default search action
Yixian Yang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j261]Jie Hao, Shu-Tao Xia, Kenneth W. Shum, Bin Chen, Fang-Wei Fu, Yixian Yang:
Optimal ternary locally repairable codes. Des. Codes Cryptogr. 92(9): 2685-2704 (2024) - [j260]Bichen Che, Shuntian Zheng, Zhao Dou, Xiubo Chen, Lixiang Li, Jian Li, Yixian Yang:
Controlled node dialogue in IoT networks based on nonlocal orthogonal product states. J. Opt. Commun. Netw. 16(3): 317-327 (2024) - [j259]Haihua Zhu, Xiubo Chen, Yixian Yang:
A blind watermarking scheme for TMQIR images. Multim. Tools Appl. 83(8): 23109-23127 (2024) - [j258]Yeqing Ren, Haipeng Peng, Lixiang Li, Yixian Yang:
Lightweight Voice Spoofing Detection Using Improved One-Class Learning and Knowledge Distillation. IEEE Trans. Multim. 26: 4360-4374 (2024) - 2023
- [j257]Xin Li, Yang Xin, Hongliang Zhu, Yixian Yang, Yuling Chen:
Cross-domain vulnerability detection using graph embedding and domain adaptation. Comput. Secur. 125: 103017 (2023) - [j256]Yeqing Ren, Haipeng Peng, Lixiang Li, Xiaopeng Xue, Yang Lan, Yixian Yang:
A voice spoofing detection framework for IoT systems with feature pyramid and online knowledge distillation. J. Syst. Archit. 143: 102981 (2023) - [j255]Li-Yun Zhao, Xiu-Bo Chen, Gang Xu, Jing-Wen Zhang, Yi-Xian Yang:
Fault-tolerant error correction for quantum Hamming codes with only two ancillary qudits. Quantum Inf. Process. 22(1): 70 (2023) - [j254]Bichen Che, Yitong Zhang, Zhao Dou, Xiubo Chen, Jian Li, Yixian Yang:
Multi-party quantum private information comparison based on nonlocal orthogonal product states. Quantum Inf. Process. 22(6): 231 (2023) - [j253]Yeqing Ren, Haipeng Peng, Lixiang Li, Xiaopeng Xue, Yang Lan, Yixian Yang:
Generalized Voice Spoofing Detection via Integral Knowledge Amalgamation. IEEE ACM Trans. Audio Speech Lang. Process. 31: 2461-2475 (2023) - [j252]Qinlong Huang, Guanyu Yan, Yixian Yang:
Privacy-Preserving Traceable Attribute-Based Keyword Search in Multi-Authority Medical Cloud. IEEE Trans. Cloud Comput. 11(1): 678-691 (2023) - [j251]Qinlong Huang, Qinglin Wei, Guanyu Yan, Lin Zou, Yixian Yang:
Fast and Privacy-Preserving Attribute-Based Keyword Search in Cloud Document Services. IEEE Trans. Serv. Comput. 16(5): 3348-3360 (2023) - [j250]Yanzhao Tian, Lixiang Li, Haipeng Peng, Ding Wang, Yixian Yang:
Honeywords Generation Mechanism Based on Zero-Divisor Graph Sequences. IEEE Trans. Serv. Comput. 16(6): 4567-4579 (2023) - 2022
- [j249]Junying Liang, Haipeng Peng, Lixiang Li, Fenghua Tong, Yixian Yang:
Flexible construction of measurement matrices in compressed sensing based on extensions of incidence matrices of combinatorial designs. Appl. Math. Comput. 420: 126901 (2022) - [j248]Haibo Hong, Jun Shao, Licheng Wang, Mande Xie, Guiyi Wei, Yixian Yang, Song Han, Jianhong Lin:
A CCA secure public key encryption scheme based on finite groups of Lie type. Sci. China Inf. Sci. 65(1) (2022) - [j247]Yuling Chen, Jing Sun, Yixian Yang, Tao Li, Xinxin Niu, Huiyu Zhou:
PSSPR: A source location privacy protection scheme based on sector phantom routing in WSNs. Int. J. Intell. Syst. 37(2): 1204-1221 (2022) - [j246]Tao Li, Zhaojie Wang, Yuling Chen, Chunmei Li, Yanling Jia, Yixian Yang:
Is semi-selfish mining available without being detected? Int. J. Intell. Syst. 37(12): 10576-10597 (2022) - [j245]Hui Dou, Yuling Chen, Yixian Yang, Yangyang Long:
A secure and efficient privacy-preserving data aggregation algorithm. J. Ambient Intell. Humaniz. Comput. 13(3): 1495-1503 (2022) - [j244]Manxiang Yang, Baopeng Ye, Yuling Chen, Tao Li, Yixian Yang, Xiaobin Qian, Xiaomei Yu:
A trusted de-swinging k-anonymity scheme for location privacy protection. J. Cloud Comput. 11: 2 (2022) - [j243]Yun Luo, Yuling Chen, Tao Li, Yilei Wang, Yixian Yang, Xiaomei Yu:
An Entropy-View Secure Multiparty Computation Protocol Based on Semi-Honest Model. J. Organ. End User Comput. 34(10): 1-17 (2022) - [j242]Yi-Ru Sun, Xiu-Bo Chen, Jun Shao, Song Han, Haibo Hong, Haiyong Bao, Yixian Yang:
Cyclic preparation of two-qubit state in two noisy environments. Quantum Inf. Process. 21(1): 40 (2022) - [j241]Liyun Zhao, Xiubo Chen, Gang Xu, Yixian Yang:
Hat problem: a new strategy based on quantum stabilizer codes. Quantum Inf. Process. 21(3): 113 (2022) - [j240]Li Gong, Xiu-Bo Chen, Gang Xu, Yan Chang, Yi-Xian Yang:
Multi-party controlled cyclic hybrid quantum communication protocol in noisy environment. Quantum Inf. Process. 21(11): 375 (2022) - [j239]Qinlong Huang, Wei Yue, Yixian Yang, Lixuan Chen:
P2GT: Fine-Grained Genomic Data Access Control With Privacy-Preserving Testing in Cloud Computing. IEEE ACM Trans. Comput. Biol. Bioinform. 19(4): 2385-2398 (2022) - [j238]Xiangjian Zuo, Lixiang Li, Haipeng Peng, Shoushan Luo, Yixian Yang:
Privacy-Preserving Subgraph Matching Scheme With Authentication in Social Networks. IEEE Trans. Cloud Comput. 10(3): 2038-2049 (2022) - [j237]Jie Hao, Jun Zhang, Shu-Tao Xia, Fang-Wei Fu, Yixian Yang:
Constructions and Weight Distributions of Optimal Locally Repairable Codes. IEEE Trans. Commun. 70(5): 2895-2908 (2022) - [j236]Qinlong Huang, Jiabao Du, Guanyu Yan, Yixian Yang, Qinglin Wei:
Privacy-Preserving Spatio-Temporal Keyword Search for Outsourced Location-Based Services. IEEE Trans. Serv. Comput. 15(6): 3443-3456 (2022) - 2021
- [j235]Jiansheng Zhang, Yang Xin, Yulong Gao, Xiaohui Lei, Yixian Yang:
Secure ABE Scheme for Access Management in Blockchain-Based IoT. IEEE Access 9: 54840-54849 (2021) - [j234]Yanzhao Tian, Lixiang Li, Haipeng Peng, Yixian Yang:
Achieving flatness: Graph labeling can generate graphical honeywords. Comput. Secur. 104: 102212 (2021) - [j233]Xiangjian Zuo, Lixiang Li, Shoushan Luo, Haipeng Peng, Yixian Yang, Linming Gong:
Privacy-Preserving Verifiable Graph Intersection Scheme With Cryptographic Accumulators in Social Networks. IEEE Internet Things J. 8(6): 4590-4603 (2021) - [j232]Lixiang Li, Yixin Chen, Haipeng Peng, Yixian Yang:
Chaotic Deep Network for Mobile D2D Communication. IEEE Internet Things J. 8(10): 8078-8096 (2021) - [j231]Lunzhi Deng, Yixian Yang, Ronghai Gao:
Certificateless Designated Verifier Anonymous Aggregate Signature Scheme for Healthcare Wireless Sensor Networks. IEEE Internet Things J. 8(11): 8897-8909 (2021) - [j230]Zhongkai Dang, Lixiang Li, Wei Ni, Ren Ping Liu, Haipeng Peng, Yixian Yang:
How does rumor spreading affect people inside and outside an institution. Inf. Sci. 574: 377-393 (2021) - [j229]Jianwen Hu, Yuling Chen, Xiaojun Ren, Yixian Yang, Xiaobin Qian, Xiaomei Yu:
Blockchain-Enhanced Fair and Efficient Energy Trading in Industrial Internet of Things. Mob. Inf. Syst. 2021: 7397926:1-7397926:13 (2021) - [j228]Xing-Bo Pan, Gang Xu, Zongpeng Li, Xiu-Bo Chen, Yi-Xian Yang:
Quantum network coding without loss of information. Quantum Inf. Process. 20(2): 65 (2021) - [j227]Haihua Zhu, Xiu-Bo Chen, Yi-Xian Yang:
A multimode quantum image representation and its encryption scheme. Quantum Inf. Process. 20(9): 315 (2021) - [j226]Mingzhen Li, Yunfeng Wang, Yang Xin, Hongliang Zhu, Qifeng Tang, Yuling Chen, Yixian Yang, Guangcan Yang:
Cross-Platform Strong Privacy Protection Mechanism for Review Publication. Secur. Commun. Networks 2021: 5556155:1-5556155:22 (2021) - [j225]Tao Li, Yuling Chen, Yanli Wang, Yilei Wang, Minghao Zhao, Haojia Zhu, Youliang Tian, Xiaomei Yu, Yixian Yang:
Corrigendum to "Rational Protocols and Attacks in Blockchain System". Secur. Commun. Networks 2021: 9856969:1-9856969:2 (2021) - [j224]Fenghua Tong, Lixiang Li, Haipeng Peng, Yixian Yang:
Flexible construction of compressed sensing matrices with low storage space and low coherence. Signal Process. 182: 107951 (2021) - [j223]Xiangjian Zuo, Lixiang Li, Haipeng Peng, Shoushan Luo, Yixian Yang:
Privacy-Preserving Multidimensional Data Aggregation Scheme Without Trusted Authority in Smart Grid. IEEE Syst. J. 15(1): 395-406 (2021) - [j222]Qinlong Huang, Yixian Yang, Wei Yue, Yue He:
Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in Cloud Computing. IEEE Trans. Cloud Comput. 9(4): 1607-1618 (2021) - [j221]Fenghua Tong, Lixiang Li, Haipeng Peng, Yixian Yang:
Deterministic Constructions of Compressed Sensing Matrices From Unitary Geometry. IEEE Trans. Inf. Theory 67(8): 5548-5561 (2021) - [j220]Qinlong Huang, Zhicheng Zhang, Yixian Yang:
Privacy-Preserving Media Sharing with Scalable Access Control and Secure Deduplication in Mobile Cloud Computing. IEEE Trans. Mob. Comput. 20(5): 1951-1964 (2021) - [j219]Qinlong Huang, Yixian Yang, Jingyi Fu:
Secure Data Group Sharing and Dissemination with Attribute and Time Conditions in Public Cloud. IEEE Trans. Serv. Comput. 14(4): 1013-1025 (2021) - [c76]Ping Guo, Baopeng Ye, Yuling Chen, Tao Li, Yixian Yang, Xiaobin Qian:
A location data protection protocol based on differential privacy. DASC/PiCom/CBDCom/CyberSciTech 2021: 306-311 - [c75]Yun Luo, Yuling Chen, Tao Li, Yilei Wang, Yixian Yang:
Using information entropy to analyze secure multi-party computation protocol. DASC/PiCom/CBDCom/CyberSciTech 2021: 312-318 - [c74]Jianwen Hu, Yuling Chen, Xiaoiun Ren, Yixian Yang, Xiaobin Qian:
ABlockchain-enabled Efficient and Fair Energy Trading Schemes in Industrial Internet of Things. DASC/PiCom/CBDCom/CyberSciTech 2021: 319-325 - [c73]Manxiang Yang, Baopeng Ye, Yuling Chen, Tao Li, Yixian Yang, Xiaobin Qian:
A De-swinging Scheme in Location Privacy Protection via Smart Contract. DASC/PiCom/CBDCom/CyberSciTech 2021: 326-333 - [c72]Jing Sun, Yuling Chen, Tao Li, Jia Liu, Yixian Yang:
PSSPR: A Source Location Privacy Protection Scheme Based on Sector Phantom Routing in WSNs. DASC/PiCom/CBDCom/CyberSciTech 2021: 334-340 - [c71]Yixiao Li, Lixiang Li, Zirui Zhuang, Yuan Fang, Yixian Yang:
ResNet Approach for Coding Unit Fast Splitting Decision of HEVC Intra Coding. DSC 2021: 130-135 - [c70]Yixian Yang, Li Guo, Xialin Li, Jiaxin Li, Wei Liu, Huihui He:
A Data-Driven Detection strategy of False Data in Cooperative DC Microgrids. IECON 2021: 1-6 - [c69]Jie Hao, Kenneth W. Shum, Shu-Tao Xia, Fang-Wei Fu, Yixian Yang:
On Optimal Quaternary Locally Repairable Codes. ISIT 2021: 3267-3272 - [i16]Yuling Chen, Jing Sun, Yixian Yang, Tao Li, Xinxin Niu, Huiyu Zhou:
PSSPR: A Source Location Privacy Protection Scheme Based on Sector Phantom Routing in WSNs. CoRR abs/2109.13774 (2021) - 2020
- [j218]Baolin Qiu, Lixiang Li, Haipeng Peng, Yixian Yang, Chuan Chen:
Intermittent Pinning Synchronization of Memristor-Based Switching Networks With Multi-Links and Mixed Delays. IEEE Access 8: 7103-7116 (2020) - [j217]Yanqing Yang, Kangfeng Zheng, Bin Wu, Yixian Yang, Xiujuan Wang:
Network Intrusion Detection Based on Supervised Adversarial Variational Auto-Encoder With Regularization. IEEE Access 8: 42169-42184 (2020) - [j216]Xuefeng Li, Yang Xin, Chensu Zhao, Yixian Yang, Shoushan Luo, Yuling Chen:
Using User Behavior to Measure Privacy on Online Social Networks. IEEE Access 8: 108387-108401 (2020) - [j215]Shaofang Wang, Lixiang Li, Haipeng Peng, Yixian Yang, Mingwen Zheng:
Finite-Time Synchronization of Multi-Linked Memristor-Based Neural Networks With Mixed Time-Varying Delays. IEEE Access 8: 169966-169981 (2020) - [j214]Fenghua Tong, Lixiang Li, Haipeng Peng, Yixian Yang:
An effective algorithm for the spark of sparse binary measurement matrices. Appl. Math. Comput. 371 (2020) - [j213]Wei Tang, Yu-Jun Liu, Yu-Ling Chen, Yi-Xian Yang, Xinxin Niu:
SLBRS: Network Virus Propagation Model based on Safety Entropy. Appl. Soft Comput. 97(Part): 106784 (2020) - [j212]Haipeng Peng, Bo Yang, Lixiang Li, Yixian Yang:
Secure and Traceable Image Transmission Scheme Based on Semitensor Product Compressed Sensing in Telemedicine System. IEEE Internet Things J. 7(3): 2432-2451 (2020) - [j211]Yanping Shen, Kangfeng Zheng, Chunhua Wu, Yixian Yang:
A Nature-inspired Multiple Kernel Extreme Learning Machine Model for Intrusion Detection. KSII Trans. Internet Inf. Syst. 14(2): 702-723 (2020) - [j210]Chuan Chen, Lixiang Li, Haipeng Peng, Yixian Yang, Ling Mi, Hui Zhao:
A new fixed-time stability theorem and its application to the fixed-time synchronization of neural networks. Neural Networks 123: 412-419 (2020) - [j209]Zhao Dou, Gang Xu, Xiu-Bo Chen, Xinxin Niu, Yi-Xian Yang, Yu Yang:
Searching for optimal quantum secret sharing scheme based on local distinguishability. Quantum Inf. Process. 19(10): 368 (2020) - [j208]Yulong Gao, Xiu-Bo Chen, Gang Xu, Kaiguo Yuan, Wen Liu, Yi-Xian Yang:
A novel quantum blockchain scheme base on quantum entanglement and DPoS. Quantum Inf. Process. 19(12): 420 (2020) - [j207]Tao Li, Yuling Chen, Yanli Wang, Yilei Wang, Minghao Zhao, Haojia Zhu, Youliang Tian, Xiaomei Yu, Yixian Yang:
Rational Protocols and Attacks in Blockchain System. Secur. Commun. Networks 2020: 8839047:1-8839047:11 (2020) - [j206]Yuan Fang, Lixiang Li, Yixiao Li, Haipeng Peng, Yixian Yang:
Low Energy Consumption Compressed Spectrum Sensing Based on Channel Energy Reconstruction in Cognitive Radio Network. Sensors 20(5): 1264 (2020) - [j205]Yi-Feng Wang, Bo Chen, Yuqi Hou, Zhun Meng, Yixian Yang:
Analysis and Design of a 1-MHz Bidirectional Multi-CLLC Resonant DC-DC Converter With GaN Devices. IEEE Trans. Ind. Electron. 67(2): 1425-1434 (2020) - [j204]Jie Hao, Shu-Tao Xia, Kenneth W. Shum, Bin Chen, Fang-Wei Fu, Yixian Yang:
Bounds and Constructions of Locally Repairable Codes: Parity-Check Matrix Approach. IEEE Trans. Inf. Theory 66(12): 7465-7474 (2020) - [j203]Lixiang Li, Guoqian Wen, Zeming Wang, Yixian Yang:
Efficient and Secure Image Communication System Based on Compressed Sensing for IoT Monitoring Applications. IEEE Trans. Multim. 22(1): 82-95 (2020) - [c68]Lixiang Li, Jin Yan, Haipeng Peng, Yixian Yang:
An Improved Consensus Mechanism for the Blockchain Based on Credit Rewards and Punishments. ICBCT 2020: 105-109 - [c67]Zixiao Xu, Qin-yun Dai, Gang Xu, He Huang, Xiu-Bo Chen, Yi-Xian Yang:
IoT Device Recognition Framework Based on Network Protocol Keyword Query. ICAIS (1) 2020: 219-231 - [c66]Jie Hao, Jun Zhang, Shu-Tao Xia, Fang-Wei Fu, Yi-Xian Yang:
Weight Distributions of q-ary Optimal Locally Repairable Codes with Locality 2, Distance 5 and Even Dimension. ISIT 2020: 611-615
2010 – 2019
- 2019
- [j202]Yi-Ru Sun, Gang Xu, Xiu-Bo Chen, Yu Yang, Yi-Xian Yang:
Asymmetric Controlled Bidirectional Remote Preparation of Single- and Three-Qubit Equatorial State in Noisy Environment. IEEE Access 7: 2811-2822 (2019) - [j201]Xiu-Bo Chen, Ya-Lan Wang, Gang Xu, Yi-Xian Yang:
Quantum Network Communication With a Novel Discrete-Time Quantum Walk. IEEE Access 7: 13634-13642 (2019) - [j200]Licheng Wang, Yanmei Tian, Yun Pan, Yixian Yang:
New Construction of Blind Signatures From Braid Groups. IEEE Access 7: 36549-36557 (2019) - [j199]Zigang Chen, Lixiang Li, Haipeng Peng, Yuhong Liu, Haihua Zhu, Yixian Yang:
Sparse General Non-Negative Matrix Factorization Based on Left Semi-Tensor Product. IEEE Access 7: 81599-81611 (2019) - [j198]Lunzhi Deng, Yixian Yang, Yuling Chen:
Certificateless Short Aggregate Signature Scheme for Mobile Devices. IEEE Access 7: 87162-87168 (2019) - [j197]Jianchao Bian, Shoushan Luo, Zhengwen Li, Yixian Yang:
Optimal Weakly Secure Minimum Storage Regenerating Codes Scheme. IEEE Access 7: 151120-151130 (2019) - [j196]Yunfeng Wang, Mingzhen Li, Shoushan Luo, Yang Xin, Hongliang Zhu, Yuling Chen, Guangcan Yang, Yixian Yang:
LRM: A Location Recombination Mechanism for Achieving Trajectory k-Anonymity Privacy Protection. IEEE Access 7: 182886-182905 (2019) - [j195]Zhen-Zhen Li, Gang Xu, Xiu-Bo Chen, Zhiguo Qu, Xinxin Niu, Yi-Xian Yang:
Efficient quantum state transmission via perfect quantum network coding. Sci. China Inf. Sci. 62(1): 12501:1-12501:14 (2019) - [j194]Haihua Zhu, Xiu-Bo Chen, Yi-Xian Yang:
A quantum image dual-scrambling encryption scheme based on random permutation. Sci. China Inf. Sci. 62(12): 229501 (2019) - [j193]Haibo Hong, Licheng Wang, Jun Shao, Jianhua Yan, Haseeb Ahmad, Guiyi Wei, Mande Xie, Yixian Yang:
A Miniature CCA Public Key Encryption Scheme Based on Non-abelian Factorization Problem in Finite Groups of Lie Type. Comput. J. 62(12): 1840-1848 (2019) - [j192]Xiaoning Zhu, Qingyue Meng, Bojian Ding, Lize Gu, Yixian Yang:
Weighted pooling for image recognition of deep convolutional neural networks. Clust. Comput. 22(Supplement): 9371-9383 (2019) - [j191]Mingwen Zheng, Lixiang Li, Haipeng Peng, Jinghua Xiao, Yixian Yang, Yanping Zhang, Hui Zhao:
General decay synchronization of complex multi-links time-varying dynamic network. Commun. Nonlinear Sci. Numer. Simul. 67: 108-123 (2019) - [j190]Yi-Xian Yang, Kung-Jui Pai, Ruay-Shiung Chang, Jou-Ming Chang:
Constructing Two Completely Independent Spanning Trees in Balanced Hypercubes. IEICE Trans. Inf. Syst. 102-D(12): 2409-2412 (2019) - [j189]Chuan Chen, Lixiang Li, Haipeng Peng, Yixian Yang, Ling Mi, Lianhai Wang:
A new fixed-time stability theorem and its application to the synchronization control of memristive neural networks. Neurocomputing 349: 290-300 (2019) - [j188]Lixiang Li, Lifei Liu, Haipeng Peng, Yixian Yang, Shizhuo Cheng:
Flexible and Secure Data Transmission System Based on Semitensor Compressive Sensing in Wireless Body Area Networks. IEEE Internet Things J. 6(2): 3212-3227 (2019) - [j187]Haipeng Peng, Yaqi Mi, Lixiang Li, Harry Eugene Stanley, Yixian Yang:
P-Tensor Product in Compressed Sensing. IEEE Internet Things J. 6(2): 3492-3511 (2019) - [j186]Xiu-Bo Chen, Yi-Ru Sun, Gang Xu, Yi-Xian Yang:
Quantum homomorphic encryption scheme with flexible number of evaluator based on (k, n)-threshold quantum state sharing. Inf. Sci. 501: 172-181 (2019) - [j185]Jianchao Bian, Shoushan Luo, Wei Li, Yaxing Zha, Yixian Yang:
IR-RBT Codes: A New Scheme of Regenerating Codes for Tolerating Node and Intra-node Failures in Distributed Storage Systems. KSII Trans. Internet Inf. Syst. 13(10): 5058-5077 (2019) - [j184]Licheng Wang, Xiaoying Shen, Jing Li, Jun Shao, Yixian Yang:
Cryptographic primitives in blockchains. J. Netw. Comput. Appl. 127: 43-58 (2019) - [j183]Baolin Qiu, Lixiang Li, Haipeng Peng, Yixian Yang:
Asymptotic and finite-time synchronization of memristor-based switching networks with multi-links and impulsive perturbation. Neural Comput. Appl. 31(8): 4031-4047 (2019) - [j182]Chuan Chen, Lixiang Li, Haipeng Peng, Yixian Yang:
Fixed-time synchronization of inertial memristor-based neural networks with discrete delay. Neural Networks 109: 81-89 (2019) - [j181]Zhen-Zhen Li, Gang Xu, Xiu-Bo Chen, Yi-Xian Yang:
Secure quantum network coding based on quantum homomorphic message authentication. Quantum Inf. Process. 18(1): 14 (2019) - [j180]Yi-Ru Sun, Nan Xiang, Zhao Dou, Gang Xu, Xiu-Bo Chen, Yi-Xian Yang:
A universal protocol for controlled bidirectional quantum state transmission. Quantum Inf. Process. 18(9): 281 (2019) - [j179]Yanping Shen, Kangfeng Zheng, Chunhua Wu, Yixian Yang:
A Neighbor Prototype Selection Method Based on CCHPSO for Intrusion Detection. Secur. Commun. Networks 2019: 1283495:1-1283495:9 (2019) - [j178]Yanqing Yang, Kangfeng Zheng, Chunhua Wu, Yixian Yang:
Improving the Classification Effectiveness of Intrusion Detection by Using Improved Conditional Variational AutoEncoder and Deep Neural Network. Sensors 19(11): 2528 (2019) - [j177]Yanrong Lu, Guangquan Xu, Lixiang Li, Yixian Yang:
Robust Privacy-Preserving Mutual Authenticated Key Agreement Scheme in Roaming Service for Global Mobility Networks. IEEE Syst. J. 13(2): 1454-1465 (2019) - [j176]Yanrong Lu, Guangquan Xu, Lixiang Li, Yixian Yang:
Anonymous three-factor authenticated key agreement for wireless sensor networks. Wirel. Networks 25(4): 1461-1475 (2019) - [c65]Qinlong Huang, Nan Li, Zhicheng Zhang, Yixian Yang:
Secure and Privacy-Preserving Warning Message Dissemination in Cloud-Assisted Internet of Vehicles. CNS 2019: 1-8 - [c64]Jie Hao, Kenneth W. Shum, Shu-Tao Xia, Yi-Xian Yang:
Classification of Optimal Ternary (r, δ)-Locally Repairable Codes Attaining the Singleton-like Bound. ISIT 2019: 2828-2832 - 2018
- [j175]Mingwen Zheng, Lixiang Li, Haipeng Peng, Jinghua Xiao, Yixian Yang, Yanping Zhang:
Fixed-Time Synchronization of Memristive Fuzzy BAM Cellular Neural Networks With Time-Varying Delays Based on Feedback Controllers. IEEE Access 6: 12085-12102 (2018) - [j174]Qinlong Huang, Yixian Yang, Licheng Wang:
Correction to "Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things". IEEE Access 6: 17245 (2018) - [j173]Yulong Gao, Xiu-Bo Chen, Yu-Ling Chen, Ying Sun, Xinxin Niu, Yi-Xian Yang:
A Secure Cryptocurrency Scheme Based on Post-Quantum Blockchain. IEEE Access 6: 27205-27213 (2018) - [j172]Qinlong Huang, Wei Yue, Yue He, Yixian Yang:
Secure Identity-Based Data Sharing and Profile Matching for Mobile Healthcare Social Networks in Cloud Computing. IEEE Access 6: 36584-36594 (2018) - [j171]Chuan Chen, Lixiang Li, Haipeng Peng, Yixian Yang:
Adaptive Lag Synchronization of Memristive Neural Networks With Mixed Delays. IEEE Access 6: 40768-40777 (2018) - [j170]Chuan Chen, Lixiang Li, Haipeng Peng, Yixian Yang:
Adaptive synchronization of memristor-based BAM neural networks with mixed delays. Appl. Math. Comput. 322: 100-110 (2018) - [j169]Hai-yang Ding, Yixian Yang:
Data hiding in color halftone images based on new conjugate property. Comput. Electr. Eng. 70: 302-316 (2018) - [j168]Zhao Dou, Gang Xu, Xiu-Bo Chen, Xin Liu, Yi-Xian Yang:
A secure rational quantum state sharing protocol. Sci. China Inf. Sci. 61(2): 022501:1-022501:12 (2018) - [j167]Yanping Shen, Kangfeng Zheng, Chunhua Wu, Mingwu Zhang, Xinxin Niu, Yixian Yang:
An Ensemble Method based on Selection Using Bat Algorithm for Intrusion Detection. Comput. J. 61(4): 526-538 (2018) - [j166]Haseeb Ahmad, Ali Daud, Licheng Wang, Ibrar Ahmad, Muhammad Hafeez, Yixian Yang:
Quantifying team precedence in the game of cricket. Clust. Comput. 21(1): 523-537 (2018) - [j165]Licheng Wang, Zonghua Zhang, Mianxiong Dong, Lihua Wang, Zhenfu Cao, Yixian Yang:
Securing Named Data Networking: Attribute-Based Encryption and Beyond. IEEE Commun. Mag. 56(11): 76-81 (2018) - [j164]Mingwen Zheng, Lixiang Li, Haipeng Peng, Jinghua Xiao, Yixian Yang, Yanping Zhang, Hui Zhao:
Finite-time stability and synchronization of memristor-based fractional-order fuzzy cellular neural networks. Commun. Nonlinear Sci. Numer. Simul. 59: 272-291 (2018) - [j163]Yonggang Chen, Lixiang Li, Jinghua Xiao, Yixian Yang, Jun Liang, Tao Li:
Particle swarm optimizer with crossover operation. Eng. Appl. Artif. Intell. 70: 159-169 (2018) - [j162]Xiaoning Zhu, Bojian Ding, Wenjun Li, Lize Gu, Yixian Yang:
On development of security monitoring system via wireless sensing network. EURASIP J. Wirel. Commun. Netw. 2018: 221 (2018) - [j161]Haseeb Ahmad, Licheng Wang, Haibo Hong, Jing Li, Hassan Dawood, Manzoor Ahmed, Yixian Yang:
Primitives towards verifiable computation: a survey. Frontiers Comput. Sci. 12(3): 451-478 (2018) - [j160]Qinlong Huang, Yixian Yang, Jingyi Fu:
PRECISE: Identity-based private data sharing with conditional proxy re-encryption in online social networks. Future Gener. Comput. Syst. 86: 1523-1533 (2018) - [j159]Qinlong Huang, Yixian Yang, Mansuo Shen:
Corrigendum to "Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing" [Future Gener. Comput. Syst. 72 (2017) 239-249]. Future Gener. Comput. Syst. 86: 1534 (2018) - [j158]Lunzhi Deng, Yixian Yang, Ronghai Gao, Yuling Chen:
Certificateless short signature scheme from pairing in the standard model. Int. J. Commun. Syst. 31(17) (2018) - [j157]Zigang Chen, Lixiang Li, Haipeng Peng, Yuhong Liu, Yixian Yang:
Incremental general non-negative matrix factorization without dimension matching constraints. Neurocomputing 311: 344-352 (2018) - [j156]Mingwen Zheng, Lixiang Li, Haipeng Peng, Jinghua Xiao, Yixian Yang, Yanping Zhang, Hui Zhao:
Fixed-time synchronization of memristor-based fuzzy cellular neural network with time-varying delay. J. Frankl. Inst. 355(14): 6780-6809 (2018) - [j155]Mingwen Zheng, Lixiang Li, Haipeng Peng, Jinghua Xiao, Yixian Yang, Hui Zhao:
Parameters estimation and synchronization of uncertain coupling recurrent dynamical neural networks with time-varying delays based on adaptive control. Neural Comput. Appl. 30(7): 2217-2227 (2018) - [j154]Yixian Yang, Xinxin Niu, Lixiang Li, Haipeng Peng:
A Secure and Efficient Transmission Method in Connected Vehicular Cloud Computing. IEEE Netw. 32(3): 14-19 (2018) - [j153]Hui Zhao, Lixiang Li, Haipeng Peng, Jürgen Kurths, Jinghua Xiao, Yixian Yang:
Finite-Time Robust Synchronization of Memrisive Neural Network with Perturbation. Neural Process. Lett. 47(2): 509-533 (2018) - [j152]Chuan Chen, Lixiang Li, Haipeng Peng, Yixian Yang, Tao Li:
Synchronization Control of Coupled Memristor-Based Neural Networks with Mixed Delays and Stochastic Perturbations. Neural Process. Lett. 47(2): 679-696 (2018) - [j151]Baolin Qiu, Lixiang Li, Haipeng Peng, Yixian Yang:
Synchronization of Multi-links Memristor-Based Switching Networks Under Uniform Random Attacks. Neural Process. Lett. 48(3): 1431-1458 (2018) - [j150]Yixian Yang, Xinxin Niu, Lixiang Li, Haipeng Peng, Jingfeng Ren, Haochun Qi:
General Theory of security and a study of hacker's behavior in big data era. Peer-to-Peer Netw. Appl. 11(2): 210-219 (2018) - [j149]Zhao Dou, Gang Xu, Xiu-Bo Chen, Xinxin Niu, Yi-Xian Yang:
Rational protocol of quantum secure multi-party computation. Quantum Inf. Process. 17(8): 199 (2018) - [j148]Xiu-Bo Chen, Xin Tang, Gang Xu, Zhao Dou, Yu-Ling Chen, Yi-Xian Yang:
Cryptanalysis of secret sharing with a single d-level quantum system. Quantum Inf. Process. 17(9): 225 (2018) - [j147]Jia-Min Qi, Gang Xu, Xiu-Bo Chen, Tian-Yin Wang, Xiao-Qiu Cai, Yi-Xian Yang:
Two authenticated quantum dialogue protocols based on three-particle entangled states. Quantum Inf. Process. 17(9): 247 (2018) - [j146]Qinlong Huang, Yue He, Wei Yue, Yixian Yang:
Adaptive Secure Cross-Cloud Data Collaboration with Identity-Based Cryptography and Conditional Proxy Re-Encryption. Secur. Commun. Networks 2018: 8932325:1-8932325:12 (2018) - [j145]Qinlong Huang, Yixian Yang, Yuxiang Shi:
SmartVeh: Secure and Efficient Message Access Control and Authentication for Vehicular Cloud Computing. Sensors 18(2): 666 (2018) - [j144]Xiaoning Zhu, Bojian Ding, Qingyue Meng, Lize Gu, Yixian Yang:
Statistic Experience Based Adaptive One-Shot Detector (EAO) for Camera Sensing System. Sensors 18(9): 3041 (2018) - [j143]Zigang Chen, Lixiang Li, Haipeng Peng, Yuhong Liu, Yixian Yang:
A Novel Digital Watermarking Based on General Non-Negative Matrix Factorization. IEEE Trans. Multim. 20(8): 1973-1986 (2018) - [j142]Qinlong Huang, Licheng Wang, Yixian Yang:
DECENT: Secure and fine-grained data access control with policy updating for constrained IoT devices. World Wide Web 21(1): 151-167 (2018) - [c63]Zhen Yue, Zichen Li, Peifei Song, Shumei Zhang, Yixian Yang:
A high-Capacity Watermarking Algorithm Using two Bins Histogram Modification. COMPSAC (2) 2018: 382-387 - [c62]Qinlong Huang, Nan Li, Yixian Yang:
DACSC: Dynamic and Fine-Grained Access Control for Secure Data Collaboration in Cloud Computing. GLOBECOM 2018: 1-7 - [c61]Yi-Ru Sun, Gang Xu, Xiu-Bo Chen, Yi-Xian Yang:
Controlled Bidirectional Remote Preparation of Single- and Two-Qubit State. ICCCS (3) 2018: 541-553 - [c60]Xin Tang, Gang Xu, Kun-Chang Li, Xiu-Bo Chen, Yi-Xian Yang:
Secure Multiparty Quantum Summation Based on d-Level Single Particles. ICCCS (3) 2018: 680-690 - [c59]Jie Hao, Yi-Xian Yang, Kenneth W. Shum, Shu-Tao Xia:
On the Maximal Code Length of Optimal Linear Locally Repairable Codes. ISIT 2018: 1326-1330 - [c58]Lixiang Li, Haipeng Peng, Liwei Liu, Yixian Yang:
An Efficient and Secure Transmission Model Based on Compressive Sensing. SocialSec 2018: 27-32 - [c57]Zigang Chen, Lixiang Li, Haipeng Peng, Yuhong Liu, Haihua Zhu, Yixian Yang:
An evaluation method of image scrambling degree based on pixel distribution. SocialSec 2018: 33-38 - 2017
- [j141]Haibo Hong, Licheng Wang, Haseeb Ahmad, Jun Shao, Yixian Yang:
Minimal logarithmic signatures for one type of classical groups. Appl. Algebra Eng. Commun. Comput. 28(2): 177-192 (2017) - [j140]Haseeb Ahmad, Ali Daud, Licheng Wang, Haibo Hong, Hussain Dawood, Yixian Yang:
Prediction of Rising Stars in the Game of Cricket. IEEE Access 5: 4104-4124 (2017) - [j139]Qinlong Huang, Yixian Yang, Licheng Wang:
Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things. IEEE Access 5: 12941-12950 (2017) - [j138]Yonggang Chen, Lixiang Li, Haipeng Peng, Jinghua Xiao, Yixian Yang, Yuhui Shi:
Particle swarm optimizer with two differential mutation. Appl. Soft Comput. 61: 314-330 (2017) - [j137]Haibo Hong, Licheng Wang, Haseeb Ahmad, Yixian Yang, Zhiguo Qu:
Minimum length key in MST cryptosystems. Sci. China Inf. Sci. 60(5): 052106:1-052106:11 (2017) - [j136]Qinlong Huang, Yixian Yang, Mansuo Shen:
Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing. Future Gener. Comput. Syst. 72: 239-249 (2017) - [j135]Yanping Xu, Chunhua Wu, Kangfeng Zheng, Xinxin Niu, Yixian Yang:
Fuzzy-synthetic minority oversampling technique: Oversampling based on fuzzy set theory for Android malware detection in imbalanced datasets. Int. J. Distributed Sens. Networks 13(4) (2017) - [j134]Hui Zhao, Lixiang Li, Haipeng Peng, Jinghua Xiao, Yixian Yang, Mingwen Zheng:
Finite-time topology identification and stochastic synchronization of complex network with multiple time delays. Neurocomputing 219: 39-49 (2017) - [j133]Chuan Chen, Lixiang Li, Haipeng Peng, Yixian Yang, Tao Li:
Finite-time synchronization of memristor-based neural networks with mixed delays. Neurocomputing 235: 83-89 (2017) - [j132]Mingwen Zheng, Lixiang Li, Haipeng Peng, Jinghua Xiao, Yixian Yang, Hui Zhao:
Finite-time stability analysis for neutral-type neural networks with hybrid time-varying delays without using Lyapunov method. Neurocomputing 238: 67-75 (2017) - [j131]Yixian Yang, Haipeng Peng, Lixiang Li, Xinxin Niu:
General Theory of Security and a Study Case in Internet of Things. IEEE Internet Things J. 4(2): 592-600 (2017) - [j130]Dong Xie, Haipeng Peng, Lixiang Li, Yixian Yang:
Homomorphic Signatures from Chameleon Hash Functions. Inf. Technol. Control. 46(2): 274-286 (2017) - [j129]Yixun Hu, Kangfeng Zheng, Xu Wang, Yixian Yang:
WORM-HUNTER: A Worm Guard System using Software-defined Networking. KSII Trans. Internet Inf. Syst. 11(1): 484-510 (2017) - [j128]Lunzhi Deng, Yixian Yang, Yuling Chen:
Certificateless multi-signer universal designated multi-verifier signature from elliptic curve group. KSII Trans. Internet Inf. Syst. 11(11): 5625-5641 (2017) - [j127]Yanrong Lu, Lixiang Li, Haipeng Peng, Yixian Yang:
An anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography. Multim. Tools Appl. 76(2): 1801-1815 (2017) - [j126]Chuan Chen, Lixiang Li, Haipeng Peng, Yixian Yang:
Fixed-time synchronization of memristor-based BAM neural networks with time-varying discrete delay. Neural Networks 96: 47-54 (2017) - [j125]Xiu-Bo Chen, Yi-Ru Sun, Gang Xu, Heng-Yue Jia, Zhiguo Qu, Yi-Xian Yang:
Controlled bidirectional remote preparation of three-qubit state. Quantum Inf. Process. 16(10): 244 (2017) - [j124]Yang Zhou, Wei Ni, Kangfeng Zheng, Ren Ping Liu, Yixian Yang:
Scalable Node-Centric Route Mutation for Defense of Large-Scale Software-Defined Networks. Secur. Commun. Networks 2017: 4651395:1-4651395:13 (2017) - [j123]Qinlong Huang, Licheng Wang, Yixian Yang:
Secure and Privacy-Preserving Data Sharing and Collaboration in Mobile Healthcare Social Networks of Smart Cities. Secur. Commun. Networks 2017: 6426495:1-6426495:12 (2017) - [j122]Haipeng Peng, Ye Tian, Jürgen Kurths, Lixiang Li, Yixian Yang, Daoshun Wang:
Secure and Energy-Efficient Data Transmission System Based on Chaotic Compressive Sensing in Body-to-Body Networks. IEEE Trans. Biomed. Circuits Syst. 11(3): 558-573 (2017) - [j121]Yanrong Lu, Lixiang Li, Haipeng Peng, Yixian Yang:
A Novel Smart Card Based User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks. Wirel. Pers. Commun. 96(1): 813-832 (2017) - [c56]Jing Zhang, Shoushan Luo, Yixian Yang:
Secure Multi-party Comparison Protocol and Application. ICPCSEE (1) 2017: 292-304 - [c55]Yang Zhou, Wei Ni, Kangfeng Zheng, Ren Ping Liu, Yixian Yang:
Node-centric route mutation for large-scale SDN based on 3D earth mover's distance model. ISCIT 2017: 1-6 - 2016
- [j120]Jing Li, Xiubo Chen, Xingming Sun, Zongpeng Li, Yixian Yang:
Quantum network coding for multi-unicast problem based on 2D and 3D cluster states. Sci. China Inf. Sci. 59(4): 042301:1-042301:15 (2016) - [j119]Min Xie, Wei Huang, Li Yang, Yixian Yang:
VOAuth: A solution to protect OAuth against phishing. Comput. Ind. 82: 151-159 (2016) - [j118]Dong Xie, Haipeng Peng, Lixiang Li, Yixian Yang:
Semi-tensor compressed sensing. Digit. Signal Process. 58: 85-92 (2016) - [j117]Haibo Hong, Licheng Wang, Haseeb Ahmad, Jing Li, Yixian Yang, Changzhong Wu:
Construction of DNA codes by using algebraic number theory. Finite Fields Their Appl. 37: 328-343 (2016) - [j116]Zhen-Zhen Li, Gang Xu, Xiu-Bo Chen, Xingming Sun, Yi-Xian Yang:
Multi-User Quantum Wireless Network Communication Based on Multi-Qubit GHZ State. IEEE Commun. Lett. 20(12): 2470-2473 (2016) - [j115]Yanrong Lu, Lixiang Li, Haipeng Peng, Yixian Yang:
An advanced elliptic curve cryptography based mutual authentication scheme for session initiation protocol. Inf. Technol. Control. 45(4): 393-400 (2016) - [j114]Yanrong Lu, Lixiang Li, Haipeng Peng, Yixian Yang:
Robust ID based mutual authentication and key agreement scheme preserving user anonymity in mobile networks. KSII Trans. Internet Inf. Syst. 10(3): 1273-1288 (2016) - [j113]Dong Xie, Haipeng Peng, Lixiang Li, Yixian Yang:
Efficient Post-Quantum Secure Network Coding Signatures in the Standard Model. KSII Trans. Internet Inf. Syst. 10(5): 2427-2445 (2016) - [j112]Weiping Wang, Lixiang Li, Haipeng Peng, Jürgen Kurths, Jinghua Xiao, Yixian Yang:
Finite-Time Anti-synchronization Control of Memristive Neural Networks With Stochastic Perturbations. Neural Process. Lett. 43(1): 49-63 (2016) - [j111]Weiping Wang, Lixiang Li, Haipeng Peng, Jürgen Kurths, Jinghua Xiao, Yixian Yang:
Anti-synchronization Control of Memristive Neural Networks with Multiple Proportional Delays. Neural Process. Lett. 43(1): 269-283 (2016) - [j110]Hui Zhao, Lixiang Li, Haipeng Peng, Jinghua Xiao, Yixian Yang:
Finite-Time Boundedness Analysis of Memristive Neural Network with Time-Varying Delay. Neural Process. Lett. 44(3): 665-679 (2016) - [j109]Yanrong Lu, Lixiang Li, Haipeng Peng, Yixian Yang:
A secure and efficient mutual authentication scheme for session initiation protocol. Peer-to-Peer Netw. Appl. 9(2): 449-459 (2016) - [j108]Yanrong Lu, Lixiang Li, Haipeng Peng, Yixian Yang:
Cryptanalysis and improvement of a chaotic maps-based anonymous authenticated key agreement protocol for multiserver architecture. Secur. Commun. Networks 9(11): 1321-1330 (2016) - [j107]Yanrong Lu, Lixiang Li, Haipeng Peng, Yixian Yang:
Robust anonymous two-factor authenticated key exchange scheme for mobile client-server environment. Secur. Commun. Networks 9(11): 1331-1339 (2016) - [j106]Dong Xie, Haipeng Peng, Lixiang Li, Yixian Yang:
Short lattice signatures with constant-size public keys. Secur. Commun. Networks 9(18): 5490-5501 (2016) - [j105]Yanrong Lu, Lixiang Li, Haipeng Peng, Yixian Yang:
An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks. Sensors 16(6): 837 (2016) - [i15]Haibo Hong, Jun Shao, Licheng Wang, Haseeb Ahmad, Yixian Yang:
Public Key Encryption in Non-Abelian Groups. CoRR abs/1605.06608 (2016) - 2015
- [j104]Haibo Hong, Licheng Wang, Yixian Yang:
Minimal logarithmic signatures for the unitary group Un(q). Des. Codes Cryptogr. 77(1): 179-191 (2015) - [j103]Jing Li, Xiu-Bo Chen, Gang Xu, Yixian Yang, Zongpeng Li:
Perfect Quantum Network Coding Independent of Classical Network Solutions. IEEE Commun. Lett. 19(2): 115-118 (2015) - [j102]Xue Lei, Wei Huang, Wenqing Fan, Yixian Yang:
Scaling Concolic Testing for the Environment-Intensive Program. IEICE Trans. Inf. Syst. 98-D(10): 1755-1764 (2015) - [j101]Yanrong Lu, Lixiang Li, Haipeng Peng, Xing Yang, Yixian Yang:
A Lightweight ID Based Authentication and Key Agreement Protocol for Multiserver Architecture. Int. J. Distributed Sens. Networks 11: 635890:1-635890:9 (2015) - [j100]Yanrong Lu, Lixiang Li, Haipeng Peng, Yixian Yang:
A Three-Party Password-based Authenticated Key Exchange Protocol for Wireless Communications. Inf. Technol. Control. 44(4): 404-409 (2015) - [j99]Jinxia Wei, Ru Zhang, Jianyi Liu, Xinxin Niu, Yixian Yang:
Defense Strategy of Network Security based on Dynamic Classification. KSII Trans. Internet Inf. Syst. 9(12): 5116-5134 (2015) - [j98]Yanrong Lu, Lixiang Li, Haipeng Peng, Yixian Yang:
An Enhanced Biometric-Based Authentication Scheme for Telecare Medicine Information Systems Using Elliptic Curve Cryptosystem. J. Medical Syst. 39(3): 32 (2015) - [j97]Yanrong Lu, Lixiang Li, Haipeng Peng, Dong Xie, Yixian Yang:
Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps. J. Medical Syst. 39(6): 65:1-65:10 (2015) - [j96]Yuan Ping, Yun Feng Chang, Yajian Zhou, Yingjie Tian, Yixian Yang, Zhili Zhang:
Fast and scalable support vector clustering for large-scale data analysis. Knowl. Inf. Syst. 43(2): 281-310 (2015) - [j95]Weiping Wang, Haipeng Peng, Lixiang Li, Jinghua Xiao, Yixian Yang:
Finite-Time Function Projective Synchronization in Complex Multi-links Networks with Time-Varying Delay. Neural Process. Lett. 41(1): 71-88 (2015) - [j94]Gang Xu, Xiu-Bo Chen, Zhao Dou, Yixian Yang, Zongpeng Li:
A novel protocol for multiparty quantum key management. Quantum Inf. Process. 14(8): 2959-2980 (2015) - [j93]Jing-Tao Wang, Xiu-Bo Chen, Gang Xu, Xiang-Hua Meng, Yi-Xian Yang:
A new quantum sealed-bid auction protocol with secret order in post-confirmation. Quantum Inf. Process. 14(10): 3899-3911 (2015) - [j92]Gang Xu, Xiu-Bo Chen, Jing Li, Cong Wang, Yi-Xian Yang, Zongpeng Li:
Network coding for quantum cooperative multicast. Quantum Inf. Process. 14(11): 4297-4322 (2015) - [j91]Jian-Qiang Li, Xiu-Bo Chen, Yi-Xian Yang:
Quantum state representation based on combinatorial Laplacian matrix of star-relevant graph. Quantum Inf. Process. 14(12): 4691-4713 (2015) - [j90]Yanrong Lu, Lixiang Li, Haipeng Peng, Yixian Yang:
A biometrics and smart cards-based authentication scheme for multi-server environments. Secur. Commun. Networks 8(17): 3219-3228 (2015) - [j89]Jianhua Yan, Licheng Wang, Mianxiong Dong, Yixian Yang, Wenbin Yao:
Identity-based signcryption from lattices. Secur. Commun. Networks 8(18): 3751-3770 (2015) - [j88]Maohua Jing, Yixian Yang, Ning Lu, Wenbo Shi, Changyong Yu:
Postfix automata. Theor. Comput. Sci. 562: 590-605 (2015) - [i14]Haibo Hong, Licheng Wang, Haseeb Ahmad, Jing Li, Yixian Yang:
Minimal Logarithmic Signatures for Sporadic Groups. CoRR abs/1507.01162 (2015) - [i13]Haibo Hong, Licheng Wang, Haseeb Ahmad, Yixian Yang:
Minimal Logarithmic Signatures for one type of Classical Groups. CoRR abs/1507.01163 (2015) - [i12]Jing Yuan, Lixiang Li, Haipeng Peng, Jürgen Kurths, Xiaojing Hua, Yixian Yang:
The effect of randomness for dependency map on the robustness of interdependent lattices. CoRR abs/1509.05117 (2015) - 2014
- [j87]Haibo Hong, Licheng Wang, Yixian Yang, Haseeb Ahmad:
All exceptional groups of lie type have minimal logarithmic signatures. Appl. Algebra Eng. Commun. Comput. 25(4): 287-296 (2014) - [j86]Liwei Chang, Shihui Zheng, You Gao, Lize Gu, Yi-Xian Yang:
A novel construction of optimal multi-sender authentication code from singular pseudo-symplectic geometry over finite fields. Appl. Algebra Eng. Commun. Comput. 25(6): 407-429 (2014) - [j85]Liqun Zhou, Xiubo Chen, Yixian Yang:
Asymptotic stability of cellular neural networks with multiple proportional delays. Appl. Math. Comput. 229: 457-466 (2014) - [j84]Chun Guo, Yajian Zhou, Yuan Ping, Zhongkun Zhang, Guole Liu, Yixian Yang:
A distance sum-based hybrid method for intrusion detection. Appl. Intell. 40(1): 178-188 (2014) - [j83]Dawei Zhao, Haipeng Peng, Lixiang Li, SiLi Hui, Yixian Yang:
Novel way to research nonlinear feedback shift register. Sci. China Inf. Sci. 57(9): 1-14 (2014) - [j82]Yu Yang, Xunrui Yin, Xiubo Chen, Yixian Yang, Zongpeng Li:
A Note on the Multiple-Unicast Network Coding Conjecture. IEEE Commun. Lett. 18(5): 869-872 (2014) - [j81]Yuanju Gan, Lihua Wang, Licheng Wang, Ping Pan, Yixian Yang:
Efficient threshold public key encryption with full security based on dual pairing vector spaces. Int. J. Commun. Syst. 27(12): 4059-4077 (2014) - [j80]Xiu-Bo Chen, Yuan Su, Gang Xu, Ying Sun, Yixian Yang:
Quantum state secure transmission in network communications. Inf. Sci. 276: 363-376 (2014) - [j79]Jing Li, Licheng Wang, Jianhua Yan, Xinxin Niu, Yixian Yang:
A (k, t, n) Verifiable Multi-secret Sharing Scheme Based on Adversary Structure. KSII Trans. Internet Inf. Syst. 8(12): 4552-4567 (2014) - [j78]Chunli Yang, Shihui Zheng, Licheng Wang, Xiuhua Lu, Yixian Yang:
Hierarchical identity-based broadcast encryption scheme from LWE. J. Commun. Networks 16(3): 258-263 (2014) - [j77]Yubo Yang, Yixian Yang, Wenqing Fan, Wei Huang, Zhong-Xian Li:
Dynamic Obfuscation Algorithm based on Demand-Driven Symbolic Execution. J. Multim. 9(6): 843-850 (2014) - [j76]Yi Xu, Yixian Yang, Yang Xin, Hongliang Zhu:
An Improved Directed Diffusion Protocol based on Opportunistic Routing. J. Networks 9(5): 1163-1168 (2014) - [j75]Chao Feng, Yang Xin, Hongliang Zhu, Yixian Yang:
A Weakly Homomorphic Encryption with LDN. J. Networks 9(6): 1464-1470 (2014) - [j74]Weiping Wang, Lixiang Li, Haipeng Peng, Jinghua Xiao, Yixian Yang:
Synchronization control of memristor-based recurrent neural networks with perturbations. Neural Networks 53: 8-14 (2014) - [j73]Xiu-Bo Chen, Gang Xu, Yuan Su, Yixian Yang:
Robust variations of secret sharing through noisy quantum channel. Quantum Inf. Comput. 14(7-8): 589-607 (2014) - [j72]Gang Xu, Cong Wang, Yixian Yang:
Hierarchical quantum information splitting of an arbitrary two-qubit state via the cluster state. Quantum Inf. Process. 13(1): 43-57 (2014) - [j71]Xiubo Chen, Zhao Dou, Gang Xu, Cong Wang, Yixian Yang:
A class of protocols for quantum private comparison based on the symmetry of states. Quantum Inf. Process. 13(1): 85-100 (2014) - [j70]Xiubo Chen, Yuan Su, Xinxin Niu, Yixian Yang:
Efficient and feasible quantum private comparison of equality against the collective amplitude damping noise. Quantum Inf. Process. 13(1): 101-112 (2014) - [j69]Mingming Wang, Xiu-Bo Chen, Yixian Yang:
Quantum secret sharing for general access structures based on multiparticle entanglements. Quantum Inf. Process. 13(2): 429-443 (2014) - [j68]Song-Ya Ma, Mingxing Luo, Xiu-Bo Chen, Yixian Yang:
Schemes for remotely preparing an arbitrary four-qubit χ-state. Quantum Inf. Process. 13(9): 1951-1965 (2014) - [j67]Shuang-Yong Kang, Xiu-Bo Chen, Yixian Yang:
Multi-party quantum state sharing of an arbitrary multi-qubit state via χ-type entangled states. Quantum Inf. Process. 13(9): 2081-2098 (2014) - [j66]Dawei Zhao, Haipeng Peng, Lixiang Li, Yixian Yang:
A Secure and Effective Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks. Wirel. Pers. Commun. 78(1): 247-269 (2014) - 2013
- [j65]Yuanju Gan, Lihua Wang, Licheng Wang, Ping Pan, Yixian Yang:
Efficient Construction of CCA-Secure Threshold PKE Based on Hashed Diffie-Hellman Assumption. Comput. J. 56(10): 1249-1257 (2013) - [j64]Hongjing Ma, Weiqing Liu, Ye Wu, Yixian Yang, Jinghua Xiao:
Effect of spatial distribution on the synchronization in rings of coupled oscillators. Commun. Nonlinear Sci. Numer. Simul. 18(10): 2769-2774 (2013) - [j63]Yinggan Tang, Weiwei Mu, Xiumei Zhang, Yixian Yang:
Modified Fuzzy Linear Discriminant Analysis for Threshold Selection. Circuits Syst. Signal Process. 32(2): 711-726 (2013) - [j62]Ping Pan, Licheng Wang, Yixian Yang, Yuanju Gan, Lihua Wang, Chengqian Xu:
Chameleon Hash Functions and One-Time Signature Schemes from Inner Automorphism Groups. Fundam. Informaticae 126(1): 103-119 (2013) - [j61]Yuanju Gan, Lihua Wang, Licheng Wang, Ping Pan, Yixian Yang:
Publicly Verifiable Secret Sharing Scheme with Provable Security against Chosen Secret Attacks. Int. J. Distributed Sens. Networks 9 (2013) - [j60]Yanbin Sun, Yan Sun, Mingxing Luo, Lize Gu, Shihui Zheng, Yixian Yang:
Comment on Lee et al.'s group signature and e-auction scheme. Inf. Syst. Frontiers 15(1): 133-139 (2013) - [j59]Chenlei Cao, Ru Zhang, Mengyi Zhang, Yixian Yang:
IBC-Based Entity Authentication Protocols for Federated Cloud Systems. KSII Trans. Internet Inf. Syst. 7(5): 1291-1312 (2013) - [j58]Qinlong Huang, Zhaofeng Ma, Jingyi Fu, Xinxin Niu, Yixian Yang:
Attribute Based DRM Scheme with Efficient Revocation in Cloud Computing. J. Comput. 8(11): 2776-2781 (2013) - [j57]Hai-yang Ding, Yajian Zhou, Yixian Yang, Ru Zhang:
Robust Blind Video Watermark Algorithm in Transform Domain Combining with 3D Video Correlation. J. Multim. 8(2): 161-167 (2013) - [j56]Yuanju Gan, Licheng Wang, Jianhua Yan, Yixian Yang:
CCA Secure Threshold KEM Scheme Against Adaptive Corruption Attacks in Standard Model. J. Softw. 8(5): 1245-1253 (2013) - [j55]Zhaofeng Ma, Jianqing Huang, Yixian Yang, Xinxin Niu:
Verifiable Threshold Authorization for Scalable and Secure Digital Rights Management. J. Softw. 8(6): 1526-1535 (2013) - [j54]Mingxing Luo, Yun Deng, Xiu-Bo Chen, Yixian Yang:
The faithful remote preparation of general quantum states. Quantum Inf. Process. 12(1): 279-294 (2013) - [j53]Yi Luo, Zhiwen Zhao, Zhangji Zhao, Haiming Long, Wen Su, Yixian Yang:
The loophole of the improved secure quantum sealed-bid auction with post-confirmation and solution. Quantum Inf. Process. 12(1): 295-302 (2013) - [j52]Xiu-Bo Chen, Xinxin Niu, Xinjie Zhou, Yixian Yang:
Multi-party quantum secret sharing with the single-particle quantum state to encode the information. Quantum Inf. Process. 12(1): 365-380 (2013) - [j51]Mingming Wang, Xiu-Bo Chen, Yixian Yang:
Comment on "High-dimensional deterministic multiparty quantum secret sharing without unitary operations". Quantum Inf. Process. 12(2): 785-792 (2013) - [j50]Mingxing Luo, Yun Deng, Xiu-Bo Chen, Yi-Xian Yang, Hongheng Li:
Faithful quantum broadcast beyond the no-go theorem. Quantum Inf. Process. 12(5): 1969-1979 (2013) - [j49]Ying Sun, Shengwei Xu, Xiu-Bo Chen, Xinxin Niu, Yi-Xian Yang:
Expansible quantum secret sharing network. Quantum Inf. Process. 12(8): 2877-2888 (2013) - [j48]Mingxing Luo, Yun Deng, Xiu-Bo Chen, Yi-Xian Yang:
The rational approximations of the unitary groups. Quantum Inf. Process. 12(10): 3149-3166 (2013) - [j47]Lize Gu, Licheng Wang, Kaoru Ota, Mianxiong Dong, Zhenfu Cao, Yixian Yang:
New public key cryptosystems based on non-Abelian factorization problems. Secur. Commun. Networks 6(7): 912-922 (2013) - [c54]Chunge Zhu, Xinran Liu, Yixian Yang, Hong Zhang, Qianhua Xu:
An Application-Oriented Scheduling Optimization Algorithm for Internet-Based Virtual Computing Environment. SOSE 2013: 347-352 - [i11]Dawei Zhao, Haipeng Peng, Shudong Li, Yixian Yang:
An efficient dynamic ID based remote user authentication scheme using self-certified public keys for multi-server environment. CoRR abs/1305.6350 (2013) - [i10]Dawei Zhao, Haipeng Peng, Lixiang Li, Yixian Yang:
A secure and effective anonymous authentication scheme for roaming service in global mobility networks. CoRR abs/1306.4726 (2013) - [i9]Dawei Zhao, Lixiang Li, Haipeng Peng, Qun Luo, Yixian Yang:
Multiple Vectors Propagation of Epidemics in Complex Networks. CoRR abs/1307.1834 (2013) - [i8]Dawei Zhao, Lixiang Li, Haipeng Peng, Qun Luo, Yixian Yang:
Multiple routes transmitted epidemics on multiplex networks. CoRR abs/1312.6931 (2013) - 2012
- [j46]Miao Wan, Cong Wang, Lixiang Li, Yixian Yang:
Chaotic ant swarm approach for data clustering. Appl. Soft Comput. 12(8): 2387-2393 (2012) - [j45]Yuan Ping, Yajian Zhou, Yixian Yang:
A Novel Scheme for Accelerating Support Vector Clustering. Comput. Informatics 31(3): 613- (2012) - [j44]Dawei Zhao, Haipeng Peng, Cong Wang, Yixian Yang:
A secret sharing scheme with a short share realizing the (t, n) threshold and the adversary structure. Comput. Math. Appl. 64(4): 611-615 (2012) - [j43]Da Xiao, Yan Yang, Wenbin Yao, Chunhua Wu, Jianyi Liu, Yixian Yang:
Multiple-File Remote Data Checking for cloud storage. Comput. Secur. 31(2): 192-205 (2012) - [j42]Yinggan Tang, Mingyong Cui, Changchun Hua, Lixiang Li, Yixian Yang:
Optimum design of fractional order PIλDμ controller for AVR system using chaotic ant swarm. Expert Syst. Appl. 39(8): 6887-6896 (2012) - [j41]Yixian Yang, Fuji Ren:
Foreword: Computational Intelligence for Network Control and Security. Int. J. Comput. Intell. Syst. 5(5): 805-807 (2012) - [j40]Zhiwei Wang, Licheng Wang, Shihui Zheng, Yixian Yang, Zhengming Hu:
Provably Secure and Efficient Identity-based Signature Scheme Based on Cubic Residues. Int. J. Netw. Secur. 14(1): 33-38 (2012) - [j39]Hong Lai, Jinghua Xiao, Lixiang Li, Yixian Yang:
Recursive hiding of biometrics-based secret sharing scheme using adversary structure. Inf. Process. Lett. 112(17-18): 683-687 (2012) - [j38]Zhongtian Jia, Lixiang Li, Zhuoran Yu, Shudong Li, Yixian Yang:
A Secure Message Transaction Protocol for Delay Tolerant Networks. J. Commun. 7(8): 622-633 (2012) - [j37]Yuan Ping, Yingjie Tian, Yajian Zhou, Yixian Yang:
Convex Decomposition Based Cluster Labeling Method for Support Vector Clustering. J. Comput. Sci. Technol. 27(2): 428-442 (2012) - [j36]Miao Wan, Lixiang Li, Jinghua Xiao, Cong Wang, Yixian Yang:
Data clustering using bacterial foraging optimization. J. Intell. Inf. Syst. 38(2): 321-341 (2012) - [j35]Zhongtian Jia, Xiaodong Lin, Seng-Hua Tan, Lixiang Li, Yixian Yang:
Public key distribution scheme for delay tolerant networks based on two-channel cryptography. J. Netw. Comput. Appl. 35(3): 905-913 (2012) - [j34]Yixian Yang, Xiaojun Wang:
Guest Editorial. J. Networks 7(8): 1147-1149 (2012) - [j33]Rongrong Fu, Kangfeng Zheng, Tianliang Lu, Dongmei Zhang, Yixian Yang:
Biologically Inspired Anomaly Detection for Hierarchical Wireless Sensor Networks. J. Networks 7(8): 1214-1219 (2012) - [j32]Mingxing Luo, Xiu-Bo Chen, Yi-Xian Yang, Xinxin Niu:
Experimental architecture of joint remote state preparation. Quantum Inf. Process. 11(3): 751-767 (2012) - [j31]Xiu-Bo Chen, Song-Ya Ma, Yuan Su, Ru Zhang, Yi-Xian Yang:
Controlled remote state preparation of arbitrary two and three qubit states via the Brown state. Quantum Inf. Process. 11(6): 1653-1667 (2012) - [j30]Mingming Wang, Xiu-Bo Chen, Shoushan Luo, Yi-Xian Yang:
Efficient entanglement channel construction schemes for a theoretical quantum network model with d-level system. Quantum Inf. Process. 11(6): 1715-1739 (2012) - [j29]Zhongtian Jia, Shudong Li, Haipeng Peng, Yixian Yang, Shize Guo:
Modelling security message propagation in delay tolerant networks. Secur. Commun. Networks 5(1): 51-58 (2012) - [j28]Ping Pan, Lihua Wang, Licheng Wang, Lixiang Li, Yixian Yang:
CSP-DHIES: a new public-key encryption scheme from matrix conjugation. Secur. Commun. Networks 5(7): 809-822 (2012) - [j27]Baocheng Wang, Chunming Tang, Yanfeng Qi, Yixian Yang, Maozhi Xu:
The Weight Distributions of Cyclic Codes and Elliptic Curves. IEEE Trans. Inf. Theory 58(12): 7253-7259 (2012) - [c53]Chunge Zhu, Xinran Liu, Yixian Yang, Hong Zhang, Qianhua Xu:
A trust mechanism in Internet-Based Virtual Computing Environment. CCIS 2012: 449-453 - [c52]Zhongtian Jia, Muhammad Ali Raffay, Lixiang Li, Xiaodong Lin, Yixian Yang:
A secure message delivery scheme with path tracking for delay tolerant networks. ICCC 2012: 161-166 - [i7]Baocheng Wang, Chunming Tang, Yanfeng Qi, Yixian Yang, Maozhi Xu:
A Note on Weight Distributions of Irreducible Cyclic Codes. CoRR abs/1202.3514 (2012) - 2011
- [j26]Jiafa Mao, Ru Zhang, Xinxin Niu, Yixian Yang, Linna Zhou:
Research of Spatial Domain Image Digital Watermarking Payload. EURASIP J. Inf. Secur. 2011 (2011) - [j25]Fangzhen Ge, Zhen Wei, Yang Lu, Lixiang Li, Yixian Yang:
Disturbance Chaotic Ant Swarm. Int. J. Bifurc. Chaos 21(9): 2597-2622 (2011) - [j24]Licheng Wang, Lihua Wang, Yun Pan, Zonghua Zhang, Yixian Yang:
Discrete logarithm based additively homomorphic encryption and secure data aggregation. Inf. Sci. 181(16): 3308-3322 (2011) - [j23]Miao Wan, Arne Jönsson, Cong Wang, Lixiang Li, Yixian Yang:
Web user clustering and Web prefetching using Random Indexing with weight functions. Knowl. Inf. Syst. 33(1): 89-115 (2011) - [j22]Xiangmao Chang, Rui Tan, Guoliang Xing, Zhaohui Yuan, Chenyang Lu, Yixin Chen, Yixian Yang:
Sensor Placement Algorithms for Fusion-Based Surveillance Networks. IEEE Trans. Parallel Distributed Syst. 22(8): 1407-1414 (2011) - [c51]Tao Geng, Shoushan Luo, Yang Xin, Xiaofeng Du, Yixian Yang:
Research on Secure Multi-party Computational Geometry. ICICA (LNCS) 2011: 322-329 - [c50]Miao Wan, Arne Jönsson, Cong Wang, Lixiang Li, Yixian Yang:
A Random Indexing Approach for Web User Clustering and Web Prefetching. PAKDD Workshops 2011: 40-52 - [i6]Baocheng Wang, Chunming Tang, Yanfeng Qi, Yixian Yang, Maozhi Xu:
The Weight Distributions of Cyclic Codes and Elliptic Curves. CoRR abs/1109.0628 (2011) - [i5]Baocheng Wang, Chunming Tang, Yanfeng Qi, Yixian Yang, Maozhi Xu:
A new class of hyper-bent Boolean functions in binomial forms. CoRR abs/1112.0062 (2011) - [i4]Baocheng Wang, Chunming Tang, Yanfeng Qi, Yixian Yang, Maozhi Xu:
A New Class of Hyper-bent Boolean Functions with Multiple Trace Terms. IACR Cryptol. ePrint Arch. 2011: 600 (2011) - [i3]Baocheng Wang, Chunming Tang, Yanfeng Qi, Yixian Yang:
A generalization of the class of hyper-bent Boolean functions in binomial forms. IACR Cryptol. ePrint Arch. 2011: 698 (2011) - 2010
- [j21]Shihui Zheng, Licheng Wang, Yixian Yang:
A new impossible differential attack on SAFER ciphers. Comput. Electr. Eng. 36(1): 180-189 (2010) - [j20]Licheng Wang, Lihua Wang, Zhenfu Cao, Yixian Yang, Xinxin Niu:
Conjugate adjoining problem in braid groups and new design of braid-based signatures. Sci. China Inf. Sci. 53(3): 524-536 (2010) - [j19]Mingxing Luo, Yixian Yang, Licheng Wang, Xinxin Niu:
Secure network coding in the presence of eavesdroppers. Sci. China Inf. Sci. 53(3): 648-658 (2010) - [j18]Qin Guo, Mingxing Luo, Lixiang Li, Yixian Yang:
Secure Network Coding against Wiretapping and Byzantine Attacks. EURASIP J. Wirel. Commun. Netw. 2010 (2010) - [j17]Zhiwei Wang, Licheng Wang, Yixian Yang, Zhengming Hu:
Comment on Wu et al.'s Server-aided Verification Signature Schemes. Int. J. Netw. Secur. 10(2): 158-160 (2010) - [j16]Mingfeng Zhao, Yajian Zhou, Yixian Yang, We Song, Yajun Du:
A New Method to Detect Useless Service Failure Model in SPN. J. Convergence Inf. Technol. 5(3): 129-134 (2010) - [j15]Jianhong Zhang, Chenglian Liu, Yixian Yang:
An efficient secure proxy verifiably encrypted signature scheme. J. Netw. Comput. Appl. 33(1): 29-34 (2010) - [c49]Xiaohong Zhang, Yixian Yang, Lixiang Li, Haipeng Peng:
An Extensible Hash Function Construction Based on Embedded Chaos Maps. CIT 2010: 2407-2414 - [c48]Xiangmao Chang, Jin Wang, Jianping Wang, Victor C. S. Lee, Kejie Lu, Yixian Yang:
On Achieving Maximum Secure Throughput Using Network Coding against Wiretap Attack. ICDCS 2010: 526-535 - [c47]Chuan-Lun Ren, Xiao-Hui Zuo, Zhong-Xian Li, Xinxin Niu, Yixian Yang:
Towards Hierarchical-User RBAC model. ICMLC 2010: 2870-2874 - [c46]Jian Gao, Yixian Yang, Kangfeng Zheng, Zhengming Hu:
Research of an Innovative P2P-Based Botnet. MVHI 2010: 214-218 - [c45]Jin-ye Liu, Lize Gu, Shoushan Luo, Yixian Yang:
An anonymous authentication scheme for mobile communication. WCNIS 2010: 359-364 - [c44]Jianwu Zhang, Guoai Xu, Yixian Yang, Shize Guo:
A method for topology conformance tests under logical constraints. WCNIS 2010: 386-390 - [c43]Chengqing Guo, Guoai Xu, Xinxin Niu, Yixian Yang, Yang Li:
A color image watermarking algorithm resistant to print-scan. WCNIS 2010: 518-521
2000 – 2009
- 2009
- [j14]Jianhong Zhang, Yixian Yang, Xinxin Niu:
A Novel Identity-Based Multi-Signcryption Scheme. Int. J. Distributed Sens. Networks 5(1): 28 (2009) - [c42]Xiao-Long Ma, Zhiwei Wang, Lize Gu, Yixian Yang:
Remark on Yu et al.'s Online/Offline Signature Scheme in CT-RSA 2008. IAS 2009: 719-720 - [c41]Jianhong Zhang, Hua Chen, Shengnan Gao, Yixian Yang:
A Special Proxy Signature Scheme with Multi-warrant. ASIAN 2009: 147-157 - [c40]Ming Chen, Fan-fan Liu, Ru Zhang, Xinxin Niu, Yixian Yang:
Steganalysis of LSB Matching in Gray Images Based on Regional Correlation Analysis. CSIE (6) 2009: 490-494 - [c39]Da Xiao, Wenbin Yao, Chunhua Wu, Cong Wang, Yixian Yang:
VAOFS: A Verifiable Append-Only File System for Regulatory Compliance. GCC 2009: 325-330 - [c38]Licheng Wang, Lihua Wang, Yun Pan, Zonghua Zhang, Yixian Yang:
Discrete-Log-Based Additively Homomorphic Encryption and Secure WSN Data Aggregation. ICICS 2009: 493-502 - [c37]Zhiguo Qu, Yu Fu, Xinxin Niu, Yixian Yang, Ru Zhang:
Improved EMD Steganography with Great Embedding Rate and High Embedding Efficiency. IIH-MSP 2009: 348-352 - [c36]Jianhong Zhang, Yixian Yang, Xinxin Niu:
Efficient Provable Secure ID-Based Directed Signature Scheme without Random Oracle. ISNN (3) 2009: 318-327 - [c35]Jianhong Zhang, Yixian Yang, Xinxin Niu, Shengnan Gao, Hua Chen, Qin Geng:
An Improved Secure Identity-Based On-Line/Off-Line Signature Scheme. ISA 2009: 588-597 - [c34]Wen Long, Yang Xin, Yixian Yang:
Vulnerabilities Analyzing Model for Alert Correlation in Distributed Environment. SSME 2009: 408-411 - [i2]Zhimin Li, Licheng Wang, Daofeng Li, Yixian Yang:
Collision Attacks on NaSHA-384/512. IACR Cryptol. ePrint Arch. 2009: 26 (2009) - 2008
- [c33]Hong-Yong Jia, Sihan Qing, Lize Gu, Yixian Yang:
Efficient Universally Composable Password-Based Key Exchange. CIS (2) 2008: 293-298 - [c32]Xiao-Long Ma, Wei Cui, Lize Gu, Yixian Yang, Zhengming Hu:
A Novel ID-Based Verifiably Encrypted Signature without Random Oracle. CIS (2) 2008: 359-363 - [c31]Xin-lei Li, Kangfeng Zheng, Yixian Yang:
A Simulation Platform of DDoS Attack Based on Network Processor. CIS (1) 2008: 421-426 - [c30]Yihua Yu, Shihui Zheng, Yixian Yang:
ID-Based Blind Signature and Proxy Blind Signature without Trusted PKG. CSICC 2008: 821-824 - [c29]Yanfei Liu, Ziming Zhao, Hui Li, Qun Luo, Yixian Yang:
An Efficient Remote User Authentication Scheme with Strong Anonymity. CW 2008: 180-185 - [c28]Zhiwei Wang, Xuyun Nie, Shihui Zheng, Yixian Yang, Zhihui Zhang:
A New Construction of Multivariate Public Key Encryption Scheme through Internally Perturbed Plus. ICCSA (2) 2008: 1-13 - [c27]Wei Zhang, Shize Guo, Kangfeng Zheng, Yixian Yang:
A Defending Mechanism against DDoS Based on Registration and Authentication. ICYCS 2008: 2192-2197 - [c26]Tianyu Ye, Yu Fu, Zhiguo Qu, Xinxin Niu, Yixian Yang:
Multiplicative Watermark Detection Using Locally Optimum Nonlinearity. IIH-MSP 2008: 481-484 - [c25]Yu Fu, Tianyu Ye, Zhiguo Qu, Xinxin Niu, Yixian Yang:
A Novel Relational Database Watermarking Algorithm for Joint Ownership. IIH-MSP 2008: 985-988 - [c24]Nan Jiang, Zhaozhi Zhang, Xiaomin Ma, Jian Wang, Yixian Yang:
Analysis of nonseparable property of multi-valued multi-threshold neuron. IJCNN 2008: 413-419 - [c23]Jiao Wang, Yajian Zhou, Yixian Yang, Xinxin Niu:
Classify the Majority of the Total Bytes on the Internet. ISIP 2008: 68-72 - [c22]Jian Li, Yixian Yang:
Design and Realization of a Large-Scale Distributed Intrusion Management System Module. PACIIA (2) 2008: 537-540 - 2007
- [c21]Zhaofeng Ma, Yixian Yang, Xinxin Niu:
Secure and Flexible Digital Rights Management in a Pervasive Usage Mode. CIS 2007: 863-867 - [c20]Lanlan Hu, Yixian Yang, Xinxin Niu:
Improved Remote User Authentication Scheme Preserving User Anonymity. CNSR 2007: 323-328 - [c19]Bin Wu, Kangfeng Zheng, Yixian Yang:
A Data Safety Transmission Solution in Web Application. Web Intelligence/IAT Workshops 2007: 303-306 - [c18]Ming-hui Liu, Xin Yang, Yixian Yang, Xinxin Niu:
Security Mechanism Research of EMV2000. Web Intelligence/IAT Workshops 2007: 307-310 - [c17]Guosheng Xu, Yixian Yang, Lize Gu, Xinxin Niu:
ID-Based Multi-proxy Sequential Signature System from Bilinear Pairing. Web Intelligence/IAT Workshops 2007: 315-318 - [c16]Jian Wang, Yixian Yang, Nan Jiang, Zhaozhi Zhang, Xiaomin Ma:
Using Three Layer Neural Networks to Compute Discrete Real Functions. ICNC (1) 2007: 446-450 - [c15]Yu-Ying Li, Lixiang Li, Qiaoyan Wen, Yixian Yang:
Integer Programming via Chaotic Ant Swarm. ICNC (4) 2007: 489-493 - [c14]Licheng Wang, Zhenfu Cao, Shihui Zheng, Xiaofang Huang, Yixian Yang:
Transitive Signatures from Braid Groups. INDOCRYPT 2007: 183-196 - [c13]Liang Li, Wei-Qiang Jiang, Jie Tian, Yixian Yang, Cai-Ping Jiang, Zhe Wu, Xin Yang:
A Networking Identity Authentication Scheme Combining Fingerprint Coding and Identity Based Encryption. ISI 2007: 129-132 - [c12]Nan Jiang, Yixian Yang, Xiaomin Ma, Zhaozhi Zhang:
Using Three Layer Neural Network to Compute Multi-valued Functions. ISNN (3) 2007: 1-8 - [c11]Lanlan Hu, Xinxin Niu, Yixian Yang:
An Efficient Multi-server Password Authenticated Key Agreement Scheme Using Smart Cards. MUE 2007: 903-907 - 2006
- [j13]Lixiang Li, Yixian Yang, Haipeng Peng, Xiangdong Wang:
An Optimization Method Inspired by "chaotic" Ant Behavior. Int. J. Bifurc. Chaos 16(8): 2351-2364 (2006) - [c10]Nan Jiang, Jian Wang, Xinxin Niu, Yixian Yang:
Symmetric Steganography Secure Against Chosen Message and Original Cover Attacks. ICICIC (3) 2006: 661-664 - [c9]Yu-Ying Li, Lixiang Li, Qiao-Yan Wen, Yixian Yang:
Data Fitting Via Chaotic Ant Swarm. ICNC (2) 2006: 180-183 - [c8]Ming Chen, Ru Zhang, Xinxin Niu, Yixian Yang:
Analysis of Current Steganography Tools: Classifications & Features. IIH-MSP 2006: 384-387 - [i1]Shenghui Su, Yixian Yang, Bo Yang, Shaolan Zhang:
Design and Analysis of a Hash Ring-iterative Structure. IACR Cryptol. ePrint Arch. 2006: 384 (2006) - 2005
- [c7]Fenghua Lang, Jian Li, Yixian Yang:
A Novel Fuzzy Anomaly Detection Method Based on Clonal Selection Clustering Algorithm. ICMLC 2005: 642-651 - [c6]Yonggang Chu, Jun Li, Yixian Yang:
The Architecture of the Large-scale Distributed Intrusion Detection System. PDCAT 2005: 130-133 - 2004
- [j12]Zhaozhi Zhang, Xiaomin Ma, Yixian Yang:
Erratum to: Bounds on the number of hidden neurons in three-layer binary neural networks [Neural Networks 16 (7) 995-1002]. Neural Networks 17(3): 465 (2004) - 2003
- [j11]Wang Tao, Yixian Yang, Xinxin Niu:
New Efficient Timed Commitment Schemes. Int. J. Inf. Technol. Decis. Mak. 2(2): 287-297 (2003) - [j10]Zhaozhi Zhang, Xiaomin Ma, Yixian Yang:
Bounds on the number of hidden neurons in three-layer binary neural networks. Neural Networks 16(7): 995-1002 (2003) - [c5]Zhi Li, Ai Fen Sui, Yixian Yang:
A LSB steganography detection algorithm. PIMRC 2003: 2780-2783 - 2001
- [j9]Zhaozhi Zhang, Xiaomin Ma, Yixian Yang:
A unified method to construct neural network decoders for arbitrary codes and decoding rules. Discret. Math. 238(1-3): 171-181 (2001) - [j8]Wei Sun, Andrew Klapper, Yixian Yang:
On correlations of a family of generalized geometric sequences. IEEE Trans. Inf. Theory 47(6): 2609-2618 (2001) - [c4]Lin You, Yixian Yang, Chun Qi Zhang:
Generalization of Elliptic Curve Digital Signature Schemes. ICICS 2001: 246-250 - 2000
- [c3]Ming Zhong, Yunbo Feng, Yixian Yang:
Single-Term Divisible Electronic Cash Based on Bit Commitment. ISCC 2000: 280-285
1990 – 1999
- 1998
- [j7]Xiaodong Lin, YuSen Xing, Yixian Yang, Tzonelih Hwang:
Comment on "Reparable key distribution protocols for Internet environments" [and reply]. IEEE Trans. Commun. 46(1): 20-22 (1998) - 1997
- [j6]Wei Sun, Yixian Yang:
Correlation Functions of a Family of Generalized Geometric Sequences. Discret. Appl. Math. 80(2-3): 193-201 (1997) - [j5]Yixian Yang, Xinxin Niu, Chengqian Xu:
Counterexample of truncated Costas optical orthogonal codes. IEEE Trans. Commun. 45(6): 640-643 (1997) - 1995
- [j4]Yixian Yang, Baoan Guo:
Further Enumerating Boolean Functions of Cryptographic Significance. J. Cryptol. 8(3): 115-122 (1995) - 1994
- [j3]Xinmei Wang, Yixian Yang:
On the undetected error probability of nonlinear binary constant weight codes. IEEE Trans. Commun. 42(7): 2390-2394 (1994) - 1993
- [j2]Yixian Yang:
New Binary Sequences with Perfect Staircase Profile of Linear Complexity. Inf. Process. Lett. 46(1): 27-29 (1993) - 1991
- [j1]Yixian Yang:
New Enumeration Results About the Optical Orthogonal Codes. Inf. Process. Lett. 40(2): 85-87 (1991) - 1990
- [c2]Yixian Yang:
K-M Sequence is Forwardly Predictable. AUSCRYPT 1990: 37-38 - [c1]Yixian Yang:
Dyadic Matrices and Their Potential Significance in Cryptography. AUSCRYPT 1990: 308-310
Coauthor Index
aka: Xiu-Bo Chen
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-04 21:43 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint