Hang Li

Orcid: 0000-0002-1230-4007

Affiliations:
  • Shenyang Normal University, Software College, China


According to our database1, Hang Li authored at least 37 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
An Anomaly Detection Model Based on Deep Auto-Encoder and Capsule Graph Convolution via Sparrow Search Algorithm in 6G Internet of Everything.
IEEE Internet Things J., September, 2024

Attribute-based multiparty searchable encryption model for privacy protection of text data.
Multim. Tools Appl., May, 2024

Comprehensive review of emerging cybersecurity trends and developments.
Int. J. Electron. Secur. Digit. Forensics, 2024

2023
Impact of Covid-19 epidemic on online learning and educational resources in China.
EAI Endorsed Trans. Pervasive Health Technol., 2023

Blockchain applications for Internet of Things (IoT): A review.
Multiagent Grid Syst., 2023

The state of art and review on video streaming.
J. High Speed Networks, 2023

2022
Multichannel convolutional neural network-based fuzzy active contour model for medical image segmentation.
Evol. Syst., 2022

2021
A Bagging Strategy-Based Kernel Extreme Learning Machine for Complex Network Intrusion Detection.
EAI Endorsed Trans. Scalable Inf. Syst., 2021

GSAPSO-MQC: medical image encryption based on genetic simulated annealing particle swarm optimization and modified quantum chaos system.
Evol. Intell., 2021

2020
Hot Region Selection Based on Selective Search and Modified Fuzzy C-Means in Remote Sensing Images.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2020

Active contour modal based on density-oriented BIRCH clustering method for medical image segmentation.
Multim. Tools Appl., 2020

A Network Intrusion Detection Method Based on Deep Multi-scale Convolutional Neural Network.
Int. J. Wirel. Inf. Networks, 2020

Medical Image Encryption Based on Stream Cipher Algorithm and Krill Group.
Int. J. Netw. Secur., 2020

A Modified Advanced Encryption Standard for Data Security.
Int. J. Netw. Secur., 2020

An Improved Image Encryption Algorithm Based on Chaotic Mapping and Discrete Wavelet Transform Domain.
Int. J. Netw. Secur., 2020

Research on Medical Image Encryption Method Based on Improved Krill Herb Algorithm and Chaotic Systems.
Int. J. Netw. Secur., 2020

2019
A New Wavelet Threshold Function Based on Gaussian Kernel Function for Image De-noising.
J. Inf. Hiding Multim. Signal Process., 2019

A New Chi-square Distribution De-noising Method for Image Encryption.
Int. J. Netw. Secur., 2019

A Novel Proxy Re-encryption Scheme Based on Identity Property and Stateless Broadcast Encryption Under Cloud Environment.
Int. J. Netw. Secur., 2019

CSDK: A Chi-square distribution-Kernel method for image de-noising under the Internet of things big data environment.
Int. J. Distributed Sens. Networks, 2019

New intelligent interface study based on K-means gaze tracking.
Int. J. Comput. Sci. Eng., 2019

A new wolf colony search algorithm based on search strategy for solving travelling salesman problem.
Int. J. Comput. Sci. Eng., 2019

GPOGC: Gaussian Pigeon-Oriented Graph Clustering Algorithm for Social Networks Cluster.
IEEE Access, 2019

Research on Improved Pedestrian Detection Algorithm Based on Convolutional Neural Network.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019

2018
A New Chinese Word Segmentation Method Based on Maximum Matching.
J. Inf. Hiding Multim. Signal Process., 2018

A New Frog Leaping Algorithm Based on Simulated Annealing and Immunization Algorithm for Low-power Mapping in Network-on-chip.
J. Inf. Hiding Multim. Signal Process., 2018

An Efficient and Secure Cipher-Text Retrieval Scheme Based on Mixed Homomorphic Encryption and Multi-Attribute Sorting Method.
Int. J. Netw. Secur., 2018

A High-efficiency Discrete Logarithm-based Multi-proxy Blind Signature Scheme via Elliptic Curve and Bilinear Mapping.
Int. J. Netw. Secur., 2018

Modified pyramid dual tree direction filter-based image denoising via curvature scale and nonlocal mean multigrade remnant filter.
Int. J. Commun. Syst., 2018

2017
A Density-based Clustering Method for K-anonymity Privacy Protection.
J. Inf. Hiding Multim. Signal Process., 2017

A Proxy Re-Encryption Scheme Based on Elliptic Curve Group.
J. Inf. Hiding Multim. Signal Process., 2017

Study a Join Query Strategy Over Data Stream Based on Sliding Windows.
Proceedings of the Data Mining and Big Data - Second International Conference, 2017

2016
A New Provable Secure Certificateless Aggregate Signcryption Scheme.
J. Inf. Hiding Multim. Signal Process., 2016

2009
Distributed Hierarchical Fault Management Paradigms of Satellite Network.
Proceedings of the 2009 Pacific-Asia Conference on Circuits, Communications and Systems, 2009

The Level Filling Algorithm for Clockwise Edge.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

Application of IP Multicast Technology in Computer Laboratory Teaching System.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

2007
Fault Tolerant Reconstruction Algorithm Based on Distributed Agents for Network Management.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007


  Loading...