default search action
Xuguang Wu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j5]Minqing Zhang, Yu Ge, Yan Ke, Xuguang Wu, Bo Du:
High capacity reversible data hiding for encrypted images based on full bit-plane compression. J. Electronic Imaging 31(4) (2022) - [c10]Xuguang Wu:
Parallel Optimized Attribute-Based Encryption Scheme Based on SM9. RICAI 2022: 873-877 - 2020
- [c9]Shuaishuai Zhu, Yiliang Han, Xiaoyuan Yang, Xuguang Wu:
Efficient and Evolvable Key Reconciliation Mechanism in Multi-party Networks Based on Automatic Learning Structure. SPDE 2020: 91-99
2010 – 2019
- 2018
- [j4]Xuguang Wu, Minqing Zhang, Shuaishuai Zhu:
Certificateless multi-signcryption scheme in standard model. Int. J. Grid Util. Comput. 9(2): 120-127 (2018) - [c8]Xiaolong Li, Yiliang Han, Deyang Zhang, Xuguang Wu:
An Evaluation Algorithm for Importance of Dynamic Nodes in Social Networks Based on Three-Dimensional Grey Relational Degree. ICPCSEE (2) 2018: 201-212 - 2017
- [c7]Xiurong Chen, Xu An Wang, Xuguang Wu:
Improved Ant Colony RBF Spatial Interpolation of Ore Body Visualization Software Development. 3PGCIC 2017: 191-198 - [c6]Xiurong Chen, Yixiang Tian, Xu An Wang, Xuguang Wu:
RBF Model Based on the KECDBN. 3PGCIC 2017: 199-205 - [c5]Xuguang Wu, Yiliang Han, Minqing Zhang, Shuaishuai Zhu:
Parallel Long Messages Encryption Scheme Based on Certificateless Cryptosystem for Big Data. Inscrypt 2017: 211-222 - 2016
- [c4]Xuguang Wu, Minqing Zhang, Shuaishuai Zhu:
Certificateless Multi-signcryption Scheme in Standard Model. INCoS 2016: 475-479 - 2015
- [c3]Wenping Deng, Xuguang Wu:
Parallel Proxy-Signcryption Scheme in Cloud Environment. INCoS 2015: 402-406 - 2013
- [c2]Shuaishuai Zhu, Xiaoyuan Yang, Xuguang Wu:
Secure Cloud File System with Attribute Based Encryption. INCoS 2013: 99-102 - 2012
- [j3]Xu An Wang, Xinyi Huang, Xiaoyuan Yang, Longfei Liu, Xuguang Wu:
Further observation on proxy re-encryption with keyword search. J. Syst. Softw. 85(3): 643-654 (2012) - 2011
- [j2]Yun Niu, Xuguang Wu, Junhong He, Liang Hong:
Integrated Synthesis of Control and Bandwidth Scheduling on Networked Control Systems. Comput. Inf. Sci. 4(3): 169-180 (2011) - [j1]Yiliang Han, Xiaolin Gui, Xuguang Wu, Xiaoyuan Yang:
Proxy encryption based secure multicast in wireless mesh networks. J. Netw. Comput. Appl. 34(2): 469-477 (2011)
2000 – 2009
- 2001
- [c1]Nan Tang, Xiangyang Mu, Lin Li, Xuguang Wu:
Robust controller design on uncertain system. SMC 2001: 1888-1891
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:03 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint