Lianhai Wang
Orcid: 0009-0001-0629-907X
According to our database1,
Lianhai Wang
authored at least 74 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Connect. Sci., December, 2024
IEEE Wirel. Commun., October, 2024
Efficient Certificateless Online/Offline Signcryption Scheme Without Bilinear Pairing for Smart Home Consumer Electronics.
IEEE Trans. Consumer Electron., February, 2024
Comput. Stand. Interfaces, January, 2024
Comput. Stand. Interfaces, January, 2024
A Blockchain-Based Privacy-Preserving Healthcare Data Sharing Scheme for Incremental Updates.
Symmetry, 2024
Comput. Electr. Eng., 2024
Proceedings of the 2024 4th International Conference on Control and Intelligent Robotics, 2024
2023
A privacy-preserving and efficient data sharing scheme with trust authentication based on blockchain for mHealth.
Connect. Sci., December, 2023
Isoga: An Isogeny-Based Quantum-Resist Searchable Encryption Scheme Against Keyword Guessing Attacks.
IEEE Syst. J., June, 2023
Symmetry, February, 2023
An Approach for Blockchain and Symmetric Keys Broadcast Encryption Based Access Control in IoT.
Symmetry, February, 2023
Auditable Blockchain Rewriting in Permissioned Setting With Mandatory Revocability for IoT.
IEEE Internet Things J., 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023
2022
Privacy protection in social applications: A ciphertext policy attribute-based encryption with keyword search.
Int. J. Intell. Syst., December, 2022
Outsourced Data Integrity Checking with Practical Key Update in Edge-Cloud Resilient Networks.
IEEE Wirel. Commun., 2022
An Approach for Blockchain Pool Mining Employing the Consensus Protocol Robust against Block Withholding and Selfish Mining Attacks.
Symmetry, 2022
Security Enhanced Symmetric Key Encryption Employing an Integer Code for the Erasure Channel.
Symmetry, 2022
A Quantum Secure and Noninteractive Identity-Based Aggregate Signature Protocol From Lattices.
IEEE Syst. J., 2022
IEEE Netw., 2022
A Secure and Efficient Multiserver Authentication and Key Agreement Protocol for Internet of Vehicles.
IEEE Internet Things J., 2022
An Approach for Security Enhancement of Certain Encryption Schemes Employing Error Correction Coding and Simulated Synchronization Errors.
Entropy, 2022
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022
2021
Minimum Dominating Set of Multiplex Networks: Definition, Application, and Identification.
IEEE Trans. Syst. Man Cybern. Syst., 2021
Secur. Commun. Networks, 2021
Secur. Commun. Networks, 2021
J. Inf. Secur. Appl., 2021
Proceedings of the ACM ICEA '21: 2021 ACM International Conference on Intelligent Computing and its Emerging Applications, Jinan, China, December 28, 2021
Supervisory Scheme for Blockchain Privacy Protection Technique Based on Group Signature.
Proceedings of the ACM ICEA '21: 2021 ACM International Conference on Intelligent Computing and its Emerging Applications, Jinan, China, December 28, 2021
2020
Blockchain-Based Anonymous Authentication With Selective Revocation for Smart Industrial Applications.
IEEE Trans. Ind. Informatics, 2020
Inf. Sci., 2020
Improved Security of a Pairing-Free Certificateless Aggregate Signature in Healthcare Wireless Medical Sensor Networks.
IEEE Internet Things J., 2020
Linear Complexity of Two Classes of Binary Interleaved Sequences with Low Autocorrelation.
Int. J. Netw. Secur., 2020
PLC-SEIFF: A programmable logic controller security incident forensics framework based on automatic construction of security constraints.
Comput. Secur., 2020
The 2-adic complexity of a class of binary sequences with optimal autocorrelation magnitude.
Cryptogr. Commun., 2020
2019
Virus Propagation and Patch Distribution in Multiplex Networks: Modeling, Analysis, and Optimal Allocation.
IEEE Trans. Inf. Forensics Secur., 2019
A new fixed-time stability theorem and its application to the synchronization control of memristive neural networks.
Neurocomputing, 2019
Recognizing roles of online illegal gambling participants: An ensemble learning approach.
Comput. Secur., 2019
Deformable Convolutional Matrix Factorization for Document Context-Aware Recommendation in Social Networks.
IEEE Access, 2019
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019
Proceedings of the 2nd International Conference on Big Data Technologies, 2019
Research on the Quality Prediction of Online Chinese Question Answering Community Answers Based on Comments.
Proceedings of the 2nd International Conference on Big Data Technologies, 2019
Analysis of the Influence of Individual Web Behavior Pattern on Group Behavior Simulation.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019
Proceedings of the Information Retrieval - 25th China Conference, 2019
2018
Optimal Dismantling of Interdependent Networks Based on Inverse Explosive Percolation.
IEEE Trans. Circuits Syst. II Express Briefs, 2018
Secur. Commun. Networks, 2018
A Sparse Grid Stochastic Collocation Upwind Finite Volume Element Method for the Constrained Optimal Control Problem Governed by Random Convection Diffusion Equations.
J. Sci. Comput., 2018
Proceedings of the Tenth International Conference on Soft Computing and Pattern Recognition, 2018
Role Recognition of Illegal Online Gambling Participants Using Monetary Transaction Data.
Proceedings of the Information and Communications Security - 20th International Conference, 2018
2017
Linking Multiple Online Identities in Criminal Investigations: A Spectral Co-Clustering Framework.
IEEE Trans. Inf. Forensics Secur., 2017
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017
Proceedings of the Data Science, 2017
Proceedings of the Cloud Computing and Security - Third International Conference, 2017
2016
EURASIP J. Inf. Secur., 2016
The robustness of interdependent networks under the interplay between cascading failures and virus propagation.
CoRR, 2016
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016
Proceedings of the IEEE International Conference on Information and Automation, 2016
2015
2014
Robust palmprint identification based on directional representations and compressed sensing.
Multim. Tools Appl., 2014
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014
2013
Proceedings of the Sixth International Conference on Machine Vision, 2013
Proceedings of the Sixth International Conference on Machine Vision, 2013
Research on Extracting System Logged-In Password Forensically from Windows Memory Image File.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013
2012
Proceedings of the Intelligent Information Processing VI, 2012
2010
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010
Acquisition of Network Connection Status Information from Physical Memory on Windows Vista Operating System.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010
2009
Proceedings of the Business Intelligence: Artificial Intelligence in Business, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009