Chunhua Jin
Orcid: 0000-0002-1667-1410
According to our database1,
Chunhua Jin
authored at least 63 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Peer Peer Netw. Appl., September, 2024
Finite Time Blow-Up and Chemotactic Collapse in Keller-Segel Model with Signal Consumption.
J. Nonlinear Sci., August, 2024
J. Syst. Archit., February, 2024
Efficient and secure heterogeneous online/offline signcryption for wireless body area network.
Pervasive Mob. Comput., 2024
Comput. Commun., 2024
2023
Veh. Commun., October, 2023
Pervasive Mob. Comput., August, 2023
How an industrial internet platform empowers the digital transformation of SMEs: theoretical mechanism and business model.
J. Knowl. Manag., 2023
Research on Optimization of Public Opinion Supervision Model of Social Network Platform Based on Evolutionary Game.
Inf., 2023
Comput. Syst. Sci. Eng., 2023
2022
J. Syst. Archit., 2022
Heterogeneous online/offline signcryption for secure communication in Internet of Things.
J. Syst. Archit., 2022
Proceedings of the Frontiers in Cyber Security - 5th International Conference, 2022
Proceedings of the Digitalization and Management Innovation, 2022
2021
J. Syst. Archit., 2021
EBIAC: Efficient biometric identity-based access control for wireless body area networks.
J. Syst. Archit., 2021
Order-Preserving and Order-Reversing Mappings between Consumption Bundles and Utilities.
Complex., 2021
2020
A heterogeneous user authentication and key establishment for mobile client-server environment.
Wirel. Networks, 2020
IEEE Geosci. Remote. Sens. Lett., 2020
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020
2019
Certificateless deniably authenticated encryption and its application to e-voting system.
Telecommun. Syst., 2019
Identity-Based User Authenticated Key Agreement Protocol for Multi-Server Environment with Anonymity.
Mob. Networks Appl., 2019
Two-level attention with two-stage multi-task learning for facial emotion recognition.
J. Vis. Commun. Image Represent., 2019
KSII Trans. Internet Inf. Syst., 2019
J. Inf. Secur. Appl., 2019
Effects of socialization interactions on customer engagement in online travel communities.
Internet Res., 2019
Certificateless Deniable Authenticated Encryption for Location-Based Privacy Protection.
IEEE Access, 2019
Proceedings of the MultiMedia Modeling - 25th International Conference, 2019
2018
IEEE Syst. J., 2018
Existence and Stability of Traveling Waves for Degenerate Reaction-Diffusion Equation with Time Delay.
J. Nonlinear Sci., 2018
J. Medical Syst., 2018
J. Medical Syst., 2018
Int. J. Electron. Secur. Digit. Forensics, 2018
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018
Combination of valence-sensitive loss with restrictive center loss for facial expression recognition.
Proceedings of the Tenth International Conference on Advanced Computational Intelligence, 2018
Proceedings of the Frontiers in Cyber Security - First International Conference, 2018
2017
Efficient Integrity Verification Scheme for Medical Data Records in Cloud-Assisted Wireless Medical Sensor Networks.
Wirel. Pers. Commun., 2017
Wirel. Networks, 2017
Proceedings of the Cloud Computing and Security - Third International Conference, 2017
2016
Wirel. Pers. Commun., 2016
Identity-based deniable authenticated encryption and its application to e-mail system.
Telecommun. Syst., 2016
Telecommun. Syst., 2016
A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety.
J. Medical Syst., 2016
Enabling identity-based cloud storage public auditing with quantum computers resistance.
Int. J. Electron. Secur. Digit. Forensics, 2016
Practical access control for sensor networks in the context of the Internet of Things.
Comput. Commun., 2016
2015
A Secure RFID Mutual Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptography.
J. Medical Syst., 2015
Int. J. Electron. Secur. Digit. Forensics, 2015
Int. J. Electron. Secur. Digit. Forensics, 2015
Weak form quadrature element method for accurate free vibration analysis of thin skew plates.
Comput. Math. Appl., 2015
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015
2014
Efficient fully homomorphic encryption from RLWE with an extension to a threshold encryption scheme.
Future Gener. Comput. Syst., 2014
Comput. Electr. Eng., 2014
Appl. Math. Lett., 2014
Appl. Math. Comput., 2014
2013
IACR Cryptol. ePrint Arch., 2013
2011
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011
2010
Appl. Math. Lett., 2010
2009
Proceedings of the Fifth International Conference on Natural Computation, 2009
Study on an Advanced Treatment of Domestic Wastewater by Bio-filtration and Water-Quality Measurement System.
Proceedings of the Fifth International Conference on Natural Computation, 2009
2007
Appl. Math. Lett., 2007