Deniable ring signature scheme based on the ISRSAC digital signature algorithm.
PeerJ Comput. Sci., 2024
Generalizing Soft Actor-Critic Algorithms to Discrete Action Spaces.
Proceedings of the Pattern Recognition and Computer Vision - 7th Chinese Conference, 2024
WAS: improved white-box cryptographic algorithm over AS iteration.
Cybersecur., December, 2023
A Secure Scheme Based on a Hybrid of Classical-Quantum Communications Protocols for Managing Classical Blockchains.
Entropy, 2023
THP-UO Algorithm for Multi-User mmWave MIMO Systems.
Wirel. Pers. Commun., 2021
Image captioning via proximal policy optimization.
Image Vis. Comput., 2021
Hybrid precoding based on adaptive RF-chain-to-antenna connection for millimeter wave MIMO systems.
Phys. Commun., 2020
Tight Proofs of Identity-based Signatures without Random Oracle.
Int. J. Netw. Secur., 2019
ROD-based hybrid TH precoding and combining for mmWave large-scale MIMO systems.
Digit. Signal Process., 2019
An Effective Framework for Person Re-Identification in Video Surveillance.
Proceedings of the 3rd International Conference on Multimedia Systems and Signal Processing, 2018
Efficient Concurrent npoly(logn)-Simulatable Argument of Knowledge.
Proceedings of the Information Security Practice and Experience, 2009
Sure Interpolation and Its Application to Hierarchical Threshold Secret Sharing Scheme.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008
Dynamic and Verifiable Secret Sharing Among Weighted Participants.
J. Syst. Sci. Complex., 2007