default search action
Chunhua Jin
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j50]Chunhua Jin, Wenyu Qin, Zhiwei Chen, Kaijun Sun, Guanhua Chen, Jinsong Shan, Liqing Chen:
Heterogeneous signcryption scheme with equality test from CLC to PKI for IoV. Comput. Commun. 220: 149-159 (2024) - [j49]Chunhua Jin:
Finite Time Blow-Up and Chemotactic Collapse in Keller-Segel Model with Signal Consumption. J. Nonlinear Sci. 34(4): 71 (2024) - [j48]Yongliang Xu, Chunhua Jin, Wenyu Qin, Jie Zhao, Guanhua Chen, Fugeng Zeng:
BDACD: Blockchain-based decentralized auditing supporting ciphertext deduplication. J. Syst. Archit. 147: 103053 (2024) - [j47]Huihui Zhu, Chunhua Jin, Yongliang Xu, Guanhua Chen, Liqing Chen:
Efficient and secure heterogeneous online/offline signcryption for wireless body area network. Pervasive Mob. Comput. 99: 101893 (2024) - [j46]Chunhua Jin, Yongliang Xu, Wenyu Qin, Jie Zhao, Ge Kan, Fugeng Zeng:
A blockchain-based auditable deduplication scheme for multi-cloud storage. Peer Peer Netw. Appl. 17(5): 2870-2883 (2024) - 2023
- [j45]Qingqing Ning, Chunhua Jin, Zhiwei Chen, Yongliang Xu, Huaqi Lu:
An Efficient Heterogeneous Ring Signcryption Scheme for Wireless Body Area Networks. Comput. Syst. Sci. Eng. 47(2): 2061-2078 (2023) - [j44]Chunhua Jin, Xiaoxiao Zhai, Yanhong Ma:
Research on Optimization of Public Opinion Supervision Model of Social Network Platform Based on Evolutionary Game. Inf. 14(3): 151 (2023) - [j43]Honglei Li, Ziyu Yang, Chunhua Jin, Jinxia Wang:
How an industrial internet platform empowers the digital transformation of SMEs: theoretical mechanism and business model. J. Knowl. Manag. 27(1): 105-120 (2023) - [j42]Penghui Zhou, Chunhua Jin, Zhiwei Chen, Guanhua Chen, Lanfang Wang:
An efficient heterogeneous signcryption scheme for internet of things. Pervasive Mob. Comput. 94: 101821 (2023) - [j41]Zhiwei Chen, Chunhua Jin, Guanhua Chen, Ying Jin, Hui Zong:
A heterogeneous online/offline signcryption scheme for Internet of Vehicles. Veh. Commun. 43: 100635 (2023) - 2022
- [j40]Chunhua Jin, Huihui Zhu, Wenyu Qin, Zhiwei Chen, Ying Jin, Jinsong Shan:
Heterogeneous online/offline signcryption for secure communication in Internet of Things. J. Syst. Archit. 127: 102522 (2022) - [j39]Yongliang Xu, Chunhua Jin, Wenyu Qin, Jinsong Shan, Ying Jin:
Secure fuzzy identity-based public verification for cloud storage. J. Syst. Archit. 128: 102558 (2022) - [c12]Na Zhang, Chunhua Jin, Xing Bu, Faheem Gul Gilal:
The Motivations Behind Luxury Consumption: Application of Grounded Theory Approach. DMI 2022: 200-207 - [c11]Chunhua Jin, Chenhao Li, Wenyu Qin, Xiaobing Chen, Guanhua Chen:
A Secure and Efficient Heterogeneous Signcryption Scheme for IIoT. FCS 2022: 3-17 - 2021
- [j38]Chunhua Jin:
Order-Preserving and Order-Reversing Mappings between Consumption Bundles and Utilities. Complex. 2021: 9934743:1-9934743:6 (2021) - [j37]Chunhua Jin, Yongliang Xu, Guanhua Chen, Changhui Yu, Ying Jin, Jinsong Shan:
EBIAC: Efficient biometric identity-based access control for wireless body area networks. J. Syst. Archit. 121: 102317 (2021) - [j36]Ge Kan, Chunhua Jin, Huihui Zhu, Yongliang Xu, Nian Liu:
An identity-based proxy re-encryption for data deduplication in cloud. J. Syst. Archit. 121: 102332 (2021) - 2020
- [j35]Xinwei Wang, Zhangxian Yuan, Chunhua Jin:
A general integration scheme in quadrature element method. Appl. Math. Lett. 105: 106305 (2020) - [j34]Yongtao Yu, Haiyan Guan, Dilong Li, Chunhua Jin, Cheng Wang, Jonathan Li:
Road Manhole Cover Delineation Using Mobile Laser Scanning Point Cloud Data. IEEE Geosci. Remote. Sens. Lett. 17(1): 152-156 (2020) - [j33]Fagen Li, Jiye Wang, Yuyang Zhou, Chunhua Jin, SK Hafizul Islam:
A heterogeneous user authentication and key establishment for mobile client-server environment. Wirel. Networks 26(2): 913-924 (2020) - [c10]Chunhua Jin, Ge Kan, Guanhua Chen, Changhui Yu, Chengjie Xu:
Heterogeneous Deniable Authenticated Encryption Protocol. FCS 2020: 331-346
2010 – 2019
- 2019
- [j32]Guanhua Chen, Jianyang Zhao, Ying Jin, Quanyin Zhu, Chunhua Jin, Jinsong Shan, Hui Zong:
Certificateless Deniable Authenticated Encryption for Location-Based Privacy Protection. IEEE Access 7: 101704-101717 (2019) - [j31]Xiaoguang Liu, Ziqing Wang, Chunhua Jin, Fagen Li, Gaoping Li:
A Blockchain-Based Medical Data Sharing and Protection Scheme. IEEE Access 7: 118943-118953 (2019) - [j30]Nuan Luo, Yu Wang, Chunhua Jin, Yuan Ni, Mingli Zhang:
Effects of socialization interactions on customer engagement in online travel communities. Internet Res. 29(6): 1509-1525 (2019) - [j29]Chunhua Jin, Guanhua Chen, Changhui Yu, Jianyang Zhao, Ying Jin, Jinsong Shan:
Heterogeneous deniable authentication and its application to e-voting systems. J. Inf. Secur. Appl. 47: 104-111 (2019) - [j28]Chunhua Jin, Guanhua Chen, Jianyang Zhao, Shangbing Gao, Changhui Yu:
Identity-based Deniable Authenticated Encryption for E-voting Systems. KSII Trans. Internet Inf. Syst. 13(6): 3299-3315 (2019) - [j27]Xiaohua Wang, Muzi Peng, Lijuan Pan, Min Hu, Chunhua Jin, Fuji Ren:
Two-level attention with two-stage multi-task learning for facial emotion recognition. J. Vis. Commun. Image Represent. 62: 217-225 (2019) - [j26]Alzubair Hassan, Anyembe Andrew Omala, Mohamed Ali, Chunhua Jin, Fagen Li:
Identity-Based User Authenticated Key Agreement Protocol for Multi-Server Environment with Anonymity. Mob. Networks Appl. 24(3): 890-902 (2019) - [j25]Emmanuel Ahene, Chunhua Jin, Fagen Li:
Certificateless deniably authenticated encryption and its application to e-voting system. Telecommun. Syst. 70(3): 417-434 (2019) - [c9]Xiaohua Wang, Muzi Peng, Lijuan Pan, Min Hu, Chunhua Jin, Fuji Ren:
Two-Level Attention with Multi-task Learning for Facial Emotion Estimation. MMM (1) 2019: 227-238 - 2018
- [j24]Chunhua Jin, Jianyang Zhao:
Certificateless aggregate deniable authentication protocol for ad hoc networks. Int. J. Electron. Secur. Digit. Forensics 10(2): 168-187 (2018) - [j23]Anyembe Andrew Omala, Angolo Shem Mbandu, Kamenyi Domenic Mutiria, Chunhua Jin, Fagen Li:
Provably Secure Heterogeneous Access Control Scheme for Wireless Body Area Network. J. Medical Syst. 42(6): 108 (2018) - [j22]Xiaoguang Liu, Chunhua Jin, Fagen Li:
An Improved Two-Layer Authentication Scheme for Wireless Body Area Networks. J. Medical Syst. 42(8): 143:1-143:14 (2018) - [j21]Rui Huang, Chunhua Jin, Ming Mei, Jingxue Yin:
Existence and Stability of Traveling Waves for Degenerate Reaction-Diffusion Equation with Time Delay. J. Nonlinear Sci. 28(3): 1011-1042 (2018) - [j20]Fagen Li, Yanan Han, Chunhua Jin:
Cost-Effective and Anonymous Access Control for Wireless Body Area Networks. IEEE Syst. J. 12(1): 747-758 (2018) - [c8]Chunhua Jin, Guanhua Chen, Changhui Yu, Jianyang Zhao:
Heterogeneous Deniable Authentication for E-Voting Systems. FCS 2018: 41-54 - [c7]Xiaohua Wang, Muzi Peng, Min Hu, Chunhua Jin, Fuji Ren:
Combination of valence-sensitive loss with restrictive center loss for facial expression recognition. ICACI 2018: 528-533 - [c6]Jingsong Shan, Yongjun Zhang, Ming-Xin Jiang, Chunhua Jin, Zhengwei Zhang:
A Fast PQ Hash Code Indexing. IMIS 2018: 395-402 - [i2]Xiaohua Wang, Muzi Peng, Lijuan Pan, Min Hu, Chunhua Jin, Fuji Ren:
Two-level Attention with Two-stage Multi-task Learning for Facial Emotion Recognition. CoRR abs/1811.12139 (2018) - 2017
- [j19]Fagen Li, Yanan Han, Chunhua Jin:
Certificateless online/offline signcryption for the Internet of Things. Wirel. Networks 23(1): 145-158 (2017) - [j18]Xiaojun Zhang, Chunxiang Xu, Yuan Zhang, Chunhua Jin:
Efficient Integrity Verification Scheme for Medical Data Records in Cloud-Assisted Wireless Medical Sensor Networks. Wirel. Pers. Commun. 96(2): 1819-1833 (2017) - [c5]Chunhua Jin, Jianyang Zhao:
Efficient and Short Identity-Based Deniable Authenticated Encryption. ICCCS (2) 2017: 244-255 - 2016
- [j17]Fagen Li, Yanan Han, Chunhua Jin:
Practical access control for sensor networks in the context of the Internet of Things. Comput. Commun. 89-90: 154-164 (2016) - [j16]Xiaojun Zhang, Chunxiang Xu, Chunhua Jin:
Enabling identity-based cloud storage public auditing with quantum computers resistance. Int. J. Electron. Secur. Digit. Forensics 8(1): 82-98 (2016) - [j15]Chunhua Jin, Chunxiang Xu, Xiaojun Zhang, Fagen Li:
A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety. J. Medical Syst. 40(1): 12:1-12:6 (2016) - [j14]Fagen Li, Zhaohui Zheng, Chunhua Jin:
Secure and efficient data transmission in the Internet of Things. Telecommun. Syst. 62(1): 111-122 (2016) - [j13]Fagen Li, Zhaohui Zheng, Chunhua Jin:
Identity-based deniable authenticated encryption and its application to e-mail system. Telecommun. Syst. 62(4): 625-639 (2016) - [j12]Fagen Li, Yanan Han, Chunhua Jin:
Practical Signcryption for Secure Communication of Wireless Sensor Networks. Wirel. Pers. Commun. 89(4): 1391-1412 (2016) - 2015
- [j11]Chunhua Jin, Xinwei Wang:
Weak form quadrature element method for accurate free vibration analysis of thin skew plates. Comput. Math. Appl. 70(8): 2074-2086 (2015) - [j10]Xiaojun Zhang, Chunxiang Xu, Chunhua Jin, Junwei Wen:
A post-quantum communication secure identity-based proxy-signcryption scheme. Int. J. Electron. Secur. Digit. Forensics 7(2): 147-165 (2015) - [j9]Chunhua Jin, Chunxiang Xu, Xiaojun Zhang, Fagen Li:
An efficient certificateless deniable authentication protocol without pairings. Int. J. Electron. Secur. Digit. Forensics 7(2): 179-196 (2015) - [j8]Chunhua Jin, Chunxiang Xu, Xiaojun Zhang, Jining Zhao:
A Secure RFID Mutual Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptography. J. Medical Syst. 39(3): 24 (2015) - [c4]Chunhua Jin, Chunxiang Xu, Linzhi Jiang, Fagen Li:
ID-Based Deniable Threshold Ring Authentication. HPCC/CSS/ICESS 2015: 1779-1784 - 2014
- [j7]Hailong Ye, Jingxue Yin, Chunhua Jin:
Non-oscillatory solutions for a nonlinear neutral delay differential equation. Appl. Math. Comput. 235: 283-291 (2014) - [j6]Chunhua Jin, Xinwei Wang, Luyao Ge:
Novel weak form quadrature element method with expanded Chebyshev nodes. Appl. Math. Lett. 34: 51-59 (2014) - [j5]Xiaojun Zhang, Chunxiang Xu, Chunhua Jin, Run Xie:
Efficient forward secure identity-based shorter signature from lattice. Comput. Electr. Eng. 40(6): 1963-1971 (2014) - [j4]Fagen Li, Pan Xiong, Chunhua Jin:
Identity-based deniable authentication for ad hoc networks. Computing 96(9): 843-853 (2014) - [j3]Xiaojun Zhang, Chunxiang Xu, Chunhua Jin, Run Xie, Jining Zhao:
Efficient fully homomorphic encryption from RLWE with an extension to a threshold encryption scheme. Future Gener. Comput. Syst. 36: 180-186 (2014) - 2013
- [i1]Chunhua Jin, Chunxiang Xu, Xiaojun Zhang, Qianna Xie, Fagen Li:
A novel certificateless deniable authentication protocol. IACR Cryptol. ePrint Arch. 2013: 414 (2013) - 2011
- [c3]Xiangyan Zhang, Chunhua Jin:
The pricing model construction of reverse supply chain based on game theory. EMEIT 2011: 1880-1883 - 2010
- [j2]Ying Yang, Jingxue Yin, Chunhua Jin:
A quenching phenomenon for one-dimensional p-Laplacian with singular boundary flux. Appl. Math. Lett. 23(9): 955-959 (2010)
2000 – 2009
- 2009
- [c2]Chunhua Jin, Min Huang, Fei Liu, Yong He, Xiaoli Li:
Estimating Nitrogen Status of Plant by Vis/NIR Spectroscopy and Mathematical Model. ICNC (3) 2009: 612-616 - [c1]Chunhua Jin, Haiyan Cen, Fei Liu, Yong He:
Study on an Advanced Treatment of Domestic Wastewater by Bio-filtration and Water-Quality Measurement System. ICNC (3) 2009: 644-648 - 2007
- [j1]Jiebao Sun, Yuanyuan Ke, Chunhua Jin, Jingxue Yin:
Existence of positive periodic solutions for the p-Laplacian system. Appl. Math. Lett. 20(6): 696-701 (2007)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 20:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint