Yixiang Yang
#153,546
Most Influential Person Now
Yixiang Yang's AcademicInfluence.com Rankings
Yixiang Yangengineering Degrees
Engineering
#6303
World Rank
#7620
Historical Rank
Electrical Engineering
#1856
World Rank
#1958
Historical Rank
Applied Physics
#1993
World Rank
#2029
Historical Rank

Download Badge
Engineering
Yixiang Yang's Degrees
- Bachelors Electrical Engineering University of California, Berkeley
Why Is Yixiang Yang Influential?
(Suggest an Edit or Addition)Yixiang Yang's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Optimum design of fractional order PIλDμ controller for AVR system using chaotic ant swarm (2012) (178)
- Parameters identification of chaotic systems via chaotic ant swarm (2006) (135)
- An Enhanced Biometric-Based Authentication Scheme for Telecare Medicine Information Systems Using Elliptic Curve Cryptosystem (2015) (134)
- A hybrid CPSO–SQP method for economic dispatch considering the valve-point effects (2012) (132)
- Cryptographic primitives in blockchains (2019) (123)
- A Secure and Effective Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks (2013) (118)
- Chaotic ant swarm optimization to economic dispatch (2007) (117)
- Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things (2017) (111)
- Novel hybrid image compression–encryption algorithm based on compressive sensing (2014) (111)
- Multiple routes transmitted epidemics on multiplex networks (2013) (109)
- Synchronization control of memristor-based recurrent neural networks with perturbations (2014) (103)
- Finite-time stability and synchronization of memristor-based fractional-order fuzzy cellular neural networks (2018) (102)
- Robust Biometrics Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards (2015) (100)
- Particle swarm optimizer with crossover operation (2018) (95)
- Building an Effective Intrusion Detection System Using the Modified Density Peak Clustering Algorithm and Deep Belief Networks (2019) (94)
- Fixed-time synchronization of inertial memristor-based neural networks with discrete delay (2019) (92)
- Novel color image encryption algorithm based on the reality preserving fractional Mellin transform (2012) (89)
- A new fixed-time stability theorem and its application to the fixed-time synchronization of neural networks (2020) (86)
- Analysis of Current Steganography Tools: Classifications & Features (2006) (85)
- CAS algorithm-based optimum design of PID controller in AVR system (2009) (85)
- Secure and Energy-Efficient Data Transmission System Based on Chaotic Compressive Sensing in Body-to-Body Networks (2017) (83)
- Chaos–order transition in foraging behavior of ants (2014) (81)
- Impulsive control for synchronization and parameters identification of uncertain multi-links complex network (2016) (80)
- A hybrid FCASO-SQP method for solving the economic dispatch problems with valve-point effects (2012) (79)
- Novel quantum steganography with large payload (2010) (77)
- Fixed-time synchronization of memristor-based BAM neural networks with time-varying discrete delay (2017) (77)
- Parameter identification of commensurate fractional-order chaotic system via differential evolution (2012) (76)
- An Optimization Method Inspired by "chaotic" Ant Behavior (2006) (75)
- Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing (2017) (75)
- Finite-time projective synchronization of memristor-based delay fractional-order neural networks (2017) (71)
- Data clustering using bacterial foraging optimization (2012) (70)
- Bounds on the number of hidden neurons in three-layer binary neural networks (2003) (69)
- Applying Semigroup Property of Enhanced Chebyshev Polynomials to Anonymous Authentication Protocol (2012) (68)
- A distance sum-based hybrid method for intrusion detection (2013) (66)
- Particle swarm optimizer with two differential mutation (2017) (63)
- Robustness of Interrelated Traffic Networks to Cascading Failures (2014) (62)
- Novel Approach to Pavement Cracking Automatic Detection Based on Segment Extending (2008) (62)
- Models and synchronization of time-delayed complex dynamical networks with multi-links based on adaptive control (2010) (60)
- Finite-time synchronization of memristor-based neural networks with mixed delays (2017) (60)
- Is semi‐selfish mining available without being detected? (2021) (60)
- A biometrics and smart cards-based authentication scheme for multi-server environments (2015) (57)
- Rational Protocols and Attacks in Blockchain System (2020) (55)
- Efficient and feasible quantum private comparison of equality against the collective amplitude damping noise (2014) (54)
- A fuzzy adaptive chaotic ant swarm optimization for economic dispatch (2012) (54)
- Anti-synchronization of coupled memristive neutral-type neural networks with mixed time-varying delays via randomly occurring control (2016) (53)
- Conditions of parameter identification from time series. (2011) (53)
- PSSPR: A Source Location Privacy Protection Scheme Based on Sector Phantom Routing in WSNs (2021) (53)
- Nearest neighbors based density peaks approach to intrusion detection (2018) (53)
- An improved chaotic cryptosystem based on circular bit shift and XOR operations (2012) (52)
- Revealing the process of edge-based-attack cascading failures (2012) (51)
- Chaotic ant swarm approach for data clustering (2012) (50)
- Network Intrusion Detection Based on Supervised Adversarial Variational Auto-Encoder With Regularization (2020) (50)
- A new method of MPEG video watermarking technology (2003) (48)
- Adaptive synchronization of memristor-based BAM neural networks with mixed delays (2018) (47)
- Parameter estimation of dynamical systems via a chaotic ant swarm. (2010) (46)
- Finite-time stability analysis for neutral-type neural networks with hybrid time-varying delays without using Lyapunov method (2017) (45)
- Web user clustering and Web prefetching using Random Indexing with weight functions (2012) (45)
- An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks (2016) (45)
- A new fixed-time stability theorem and its application to the synchronization control of memristive neural networks (2019) (45)
- Quantum proxy signature scheme with public verifiability (2011) (44)
- Anti-synchronization Control of Memristive Neural Networks with Multiple Proportional Delays (2016) (44)
- Improved Remote User Authentication Scheme Preserving User Anonymity (2007) (43)
- Semi-tensor compressed sensing (2016) (42)
- A secure and efficient mutual authentication scheme for session initiation protocol (2016) (40)
- An anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography (2015) (38)
- Image encryption scheme based on fractional Mellin transform and phase retrieval technique in fractional Fourier domain (2013) (38)
- Finite-time stability and synchronization for memristor-based fractional-order Cohen-Grossberg neural network (2016) (38)
- Stochastic synchronization of complex network via a novel adaptive nonlinear controller (2014) (38)
- Fixed-time synchronization of memristor-based fuzzy cellular neural network with time-varying delay (2018) (36)
- Efficient and Secure Image Communication System Based on Compressed Sensing for IoT Monitoring Applications (2020) (35)
- A Novel Digital Watermarking Based on General Non-Negative Matrix Factorization (2018) (35)
- Automated Vulnerability Detection in Source Code Using Minimum Intermediate Representation Learning (2020) (35)
- Anti-synchronization for stochastic memristor-based neural networks with non-modeled dynamics via adaptive control approach (2015) (35)
- An Efficient Multi-server Password Authenticated Key Agreement Scheme Using Smart Cards (2007) (35)
- Fuzzy system identification via chaotic ant swarm (2009) (35)
- Secure Identity-Based Data Sharing and Profile Matching for Mobile Healthcare Social Networks in Cloud Computing (2018) (35)
- Secure and Privacy-Preserving Data Sharing and Collaboration in Mobile Healthcare Social Networks of Smart Cities (2017) (34)
- Sensor Placement Algorithms for Fusion-Based Surveillance Networks (2011) (34)
- Public key distribution scheme for delay tolerant networks based on two-channel cryptography (2012) (34)
- A LSB steganography detection algorithm (2003) (34)
- On the chaotic synchronization of Lorenz systems with time-varying lags (2009) (34)
- Identifying influential spreaders in interconnected networks (2013) (34)
- DECENT: Secure and fine-grained data access control with policy updating for constrained IoT devices (2017) (34)
- Finite-Time Anti-synchronization Control of Memristive Neural Networks With Stochastic Perturbations (2016) (34)
- Fixed-time synchronization of hybrid coupled networks with time-varying delays (2018) (34)
- A Heterogeneous Ensemble Learning Framework for Spam Detection in Social Networks with Imbalanced Data (2020) (33)
- Novel way to research nonlinear feedback shift register (2014) (33)
- A local-world heterogeneous model of wireless sensor networks with node and link diversity (2011) (32)
- Prediction of Rising Stars in the Game of Cricket (2017) (32)
- New public key cryptosystems based on non-Abelian factorization problems (2013) (32)
- Anonymous three-factor authenticated key agreement for wireless sensor networks (2019) (31)
- Parameter identification and projective synchronization between different chaotic systems. (2009) (31)
- An Ensemble Method based on Selection Using Bat Algorithm for Intrusion Detection (2018) (31)
- Comment on two papers of chaotic synchronization (2004) (31)
- The loophole of the improved secure quantum sealed-bid auction with post-confirmation and solution (2013) (30)
- Finite-Time Function Projective Synchronization in Complex Multi-links Networks with Time-Varying Delay (2015) (29)
- Modeling of Man-in-the-Middle Attack in the Wireless Networks (2007) (29)
- A security framework for wireless sensor networks (2010) (29)
- Hidden web crawling for SQL injection detection (2010) (28)
- Fixed-Time Synchronization of Memristive Fuzzy BAM Cellular Neural Networks With Time-Varying Delays Based on Feedback Controllers (2018) (28)
- Finite-time topology identification and stochastic synchronization of complex network with multiple time delays (2017) (28)
- Pinning adaptive synchronization of complex dynamical network with multi-links (2012) (28)
- An improved SMS based heterogeneous mobile botnet model (2011) (27)
- Discrete logarithm based additively homomorphic encryption and secure data aggregation (2011) (27)
- Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps (2015) (27)
- General Theory of Security and a Study Case in Internet of Things (2017) (27)
- PRECISE: Identity-based private data sharing with conditional proxy re-encryption in online social networks (2017) (26)
- Dynamics of chaotic systems with attractive and repulsive couplings. (2009) (26)
- Fixed-time synchronization of multi-links complex network (2017) (26)
- Provably secure three-party key agreement protocol using Chebyshev chaotic maps in the standard model (2014) (26)
- Synchronization Control of Coupled Memristor-Based Neural Networks with Mixed Delays and Stochastic Perturbations (2017) (25)
- Finite‐time synchronization for memristor‐based BAM neural networks with stochastic perturbations and time‐varying delays (2018) (25)
- A Cluster-Based Trust Model for Mobile Ad Hoc Networks (2008) (25)
- Identifying Vulnerable Nodes of Complex Networks in Cascading Failures Induced by Node-Based Attacks (2013) (24)
- Exponentially asymptotic synchronization of uncertain complex time-delay dynamical networks (2013) (24)
- Secure and privacy-preserving DRM scheme using homomorphic encryption in cloud computing (2013) (24)
- CAS based clustering algorithm for Web users (2010) (24)
- Flexible and Secure Data Transmission System Based on Semitensor Compressive Sensing in Wireless Body Area Networks (2019) (23)
- Robust Privacy-Preserving Mutual Authenticated Key Agreement Scheme in Roaming Service for Global Mobility Networks (2019) (23)
- Robust anonymous two-factor authenticated key exchange scheme for mobile client-server environment (2016) (23)
- General decay synchronization of complex multi-links time-varying dynamic network (2019) (23)
- An efficient secure proxy verifiably encrypted signature scheme (2010) (23)
- Overview of Compressed Sensing: Sensing Model, Reconstruction Algorithm, and Its Applications (2020) (23)
- Mean square modified function projective synchronization of uncertain complex network with multi-links and stochastic perturbations (2015) (23)
- Finite-time generalized projective lag synchronization criteria for neutral-type neural networks with delay (2018) (23)
- An intrusion detection scheme based on anomaly mining in Internet of Things (2011) (22)
- Secure and Traceable Image Transmission Scheme Based on Semitensor Product Compressed Sensing in Telemedicine System (2020) (22)
- Principle for performing attractor transits with single control in Boolean networks. (2013) (22)
- Finite-time synchronization of complex dynamical networks with multi-links via intermittent controls (2016) (21)
- Fixed-time projective synchronization of memristive neural networks with discrete delay (2019) (21)
- Seeker optimization algorithm for parameter estimation of time-delay chaotic systems. (2011) (21)
- Multiple-File Remote Data Checking for cloud storage (2012) (21)
- An efficient privacy-preserving scheme for secure network coding based on compressed sensing (2017) (21)
- Robust and Efficient Authentication Scheme for Session Initiation Protocol (2015) (20)
- A Lightweight ID Based Authentication and Key Agreement Protocol for Multiserver Architecture (2015) (20)
- A secret sharing scheme with a short share realizing the (t, n) threshold and the adversary structure (2012) (20)
- Chaotic ant swarm for the traveling salesman problem (2011) (20)
- Model Checking Based Security Policy Verification and Validation (2010) (20)
- Reconstruction of Complex Network based on the Noise via QR Decomposition and Compressed Sensing (2017) (20)
- Identifying topology of synchronous networks by analyzing their transient processes (2012) (20)
- EABDS: Attribute-Based Secure Data Sharing with Efficient Revocation in Cloud Computing (2015) (20)
- An efficient dynamic ID-based remote user authentication scheme using self-certified public keys for multi-server environments (2013) (19)
- A Secure and Efficient Scalable Secret Image Sharing Scheme with Flexible Shadow Sizes (2017) (19)
- Harnessing piecewise-linear systems to construct dynamic logic architecture. (2008) (19)
- A ranging based scheme for detecting the wormhole attack in wireless sensor networks (2012) (19)
- Privacy-Preserving Multidimensional Data Aggregation Scheme Without Trusted Authority in Smart Grid (2021) (18)
- Convex Decomposition Based Cluster Labeling Method for Support Vector Clustering (2012) (18)
- Efficient Lattice-Based Signcryption in Standard Model (2013) (18)
- Video Watermarking Scheme Based on MPEG-2 for Copyright Protection (2011) (17)
- A Random Indexing Approach for Web User Clustering and Web Prefetching (2011) (17)
- Finite-Time Robust Synchronization of Memrisive Neural Network with Perturbation (2017) (17)
- Transitive Signatures from Braid Groups (2007) (17)
- Improving synchronous ability between complex networks (2012) (17)
- A Secure and Efficient Transmission Method in Connected Vehicular Cloud Computing (2018) (16)
- On Achieving Maximum Secure Throughput Using Network Coding against Wiretap Attack (2010) (16)
- Finite-time modified projective synchronization of memristor-based neural network with multi-links and leakage delay (2018) (15)
- On the undetected error probability of nonlinear binary constant weight codes (1994) (15)
- Secure Data Group Sharing and Dissemination with Attribute and Time Conditions in Public Cloud (2018) (15)
- Optimal windows of rewiring period in randomly coupled chaotic maps (2010) (15)
- Conjugate adjoining problem in braid groups and new design of braid-based signatures (2010) (15)
- Finite-time synchronization for multi-link complex networks via discontinuous control (2017) (15)
- Securing Named Data Networking: Attribute-Based Encryption and Beyond (2018) (15)
- Fuzzy–synthetic minority oversampling technique: Oversampling based on fuzzy set theory for Android malware detection in imbalanced datasets (2017) (14)
- A color image watermarking algorithm resistant to print-scan (2010) (14)
- Secure personal data sharing in cloud computing using attribute-based broadcast encryption (2014) (14)
- IBC-Based Entity Authentication Protocols for Federated Cloud Systems (2013) (14)
- SmartVeh: Secure and Efficient Message Access Control and Authentication for Vehicular Cloud Computing (2018) (14)
- P-Tensor Product in Compressed Sensing (2019) (14)
- Construction of DNA codes by using algebraic number theory (2016) (14)
- Fast and scalable support vector clustering for large-scale data analysis (2015) (14)
- Compressive Sensing-Based Audio Semi-fragile Zero-Watermarking Algorithm (2015) (13)
- Remote NAT Detect Algorithm Based on Support Vector Machine (2009) (13)
- On development of security monitoring system via wireless sensing network (2018) (13)
- Parameters tracking identification based on finite-time synchronization for multi-links complex network via periodically switch control (2017) (13)
- Comment on Wu et al.'s Server-aided Verification Signature Schemes (2010) (13)
- Efficient Provable Secure ID-Based Directed Signature Scheme without Random Oracle (2009) (13)
- Parameter estimation of nonlinear dynamical systems based on integrator theory. (2009) (13)
- Efficient representation of text with multiple perspectives (2012) (13)
- An attack graph based network security evaluation model for hierarchical network (2010) (12)
- Regularity and Green’s relations for finite E-order-preserving transformations semigroups (2010) (12)
- Provably Secure and Efficient Identity-based Signature Scheme Based on Cubic Residues (2012) (12)
- Secure network coding in the presence of eavesdroppers (2010) (12)
- The effect of randomness for dependency map on the robustness of interdependent lattices (2015) (12)
- Joint remote preparation of an arbitrary five-qubit Brown state via non-maximally entangled channels (2014) (12)
- Computation of multiple global optima through chaotic ant swarm (2009) (12)
- Adaptive Synchronization of Complex Dynamical Multilinks Networks with Similar Nodes (2013) (12)
- Secure Network Coding against Wiretapping and Byzantine Attacks (2010) (12)
- Automated Software Vulnerability Detection Based on Hybrid Neural Network (2021) (12)
- An Improved Secure Identity-Based On-Line/Off-Line Signature Scheme (2009) (12)
- Finite time synchronization of memristor-based Cohen-Grossberg neural networks with mixed delays (2017) (12)
- Robust Audio Watermarking Algorithm Based on Empirical Mode Decomposition (2016) (12)
- STP-LWE: A Variant of Learning with Error for a Flexible Encryption (2014) (12)
- Finite-Time Boundedness Analysis of Memristive Neural Network with Time-Varying Delay (2016) (12)
- Optimal transmission power allocation for two-way relay channel using analog network coding (2011) (11)
- Comment on "Adaptive Q-S (lag, anticipated, and complete) time-varying synchronization and parameters identification of uncertain delayed neural networks" [Chaos 16, 023119 (2006)]. (2007) (11)
- Globally fixed-time synchronization of coupled neutral-type neural network with mixed time-varying delays (2018) (11)
- Certificateless Short Aggregate Signature Scheme for Mobile Devices (2019) (11)
- On the Security of a Proxy Ring Signature with Revocable Anonymity (2009) (11)
- Publicly Verifiable Secret Sharing Scheme with Provable Security against Chosen Secret Attacks (2013) (10)
- Protocol reverse engineering through dynamic and static binary analysis (2013) (10)
- Attractor Transformation by Impulsive Control in Boolean Control Network (2013) (10)
- Pinning adaptive synchronization of a class of uncertain complex dynamical networks with multi-link against network deterioration (2015) (10)
- Attribute Based DRM Scheme with Efficient Revocation in Cloud Computing (2013) (10)
- Biologically Inspired Anomaly Detection for Hierarchical Wireless Sensor Networks (2012) (10)
- Cryptanalysis and improvement of a chaotic maps-based anonymous authenticated key agreement protocol for multiserver architecture (2016) (10)
- Topology Identification of Complex Network via Chaotic Ant Swarm Algorithm (2013) (10)
- A secret sharing scheme based on Near-MDS codes (2009) (10)
- Finite-time projective synchronization of memristor-based neural networks with leakage and time-varying delays (2019) (10)
- Modeling dynamics of disaster spreading in community networks (2011) (10)
- Asymptotic and finite-time synchronization of memristor-based switching networks with multi-links and impulsive perturbation (2019) (10)
- Deterministic Constructions of Compressed Sensing Matrices From Unitary Geometry (2021) (10)
- Parameters estimation and synchronization of uncertain coupling recurrent dynamical neural networks with time-varying delays based on adaptive control (2018) (10)
- An Extended Chaotic Maps-Based Three-Party Password-Authenticated Key Agreement with User Anonymity (2016) (9)
- Multiparty-controlled Joint Remote Preparation of an Arbitrary Four-qubit Cluster-type State via Two Different Entangled Quantum Channels (2015) (9)
- The Architecture of the Large-scale Distributed Intrusion Detection System (2005) (9)
- Achieving flatness: Graph labeling can generate graphical honeywords (2021) (9)
- A Novel Scheme for Accelerating Support Vector Clustering (2012) (9)
- A minimum power consumption scheme for two-way relay with physical-layer network coding (2010) (9)
- Weighted pooling for image recognition of deep convolutional neural networks (2018) (9)
- Stochastic synchronization of complex networks via a novel adaptive composite nonlinear feedback controller (2015) (9)
- Data Fitting Via Chaotic Ant Swarm (2006) (9)
- An Efficient Patch Dissemination Strategy for Mobile Networks (2013) (9)
- Low Energy Consumption Compressed Spectrum Sensing Based on Channel Energy Reconstruction in Cognitive Radio Network (2020) (9)
- Identity-based signcryption from lattices (2015) (8)
- Empirical analysis of software coupling networks in object-oriented software systems (2010) (8)
- A novel verifiable dynamic multi-policy secret sharing scheme (2010) (8)
- Scalable Node-Centric Route Mutation for Defense of Large-Scale Software-Defined Networks (2017) (8)
- Elliptic curve cryptography based authenticated key agreement with pre-shared password (2005) (8)
- Epidemic Model of Mobile Phone Virus for Hybrid Spread Mode with Preventive Immunity and Mutation (2010) (8)
- A Fuzzy Identity-Based Signature Scheme from Lattices in the Standard Model (2014) (8)
- A secure and efficient privacy-preserving data aggregation algorithm (2021) (8)
- Design and Analysis of a Hash Ring-iterative Structure (2006) (8)
- Privacy-Preserving Media Sharing with Scalable Access Control and Secure Deduplication in Mobile Cloud Computing (2020) (7)
- Aggregate Signature without Pairing from Certificateless Cryptography (2018) (7)
- General Theory of security and a study of hacker’s behavior in big data era (2018) (7)
- Pairing-Based Key Management Scheme for Heterogeneous Sensor Networks (2010) (7)
- An Attention-Based Graph Neural Network for Spam Bot Detection in Social Networks (2020) (7)
- Defense Strategy of Network Security based on Dynamic Classification (2015) (7)
- Hash function construction based on coupled map lattice for communication security (2009) (7)
- A new authentication and key agreement protocol of 3G based on Diffie-Hellman Algorithm (2010) (7)
- An effective algorithm for the spark of sparse binary measurement matrices (2020) (7)
- Synchronization of Multi-links Memristor-Based Switching Networks Under Uniform Random Attacks (2018) (7)
- Dynamic logic architecture based on piecewise-linear systems (2010) (7)
- New Optimistic Fair Exchange Protocol Based on Short Signature (2010) (7)
- ID-based authentication scheme combined with identity-based encryption with fingerprint hashing (2008) (7)
- Graph Convolutional Networks for Privacy Metrics in Online Social Networks (2020) (7)
- Incremental general non-negative matrix factorization without dimension matching constraints (2018) (6)
- Certificateless short signature scheme from pairing in the standard model (2018) (6)
- A new impossible differential attack on SAFER ciphers (2010) (6)
- Customer Behavior Pattern Discovering Based on Mixed Data Clustering (2009) (6)
- A New Blind Signature and Threshold Blind Signature Scheme from Pairings (2007) (6)
- Sparse General Non-Negative Matrix Factorization Based on Left Semi-Tensor Product (2019) (6)
- WITHDRAWN: Parameter estimation of time-delay chaotic system (2007) (6)
- An overview of general theory of security (2017) (6)
- A New Method to Detect Useless Service Failure Model in SPN (2010) (6)
- Querying encrypted character data in DAS model (2010) (6)
- All exceptional groups of lie type have minimal logarithmic signatures (2014) (6)
- High Quality Data Hiding in Halftone Image Based on Block Conjugate (2018) (6)
- Economic dispatch in power plant based on chaotic ant swarm optimization (2006) (6)
- Flexible construction of compressed sensing matrices with low storage space and low coherence (2021) (6)
- Secure and Flexible Digital Rights Management in a Pervasive Usage Mode (2007) (6)
- Passive NATted Hosts Detect Algorithm Based on Directed Acyclic Graph Support Vector Machine (2009) (6)
- An Efficient Algorithm for Time-Driven Data Gathering in Wireless Sensor Networks Using Inter-Session Network Coding (2012) (6)
- Attributed community mining using joint general non-negative matrix factorization with graph Laplacian (2018) (6)
- Exponentially asymptotical synchronization in uncertain complex dynamical networks with time delay (2010) (6)
- Quantifying team precedence in the game of cricket (2018) (6)
- A novel key management method for wireless sensor networks (2010) (6)
- Cellular Neural Network-Based Methods for Distributed Network Intrusion Detection (2015) (6)
- LRM: A Location Recombination Mechanism for Achieving Trajectory $k$ -Anonymity Privacy Protection (2019) (5)
- Towards Improving Ant-Based Clustering - An Chaotic Ant Clustering Algorithm (2007) (5)
- Minimal logarithmic signatures for the unitary group $$U_n(q)$$Un(q) (2015) (5)
- General Theory of Information Security (2018) (5)
- An Evaluation Model of Botnet Based on Peer to Peer (2012) (5)
- A Secure Message Transaction Protocol for Delay Tolerant Networks (2012) (5)
- Collision attack on NaSHA-384/512 (2010) (5)
- Research of Spatial Domain Image Digital Watermarking Payload (2011) (5)
- Multi-policy threshold signature with distinguished signing authorities (2011) (5)
- Global asymptotic synchronization of fractional order multi‐linked memristive neural networks with time‐varying delays via discontinuous control (2021) (5)
- Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in Cloud Computing (2019) (5)
- Primitives towards verifiable computation: a survey (2018) (5)
- A Reconfigurable Logic Cell Based on a Simple Dynamical System (2013) (5)
- Steganalysis of the MP3 steganographic algorithm based on Huffman coding (2010) (5)
- Disturbance Chaotic Ant Swarm (2011) (5)
- Constructing Dynamic Multiple-Input Multiple-Output Logic Gates (2011) (5)
- Parameter Identification and Synchronization of Dynamical System by Introducing an Auxiliary Subsystem (2010) (5)
- Chameleon Hash Functions and One-Time Signature Schemes from Inner Automorphism Groups (2013) (5)
- Efficient Post-Quantum Secure Network Coding Signatures in the Standard Model (2016) (5)
- Research on IPSec-based NAT-PT transition mechanism (2009) (5)
- A Simulation Platform of DDoS Attack Based on Network Processor (2008) (5)
- Adaptive Lag Synchronization of Memristive Neural Networks With Mixed Delays (2018) (5)
- Hierarchical identity-based broadcast encryption scheme from LWE (2014) (5)
- Improvement and security analysis on MD5: Improvement and security analysis on MD5 (2009) (5)
- Security Mechanism Research of EMV2000 (2007) (5)
- Homomorphic Signatures from Chameleon Hash Functions (2017) (5)
- VOAuth: A solution to protect OAuth against phishing (2016) (4)
- An Authenticated Clustering-based Group Key Agreement for Large Ad Hoc Networks (2012) (4)
- A Nature-inspired Multiple Kernel Extreme Learning Machine Model for Intrusion Detection (2020) (4)
- Optimal Weakly Secure Minimum Storage Regenerating Codes Scheme (2019) (4)
- A strong multi-designated verifiers signature scheme (2008) (4)
- A new approach of analyzing time-varying dynamical equation via an optimal principle (2017) (4)
- A Secure Proxy Blind Signature Scheme Based on ECDLP (2009) (4)
- A novel model for query over encrypted XML databases (2009) (4)
- Privacy-Preserving Spatio-Temporal Keyword Search for Outsourced Location-Based Services (2021) (4)
- A Three-Party Password-based Authenticated Key Exchange Protocol for Wireless Communications (2015) (4)
- An HVS-Based JPEG Image Watermarking Method for Copyright Protection (2011) (4)
- Modified Fuzzy Linear Discriminant Analysis for Threshold Selection (2013) (4)
- A reliable and security method for data aggregation in WSNs (2011) (4)
- Adaptive Secure Cross-Cloud Data Collaboration with Identity-Based Cryptography and Conditional Proxy Re-Encryption (2018) (4)
- An Innovative Video Watermarking Scheme Based on H.264 for Copyright Protection (2012) (4)
- Secure ABE Scheme for Access Management in Blockchain-Based IoT (2021) (4)
- Individual Communication Transmitter Identification Using Support Vector Machines with Kernels for Polyspectrum (2009) (4)
- Disassortativity and degree distribution of software coupling networks in object-oriented software systems (2010) (4)
- Single-term divisible electronic cash based on bit commitment (2000) (4)
- New Construction of Blind Signatures From Braid Groups (2019) (4)
- Bagged Tree Based Frame-Wise Beforehand Prediction Approach for HEVC Intra-Coding Unit Partitioning (2020) (4)
- A Reversible Fragile Video Watermarking for H.264/AVC (2014) (4)
- Cryptanalysis of a Chaotic Communication Scheme Using Parameter Observer (2010) (4)
- A trusted de-swinging k-anonymity scheme for location privacy protection (2022) (4)
- Blockchain-Enhanced Fair and Efficient Energy Trading in Industrial Internet of Things (2021) (4)
- Cyclic redundancy code check algorithm based on small lookup table (2009) (4)
- A novel term weighting scheme with distributional coefficient for text categorization with support vector machine (2010) (4)
- Comment on Lee et al.’s group signature and e-auction scheme (2013) (4)
- SkyF2F: Censorship Resistant via Skype Overlay Network (2009) (4)
- Research of an Innovative P2P-Based Botnet (2010) (4)
- A Networking Identity Authentication Scheme Combining Fingerprint Coding and Identity Based Encryption (2007) (4)
- A novel threshold signature scheme with distinguished signing authorities (2010) (4)
- An identity authentication scheme based on USB Key for Trusted Network Connect (2010) (4)
- A Novel Fuzzy Anomaly Detection Method Based on Clonal Selection Clustering Algorithm (2005) (3)
- Research of Hierarchical Intrusion Detection Model Based on Discrete Cellular Neural Networks (2013) (3)
- A Novel VoIP Flooding Detection Method Basing on Call Duration (2010) (3)
- A New Construction of Multivariate Public Key Encryption Scheme through Internally Perturbed Plus (2008) (3)
- Efficient threshold public key encryption with full security based on dual pairing vector spaces (2014) (3)
- A new forgery attack on message recovery signatures (2000) (3)
- A Simple Authentication and Key Distribution Protocol in Wireless Mobile Networks (2007) (3)
- Privacy-Preserving Traceable Attribute-Based Keyword Search in Multi-Authority Medical Cloud (2021) (3)
- Research on Secure Multi-party Computational Geometry (2011) (3)
- Recursive hiding of biometrics-based secret sharing scheme using adversary structure (2012) (3)
- Chaotic Deep Network for Mobile D2D Communication (2021) (3)
- Applying Multiple Residual Error Gray Forecast to Restrain Endpoints Effect in HHT of Network Traffic (2010) (3)
- A Data Safety Transmission Solution in Web Application (2007) (3)
- Games Based Study of Nonblind Confrontation (2017) (3)
- Short lattice signatures with constant-size public keys (2016) (3)
- A Defending Mechanism against DDoS Based on Registration and Authentication (2008) (3)
- How does rumor spreading affect people inside and outside an institution (2021) (3)
- A Novel Program Analysis Method Based on Execution Path Correlation (2009) (3)
- Prevention and Trust Evaluation Scheme Based on Interpersonal Relationships for Large-Scale Peer-To-Peer Networks (2014) (3)
- Controllable Delegation Model Based on Usage and Trustworthiness (2008) (3)
- The analysis of classified protection compliance detection based on Dempster-Shafer theory (2010) (3)
- WORM-HUNTER: A Worm Guard System using Software-defined Networking (2017) (3)
- Secure two-party computation of solid triangle area and tetrahedral volume based on cloud platform (2019) (3)
- Multiple information transmission using only one scalar chaotic time series (2013) (3)
- A Special Proxy Signature Scheme with Multi-warrant (2009) (3)
- Corrigendum to "Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing" [Future Gener. Comput. Syst. 72 (2017) 239-249] (2018) (3)
- Using Three Layer Neural Network to Compute Multi-valued Functions (2007) (3)
- Fast coding in digital steganography (2009) (3)
- Integer Programming via Chaotic Ant Swarm (2007) (3)
- An Entropy-View Secure Multiparty Computation Protocol Based on Semi-Honest Model (2022) (3)
- An advanced elliptic curve cryptography based mutual authentication scheme for session initiation protocol (2017) (3)
- Trust model based on dynamic policy similarity for pervasive computing environments (2010) (3)
- Classify the Majority of the Total Bytes on the Internet (2008) (3)
- A Digital Signature Scheme Based on MST3 Cryptosystems (2014) (3)
- A Quantum Watermarking Protocol Based on Bell Dual Basis (2013) (3)
- Cascading Dynamics of Heterogenous Scale-Free Networks with Recovery Mechanism (2013) (3)
- Attribute based DRM scheme with dynamic usage control in cloud computing (2014) (3)
- A Novel Smart Card Based User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks (2017) (3)
- P2GT: Fine-Grained Genomic Data Access Control With Privacy-Preserving Testing in Cloud Computing (2021) (3)
- A Robust Zero-Watermark Algorithm Based on Singular Value Decomposition for Digital Right Management (2009) (3)
- Algorithm of Generating Host-based Attack Graph for Overall Network (2011) (3)
- Efficient Construction of CCA-Secure Threshold PKE Based on Hashed Diffie-Hellman Assumption (2013) (3)
- Privacy-Preserving Subgraph Matching Scheme With Authentication in Social Networks (2022) (3)
- The construction of sets with strong quantum nonlocality using fewer states (2020) (3)
- Efficient ID-based TPM key loading scheme for trusted platform (2010) (2)
- Using Three Layer Neural Networks to Compute Discrete Real Functions (2007) (2)
- An Improved PrefixSpan-Based Signatures Mining Algorithm with Offset Constraint (2010) (2)
- A Trust Cloud Model Based on the Association Rule Table of Multidimensional Trust-attribute (2012) (2)
- Secure and Privacy-Preserving Warning Message Dissemination in Cloud-Assisted Internet of Vehicles (2019) (2)
- Verifiable Threshold Authorization for Scalable and Secure Digital Rights Management (2013) (2)
- Protocol for Privacy-Preserving Set Pattern Matching (2009) (2)
- A Novel ID-Based Verifiably Encrypted Signature without Random Oracle (2008) (2)
- Accountability for Data Integrity in Cloud Storage Service (2012) (2)
- A unified method to construct neural network decoders for arbitrary codes and decoding rules (2001) (2)
- Identification of Coupled Map Lattice Based on Compressed Sensing (2016) (2)
- Certificateless Designated Verifier Anonymous Aggregate Signature Scheme for Healthcare Wireless Sensor Networks (2021) (2)
- Timeliness optimistic fair exchange protocol based on key-exposure-free chameleon hashing scheme (2010) (2)
- Data hiding in color halftone images based on new conjugate property (2016) (2)
- Discrete-Log-Based Additively Homomorphic Encryption and Secure WSN Data Aggregation (2009) (2)
- A Novel Relational Database Watermarking Algorithm for Joint Ownership (2008) (2)
- A Large Capacity Histogram-Based Watermarking Algorithm for Three Consecutive Bins (2018) (2)
- Statistic Experience Based Adaptive One-Shot Detector (EAO) for Camera Sensing System (2018) (2)
- Erratum to: Bounds on the number of hidden neurons in three-layer binary neural networks [Neural Networks 16 (7) 995-1002] (2004) (2)
- ID-Based Blind Signature and Proxy Blind Signature without Trusted PKG (2008) (2)
- Correction to "Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things" (2018) (2)
- Digital Watermarking Based on Contourlet Transform and Principal Component Analysis (2013) (2)
- Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation (2013) (2)
- Towards Hierarchical-User RBAC model (2010) (2)
- A Novel Hybrid Encryption Scheme against Adaptive Chosen Ciphertext Attack (2007) (2)
- A Digital Watermarking Method Based on Particle Swarm Optimization and Contourlet Transform (2013) (2)
- Flexible construction of measurement matrices in compressed sensing based on extensions of incidence matrices of combinatorial designs (2022) (2)
- A digital watermarking algorithm for high capacity index image robust to format transformation (2010) (2)
- CS-1-SVM: Improved One-Class SVM for Detecting API Abuse on Open Network Service (2015) (2)
- An Application-Level Signatures Extracting Algorithm Based on Offset Constraint (2008) (2)
- A Reputation System Preserving the Privacy of Feedback Providers and Resisting Sybil Attacks (2014) (2)
- Finite-Time Synchronization of Multi-Linked Memristor-Based Neural Networks With Mixed Time-Varying Delays (2020) (2)
- Privacy-Preserving Verifiable Graph Intersection Scheme With Cryptographic Accumulators in Social Networks (2021) (2)
- Minimum length key in MST cryptosystems (2017) (2)
- Quantitative Evaluation Approach for Real-time Risk Based on Attack Event Correlating: Quantitative Evaluation Approach for Real-time Risk Based on Attack Event Correlating (2014) (2)
- SAB2: A novel system of malicious webpages detection (2010) (2)
- Vulnerabilities Analyzing Model for Alert Correlation in Distributed Environment (2009) (2)
- DGS-HSA: A Dummy Generation Scheme Adopting Hierarchical Structure of the Address (2020) (2)
- Encrypted data sharing with multi-owner based on digital rights management in online social networks (2014) (2)
- Symmetric Steganography Secure Against Chosen Message and Original Cover Attacks (2006) (2)
- A secure message delivery scheme with path tracking for delay tolerant networks (2012) (1)
- An Improved Analog Network Coding Scheme for Cooperative Communication Systems (2011) (1)
- Secure Multi-party Comparison Protocol and Application (2017) (1)
- An efficient scheme of authenticated encryption with associated data (2010) (1)
- Construction of convolutional network coding for cyclic multicast networks (2010) (1)
- CSP-DHIES: a new public-key encryption scheme from matrix conjugation (2012) (1)
- Chaotic Ant Swarm Designed T-S Fuzzy System for Adaptive Control of Dynamical Systems (2008) (1)
- Effect of spatial distribution on the synchronization in rings of coupled oscillators (2013) (1)
- Node-centric route mutation for large-scale SDN based on 3D earth mover's distance model (2017) (1)
- An Improved Consensus Mechanism for the Blockchain Based on Credit Rewards and Punishments (2020) (1)
- A CCA-Secure And Interoperable Cross-Domain Distribution Protocol for E_Document (2012) (1)
- An Application-Oriented Scheduling Optimization Algorithm for Internet-Based Virtual Computing Environment (2013) (1)
- Information system security function validating using model checking (2010) (1)
- An optimistic fair exchange protocol based on committed signature (2009) (1)
- Improved EMD Steganography with Great Embedding Rate and High Embedding Efficiency (2009) (1)
- Efficient identity-based signature scheme with batch authentication for delay tolerant mobile sensor network (2013) (1)
- Generalization of Elliptic Curve Digital Signature Schemes (2001) (1)
- Fixed-Time Synchronization for Hybrid Coupled Dynamical Networks with Multilinks and Time-Varying Delays (2017) (1)
- A new credential routing model based on trust theory (2009) (1)
- A real-time information hiding algorithm based on HTTP protocol (2009) (1)
- Protocol Adaption of NAC in Mobile Telecommunication Networks (2009) (1)
- Cross-Platform Strong Privacy Protection Mechanism for Review Publication (2021) (1)
- An Integrative Model and System for Detecting NATed Hosts (2009) (1)
- A Lightweight Mechanism for Border Gateway Protocol Path Verification: A Lightweight Mechanism for Border Gateway Protocol Path Verification (2013) (1)
- Cross-domain vulnerability detection using graph embedding and domain adaptation (2022) (1)
- An Extensible Hash Function Construction Based on Embedded Chaos Maps (2010) (1)
- Using User Behavior to Measure Privacy on Online Social Networks (2020) (1)
- DACSC: Dynamic and Fine-Grained Access Control for Secure Data Collaboration in Cloud Computing (2018) (1)
- MPoR: A Modified Consensus for Blockchain-Based Internet of Vehicles (2022) (1)
- Minimal logarithmic signatures for one type of classical groups (2015) (1)
- Improved tripartite concurrent signature (2010) (1)
- Gradient energy detection of LSB steganography (2005) (1)
- Improved Degree Search Algorithms in Unstructured P2P Networks (2012) (1)
- A high-Capacity Watermarking Algorithm Using two Bins Histogram Modification (2018) (1)
- An anonymous authentication scheme for mobile communication (2010) (1)
- A (k, t, n) Verifiable Multi-secret Sharing Scheme Based on Adversary Structure (2014) (1)
- Comment on a Novel Non-interactive Verifiable Secret Sharing Scheme (2010) (1)
- Guest editorial: Blockchain technologies and applications (2019) (1)
- A method for topology conformance tests under logical constraints (2010) (1)
- A Soft-divided Method for Trust Range Based on Cloud Theory (2012) (1)
- Using information entropy to analyze secure multi-party computation protocol (2021) (1)
- A New Hierarchical Key AuthData Management Scheme for Trusted Platform (2010) (1)
- Certificateless multi-signer universal designated multi-verifier signature from elliptic curve group (2017) (1)
- A Miniature CCA Public Key Encryption Scheme Based on Non-abelian Factorization Problem in Finite Groups of Lie Type (2019) (1)
- Novel key management for 3G end-to-end encryption (2009) (1)
- A Noninteractive Multireplica Provable Data Possession Scheme Based on Smart Contract (2022) (1)
- On the implementation of prototype system for wireless network's trusted access architecture (2009) (1)
- A Delegation-Based Protocol for Anonymous Roaming Authentication in Mobile Network (2013) (1)
- Minimal Logarithmic Signatures for Sporadic Groups (2015) (1)
- An Improved Directed Diffusion Protocol based on Opportunistic Routing (2014) (1)
- Cooperative Jamming For Security of Two-Way Relay Wiretap Channel With Analog Network Coding (2012) (1)
- Research of the Apriority Policy-based Multi-hop BFS Search Algorithm in P2P Network (2007) (1)
- Parameter estimation of time-delay chaotic system and its application in secure communication: Parameter estimation of time-delay chaotic system and its application in secure communication (2008) (1)
- Multi-watermarking scheme for group users based on Visual Cryptography (2005) (1)
- Individual Communication Transmitter Classification of Weighted Feature Set Based on RST (2009) (0)
- Access Model of Web Users Based on Multi-chains Hidden Markov Models (2009) (0)
- A New Signature Scheme from Inner Automorphism Group (2014) (0)
- Modelling security message propagation in delay tolerant networks (2012) (0)
- Multiplicative Watermark Detection Using Locally Optimum Nonlinearity (2008) (0)
- Identification of Frequency-Hopping Spread Spectrum Signals Using SVMs with Wavelet Kernels (2010) (0)
- Demodulate-and-Forward Protocol for Multiuser Cooperative Transmission with Network Coding (2012) (0)
- The Technology and Practice of Comprehensive Information Security Management for Wireless Mobile Environment (2009) (0)
- An Improved Collusion-Resistant Public-Key Traitor Tracing Scheme (2009) (0)
- Password-Based Encrypted Cluster Key Agreement in Ad Hoc Networks (2012) (0)
- Light-weight Proofs of Retrievability in Cloud Archive Storage with Replications (2012) (0)
- An application-level features mining algorithm based on PrefixSpan (2010) (0)
- Generalization of perfect concurrent signatures (2012) (0)
- CCA Secure Threshold KEM Scheme Against Adaptive Corruption Attacks in Standard Model (2013) (0)
- Editor’s note: Special Issue on Security and Privacy for Big Data Storage in the Cloud (2018) (0)
- A Network-Coding Method to Improve the Performance of Opportunistic Networks (2009) (0)
- An Adaptive Watermarking Scheme Using SVD in Contourlet Domain (2012) (0)
- New Efficient Timed Commitment Schemes (2003) (0)
- Blind Signature Scheme over Inner Automorphism Group (2012) (0)
- An ID-Based Anonymous-Message Anonymous Signature Scheme (2009) (0)
- Public Key Encryption in Non-Abelian Groups (2016) (0)
- Corrigendum to "Rational Protocols and Attacks in Blockchain System" (2021) (0)
- An Integrative System for Deep Packet Inspection and Network Anomaly Detection & Defense (2011) (0)
- Global Detection of Live Virtual Machine Migration Based on Cellular Neural Networks (2014) (0)
- BLOCKCHAIN TECHNOLOGIES AND APPLICATIONS (2019) (0)
- An improved algorithm for IP alias resolution in network topology measurement (2009) (0)
- Finite-SNR Diversity-Multiplexing Tradeoff for Cooperative Transmissions with Opportunistic Network Coding (2012) (0)
- Multi-integer Somewhat Homomorphic Encryption Scheme with China Remainder Theorem (2015) (0)
- A Computational Perspective on Network Coding (2010) (0)
- Constructing Dynamic Multiple-Input Multiple-Output Logic (2014) (0)
- A CCA secure public key encryption scheme based on finite groups of Lie type (2021) (0)
- Robust Provable Data Possession Protocol (2014) (0)
- Provable Security Efficient Clustering-based Group Key Agreement for Ad Hoc Networks (2012) (0)
- An Adaptive Contact Probing Scheme of Delay-tolerant Mobility Sensor Network: An Adaptive Contact Probing Scheme of Delay-tolerant Mobility Sensor Network (2011) (0)
- A scheme of trust management system for P2P network (2010) (0)
- ID-Based Multi-proxy Sequential Signature System from Bilinear Pairing (2007) (0)
- ResNet Approach for Coding Unit Fast Splitting Decision of HEVC Intra Coding (2021) (0)
- A Vulnerability Exploits Detection Method Based on Binary Program Behavior Analysis (2012) (0)
- Crazy: A New 256-Bit Compression Function for Hash Algorithm (2009) (0)
- Efficient Universally Composable Password-Based Key Exchange (2008) (0)
- Global Asymptotic Synchronization of Fractional Order Multi-linked Memristive Neural Networks with Time-varying Delays via Discontinuous Control (0)
- Identity-Based Uploading Content Scheme in DRM (2009) (0)
- A Secure Energy Internet Scheme for IoV Based on Post-Quantum Blockchain (2023) (0)
- Analysis of nonseparable property of multi-valued multi-threshold neuron (2008) (0)
- Network Security Analysis Based on Host-Based Attack Graph (2011) (0)
- Steganalysis of LSB Matching in Gray Images Based on Regional Correlation Analysis (2009) (0)
- Multiple Vectors Propagation of Epidemics in Complex Networks (2013) (0)
- A location data protection protocol based on differential privacy (2021) (0)
- IR-RBT Codes: A New Scheme of Regenerating Codes for Tolerating Node and Intra-node Failures in Distributed Storage Systems (2019) (0)
- The metric of bulk repeated call detection (2010) (0)
- Individual Communication Transmitter Identification using SVMs with Polyspectrum Kernels of Average Carrier Frequency (2012) (0)
- pMATE: A Privacy-Preserving Map Retrieval Task Assignment Scheme in Spatial Crowdsourcing (2023) (0)
- Fast and Privacy-Preserving Attribute-Based Keyword Search in Cloud Document Services (2023) (0)
- Foreword: Computational Intelligence for Network Control and Security (2012) (0)
- Application of ICA and contourlet transform in image watermarking (2013) (0)
- A Similarity-Based Data Placement Strategy for Peer-to-Peer Storage and Backup Systems (2010) (0)
- A PRC based key management method for wireless sensor networks (2010) (0)
- A trust mechanism in Internet-Based Virtual Computing Environment (2012) (0)
- Control Flow Deobfuscation Method Based on Path Feasibility Analysis (2012) (0)
- Scaling Concolic Testing for the Environment-Intensive Program (2015) (0)
- A New Lightweight Key Exchange Protocol Based on T—tensor Product (2020) (0)
- A Novel Dynamic Immunization Model Basing on Alarm Information (2009) (0)
- An anonymous authentication scheme for mobile communication without trusted third party (2010) (0)
- IPAL: An Integrity Preservation and Accountability Layer for Cloud Storage (2012) (0)
- A method for system auditing based on baseline assessment (2011) (0)
- Provably secure and efficient proxy signature with untrustworthy proxy signer (2008) (0)
- Role-Based Collaboration Model of Security Devices (2009) (0)
- Secret key sharing scheme based on the theory of algebraic semigroups (2000) (0)
- A Weakly Homomorphic Encryption with LDN (2014) (0)
- A Neighbor Prototype Selection Method Based on CCHPSO for Intrusion Detection (2019) (0)
- An evaluation method of image scrambling degree based on pixel distribution (2018) (0)
- Remark on Yu et al.'s Online/Offline Signature Scheme in CT-RSA 2008 (2009) (0)
- A Differential Privacy Protection Protocol Based on Location Entropy (2023) (0)
- Input Generation via Taintdata Identification:Finding Hidden Path in the Environment-Intensive Program (2015) (0)
- A New Security Mechanism for BGP Path Verification (2012) (0)
- Performance analysis of sign quantized projection (2010) (0)
- Guest Editorial (2012) (0)
- Exchanging registered users’ submitting reviews towards trajectory privacy preservation for review services in Location-Based Social Networks (2021) (0)
- Variational learning for finite Beta-Liouville mixture models (2014) (0)
- A software protection framework for mobile devices (2013) (0)
- A De-swinging Scheme in Location Privacy Protection via Smart Contract (2021) (0)
- A new approach to privacy-preserving query in semi-honest model (2011) (0)
- ABlockchain-enabled Efficient and Fair Energy Trading Schemes in Industrial Internet of Things (2021) (0)
- Re-keying scheme for secure multicast based on multi-group key tree (2010) (0)
- Individual Communication Transmitter Identification Using Support Vector Machines with Kernels for Polyspectrum of Box-Dimension (2012) (0)
- Consistency of weighted feature set and polyspectral kernels in individual communication transmitter identification (2010) (0)
- New Verifiably Encrypted Signature Scheme Based on Shim’s Signature: New Verifiably Encrypted Signature Scheme Based on Shim’s Signature (2011) (0)
- VAOFS: A Verifiable Append-Only File System for Regulatory Compliance (2009) (0)
- A Miniature CCA2 Public key Encryption scheme based on non-Abelian factorization problems in Lie Groups (2016) (0)
- A Periodic Integrity Measurements Authenticating Scheme Based on TNC Architecture (2010) (0)
- IL Optimization: Detecting and Eliminating Redundant Eflags by FlagRelevant Chain (2015) (0)
- A Router-Level Topology Simulation Algorithm Based on Improved BA Model (2012) (0)
- Research on End-to-End Encryption of TETRA (2006) (0)
- Multiplex Contract Signing Protocol: Multiplex Contract Signing Protocol (2012) (0)
- Strong nonlocal sets of UPB (2021) (0)
- Design and analysis of heartbeat protocol in NIDS cluster (2010) (0)
- Topology Identification of Coupling Map Lattice under Sparsity Condition (2015) (0)
- An Efficient and Secure Transmission Model Based on Compressive Sensing (2018) (0)
- Intermittent Pinning Synchronization of Memristor-Based Switching Networks With Multi-Links and Mixed Delays (2020) (0)
- BGP Path Verification Mechanism Based on Sanitizable Signature (2012) (0)
- Analysis and improvement on CHY (t,n) threshold verifiable multi-secret sharing scheme (2010) (0)
- A Round-Optimized Authenticated Group Key Agreement (2011) (0)
- An efficient bit commitment scheme based on factoring assumption (2001) (0)
- Origin Authentication Scheme Against BGP Address Prefix Hijacking: Origin Authentication Scheme Against BGP Address Prefix Hijacking (2012) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Yixiang Yang?
Yixiang Yang is affiliated with the following schools: