default search action
Lihua Dong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2023
- [j4]Lihua Dong, Yongjun Liu:
Catalytic Mechanism of Pyridoxal 5′-Phosphate-Dependent Aminodeoxychorismate Lyase: A Computational QM/MM Study. J. Chem. Inf. Model. 63(4): 1313-1322 (2023) - [j3]Lihua Dong, Yongjun Liu:
Exploring the Substrate-Assisted Dehydration of Chorismate Catalyzed by Dehydratase MqnA from QM/MM Calculations: The Role of Pocket Residues and the Hydrolysis Mechanism of N17D Mutant. J. Chem. Inf. Model. 63(23): 7499-7507 (2023) - 2014
- [j2]Yong Zeng, Xin Wang, Zhihong Liu, Jianfeng Ma, Lihua Dong:
Reliable Enhanced Secure Code Dissemination with Rateless Erasure Codes in WSNs. J. Softw. 9(1): 190-194 (2014) - 2009
- [j1]Lihua Dong, Ki-Il Kim:
Performance Study for Impact of Mobility Model and Position Update Interval in Geographic Routing. J. Inform. and Commun. Convergence Engineering 7(4): 489-495 (2009)
Conference and Workshop Papers
- 2020
- [c16]Chunlan Zhang, Lihua Dong:
An Improved Fast Correlation Attack on Fruit-80. AINA 2020: 1426-1436 - [c15]Yilian Li, Yiyu Yang, Xiao Yu, Ting Yang, Lihua Dong, Wengjie Wang:
IoT-APIScanner: Detecting API Unauthorized Access Vulnerabilities of IoT Platform. ICCCN 2020: 1-5 - 2019
- [c14]Jie Chi, Lihua Dong, Yong Zeng:
Reconfigurable Pseudo-Random Number Generator Based on Cellular Automata. NaNA 2019: 268-273 - 2018
- [c13]Lihua Dong, Jie Wang, Shuo Zhang:
Novel Analysis of Stream Cipher Combing LFSR and FCSR. FCS 2018: 23-38 - 2017
- [c12]Lihua Dong, Hui Yang, Yong Zeng:
Analysis and Improvement of True Random Number Generator Based on Autonomous Boolean Network. CIS 2017: 243-247 - [c11]Donghang Liu, Lihua Dong, Shaoqing Lv, Ying Dong, Fannv He, Chensi Wu, Yuqing Zhang, Hua Ma:
A Novel Approach to Network Security Situation Assessment Based on Attack Confidence. NSS 2017: 450-463 - [c10]Yi Chen, Aimin Zhou, Rongfang Zhou, Peng He, Yong Zhao, Lihua Dong:
An Evolutionary Algorithm with a New Coding Scheme for Multi-objective Portfolio Optimization. SEAL 2017: 97-109 - 2014
- [c9]Lihua Dong, Yong Zeng, Ligang Ji, Xucang Han:
Study on the Pass Rate of NIST SP800-22 Statistical Test Suite. CIS 2014: 402-404 - 2013
- [c8]Yuehua Zhou, Yong Zeng, Zhihong Liu, Nan Li, Jianfeng Ma, Lihua Dong:
Fault and Intrusion Tolerance of Complex Networks: A Controllability View. INCoS 2013: 516-520 - 2012
- [c7]Yong Zeng, Xin Wang, Lihua Dong, Jianfeng Ma, Zhihong Liu:
Out-of-Order-Delivery-Tolerant Secure Code Dissemination with Fountain Codes in Wireless Sensor Networks. CIS 2012: 683-686 - 2010
- [c6]Yong Zeng, Qinqi Pei, Jianfeng Ma, Lihua Dong:
Efficient secure multicast route using genetic algorithms for wireless sensor and actor networks. HPCS 2010: 676-678 - 2009
- [c5]Yong Zeng, Jianfeng Ma, Qinqi Pei, Lihua Dong:
A Hardware-Oriented Fast Encryption Keystream Generator for Digital Rights Management. CIS (2) 2009: 584-586 - [c4]Yanan Li, Xinhua Zhao, Lihua Dong, Hongxia Li, Wenbo Lin:
Distribution and Pollution Assessment of Heavy Metals in Sewage Discharge Channels Inpouring into Sea in Tianjin, China. ESIAT (2) 2009: 205-208 - 2008
- [c3]Yong Zeng, Jianfeng Ma, Lihua Dong, Liaojun Pang, Yuanbo Guo:
Adaptive Algorithms to Mitigate Inefficiency in Reliability Differentiation Mechanisms for Wireless Sensor Networks. MSN 2008: 208-211 - 2006
- [c2]Lihua Dong, Yupu Hu, Yong Zeng:
Computing the k-Error N-Adic Complexity of a Sequence of Period pn. SETA 2006: 190-198 - 2005
- [c1]Lihua Dong, Yong Zeng, Yupu Hu:
Stability of the Linear Complexity of the Generalized Self-shrinking Sequences. CIS (2) 2005: 68-73
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint