A key leakage resistant linearly homomorphic signature scheme and its application.
Peer Peer Netw. Appl., June, 2025
Determining Task Assignments for Candidate Workers Based on Trajectory Prediction.
IEEE Trans. Mob. Comput., May, 2025
A efficient lattice-based forward-secure linearly homomorphic signature scheme for network coding.
Telecommun. Syst., December, 2024
Fuzzy Learning-Based Electric Measurement Data Circulation Monitoring and Security Risk Anomaly Evaluation.
Int. J. Mob. Comput. Multim. Commun., 2024
Research on the Co-simulation of Oxygen Generator Membrane, Vacuum Pump and Fan.
Proceedings of the 4th International Conference on Robotics, 2022
Biocrust microbiomes influence ecosystem structure and function in the Mu Us Sandland, northwest China.
,
,
,
,
,
,
,
,
,
,
Ecol. Informatics, 2021
Players' rights to game mods: Towards a more balanced copyright regime.
Comput. Law Secur. Rev., 2021
iVision: An Assistive System for the Blind Based on Augmented Reality and Machine Learning.
Proceedings of the Universal Access in Human-Computer Interaction. Design Approaches and Supporting Technologies, 2020
M4D: A Malware Detection Method Using Multimodal Features.
Proceedings of the Frontiers in Cyber Security - Second International Conference, 2019
Vehicle Detection Under Unmanned Aerial Vehicle Based on Improved YOLOv3.
Proceedings of the 12th International Congress on Image and Signal Processing, 2019
Purchase' Portfolio Optimization of Power Supply Company with Distributed PV Considering EVs.
Proceedings of the IEEE Industry Applications Society Annual Meeting, 2018
Multi-message and multi-receiver heterogeneous signcryption scheme for ad-hoc networks.
Inf. Secur. J. A Glob. Perspect., 2017
Inverse-time protection scheme for active distribution network based on user-defined characteristics.
Proceedings of the 2017 IEEE PES Innovative Smart Grid Technologies Conference Europe, 2017
Privacy-preserving multi-receiver signcryption scheme for heterogeneous systems.
Secur. Commun. Networks, 2016
Strong Designated Verifier Signature Scheme Resisting Replay Attack.
Inf. Technol. Control., 2015
A new forward secure content extraction signature scheme.
Proceedings of the 12th International Conference on Fuzzy Systems and Knowledge Discovery, 2015
Assessing college English teaching based on grey relational analysis.
Proceedings of the 10th International Conference on Fuzzy Systems and Knowledge Discovery, 2013
An Entropy-based Approach for Supplier Selection with Interval Information.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008