default search action
Yamin Wen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Cong Lin, Yufeng Wu, Ke Huang, Hai Yang, Yuqiao Deng, Yamin Wen:
Copy-move forgery detection using Regional Density Center clustering. J. Vis. Commun. Image Represent. 103: 104221 (2024) - [c9]Yamin Wen, Ren Bin, Yanshan Li, Yumin Huang, Lianghong Wu:
Spatiotemporal adaptive hybrid dynamic graph convolutional network for traffic flow prediction. IJCNN 2024: 1-8 - 2023
- [j16]Yamin Wen, Jinyu Guo, Zheng Gong, Cong Lin:
A new Private Mutual Authentication scheme with group discovery. J. Inf. Secur. Appl. 77: 103558 (2023) - [j15]Zhiyuan An, Jing Pan, Yamin Wen, Fangguo Zhang:
Secret handshakes: Full dynamicity, deniability and lattice-based design. Theor. Comput. Sci. 940(Part): 14-35 (2023) - 2022
- [j14]Wanhua Li, Lingling Xu, Yamin Wen, Fangguo Zhang:
Conjunctive multi-key searchable encryption with attribute-based access control for EHR systems. Comput. Stand. Interfaces 82: 103606 (2022) - [j13]Yungen Wei, Zheng Gong, Shunzhi Yang, Kai Ye, Yamin Wen:
EdgeCRNN: an edge-computing oriented model of acoustic feature enhancement for keyword spotting. J. Ambient Intell. Humaniz. Comput. 13(3): 1525-1535 (2022) - [c8]Nanjiang Xie, Zheng Gong, Yufeng Tang, Lei Wang, Yamin Wen:
Protecting White-Box Block Ciphers with Galois/Counter Mode. DSC 2022: 1-7 - [c7]Zhiyuan An, Jing Pan, Yamin Wen, Fangguo Zhang:
Forward-Secure Revocable Secret Handshakes from Lattices. PQCrypto 2022: 453-479 - 2021
- [c6]Zhiyuan An, Zhuoran Zhang, Yamin Wen, Fangguo Zhang:
Lattice-Based Secret Handshakes with Reusable Credentials. ICICS (2) 2021: 231-248 - 2020
- [j12]Yamin Wen, Fangguo Zhang, Huaxiong Wang, Yinbin Miao, Zheng Gong:
Intersection-policy private mutual authentication from authorized private set intersection. Sci. China Inf. Sci. 63(2): 122101 (2020) - [j11]Yamin Wen, Fangguo Zhang, Huaxiong Wang, Zheng Gong, Yinbin Miao, Yuqiao Deng:
A new secret handshake scheme with multi-symptom intersection for mobile healthcare social networks. Inf. Sci. 520: 142-154 (2020) - [c5]Yungen Wei, Zheng Gong, Shunzhi Yang, Kai Ye, Yamin Wen:
A New Lightweight CRNN Model for Keyword Spotting with Edge Computing Devices. ML4CS (1) 2020: 195-205
2010 – 2019
- 2018
- [j10]Yamin Wen, Zheng Gong, Zhengan Huang, Weidong Qiu:
A new efficient authorized private set intersection protocol from Schnorr signature and its applications. Clust. Comput. 21(1): 287-297 (2018) - [j9]Lu Zhou, Chunhua Su, Yamin Wen, Weijie Li, Zheng Gong:
Towards practical white-box lightweight block cipher implementations for IoTs. Future Gener. Comput. Syst. 86: 507-514 (2018) - 2017
- [c4]Weijie Li, Guohong Liao, Yamin Wen, Zheng Gong:
SpongeMPH: A New Multivariate Polynomial Hash Function based on the Sponge Construction. DSC 2017: 516-520 - 2016
- [j8]Zheng Gong, Shusheng Liu, Yamin Wen, Yiyuan Luo, Weidong Qiu:
Biclique cryptanalysis using balanced complete bipartite subgraphs. Sci. China Inf. Sci. 59(4): 049101:1-049101:3 (2016) - [j7]Lingling Xu, Fangguo Zhang, Willy Susilo, Yamin Wen:
Solutions to the anti-piracy problem in oblivious transfer. J. Comput. Syst. Sci. 82(3): 466-476 (2016) - 2015
- [j6]Xunjun Chen, Yuelong Zhu, Jiguo Li, Yamin Wen, Zheng Gong:
Efficiency and Privacy Enhancement for a Track and Trace System of RFID-Based Supply Chains. Inf. 6(2): 258-274 (2015) - [j5]Yamin Wen, Zheng Gong, Lingling Xu:
A Backward Unlinkable Secret Handshake Scheme with Revocation Support in the Standard Model. Inf. 6(4): 576-591 (2015) - [j4]Yamin Wen, Fengxia Li, Zheng Gong, Shaohua Tang:
一种AVR环境下KLEIN分组密码抗计时和缓存边信道攻击的快速保护方法 (Fast Implementation of KLEIN for Resisting Timing and Cache Side-channel Attacks on AVR). 计算机科学 42(3): 148-152 (2015) - 2014
- [j3]Yamin Wen, Zheng Gong:
Private mutual authentications with fuzzy matching. Int. J. High Perform. Syst. Archit. 5(1): 3-12 (2014) - [c3]Yamin Wen, Zheng Gong:
A Dynamic Matching Secret Handshake Scheme without Random Oracles. NSS 2014: 409-420 - 2013
- [c2]Yamin Wen, Zheng Gong:
An Unlinkable Secret Handshake with Fuzzy Matching for Social Networks. 3PGCIC 2013: 347-353 - 2012
- [j2]Yamin Wen, Fangguo Zhang, Lingling Xu:
Secret handshakes from ID-based message recovery signatures: A new generic approach. Comput. Electr. Eng. 38(1): 96-104 (2012) - 2011
- [j1]Yamin Wen, Fangguo Zhang:
Delegatable secret handshake scheme. J. Syst. Softw. 84(12): 2284-2292 (2011) - 2010
- [c1]Yamin Wen, Fangguo Zhang:
A New Revocable Secret Handshake Scheme with Backward Unlinkability. EuroPKI 2010: 17-30
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint