},
  journal      = {Neural Networks},
  volume       = {96},
  pages        = {47--54},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.neunet.2017.08.012},
  doi          = {10.1016/J.NEUNET.2017.08.012},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nn/ChenLPY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/ChenSXJQY17,
  author       = {Xiu{-}Bo Chen and
                  Yi{-}Ru Sun and
                  Gang Xu and
                  Heng{-}Yue Jia and
                  Zhiguo Qu and
                  Yi{-}Xian Yang},
  title        = {Controlled bidirectional remote preparation of three-qubit state},
  journal      = {Quantum Inf. Process.},
  volume       = {16},
  number       = {10},
  pages        = {244},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11128-017-1690-z},
  doi          = {10.1007/S11128-017-1690-Z},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/ChenSXJQY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhouNZLY17,
  author       = {Yang Zhou and
                  Wei Ni and
                  Kangfeng Zheng and
                  Ren Ping Liu and
                  Yixian Yang},
  title        = {Scalable Node-Centric Route Mutation for Defense of Large-Scale Software-Defined
                  Networks},
  journal      = {Secur. Commun. Networks},
  volume       = {2017},
  pages        = {4651395:1--4651395:13},
  year         = {2017},
  url          = {https://doi.org/10.1155/2017/4651395},
  doi          = {10.1155/2017/4651395},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhouNZLY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HuangWY17,
  author       = {Qinlong Huang and
                  Licheng Wang and
                  Yixian Yang},
  title        = {Secure and Privacy-Preserving Data Sharing and Collaboration in Mobile
                  Healthcare Social Networks of Smart Cities},
  journal      = {Secur. Commun. Networks},
  volume       = {2017},
  pages        = {6426495:1--6426495:12},
  year         = {2017},
  url          = {https://doi.org/10.1155/2017/6426495},
  doi          = {10.1155/2017/6426495},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HuangWY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tbcas/PengTKLYW17,
  author       = {Haipeng Peng and
                  Ye Tian and
                  J{\"{u}}rgen Kurths and
                  Lixiang Li and
                  Yixian Yang and
                  Daoshun Wang},
  title        = {Secure and Energy-Efficient Data Transmission System Based on Chaotic
                  Compressive Sensing in Body-to-Body Networks},
  journal      = {{IEEE} Trans. Biomed. Circuits Syst.},
  volume       = {11},
  number       = {3},
  pages        = {558--573},
  year         = {2017},
  url          = {https://doi.org/10.1109/TBCAS.2017.2665659},
  doi          = {10.1109/TBCAS.2017.2665659},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tbcas/PengTKLYW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/LuLPY17,
  author       = {Yanrong Lu and
                  Lixiang Li and
                  Haipeng Peng and
                  Yixian Yang},
  title        = {A Novel Smart Card Based User Authentication and Key Agreement Scheme
                  for Heterogeneous Wireless Sensor Networks},
  journal      = {Wirel. Pers. Commun.},
  volume       = {96},
  number       = {1},
  pages        = {813--832},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11277-017-4203-6},
  doi          = {10.1007/S11277-017-4203-6},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/LuLPY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icycsee/ZhangLY17a,
  author       = {Jing Zhang and
                  Shoushan Luo and
                  Yixian Yang},
  editor       = {Beiji Zou and
                  Min Li and
                  Hongzhi Wang and
                  Xianhua Song and
                  Wei Xie and
                  Zeguang Lu},
  title        = {Secure Multi-party Comparison Protocol and Application},
  booktitle    = {Data Science - Third International Conference of Pioneering Computer
                  Scientists, Engineers and Educators, {ICPCSEE} 2017, Changsha, China,
                  September 22-24, 2017, Proceedings, Part {I}},
  series       = {Communications in Computer and Information Science},
  volume       = {727},
  pages        = {292--304},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-981-10-6385-5\_25},
  doi          = {10.1007/978-981-10-6385-5\_25},
  timestamp    = {Wed, 06 Jan 2021 14:57:34 +0100},
  biburl       = {https://dblp.org/rec/conf/icycsee/ZhangLY17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscit/0005NZLY17,
  author       = {Yang Zhou and
                  Wei Ni and
                  Kangfeng Zheng and
                  Ren Ping Liu and
                  Yixian Yang},
  title        = {Node-centric route mutation for large-scale {SDN} based on 3D earth
                  mover's distance model},
  booktitle    = {17th International Symposium on Communications and Information Technologies,
                  {ISCIT} 2017, Cairns, Australia, September 25-27, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ISCIT.2017.8261239},
  doi          = {10.1109/ISCIT.2017.8261239},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/iscit/0005NZLY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/LiCSLY16,
  author       = {Jing Li and
                  Xiubo Chen and
                  Xingming Sun and
                  Zongpeng Li and
                  Yixian Yang},
  title        = {Quantum network coding for multi-unicast problem based on 2D and 3D
                  cluster states},
  journal      = {Sci. China Inf. Sci.},
  volume       = {59},
  number       = {4},
  pages        = {042301:1--042301:15},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11432-016-5539-3},
  doi          = {10.1007/S11432-016-5539-3},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/LiCSLY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cii/XieHYY16,
  author       = {Min Xie and
                  Wei Huang and
                  Li Yang and
                  Yixian Yang},
  title        = {VOAuth: {A} solution to protect OAuth against phishing},
  journal      = {Comput. Ind.},
  volume       = {82},
  pages        = {151--159},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.compind.2016.06.001},
  doi          = {10.1016/J.COMPIND.2016.06.001},
  timestamp    = {Tue, 18 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cii/XieHYY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dsp/XiePLY16,
  author       = {Dong Xie and
                  Haipeng Peng and
                  Lixiang Li and
                  Yixian Yang},
  title        = {Semi-tensor compressed sensing},
  journal      = {Digit. Signal Process.},
  volume       = {58},
  pages        = {85--92},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.dsp.2016.07.003},
  doi          = {10.1016/J.DSP.2016.07.003},
  timestamp    = {Tue, 30 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dsp/XiePLY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ffa/HongWALYW16,
  author       = {Haibo Hong and
                  Licheng Wang and
                  Haseeb Ahmad and
                  Jing Li and
                  Yixian Yang and
                  Changzhong Wu},
  title        = {Construction of {DNA} codes by using algebraic number theory},
  journal      = {Finite Fields Their Appl.},
  volume       = {37},
  pages        = {328--343},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.ffa.2015.10.008},
  doi          = {10.1016/J.FFA.2015.10.008},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ffa/HongWALYW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/LiXCSY16,
  author       = {Zhen{-}Zhen Li and
                  Gang Xu and
                  Xiu{-}Bo Chen and
                  Xingming Sun and
                  Yi{-}Xian Yang},
  title        = {Multi-User Quantum Wireless Network Communication Based on Multi-Qubit
                  {GHZ} State},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {20},
  number       = {12},
  pages        = {2470--2473},
  year         = {2016},
  url          = {https://doi.org/10.1109/LCOMM.2016.2610434},
  doi          = {10.1109/LCOMM.2016.2610434},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icl/LiXCSY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itc/LuLPY16,
  author       = {Yanrong Lu and
                  Lixiang Li and
                  Haipeng Peng and
                  Yixian Yang},
  title        = {An advanced elliptic curve cryptography based mutual authentication
                  scheme for session initiation protocol},
  journal      = {Inf. Technol. Control.},
  volume       = {45},
  number       = {4},
  pages        = {393--400},
  year         = {2016},
  url          = {https://doi.org/10.5755/j01.itc.45.4.13401},
  doi          = {10.5755/J01.ITC.45.4.13401},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itc/LuLPY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/LuLPY16,
  author       = {Yanrong Lu and
                  Lixiang Li and
                  Haipeng Peng and
                  Yixian Yang},
  title        = {Robust {ID} based mutual authentication and key agreement scheme preserving
                  user anonymity in mobile networks},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {10},
  number       = {3},
  pages        = {1273--1288},
  year         = {2016},
  url          = {https://doi.org/10.3837/tiis.2016.03.018},
  doi          = {10.3837/TIIS.2016.03.018},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/LuLPY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/XiePLY16,
  author       = {Dong Xie and
                  Haipeng Peng and
                  Lixiang Li and
                  Yixian Yang},
  title        = {Efficient Post-Quantum Secure Network Coding Signatures in the Standard
                  Model},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {10},
  number       = {5},
  pages        = {2427--2445},
  year         = {2016},
  url          = {https://doi.org/10.3837/tiis.2016.05.026},
  doi          = {10.3837/TIIS.2016.05.026},
  timestamp    = {Tue, 30 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itiis/XiePLY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/npl/WangLPKXY16,
  author       = {Weiping Wang and
                  Lixiang Li and
                  Haipeng Peng and
                  J{\"{u}}rgen Kurths and
                  Jinghua Xiao and
                  Yixian Yang},
  title        = {Finite-Time Anti-synchronization Control of Memristive Neural Networks
                  With Stochastic Perturbations},
  journal      = {Neural Process. Lett.},
  volume       = {43},
  number       = {1},
  pages        = {49--63},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11063-014-9401-6},
  doi          = {10.1007/S11063-014-9401-6},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/npl/WangLPKXY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/npl/WangLPKXY16a,
  author       = {Weiping Wang and
                  Lixiang Li and
                  Haipeng Peng and
                  J{\"{u}}rgen Kurths and
                  Jinghua Xiao and
                  Yixian Yang},
  title        = {Anti-synchronization Control of Memristive Neural Networks with Multiple
                  Proportional Delays},
  journal      = {Neural Process. Lett.},
  volume       = {43},
  number       = {1},
  pages        = {269--283},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11063-015-9417-6},
  doi          = {10.1007/S11063-015-9417-6},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/npl/WangLPKXY16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/npl/ZhaoLPXY16,
  author       = {Hui Zhao and
                  Lixiang Li and
                  Haipeng Peng and
                  Jinghua Xiao and
                  Yixian Yang},
  title        = {Finite-Time Boundedness Analysis of Memristive Neural Network with
                  Time-Varying Delay},
  journal      = {Neural Process. Lett.},
  volume       = {44},
  number       = {3},
  pages        = {665--679},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11063-015-9487-5},
  doi          = {10.1007/S11063-015-9487-5},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/npl/ZhaoLPXY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/LuLPY16,
  author       = {Yanrong Lu and
                  Lixiang Li and
                  Haipeng Peng and
                  Yixian Yang},
  title        = {A secure and efficient mutual authentication scheme for session initiation
                  protocol},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {9},
  number       = {2},
  pages        = {449--459},
  year         = {2016},
  url          = {https://doi.org/10.1007/s12083-015-0363-x},
  doi          = {10.1007/S12083-015-0363-X},
  timestamp    = {Mon, 04 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/LuLPY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LuLPY16,
  author       = {Yanrong Lu and
                  Lixiang Li and
                  Haipeng Peng and
                  Yixian Yang},
  title        = {Cryptanalysis and improvement of a chaotic maps-based anonymous authenticated
                  key agreement protocol for multiserver architecture},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {11},
  pages        = {1321--1330},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1417},
  doi          = {10.1002/SEC.1417},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LuLPY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LuLPY16a,
  author       = {Yanrong Lu and
                  Lixiang Li and
                  Haipeng Peng and
                  Yixian Yang},
  title        = {Robust anonymous two-factor authenticated key exchange scheme for
                  mobile client-server environment},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {11},
  pages        = {1331--1339},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1419},
  doi          = {10.1002/SEC.1419},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LuLPY16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/XiePLY16,
  author       = {Dong Xie and
                  Haipeng Peng and
                  Lixiang Li and
                  Yixian Yang},
  title        = {Short lattice signatures with constant-size public keys},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {18},
  pages        = {5490--5501},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1712},
  doi          = {10.1002/SEC.1712},
  timestamp    = {Tue, 30 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/XiePLY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/LuLPY16,
  author       = {Yanrong Lu and
                  Lixiang Li and
                  Haipeng Peng and
                  Yixian Yang},
  title        = {An Energy Efficient Mutual Authentication and Key Agreement Scheme
                  Preserving Anonymity for Wireless Sensor Networks},
  journal      = {Sensors},
  volume       = {16},
  number       = {6},
  pages        = {837},
  year         = {2016},
  url          = {https://doi.org/10.3390/s16060837},
  doi          = {10.3390/S16060837},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/LuLPY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/HongSWAY16,
  author       = {Haibo Hong and
                  Jun Shao and
                  Licheng Wang and
                  Haseeb Ahmad and
                  Yixian Yang},
  title        = {Public Key Encryption in Non-Abelian Groups},
  journal      = {CoRR},
  volume       = {abs/1605.06608},
  year         = {2016},
  url          = {http://arxiv.org/abs/1605.06608},
  eprinttype    = {arXiv},
  eprint       = {1605.06608},
  timestamp    = {Sat, 20 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/HongSWAY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HongWY15,
  author       = {Haibo Hong and
                  Licheng Wang and
                  Yixian Yang},
  title        = {Minimal logarithmic signatures for the unitary group U\({}_{\mbox{n}}\)(q)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {77},
  number       = {1},
  pages        = {179--191},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10623-014-9996-7},
  doi          = {10.1007/S10623-014-9996-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HongWY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/LiCXYL15,
  author       = {Jing Li and
                  Xiu{-}Bo Chen and
                  Gang Xu and
                  Yixian Yang and
                  Zongpeng Li},
  title        = {Perfect Quantum Network Coding Independent of Classical Network Solutions},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {19},
  number       = {2},
  pages        = {115--118},
  year         = {2015},
  url          = {https://doi.org/10.1109/LCOMM.2014.2379253},
  doi          = {10.1109/LCOMM.2014.2379253},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icl/LiCXYL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/LeiHFY15,
  author       = {Xue Lei and
                  Wei Huang and
                  Wenqing Fan and
                  Yixian Yang},
  title        = {Scaling Concolic Testing for the Environment-Intensive Program},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {98-D},
  number       = {10},
  pages        = {1755--1764},
  year         = {2015},
  url          = {https://doi.org/10.1587/transinf.2015EDP7037},
  doi          = {10.1587/TRANSINF.2015EDP7037},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/LeiHFY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/LuLPYY15,
  author       = {Yanrong Lu and
                  Lixiang Li and
                  Haipeng Peng and
                  Xing Yang and
                  Yixian Yang},
  title        = {A Lightweight {ID} Based Authentication and Key Agreement Protocol
                  for Multiserver Architecture},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {11},
  pages        = {635890:1--635890:9},
  year         = {2015},
  url          = {https://doi.org/10.1155/2015/635890},
  doi          = {10.1155/2015/635890},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/LuLPYY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itc/LuLPY15,
  author       = {Yanrong Lu and
                  Lixiang Li and
                  Haipeng Peng and
                  Yixian Yang},
  title        = {A Three-Party Password-based Authenticated Key Exchange Protocol for
                  Wireless Communications},
  journal      = {Inf. Technol. Control.},
  volume       = {44},
  number       = {4},
  pages        = {404--409},
  year         = {2015},
  url          = {https://doi.org/10.5755/j01.itc.44.4.9729},
  doi          = {10.5755/J01.ITC.44.4.9729},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itc/LuLPY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/WeiZLNY15,
  author       = {Jinxia Wei and
                  Ru Zhang and
                  Jianyi Liu and
                  Xinxin Niu and
                  Yixian Yang},
  title        = {Defense Strategy of Network Security based on Dynamic Classification},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {9},
  number       = {12},
  pages        = {5116--5134},
  year         = {2015},
  url          = {https://doi.org/10.3837/tiis.2015.12.021},
  doi          = {10.3837/TIIS.2015.12.021},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/WeiZLNY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jms/LuLPY15,
  author       = {Yanrong Lu and
                  Lixiang Li and
                  Haipeng Peng and
                  Yixian Yang},
  title        = {An Enhanced Biometric-Based Authentication Scheme for Telecare Medicine
                  Information Systems Using Elliptic Curve Cryptosystem},
  journal      = {J. Medical Syst.},
  volume       = {39},
  number       = {3},
  pages        = {32},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10916-015-0221-7},
  doi          = {10.1007/S10916-015-0221-7},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jms/LuLPY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jms/LuLPXY15,
  author       = {Yanrong Lu and
                  Lixiang Li and
                  Haipeng Peng and
                  Dong Xie and
                  Yixian Yang},
  title        = {Robust and Efficient Biometrics Based Password Authentication Scheme
                  for Telecare Medicine Information Systems Using Extended Chaotic Maps},
  journal      = {J. Medical Syst.},
  volume       = {39},
  number       = {6},
  pages        = {65:1--65:10},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10916-015-0229-z},
  doi          = {10.1007/S10916-015-0229-Z},
  timestamp    = {Tue, 30 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jms/LuLPXY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kais/PingCZTYZ15,
  author       = {Yuan Ping and
                  Yun Feng Chang and
                  Yajian Zhou and
                  Yingjie Tian and
                  Yixian Yang and
                  Zhili Zhang},
  title        = {Fast and scalable support vector clustering for large-scale data analysis},
  journal      = {Knowl. Inf. Syst.},
  volume       = {43},
  number       = {2},
  pages        = {281--310},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10115-013-0724-9},
  doi          = {10.1007/S10115-013-0724-9},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/kais/PingCZTYZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/npl/WangPLXY15,
  author       = {Weiping Wang and
                  Haipeng Peng and
                  Lixiang Li and
                  Jinghua Xiao and
                  Yixian Yang},
  title        = {Finite-Time Function Projective Synchronization in Complex Multi-links
                  Networks with Time-Varying Delay},
  journal      = {Neural Process. Lett.},
  volume       = {41},
  number       = {1},
  pages        = {71--88},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11063-013-9335-4},
  doi          = {10.1007/S11063-013-9335-4},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/npl/WangPLXY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/XuCDYL15,
  author       = {Gang Xu and
                  Xiu{-}Bo Chen and
                  Zhao Dou and
                  Yixian Yang and
                  Zongpeng Li},
  title        = {A novel protocol for multiparty quantum key management},
  journal      = {Quantum Inf. Process.},
  volume       = {14},
  number       = {8},
  pages        = {2959--2980},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11128-015-1021-1},
  doi          = {10.1007/S11128-015-1021-1},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/XuCDYL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/WangCXMY15,
  author       = {Jing{-}Tao Wang and
                  Xiu{-}Bo Chen and
                  Gang Xu and
                  Xiang{-}Hua Meng and
                  Yi{-}Xian Yang},
  title        = {A new quantum sealed-bid auction protocol with secret order in post-confirmation},
  journal      = {Quantum Inf. Process.},
  volume       = {14},
  number       = {10},
  pages        = {3899--3911},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11128-015-1076-z},
  doi          = {10.1007/S11128-015-1076-Z},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/WangCXMY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/XuCLWYL15,
  author       = {Gang Xu and
                  Xiu{-}Bo Chen and
                  Jing Li and
                  Cong Wang and
                  Yi{-}Xian Yang and
                  Zongpeng Li},
  title        = {Network coding for quantum cooperative multicast},
  journal      = {Quantum Inf. Process.},
  volume       = {14},
  number       = {11},
  pages        = {4297--4322},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11128-015-1098-6},
  doi          = {10.1007/S11128-015-1098-6},
  timestamp    = {Tue, 21 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/qip/XuCLWYL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/LiCY15,
  author       = {Jian{-}Qiang Li and
                  Xiu{-}Bo Chen and
                  Yi{-}Xian Yang},
  title        = {Quantum state representation based on combinatorial Laplacian matrix
                  of star-relevant graph},
  journal      = {Quantum Inf. Process.},
  volume       = {14},
  number       = {12},
  pages        = {4691--4713},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11128-015-1134-6},
  doi          = {10.1007/S11128-015-1134-6},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/LiCY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LuLPY15,
  author       = {Yanrong Lu and
                  Lixiang Li and
                  Haipeng Peng and
                  Yixian Yang},
  title        = {A biometrics and smart cards-based authentication scheme for multi-server
                  environments},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {17},
  pages        = {3219--3228},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1246},
  doi          = {10.1002/SEC.1246},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LuLPY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YanWDYY15,
  author       = {Jianhua Yan and
                  Licheng Wang and
                  Mianxiong Dong and
                  Yixian Yang and
                  Wenbin Yao},
  title        = {Identity-based signcryption from lattices},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3751--3770},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1297},
  doi          = {10.1002/SEC.1297},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YanWDYY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/JingYLSY15,
  author       = {Maohua Jing and
                  Yixian Yang and
                  Ning Lu and
                  Wenbo Shi and
                  Changyong Yu},
  title        = {Postfix automata},
  journal      = {Theor. Comput. Sci.},
  volume       = {562},
  pages        = {590--605},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.tcs.2014.10.050},
  doi          = {10.1016/J.TCS.2014.10.050},
  timestamp    = {Tue, 13 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/JingYLSY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/HongWALY15,
  author       = {Haibo Hong and
                  Licheng Wang and
                  Haseeb Ahmad and
                  Jing Li and
                  Yixian Yang},
  title        = {Minimal Logarithmic Signatures for Sporadic Groups},
  journal      = {CoRR},
  volume       = {abs/1507.01162},
  year         = {2015},
  url          = {http://arxiv.org/abs/1507.01162},
  eprinttype    = {arXiv},
  eprint       = {1507.01162},
  timestamp    = {Sat, 31 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/HongWALY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/HongWAY15,
  author       = {Haibo Hong and
                  Licheng Wang and
                  Haseeb Ahmad and
                  Yixian Yang},
  title        = {Minimal Logarithmic Signatures for one type of Classical Groups},
  journal      = {CoRR},
  volume       = {abs/1507.01163},
  year         = {2015},
  url          = {http://arxiv.org/abs/1507.01163},
  eprinttype    = {arXiv},
  eprint       = {1507.01163},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/HongWAY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/YuanLPKHY15,
  author       = {Jing Yuan and
                  Lixiang Li and
                  Haipeng Peng and
                  J{\"{u}}rgen Kurths and
                  Xiaojing Hua and
                  Yixian Yang},
  title        = {The effect of randomness for dependency map on the robustness of interdependent
                  lattices},
  journal      = {CoRR},
  volume       = {abs/1509.05117},
  year         = {2015},
  url          = {http://arxiv.org/abs/1509.05117},
  eprinttype    = {arXiv},
  eprint       = {1509.05117},
  timestamp    = {Sat, 13 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/YuanLPKHY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aaecc/HongWYA14,
  author       = {Haibo Hong and
                  Licheng Wang and
                  Yixian Yang and
                  Haseeb Ahmad},
  title        = {All exceptional groups of lie type have minimal logarithmic signatures},
  journal      = {Appl. Algebra Eng. Commun. Comput.},
  volume       = {25},
  number       = {4},
  pages        = {287--296},
  year         = {2014},
  url          = {https://doi.org/10.1007/s00200-014-0226-3},
  doi          = {10.1007/S00200-014-0226-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aaecc/HongWYA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aaecc/ChangZGGY14,
  author       = {Liwei Chang and
                  Shihui Zheng and
                  You Gao and
                  Lize Gu and
                  Yi{-}Xian Yang},
  title        = {A novel construction of optimal multi-sender authentication code from
                  singular pseudo-symplectic geometry over finite fields},
  journal      = {Appl. Algebra Eng. Commun. Comput.},
  volume       = {25},
  number       = {6},
  pages        = {407--429},
  year         = {2014},
  url          = {https://doi.org/10.1007/s00200-014-0235-2},
  doi          = {10.1007/S00200-014-0235-2},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aaecc/ChangZGGY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/ZhouCY14,
  author       = {Liqun Zhou and
                  Xiubo Chen and
                  Yixian Yang},
  title        = {Asymptotic stability of cellular neural networks with multiple proportional
                  delays},
  journal      = {Appl. Math. Comput.},
  volume       = {229},
  pages        = {457--466},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.amc.2013.12.061},
  doi          = {10.1016/J.AMC.2013.12.061},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/amc/ZhouCY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/apin/GuoZPZLY14,
  author       = {Chun Guo and
                  Yajian Zhou and
                  Yuan Ping and
                  Zhongkun Zhang and
                  Guole Liu and
                  Yixian Yang},
  title        = {A distance sum-based hybrid method for intrusion detection},
  journal      = {Appl. Intell.},
  volume       = {40},
  number       = {1},
  pages        = {178--188},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10489-013-0452-6},
  doi          = {10.1007/S10489-013-0452-6},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/apin/GuoZPZLY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/ZhaoPLHY14,
  author       = {Dawei Zhao and
                  Haipeng Peng and
                  Lixiang Li and
                  SiLi Hui and
                  Yixian Yang},
  title        = {Novel way to research nonlinear feedback shift register},
  journal      = {Sci. China Inf. Sci.},
  volume       = {57},
  number       = {9},
  pages        = {1--14},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11432-013-5058-4},
  doi          = {10.1007/S11432-013-5058-4},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/ZhaoPLHY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/YangYCYL14,
  author       = {Yu Yang and
                  Xunrui Yin and
                  Xiubo Chen and
                  Yixian Yang and
                  Zongpeng Li},
  title        = {A Note on the Multiple-Unicast Network Coding Conjecture},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {18},
  number       = {5},
  pages        = {869--872},
  year         = {2014},
  url          = {https://doi.org/10.1109/LCOMM.2014.040214.140280},
  doi          = {10.1109/LCOMM.2014.040214.140280},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icl/YangYCYL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/GanWWPY14,
  author       = {Yuanju Gan and
                  Lihua Wang and
                  Licheng Wang and
                  Ping Pan and
                  Yixian Yang},
  title        = {Efficient threshold public key encryption with full security based
                  on dual pairing vector spaces},
  journal      = {Int. J. Commun. Syst.},
  volume       = {27},
  number       = {12},
  pages        = {4059--4077},
  year         = {2014},
  url          = {https://doi.org/10.1002/dac.2598},
  doi          = {10.1002/DAC.2598},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/GanWWPY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ChenSXSY14,
  author       = {Xiu{-}Bo Chen and
                  Yuan Su and
                  Gang Xu and
                  Ying Sun and
                  Yixian Yang},
  title        = {Quantum state secure transmission in network communications},
  journal      = {Inf. Sci.},
  volume       = {276},
  pages        = {363--376},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ins.2013.12.034},
  doi          = {10.1016/J.INS.2013.12.034},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/ChenSXSY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/LiWYNY14,
  author       = {Jing Li and
                  Licheng Wang and
                  Jianhua Yan and
                  Xinxin Niu and
                  Yixian Yang},
  title        = {A (k, t, n) Verifiable Multi-secret Sharing Scheme Based on Adversary
                  Structure},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {8},
  number       = {12},
  pages        = {4552--4567},
  year         = {2014},
  url          = {https://doi.org/10.3837/tiis.2014.12.018},
  doi          = {10.3837/TIIS.2014.12.018},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/LiWYNY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcn/YangZWLY14,
  author       = {Chunli Yang and
                  Shihui Zheng and
                  Licheng Wang and
                  Xiuhua Lu and
                  Yixian Yang},
  title        = {Hierarchical identity-based broadcast encryption scheme from {LWE}},
  journal      = {J. Commun. Networks},
  volume       = {16},
  number       = {3},
  pages        = {258--263},
  year         = {2014},
  url          = {https://doi.org/10.1109/JCN.2014.000045},
  doi          = {10.1109/JCN.2014.000045},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcn/YangZWLY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmm2/YangYFHL14,
  author       = {Yubo Yang and
                  Yixian Yang and
                  Wenqing Fan and
                  Wei Huang and
                  Zhong{-}Xian Li},
  title        = {Dynamic Obfuscation Algorithm based on Demand-Driven Symbolic Execution},
  journal      = {J. Multim.},
  volume       = {9},
  number       = {6},
  pages        = {843--850},
  year         = {2014},
  url          = {https://doi.org/10.4304/jmm.9.6.843-850},
  doi          = {10.4304/JMM.9.6.843-850},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmm2/YangYFHL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/XuYXZ14,
  author       = {Yi Xu and
                  Yixian Yang and
                  Yang Xin and
                  Hongliang Zhu},
  title        = {An Improved Directed Diffusion Protocol based on Opportunistic Routing},
  journal      = {J. Networks},
  volume       = {9},
  number       = {5},
  pages        = {1163--1168},
  year         = {2014},
  url          = {https://doi.org/10.4304/jnw.9.5.1163-1168},
  doi          = {10.4304/JNW.9.5.1163-1168},
  timestamp    = {Mon, 06 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/XuYXZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/FengXZY14,
  author       = {Chao Feng and
                  Yang Xin and
                  Hongliang Zhu and
                  Yixian Yang},
  title        = {A Weakly Homomorphic Encryption with {LDN}},
  journal      = {J. Networks},
  volume       = {9},
  number       = {6},
  pages        = {1464--1470},
  year         = {2014},
  url          = {https://doi.org/10.4304/jnw.9.6.1464-1470},
  doi          = {10.4304/JNW.9.6.1464-1470},
  timestamp    = {Mon, 06 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnw/FengXZY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nn/WangLPXY14,
  author       = {Weiping Wang and
                  Lixiang Li and
                  Haipeng Peng and
                  Jinghua Xiao and
                  Yixian Yang},
  title        = {Synchronization control of memristor-based recurrent neural networks
                  with perturbations},
  journal      = {Neural Networks},
  volume       = {53},
  pages        = {8--14},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.neunet.2014.01.010},
  doi          = {10.1016/J.NEUNET.2014.01.010},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nn/WangLPXY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qic/ChenXSY14,
  author       = {Xiu{-}Bo Chen and
                  Gang Xu and
                  Yuan Su and
                  Yixian Yang},
  title        = {Robust variations of secret sharing through noisy quantum channel},
  journal      = {Quantum Inf. Comput.},
  volume       = {14},
  number       = {7-8},
  pages        = {589--607},
  year         = {2014},
  url          = {https://doi.org/10.26421/QIC14.7-8-4},
  doi          = {10.26421/QIC14.7-8-4},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qic/ChenXSY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/XuWY14,
  author       = {Gang Xu and
                  Cong Wang and
                  Yixian Yang},
  title        = {Hierarchical quantum information splitting of an arbitrary two-qubit
                  state via the cluster state},
  journal      = {Quantum Inf. Process.},
  volume       = {13},
  number       = {1},
  pages        = {43--57},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11128-013-0670-1},
  doi          = {10.1007/S11128-013-0670-1},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/XuWY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/ChenDXWY14,
  author       = {Xiubo Chen and
                  Zhao Dou and
                  Gang Xu and
                  Cong Wang and
                  Yixian Yang},
  title        = {A class of protocols for quantum private comparison based on the symmetry
                  of states},
  journal      = {Quantum Inf. Process.},
  volume       = {13},
  number       = {1},
  pages        = {85--100},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11128-013-0669-7},
  doi          = {10.1007/S11128-013-0669-7},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/ChenDXWY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/ChenSNY14,
  author       = {Xiubo Chen and
                  Yuan Su and
                  Xinxin Niu and
                  Yixian Yang},
  title        = {Efficient and feasible quantum private comparison of equality against
                  the collective amplitude damping noise},
  journal      = {Quantum Inf. Process.},
  volume       = {13},
  number       = {1},
  pages        = {101--112},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11128-012-0505-5},
  doi          = {10.1007/S11128-012-0505-5},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/ChenSNY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/WangCY14,
  author       = {Mingming Wang and
                  Xiu{-}Bo Chen and
                  Yixian Yang},
  title        = {Quantum secret sharing for general access structures based on multiparticle
                  entanglements},
  journal      = {Quantum Inf. Process.},
  volume       = {13},
  number       = {2},
  pages        = {429--443},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11128-013-0660-3},
  doi          = {10.1007/S11128-013-0660-3},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/WangCY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/MaLCY14,
  author       = {Song{-}Ya Ma and
                  Mingxing Luo and
                  Xiu{-}Bo Chen and
                  Yixian Yang},
  title        = {Schemes for remotely preparing an arbitrary four-qubit {\(\chi\)}-state},
  journal      = {Quantum Inf. Process.},
  volume       = {13},
  number       = {9},
  pages        = {1951--1965},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11128-014-0788-9},
  doi          = {10.1007/S11128-014-0788-9},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/MaLCY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/KangCY14,
  author       = {Shuang{-}Yong Kang and
                  Xiu{-}Bo Chen and
                  Yixian Yang},
  title        = {Multi-party quantum state sharing of an arbitrary multi-qubit state
                  via {\(\chi\)}-type entangled states},
  journal      = {Quantum Inf. Process.},
  volume       = {13},
  number       = {9},
  pages        = {2081--2098},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11128-014-0800-4},
  doi          = {10.1007/S11128-014-0800-4},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/KangCY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/ZhaoPLY14,
  author       = {Dawei Zhao and
                  Haipeng Peng and
                  Lixiang Li and
                  Yixian Yang},
  title        = {A Secure and Effective Anonymous Authentication Scheme for Roaming
                  Service in Global Mobility Networks},
  journal      = {Wirel. Pers. Commun.},
  volume       = {78},
  number       = {1},
  pages        = {247--269},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11277-014-1750-y},
  doi          = {10.1007/S11277-014-1750-Y},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/ZhaoPLY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/GanWWPY13,
  author       = {Yuanju Gan and
                  Lihua Wang and
                  Licheng Wang and
                  Ping Pan and
                  Yixian Yang},
  title        = {Efficient Construction of CCA-Secure Threshold {PKE} Based on Hashed
                  Diffie-Hellman Assumption},
  journal      = {Comput. J.},
  volume       = {56},
  number       = {10},
  pages        = {1249--1257},
  year         = {2013},
  url          = {https://doi.org/10.1093/comjnl/bxs167},
  doi          = {10.1093/COMJNL/BXS167},
  timestamp    = {Thu, 16 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/GanWWPY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cnsns/MaLWYX13,
  author       = {Hongjing Ma and
                  Weiqing Liu and
                  Ye Wu and
                  Yixian Yang and
                  Jinghua Xiao},
  title        = {Effect of spatial distribution on the synchronization in rings of
                  coupled oscillators},
  journal      = {Commun. Nonlinear Sci. Numer. Simul.},
  volume       = {18},
  number       = {10},
  pages        = {2769--2774},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.cnsns.2013.02.014},
  doi          = {10.1016/J.CNSNS.2013.02.014},
  timestamp    = {Thu, 05 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cnsns/MaLWYX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cssp/TangMZY13,
  author       = {Yinggan Tang and
                  Weiwei Mu and
                  Xiumei Zhang and
                  Yixian Yang},
  title        = {Modified Fuzzy Linear Discriminant Analysis for Threshold Selection},
  journal      = {Circuits Syst. Signal Process.},
  volume       = {32},
  number       = {2},
  pages        = {711--726},
  year         = {2013},
  url          = {https://doi.org/10.1007/s00034-012-9476-0},
  doi          = {10.1007/S00034-012-9476-0},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cssp/TangMZY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/PanWYGWX13,
  author       = {Ping Pan and
                  Licheng Wang and
                  Yixian Yang and
                  Yuanju Gan and
                  Lihua Wang and
                  Chengqian Xu},
  title        = {Chameleon Hash Functions and One-Time Signature Schemes from Inner
                  Automorphism Groups},
  journal      = {Fundam. Informaticae},
  volume       = {126},
  number       = {1},
  pages        = {103--119},
  year         = {2013},
  url          = {https://doi.org/10.3233/FI-2013-873},
  doi          = {10.3233/FI-2013-873},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/PanWYGWX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/GanWWPY13,
  author       = {Yuanju Gan and
                  Lihua Wang and
                  Licheng Wang and
                  Ping Pan and
                  Yixian Yang},
  title        = {Publicly Verifiable Secret Sharing Scheme with Provable Security against
                  Chosen Secret Attacks},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {9},
  year         = {2013},
  url          = {https://doi.org/10.1155/2013/902462},
  doi          = {10.1155/2013/902462},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/GanWWPY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/SunSLGZY13,
  author       = {Yanbin Sun and
                  Yan Sun and
                  Mingxing Luo and
                  Lize Gu and
                  Shihui Zheng and
                  Yixian Yang},
  title        = {Comment on Lee et al.'s group signature and e-auction scheme},
  journal      = {Inf. Syst. Frontiers},
  volume       = {15},
  number       = {1},
  pages        = {133--139},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10796-011-9312-2},
  doi          = {10.1007/S10796-011-9312-2},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isf/SunSLGZY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/CaoZZY13,
  author       = {Chenlei Cao and
                  Ru Zhang and
                  Mengyi Zhang and
                  Yixian Yang},
  title        = {IBC-Based Entity Authentication Protocols for Federated Cloud Systems},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {7},
  number       = {5},
  pages        = {1291--1312},
  year         = {2013},
  url          = {https://doi.org/10.3837/tiis.2013.05.020},
  doi          = {10.3837/TIIS.2013.05.020},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/CaoZZY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcp/HuangMFNY13,
  author       = {Qinlong Huang and
                  Zhaofeng Ma and
                  Jingyi Fu and
                  Xinxin Niu and
                  Yixian Yang},
  title        = {Attribute Based {DRM} Scheme with Efficient Revocation in Cloud Computing},
  journal      = {J. Comput.},
  volume       = {8},
  number       = {11},
  pages        = {2776--2781},
  year         = {2013},
  url          = {http://www.jcomputers.us/index.php?m=content\&\#38;c=index\&\#38;a=show\&\#38;catid=115\&\#38;id=1600},
  doi          = {10.4304/JCP.8.11.2776-2781},
  timestamp    = {Thu, 25 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcp/HuangMFNY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmm2/DingZYZ13,
  author       = {Hai{-}yang Ding and
                  Yajian Zhou and
                  Yixian Yang and
                  Ru Zhang},
  title        = {Robust Blind Video Watermark Algorithm in Transform Domain Combining
                  with 3D Video Correlation},
  journal      = {J. Multim.},
  volume       = {8},
  number       = {2},
  pages        = {161--167},
  year         = {2013},
  url          = {https://doi.org/10.4304/jmm.8.2.161-167},
  doi          = {10.4304/JMM.8.2.161-167},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmm2/DingZYZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsw/GanWYY13,
  author       = {Yuanju Gan and
                  Licheng Wang and
                  Jianhua Yan and
                  Yixian Yang},
  title        = {{CCA} Secure Threshold {KEM} Scheme Against Adaptive Corruption Attacks
                  in Standard Model},
  journal      = {J. Softw.},
  volume       = {8},
  number       = {5},
  pages        = {1245--1253},
  year         = {2013},
  url          = {https://doi.org/10.4304/jsw.8.5.1245-1253},
  doi          = {10.4304/JSW.8.5.1245-1253},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsw/GanWYY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsw/MaHYN13,
  author       = {Zhaofeng Ma and
                  Jianqing Huang and
                  Yixian Yang and
                  Xinxin Niu},
  title        = {Verifiable Threshold Authorization for Scalable and Secure Digital
                  Rights Management},
  journal      = {J. Softw.},
  volume       = {8},
  number       = {6},
  pages        = {1526--1535},
  year         = {2013},
  url          = {https://doi.org/10.4304/jsw.8.6.1526-1535},
  doi          = {10.4304/JSW.8.6.1526-1535},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsw/MaHYN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/LuoDCY13,
  author       = {Mingxing Luo and
                  Yun Deng and
                  Xiu{-}Bo Chen and
                  Yixian Yang},
  title        = {The faithful remote preparation of general quantum states},
  journal      = {Quantum Inf. Process.},
  volume       = {12},
  number       = {1},
  pages        = {279--294},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11128-012-0374-y},
  doi          = {10.1007/S11128-012-0374-Y},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/LuoDCY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/LuoZZLSY13,
  author       = {Yi Luo and
                  Zhiwen Zhao and
                  Zhangji Zhao and
                  Haiming Long and
                  Wen Su and
                  Yixian Yang},
  title        = {The loophole of the improved secure quantum sealed-bid auction with
                  post-confirmation and solution},
  journal      = {Quantum Inf. Process.},
  volume       = {12},
  number       = {1},
  pages        = {295--302},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11128-012-0372-0},
  doi          = {10.1007/S11128-012-0372-0},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/LuoZZLSY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/ChenNZY13,
  author       = {Xiu{-}Bo Chen and
                  Xinxin Niu and
                  Xinjie Zhou and
                  Yixian Yang},
  title        = {Multi-party quantum secret sharing with the single-particle quantum
                  state to encode the information},
  journal      = {Quantum Inf. Process.},
  volume       = {12},
  number       = {1},
  pages        = {365--380},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11128-012-0379-6},
  doi          = {10.1007/S11128-012-0379-6},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/ChenNZY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/WangCY13,
  author       = {Mingming Wang and
                  Xiu{-}Bo Chen and
                  Yixian Yang},
  title        = {Comment on "High-dimensional deterministic multiparty quantum
                  secret sharing without unitary operations"},
  journal      = {Quantum Inf. Process.},
  volume       = {12},
  number       = {2},
  pages        = {785--792},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11128-012-0417-4},
  doi          = {10.1007/S11128-012-0417-4},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/WangCY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/LuoDCYL13,
  author       = {Mingxing Luo and
                  Yun Deng and
                  Xiu{-}Bo Chen and
                  Yi{-}Xian Yang and
                  Hongheng Li},
  title        = {Faithful quantum broadcast beyond the no-go theorem},
  journal      = {Quantum Inf. Process.},
  volume       = {12},
  number       = {5},
  pages        = {1969--1979},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11128-012-0486-4},
  doi          = {10.1007/S11128-012-0486-4},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/LuoDCYL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/SunXCNY13,
  author       = {Ying Sun and
                  Shengwei Xu and
                  Xiu{-}Bo Chen and
                  Xinxin Niu and
                  Yi{-}Xian Yang},
  title        = {Expansible quantum secret sharing network},
  journal      = {Quantum Inf. Process.},
  volume       = {12},
  number       = {8},
  pages        = {2877--2888},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11128-013-0570-4},
  doi          = {10.1007/S11128-013-0570-4},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/SunXCNY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/LuoDCY13a,
  author       = {Mingxing Luo and
                  Yun Deng and
                  Xiu{-}Bo Chen and
                  Yi{-}Xian Yang},
  title        = {The rational approximations of the unitary groups},
  journal      = {Quantum Inf. Process.},
  volume       = {12},
  number       = {10},
  pages        = {3149--3166},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11128-013-0588-7},
  doi          = {10.1007/S11128-013-0588-7},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/LuoDCY13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/GuWODCY13,
  author       = {Lize Gu and
                  Licheng Wang and
                  Kaoru Ota and
                  Mianxiong Dong and
                  Zhenfu Cao and
                  Yixian Yang},
  title        = {New public key cryptosystems based on non-Abelian factorization problems},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {7},
  pages        = {912--922},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.710},
  doi          = {10.1002/SEC.710},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/GuWODCY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sose/ZhuLYZX13,
  author       = {Chunge Zhu and
                  Xinran Liu and
                  Yixian Yang and
                  Hong Zhang and
                  Qianhua Xu},
  title        = {An Application-Oriented Scheduling Optimization Algorithm for Internet-Based
                  Virtual Computing Environment},
  booktitle    = {Seventh {IEEE} International Symposium on Service-Oriented System
                  Engineering, {SOSE} 2013, San Francisco, CA, USA, March 25-28, 2013},
  pages        = {347--352},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SOSE.2013.49},
  doi          = {10.1109/SOSE.2013.49},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sose/ZhuLYZX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1305-6350,
  author       = {Dawei Zhao and
                  Haipeng Peng and
                  Shudong Li and
                  Yixian Yang},
  title        = {An efficient dynamic {ID} based remote user authentication scheme
                  using self-certified public keys for multi-server environment},
  journal      = {CoRR},
  volume       = {abs/1305.6350},
  year         = {2013},
  url          = {http://arxiv.org/abs/1305.6350},
  eprinttype    = {arXiv},
  eprint       = {1305.6350},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1305-6350.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ZhaoPLY13,
  author       = {Dawei Zhao and
                  Haipeng Peng and
                  Lixiang Li and
                  Yixian Yang},
  title        = {A secure and effective anonymous authentication scheme for roaming
                  service in global mobility networks},
  journal      = {CoRR},
  volume       = {abs/1306.4726},
  year         = {2013},
  url          = {http://arxiv.org/abs/1306.4726},
  eprinttype    = {arXiv},
  eprint       = {1306.4726},
  timestamp    = {Sat, 13 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ZhaoPLY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ZhaoLPLY13,
  author       = {Dawei Zhao and
                  Lixiang Li and
                  Haipeng Peng and
                  Qun Luo and
                  Yixian Yang},
  title        = {Multiple Vectors Propagation of Epidemics in Complex Networks},
  journal      = {CoRR},
  volume       = {abs/1307.1834},
  year         = {2013},
  url          = {http://arxiv.org/abs/1307.1834},
  eprinttype    = {arXiv},
  eprint       = {1307.1834},
  timestamp    = {Sat, 13 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ZhaoLPLY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ZhaoLPLY13a,
  author       = {Dawei Zhao and
                  Lixiang Li and
                  Haipeng Peng and
                  Qun Luo and
                  Yixian Yang},
  title        = {Multiple routes transmitted epidemics on multiplex networks},
  journal      = {CoRR},
  volume       = {abs/1312.6931},
  year         = {2013},
  url          = {http://arxiv.org/abs/1312.6931},
  eprinttype    = {arXiv},
  eprint       = {1312.6931},
  timestamp    = {Sat, 13 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ZhaoLPLY13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/asc/WanWLY12,
  author       = {Miao Wan and
                  Cong Wang and
                  Lixiang Li and
                  Yixian Yang},
  title        = {Chaotic ant swarm approach for data clustering},
  journal      = {Appl. Soft Comput.},
  volume       = {12},
  number       = {8},
  pages        = {2387--2393},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.asoc.2012.03.037},
  doi          = {10.1016/J.ASOC.2012.03.037},
  timestamp    = {Sat, 13 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/asc/WanWLY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cai/PingZY12,
  author       = {Yuan Ping and
                  Yajian Zhou and
                  Yixian Yang},
  title        = {A Novel Scheme for Accelerating Support Vector Clustering},
  journal      = {Comput. Informatics},
  volume       = {31},
  number       = {3},
  pages        = {613},
  year         = {2012},
  url          = {http://www.cai.sk/ojs/index.php/cai/article/view/1011},
  timestamp    = {Mon, 14 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cai/PingZY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cma/ZhaoPWY12,
  author       = {Dawei Zhao and
                  Haipeng Peng and
                  Cong Wang and
                  Yixian Yang},
  title        = {A secret sharing scheme with a short share realizing the (t, n) threshold
                  and the adversary structure},
  journal      = {Comput. Math. Appl.},
  volume       = {64},
  number       = {4},
  pages        = {611--615},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.camwa.2011.12.067},
  doi          = {10.1016/J.CAMWA.2011.12.067},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cma/ZhaoPWY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/XiaoYYWLY12,
  author       = {Da Xiao and
                  Yan Yang and
                  Wenbin Yao and
                  Chunhua Wu and
                  Jianyi Liu and
                  Yixian Yang},
  title        = {Multiple-File Remote Data Checking for cloud storage},
  journal      = {Comput. Secur.},
  volume       = {31},
  number       = {2},
  pages        = {192--205},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.cose.2011.12.005},
  doi          = {10.1016/J.COSE.2011.12.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/XiaoYYWLY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/TangCHLY12,
  author       = {Yinggan Tang and
                  Mingyong Cui and
                  Changchun Hua and
                  Lixiang Li and
                  Yixian Yang},
  title        = {Optimum design of fractional order PI\({}^{\mbox{{\(\lambda\)}}}\)D\({}^{\mbox{{\(\mu\)}}}\)
                  controller for {AVR} system using chaotic ant swarm},
  journal      = {Expert Syst. Appl.},
  volume       = {39},
  number       = {8},
  pages        = {6887--6896},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.eswa.2012.01.007},
  doi          = {10.1016/J.ESWA.2012.01.007},
  timestamp    = {Sat, 13 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/TangCHLY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcisys/YangR12,
  author       = {Yixian Yang and
                  Fuji Ren},
  title        = {Foreword: Computational Intelligence for Network Control and Security},
  journal      = {Int. J. Comput. Intell. Syst.},
  volume       = {5},
  number       = {5},
  pages        = {805--807},
  year         = {2012},
  url          = {https://doi.org/10.1080/18756891.2012.733201},
  doi          = {10.1080/18756891.2012.733201},
  timestamp    = {Tue, 16 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcisys/YangR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WangWZYH12,
  author       = {Zhiwei Wang and
                  Licheng Wang and
                  Shihui Zheng and
                  Yixian Yang and
                  Zhengming Hu},
  title        = {Provably Secure and Efficient Identity-based Signature Scheme Based
                  on Cubic Residues},
  journal      = {Int. J. Netw. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {33--38},
  year         = {2012},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v14-n1/ijns-2012-v14-n1-p33-38.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/WangWZYH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/LaiXLY12,
  author       = {Hong Lai and
                  Jinghua Xiao and
                  Lixiang Li and
                  Yixian Yang},
  title        = {Recursive hiding of biometrics-based secret sharing scheme using adversary
                  structure},
  journal      = {Inf. Process. Lett.},
  volume       = {112},
  number       = {17-18},
  pages        = {683--687},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.ipl.2012.06.006},
  doi          = {10.1016/J.IPL.2012.06.006},
  timestamp    = {Sat, 13 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/LaiXLY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcm/JiaLYLY12,
  author       = {Zhongtian Jia and
                  Lixiang Li and
                  Zhuoran Yu and
                  Shudong Li and
                  Yixian Yang},
  title        = {A Secure Message Transaction Protocol for Delay Tolerant Networks},
  journal      = {J. Commun.},
  volume       = {7},
  number       = {8},
  pages        = {622--633},
  year         = {2012},
  url          = {https://doi.org/10.4304/jcm.7.8.622-633},
  doi          = {10.4304/JCM.7.8.622-633},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcm/JiaLYLY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/PingTZY12,
  author       = {Yuan Ping and
                  Yingjie Tian and
                  Yajian Zhou and
                  Yixian Yang},
  title        = {Convex Decomposition Based Cluster Labeling Method for Support Vector
                  Clustering},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {27},
  number       = {2},
  pages        = {428--442},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11390-012-1232-1},
  doi          = {10.1007/S11390-012-1232-1},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcst/PingTZY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jiis/WanLXWY12,
  author       = {Miao Wan and
                  Lixiang Li and
                  Jinghua Xiao and
                  Cong Wang and
                  Yixian Yang},
  title        = {Data clustering using bacterial foraging optimization},
  journal      = {J. Intell. Inf. Syst.},
  volume       = {38},
  number       = {2},
  pages        = {321--341},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10844-011-0158-3},
  doi          = {10.1007/S10844-011-0158-3},
  timestamp    = {Sat, 13 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jiis/WanLXWY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/JiaLTLY12,
  author       = {Zhongtian Jia and
                  Xiaodong Lin and
                  Seng{-}Hua Tan and
                  Lixiang Li and
                  Yixian Yang},
  title        = {Public key distribution scheme for delay tolerant networks based on
                  two-channel cryptography},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {35},
  number       = {3},
  pages        = {905--913},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.jnca.2011.03.009},
  doi          = {10.1016/J.JNCA.2011.03.009},
  timestamp    = {Thu, 23 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/JiaLTLY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/YangW12a,
  author       = {Yixian Yang and
                  Xiaojun Wang},
  title        = {Guest Editorial},
  journal      = {J. Networks},
  volume       = {7},
  number       = {8},
  pages        = {1147--1149},
  year         = {2012},
  url          = {https://doi.org/10.4304/jnw.7.8.1147-1149},
  doi          = {10.4304/JNW.7.8.1147-1149},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/YangW12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/FuZLZY12,
  author       = {Rongrong Fu and
                  Kangfeng Zheng and
                  Tianliang Lu and
                  Dongmei Zhang and
                  Yixian Yang},
  title        = {Biologically Inspired Anomaly Detection for Hierarchical Wireless
                  Sensor Networks},
  journal      = {J. Networks},
  volume       = {7},
  number       = {8},
  pages        = {1214--1219},
  year         = {2012},
  url          = {https://doi.org/10.4304/jnw.7.8.1214-1219},
  doi          = {10.4304/JNW.7.8.1214-1219},
  timestamp    = {Fri, 24 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/FuZLZY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/LuoCYN12,
  author       = {Mingxing Luo and
                  Xiu{-}Bo Chen and
                  Yi{-}Xian Yang and
                  Xinxin Niu},
  title        = {Experimental architecture of joint remote state preparation},
  journal      = {Quantum Inf. Process.},
  volume       = {11},
  number       = {3},
  pages        = {751--767},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11128-011-0283-5},
  doi          = {10.1007/S11128-011-0283-5},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/LuoCYN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/ChenMSZY12,
  author       = {Xiu{-}Bo Chen and
                  Song{-}Ya Ma and
                  Yuan Su and
                  Ru Zhang and
                  Yi{-}Xian Yang},
  title        = {Controlled remote state preparation of arbitrary two and three qubit
                  states via the Brown state},
  journal      = {Quantum Inf. Process.},
  volume       = {11},
  number       = {6},
  pages        = {1653--1667},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11128-011-0326-y},
  doi          = {10.1007/S11128-011-0326-Y},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/ChenMSZY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/WangCLY12,
  author       = {Mingming Wang and
                  Xiu{-}Bo Chen and
                  Shoushan Luo and
                  Yi{-}Xian Yang},
  title        = {Efficient entanglement channel construction schemes for a theoretical
                  quantum network model with \emph{d}-level system},
  journal      = {Quantum Inf. Process.},
  volume       = {11},
  number       = {6},
  pages        = {1715--1739},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11128-011-0325-z},
  doi          = {10.1007/S11128-011-0325-Z},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/WangCLY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/JiaLPYG12,
  author       = {Zhongtian Jia and
                  Shudong Li and
                  Haipeng Peng and
                  Yixian Yang and
                  Shize Guo},
  title        = {Modelling security message propagation in delay tolerant networks},
  journal      = {Secur. Commun. Networks},
  volume       = {5},
  number       = {1},
  pages        = {51--58},
  year         = {2012},
  url          = {https://doi.org/10.1002/sec.309},
  doi          = {10.1002/SEC.309},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/JiaLPYG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/PanWWLY12,
  author       = {Ping Pan and
                  Lihua Wang and
                  Licheng Wang and
                  Lixiang Li and
                  Yixian Yang},
  title        = {{CSP-DHIES:} a new public-key encryption scheme from matrix conjugation},
  journal      = {Secur. Commun. Networks},
  volume       = {5},
  number       = {7},
  pages        = {809--822},
  year         = {2012},
  url          = {https://doi.org/10.1002/sec.376},
  doi          = {10.1002/SEC.376},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/PanWWLY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/WangTQYX12,
  author       = {Baocheng Wang and
                  Chunming Tang and
                  Yanfeng Qi and
                  Yixian Yang and
                  Maozhi Xu},
  title        = {The Weight Distributions of Cyclic Codes and Elliptic Curves},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {58},
  number       = {12},
  pages        = {7253--7259},
  year         = {2012},
  url          = {https://doi.org/10.1109/TIT.2012.2210386},
  doi          = {10.1109/TIT.2012.2210386},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/WangTQYX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccis/ZhuLYZX12,
  author       = {Chunge Zhu and
                  Xinran Liu and
                  Yixian Yang and
                  Hong Zhang and
                  Qianhua Xu},
  title        = {A trust mechanism in Internet-Based Virtual Computing Environment},
  booktitle    = {2nd {IEEE} International Conference on Cloud Computing and Intelligence
                  Systems, {CCIS} 2012, Hangzhou, China, October 30 - November 1, 2012},
  pages        = {449--453},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CCIS.2012.6664446},
  doi          = {10.1109/CCIS.2012.6664446},
  timestamp    = {Sun, 08 Aug 2021 01:40:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ccis/ZhuLYZX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccchina/JiaRLLY12,
  author       = {Zhongtian Jia and
                  Muhammad Ali Raffay and
                  Lixiang Li and
                  Xiaodong Lin and
                  Yixian Yang},
  title        = {A secure message delivery scheme with path tracking for delay tolerant
                  networks},
  booktitle    = {2012 1st {IEEE} International Conference on Communications in China
                  (ICCC), Beijing, China, August 15-17, 2012},
  pages        = {161--166},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICCChina.2012.6356871},
  doi          = {10.1109/ICCCHINA.2012.6356871},
  timestamp    = {Thu, 23 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccchina/JiaRLLY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1202-3514,
  author       = {Baocheng Wang and
                  Chunming Tang and
                  Yanfeng Qi and
                  Yixian Yang and
                  Maozhi Xu},
  title        = {A Note on Weight Distributions of Irreducible Cyclic Codes},
  journal      = {CoRR},
  volume       = {abs/1202.3514},
  year         = {2012},
  url          = {http://arxiv.org/abs/1202.3514},
  eprinttype    = {arXiv},
  eprint       = {1202.3514},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1202-3514.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/MaoZNYZ11,
  author       = {Jiafa Mao and
                  Ru Zhang and
                  Xinxin Niu and
                  Yixian Yang and
                  Linna Zhou},
  title        = {Research of Spatial Domain Image Digital Watermarking Payload},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2011},
  year         = {2011},
  url          = {https://doi.org/10.1155/2011/502748},
  doi          = {10.1155/2011/502748},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/MaoZNYZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijbc/GeWLLY11,
  author       = {Fangzhen Ge and
                  Zhen Wei and
                  Yang Lu and
                  Lixiang Li and
                  Yixian Yang},
  title        = {Disturbance Chaotic Ant Swarm},
  journal      = {Int. J. Bifurc. Chaos},
  volume       = {21},
  number       = {9},
  pages        = {2597--2622},
  year         = {2011},
  url          = {https://doi.org/10.1142/S0218127411029963},
  doi          = {10.1142/S0218127411029963},
  timestamp    = {Tue, 24 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijbc/GeWLLY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/WangWPZY11,
  author       = {Licheng Wang and
                  Lihua Wang and
                  Yun Pan and
                  Zonghua Zhang and
                  Yixian Yang},
  title        = {Discrete logarithm based additively homomorphic encryption and secure
                  data aggregation},
  journal      = {Inf. Sci.},
  volume       = {181},
  number       = {16},
  pages        = {3308--3322},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.ins.2011.04.002},
  doi          = {10.1016/J.INS.2011.04.002},
  timestamp    = {Thu, 16 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/WangWPZY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kais/WanJWLY11,
  author       = {Miao Wan and
                  Arne J{\"{o}}nsson and
                  Cong Wang and
                  Lixiang Li and
                  Yixian Yang},
  title        = {Web user clustering and Web prefetching using Random Indexing with
                  weight functions},
  journal      = {Knowl. Inf. Syst.},
  volume       = {33},
  number       = {1},
  pages        = {89--115},
  year         = {2011},
  url          = {https://doi.org/10.1007/s10115-011-0453-x},
  doi          = {10.1007/S10115-011-0453-X},
  timestamp    = {Sat, 13 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/kais/WanJWLY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/ChangTXYLCY11,
  author       = {Xiangmao Chang and
                  Rui Tan and
                  Guoliang Xing and
                  Zhaohui Yuan and
                  Chenyang Lu and
                  Yixin Chen and
                  Yixian Yang},
  title        = {Sensor Placement Algorithms for Fusion-Based Surveillance Networks},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {22},
  number       = {8},
  pages        = {1407--1414},
  year         = {2011},
  url          = {https://doi.org/10.1109/TPDS.2011.115},
  doi          = {10.1109/TPDS.2011.115},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tpds/ChangTXYLCY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icica/GengLXDY11,
  author       = {Tao Geng and
                  Shoushan Luo and
                  Yang Xin and
                  Xiaofeng Du and
                  Yixian Yang},
  editor       = {Baoxiang Liu and
                  Chunlai Chai},
  title        = {Research on Secure Multi-party Computational Geometry},
  booktitle    = {Information Computing and Applications - Second International Conference,
                  {ICICA} 2011, Qinhuangdao, China, October 28-31, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7030},
  pages        = {322--329},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25255-6\_41},
  doi          = {10.1007/978-3-642-25255-6\_41},
  timestamp    = {Mon, 06 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icica/GengLXDY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pakdd/WanJWLY11,
  author       = {Miao Wan and
                  Arne J{\"{o}}nsson and
                  Cong Wang and
                  Lixiang Li and
                  Yixian Yang},
  editor       = {Longbing Cao and
                  Joshua Zhexue Huang and
                  James Bailey and
                  Yun Sing Koh and
                  Jun Luo},
  title        = {A Random Indexing Approach for Web User Clustering and Web Prefetching},
  booktitle    = {New Frontiers in Applied Data Mining - {PAKDD} 2011 International
                  Workshops, Shenzhen, China, May 24-27, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7104},
  pages        = {40--52},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-28320-8\_4},
  doi          = {10.1007/978-3-642-28320-8\_4},
  timestamp    = {Sat, 13 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pakdd/WanJWLY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1109-0628,
  author       = {Baocheng Wang and
                  Chunming Tang and
                  Yanfeng Qi and
                  Yixian Yang and
                  Maozhi Xu},
  title        = {The Weight Distributions of Cyclic Codes and Elliptic Curves},
  journal      = {CoRR},
  volume       = {abs/1109.0628},
  year         = {2011},
  url          = {http://arxiv.org/abs/1109.0628},
  eprinttype    = {arXiv},
  eprint       = {1109.0628},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1109-0628.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1112-0062,
  author       = {Baocheng Wang and
                  Chunming Tang and
                  Yanfeng Qi and
                  Yixian Yang and
                  Maozhi Xu},
  title        = {A new class of hyper-bent Boolean functions in binomial forms},
  journal      = {CoRR},
  volume       = {abs/1112.0062},
  year         = {2011},
  url          = {http://arxiv.org/abs/1112.0062},
  eprinttype    = {arXiv},
  eprint       = {1112.0062},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1112-0062.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangTQYX11,
  author       = {Baocheng Wang and
                  Chunming Tang and
                  Yanfeng Qi and
                  Yixian Yang and
                  Maozhi Xu},
  title        = {A New Class of Hyper-bent Boolean Functions with Multiple Trace Terms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {600},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/600},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/WangTQYX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangTQY11,
  author       = {Baocheng Wang and
                  Chunming Tang and
                  Yanfeng Qi and
                  Yixian Yang},
  title        = {A generalization of the class of hyper-bent Boolean functions in binomial
                  forms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {698},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/698},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/WangTQY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/ZhengWY10,
  author       = {Shihui Zheng and
                  Licheng Wang and
                  Yixian Yang},
  title        = {A new impossible differential attack on {SAFER} ciphers},
  journal      = {Comput. Electr. Eng.},
  volume       = {36},
  number       = {1},
  pages        = {180--189},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.compeleceng.2009.08.004},
  doi          = {10.1016/J.COMPELECENG.2009.08.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/ZhengWY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/WangWCYN10,
  author       = {Licheng Wang and
                  Lihua Wang and
                  Zhenfu Cao and
                  Yixian Yang and
                  Xinxin Niu},
  title        = {Conjugate adjoining problem in braid groups and new design of braid-based
                  signatures},
  journal      = {Sci. China Inf. Sci.},
  volume       = {53},
  number       = {3},
  pages        = {524--536},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11432-010-0046-4},
  doi          = {10.1007/S11432-010-0046-4},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/WangWCYN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/LuoYWN10,
  author       = {Mingxing Luo and
                  Yixian Yang and
                  Licheng Wang and
                  Xinxin Niu},
  title        = {Secure network coding in the presence of eavesdroppers},
  journal      = {Sci. China Inf. Sci.},
  volume       = {53},
  number       = {3},
  pages        = {648--658},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11432-010-0052-6},
  doi          = {10.1007/S11432-010-0052-6},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/LuoYWN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejwcn/GuoLLY10,
  author       = {Qin Guo and
                  Mingxing Luo and
                  Lixiang Li and
                  Yixian Yang},
  title        = {Secure Network Coding against Wiretapping and Byzantine Attacks},
  journal      = {{EURASIP} J. Wirel. Commun. Netw.},
  volume       = {2010},
  year         = {2010},
  url          = {https://doi.org/10.1155/2010/216524},
  doi          = {10.1155/2010/216524},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejwcn/GuoLLY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WangWYH10,
  author       = {Zhiwei Wang and
                  Licheng Wang and
                  Yixian Yang and
                  Zhengming Hu},
  title        = {Comment on Wu et al.'s Server-aided Verification Signature Schemes},
  journal      = {Int. J. Netw. Secur.},
  volume       = {10},
  number       = {2},
  pages        = {158--160},
  year         = {2010},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n2/ijns-2010-v10-n2-p158-160.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/WangWYH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcit/ZhaoZYSD10,
  author       = {Mingfeng Zhao and
                  Yajian Zhou and
                  Yixian Yang and
                  We Song and
                  Yajun Du},
  title        = {A New Method to Detect Useless Service Failure Model in {SPN}},
  journal      = {J. Convergence Inf. Technol.},
  volume       = {5},
  number       = {3},
  pages        = {129--134},
  year         = {2010},
  url          = {http://www.aicit.org/jcit/ppl/may\_18.pdf},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcit/ZhaoZYSD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/ZhangLY10,
  author       = {Jianhong Zhang and
                  Chenglian Liu and
                  Yixian Yang},
  title        = {An efficient secure proxy verifiably encrypted signature scheme},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {33},
  number       = {1},
  pages        = {29--34},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.jnca.2009.07.003},
  doi          = {10.1016/J.JNCA.2009.07.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/ZhangLY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcit/ZhangYLP10,
  author       = {Xiaohong Zhang and
                  Yixian Yang and
                  Lixiang Li and
                  Haipeng Peng},
  title        = {An Extensible Hash Function Construction Based on Embedded Chaos Maps},
  booktitle    = {10th {IEEE} International Conference on Computer and Information Technology,
                  {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010},
  pages        = {2407--2414},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIT.2010.414},
  doi          = {10.1109/CIT.2010.414},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcit/ZhangYLP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/ChangWWLLY10,
  author       = {Xiangmao Chang and
                  Jin Wang and
                  Jianping Wang and
                  Victor C. S. Lee and
                  Kejie Lu and
                  Yixian Yang},
  title        = {On Achieving Maximum Secure Throughput Using Network Coding against
                  Wiretap Attack},
  booktitle    = {2010 International Conference on Distributed Computing Systems, {ICDCS}
                  2010, Genova, Italy, June 21-25, 2010},
  pages        = {526--535},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICDCS.2010.27},
  doi          = {10.1109/ICDCS.2010.27},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/ChangWWLLY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmlc/RenZLNY10,
  author       = {Chuan{-}Lun Ren and
                  Xiao{-}Hui Zuo and
                  Zhong{-}Xian Li and
                  Xinxin Niu and
                  Yixian Yang},
  title        = {Towards Hierarchical-User {RBAC} model},
  booktitle    = {International Conference on Machine Learning and Cybernetics, {ICMLC}
                  2010, Qingdao, China, July 11-14, 2010, Proceedings},
  pages        = {2870--2874},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICMLC.2010.5580774},
  doi          = {10.1109/ICMLC.2010.5580774},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icmlc/RenZLNY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mvhi/JianYZH10,
  author       = {Jian Gao and
                  Yixian Yang and
                  Kangfeng Zheng and
                  Zhengming Hu},
  editor       = {Honghua Tan},
  title        = {Research of an Innovative P2P-Based Botnet},
  booktitle    = {2010 International Conference on Machine Vision and Human-machine
                  Interface, {MVHI} 2010, Kaifeng, China, April 24-25, 2010},
  pages        = {214--218},
  publisher    = {{IEEE} Computer Soceity},
  year         = {2010},
  url          = {https://doi.org/10.1109/MVHI.2010.135},
  doi          = {10.1109/MVHI.2010.135},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mvhi/JianYZH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/LiuGLY10,
  author       = {Jin{-}ye Liu and
                  Lize Gu and
                  Shoushan Luo and
                  Yixian Yang},
  title        = {An anonymous authentication scheme for mobile communication},
  booktitle    = {Proceedings of the {IEEE} International Conference on Wireless Communications,
                  Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
                  Beijing, China},
  pages        = {359--364},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WCINS.2010.5541800},
  doi          = {10.1109/WCINS.2010.5541800},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnis/LiuGLY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/ZhangXYG10,
  author       = {Jianwu Zhang and
                  Guoai Xu and
                  Yixian Yang and
                  Shize Guo},
  title        = {A method for topology conformance tests under logical constraints},
  booktitle    = {Proceedings of the {IEEE} International Conference on Wireless Communications,
                  Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
                  Beijing, China},
  pages        = {386--390},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WCINS.2010.5541805},
  doi          = {10.1109/WCINS.2010.5541805},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnis/ZhangXYG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/GuoXNYL10,
  author       = {Chengqing Guo and
                  Guoai Xu and
                  Xinxin Niu and
                  Yixian Yang and
                  Yang Li},
  title        = {A color image watermarking algorithm resistant to print-scan},
  booktitle    = {Proceedings of the {IEEE} International Conference on Wireless Communications,
                  Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
                  Beijing, China},
  pages        = {518--521},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WCINS.2010.5541833},
  doi          = {10.1109/WCINS.2010.5541833},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnis/GuoXNYL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/ZhangYN09,
  author       = {Jianhong Zhang and
                  Yixian Yang and
                  Xinxin Niu},
  title        = {A Novel Identity-Based Multi-Signcryption Scheme},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {5},
  number       = {1},
  pages        = {28},
  year         = {2009},
  url          = {https://doi.org/10.1080/15501320802520613},
  doi          = {10.1080/15501320802520613},
  timestamp    = {Mon, 14 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdsn/ZhangYN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/MaWGY09,
  author       = {Xiao{-}Long Ma and
                  Zhiwei Wang and
                  Lize Gu and
                  Yixian Yang},
  title        = {Remark on Yu et al.'s Online/Offline Signature Scheme in {CT-RSA}
                  2008},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {719--720},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.318},
  doi          = {10.1109/IAS.2009.318},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/MaWGY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asian/ZhangCGY09,
  author       = {Jianhong Zhang and
                  Hua Chen and
                  Shengnan Gao and
                  Yixian Yang},
  editor       = {Anupam Datta},
  title        = {A Special Proxy Signature Scheme with Multi-warrant},
  booktitle    = {Advances in Computer Science - {ASIAN} 2009. Information Security
                  and Privacy, 13th Asian Computing Science Conference, Seoul, Korea,
                  December 14-16, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5913},
  pages        = {147--157},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10622-4\_12},
  doi          = {10.1007/978-3-642-10622-4\_12},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/asian/ZhangCGY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csie/ChenLZNY09,
  author       = {Ming Chen and
                  Fan{-}fan Liu and
                  Ru Zhang and
                  Xinxin Niu and
                  Yixian Yang},
  editor       = {Mark Burgin and
                  Masud H. Chowdhury and
                  Chan H. Ham and
                  Simone A. Ludwig and
                  Weilian Su and
                  Sumanth Yenduri},
  title        = {Steganalysis of {LSB} Matching in Gray Images Based on Regional Correlation
                  Analysis},
  booktitle    = {{CSIE} 2009, 2009 {WRI} World Congress on Computer Science and Information
                  Engineering, March 31 - April 2, 2009, Los Angeles, California, USA,
                  7 Volumes},
  pages        = {490--494},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CSIE.2009.577},
  doi          = {10.1109/CSIE.2009.577},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csie/ChenLZNY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gcc/XiaoYWWY09,
  author       = {Da Xiao and
                  Wenbin Yao and
                  Chunhua Wu and
                  Cong Wang and
                  Yixian Yang},
  title        = {{VAOFS:} {A} Verifiable Append-Only File System for Regulatory Compliance},
  booktitle    = {Eighth International Conference on Grid and Cooperative Computing,
                  {GCC} 2009, Lanzhou, Gansu, China, August 27-29, 2009},
  pages        = {325--330},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/GCC.2009.52},
  doi          = {10.1109/GCC.2009.52},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gcc/XiaoYWWY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/WangWPZY09,
  author       = {Licheng Wang and
                  Lihua Wang and
                  Yun Pan and
                  Zonghua Zhang and
                  Yixian Yang},
  editor       = {Sihan Qing and
                  Chris J. Mitchell and
                  Guilin Wang},
  title        = {Discrete-Log-Based Additively Homomorphic Encryption and Secure {WSN}
                  Data Aggregation},
  booktitle    = {Information and Communications Security, 11th International Conference,
                  {ICICS} 2009, Beijing, China, December 14-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5927},
  pages        = {493--502},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-11145-7\_39},
  doi          = {10.1007/978-3-642-11145-7\_39},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/WangWPZY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/QuFNYZ09,
  author       = {Zhiguo Qu and
                  Yu Fu and
                  Xinxin Niu and
                  Yixian Yang and
                  Ru Zhang},
  editor       = {Jeng{-}Shyang Pan and
                  Yen{-}Wei Chen and
                  Lakhmi C. Jain},
  title        = {Improved {EMD} Steganography with Great Embedding Rate and High Embedding
                  Efficiency},
  booktitle    = {Fifth International Conference on Intelligent Information Hiding and
                  Multimedia Signal Processing {(IIH-MSP} 2009), Kyoto, Japan, 12-14
                  September, 2009, Proceedings},
  pages        = {348--352},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IIH-MSP.2009.290},
  doi          = {10.1109/IIH-MSP.2009.290},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iih-msp/QuFNYZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isnn/ZhangYN09,
  author       = {Jianhong Zhang and
                  Yixian Yang and
                  Xinxin Niu},
  editor       = {Wen Yu and
                  Haibo He and
                  Nian Zhang},
  title        = {Efficient Provable Secure ID-Based Directed Signature Scheme without
                  Random Oracle},
  booktitle    = {Advances in Neural Networks - {ISNN} 2009, 6th International Symposium
                  on Neural Networks, {ISNN} 2009, Wuhan, China, May 26-29, 2009, Proceedings,
                  Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5553},
  pages        = {318--327},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01513-7\_34},
  doi          = {10.1007/978-3-642-01513-7\_34},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/isnn/ZhangYN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/ZhangYNGCG09,
  author       = {Jianhong Zhang and
                  Yixian Yang and
                  Xinxin Niu and
                  Shengnan Gao and
                  Hua Chen and
                  Qin Geng},
  editor       = {Jong Hyuk Park and
                  Hsiao{-}Hwa Chen and
                  Mohammed Atiquzzaman and
                  Changhoon Lee and
                  Tai{-}Hoon Kim and
                  Sang{-}Soo Yeo},
  title        = {An Improved Secure Identity-Based On-Line/Off-Line Signature Scheme},
  booktitle    = {Advances in Information Security and Assurance, Third International
                  Conference and Workshops, {ISA} 2009, Seoul, Korea, June 25-27, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5576},
  pages        = {588--597},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02617-1\_60},
  doi          = {10.1007/978-3-642-02617-1\_60},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/ZhangYNGCG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssme/LongXY09,
  author       = {Wen Long and
                  Yang Xin and
                  Yixian Yang},
  title        = {Vulnerabilities Analyzing Model for Alert Correlation in Distributed
                  Environment},
  booktitle    = {2009 {IITA} International Conference on Services Science, Management
                  and Engineering, {SSME} 2009, 11-12 July 2009, Zhangjiajie, China},
  pages        = {408--411},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSME.2009.132},
  doi          = {10.1109/SSME.2009.132},
  timestamp    = {Tue, 07 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssme/LongXY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiWLY09,
  author       = {Zhimin Li and
                  Licheng Wang and
                  Daofeng Li and
                  Yixian Yang},
  title        = {Collision Attacks on NaSHA-384/512},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {26},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/026},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiWLY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/JiaQGY08,
  author       = {Hong{-}Yong Jia and
                  Sihan Qing and
                  Lize Gu and
                  Yixian Yang},
  title        = {Efficient Universally Composable Password-Based Key Exchange},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 2, Workshop
                  Papers},
  pages        = {293--298},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.148},
  doi          = {10.1109/CIS.2008.148},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/JiaQGY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/MaCGYH08,
  author       = {Xiao{-}Long Ma and
                  Wei Cui and
                  Lize Gu and
                  Yixian Yang and
                  Zhengming Hu},
  title        = {A Novel ID-Based Verifiably Encrypted Signature without Random Oracle},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 2, Workshop
                  Papers},
  pages        = {359--363},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.168},
  doi          = {10.1109/CIS.2008.168},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/MaCGYH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiZY08,
  author       = {Xin{-}lei Li and
                  Kangfeng Zheng and
                  Yixian Yang},
  title        = {A Simulation Platform of DDoS Attack Based on Network Processor},
  booktitle    = {2008 International Conference on Computational Intelligence and Security,
                  {CIS} 2008, 13-17 December 2008, Suzhou, China, Volume 1 - Conference
                  Papers},
  pages        = {421--426},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CIS.2008.190},
  doi          = {10.1109/CIS.2008.190},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiZY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csicc/YuZY08,
  author       = {Yihua Yu and
                  Shihui Zheng and
                  Yixian Yang},
  editor       = {Hamid Sarbazi{-}Azad and
                  Behrooz Parhami and
                  Seyed Ghassem Miremadi and
                  Shaahin Hessabi},
  title        = {ID-Based Blind Signature and Proxy Blind Signature without Trusted
                  {PKG}},
  booktitle    = {Advances in Computer Science and Engineering - 13th International
                  {CSI} Computer Conference, {CSICC} 2008, Kish Island, Iran, March
                  9-11, 2008 Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {6},
  pages        = {821--824},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89985-3\_111},
  doi          = {10.1007/978-3-540-89985-3\_111},
  timestamp    = {Thu, 23 Jun 2022 19:54:33 +0200},
  biburl       = {https://dblp.org/rec/conf/csicc/YuZY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cw/LiuZLLY08,
  author       = {Yanfei Liu and
                  Ziming Zhao and
                  Hui Li and
                  Qun Luo and
                  Yixian Yang},
  title        = {An Efficient Remote User Authentication Scheme with Strong Anonymity},
  booktitle    = {International Conference on Cyberworlds 2008, Hangzhou, China, 22-24
                  September 2008, Proceedings},
  pages        = {180--185},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CW.2008.23},
  doi          = {10.1109/CW.2008.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cw/LiuZLLY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/WangNZYZ08,
  author       = {Zhiwei Wang and
                  Xuyun Nie and
                  Shihui Zheng and
                  Yixian Yang and
                  Zhihui Zhang},
  editor       = {Osvaldo Gervasi and
                  Beniamino Murgante and
                  Antonio Lagan{\`{a}} and
                  David Taniar and
                  Youngsong Mun and
                  Marina L. Gavrilova},
  title        = {A New Construction of Multivariate Public Key Encryption Scheme through
                  Internally Perturbed Plus},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2008, International
                  Conference, Perugia, Italy, June 30 - July 3, 2008, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5073},
  pages        = {1--13},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-69848-7\_1},
  doi          = {10.1007/978-3-540-69848-7\_1},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/WangNZYZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icycs/ZhangGZY08,
  author       = {Wei Zhang and
                  Shize Guo and
                  Kangfeng Zheng and
                  Yixian Yang},
  title        = {A Defending Mechanism against DDoS Based on Registration and Authentication},
  booktitle    = {Proceedings of the 9th International Conference for Young Computer
                  Scientists, {ICYCS} 2008, Zhang Jia Jie, Hunan, China, November 18-21,
                  2008},
  pages        = {2192--2197},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICYCS.2008.206},
  doi          = {10.1109/ICYCS.2008.206},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icycs/ZhangGZY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/YeFQNY08,
  author       = {Tianyu Ye and
                  Yu Fu and
                  Zhiguo Qu and
                  Xinxin Niu and
                  Yixian Yang},
  editor       = {Jeng{-}Shyang Pan and
                  Xiamu Niu and
                  Hsiang{-}Cheh Huang and
                  Lakhmi C. Jain},
  title        = {Multiplicative Watermark Detection Using Locally Optimum Nonlinearity},
  booktitle    = {4th International Conference on Intelligent Information Hiding and
                  Multimedia Signal Processing {(IIH-MSP} 2008), Harbin, China, 15-17
                  August 2008, Proceedings},
  pages        = {481--484},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IIH-MSP.2008.79},
  doi          = {10.1109/IIH-MSP.2008.79},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iih-msp/YeFQNY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/FuYQNY08,
  author       = {Yu Fu and
                  Tianyu Ye and
                  Zhiguo Qu and
                  Xinxin Niu and
                  Yixian Yang},
  editor       = {Jeng{-}Shyang Pan and
                  Xiamu Niu and
                  Hsiang{-}Cheh Huang and
                  Lakhmi C. Jain},
  title        = {A Novel Relational Database Watermarking Algorithm for Joint Ownership},
  booktitle    = {4th International Conference on Intelligent Information Hiding and
                  Multimedia Signal Processing {(IIH-MSP} 2008), Harbin, China, 15-17
                  August 2008, Proceedings},
  pages        = {985--988},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IIH-MSP.2008.43},
  doi          = {10.1109/IIH-MSP.2008.43},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iih-msp/FuYQNY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/JiangZMWY08,
  author       = {Nan Jiang and
                  Zhaozhi Zhang and
                  Xiaomin Ma and
                  Jian Wang and
                  Yixian Yang},
  title        = {Analysis of nonseparable property of multi-valued multi-threshold
                  neuron},
  booktitle    = {Proceedings of the International Joint Conference on Neural Networks,
                  {IJCNN} 2008, part of the {IEEE} World Congress on Computational Intelligence,
                  {WCCI} 2008, Hong Kong, China, June 1-6, 2008},
  pages        = {413--419},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/IJCNN.2008.4633825},
  doi          = {10.1109/IJCNN.2008.4633825},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcnn/JiangZMWY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isip/WangZYN08,
  author       = {Jiao Wang and
                  Yajian Zhou and
                  Yixian Yang and
                  Xinxin Niu},
  editor       = {Fei Yu and
                  Qi Luo},
  title        = {Classify the Majority of the Total Bytes on the Internet},
  booktitle    = {International Symposium on Information Processing, {ISIP} 2008 / International
                  Pacific Workshop on Web Mining, and Web-Based Application, {WMWA}
                  2008, Moscow, Russia, 23-25 May 2008},
  pages        = {68--72},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISIP.2008.46},
  doi          = {10.1109/ISIP.2008.46},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isip/WangZYN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/paciia/LiY08a,
  author       = {Jian Li and
                  Yixian Yang},
  title        = {Design and Realization of a Large-Scale Distributed Intrusion Management
                  System Module},
  booktitle    = {{PACIIA} 2008, Volume 2, 2008 {IEEE} Pacific-Asia Workshop on Computational
                  Intelligence and Industrial Application, 19-20 December 2008, Wuhan,
                  China},
  pages        = {537--540},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/PACIIA.2008.335},
  doi          = {10.1109/PACIIA.2008.335},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/paciia/LiY08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/MaYN07,
  author       = {Zhaofeng Ma and
                  Yixian Yang and
                  Xinxin Niu},
  title        = {Secure and Flexible Digital Rights Management in a Pervasive Usage
                  Mode},
  booktitle    = {Computational Intelligence and Security, International Conference,
                  {CIS} 2007, Harbin, Heilongjiang, China, December 15-19, 2007},
  pages        = {863--867},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/CIS.2007.210},
  doi          = {10.1109/CIS.2007.210},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/MaYN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsr/HuYN07,
  author       = {Lanlan Hu and
                  Yixian Yang and
                  Xinxin Niu},
  title        = {Improved Remote User Authentication Scheme Preserving User Anonymity},
  booktitle    = {Fifth Annual Conference on Communication Networks and Services Research
                  {(CNSR} 2007), 14-17 May 2006, Fredericton, New Brunswick, Canada},
  pages        = {323--328},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/CNSR.2007.38},
  doi          = {10.1109/CNSR.2007.38},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnsr/HuYN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iat/BinKY07,
  author       = {Bin Wu and
                  Kangfeng Zheng and
                  Yixian Yang},
  title        = {A Data Safety Transmission Solution in Web Application},
  booktitle    = {Proceedings of the 2007 {IEEE/WIC/ACM} International Conference on
                  Web Intelligence and International Conference on Intelligent Agent
                  Technology - Workshops, 2-5 November 2007, Silicon Valley, CA, {USA}},
  pages        = {303--306},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/WIIATW.2007.4427594},
  doi          = {10.1109/WIIATW.2007.4427594},
  timestamp    = {Thu, 27 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iat/BinKY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iat/LiuYYX07,
  author       = {Ming{-}hui Liu and
                  Xin Yang and
                  Yixian Yang and
                  Xinxin Niu},
  title        = {Security Mechanism Research of {EMV2000}},
  booktitle    = {Proceedings of the 2007 {IEEE/WIC/ACM} International Conference on
                  Web Intelligence and International Conference on Intelligent Agent
                  Technology - Workshops, 2-5 November 2007, Silicon Valley, CA, {USA}},
  pages        = {307--310},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/WIIATW.2007.4427595},
  doi          = {10.1109/WIIATW.2007.4427595},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iat/LiuYYX07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iat/XuYGN07,
  author       = {Guosheng Xu and
                  Yixian Yang and
                  Lize Gu and
                  Xinxin Niu},
  title        = {ID-Based Multi-proxy Sequential Signature System from Bilinear Pairing},
  booktitle    = {Proceedings of the 2007 {IEEE/WIC/ACM} International Conference on
                  Web Intelligence and International Conference on Intelligent Agent
                  Technology - Workshops, 2-5 November 2007, Silicon Valley, CA, {USA}},
  pages        = {315--318},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/WIIATW.2007.4427597},
  doi          = {10.1109/WIIATW.2007.4427597},
  timestamp    = {Mon, 19 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iat/XuYGN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnc/WangYJZM07,
  author       = {Jian Wang and
                  Yixian Yang and
                  Nan Jiang and
                  Zhaozhi Zhang and
                  Xiaomin Ma},
  editor       = {Jingsheng Lei and
                  JingTao Yao and
                  Qingfu Zhang},
  title        = {Using Three Layer Neural Networks to Compute Discrete Real Functions},
  booktitle    = {Third International Conference on Natural Computation, {ICNC} 2007,
                  Haikou, Hainan, China, 24-27 August 2007, Volume 1},
  pages        = {446--450},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICNC.2007.807},
  doi          = {10.1109/ICNC.2007.807},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnc/WangYJZM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnc/LiLWY07,
  author       = {Yu{-}Ying Li and
                  Lixiang Li and
                  Qiaoyan Wen and
                  Yixian Yang},
  editor       = {Jingsheng Lei and
                  JingTao Yao and
                  Qingfu Zhang},
  title        = {Integer Programming via Chaotic Ant Swarm},
  booktitle    = {Third International Conference on Natural Computation, {ICNC} 2007,
                  Haikou, Hainan, China, 24-27 August 2007, Volume 4},
  pages        = {489--493},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICNC.2007.444},
  doi          = {10.1109/ICNC.2007.444},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnc/LiLWY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/WangCZHY07,
  author       = {Licheng Wang and
                  Zhenfu Cao and
                  Shihui Zheng and
                  Xiaofang Huang and
                  Yixian Yang},
  editor       = {K. Srinathan and
                  C. Pandu Rangan and
                  Moti Yung},
  title        = {Transitive Signatures from Braid Groups},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2007, 8th International Conference
                  on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4859},
  pages        = {183--196},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77026-8\_14},
  doi          = {10.1007/978-3-540-77026-8\_14},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/WangCZHY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/LiJTYJWY07,
  author       = {Liang Li and
                  Wei{-}Qiang Jiang and
                  Jie Tian and
                  Yixian Yang and
                  Cai{-}Ping Jiang and
                  Zhe Wu and
                  Xin Yang},
  title        = {A Networking Identity Authentication Scheme Combining Fingerprint
                  Coding and Identity Based Encryption},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2007, New Brunswick, New Jersey, USA, May 23-24, 2007, Proceedings},
  pages        = {129--132},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ISI.2007.379545},
  doi          = {10.1109/ISI.2007.379545},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/LiJTYJWY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isnn/JiangYMZ07,
  author       = {Nan Jiang and
                  Yixian Yang and
                  Xiaomin Ma and
                  Zhaozhi Zhang},
  editor       = {Derong Liu and
                  Shumin Fei and
                  Zeng{-}Guang Hou and
                  Huaguang Zhang and
                  Changyin Sun},
  title        = {Using Three Layer Neural Network to Compute Multi-valued Functions},
  booktitle    = {Advances in Neural Networks - {ISNN} 2007, 4th International Symposium
                  on Neural Networks, {ISNN} 2007, Nanjing, China, June 3-7, 2007, Proceedings,
                  Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4493},
  pages        = {1--8},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72395-0\_1},
  doi          = {10.1007/978-3-540-72395-0\_1},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/isnn/JiangYMZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mue/HuNY07,
  author       = {Lanlan Hu and
                  Xinxin Niu and
                  Yixian Yang},
  title        = {An Efficient Multi-server Password Authenticated Key Agreement Scheme
                  Using Smart Cards},
  booktitle    = {2007 International Conference on Multimedia and Ubiquitous Engineering
                  {(MUE} 2007), 26-28 April 2007, Seoul, Korea},
  pages        = {903--907},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/MUE.2007.70},
  doi          = {10.1109/MUE.2007.70},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mue/HuNY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijbc/LiYPW06,
  author       = {Lixiang Li and
                  Yixian Yang and
                  Haipeng Peng and
                  Xiangdong Wang},
  title        = {An Optimization Method Inspired by "chaotic" Ant Behavior},
  journal      = {Int. J. Bifurc. Chaos},
  volume       = {16},
  number       = {8},
  pages        = {2351--2364},
  year         = {2006},
  url          = {https://doi.org/10.1142/S0218127406016100},
  doi          = {10.1142/S0218127406016100},
  timestamp    = {Sat, 13 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijbc/LiYPW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icicic/JiangWNY06,
  author       = {Nan Jiang and
                  Jian Wang and
                  Xinxin Niu and
                  Yixian Yang},
  title        = {Symmetric Steganography Secure Against Chosen Message and Original
                  Cover Attacks},
  booktitle    = {First International Conference on Innovative Computing, Information
                  and Control {(ICICIC} 2006), 30 August - 1 September 2006, Beijing,
                  China},
  pages        = {661--664},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICICIC.2006.531},
  doi          = {10.1109/ICICIC.2006.531},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icicic/JiangWNY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnc/LiLWY06,
  author       = {Yu{-}Ying Li and
                  Lixiang Li and
                  Qiao{-}Yan Wen and
                  Yixian Yang},
  editor       = {Licheng Jiao and
                  Lipo Wang and
                  Xinbo Gao and
                  Jing Liu and
                  Feng Wu},
  title        = {Data Fitting Via Chaotic Ant Swarm},
  booktitle    = {Advances in Natural Computation, Second International Conference,
                  {ICNC} 2006, Xi'an, China, September 24-28, 2006. Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4222},
  pages        = {180--183},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11881223\_23},
  doi          = {10.1007/11881223\_23},
  timestamp    = {Mon, 19 Apr 2021 14:35:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icnc/LiLWY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/ChenZNY06,
  author       = {Ming Chen and
                  Ru Zhang and
                  Xinxin Niu and
                  Yixian Yang},
  title        = {Analysis of Current Steganography Tools: Classifications {\&}
                  Features},
  booktitle    = {Second International Conference on Intelligent Information Hiding
                  and Multimedia Signal Processing {(IIH-MSP} 2006), Pasadena, California,
                  USA, December 18-20, 2006, Proceedings},
  pages        = {384--387},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/IIH-MSP.2006.265023},
  doi          = {10.1109/IIH-MSP.2006.265023},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iih-msp/ChenZNY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SuYYZ06,
  author       = {Shenghui Su and
                  Yixian Yang and
                  Bo Yang and
                  Shaolan Zhang},
  title        = {Design and Analysis of a Hash Ring-iterative Structure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {384},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/384},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SuYYZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmlc/LangLY05,
  author       = {Fenghua Lang and
                  Jian Li and
                  Yixian Yang},
  editor       = {Daniel S. Yeung and
                  Zhi{-}Qiang Liu and
                  Xizhao Wang and
                  Hong Yan},
  title        = {A Novel Fuzzy Anomaly Detection Method Based on Clonal Selection Clustering
                  Algorithm},
  booktitle    = {Advances in Machine Learning and Cybernetics, 4th International Conference,
                  {ICMLC} 2005, Guangzhou, China, August 18-21, 2005, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3930},
  pages        = {642--651},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11739685\_67},
  doi          = {10.1007/11739685\_67},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/icmlc/LangLY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdcat/ChuLY05,
  author       = {Yonggang Chu and
                  Jun Li and
                  Yixian Yang},
  title        = {The Architecture of the Large-scale Distributed Intrusion Detection
                  System},
  booktitle    = {Sixth International Conference on Parallel and Distributed Computing,
                  Applications and Technologies {(PDCAT} 2005), 5-8 December 2005, Dalian,
                  China},
  pages        = {130--133},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/PDCAT.2005.233},
  doi          = {10.1109/PDCAT.2005.233},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pdcat/ChuLY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nn/ZhangMY04,
  author       = {Zhaozhi Zhang and
                  Xiaomin Ma and
                  Yixian Yang},
  title        = {Erratum to: Bounds on the number of hidden neurons in three-layer
                  binary neural networks [Neural Networks 16 {(7)} 995-1002]},
  journal      = {Neural Networks},
  volume       = {17},
  number       = {3},
  pages        = {465},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.neunet.2004.01.001},
  doi          = {10.1016/J.NEUNET.2004.01.001},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nn/ZhangMY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijitdm/TaoYN03,
  author       = {Wang Tao and
                  Yixian Yang and
                  Xinxin Niu},
  title        = {New Efficient Timed Commitment Schemes},
  journal      = {Int. J. Inf. Technol. Decis. Mak.},
  volume       = {2},
  number       = {2},
  pages        = {287--297},
  year         = {2003},
  url          = {https://doi.org/10.1142/S0219622003000616},
  doi          = {10.1142/S0219622003000616},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijitdm/TaoYN03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nn/ZhangMY03,
  author       = {Zhaozhi Zhang and
                  Xiaomin Ma and
                  Yixian Yang},
  title        = {Bounds on the number of hidden neurons in three-layer binary neural
                  networks},
  journal      = {Neural Networks},
  volume       = {16},
  number       = {7},
  pages        = {995--1002},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0893-6080(03)00006-6},
  doi          = {10.1016/S0893-6080(03)00006-6},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/nn/ZhangMY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pimrc/0037SY03,
  author       = {Zhi Li and
                  Ai Fen Sui and
                  Yixian Yang},
  title        = {A {LSB} steganography detection algorithm},
  booktitle    = {Proceedings of the {IEEE} 14th International Symposium on Personal,
                  Indoor and Mobile Radio Communications, {PIMRC} 2003, 7-10 September
                  2003, Beijing, China},
  pages        = {2780--2783},
  publisher    = {{IEEE}},
  year         = {2003},
  url          = {https://doi.org/10.1109/PIMRC.2003.1259249},
  doi          = {10.1109/PIMRC.2003.1259249},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/pimrc/0037SY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dm/ZhangMY01,
  author       = {Zhaozhi Zhang and
                  Xiaomin Ma and
                  Yixian Yang},
  title        = {A unified method to construct neural network decoders for arbitrary
                  codes and decoding rules},
  journal      = {Discret. Math.},
  volume       = {238},
  number       = {1-3},
  pages        = {171--181},
  year         = {2001},
  url          = {https://doi.org/10.1016/S0012-365X(00)00422-2},
  doi          = {10.1016/S0012-365X(00)00422-2},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dm/ZhangMY01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/SunKY01,
  author       = {Wei Sun and
                  Andrew Klapper and
                  Yixian Yang},
  title        = {On correlations of a family of generalized geometric sequences},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {47},
  number       = {6},
  pages        = {2609--2618},
  year         = {2001},
  url          = {https://doi.org/10.1109/18.945278},
  doi          = {10.1109/18.945278},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/SunKY01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/YouYZ01,
  author       = {Lin You and
                  Yixian Yang and
                  Chun Qi Zhang},
  editor       = {Sihan Qing and
                  Tatsuaki Okamoto and
                  Jianying Zhou},
  title        = {Generalization of Elliptic Curve Digital Signature Schemes},
  booktitle    = {Information and Communications Security, Third International Conference,
                  {ICICS} 2001, Xian, China, November 13-16, 2001},
  series       = {Lecture Notes in Computer Science},
  volume       = {2229},
  pages        = {246--250},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45600-7\_28},
  doi          = {10.1007/3-540-45600-7\_28},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/YouYZ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/ZhongFY00,
  author       = {Ming Zhong and
                  Yunbo Feng and
                  Yixian Yang},
  title        = {Single-Term Divisible Electronic Cash Based on Bit Commitment},
  booktitle    = {Proceedings of the Fifth {IEEE} Symposium on Computers and Communications
                  {(ISCC} 2000), 4-6 July 2000, Antibes, France},
  pages        = {280--285},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ISCC.2000.860651},
  doi          = {10.1109/ISCC.2000.860651},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/ZhongFY00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcom/LinXYH98,
  author       = {Xiaodong Lin and
                  YuSen Xing and
                  Yixian Yang and
                  Tzonelih Hwang},
  title        = {Comment on "Reparable key distribution protocols for Internet
                  environments" [and reply]},
  journal      = {{IEEE} Trans. Commun.},
  volume       = {46},
  number       = {1},
  pages        = {20--22},
  year         = {1998},
  url          = {https://doi.org/10.1109/26.655398},
  doi          = {10.1109/26.655398},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcom/LinXYH98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/SunY97,
  author       = {Wei Sun and
                  Yixian Yang},
  title        = {Correlation Functions of a Family of Generalized Geometric Sequences},
  journal      = {Discret. Appl. Math.},
  volume       = {80},
  number       = {2-3},
  pages        = {193--201},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0166-218X(97)00060-7},
  doi          = {10.1016/S0166-218X(97)00060-7},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dam/SunY97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcom/YangNX97,
  author       = {Yixian Yang and
                  Xinxin Niu and
                  Chengqian Xu},
  title        = {Counterexample of truncated Costas optical orthogonal codes},
  journal      = {{IEEE} Trans. Commun.},
  volume       = {45},
  number       = {6},
  pages        = {640--643},
  year         = {1997},
  url          = {https://doi.org/10.1109/26.592598},
  doi          = {10.1109/26.592598},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcom/YangNX97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/YangG95,
  author       = {Yixian Yang and
                  Baoan Guo},
  title        = {Further Enumerating Boolean Functions of Cryptographic Significance},
  journal      = {J. Cryptol.},
  volume       = {8},
  number       = {3},
  pages        = {115--122},
  year         = {1995},
  url          = {https://doi.org/10.1007/BF00202268},
  doi          = {10.1007/BF00202268},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/YangG95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcom/WangY94a,
  author       = {Xinmei Wang and
                  Yixian Yang},
  title        = {On the undetected error probability of nonlinear binary constant weight
                  codes},
  journal      = {{IEEE} Trans. Commun.},
  volume       = {42},
  number       = {7},
  pages        = {2390--2394},
  year         = {1994},
  url          = {https://doi.org/10.1109/26.297847},
  doi          = {10.1109/26.297847},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcom/WangY94a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/Yang93,
  author       = {Yixian Yang},
  title        = {New Binary Sequences with Perfect Staircase Profile of Linear Complexity},
  journal      = {Inf. Process. Lett.},
  volume       = {46},
  number       = {1},
  pages        = {27--29},
  year         = {1993},
  url          = {https://doi.org/10.1016/0020-0190(93)90192-C},
  doi          = {10.1016/0020-0190(93)90192-C},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/Yang93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/Yang91,
  author       = {Yixian Yang},
  title        = {New Enumeration Results About the Optical Orthogonal Codes},
  journal      = {Inf. Process. Lett.},
  volume       = {40},
  number       = {2},
  pages        = {85--87},
  year         = {1991},
  url          = {https://doi.org/10.1016/0020-0190(91)90014-9},
  doi          = {10.1016/0020-0190(91)90014-9},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/Yang91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Yang90,
  author       = {Yixian Yang},
  editor       = {Jennifer Seberry and
                  Josef Pieprzyk},
  title        = {{K-M} Sequence is Forwardly Predictable},
  booktitle    = {Advances in Cryptology - {AUSCRYPT} '90, International Conference
                  on Cryptology, Sydney, Australia, January 8-11, 1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {453},
  pages        = {37--38},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/BFb0030349},
  doi          = {10.1007/BFB0030349},
  timestamp    = {Fri, 17 Jul 2020 16:12:46 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Yang90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Yang90a,
  author       = {Yixian Yang},
  editor       = {Jennifer Seberry and
                  Josef Pieprzyk},
  title        = {Dyadic Matrices and Their Potential Significance in Cryptography},
  booktitle    = {Advances in Cryptology - {AUSCRYPT} '90, International Conference
                  on Cryptology, Sydney, Australia, January 8-11, 1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {453},
  pages        = {308--310},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/BFb0030370},
  doi          = {10.1007/BFB0030370},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Yang90a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics