Yixian Yang
Orcid: 0000-0001-8067-4774
According to our database1,
Yixian Yang
authored at least 350 papers
between 1990 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on ieccr.net
On csauthors.net:
Bibliography
2024
Controlled node dialogue in IoT networks based on nonlocal orthogonal product states.
J. Opt. Commun. Netw., March, 2024
Lightweight Voice Spoofing Detection Using Improved One-Class Learning and Knowledge Distillation.
IEEE Trans. Multim., 2024
2023
A voice spoofing detection framework for IoT systems with feature pyramid and online knowledge distillation.
J. Syst. Archit., October, 2023
Fault-tolerant error correction for quantum Hamming codes with only two ancillary qudits.
Quantum Inf. Process., January, 2023
IEEE Trans. Serv. Comput., 2023
Fast and Privacy-Preserving Attribute-Based Keyword Search in Cloud Document Services.
IEEE Trans. Serv. Comput., 2023
Privacy-Preserving Traceable Attribute-Based Keyword Search in Multi-Authority Medical Cloud.
IEEE Trans. Cloud Comput., 2023
IEEE ACM Trans. Audio Speech Lang. Process., 2023
Multi-party quantum private information comparison based on nonlocal orthogonal product states.
Quantum Inf. Process., 2023
Comput. Secur., 2023
2022
Int. J. Intell. Syst., December, 2022
Privacy-Preserving Spatio-Temporal Keyword Search for Outsourced Location-Based Services.
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Commun., 2022
IEEE Trans. Cloud Comput., 2022
P2GT: Fine-Grained Genomic Data Access Control With Privacy-Preserving Testing in Cloud Computing.
IEEE ACM Trans. Comput. Biol. Bioinform., 2022
Quantum Inf. Process., 2022
Quantum Inf. Process., 2022
Multi-party controlled cyclic hybrid quantum communication protocol in noisy environment.
Quantum Inf. Process., 2022
J. Organ. End User Comput., 2022
J. Cloud Comput., 2022
J. Ambient Intell. Humaniz. Comput., 2022
PSSPR: A source location privacy protection scheme based on sector phantom routing in WSNs.
Int. J. Intell. Syst., 2022
Sci. China Inf. Sci., 2022
Flexible construction of measurement matrices in compressed sensing based on extensions of incidence matrices of combinatorial designs.
Appl. Math. Comput., 2022
2021
Secure Data Group Sharing and Dissemination with Attribute and Time Conditions in Public Cloud.
IEEE Trans. Serv. Comput., 2021
Privacy-Preserving Media Sharing with Scalable Access Control and Secure Deduplication in Mobile Cloud Computing.
IEEE Trans. Mob. Comput., 2021
IEEE Trans. Inf. Theory, 2021
Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in Cloud Computing.
IEEE Trans. Cloud Comput., 2021
Privacy-Preserving Multidimensional Data Aggregation Scheme Without Trusted Authority in Smart Grid.
IEEE Syst. J., 2021
Flexible construction of compressed sensing matrices with low storage space and low coherence.
Signal Process., 2021
Secur. Commun. Networks, 2021
Secur. Commun. Networks, 2021
Quantum Inf. Process., 2021
Blockchain-Enhanced Fair and Efficient Energy Trading in Industrial Internet of Things.
Mob. Inf. Syst., 2021
Inf. Sci., 2021
Privacy-Preserving Verifiable Graph Intersection Scheme With Cryptographic Accumulators in Social Networks.
IEEE Internet Things J., 2021
Certificateless Designated Verifier Anonymous Aggregate Signature Scheme for Healthcare Wireless Sensor Networks.
IEEE Internet Things J., 2021
Comput. Secur., 2021
Proceedings of the IEEE International Symposium on Information Theory, 2021
Proceedings of the IECON 2021, 2021
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021
Proceedings of the IEEE Intl Conf on Dependable, 2021
PSSPR: A Source Location Privacy Protection Scheme Based on Sector Phantom Routing in WSNs.
Proceedings of the IEEE Intl Conf on Dependable, 2021
Proceedings of the IEEE Intl Conf on Dependable, 2021
ABlockchain-enabled Efficient and Fair Energy Trading Schemes in Industrial Internet of Things.
Proceedings of the IEEE Intl Conf on Dependable, 2021
Proceedings of the IEEE Intl Conf on Dependable, 2021
2020
Efficient and Secure Image Communication System Based on Compressed Sensing for IoT Monitoring Applications.
IEEE Trans. Multim., 2020
IEEE Trans. Inf. Theory, 2020
Analysis and Design of a 1-MHz Bidirectional Multi-CLLC Resonant DC-DC Converter With GaN Devices.
IEEE Trans. Ind. Electron., 2020
Low Energy Consumption Compressed Spectrum Sensing Based on Channel Energy Reconstruction in Cognitive Radio Network.
Sensors, 2020
Quantum Inf. Process., 2020
Searching for optimal quantum secret sharing scheme based on local distinguishability.
Quantum Inf. Process., 2020
A new fixed-time stability theorem and its application to the fixed-time synchronization of neural networks.
Neural Networks, 2020
A Nature-inspired Multiple Kernel Extreme Learning Machine Model for Intrusion Detection.
KSII Trans. Internet Inf. Syst., 2020
Secure and Traceable Image Transmission Scheme Based on Semitensor Product Compressed Sensing in Telemedicine System.
IEEE Internet Things J., 2020
Appl. Soft Comput., 2020
Appl. Math. Comput., 2020
Network Intrusion Detection Based on Supervised Adversarial Variational Auto-Encoder With Regularization.
IEEE Access, 2020
Finite-Time Synchronization of Multi-Linked Memristor-Based Neural Networks With Mixed Time-Varying Delays.
IEEE Access, 2020
Intermittent Pinning Synchronization of Memristor-Based Switching Networks With Multi-Links and Mixed Delays.
IEEE Access, 2020
Weight Distributions of q-ary Optimal Locally Repairable Codes with Locality 2, Distance 5 and Even Dimension.
Proceedings of the IEEE International Symposium on Information Theory, 2020
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020
An Improved Consensus Mechanism for the Blockchain Based on Credit Rewards and Punishments.
Proceedings of the ICBCT'20: The 2nd International Conference on Blockchain Technology, 2020
2019
Wirel. Networks, 2019
Robust Privacy-Preserving Mutual Authenticated Key Agreement Scheme in Roaming Service for Global Mobility Networks.
IEEE Syst. J., 2019
Improving the Classification Effectiveness of Intrusion Detection by Using Improved Conditional Variational AutoEncoder and Deep Neural Network.
Sensors, 2019
Secur. Commun. Networks, 2019
Quantum Inf. Process., 2019
Quantum Inf. Process., 2019
Fixed-time synchronization of inertial memristor-based neural networks with discrete delay.
Neural Networks, 2019
Asymptotic and finite-time synchronization of memristor-based switching networks with multi-links and impulsive perturbation.
Neural Comput. Appl., 2019
IR-RBT Codes: A New Scheme of Regenerating Codes for Tolerating Node and Intra-node Failures in Distributed Storage Systems.
KSII Trans. Internet Inf. Syst., 2019
Quantum homomorphic encryption scheme with flexible number of evaluator based on (<i>k, n</i>)-threshold quantum state sharing.
Inf. Sci., 2019
Flexible and Secure Data Transmission System Based on Semitensor Compressive Sensing in Wireless Body Area Networks.
IEEE Internet Things J., 2019
A new fixed-time stability theorem and its application to the synchronization control of memristive neural networks.
Neurocomputing, 2019
IEICE Trans. Inf. Syst., 2019
Commun. Nonlinear Sci. Numer. Simul., 2019
Clust. Comput., 2019
A Miniature CCA Public Key Encryption Scheme Based on Non-abelian Factorization Problem in Finite Groups of Lie Type.
Comput. J., 2019
Sci. China Inf. Sci., 2019
Sci. China Inf. Sci., 2019
LRM: A Location Recombination Mechanism for Achieving Trajectory k-Anonymity Privacy Protection.
IEEE Access, 2019
Asymmetric Controlled Bidirectional Remote Preparation of Single- and Three-Qubit Equatorial State in Noisy Environment.
IEEE Access, 2019
IEEE Access, 2019
IEEE Access, 2019
IEEE Access, 2019
Classification of Optimal Ternary (r, δ)-Locally Repairable Codes Attaining the Singleton-like Bound.
Proceedings of the IEEE International Symposium on Information Theory, 2019
Secure and Privacy-Preserving Warning Message Dissemination in Cloud-Assisted Internet of Vehicles.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019
2018
DECENT: Secure and fine-grained data access control with policy updating for constrained IoT devices.
World Wide Web, 2018
IEEE Trans. Multim., 2018
Statistic Experience Based Adaptive One-Shot Detector (EAO) for Camera Sensing System.
Sensors, 2018
SmartVeh: Secure and Efficient Message Access Control and Authentication for Vehicular Cloud Computing.
Sensors, 2018
Adaptive Secure Cross-Cloud Data Collaboration with Identity-Based Cryptography and Conditional Proxy Re-Encryption.
Secur. Commun. Networks, 2018
Two authenticated quantum dialogue protocols based on three-particle entangled states.
Quantum Inf. Process., 2018
Quantum Inf. Process., 2018
Quantum Inf. Process., 2018
Peer-to-Peer Netw. Appl., 2018
Neural Process. Lett., 2018
Synchronization of Multi-links Memristor-Based Switching Networks Under Uniform Random Attacks.
Neural Process. Lett., 2018
Synchronization Control of Coupled Memristor-Based Neural Networks with Mixed Delays and Stochastic Perturbations.
Neural Process. Lett., 2018
IEEE Netw., 2018
Parameters estimation and synchronization of uncertain coupling recurrent dynamical neural networks with time-varying delays based on adaptive control.
Neural Comput. Appl., 2018
Fixed-time synchronization of memristor-based fuzzy cellular neural network with time-varying delay.
J. Frankl. Inst., 2018
Incremental general non-negative matrix factorization without dimension matching constraints.
Neurocomputing, 2018
Int. J. Commun. Syst., 2018
Corrigendum to "Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing" [Future Gener. Comput. Syst. 72 (2017) 239-249].
Future Gener. Comput. Syst., 2018
PRECISE: Identity-based private data sharing with conditional proxy re-encryption in online social networks.
Future Gener. Comput. Syst., 2018
EURASIP J. Wirel. Commun. Netw., 2018
Finite-time stability and synchronization of memristor-based fractional-order fuzzy cellular neural networks.
Commun. Nonlinear Sci. Numer. Simul., 2018
IEEE Commun. Mag., 2018
Comput. J., 2018
Comput. Electr. Eng., 2018
Appl. Math. Comput., 2018
Fixed-Time Synchronization of Memristive Fuzzy BAM Cellular Neural Networks With Time-Varying Delays Based on Feedback Controllers.
IEEE Access, 2018
Correction to "Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things".
IEEE Access, 2018
Secure Identity-Based Data Sharing and Profile Matching for Mobile Healthcare Social Networks in Cloud Computing.
IEEE Access, 2018
IEEE Access, 2018
Proceedings of the 2018 International Symposium on Security and Privacy in Social Networks and Big Data, 2018
Proceedings of the 2018 International Symposium on Security and Privacy in Social Networks and Big Data, 2018
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
DACSC: Dynamic and Fine-Grained Access Control for Secure Data Collaboration in Cloud Computing.
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
2017
A Novel Smart Card Based User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks.
Wirel. Pers. Commun., 2017
Secure and Energy-Efficient Data Transmission System Based on Chaotic Compressive Sensing in Body-to-Body Networks.
IEEE Trans. Biomed. Circuits Syst., 2017
Scalable Node-Centric Route Mutation for Defense of Large-Scale Software-Defined Networks.
Secur. Commun. Networks, 2017
Secure and Privacy-Preserving Data Sharing and Collaboration in Mobile Healthcare Social Networks of Smart Cities.
Secur. Commun. Networks, 2017
Quantum Inf. Process., 2017
Fixed-time synchronization of memristor-based BAM neural networks with time-varying discrete delay.
Neural Networks, 2017
An anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography.
Multim. Tools Appl., 2017
KSII Trans. Internet Inf. Syst., 2017
Certificateless multi-signer universal designated multi-verifier signature from elliptic curve group.
KSII Trans. Internet Inf. Syst., 2017
IEEE Internet Things J., 2017
Finite-time stability analysis for neutral-type neural networks with hybrid time-varying delays without using Lyapunov method.
Neurocomputing, 2017
Finite-time topology identification and stochastic synchronization of complex network with multiple time delays.
Neurocomputing, 2017
Neurocomputing, 2017
Fuzzy-synthetic minority oversampling technique: Oversampling based on fuzzy set theory for Android malware detection in imbalanced datasets.
Int. J. Distributed Sens. Networks, 2017
Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing.
Future Gener. Comput. Syst., 2017
Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things.
IEEE Access, 2017
Appl. Algebra Eng. Commun. Comput., 2017
Node-centric route mutation for large-scale SDN based on 3D earth mover's distance model.
Proceedings of the 17th International Symposium on Communications and Information Technologies, 2017
Proceedings of the Data Science, 2017
2016
An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks.
Sensors, 2016
Secur. Commun. Networks, 2016
Robust anonymous two-factor authenticated key exchange scheme for mobile client-server environment.
Secur. Commun. Networks, 2016
Cryptanalysis and improvement of a chaotic maps-based anonymous authenticated key agreement protocol for multiserver architecture.
Secur. Commun. Networks, 2016
Peer-to-Peer Netw. Appl., 2016
Finite-Time Boundedness Analysis of Memristive Neural Network with Time-Varying Delay.
Neural Process. Lett., 2016
Anti-synchronization Control of Memristive Neural Networks with Multiple Proportional Delays.
Neural Process. Lett., 2016
Finite-Time Anti-synchronization Control of Memristive Neural Networks With Stochastic Perturbations.
Neural Process. Lett., 2016
KSII Trans. Internet Inf. Syst., 2016
Robust ID based mutual authentication and key agreement scheme preserving user anonymity in mobile networks.
KSII Trans. Internet Inf. Syst., 2016
An advanced elliptic curve cryptography based mutual authentication scheme for session initiation protocol.
Inf. Technol. Control., 2016
IEEE Commun. Lett., 2016
Finite Fields Their Appl., 2016
Sci. China Inf. Sci., 2016
2015
A biometrics and smart cards-based authentication scheme for multi-server environments.
Secur. Commun. Networks, 2015
Quantum Inf. Process., 2015
Quantum state representation based on combinatorial Laplacian matrix of star-relevant graph.
Quantum Inf. Process., 2015
Finite-Time Function Projective Synchronization in Complex Multi-links Networks with Time-Varying Delay.
Neural Process. Lett., 2015
Knowl. Inf. Syst., 2015
An Enhanced Biometric-Based Authentication Scheme for Telecare Medicine Information Systems Using Elliptic Curve Cryptosystem.
J. Medical Syst., 2015
Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps.
J. Medical Syst., 2015
KSII Trans. Internet Inf. Syst., 2015
A Three-Party Password-based Authenticated Key Exchange Protocol for Wireless Communications.
Inf. Technol. Control., 2015
A Lightweight ID Based Authentication and Key Agreement Protocol for Multiserver Architecture.
Int. J. Distributed Sens. Networks, 2015
IEICE Trans. Inf. Syst., 2015
IEEE Commun. Lett., 2015
Des. Codes Cryptogr., 2015
The effect of randomness for dependency map on the robustness of interdependent lattices.
CoRR, 2015
2014
A Secure and Effective Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks.
Wirel. Pers. Commun., 2014
Hierarchical quantum information splitting of an arbitrary two-qubit state via the cluster state.
Quantum Inf. Process., 2014
Quantum secret sharing for general access structures based on multiparticle entanglements.
Quantum Inf. Process., 2014
Quantum Inf. Process., 2014
Multi-party quantum state sharing of an arbitrary multi-qubit state via χ-type entangled states.
Quantum Inf. Process., 2014
Efficient and feasible quantum private comparison of equality against the collective amplitude damping noise.
Quantum Inf. Process., 2014
Quantum Inf. Process., 2014
Quantum Inf. Comput., 2014
Synchronization control of memristor-based recurrent neural networks with perturbations.
Neural Networks, 2014
J. Networks, 2014
J. Multim., 2014
J. Commun. Networks, 2014
KSII Trans. Internet Inf. Syst., 2014
Efficient threshold public key encryption with full security based on dual pairing vector spaces.
Int. J. Commun. Syst., 2014
Appl. Math. Comput., 2014
Appl. Algebra Eng. Commun. Comput., 2014
A novel construction of optimal multi-sender authentication code from singular pseudo-symplectic geometry over finite fields.
Appl. Algebra Eng. Commun. Comput., 2014
2013
Secur. Commun. Networks, 2013
Comment on "High-dimensional deterministic multiparty quantum secret sharing without unitary operations".
Quantum Inf. Process., 2013
The loophole of the improved secure quantum sealed-bid auction with post-confirmation and solution.
Quantum Inf. Process., 2013
Quantum Inf. Process., 2013
Multi-party quantum secret sharing with the single-particle quantum state to encode the information.
Quantum Inf. Process., 2013
Verifiable Threshold Authorization for Scalable and Secure Digital Rights Management.
J. Softw., 2013
CCA Secure Threshold KEM Scheme Against Adaptive Corruption Attacks in Standard Model.
J. Softw., 2013
Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation.
J. Multim., 2013
J. Comput., 2013
KSII Trans. Internet Inf. Syst., 2013
Inf. Syst. Frontiers, 2013
Publicly Verifiable Secret Sharing Scheme with Provable Security against Chosen Secret Attacks.
Int. J. Distributed Sens. Networks, 2013
Chameleon Hash Functions and One-Time Signature Schemes from Inner Automorphism Groups.
Fundam. Informaticae, 2013
Circuits Syst. Signal Process., 2013
An efficient dynamic ID based remote user authentication scheme using self-certified public keys for multi-server environment
CoRR, 2013
Effect of spatial distribution on the synchronization in rings of coupled oscillators.
Commun. Nonlinear Sci. Numer. Simul., 2013
Efficient Construction of CCA-Secure Threshold PKE Based on Hashed Diffie-Hellman Assumption.
Comput. J., 2013
An Application-Oriented Scheduling Optimization Algorithm for Internet-Based Virtual Computing Environment.
Proceedings of the Seventh IEEE International Symposium on Service-Oriented System Engineering, 2013
2012
IEEE Trans. Inf. Theory, 2012
Secur. Commun. Networks, 2012
Secur. Commun. Networks, 2012
Efficient entanglement channel construction schemes for a theoretical quantum network model with <i>d</i>-level system.
Quantum Inf. Process., 2012
Quantum Inf. Process., 2012
Controlled remote state preparation of arbitrary two and three qubit states via the Brown state.
Quantum Inf. Process., 2012
J. Networks, 2012
Public key distribution scheme for delay tolerant networks based on two-channel cryptography.
J. Netw. Comput. Appl., 2012
J. Comput. Sci. Technol., 2012
Recursive hiding of biometrics-based secret sharing scheme using adversary structure.
Inf. Process. Lett., 2012
Provably Secure and Efficient Identity-based Signature Scheme Based on Cubic Residues.
Int. J. Netw. Secur., 2012
Int. J. Comput. Intell. Syst., 2012
Optimum design of fractional order PI<sup>λ</sup>D<sup>μ</sup> controller for AVR system using chaotic ant swarm.
Expert Syst. Appl., 2012
A secret sharing scheme with a short share realizing the (t, n) threshold and the adversary structure.
Comput. Math. Appl., 2012
Proceedings of the 2012 1st IEEE International Conference on Communications in China (ICCC), 2012
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012
2011
IEEE Trans. Parallel Distributed Syst., 2011
Knowl. Inf. Syst., 2011
Discrete logarithm based additively homomorphic encryption and secure data aggregation.
Inf. Sci., 2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
EURASIP J. Inf. Secur., 2011
Proceedings of the New Frontiers in Applied Data Mining, 2011
Proceedings of the Information Computing and Applications, 2011
2010
J. Netw. Comput. Appl., 2010
J. Convergence Inf. Technol., 2010
Int. J. Netw. Secur., 2010
EURASIP J. Wirel. Commun. Netw., 2010
Conjugate adjoining problem in braid groups and new design of braid-based signatures.
Sci. China Inf. Sci., 2010
Proceedings of the IEEE International Conference on Wireless Communications, 2010
Proceedings of the IEEE International Conference on Wireless Communications, 2010
Proceedings of the IEEE International Conference on Wireless Communications, 2010
Proceedings of the 2010 International Conference on Machine Vision and Human-machine Interface, 2010
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
2009
Int. J. Distributed Sens. Networks, 2009
Proceedings of the 2009 IITA International Conference on Services Science, 2009
Proceedings of the Advances in Information Security and Assurance, 2009
Proceedings of the Advances in Neural Networks, 2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
Discrete-Log-Based Additively Homomorphic Encryption and Secure WSN Data Aggregation.
Proceedings of the Information and Communications Security, 11th International Conference, 2009
Proceedings of the Eighth International Conference on Grid and Cooperative Computing, 2009
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009
Proceedings of the Advances in Computer Science, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
Design and Realization of a Large-Scale Distributed Intrusion Management System Module.
Proceedings of the PACIIA 2008, 2008
Proceedings of the International Symposium on Information Processing, 2008
Proceedings of the International Joint Conference on Neural Networks, 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
A New Construction of Multivariate Public Key Encryption Scheme through Internally Perturbed Plus.
Proceedings of the Computational Science and Its Applications - ICCSA 2008, International Conference, Perugia, Italy, June 30, 2008
Proceedings of the International Conference on Cyberworlds 2008, 2008
Proceedings of the Advances in Computer Science and Engineering, 2008
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008
2007
An Efficient Multi-server Password Authenticated Key Agreement Scheme Using Smart Cards.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007
Proceedings of the Advances in Neural Networks, 2007
A Networking Identity Authentication Scheme Combining Fingerprint Coding and Identity Based Encryption.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007
Proceedings of the Progress in Cryptology, 2007
Proceedings of the Third International Conference on Natural Computation, 2007
Proceedings of the Third International Conference on Natural Computation, 2007
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2007
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2007
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2007
Proceedings of the Fifth Annual Conference on Communication Networks and Services Research (CNSR 2007), 2007
Proceedings of the Computational Intelligence and Security, International Conference, 2007
2006
Int. J. Bifurc. Chaos, 2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006
Proceedings of the Advances in Natural Computation, Second International Conference, 2006
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006
2005
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005
A Novel Fuzzy Anomaly Detection Method Based on Clonal Selection Clustering Algorithm.
Proceedings of the Advances in Machine Learning and Cybernetics, 2005
2004
Erratum to: Bounds on the number of hidden neurons in three-layer binary neural networks [Neural Networks 16 (7) 995-1002].
Neural Networks, 2004
2003
Neural Networks, 2003
Proceedings of the IEEE 14th International Symposium on Personal, 2003
2001
IEEE Trans. Inf. Theory, 2001
A unified method to construct neural network decoders for arbitrary codes and decoding rules.
Discret. Math., 2001
Proceedings of the Information and Communications Security, Third International Conference, 2001
2000
Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000), 2000
1998
Comment on "Reparable key distribution protocols for Internet environments" [and reply].
IEEE Trans. Commun., 1998
1997
IEEE Trans. Commun., 1997
Discret. Appl. Math., 1997
1995
J. Cryptol., 1995
1994
IEEE Trans. Commun., 1994
1993
Inf. Process. Lett., 1993
1991
Inf. Process. Lett., 1991
1990
Proceedings of the Advances in Cryptology, 1990
Proceedings of the Advances in Cryptology, 1990