Lianhai Wang

Orcid: 0009-0001-0629-907X

According to our database1, Lianhai Wang authored at least 74 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A reputation-based dynamic reorganization scheme for blockchain network sharding.
Connect. Sci., December, 2024

Self-Tallying Voting with Blockchain in Wireless Network Environment.
IEEE Wirel. Commun., October, 2024

Efficient Certificateless Online/Offline Signcryption Scheme Without Bilinear Pairing for Smart Home Consumer Electronics.
IEEE Trans. Consumer Electron., February, 2024

A regulated anonymous cryptocurrency with batch linkability.
Comput. Stand. Interfaces, January, 2024

A lightweight delegated private set intersection cardinality protocol.
Comput. Stand. Interfaces, January, 2024

A Blockchain-Based Privacy-Preserving Healthcare Data Sharing Scheme for Incremental Updates.
Symmetry, 2024

Relay network-based cross-chain data interaction protocol with integrity audit.
Comput. Electr. Eng., 2024

Structural Design and Analysis of Special Small ROV for Mariculture Based on ANSYS.
Proceedings of the 2024 4th International Conference on Control and Intelligent Robotics, 2024

2023
A privacy-preserving and efficient data sharing scheme with trust authentication based on blockchain for mHealth.
Connect. Sci., December, 2023

Isoga: An Isogeny-Based Quantum-Resist Searchable Encryption Scheme Against Keyword Guessing Attacks.
IEEE Syst. J., June, 2023

A Malware Detection Approach Based on Deep Learning and Memory Forensics.
Symmetry, February, 2023

An Approach for Blockchain and Symmetric Keys Broadcast Encryption Based Access Control in IoT.
Symmetry, February, 2023

Auditable Blockchain Rewriting in Permissioned Setting With Mandatory Revocability for IoT.
IEEE Internet Things J., 2023

Felix: A Model of Detecting Off-chain Abnormal States in Decentralized Applications.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Trusted Auditing of Data Operation Behaviors in Cloud based on Blockchain and TEE.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023

2022
Privacy protection in social applications: A ciphertext policy attribute-based encryption with keyword search.
Int. J. Intell. Syst., December, 2022

Outsourced Data Integrity Checking with Practical Key Update in Edge-Cloud Resilient Networks.
IEEE Wirel. Commun., 2022

An Approach for Blockchain Pool Mining Employing the Consensus Protocol Robust against Block Withholding and Selfish Mining Attacks.
Symmetry, 2022

Security Enhanced Symmetric Key Encryption Employing an Integer Code for the Erasure Channel.
Symmetry, 2022

A Quantum Secure and Noninteractive Identity-Based Aggregate Signature Protocol From Lattices.
IEEE Syst. J., 2022

Toward Data Security in 6G Networks: A Public-Key Searchable Encryption Approach.
IEEE Netw., 2022

A Secure and Efficient Multiserver Authentication and Key Agreement Protocol for Internet of Vehicles.
IEEE Internet Things J., 2022

An Approach for Security Enhancement of Certain Encryption Schemes Employing Error Correction Coding and Simulated Synchronization Errors.
Entropy, 2022

A Cross Data Center Access Control Model by Constructing GAS on Blockchain.
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022

A Method of Traceless File Deletion for NTFS File System.
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022

2021
Minimum Dominating Set of Multiplex Networks: Definition, Application, and Identification.
IEEE Trans. Syst. Man Cybern. Syst., 2021

A Blockchain System Based on Quantum-Resistant Digital Signature.
Secur. Commun. Networks, 2021

The Applications of Blockchain in Artificial Intelligence.
Secur. Commun. Networks, 2021

A privacy protection scheme for telemedicine diagnosis based on double blockchain.
J. Inf. Secur. Appl., 2021

A Scheme of Traceless File Deletion for Windows FAT32 File System.
Proceedings of the ACM ICEA '21: 2021 ACM International Conference on Intelligent Computing and its Emerging Applications, Jinan, China, December 28, 2021

Supervisory Scheme for Blockchain Privacy Protection Technique Based on Group Signature.
Proceedings of the ACM ICEA '21: 2021 ACM International Conference on Intelligent Computing and its Emerging Applications, Jinan, China, December 28, 2021

2020
Blockchain-Based Anonymous Authentication With Selective Revocation for Smart Industrial Applications.
IEEE Trans. Ind. Informatics, 2020

Decentralized Public Key Infrastructures atop Blockchain.
IEEE Netw., 2020

Incentive mechanism for cooperative authentication: An evolutionary game approach.
Inf. Sci., 2020

Improved Security of a Pairing-Free Certificateless Aggregate Signature in Healthcare Wireless Medical Sensor Networks.
IEEE Internet Things J., 2020

Linear Complexity of Two Classes of Binary Interleaved Sequences with Low Autocorrelation.
Int. J. Netw. Secur., 2020

PLC-SEIFF: A programmable logic controller security incident forensics framework based on automatic construction of security constraints.
Comput. Secur., 2020

The 2-adic complexity of a class of binary sequences with optimal autocorrelation magnitude.
Cryptogr. Commun., 2020

2019
Virus Propagation and Patch Distribution in Multiplex Networks: Modeling, Analysis, and Optimal Allocation.
IEEE Trans. Inf. Forensics Secur., 2019

A new fixed-time stability theorem and its application to the synchronization control of memristive neural networks.
Neurocomputing, 2019

Recognizing roles of online illegal gambling participants: An ensemble learning approach.
Comput. Secur., 2019

Deformable Convolutional Matrix Factorization for Document Context-Aware Recommendation in Social Networks.
IEEE Access, 2019

Virtual Machine Memory Forensics Method for XenServer Platform.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

An Illegal Billboard Advertisement Detection Framework Based on Machine Learning.
Proceedings of the 2nd International Conference on Big Data Technologies, 2019

Research on the Quality Prediction of Online Chinese Question Answering Community Answers Based on Comments.
Proceedings of the 2nd International Conference on Big Data Technologies, 2019

Analysis of the Influence of Individual Web Behavior Pattern on Group Behavior Simulation.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

A Method for User Avatar Authenticity Based on Multi-feature Fusion.
Proceedings of the Information Retrieval - 25th China Conference, 2019

2018
Optimal Dismantling of Interdependent Networks Based on Inverse Explosive Percolation.
IEEE Trans. Circuits Syst. II Express Briefs, 2018

Secure Virtualization Environment Based on Advanced Memory Introspection.
Secur. Commun. Networks, 2018

A Sparse Grid Stochastic Collocation Upwind Finite Volume Element Method for the Constrained Optimal Control Problem Governed by Random Convection Diffusion Equations.
J. Sci. Comput., 2018

The Design of a Cloud Forensics Middleware System Base on Memory Analysis.
Proceedings of the Tenth International Conference on Soft Computing and Pattern Recognition, 2018

Role Recognition of Illegal Online Gambling Participants Using Monetary Transaction Data.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

2017
Linking Multiple Online Identities in Criminal Investigations: A Spectral Co-Clustering Framework.
IEEE Trans. Inf. Forensics Secur., 2017

Linking social network accounts by modeling user spatiotemporal habits.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017

Research on Linux Kernel Version Diversity for Precise Memory Analysis.
Proceedings of the Data Science, 2017

The Categories of Quantum Information Hiding Protocol.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2016
An adaptive approach for Linux memory analysis based on kernel code reconstruction.
EURASIP J. Inf. Secur., 2016

The robustness of interdependent networks under the interplay between cascading failures and virus propagation.
CoRR, 2016

Social Media account linkage using user-generated geo-location data.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

Video forensics research based on authenticity and integrity.
Proceedings of the IEEE International Conference on Information and Automation, 2016

2015
The robustness of multiplex networks under layer node-based attack.
CoRR, 2015

Finding another yourself in multiplex networks.
Appl. Math. Comput., 2015

2014
Robust palmprint identification based on directional representations and compressed sensing.
Multim. Tools Appl., 2014

A KVM Virtual Machine Memory Forensics Method Based on VMCS.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

2013
Forensic analysis of social networking application on iOS devices.
Proceedings of the Sixth International Conference on Machine Vision, 2013

Face recognition using sparse representation classifier with Volterra kernels.
Proceedings of the Sixth International Conference on Machine Vision, 2013

Research on Extracting System Logged-In Password Forensically from Windows Memory Image File.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

2012
A High Performance and Secure Palmprint Template Protection Scheme.
J. Softw., 2012

Robust Palmprint Recognition Based on Directional Representations.
Proceedings of the Intelligent Information Processing VI, 2012

2010
Live Memory Acquisition through FireWire.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

Acquisition of Network Connection Status Information from Physical Memory on Windows Vista Operating System.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

Network Connections Information Extraction of 64-Bit Windows 7 Memory Images.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

2009
Algorithm for Agent Collaborative Learning Task Allocation Based Graph Framework.
Proceedings of the Business Intelligence: Artificial Intelligence in Business, 2009

Windows Memory Analysis Based on KPCR.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009


  Loading...