Yixian Yang

Orcid: 0000-0001-8067-4774

According to our database1, Yixian Yang authored at least 350 papers between 1990 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Optimal ternary locally repairable codes.
Des. Codes Cryptogr., September, 2024

Controlled node dialogue in IoT networks based on nonlocal orthogonal product states.
J. Opt. Commun. Netw., March, 2024

Lightweight Voice Spoofing Detection Using Improved One-Class Learning and Knowledge Distillation.
IEEE Trans. Multim., 2024

A blind watermarking scheme for TMQIR images.
Multim. Tools Appl., 2024

2023
A voice spoofing detection framework for IoT systems with feature pyramid and online knowledge distillation.
J. Syst. Archit., October, 2023

Fault-tolerant error correction for quantum Hamming codes with only two ancillary qudits.
Quantum Inf. Process., January, 2023

Honeywords Generation Mechanism Based on Zero-Divisor Graph Sequences.
IEEE Trans. Serv. Comput., 2023

Fast and Privacy-Preserving Attribute-Based Keyword Search in Cloud Document Services.
IEEE Trans. Serv. Comput., 2023

Privacy-Preserving Traceable Attribute-Based Keyword Search in Multi-Authority Medical Cloud.
IEEE Trans. Cloud Comput., 2023

Generalized Voice Spoofing Detection via Integral Knowledge Amalgamation.
IEEE ACM Trans. Audio Speech Lang. Process., 2023

Multi-party quantum private information comparison based on nonlocal orthogonal product states.
Quantum Inf. Process., 2023

Cross-domain vulnerability detection using graph embedding and domain adaptation.
Comput. Secur., 2023

2022
Is semi-selfish mining available without being detected?
Int. J. Intell. Syst., December, 2022

Privacy-Preserving Spatio-Temporal Keyword Search for Outsourced Location-Based Services.
IEEE Trans. Serv. Comput., 2022

Constructions and Weight Distributions of Optimal Locally Repairable Codes.
IEEE Trans. Commun., 2022

Privacy-Preserving Subgraph Matching Scheme With Authentication in Social Networks.
IEEE Trans. Cloud Comput., 2022

P2GT: Fine-Grained Genomic Data Access Control With Privacy-Preserving Testing in Cloud Computing.
IEEE ACM Trans. Comput. Biol. Bioinform., 2022

Hat problem: a new strategy based on quantum stabilizer codes.
Quantum Inf. Process., 2022

Cyclic preparation of two-qubit state in two noisy environments.
Quantum Inf. Process., 2022

Multi-party controlled cyclic hybrid quantum communication protocol in noisy environment.
Quantum Inf. Process., 2022

An Entropy-View Secure Multiparty Computation Protocol Based on Semi-Honest Model.
J. Organ. End User Comput., 2022

A trusted de-swinging k-anonymity scheme for location privacy protection.
J. Cloud Comput., 2022

A secure and efficient privacy-preserving data aggregation algorithm.
J. Ambient Intell. Humaniz. Comput., 2022

PSSPR: A source location privacy protection scheme based on sector phantom routing in WSNs.
Int. J. Intell. Syst., 2022

A CCA secure public key encryption scheme based on finite groups of Lie type.
Sci. China Inf. Sci., 2022

Flexible construction of measurement matrices in compressed sensing based on extensions of incidence matrices of combinatorial designs.
Appl. Math. Comput., 2022

2021
Secure Data Group Sharing and Dissemination with Attribute and Time Conditions in Public Cloud.
IEEE Trans. Serv. Comput., 2021

Privacy-Preserving Media Sharing with Scalable Access Control and Secure Deduplication in Mobile Cloud Computing.
IEEE Trans. Mob. Comput., 2021

Deterministic Constructions of Compressed Sensing Matrices From Unitary Geometry.
IEEE Trans. Inf. Theory, 2021

Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in Cloud Computing.
IEEE Trans. Cloud Comput., 2021

Privacy-Preserving Multidimensional Data Aggregation Scheme Without Trusted Authority in Smart Grid.
IEEE Syst. J., 2021

Flexible construction of compressed sensing matrices with low storage space and low coherence.
Signal Process., 2021

Cross-Platform Strong Privacy Protection Mechanism for Review Publication.
Secur. Commun. Networks, 2021

Corrigendum to "Rational Protocols and Attacks in Blockchain System".
Secur. Commun. Networks, 2021

A multimode quantum image representation and its encryption scheme.
Quantum Inf. Process., 2021

Quantum network coding without loss of information.
Quantum Inf. Process., 2021

Blockchain-Enhanced Fair and Efficient Energy Trading in Industrial Internet of Things.
Mob. Inf. Syst., 2021

How does rumor spreading affect people inside and outside an institution.
Inf. Sci., 2021

Privacy-Preserving Verifiable Graph Intersection Scheme With Cryptographic Accumulators in Social Networks.
IEEE Internet Things J., 2021

Chaotic Deep Network for Mobile D2D Communication.
IEEE Internet Things J., 2021

Certificateless Designated Verifier Anonymous Aggregate Signature Scheme for Healthcare Wireless Sensor Networks.
IEEE Internet Things J., 2021

Achieving flatness: Graph labeling can generate graphical honeywords.
Comput. Secur., 2021

Secure ABE Scheme for Access Management in Blockchain-Based IoT.
IEEE Access, 2021

On Optimal Quaternary Locally Repairable Codes.
Proceedings of the IEEE International Symposium on Information Theory, 2021

A Data-Driven Detection strategy of False Data in Cooperative DC Microgrids.
Proceedings of the IECON 2021, 2021

ResNet Approach for Coding Unit Fast Splitting Decision of HEVC Intra Coding.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

A De-swinging Scheme in Location Privacy Protection via Smart Contract.
Proceedings of the IEEE Intl Conf on Dependable, 2021

PSSPR: A Source Location Privacy Protection Scheme Based on Sector Phantom Routing in WSNs.
Proceedings of the IEEE Intl Conf on Dependable, 2021

Using information entropy to analyze secure multi-party computation protocol.
Proceedings of the IEEE Intl Conf on Dependable, 2021

ABlockchain-enabled Efficient and Fair Energy Trading Schemes in Industrial Internet of Things.
Proceedings of the IEEE Intl Conf on Dependable, 2021

A location data protection protocol based on differential privacy.
Proceedings of the IEEE Intl Conf on Dependable, 2021

2020
Efficient and Secure Image Communication System Based on Compressed Sensing for IoT Monitoring Applications.
IEEE Trans. Multim., 2020

Bounds and Constructions of Locally Repairable Codes: Parity-Check Matrix Approach.
IEEE Trans. Inf. Theory, 2020

Analysis and Design of a 1-MHz Bidirectional Multi-CLLC Resonant DC-DC Converter With GaN Devices.
IEEE Trans. Ind. Electron., 2020

Low Energy Consumption Compressed Spectrum Sensing Based on Channel Energy Reconstruction in Cognitive Radio Network.
Sensors, 2020

Rational Protocols and Attacks in Blockchain System.
Secur. Commun. Networks, 2020

A novel quantum blockchain scheme base on quantum entanglement and DPoS.
Quantum Inf. Process., 2020

Searching for optimal quantum secret sharing scheme based on local distinguishability.
Quantum Inf. Process., 2020

A new fixed-time stability theorem and its application to the fixed-time synchronization of neural networks.
Neural Networks, 2020

A Nature-inspired Multiple Kernel Extreme Learning Machine Model for Intrusion Detection.
KSII Trans. Internet Inf. Syst., 2020

Secure and Traceable Image Transmission Scheme Based on Semitensor Product Compressed Sensing in Telemedicine System.
IEEE Internet Things J., 2020

SLBRS: Network Virus Propagation Model based on Safety Entropy.
Appl. Soft Comput., 2020

An effective algorithm for the spark of sparse binary measurement matrices.
Appl. Math. Comput., 2020

Network Intrusion Detection Based on Supervised Adversarial Variational Auto-Encoder With Regularization.
IEEE Access, 2020

Finite-Time Synchronization of Multi-Linked Memristor-Based Neural Networks With Mixed Time-Varying Delays.
IEEE Access, 2020

Intermittent Pinning Synchronization of Memristor-Based Switching Networks With Multi-Links and Mixed Delays.
IEEE Access, 2020

Using User Behavior to Measure Privacy on Online Social Networks.
IEEE Access, 2020

Weight Distributions of q-ary Optimal Locally Repairable Codes with Locality 2, Distance 5 and Even Dimension.
Proceedings of the IEEE International Symposium on Information Theory, 2020

IoT Device Recognition Framework Based on Network Protocol Keyword Query.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

An Improved Consensus Mechanism for the Blockchain Based on Credit Rewards and Punishments.
Proceedings of the ICBCT'20: The 2nd International Conference on Blockchain Technology, 2020

2019
Anonymous three-factor authenticated key agreement for wireless sensor networks.
Wirel. Networks, 2019

Robust Privacy-Preserving Mutual Authenticated Key Agreement Scheme in Roaming Service for Global Mobility Networks.
IEEE Syst. J., 2019

Improving the Classification Effectiveness of Intrusion Detection by Using Improved Conditional Variational AutoEncoder and Deep Neural Network.
Sensors, 2019

A Neighbor Prototype Selection Method Based on CCHPSO for Intrusion Detection.
Secur. Commun. Networks, 2019

A universal protocol for controlled bidirectional quantum state transmission.
Quantum Inf. Process., 2019

Secure quantum network coding based on quantum homomorphic message authentication.
Quantum Inf. Process., 2019

Fixed-time synchronization of inertial memristor-based neural networks with discrete delay.
Neural Networks, 2019

Asymptotic and finite-time synchronization of memristor-based switching networks with multi-links and impulsive perturbation.
Neural Comput. Appl., 2019

Cryptographic primitives in blockchains.
J. Netw. Comput. Appl., 2019

IR-RBT Codes: A New Scheme of Regenerating Codes for Tolerating Node and Intra-node Failures in Distributed Storage Systems.
KSII Trans. Internet Inf. Syst., 2019

Quantum homomorphic encryption scheme with flexible number of evaluator based on (<i>k, n</i>)-threshold quantum state sharing.
Inf. Sci., 2019

P-Tensor Product in Compressed Sensing.
IEEE Internet Things J., 2019

Flexible and Secure Data Transmission System Based on Semitensor Compressive Sensing in Wireless Body Area Networks.
IEEE Internet Things J., 2019

A new fixed-time stability theorem and its application to the synchronization control of memristive neural networks.
Neurocomputing, 2019

Constructing Two Completely Independent Spanning Trees in Balanced Hypercubes.
IEICE Trans. Inf. Syst., 2019

General decay synchronization of complex multi-links time-varying dynamic network.
Commun. Nonlinear Sci. Numer. Simul., 2019

Weighted pooling for image recognition of deep convolutional neural networks.
Clust. Comput., 2019

A Miniature CCA Public Key Encryption Scheme Based on Non-abelian Factorization Problem in Finite Groups of Lie Type.
Comput. J., 2019

A quantum image dual-scrambling encryption scheme based on random permutation.
Sci. China Inf. Sci., 2019

Efficient quantum state transmission via perfect quantum network coding.
Sci. China Inf. Sci., 2019

New Construction of Blind Signatures From Braid Groups.
IEEE Access, 2019

LRM: A Location Recombination Mechanism for Achieving Trajectory k-Anonymity Privacy Protection.
IEEE Access, 2019

Asymmetric Controlled Bidirectional Remote Preparation of Single- and Three-Qubit Equatorial State in Noisy Environment.
IEEE Access, 2019

Certificateless Short Aggregate Signature Scheme for Mobile Devices.
IEEE Access, 2019

Quantum Network Communication With a Novel Discrete-Time Quantum Walk.
IEEE Access, 2019

Sparse General Non-Negative Matrix Factorization Based on Left Semi-Tensor Product.
IEEE Access, 2019

Optimal Weakly Secure Minimum Storage Regenerating Codes Scheme.
IEEE Access, 2019

Classification of Optimal Ternary (r, δ)-Locally Repairable Codes Attaining the Singleton-like Bound.
Proceedings of the IEEE International Symposium on Information Theory, 2019

Secure and Privacy-Preserving Warning Message Dissemination in Cloud-Assisted Internet of Vehicles.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
DECENT: Secure and fine-grained data access control with policy updating for constrained IoT devices.
World Wide Web, 2018

A Novel Digital Watermarking Based on General Non-Negative Matrix Factorization.
IEEE Trans. Multim., 2018

Statistic Experience Based Adaptive One-Shot Detector (EAO) for Camera Sensing System.
Sensors, 2018

SmartVeh: Secure and Efficient Message Access Control and Authentication for Vehicular Cloud Computing.
Sensors, 2018

Adaptive Secure Cross-Cloud Data Collaboration with Identity-Based Cryptography and Conditional Proxy Re-Encryption.
Secur. Commun. Networks, 2018

Two authenticated quantum dialogue protocols based on three-particle entangled states.
Quantum Inf. Process., 2018

Rational protocol of quantum secure multi-party computation.
Quantum Inf. Process., 2018

Cryptanalysis of secret sharing with a single <i>d</i>-level quantum system.
Quantum Inf. Process., 2018

General Theory of security and a study of hacker's behavior in big data era.
Peer-to-Peer Netw. Appl., 2018

Finite-Time Robust Synchronization of Memrisive Neural Network with Perturbation.
Neural Process. Lett., 2018

Synchronization of Multi-links Memristor-Based Switching Networks Under Uniform Random Attacks.
Neural Process. Lett., 2018

Synchronization Control of Coupled Memristor-Based Neural Networks with Mixed Delays and Stochastic Perturbations.
Neural Process. Lett., 2018

A Secure and Efficient Transmission Method in Connected Vehicular Cloud Computing.
IEEE Netw., 2018

Parameters estimation and synchronization of uncertain coupling recurrent dynamical neural networks with time-varying delays based on adaptive control.
Neural Comput. Appl., 2018

Fixed-time synchronization of memristor-based fuzzy cellular neural network with time-varying delay.
J. Frankl. Inst., 2018

Incremental general non-negative matrix factorization without dimension matching constraints.
Neurocomputing, 2018

Certificateless short signature scheme from pairing in the standard model.
Int. J. Commun. Syst., 2018

Corrigendum to "Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing" [Future Gener. Comput. Syst. 72 (2017) 239-249].
Future Gener. Comput. Syst., 2018

PRECISE: Identity-based private data sharing with conditional proxy re-encryption in online social networks.
Future Gener. Comput. Syst., 2018

Primitives towards verifiable computation: a survey.
Frontiers Comput. Sci., 2018

On development of security monitoring system via wireless sensing network.
EURASIP J. Wirel. Commun. Netw., 2018

Particle swarm optimizer with crossover operation.
Eng. Appl. Artif. Intell., 2018

Finite-time stability and synchronization of memristor-based fractional-order fuzzy cellular neural networks.
Commun. Nonlinear Sci. Numer. Simul., 2018

Securing Named Data Networking: Attribute-Based Encryption and Beyond.
IEEE Commun. Mag., 2018

Quantifying team precedence in the game of cricket.
Clust. Comput., 2018

An Ensemble Method based on Selection Using Bat Algorithm for Intrusion Detection.
Comput. J., 2018

A secure rational quantum state sharing protocol.
Sci. China Inf. Sci., 2018

Data hiding in color halftone images based on new conjugate property.
Comput. Electr. Eng., 2018

Adaptive synchronization of memristor-based BAM neural networks with mixed delays.
Appl. Math. Comput., 2018

Fixed-Time Synchronization of Memristive Fuzzy BAM Cellular Neural Networks With Time-Varying Delays Based on Feedback Controllers.
IEEE Access, 2018

Correction to "Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things".
IEEE Access, 2018

Secure Identity-Based Data Sharing and Profile Matching for Mobile Healthcare Social Networks in Cloud Computing.
IEEE Access, 2018

A Secure Cryptocurrency Scheme Based on Post-Quantum Blockchain.
IEEE Access, 2018

Adaptive Lag Synchronization of Memristive Neural Networks With Mixed Delays.
IEEE Access, 2018

An Efficient and Secure Transmission Model Based on Compressive Sensing.
Proceedings of the 2018 International Symposium on Security and Privacy in Social Networks and Big Data, 2018

An evaluation method of image scrambling degree based on pixel distribution.
Proceedings of the 2018 International Symposium on Security and Privacy in Social Networks and Big Data, 2018

On the Maximal Code Length of Optimal Linear Locally Repairable Codes.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

Secure Multiparty Quantum Summation Based on d-Level Single Particles.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Controlled Bidirectional Remote Preparation of Single- and Two-Qubit State.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

DACSC: Dynamic and Fine-Grained Access Control for Secure Data Collaboration in Cloud Computing.
Proceedings of the IEEE Global Communications Conference, 2018

A high-Capacity Watermarking Algorithm Using two Bins Histogram Modification.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2017
A Novel Smart Card Based User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks.
Wirel. Pers. Commun., 2017

Secure and Energy-Efficient Data Transmission System Based on Chaotic Compressive Sensing in Body-to-Body Networks.
IEEE Trans. Biomed. Circuits Syst., 2017

Scalable Node-Centric Route Mutation for Defense of Large-Scale Software-Defined Networks.
Secur. Commun. Networks, 2017

Secure and Privacy-Preserving Data Sharing and Collaboration in Mobile Healthcare Social Networks of Smart Cities.
Secur. Commun. Networks, 2017

Controlled bidirectional remote preparation of three-qubit state.
Quantum Inf. Process., 2017

Fixed-time synchronization of memristor-based BAM neural networks with time-varying discrete delay.
Neural Networks, 2017

An anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography.
Multim. Tools Appl., 2017

WORM-HUNTER: A Worm Guard System using Software-defined Networking.
KSII Trans. Internet Inf. Syst., 2017

Certificateless multi-signer universal designated multi-verifier signature from elliptic curve group.
KSII Trans. Internet Inf. Syst., 2017

Homomorphic Signatures from Chameleon Hash Functions.
Inf. Technol. Control., 2017

General Theory of Security and a Study Case in Internet of Things.
IEEE Internet Things J., 2017

Finite-time stability analysis for neutral-type neural networks with hybrid time-varying delays without using Lyapunov method.
Neurocomputing, 2017

Finite-time topology identification and stochastic synchronization of complex network with multiple time delays.
Neurocomputing, 2017

Finite-time synchronization of memristor-based neural networks with mixed delays.
Neurocomputing, 2017

Fuzzy-synthetic minority oversampling technique: Oversampling based on fuzzy set theory for Android malware detection in imbalanced datasets.
Int. J. Distributed Sens. Networks, 2017

Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing.
Future Gener. Comput. Syst., 2017

Minimum length key in MST cryptosystems.
Sci. China Inf. Sci., 2017

Particle swarm optimizer with two differential mutation.
Appl. Soft Comput., 2017

Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things.
IEEE Access, 2017

Prediction of Rising Stars in the Game of Cricket.
IEEE Access, 2017

Minimal logarithmic signatures for one type of classical groups.
Appl. Algebra Eng. Commun. Comput., 2017

Node-centric route mutation for large-scale SDN based on 3D earth mover's distance model.
Proceedings of the 17th International Symposium on Communications and Information Technologies, 2017

Secure Multi-party Comparison Protocol and Application.
Proceedings of the Data Science, 2017

2016
An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks.
Sensors, 2016

Short lattice signatures with constant-size public keys.
Secur. Commun. Networks, 2016

Robust anonymous two-factor authenticated key exchange scheme for mobile client-server environment.
Secur. Commun. Networks, 2016

Cryptanalysis and improvement of a chaotic maps-based anonymous authenticated key agreement protocol for multiserver architecture.
Secur. Commun. Networks, 2016

A secure and efficient mutual authentication scheme for session initiation protocol.
Peer-to-Peer Netw. Appl., 2016

Finite-Time Boundedness Analysis of Memristive Neural Network with Time-Varying Delay.
Neural Process. Lett., 2016

Anti-synchronization Control of Memristive Neural Networks with Multiple Proportional Delays.
Neural Process. Lett., 2016

Finite-Time Anti-synchronization Control of Memristive Neural Networks With Stochastic Perturbations.
Neural Process. Lett., 2016

Efficient Post-Quantum Secure Network Coding Signatures in the Standard Model.
KSII Trans. Internet Inf. Syst., 2016

Robust ID based mutual authentication and key agreement scheme preserving user anonymity in mobile networks.
KSII Trans. Internet Inf. Syst., 2016

An advanced elliptic curve cryptography based mutual authentication scheme for session initiation protocol.
Inf. Technol. Control., 2016

Multi-User Quantum Wireless Network Communication Based on Multi-Qubit GHZ State.
IEEE Commun. Lett., 2016

Construction of DNA codes by using algebraic number theory.
Finite Fields Their Appl., 2016

Semi-tensor compressed sensing.
Digit. Signal Process., 2016

Public Key Encryption in Non-Abelian Groups.
CoRR, 2016

VOAuth: A solution to protect OAuth against phishing.
Comput. Ind., 2016

Quantum network coding for multi-unicast problem based on 2D and 3D cluster states.
Sci. China Inf. Sci., 2016

2015
Postfix automata.
Theor. Comput. Sci., 2015

Identity-based signcryption from lattices.
Secur. Commun. Networks, 2015

A biometrics and smart cards-based authentication scheme for multi-server environments.
Secur. Commun. Networks, 2015

Network coding for quantum cooperative multicast.
Quantum Inf. Process., 2015

A novel protocol for multiparty quantum key management.
Quantum Inf. Process., 2015

A new quantum sealed-bid auction protocol with secret order in post-confirmation.
Quantum Inf. Process., 2015

Quantum state representation based on combinatorial Laplacian matrix of star-relevant graph.
Quantum Inf. Process., 2015

Finite-Time Function Projective Synchronization in Complex Multi-links Networks with Time-Varying Delay.
Neural Process. Lett., 2015

Fast and scalable support vector clustering for large-scale data analysis.
Knowl. Inf. Syst., 2015

An Enhanced Biometric-Based Authentication Scheme for Telecare Medicine Information Systems Using Elliptic Curve Cryptosystem.
J. Medical Syst., 2015

Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps.
J. Medical Syst., 2015

Defense Strategy of Network Security based on Dynamic Classification.
KSII Trans. Internet Inf. Syst., 2015

A Three-Party Password-based Authenticated Key Exchange Protocol for Wireless Communications.
Inf. Technol. Control., 2015

A Lightweight ID Based Authentication and Key Agreement Protocol for Multiserver Architecture.
Int. J. Distributed Sens. Networks, 2015

Scaling Concolic Testing for the Environment-Intensive Program.
IEICE Trans. Inf. Syst., 2015

Perfect Quantum Network Coding Independent of Classical Network Solutions.
IEEE Commun. Lett., 2015

Minimal logarithmic signatures for the unitary group U<sub>n</sub>(q).
Des. Codes Cryptogr., 2015

The effect of randomness for dependency map on the robustness of interdependent lattices.
CoRR, 2015

Minimal Logarithmic Signatures for one type of Classical Groups.
CoRR, 2015

Minimal Logarithmic Signatures for Sporadic Groups.
CoRR, 2015

2014
A Secure and Effective Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks.
Wirel. Pers. Commun., 2014

Hierarchical quantum information splitting of an arbitrary two-qubit state via the cluster state.
Quantum Inf. Process., 2014

Quantum secret sharing for general access structures based on multiparticle entanglements.
Quantum Inf. Process., 2014

Schemes for remotely preparing an arbitrary four-qubit χ-state.
Quantum Inf. Process., 2014

Multi-party quantum state sharing of an arbitrary multi-qubit state via χ-type entangled states.
Quantum Inf. Process., 2014

Efficient and feasible quantum private comparison of equality against the collective amplitude damping noise.
Quantum Inf. Process., 2014

A class of protocols for quantum private comparison based on the symmetry of states.
Quantum Inf. Process., 2014

Robust variations of secret sharing through noisy quantum channel.
Quantum Inf. Comput., 2014

Synchronization control of memristor-based recurrent neural networks with perturbations.
Neural Networks, 2014

An Improved Directed Diffusion Protocol based on Opportunistic Routing.
J. Networks, 2014

A Weakly Homomorphic Encryption with LDN.
J. Networks, 2014

Dynamic Obfuscation Algorithm based on Demand-Driven Symbolic Execution.
J. Multim., 2014

Hierarchical identity-based broadcast encryption scheme from LWE.
J. Commun. Networks, 2014

A (k, t, n) Verifiable Multi-secret Sharing Scheme Based on Adversary Structure.
KSII Trans. Internet Inf. Syst., 2014

Quantum state secure transmission in network communications.
Inf. Sci., 2014

Efficient threshold public key encryption with full security based on dual pairing vector spaces.
Int. J. Commun. Syst., 2014

A Note on the Multiple-Unicast Network Coding Conjecture.
IEEE Commun. Lett., 2014

Novel way to research nonlinear feedback shift register.
Sci. China Inf. Sci., 2014

A distance sum-based hybrid method for intrusion detection.
Appl. Intell., 2014

Asymptotic stability of cellular neural networks with multiple proportional delays.
Appl. Math. Comput., 2014

All exceptional groups of lie type have minimal logarithmic signatures.
Appl. Algebra Eng. Commun. Comput., 2014

A novel construction of optimal multi-sender authentication code from singular pseudo-symplectic geometry over finite fields.
Appl. Algebra Eng. Commun. Comput., 2014

2013
New public key cryptosystems based on non-Abelian factorization problems.
Secur. Commun. Networks, 2013

Comment on "High-dimensional deterministic multiparty quantum secret sharing without unitary operations".
Quantum Inf. Process., 2013

Expansible quantum secret sharing network.
Quantum Inf. Process., 2013

The loophole of the improved secure quantum sealed-bid auction with post-confirmation and solution.
Quantum Inf. Process., 2013

Faithful quantum broadcast beyond the no-go theorem.
Quantum Inf. Process., 2013

The rational approximations of the unitary groups.
Quantum Inf. Process., 2013

The faithful remote preparation of general quantum states.
Quantum Inf. Process., 2013

Multi-party quantum secret sharing with the single-particle quantum state to encode the information.
Quantum Inf. Process., 2013

Verifiable Threshold Authorization for Scalable and Secure Digital Rights Management.
J. Softw., 2013

CCA Secure Threshold KEM Scheme Against Adaptive Corruption Attacks in Standard Model.
J. Softw., 2013

Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation.
J. Multim., 2013

Attribute Based DRM Scheme with Efficient Revocation in Cloud Computing.
J. Comput., 2013

IBC-Based Entity Authentication Protocols for Federated Cloud Systems.
KSII Trans. Internet Inf. Syst., 2013

Comment on Lee et al.'s group signature and e-auction scheme.
Inf. Syst. Frontiers, 2013

Publicly Verifiable Secret Sharing Scheme with Provable Security against Chosen Secret Attacks.
Int. J. Distributed Sens. Networks, 2013

Chameleon Hash Functions and One-Time Signature Schemes from Inner Automorphism Groups.
Fundam. Informaticae, 2013

Modified Fuzzy Linear Discriminant Analysis for Threshold Selection.
Circuits Syst. Signal Process., 2013

An efficient dynamic ID based remote user authentication scheme using self-certified public keys for multi-server environment
CoRR, 2013

Multiple routes transmitted epidemics on multiplex networks.
CoRR, 2013

Multiple Vectors Propagation of Epidemics in Complex Networks.
CoRR, 2013

Effect of spatial distribution on the synchronization in rings of coupled oscillators.
Commun. Nonlinear Sci. Numer. Simul., 2013

Efficient Construction of CCA-Secure Threshold PKE Based on Hashed Diffie-Hellman Assumption.
Comput. J., 2013

An Application-Oriented Scheduling Optimization Algorithm for Internet-Based Virtual Computing Environment.
Proceedings of the Seventh IEEE International Symposium on Service-Oriented System Engineering, 2013

2012
The Weight Distributions of Cyclic Codes and Elliptic Curves.
IEEE Trans. Inf. Theory, 2012

CSP-DHIES: a new public-key encryption scheme from matrix conjugation.
Secur. Commun. Networks, 2012

Modelling security message propagation in delay tolerant networks.
Secur. Commun. Networks, 2012

Efficient entanglement channel construction schemes for a theoretical quantum network model with <i>d</i>-level system.
Quantum Inf. Process., 2012

Experimental architecture of joint remote state preparation.
Quantum Inf. Process., 2012

Controlled remote state preparation of arbitrary two and three qubit states via the Brown state.
Quantum Inf. Process., 2012

Guest Editorial.
J. Networks, 2012

Biologically Inspired Anomaly Detection for Hierarchical Wireless Sensor Networks.
J. Networks, 2012

Public key distribution scheme for delay tolerant networks based on two-channel cryptography.
J. Netw. Comput. Appl., 2012

Data clustering using bacterial foraging optimization.
J. Intell. Inf. Syst., 2012

Convex Decomposition Based Cluster Labeling Method for Support Vector Clustering.
J. Comput. Sci. Technol., 2012

A Secure Message Transaction Protocol for Delay Tolerant Networks.
J. Commun., 2012

Recursive hiding of biometrics-based secret sharing scheme using adversary structure.
Inf. Process. Lett., 2012

Provably Secure and Efficient Identity-based Signature Scheme Based on Cubic Residues.
Int. J. Netw. Secur., 2012

Foreword: Computational Intelligence for Network Control and Security.
Int. J. Comput. Intell. Syst., 2012

Optimum design of fractional order PI<sup>λ</sup>D<sup>μ</sup> controller for AVR system using chaotic ant swarm.
Expert Syst. Appl., 2012

A Note on Weight Distributions of Irreducible Cyclic Codes
CoRR, 2012

Multiple-File Remote Data Checking for cloud storage.
Comput. Secur., 2012

A secret sharing scheme with a short share realizing the (t, n) threshold and the adversary structure.
Comput. Math. Appl., 2012

A Novel Scheme for Accelerating Support Vector Clustering.
Comput. Informatics, 2012

Chaotic ant swarm approach for data clustering.
Appl. Soft Comput., 2012

A secure message delivery scheme with path tracking for delay tolerant networks.
Proceedings of the 2012 1st IEEE International Conference on Communications in China (ICCC), 2012

A trust mechanism in Internet-Based Virtual Computing Environment.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

2011
Sensor Placement Algorithms for Fusion-Based Surveillance Networks.
IEEE Trans. Parallel Distributed Syst., 2011

Web user clustering and Web prefetching using Random Indexing with weight functions.
Knowl. Inf. Syst., 2011

Discrete logarithm based additively homomorphic encryption and secure data aggregation.
Inf. Sci., 2011

Disturbance Chaotic Ant Swarm.
Int. J. Bifurc. Chaos, 2011

A New Class of Hyper-bent Boolean Functions with Multiple Trace Terms.
IACR Cryptol. ePrint Arch., 2011

A generalization of the class of hyper-bent Boolean functions in binomial forms.
IACR Cryptol. ePrint Arch., 2011

Research of Spatial Domain Image Digital Watermarking Payload.
EURASIP J. Inf. Secur., 2011

A new class of hyper-bent Boolean functions in binomial forms
CoRR, 2011

A Random Indexing Approach for Web User Clustering and Web Prefetching.
Proceedings of the New Frontiers in Applied Data Mining, 2011

Research on Secure Multi-party Computational Geometry.
Proceedings of the Information Computing and Applications, 2011

2010
An efficient secure proxy verifiably encrypted signature scheme.
J. Netw. Comput. Appl., 2010

A New Method to Detect Useless Service Failure Model in SPN.
J. Convergence Inf. Technol., 2010

Comment on Wu et al.'s Server-aided Verification Signature Schemes.
Int. J. Netw. Secur., 2010

Secure Network Coding against Wiretapping and Byzantine Attacks.
EURASIP J. Wirel. Commun. Netw., 2010

Conjugate adjoining problem in braid groups and new design of braid-based signatures.
Sci. China Inf. Sci., 2010

Secure network coding in the presence of eavesdroppers.
Sci. China Inf. Sci., 2010

A new impossible differential attack on SAFER ciphers.
Comput. Electr. Eng., 2010

A method for topology conformance tests under logical constraints.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

An anonymous authentication scheme for mobile communication.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

A color image watermarking algorithm resistant to print-scan.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

Research of an Innovative P2P-Based Botnet.
Proceedings of the 2010 International Conference on Machine Vision and Human-machine Interface, 2010

Towards Hierarchical-User RBAC model.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010

On Achieving Maximum Secure Throughput Using Network Coding against Wiretap Attack.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010

An Extensible Hash Function Construction Based on Embedded Chaos Maps.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
A Novel Identity-Based Multi-Signcryption Scheme.
Int. J. Distributed Sens. Networks, 2009

Collision Attacks on NaSHA-384/512.
IACR Cryptol. ePrint Arch., 2009

Vulnerabilities Analyzing Model for Alert Correlation in Distributed Environment.
Proceedings of the 2009 IITA International Conference on Services Science, 2009

An Improved Secure Identity-Based On-Line/Off-Line Signature Scheme.
Proceedings of the Advances in Information Security and Assurance, 2009

Efficient Provable Secure ID-Based Directed Signature Scheme without Random Oracle.
Proceedings of the Advances in Neural Networks, 2009

Improved EMD Steganography with Great Embedding Rate and High Embedding Efficiency.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Discrete-Log-Based Additively Homomorphic Encryption and Secure WSN Data Aggregation.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

VAOFS: A Verifiable Append-Only File System for Regulatory Compliance.
Proceedings of the Eighth International Conference on Grid and Cooperative Computing, 2009

Steganalysis of LSB Matching in Gray Images Based on Regional Correlation Analysis.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

A Special Proxy Signature Scheme with Multi-warrant.
Proceedings of the Advances in Computer Science, 2009

Remark on Yu et al.'s Online/Offline Signature Scheme in CT-RSA 2008.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Design and Realization of a Large-Scale Distributed Intrusion Management System Module.
Proceedings of the PACIIA 2008, 2008

Classify the Majority of the Total Bytes on the Internet.
Proceedings of the International Symposium on Information Processing, 2008

Analysis of nonseparable property of multi-valued multi-threshold neuron.
Proceedings of the International Joint Conference on Neural Networks, 2008

Multiplicative Watermark Detection Using Locally Optimum Nonlinearity.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

A Novel Relational Database Watermarking Algorithm for Joint Ownership.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

A Defending Mechanism against DDoS Based on Registration and Authentication.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

A New Construction of Multivariate Public Key Encryption Scheme through Internally Perturbed Plus.
Proceedings of the Computational Science and Its Applications - ICCSA 2008, International Conference, Perugia, Italy, June 30, 2008

An Efficient Remote User Authentication Scheme with Strong Anonymity.
Proceedings of the International Conference on Cyberworlds 2008, 2008

ID-Based Blind Signature and Proxy Blind Signature without Trusted PKG.
Proceedings of the Advances in Computer Science and Engineering, 2008

A Novel ID-Based Verifiably Encrypted Signature without Random Oracle.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

A Simulation Platform of DDoS Attack Based on Network Processor.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

Efficient Universally Composable Password-Based Key Exchange.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2007
An Efficient Multi-server Password Authenticated Key Agreement Scheme Using Smart Cards.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Using Three Layer Neural Network to Compute Multi-valued Functions.
Proceedings of the Advances in Neural Networks, 2007

A Networking Identity Authentication Scheme Combining Fingerprint Coding and Identity Based Encryption.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007

Transitive Signatures from Braid Groups.
Proceedings of the Progress in Cryptology, 2007

Using Three Layer Neural Networks to Compute Discrete Real Functions.
Proceedings of the Third International Conference on Natural Computation, 2007

Integer Programming via Chaotic Ant Swarm.
Proceedings of the Third International Conference on Natural Computation, 2007

ID-Based Multi-proxy Sequential Signature System from Bilinear Pairing.
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2007

Security Mechanism Research of EMV2000.
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2007

A Data Safety Transmission Solution in Web Application.
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2007

Improved Remote User Authentication Scheme Preserving User Anonymity.
Proceedings of the Fifth Annual Conference on Communication Networks and Services Research (CNSR 2007), 2007

Secure and Flexible Digital Rights Management in a Pervasive Usage Mode.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

2006
An Optimization Method Inspired by "chaotic" Ant Behavior.
Int. J. Bifurc. Chaos, 2006

Design and Analysis of a Hash Ring-iterative Structure.
IACR Cryptol. ePrint Arch., 2006

Analysis of Current Steganography Tools: Classifications & Features.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

Data Fitting Via Chaotic Ant Swarm.
Proceedings of the Advances in Natural Computation, Second International Conference, 2006

Symmetric Steganography Secure Against Chosen Message and Original Cover Attacks.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

2005
The Architecture of the Large-scale Distributed Intrusion Detection System.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

A Novel Fuzzy Anomaly Detection Method Based on Clonal Selection Clustering Algorithm.
Proceedings of the Advances in Machine Learning and Cybernetics, 2005

2004
Erratum to: Bounds on the number of hidden neurons in three-layer binary neural networks [Neural Networks 16 (7) 995-1002].
Neural Networks, 2004

2003
Bounds on the number of hidden neurons in three-layer binary neural networks.
Neural Networks, 2003

New Efficient Timed Commitment Schemes.
Int. J. Inf. Technol. Decis. Mak., 2003

A LSB steganography detection algorithm.
Proceedings of the IEEE 14th International Symposium on Personal, 2003

2001
On correlations of a family of generalized geometric sequences.
IEEE Trans. Inf. Theory, 2001

A unified method to construct neural network decoders for arbitrary codes and decoding rules.
Discret. Math., 2001

Generalization of Elliptic Curve Digital Signature Schemes.
Proceedings of the Information and Communications Security, Third International Conference, 2001

2000
Single-Term Divisible Electronic Cash Based on Bit Commitment.
Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000), 2000

1998
Comment on "Reparable key distribution protocols for Internet environments" [and reply].
IEEE Trans. Commun., 1998

1997
Counterexample of truncated Costas optical orthogonal codes.
IEEE Trans. Commun., 1997

Correlation Functions of a Family of Generalized Geometric Sequences.
Discret. Appl. Math., 1997

1995
Further Enumerating Boolean Functions of Cryptographic Significance.
J. Cryptol., 1995

1994
On the undetected error probability of nonlinear binary constant weight codes.
IEEE Trans. Commun., 1994

1993
New Binary Sequences with Perfect Staircase Profile of Linear Complexity.
Inf. Process. Lett., 1993

1991
New Enumeration Results About the Optical Orthogonal Codes.
Inf. Process. Lett., 1991

1990
Dyadic Matrices and Their Potential Significance in Cryptography.
Proceedings of the Advances in Cryptology, 1990

K-M Sequence is Forwardly Predictable.
Proceedings of the Advances in Cryptology, 1990


  Loading...