Ping Pan
Orcid: 0000-0003-3333-5539
According to our database1,
Ping Pan
authored at least 36 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Green Public Finance and "Dual Control" of Carbon Emissions: New Evidence from China.
Syst., 2024
2022
Stationary iterated weighted Tikhonov regularization method for identifying an unknown source term of time-fractional radial heat equation.
Numer. Algorithms, 2022
Image Encryption Scheme Based on Mixed Chaotic Bernoulli Measurement Matrix Block Compressive Sensing.
Entropy, 2022
Double-Matrix Decomposition Image Steganography Scheme Based on Wavelet Transform with Multi-Region Coverage.
Entropy, 2022
2021
2020
An Attitude Prediction Method for Autonomous Recovery Operation of Unmanned Surface Vehicle.
Sensors, 2020
Key Regulatory Effect of Activated HIF-1α/VEGFA Signaling Pathway in Systemic Capillary Leak Syndrome Confirmed by Bioinformatics Analysis.
J. Comput. Biol., 2020
Provably Secure Encryption Schemes With Zero Setup and Linear Speed by Using Rubik's Cubes.
IEEE Access, 2020
2018
Authenticity identification of speaker digital recording data based on quantum genetic algorithm.
Multim. Tools Appl., 2018
2016
RFC, August, 2016
MPLS Transport Profile (MPLS-TP) Operations, Administration, and Maintenance (OAM) Identifiers Management Information Base (MIB).
RFC, January, 2016
2014
RFC, December, 2014
Efficient threshold public key encryption with full security based on dual pairing vector spaces.
Int. J. Commun. Syst., 2014
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014
Reliability Analysis of Business Continuity Based on SPN in Information System Security Management.
Proceedings of the 2014 Ninth International Conference on P2P, 2014
2013
RFC, August, 2013
Label Switched Path (LSP) Ping for Pseudowire Forwarding Equivalence Classes (FECs) Advertised over IPv6.
RFC, January, 2013
Publicly Verifiable Secret Sharing Scheme with Provable Security against Chosen Secret Attacks.
Int. J. Distributed Sens. Networks, 2013
Chameleon Hash Functions and One-Time Signature Schemes from Inner Automorphism Groups.
Fundam. Informaticae, 2013
Efficient Construction of CCA-Secure Threshold PKE Based on Hashed Diffie-Hellman Assumption.
Comput. J., 2013
Open transport switch: a software defined networking architecture for transport networks.
Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, 2013
Proceedings of the IEEE 21st Annual Symposium on High-Performance Interconnects, 2013
2012
Secur. Commun. Networks, 2012
Proceedings of the 21st IEEE International Symposium on Industrial Electronics, 2012
Faculty Training of Computer Hardware Courses Based on University-enterprise Cooperation.
Proceedings of the 14th IEEE International Conference on High Performance Computing and Communication & 9th IEEE International Conference on Embedded Software and Systems, 2012
Proceedings of the 14th IEEE International Conference on High Performance Computing and Communication & 9th IEEE International Conference on Embedded Software and Systems, 2012
2009
Rapid Service Creation Environment for service delivery platform based on service templates.
Proceedings of the Integrated Network Management, 2009
Proceedings of the Second International Joint Conference on Computational Sciences and Optimization, 2009
2008
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008
2005
2001
2000
J. Commun. Networks, 2000
1999