Lihua Dong

Orcid: 0000-0003-2131-0262

According to our database1, Lihua Dong authored at least 20 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Exploring the Substrate-Assisted Dehydration of Chorismate Catalyzed by Dehydratase MqnA from QM/MM Calculations: The Role of Pocket Residues and the Hydrolysis Mechanism of N17D Mutant.
J. Chem. Inf. Model., December, 2023

Catalytic Mechanism of Pyridoxal 5′-Phosphate-Dependent Aminodeoxychorismate Lyase: A Computational QM/MM Study.
J. Chem. Inf. Model., February, 2023

2020
IoT-APIScanner: Detecting API Unauthorized Access Vulnerabilities of IoT Platform.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020

An Improved Fast Correlation Attack on Fruit-80.
Proceedings of the Advanced Information Networking and Applications, 2020

2019
Reconfigurable Pseudo-Random Number Generator Based on Cellular Automata.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

2018
Novel Analysis of Stream Cipher Combing LFSR and FCSR.
Proceedings of the Frontiers in Cyber Security - First International Conference, 2018

2017
An Evolutionary Algorithm with a New Coding Scheme for Multi-objective Portfolio Optimization.
Proceedings of the Simulated Evolution and Learning - 11th International Conference, 2017

A Novel Approach to Network Security Situation Assessment Based on Attack Confidence.
Proceedings of the Network and System Security - 11th International Conference, 2017

Analysis and Improvement of True Random Number Generator Based on Autonomous Boolean Network.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

2014
Reliable Enhanced Secure Code Dissemination with Rateless Erasure Codes in WSNs.
J. Softw., 2014

Study on the Pass Rate of NIST SP800-22 Statistical Test Suite.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

2013
Fault and Intrusion Tolerance of Complex Networks: A Controllability View.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

2012
Out-of-Order-Delivery-Tolerant Secure Code Dissemination with Fountain Codes in Wireless Sensor Networks.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

2010
Efficient secure multicast route using genetic algorithms for wireless sensor and actor networks.
Proceedings of the 2010 International Conference on High Performance Computing & Simulation, 2010

2009
Performance Study for Impact of Mobility Model and Position Update Interval in Geographic Routing.
J. Inform. and Commun. Convergence Engineering, 2009

Distribution and Pollution Assessment of Heavy Metals in Sewage Discharge Channels Inpouring into Sea in Tianjin, China.
Proceedings of the 2009 International Conference on Environmental Science and Information Application Technology, 2009

A Hardware-Oriented Fast Encryption Keystream Generator for Digital Rights Management.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

2008
Adaptive Algorithms to Mitigate Inefficiency in Reliability Differentiation Mechanisms for Wireless Sensor Networks.
Proceedings of the MSN 2008, 2008

2006
Computing the <i>k</i>-Error <i>N</i>-Adic Complexity of a Sequence of Period <i>p</i><sup><i>n</i></sup>.
Proceedings of the Sequences and Their Applications, 2006

2005
Stability of the Linear Complexity of the Generalized Self-shrinking Sequences.
Proceedings of the Computational Intelligence and Security, International Conference, 2005


  Loading...