Showing 1 - 20 results of 26 for search 'Yi-xian YANG', query time: 0.02s
Refine Results
-
1
Research on the privacy-preserving point-in-polygon protocol by Jing ZHANG, Shou-shan LUO, Yi-xian YANG, Yang XIN
Published 2016-04-01
Article -
2
Novel NFA engine construction method of regular expressions by Mao-hua JING, Yi-xian YANG, Tao WANG, Yang XIN
Published 2014-10-01
Article -
3
-
4
Distributed trust model based on parameter modeling by Jing-pei WANG, Bin SUN, Xin-xin NIU, Yi-xian YANG
Published 2013-04-01
Article -
5
Smart Fuzzing method based on comparison algorithm of control flow sequences by Ying WANG, Yi-xian YANG, Xin-xin NIU, Li-ze GU
Published 2013-04-01
Article -
6
Blind audio watermarking mechanism based on variational Bayesian learning by Xin TANG, Zhao-feng MA, Xin-xin NIU, Yi-xian YANG
Published 2015-01-01
Article -
7
Alert processing based on attack graph and multi-source analyzing by Wei-xin LIU, Kang-feng ZHENG, Bin WU, Yi-xian YANG
Published 2015-09-01
Article -
8
-
9
Danger theory inspired intrusion detection model for wireless sensor networks by Rong-rong FU, Kang-feng ZHENG, Tian-liang LU, Yi-xian YANG
Published 2012-09-01
Article -
10
Moving target defense solution on network layer based on OpenFlow by Yi-xun HU, Kang-feng ZHENG, Yi-xian YANG, Xin-xin NIU
Published 2017-10-01
Article -
11
Identity-based domain key distribution protocol in the E-document security management by Xi-xi YAN, Zhao-feng MA, Yi-xian YANG, Xin-xin NIU
Published 2012-05-01
Article -
12
New solution scheme for the member revocation in group signature by De-dong ZHANG, Zhao-feng MA, Yi-xian YANG, Xin-xin NIU
Published 2014-03-01
Article -
13
New chaos-particle swarm optimization algorithm by Xiao-bo XU, Kang-feng ZHENG, Dan LI, Bin WU, Yi-xian YANG
Published 2012-01-01
Article -
14
Data sharing scheme supporting secure outsourced computation in wireless body area network by Wei-wei ZHANG, Yu-zhao ZHANG, Chao HUANG, Ru ZHANG, Yi-xian YANG
Published 2017-04-01
Article -
15
Semi-fragile video watermarking algorithm for H.264/AVC based on cost strategy by Wei-wei ZHANG, Chen ZHAO, De-tian HUANG, Pei ZHANG, Yi-xian YANG
Published 2015-10-01
Article -
16
Design and implementation of a novel general format multimedia digital rights management system by Qin-long HUANG, Zhao-feng MA, Jia MO, Xin-xin NIU, Yi-xian YANG
Published 2013-10-01
Article -
17
Study on security routing algorithm based on dynamic adjacent trust by Ting HAN, Shou-shan LUO, Yang XIN, Yi-xian YANG, Gong CHENG, Xiao WU
Published 2013-06-01
Article -
18
Efficient chosen-ciphertext secure proxy re-encryption scheme by Wei-wei ZHANG, Ru ZHANG, Jian-yi LIU, Xin-xin NIU, Yi-xian YANG
Published 2013-07-01
Article -
19
IDS alert clustering algorithm based on chaotic particle swarm optimization by Xiao-bo XU, Qin-qin JIANG, Kang-feng ZHENG, Bin WU, Yi-xian YANG
Published 2013-03-01
Article -
20
Robust video watermarking algorithm for H.264/AVC based on texture feature by Wei-wei ZHANG, Ru ZHANG, Jian-yi LIU, Xin-xin NIU, Yi-xian YANG
Published 2012-03-01
Article