BibTeX records: Licheng Wang

download as .bib file

@article{DBLP:journals/jzusc/Zheng0W24,
  author       = {Shanshan Zheng and
                  Shuai Liu and
                  Licheng Wang},
  title        = {Event-triggered distributed optimization for model-free multi-agent
                  systems},
  journal      = {Frontiers Inf. Technol. Electron. Eng.},
  volume       = {25},
  number       = {2},
  pages        = {214--224},
  year         = {2024},
  url          = {https://doi.org/10.1631/FITEE.2300568},
  doi          = {10.1631/FITEE.2300568},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jzusc/Zheng0W24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/automatica/WangWZW23,
  author       = {Licheng Wang and
                  Zidong Wang and
                  Di Zhao and
                  Guoliang Wei},
  title        = {Stabilization of linear discrete-time systems over resource-constrained
                  networks under dynamical multiple description coding scheme},
  journal      = {Autom.},
  volume       = {156},
  pages        = {111160},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.automatica.2023.111160},
  doi          = {10.1016/J.AUTOMATICA.2023.111160},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/automatica/WangWZW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bmcbi/SuoGYYHW23,
  author       = {Jingwen Suo and
                  Lize Gu and
                  Xingyu Yan and
                  Sijia Yang and
                  Xiaoya Hu and
                  Licheng Wang},
  title        = {{PP-DDP:} a privacy-preserving outsourcing framework for solving the
                  double digest problem},
  journal      = {{BMC} Bioinform.},
  volume       = {24},
  number       = {1},
  pages        = {34},
  year         = {2023},
  url          = {https://doi.org/10.1186/s12859-023-05157-8},
  doi          = {10.1186/S12859-023-05157-8},
  timestamp    = {Tue, 07 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bmcbi/SuoGYYHW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/YanLLWZY23,
  author       = {Jianhua Yan and
                  Xiuhua Lu and
                  Muzi Li and
                  Licheng Wang and
                  Jingxian Zhou and
                  Wenbin Yao},
  title        = {Practical {NTRU} Signcryption in the Standard Model},
  journal      = {Entropy},
  volume       = {25},
  number       = {12},
  pages        = {1651},
  year         = {2023},
  url          = {https://doi.org/10.3390/e25121651},
  doi          = {10.3390/E25121651},
  timestamp    = {Wed, 10 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entropy/YanLLWZY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/WangDWHP23,
  author       = {Wei Wang and
                  Junke Duan and
                  Licheng Wang and
                  Xiaoya Hu and
                  Haipeng Peng},
  title        = {Strongly Synchronized Redactable Blockchain Based on Verifiable Delay
                  Functions},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {19},
  pages        = {16778--16792},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2023.3269817},
  doi          = {10.1109/JIOT.2023.3269817},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/WangDWHP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/remotesensing/WangLZDW23,
  author       = {Licheng Wang and
                  Jinxin Lu and
                  Ronglei Zhou and
                  Gaohui Duan and
                  Zhongming Wen},
  title        = {Analysis of Soil Moisture Change Characteristics and Influencing Factors
                  of Grassland on the Tibetan Plateau},
  journal      = {Remote. Sens.},
  volume       = {15},
  number       = {2},
  pages        = {298},
  year         = {2023},
  url          = {https://doi.org/10.3390/rs15020298},
  doi          = {10.3390/RS15020298},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/remotesensing/WangLZDW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/ShenWWWP23,
  author       = {Xiaoying Shen and
                  Zhen Wang and
                  Baocang Wang and
                  Licheng Wang and
                  Qingqi Pei},
  title        = {A Privacy-Preserving Ride-Matching Scheme Without a Trusted Third-Party
                  Server},
  journal      = {{IEEE} Syst. J.},
  volume       = {17},
  number       = {4},
  pages        = {6413--6424},
  year         = {2023},
  url          = {https://doi.org/10.1109/JSYST.2023.3289833},
  doi          = {10.1109/JSYST.2023.3289833},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sj/ShenWWWP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tac/LiuWWW23,
  author       = {Shuai Liu and
                  Zidong Wang and
                  Licheng Wang and
                  Guoliang Wei},
  title        = {Finite-Horizon {\textdollar}H{\_}\{{\textbackslash}infty \}{\textdollar}
                  Filtering via a High-Rate Network With the FlexRay Protocol},
  journal      = {{IEEE} Trans. Autom. Control.},
  volume       = {68},
  number       = {6},
  pages        = {3596--3603},
  year         = {2023},
  url          = {https://doi.org/10.1109/TAC.2022.3190791},
  doi          = {10.1109/TAC.2022.3190791},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tac/LiuWWW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcasI/LuoLWT23,
  author       = {Qi Luo and
                  Shuai Liu and
                  Licheng Wang and
                  Engang Tian},
  title        = {Privacy-Preserved Distributed Optimization for Multi-Agent Systems
                  With Antagonistic Interactions},
  journal      = {{IEEE} Trans. Circuits Syst. {I} Regul. Pap.},
  volume       = {70},
  number       = {3},
  pages        = {1350--1360},
  year         = {2023},
  url          = {https://doi.org/10.1109/TCSI.2022.3226578},
  doi          = {10.1109/TCSI.2022.3226578},
  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcasI/LuoLWT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcyb/ZhaoWWW23,
  author       = {Di Zhao and
                  Zidong Wang and
                  Licheng Wang and
                  Guoliang Wei},
  title        = {Proportional-Integral Observer Design for Multirate-Networked Systems
                  Under Constrained Bit Rate: An Encoding-Decoding Mechanism},
  journal      = {{IEEE} Trans. Cybern.},
  volume       = {53},
  number       = {7},
  pages        = {4280--4291},
  year         = {2023},
  url          = {https://doi.org/10.1109/TCYB.2022.3165041},
  doi          = {10.1109/TCYB.2022.3165041},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcyb/ZhaoWWW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DuanWWG23,
  author       = {Junke Duan and
                  Licheng Wang and
                  Wei Wang and
                  Lize Gu},
  title        = {{TRCT:} {A} Traceable Anonymous Transaction Protocol for Blockchain},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {4391--4405},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2023.3296286},
  doi          = {10.1109/TIFS.2023.3296286},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/DuanWWG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/ChenTWL23,
  author       = {Hui Chen and
                  Engang Tian and
                  Licheng Wang and
                  Shuai Liu},
  title        = {A Joint Online Strategy of Measurement Outliers Diagnosis and State
                  of Charge Estimation for Lithium-Ion Batteries},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {19},
  number       = {5},
  pages        = {6387--6397},
  year         = {2023},
  url          = {https://doi.org/10.1109/TII.2022.3202949},
  doi          = {10.1109/TII.2022.3202949},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/ChenTWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmm/ZhangMDWZ23,
  author       = {Zhenrong Zhang and
                  Jiefeng Ma and
                  Jun Du and
                  Licheng Wang and
                  Jianshu Zhang},
  title        = {Multimodal Pre-Training Based on Graph Attention Network for Document
                  Understanding},
  journal      = {{IEEE} Trans. Multim.},
  volume       = {25},
  pages        = {6743--6755},
  year         = {2023},
  url          = {https://doi.org/10.1109/TMM.2022.3214102},
  doi          = {10.1109/TMM.2022.3214102},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmm/ZhangMDWZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/TianCWW23,
  author       = {Engang Tian and
                  Hui Chen and
                  Changsong Wang and
                  Licheng Wang},
  title        = {Security-Ensured State of Charge Estimation of Lithium-Ion Batteries
                  Subject to Malicious Attacks},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {14},
  number       = {3},
  pages        = {2250--2261},
  year         = {2023},
  url          = {https://doi.org/10.1109/TSG.2022.3202811},
  doi          = {10.1109/TSG.2022.3202811},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsg/TianCWW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/WangXYZWC23,
  author       = {Licheng Wang and
                  Luochen Xie and
                  Yu Yang and
                  Youbing Zhang and
                  Kai Wang and
                  Shijie Cheng},
  title        = {Distributed Online Voltage Control With Fast {PV} Power Fluctuations
                  and Imperfect Communication},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {14},
  number       = {5},
  pages        = {3681--3695},
  year         = {2023},
  url          = {https://doi.org/10.1109/TSG.2023.3236724},
  doi          = {10.1109/TSG.2023.3236724},
  timestamp    = {Thu, 14 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsg/WangXYZWC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/HuLWNO23,
  author       = {Xiaoya Hu and
                  Ruiqin Li and
                  Licheng Wang and
                  Yuqiao Ning and
                  Kaoru Ota},
  title        = {A Data Sharing Scheme Based on Federated Learning in IoV},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {72},
  number       = {9},
  pages        = {11644--11656},
  year         = {2023},
  url          = {https://doi.org/10.1109/TVT.2023.3266100},
  doi          = {10.1109/TVT.2023.3266100},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/HuLWNO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisa/ZhangLLWWZ23,
  author       = {Chuan Zhang and
                  Haotian Liang and
                  Zhuopeng Li and
                  Tong Wu and
                  Licheng Wang and
                  Liehuang Zhu},
  editor       = {Jun Shao and
                  Sokratis K. Katsikas and
                  Weizhi Meng},
  title        = {PtbStolen: Pre-trained Encoder Stealing Through Perturbed Samples},
  booktitle    = {Emerging Information Security and Applications - 4th International
                  Conference, {EISA} 2023, Hangzhou, China, December 6-7, 2023, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {2004},
  pages        = {1--19},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-9614-8\_1},
  doi          = {10.1007/978-981-99-9614-8\_1},
  timestamp    = {Thu, 11 Apr 2024 16:38:28 +0200},
  biburl       = {https://dblp.org/rec/conf/eisa/ZhangLLWWZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-02596,
  author       = {Licheng Wang and
                  Tao Wang and
                  Gang Huang and
                  Ruifeng Yan and
                  Kai Wang and
                  Youbing Zhang and
                  Shijie Cheng},
  title        = {A Soft Coordination Method of Heterogeneous Devices in Distribution
                  System Voltage Control},
  journal      = {CoRR},
  volume       = {abs/2305.02596},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.02596},
  doi          = {10.48550/ARXIV.2305.02596},
  eprinttype    = {arXiv},
  eprint       = {2305.02596},
  timestamp    = {Wed, 10 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-02596.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/WangC22,
  author       = {Licheng Wang and
                  Hui Chen},
  title        = {Event-based joint state and fault estimation: The envelope-constrained
                  H{\(\infty\)} criterion},
  journal      = {Appl. Math. Comput.},
  volume       = {419},
  pages        = {126873},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.amc.2021.126873},
  doi          = {10.1016/J.AMC.2021.126873},
  timestamp    = {Mon, 24 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/amc/WangC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/apin/YangXZLWXS22,
  author       = {Sijia Yang and
                  Haoyi Xiong and
                  Yunchao Zhang and
                  Yi Ling and
                  Licheng Wang and
                  Kaibo Xu and
                  Zeyi Sun},
  title        = {{OGM:} Online gaussian graphical models on the fly},
  journal      = {Appl. Intell.},
  volume       = {52},
  number       = {3},
  pages        = {3103--3117},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10489-021-02563-4},
  doi          = {10.1007/S10489-021-02563-4},
  timestamp    = {Tue, 27 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/apin/YangXZLWXS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aslib/ZhangWXSXJW22,
  author       = {Guangyao Zhang and
                  Licheng Wang and
                  Weixi Xie and
                  Furong Shang and
                  Xinlu Xia and
                  Chunlin Jiang and
                  Xianwen Wang},
  title        = {"This article is interesting, however": exploring the language
                  use in the peer review comment of articles published in the {BMJ}},
  journal      = {Aslib J. Inf. Manag.},
  volume       = {74},
  number       = {3},
  pages        = {399--416},
  year         = {2022},
  url          = {https://doi.org/10.1108/AJIM-06-2021-0172},
  doi          = {10.1108/AJIM-06-2021-0172},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aslib/ZhangWXSXJW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/automatica/WangWZW22,
  author       = {Licheng Wang and
                  Zidong Wang and
                  Di Zhao and
                  Guoliang Wei},
  title        = {Event-based state estimation under constrained bit rate: An encoding-decoding
                  approach},
  journal      = {Autom.},
  volume       = {143},
  pages        = {110421},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.automatica.2022.110421},
  doi          = {10.1016/J.AUTOMATICA.2022.110421},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/automatica/WangWZW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/HongSWXWYHL22,
  author       = {Haibo Hong and
                  Jun Shao and
                  Licheng Wang and
                  Mande Xie and
                  Guiyi Wei and
                  Yixian Yang and
                  Song Han and
                  Jianhong Lin},
  title        = {A {CCA} secure public key encryption scheme based on finite groups
                  of Lie type},
  journal      = {Sci. China Inf. Sci.},
  volume       = {65},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11432-019-2704-7},
  doi          = {10.1007/S11432-019-2704-7},
  timestamp    = {Tue, 13 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/HongSWXWYHL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/TongBDLW22,
  author       = {Xiaofei Tong and
                  Jingguo Bi and
                  Yufei Duan and
                  Lixiang Li and
                  Licheng Wang},
  title        = {Security Analysis of {DBTRU} Cryptosystem},
  journal      = {Entropy},
  volume       = {24},
  number       = {10},
  pages        = {1349},
  year         = {2022},
  url          = {https://doi.org/10.3390/e24101349},
  doi          = {10.3390/E24101349},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entropy/TongBDLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijon/WangZZDY22,
  author       = {Licheng Wang and
                  Di Zhao and
                  Yuhan Zhang and
                  Derui Ding and
                  Xiao{-}jian Yi},
  title        = {Gain-scheduled state estimation for discrete-time complex networks
                  under bit-rate constraints},
  journal      = {Neurocomputing},
  volume       = {488},
  pages        = {120--129},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.neucom.2022.03.002},
  doi          = {10.1016/J.NEUCOM.2022.03.002},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijon/WangZZDY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijon/WangZWDL22,
  author       = {Licheng Wang and
                  Di Zhao and
                  Yu{-}Ang Wang and
                  Derui Ding and
                  Hongjian Liu},
  title        = {Partial-neurons-based state estimation for artificial neural networks
                  under constrained bit rate: The finite-time case},
  journal      = {Neurocomputing},
  volume       = {488},
  pages        = {144--153},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.neucom.2022.03.001},
  doi          = {10.1016/J.NEUCOM.2022.03.001},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijon/WangZWDL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsysc/WangLZDY22,
  author       = {Licheng Wang and
                  Shuai Liu and
                  Yuhan Zhang and
                  Derui Ding and
                  Xiao{-}jian Yi},
  title        = {Non-fragile \emph{l}\({}_{\mbox{2}}\)-\emph{l}\({}_{\mbox{{\(\infty\)}}}\)
                  state estimation for time-delayed artificial neural networks: an adaptive
                  event-triggered approach},
  journal      = {Int. J. Syst. Sci.},
  volume       = {53},
  number       = {10},
  pages        = {2247--2259},
  year         = {2022},
  url          = {https://doi.org/10.1080/00207721.2022.2049919},
  doi          = {10.1080/00207721.2022.2049919},
  timestamp    = {Sun, 03 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsysc/WangLZDY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ShenWWDZ22,
  author       = {Xiaoying Shen and
                  Baocang Wang and
                  Licheng Wang and
                  Pu Duan and
                  Benyu Zhang},
  title        = {Group public key encryption supporting equality test without bilinear
                  pairings},
  journal      = {Inf. Sci.},
  volume       = {605},
  pages        = {202--224},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ins.2022.05.001},
  doi          = {10.1016/J.INS.2022.05.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/ShenWWDZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/OdoomHW22,
  author       = {Justice Odoom and
                  Xiaofang Huang and
                  Licheng Wang},
  title        = {Stateless forward-secure key-insulated linkable ring signature scheme
                  in ID-based setting},
  journal      = {J. Syst. Archit.},
  volume       = {129},
  pages        = {102600},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.sysarc.2022.102600},
  doi          = {10.1016/J.SYSARC.2022.102600},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsa/OdoomHW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/YanGSW22,
  author       = {Xingyu Yan and
                  Lize Gu and
                  Jingwen Suo and
                  Licheng Wang},
  title        = {Leveraging the hardness of dihedral coset problem for quantum cryptography},
  journal      = {Quantum Inf. Process.},
  volume       = {21},
  number       = {9},
  pages        = {308},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11128-022-03592-9},
  doi          = {10.1007/S11128-022-03592-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/YanGSW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcasI/WangTWL22,
  author       = {Licheng Wang and
                  Engang Tian and
                  Changsong Wang and
                  Shuai Liu},
  title        = {Secure Estimation Against Malicious Attacks for Lithium-Ion Batteries
                  Under Cloud Environments},
  journal      = {{IEEE} Trans. Circuits Syst. {I} Regul. Pap.},
  volume       = {69},
  number       = {10},
  pages        = {4237--4247},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCSI.2022.3187725},
  doi          = {10.1109/TCSI.2022.3187725},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcasI/WangTWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcyb/LiuWWW22,
  author       = {Shuai Liu and
                  Zidong Wang and
                  Licheng Wang and
                  Guoliang Wei},
  title        = {H{\(\infty\)} Pinning Control of Complex Dynamical Networks Under
                  Dynamic Quantization Effects: {A} Coupled Backward Riccati Equation
                  Approach},
  journal      = {{IEEE} Trans. Cybern.},
  volume       = {52},
  number       = {8},
  pages        = {7377--7387},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCYB.2020.3021982},
  doi          = {10.1109/TCYB.2020.3021982},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcyb/LiuWWW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tie/ChenTW22,
  author       = {Hui Chen and
                  Engang Tian and
                  Licheng Wang},
  title        = {State-of-Charge Estimation of Lithium-Ion Batteries Subject to Random
                  Sensor Data Unavailability: {A} Recursive Filtering Approach},
  journal      = {{IEEE} Trans. Ind. Electron.},
  volume       = {69},
  number       = {5},
  pages        = {5175--5184},
  year         = {2022},
  url          = {https://doi.org/10.1109/TIE.2021.3078376},
  doi          = {10.1109/TIE.2021.3078376},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tie/ChenTW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsmc/LiuWWW22,
  author       = {Shuai Liu and
                  Zidong Wang and
                  Licheng Wang and
                  Guoliang Wei},
  title        = {Recursive Set-Membership State Estimation Over a FlexRay Network},
  journal      = {{IEEE} Trans. Syst. Man Cybern. Syst.},
  volume       = {52},
  number       = {6},
  pages        = {3591--3601},
  year         = {2022},
  url          = {https://doi.org/10.1109/TSMC.2021.3071390},
  doi          = {10.1109/TSMC.2021.3071390},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsmc/LiuWWW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/swarm/WuPLSWK22,
  author       = {Wei Wu and
                  Haipeng Peng and
                  Lixiang Li and
                  Harry Eugene Stanley and
                  Licheng Wang and
                  J{\"{u}}rgen Kurths},
  editor       = {Ying Tan and
                  Yuhui Shi and
                  Ben Niu},
  title        = {A Novel Intelligent Ant Colony System Based on Blockchain},
  booktitle    = {Advances in Swarm Intelligence - 13th International Conference, {ICSI}
                  2022, Xi'an, China, July 15-19, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13344},
  pages        = {230--246},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-09677-8\_20},
  doi          = {10.1007/978-3-031-09677-8\_20},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/swarm/WuPLSWK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2203-13530,
  author       = {Zhenrong Zhang and
                  Jiefeng Ma and
                  Jun Du and
                  Licheng Wang and
                  Jianshu Zhang},
  title        = {Multimodal Pre-training Based on Graph Attention Network for Document
                  Understanding},
  journal      = {CoRR},
  volume       = {abs/2203.13530},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2203.13530},
  doi          = {10.48550/ARXIV.2203.13530},
  eprinttype    = {arXiv},
  eprint       = {2203.13530},
  timestamp    = {Tue, 29 Mar 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2203-13530.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-16993,
  author       = {Xingyu Yan and
                  Licheng Wang and
                  Weiqiang Wen and
                  Ziyi Li and
                  Jingwen Suo and
                  Lize Gu},
  title        = {Post-Quantum {\(\kappa\)}-to-1 Trapdoor Claw-free Functions from Extrapolated
                  Dihedral Cosets},
  journal      = {CoRR},
  volume       = {abs/2211.16993},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.16993},
  doi          = {10.48550/ARXIV.2211.16993},
  eprinttype    = {arXiv},
  eprint       = {2211.16993},
  timestamp    = {Fri, 02 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-16993.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhouZZDHWL22,
  author       = {You Zhou and
                  Zongyang Zhang and
                  Haibin Zhang and
                  Sisi Duan and
                  Bin Hu and
                  Licheng Wang and
                  Jianwei Liu},
  title        = {Dory: Asynchronous {BFT} with Reduced Communication and Improved Efficiency},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1709},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1709},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhouZZDHWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhuWAX21,
  author       = {Huijun Zhu and
                  Licheng Wang and
                  Haseeb Ahmad and
                  Dong Xie},
  title        = {Pairing-Free for Public Key Encryption With Equality Test Scheme},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {77239--77249},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3081709},
  doi          = {10.1109/ACCESS.2021.3081709},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZhuWAX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/apin/YangXXWBS21,
  author       = {Sijia Yang and
                  Haoyi Xiong and
                  Kaibo Xu and
                  Licheng Wang and
                  Jiang Bian and
                  Zeyi Sun},
  title        = {Improving covariance-regularized discriminant analysis for EHR-based
                  predictive analytics of diseases},
  journal      = {Appl. Intell.},
  volume       = {51},
  number       = {1},
  pages        = {377--395},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10489-020-01810-4},
  doi          = {10.1007/S10489-020-01810-4},
  timestamp    = {Tue, 27 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/apin/YangXXWBS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/complexity/WangLSZWSDL21,
  author       = {Kai Wang and
                  Chunli Liu and
                  Jianrui Sun and
                  Kun Zhao and
                  Licheng Wang and
                  Jinyan Song and
                  Chongxiong Duan and
                  Liwei Li},
  title        = {State of Charge Estimation of Composite Energy Storage Systems with
                  Supercapacitors and Lithium Batteries},
  journal      = {Complex.},
  volume       = {2021},
  pages        = {8816250:1--8816250:15},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/8816250},
  doi          = {10.1155/2021/8816250},
  timestamp    = {Fri, 16 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/complexity/WangLSZWSDL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cssp/LiuWW21,
  author       = {Linlin Liu and
                  Guoliang Wei and
                  Licheng Wang},
  title        = {Pinning Synchronization Control for a Class of Dynamical Networks
                  with Coupled Time-Varying Delays: An Interval-Observer-Based Approach},
  journal      = {Circuits Syst. Signal Process.},
  volume       = {40},
  number       = {1},
  pages        = {154--173},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00034-020-01488-6},
  doi          = {10.1007/S00034-020-01488-6},
  timestamp    = {Tue, 19 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cssp/LiuWW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/JadoonLW21,
  author       = {Ahmer Khan Jadoon and
                  Jing Li and
                  Licheng Wang},
  title        = {Physical layer authentication for automotive cyber physical systems
                  based on modified {HB} protocol},
  journal      = {Frontiers Comput. Sci.},
  volume       = {15},
  number       = {3},
  pages        = {153809},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11704-020-0010-4},
  doi          = {10.1007/S11704-020-0010-4},
  timestamp    = {Fri, 01 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/JadoonLW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/information/PanYPGW21,
  author       = {Ping Pan and
                  Junzhi Ye and
                  Yun Pan and
                  Lize Gu and
                  Licheng Wang},
  title        = {New Commitment Schemes Based on Conjugacy Problems over Rubik's Groups},
  journal      = {Inf.},
  volume       = {12},
  number       = {8},
  pages        = {294},
  year         = {2021},
  url          = {https://doi.org/10.3390/info12080294},
  doi          = {10.3390/INFO12080294},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/information/PanYPGW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/MaPZZWJ21,
  author       = {Lichuan Ma and
                  Qingqi Pei and
                  Lu Zhou and
                  Haojin Zhu and
                  Licheng Wang and
                  Yusheng Ji},
  title        = {Federated Data Cleaning: Collaborative and Privacy-Preserving Data
                  Cleaning for Edge Intelligence},
  journal      = {{IEEE} Internet Things J.},
  volume       = {8},
  number       = {8},
  pages        = {6757--6770},
  year         = {2021},
  url          = {https://doi.org/10.1109/JIOT.2020.3027980},
  doi          = {10.1109/JIOT.2020.3027980},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/MaPZZWJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LiWW21,
  author       = {Xin Li and
                  Guoliang Wei and
                  Licheng Wang},
  title        = {Distributed set-membership filtering for discrete-time systems subject
                  to denial-of-service attacks and fading measurements: {A} zonotopic
                  approach},
  journal      = {Inf. Sci.},
  volume       = {547},
  pages        = {49--67},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ins.2020.07.041},
  doi          = {10.1016/J.INS.2020.07.041},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/LiWW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kais/YangXHXWZS21,
  author       = {Sijia Yang and
                  Haoyi Xiong and
                  Di Hu and
                  Kaibo Xu and
                  Licheng Wang and
                  Peizhen Zhu and
                  Zeyi Sun},
  title        = {Generalising combinatorial discriminant analysis through conditioning
                  truncated Rayleigh flow},
  journal      = {Knowl. Inf. Syst.},
  volume       = {63},
  number       = {8},
  pages        = {2189--2208},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10115-021-01587-z},
  doi          = {10.1007/S10115-021-01587-Z},
  timestamp    = {Tue, 27 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/kais/YangXHXWZS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/ShenWPLL21,
  author       = {Xiaoying Shen and
                  Licheng Wang and
                  Qingqi Pei and
                  Yuan Liu and
                  Miaomiao Li},
  title        = {Location privacy-preserving in online taxi-hailing services},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {14},
  number       = {1},
  pages        = {69--81},
  year         = {2021},
  url          = {https://doi.org/10.1007/s12083-020-00982-7},
  doi          = {10.1007/S12083-020-00982-7},
  timestamp    = {Mon, 04 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/ShenWPLL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhouNW21,
  author       = {Yunhong Zhou and
                  Jiehui Nan and
                  Licheng Wang},
  title        = {Fine-Grained Attribute-Based Multikeyword Search for Shared Multiowner
                  in Internet of Things},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {6649119:1--6649119:14},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/6649119},
  doi          = {10.1155/2021/6649119},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhouNW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tac/WangWSW21,
  author       = {Licheng Wang and
                  Zidong Wang and
                  Bo Shen and
                  Guoliang Wei},
  title        = {Recursive Filtering With Measurement Fading: {A} Multiple Description
                  Coding Scheme},
  journal      = {{IEEE} Trans. Autom. Control.},
  volume       = {66},
  number       = {11},
  pages        = {5144--5159},
  year         = {2021},
  url          = {https://doi.org/10.1109/TAC.2020.3034196},
  doi          = {10.1109/TAC.2020.3034196},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tac/WangWSW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcyb/ChenWWS21,
  author       = {Yun Chen and
                  Zidong Wang and
                  Licheng Wang and
                  Weiguo Sheng},
  title        = {Finite-Horizon H\({}_{\mbox{{\(\infty\)}}}\) State Estimation for
                  Stochastic Coupled Networks With Random Inner Couplings Using Round-Robin
                  Protocol},
  journal      = {{IEEE} Trans. Cybern.},
  volume       = {51},
  number       = {3},
  pages        = {1204--1215},
  year         = {2021},
  url          = {https://doi.org/10.1109/TCYB.2020.3004288},
  doi          = {10.1109/TCYB.2020.3004288},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcyb/ChenWWS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tetci/BianYXWFSGW21,
  author       = {Jiang Bian and
                  Sijia Yang and
                  Haoyi Xiong and
                  Licheng Wang and
                  Yanjie Fu and
                  Zeyi Sun and
                  Zhishan Guo and
                  Jun Wang},
  title        = {{CRLEDD:} Regularized Causalities Learning for Early Detection of
                  Diseases Using Electronic Health Record {(EHR)} Data},
  journal      = {{IEEE} Trans. Emerg. Top. Comput. Intell.},
  volume       = {5},
  number       = {4},
  pages        = {541--553},
  year         = {2021},
  url          = {https://doi.org/10.1109/TETCI.2020.3010017},
  doi          = {10.1109/TETCI.2020.3010017},
  timestamp    = {Tue, 27 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tetci/BianYXWFSGW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/TangTWWY21,
  author       = {Zhenhui Tang and
                  Engang Tian and
                  Yongxiong Wang and
                  Licheng Wang and
                  Taicheng Yang},
  title        = {Nondestructive Defect Detection in Castings by Using Spatial Attention
                  Bilinear Convolutional Neural Network},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {17},
  number       = {1},
  pages        = {82--89},
  year         = {2021},
  url          = {https://doi.org/10.1109/TII.2020.2985159},
  doi          = {10.1109/TII.2020.2985159},
  timestamp    = {Sat, 14 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tii/TangTWWY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/GuanWWS21,
  author       = {Qi Guan and
                  Guoliang Wei and
                  Licheng Wang and
                  Yan Song},
  title        = {A Novel Feature Points Tracking Algorithm in Terms of IMU-Aided Information
                  Fusion},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {17},
  number       = {8},
  pages        = {5304--5313},
  year         = {2021},
  url          = {https://doi.org/10.1109/TII.2020.3024079},
  doi          = {10.1109/TII.2020.3024079},
  timestamp    = {Fri, 18 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/GuanWWS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/Pattaranantakul21,
  author       = {Montida Pattaranantakul and
                  Qipeng Song and
                  Yanmei Tian and
                  Licheng Wang and
                  Zonghua Zhang and
                  Ahmed Meddahi and
                  Chalee Vorakulpipat},
  title        = {On Achieving Trustworthy Service Function Chaining},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {18},
  number       = {3},
  pages        = {3140--3153},
  year         = {2021},
  url          = {https://doi.org/10.1109/TNSM.2021.3081014},
  doi          = {10.1109/TNSM.2021.3081014},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnsm/Pattaranantakul21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssps/WangXL21,
  author       = {Licheng Wang and
                  Yougen Xu and
                  Zhiwen Liu},
  title        = {A Closed-Form Target Localization Method for {FDA-MIMO} Based on root-MUSIC
                  and {ESPRIT} Algorithm},
  booktitle    = {{SSPS} 2021: The 3rd International Symposium on Signal Processing
                  Systems, Beijing China, March 26 - 28, 2021},
  pages        = {19--24},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3481113.3481115},
  doi          = {10.1145/3481113.3481115},
  timestamp    = {Tue, 15 Feb 2022 19:07:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ssps/WangXL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ShenWZL20,
  author       = {Xiaoying Shen and
                  Licheng Wang and
                  Huijun Zhu and
                  Yuan Liu},
  title        = {A Multivariate Public Key Encryption Scheme With Equality Test},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {75463--75472},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2988732},
  doi          = {10.1109/ACCESS.2020.2988732},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ShenWZL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/PanPWW20,
  author       = {Ping Pan and
                  Yun Pan and
                  Zhen Wang and
                  Licheng Wang},
  title        = {Provably Secure Encryption Schemes With Zero Setup and Linear Speed
                  by Using Rubik's Cubes},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {122251--122258},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3007335},
  doi          = {10.1109/ACCESS.2020.3007335},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/PanPWW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/ZhouZW20,
  author       = {Yunhong Zhou and
                  Shihui Zheng and
                  Licheng Wang},
  title        = {Privacy-Preserving and Efficient Public Key Encryption with Keyword
                  Search Based on {CP-ABE} in Cloud},
  journal      = {Cryptogr.},
  volume       = {4},
  number       = {4},
  pages        = {28},
  year         = {2020},
  url          = {https://doi.org/10.3390/cryptography4040028},
  doi          = {10.3390/CRYPTOGRAPHY4040028},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/ZhouZW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/ZhouLTAW20,
  author       = {Yunhong Zhou and
                  Na Li and
                  Yanmei Tian and
                  Dezhi An and
                  Licheng Wang},
  title        = {Public Key Encryption with Keyword Search in Cloud: {A} Survey},
  journal      = {Entropy},
  volume       = {22},
  number       = {4},
  pages        = {421},
  year         = {2020},
  url          = {https://doi.org/10.3390/e22040421},
  doi          = {10.3390/E22040421},
  timestamp    = {Fri, 25 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entropy/ZhouLTAW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/LiuWSL20,
  author       = {Yuan Liu and
                  Licheng Wang and
                  Xiaoying Shen and
                  Lixiang Li},
  title        = {New Constructions of Identity-Based Dual Receiver Encryption from
                  Lattices},
  journal      = {Entropy},
  volume       = {22},
  number       = {6},
  pages        = {599},
  year         = {2020},
  url          = {https://doi.org/10.3390/e22060599},
  doi          = {10.3390/E22060599},
  timestamp    = {Fri, 25 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entropy/LiuWSL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/HuZZW20,
  author       = {Xiaoya Hu and
                  Hong Zhao and
                  Shihui Zheng and
                  Licheng Wang},
  title        = {{CBOL:} Cross-Bank Over-Loan Prevention, Revisited},
  journal      = {Entropy},
  volume       = {22},
  number       = {6},
  pages        = {619},
  year         = {2020},
  url          = {https://doi.org/10.3390/e22060619},
  doi          = {10.3390/E22060619},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entropy/HuZZW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/ZhaoBZW20,
  author       = {Hong Zhao and
                  Xue Bai and
                  Shihui Zheng and
                  Licheng Wang},
  title        = {RZcoin: Ethereum-Based Decentralized Payment with Optional Privacy
                  Service},
  journal      = {Entropy},
  volume       = {22},
  number       = {7},
  pages        = {712},
  year         = {2020},
  url          = {https://doi.org/10.3390/e22070712},
  doi          = {10.3390/E22070712},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entropy/ZhaoBZW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/ZhangLGZW20,
  author       = {Yuan Zhang and
                  Yuan Liu and
                  Yurong Guo and
                  Shihui Zheng and
                  Licheng Wang},
  title        = {Adaptively Secure Efficient {(H)IBE} over Ideal Lattice with Short
                  Parameters},
  journal      = {Entropy},
  volume       = {22},
  number       = {11},
  pages        = {1247},
  year         = {2020},
  url          = {https://doi.org/10.3390/e22111247},
  doi          = {10.3390/E22111247},
  timestamp    = {Thu, 31 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entropy/ZhangLGZW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijon/TianWWZ20,
  author       = {Xin Tian and
                  Guoliang Wei and
                  Licheng Wang and
                  Jun Zhou},
  title        = {Wireless-sensor-network-based target localization: {A} semidefinite
                  relaxation approach with adaptive threshold correction},
  journal      = {Neurocomputing},
  volume       = {405},
  pages        = {229--238},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.neucom.2020.04.046},
  doi          = {10.1016/J.NEUCOM.2020.04.046},
  timestamp    = {Wed, 15 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijon/TianWWZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsysc/WeiLWD20,
  author       = {Guoliang Wei and
                  Linlin Liu and
                  Licheng Wang and
                  Derui Ding},
  title        = {Event-triggered control for discrete-time systems with unknown nonlinearities:
                  an interval observer-based approach},
  journal      = {Int. J. Syst. Sci.},
  volume       = {51},
  number       = {6},
  pages        = {1019--1031},
  year         = {2020},
  url          = {https://doi.org/10.1080/00207721.2020.1746441},
  doi          = {10.1080/00207721.2020.1746441},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsysc/WeiLWD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/HanLZXRHWS20,
  author       = {Song Han and
                  Jianhong Lin and
                  Shuai Zhao and
                  Guangquan Xu and
                  Siqi Ren and
                  Daojing He and
                  Licheng Wang and
                  Leyun Shi},
  title        = {Location Privacy-Preserving Distance Computation for Spatial Crowdsourcing},
  journal      = {{IEEE} Internet Things J.},
  volume       = {7},
  number       = {8},
  pages        = {7550--7563},
  year         = {2020},
  url          = {https://doi.org/10.1109/JIOT.2020.2985454},
  doi          = {10.1109/JIOT.2020.2985454},
  timestamp    = {Tue, 13 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/HanLZXRHWS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itc/NiuWT20,
  author       = {Guochen Niu and
                  Licheng Wang and
                  Zheng Tan},
  title        = {Mismatch Removal Based on Gaussian Mixture Model for Aircraft Surface
                  Texture Mapping},
  journal      = {Inf. Technol. Control.},
  volume       = {49},
  number       = {1},
  pages        = {80--87},
  year         = {2020},
  url          = {https://doi.org/10.5755/j01.itc.49.1.22855},
  doi          = {10.5755/J01.ITC.49.1.22855},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itc/NiuWT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kybernetika/XuZW20,
  author       = {Lili Xu and
                  Sunjie Zhang and
                  Licheng Wang},
  title        = {Distributed resilient filtering of large-scale systems with channel
                  scheduling},
  journal      = {Kybernetika},
  volume       = {56},
  number       = {1},
  pages        = {170--188},
  year         = {2020},
  url          = {https://doi.org/10.14736/kyb-2020-1-0170},
  doi          = {10.14736/KYB-2020-1-0170},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/kybernetika/XuZW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/SuoWYZZ20,
  author       = {Jingwen Suo and
                  Licheng Wang and
                  Sijia Yang and
                  Wenjie Zheng and
                  Jiankang Zhang},
  title        = {Quantum algorithms for typical hard problems: a perspective of cryptanalysis},
  journal      = {Quantum Inf. Process.},
  volume       = {19},
  number       = {6},
  pages        = {178},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11128-020-02673-x},
  doi          = {10.1007/S11128-020-02673-X},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/SuoWYZZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiuWSLA20,
  author       = {Yuan Liu and
                  Licheng Wang and
                  Xiaoying Shen and
                  Lixiang Li and
                  Dezhi An},
  title        = {Space-Efficient Key-Policy Attribute-Based Encryption from Lattices
                  and Two-Dimensional Attributes},
  journal      = {Secur. Commun. Networks},
  volume       = {2020},
  pages        = {2345369:1--2345369:11},
  year         = {2020},
  url          = {https://doi.org/10.1155/2020/2345369},
  doi          = {10.1155/2020/2345369},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiuWSLA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnn/ChenWWS20,
  author       = {Yun Chen and
                  Zidong Wang and
                  Licheng Wang and
                  Weiguo Sheng},
  title        = {Mixed {\textdollar}H{\_}2/H{\_}{\textbackslash}infty{\textdollar}
                  State Estimation for Discrete-Time Switched Complex Networks With
                  Random Coupling Strengths Through Redundant Channels},
  journal      = {{IEEE} Trans. Neural Networks Learn. Syst.},
  volume       = {31},
  number       = {10},
  pages        = {4130--4142},
  year         = {2020},
  url          = {https://doi.org/10.1109/TNNLS.2019.2952249},
  doi          = {10.1109/TNNLS.2019.2952249},
  timestamp    = {Fri, 25 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnn/ChenWWS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhaoCDSWL20,
  author       = {Xiaopeng Zhao and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Jun Shao and
                  Licheng Wang and
                  Zhusen Liu},
  editor       = {Joseph K. Liu and
                  Hui Cui},
  title        = {New Assumptions and Efficient Cryptosystems from the e-th Power Residue
                  Symbol},
  booktitle    = {Information Security and Privacy - 25th Australasian Conference, {ACISP}
                  2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12248},
  pages        = {408--424},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-55304-3\_21},
  doi          = {10.1007/978-3-030-55304-3\_21},
  timestamp    = {Sat, 20 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhaoCDSWL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/KangLYXA0FWD20,
  author       = {Qi Kang and
                  Ji Liu and
                  Sijia Yang and
                  Haoyi Xiong and
                  Haozhe An and
                  Xingjian Li and
                  Zhi Feng and
                  Licheng Wang and
                  Dejing Dou},
  editor       = {Xintao Wu and
                  Chris Jermaine and
                  Li Xiong and
                  Xiaohua Hu and
                  Olivera Kotevska and
                  Siyuan Lu and
                  Weija Xu and
                  Srinivas Aluru and
                  Chengxiang Zhai and
                  Eyhab Al{-}Masri and
                  Zhiyuan Chen and
                  Jeff Saltz},
  title        = {Quasi-optimal Data Placement for Secure Multi-tenant Data Federation
                  on the Cloud},
  booktitle    = {2020 {IEEE} International Conference on Big Data {(IEEE} BigData 2020),
                  Atlanta, GA, USA, December 10-13, 2020},
  pages        = {1954--1963},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/BigData50022.2020.9377953},
  doi          = {10.1109/BIGDATA50022.2020.9377953},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bigdataconf/KangLYXA0FWD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/Wang0PW20,
  author       = {Cong Wang and
                  Chen Chen and
                  Qingqi Pei and
                  Licheng Wang},
  title        = {{IDDS:} An {ICN} based Data Dissemination Scheme for Vehicular Networks},
  booktitle    = {2020 {IEEE} International Conference on Communications, {ICC} 2020,
                  Dublin, Ireland, June 7-11, 2020},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICC40277.2020.9148865},
  doi          = {10.1109/ICC40277.2020.9148865},
  timestamp    = {Wed, 20 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/Wang0PW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhaoCDSWL20,
  author       = {Xiaopeng Zhao and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Jun Shao and
                  Licheng Wang and
                  Zhusen Liu},
  title        = {New Assumptions and Efficient Cryptosystems from the e-th Power Residue
                  Symbol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {245},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/245},
  timestamp    = {Sat, 20 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhaoCDSWL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/au/Wang19b,
  author       = {Licheng Wang},
  title        = {Impacts of large-scale {PV} integration on power distribution systems
                  and investigation of possible solutions},
  school       = {University of Queensland, Australia},
  year         = {2019},
  url          = {https://doi.org/10.14264/uql.2019.809},
  doi          = {10.14264/UQL.2019.809},
  timestamp    = {Sat, 28 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/au/Wang19b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LiuWLY19,
  author       = {Yuan Liu and
                  Licheng Wang and
                  Lixiang Li and
                  Xixi Yan},
  title        = {Secure and Efficient Multi-Authority Attribute-Based Encryption Scheme
                  From Lattices},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {3665--3674},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2018.2888850},
  doi          = {10.1109/ACCESS.2018.2888850},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LiuWLY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LiWCW19,
  author       = {Yonggang Li and
                  Yun Wu and
                  Chaoyuan Cui and
                  Licheng Wang},
  title        = {{RMVP:} {A} Real-Time Method to Monitor Random Processes of Virtual
                  Machine},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {15845--15860},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2893627},
  doi          = {10.1109/ACCESS.2019.2893627},
  timestamp    = {Tue, 30 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LiWCW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LiuWWSL19,
  author       = {Zhanqiang Liu and
                  Licheng Wang and
                  Xianmin Wang and
                  Xiaoying Shen and
                  Lixiang Li},
  title        = {Secure Remote Sensing Image Registration Based on Compressed Sensing
                  in Cloud Setting},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {36516--36526},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2903826},
  doi          = {10.1109/ACCESS.2019.2903826},
  timestamp    = {Sat, 13 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LiuWWSL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WangTPY19,
  author       = {Licheng Wang and
                  Yanmei Tian and
                  Yun Pan and
                  Yixian Yang},
  title        = {New Construction of Blind Signatures From Braid Groups},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {36549--36557},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2904146},
  doi          = {10.1109/ACCESS.2019.2904146},
  timestamp    = {Tue, 16 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/WangTPY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LvWZDG19,
  author       = {Pin Lv and
                  Licheng Wang and
                  Huijun Zhu and
                  Wenbo Deng and
                  Lize Gu},
  title        = {An IOT-Oriented Privacy-Preserving Publish/Subscribe Model Over Blockchains},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {41309--41314},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2907599},
  doi          = {10.1109/ACCESS.2019.2907599},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LvWZDG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/YanWLAYY19,
  author       = {Jianhua Yan and
                  Licheng Wang and
                  Muzi Li and
                  Haseeb Ahmad and
                  Jun Yue and
                  Wenbin Yao},
  title        = {Attribute-Based Signcryption From Lattices in the Standard Model},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {56039--56050},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2900003},
  doi          = {10.1109/ACCESS.2019.2900003},
  timestamp    = {Fri, 31 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/YanWLAYY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LiW19h,
  author       = {Miaomiao Li and
                  Licheng Wang},
  title        = {A Survey on Personalized News Recommendation Technology},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {145861--145879},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2944927},
  doi          = {10.1109/ACCESS.2019.2944927},
  timestamp    = {Thu, 07 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/LiW19h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/YangBWZFX19,
  author       = {Sijia Yang and
                  Jiang Bian and
                  Licheng Wang and
                  Haojin Zhu and
                  Yanjie Fu and
                  Haoyi Xiong},
  title        = {EdgeSense: Edge-Mediated Spatial- Temporal Crowdsensing},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {1495122--95131},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2018.2870298},
  doi          = {10.1109/ACCESS.2018.2870298},
  timestamp    = {Wed, 16 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/YangBWZFX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bmcbi/WangSPL19,
  author       = {Licheng Wang and
                  Jingwen Suo and
                  Yun Pan and
                  Lixiang Li},
  title        = {DDmap: a {MATLAB} package for the double digest problem using multiple
                  genetic operators},
  journal      = {{BMC} Bioinform.},
  volume       = {20},
  number       = {1},
  pages        = {348:1--348:12},
  year         = {2019},
  url          = {https://doi.org/10.1186/s12859-019-2862-x},
  doi          = {10.1186/S12859-019-2862-X},
  timestamp    = {Sat, 13 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bmcbi/WangSPL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/HongWSYAWXY19,
  author       = {Haibo Hong and
                  Licheng Wang and
                  Jun Shao and
                  Jianhua Yan and
                  Haseeb Ahmad and
                  Guiyi Wei and
                  Mande Xie and
                  Yixian Yang},
  title        = {A Miniature {CCA} Public Key Encryption Scheme Based on Non-abelian
                  Factorization Problem in Finite Groups of Lie Type},
  journal      = {Comput. J.},
  volume       = {62},
  number       = {12},
  pages        = {1840--1848},
  year         = {2019},
  url          = {https://doi.org/10.1093/comjnl/bxz068},
  doi          = {10.1093/COMJNL/BXZ068},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/HongWSYAWXY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/complexity/HuangWW19,
  author       = {Yinuo Huang and
                  Licheng Wang and
                  Kai Wang},
  title        = {Investigation of Var Compensation Schemes in Unbalanced Distribution
                  Systems},
  journal      = {Complex.},
  volume       = {2019},
  pages        = {7824743:1--7824743:13},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/7824743},
  doi          = {10.1155/2019/7824743},
  timestamp    = {Wed, 11 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/complexity/HuangWW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/LiWWWHL19,
  author       = {Jing Li and
                  Licheng Wang and
                  Lihua Wang and
                  Xianmin Wang and
                  Zhengan Huang and
                  Jin Li},
  title        = {Verifiable Chebyshev maps-based chaotic encryption schemes with outsourcing
                  computations in the cloud/fog scenarios},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {31},
  number       = {22},
  year         = {2019},
  url          = {https://doi.org/10.1002/cpe.4523},
  doi          = {10.1002/CPE.4523},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/LiWWWHL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/WangLLLGL19,
  author       = {Licheng Wang and
                  Lixiang Li and
                  Jin Li and
                  Jing Li and
                  Brij B. Gupta and
                  Xia Liu},
  title        = {Compressive Sensing of Medical Images With Confidentially Homomorphic
                  Aggregations},
  journal      = {{IEEE} Internet Things J.},
  volume       = {6},
  number       = {2},
  pages        = {1402--1409},
  year         = {2019},
  url          = {https://doi.org/10.1109/JIOT.2018.2844727},
  doi          = {10.1109/JIOT.2018.2844727},
  timestamp    = {Sat, 13 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/WangLLLGL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/WangMZTO19,
  author       = {Licheng Wang and
                  Yan Meng and
                  Haojin Zhu and
                  Minxing Tang and
                  Kaoru Ota},
  title        = {Edge-Assisted Stream Scheduling Scheme for the Green-Communication-Based
                  IoT},
  journal      = {{IEEE} Internet Things J.},
  volume       = {6},
  number       = {4},
  pages        = {7282--7292},
  year         = {2019},
  url          = {https://doi.org/10.1109/JIOT.2019.2915793},
  doi          = {10.1109/JIOT.2019.2915793},
  timestamp    = {Mon, 27 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/WangMZTO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/WangWWA19,
  author       = {Licheng Wang and
                  Zidong Wang and
                  Guoliang Wei and
                  Fuad E. Alsaadi},
  title        = {Variance-constrained \emph{H}\({}_{\mbox{{\(\infty\)}}}\) state estimation
                  for time-varying multi-rate systems with redundant channels: The finite-horizon
                  case},
  journal      = {Inf. Sci.},
  volume       = {501},
  pages        = {222--235},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ins.2019.05.073},
  doi          = {10.1016/J.INS.2019.05.073},
  timestamp    = {Thu, 08 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/WangWWA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/WangSLSY19,
  author       = {Licheng Wang and
                  Xiaoying Shen and
                  Jing Li and
                  Jun Shao and
                  Yixian Yang},
  title        = {Cryptographic primitives in blockchains},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {127},
  pages        = {43--58},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jnca.2018.11.003},
  doi          = {10.1016/J.JNCA.2018.11.003},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/WangSLSY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpdc/LiWHWX19,
  author       = {Jing Li and
                  Xianmin Wang and
                  Zhengan Huang and
                  Licheng Wang and
                  Yang Xiang},
  title        = {Multi-level multi-secret sharing scheme for decentralized e-voting
                  in cloud computing},
  journal      = {J. Parallel Distributed Comput.},
  volume       = {130},
  pages        = {91--97},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jpdc.2019.04.003},
  doi          = {10.1016/J.JPDC.2019.04.003},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpdc/LiWHWX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcyb/WangWWA19,
  author       = {Licheng Wang and
                  Zidong Wang and
                  Guoliang Wei and
                  Fuad E. Alsaadi},
  title        = {Observer-Based Consensus Control for Discrete-Time Multiagent Systems
                  With Coding-Decoding Communication Protocol},
  journal      = {{IEEE} Trans. Cybern.},
  volume       = {49},
  number       = {12},
  pages        = {4335--4345},
  year         = {2019},
  url          = {https://doi.org/10.1109/TCYB.2018.2863664},
  doi          = {10.1109/TCYB.2018.2863664},
  timestamp    = {Sat, 30 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcyb/WangWWA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/FengHXSYZWCYL19,
  author       = {Zhi Feng and
                  Jun Huan and
                  Haoyi Xiong and
                  Chuanyuan Song and
                  Sijia Yang and
                  Baoxin Zhao and
                  Licheng Wang and
                  Zeyu Chen and
                  Shengwen Yang and
                  Liping Liu},
  editor       = {Chaitanya K. Baru and
                  Jun Huan and
                  Latifur Khan and
                  Xiaohua Hu and
                  Ronay Ak and
                  Yuanyuan Tian and
                  Roger S. Barga and
                  Carlo Zaniolo and
                  Kisung Lee and
                  Yanfang (Fanny) Ye},
  title        = {SecureGBM: Secure Multi-Party Gradient Boosting},
  booktitle    = {2019 {IEEE} International Conference on Big Data {(IEEE} BigData),
                  Los Angeles, CA, USA, December 9-12, 2019},
  pages        = {1312--1321},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/BigData47090.2019.9006000},
  doi          = {10.1109/BIGDATA47090.2019.9006000},
  timestamp    = {Tue, 18 Oct 2022 14:44:48 +0200},
  biburl       = {https://dblp.org/rec/conf/bigdataconf/FengHXSYZWCYL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/BaiWZYL19,
  author       = {Xue Bai and
                  Licheng Wang and
                  Lijing Zhou and
                  Sijia Yang and
                  Lixiang Li},
  title        = {RZcash: {A} Privacy Protection Scheme for the Account-based Blockchain},
  booktitle    = {17th International Conference on Privacy, Security and Trust, {PST}
                  2019, Fredericton, NB, Canada, August 26-28, 2019},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/PST47121.2019.8949060},
  doi          = {10.1109/PST47121.2019.8949060},
  timestamp    = {Sat, 13 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pst/BaiWZYL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/HuWZLY19,
  author       = {Xiaoya Hu and
                  Licheng Wang and
                  Lijing Zhou and
                  Lixiang Li and
                  Sijia Yang},
  title        = {A blockchain-based loan over-prevention mechanism},
  booktitle    = {17th International Conference on Privacy, Security and Trust, {PST}
                  2019, Fredericton, NB, Canada, August 26-28, 2019},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/PST47121.2019.8949077},
  doi          = {10.1109/PST47121.2019.8949077},
  timestamp    = {Sat, 13 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pst/HuWZLY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/Pattaranantakul19,
  author       = {Montida Pattaranantakul and
                  Qipeng Song and
                  Yanmei Tian and
                  Licheng Wang and
                  Zonghua Zhang and
                  Ahmed Meddahi},
  editor       = {Songqing Chen and
                  Kim{-}Kwang Raymond Choo and
                  Xinwen Fu and
                  Wenjing Lou and
                  Aziz Mohaisen},
  title        = {Footprints: Ensuring Trusted Service Function Chaining in the World
                  of {SDN} and {NFV}},
  booktitle    = {Security and Privacy in Communication Networks - 15th {EAI} International
                  Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019,
                  Proceedings, Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {305},
  pages        = {287--301},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-37231-6\_16},
  doi          = {10.1007/978-3-030-37231-6\_16},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/Pattaranantakul19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1911-11997,
  author       = {Zhi Feng and
                  Haoyi Xiong and
                  Chuanyuan Song and
                  Sijia Yang and
                  Baoxin Zhao and
                  Licheng Wang and
                  Zeyu Chen and
                  Shengwen Yang and
                  Liping Liu and
                  Jun Huan},
  title        = {SecureGBM: Secure Multi-Party Gradient Boosting},
  journal      = {CoRR},
  volume       = {abs/1911.11997},
  year         = {2019},
  url          = {http://arxiv.org/abs/1911.11997},
  eprinttype    = {arXiv},
  eprint       = {1911.11997},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1911-11997.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/QiuXAW18,
  author       = {Shuming Qiu and
                  Guoai Xu and
                  Haseeb Ahmad and
                  Licheng Wang},
  title        = {A Robust Mutual Authentication Scheme Based on Elliptic Curve Cryptography
                  for Telecare Medical Information Systems},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {7452--7463},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2017.2780124},
  doi          = {10.1109/ACCESS.2017.2780124},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/QiuXAW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HuangYW18,
  author       = {Qinlong Huang and
                  Yixian Yang and
                  Licheng Wang},
  title        = {Correction to "Secure Data Access Control With Ciphertext Update
                  and Computation Outsourcing in Fog Computing for Internet of Things"},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {17245},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2823178},
  doi          = {10.1109/ACCESS.2018.2823178},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/HuangYW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhouWSL18,
  author       = {Lijing Zhou and
                  Licheng Wang and
                  Yiru Sun and
                  Pin Lv},
  title        = {BeeKeeper: {A} Blockchain-Based IoT System With Secure Storage and
                  Homomorphic Computation},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {43472--43488},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2847632},
  doi          = {10.1109/ACCESS.2018.2847632},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZhouWSL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhouWSA18,
  author       = {Lijing Zhou and
                  Licheng Wang and
                  Yi{-}Ru Sun and
                  Tianyi Ai},
  title        = {AntNest: Fully Non-Interactive Secure Multi-Party Computation},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {75639--75649},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2883775},
  doi          = {10.1109/ACCESS.2018.2883775},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZhouWSA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/AhmadDWAHY18,
  author       = {Haseeb Ahmad and
                  Ali Daud and
                  Licheng Wang and
                  Ibrar Ahmad and
                  Muhammad Hafeez and
                  Yixian Yang},
  title        = {Quantifying team precedence in the game of cricket},
  journal      = {Clust. Comput.},
  volume       = {21},
  number       = {1},
  pages        = {523--537},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10586-017-0919-z},
  doi          = {10.1007/S10586-017-0919-Z},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cluster/AhmadDWAHY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/WangZDWCY18,
  author       = {Licheng Wang and
                  Zonghua Zhang and
                  Mianxiong Dong and
                  Lihua Wang and
                  Zhenfu Cao and
                  Yixian Yang},
  title        = {Securing Named Data Networking: Attribute-Based Encryption and Beyond},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {56},
  number       = {11},
  pages        = {76--81},
  year         = {2018},
  url          = {https://doi.org/10.1109/MCOM.2018.1701123},
  doi          = {10.1109/MCOM.2018.1701123},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/WangZDWCY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/AhmadWHLDAY18,
  author       = {Haseeb Ahmad and
                  Licheng Wang and
                  Haibo Hong and
                  Jing Li and
                  Hassan Dawood and
                  Manzoor Ahmed and
                  Yixian Yang},
  title        = {Primitives towards verifiable computation: a survey},
  journal      = {Frontiers Comput. Sci.},
  volume       = {12},
  number       = {3},
  pages        = {451--478},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11704-016-6148-4},
  doi          = {10.1007/S11704-016-6148-4},
  timestamp    = {Sat, 31 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fcsc/AhmadWHLDAY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/LiWNGQ18,
  author       = {Jing Li and
                  Licheng Wang and
                  Xinxin Niu and
                  Lize Gu and
                  Zhiguo Qu},
  title        = {Star-Topological Encryption: Talking to the Sever but Hiding Identities
                  to Others},
  journal      = {Fundam. Informaticae},
  volume       = {157},
  number       = {1-2},
  pages        = {29--46},
  year         = {2018},
  url          = {https://doi.org/10.3233/FI-2018-1616},
  doi          = {10.3233/FI-2018-1616},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/LiWNGQ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/WangLGYQ18,
  author       = {Licheng Wang and
                  Jing Li and
                  Lize Gu and
                  Jianhua Yan and
                  Zhiguo Qu},
  title        = {An Efficient Construction of Quantum Attack Resistant Proxy Re-Encryption
                  Based on (Semi)group Factorization Problems},
  journal      = {Fundam. Informaticae},
  volume       = {157},
  number       = {1-2},
  pages        = {47--62},
  year         = {2018},
  url          = {https://doi.org/10.3233/FI-2018-1617},
  doi          = {10.3233/FI-2018-1617},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/WangLGYQ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeejas/WangWLW18,
  author       = {Zidong Wang and
                  Licheng Wang and
                  Shuai Liu and
                  Guoliang Wei},
  title        = {Encoding-Decoding-Based control and filtering of networked systems:
                  insights, developments and opportunities},
  journal      = {{IEEE} {CAA} J. Autom. Sinica},
  volume       = {5},
  number       = {1},
  pages        = {3--18},
  year         = {2018},
  url          = {https://doi.org/10.1109/JAS.2017.7510727},
  doi          = {10.1109/JAS.2017.7510727},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeejas/WangWLW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LiuWWW18,
  author       = {Shuai Liu and
                  Zidong Wang and
                  Licheng Wang and
                  Guoliang Wei},
  title        = {On quantized H{\(\infty\)} filtering for multi-rate systems under
                  stochastic communication protocols: The finite-horizon case},
  journal      = {Inf. Sci.},
  volume       = {459},
  pages        = {211--223},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ins.2018.02.050},
  doi          = {10.1016/J.INS.2018.02.050},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/LiuWWW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/ZhuWQN18,
  author       = {Huijun Zhu and
                  Licheng Wang and
                  Shuming Qiu and
                  Xinxin Niu},
  title        = {New Public Key Encryption with Equality Test Based on non-Abelian
                  Factorization Problems},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {12},
  number       = {2},
  pages        = {764--785},
  year         = {2018},
  url          = {https://doi.org/10.3837/tiis.2018.02.013},
  doi          = {10.3837/TIIS.2018.02.013},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itiis/ZhuWQN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jms/ZhouWS18,
  author       = {Lijing Zhou and
                  Licheng Wang and
                  Yiru Sun},
  title        = {MIStore: a Blockchain-Based Medical Insurance Storage System},
  journal      = {J. Medical Syst.},
  volume       = {42},
  number       = {8},
  pages        = {149:1--149:17},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10916-018-0996-4},
  doi          = {10.1007/S10916-018-0996-4},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jms/ZhouWS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/ZhouWAS18,
  author       = {Lijing Zhou and
                  Licheng Wang and
                  Tianyi Ai and
                  Yiru Sun},
  title        = {BeeKeeper 2.0: Confidential Blockchain-Enabled IoT System with Fully
                  Homomorphic Computation},
  journal      = {Sensors},
  volume       = {18},
  number       = {11},
  pages        = {3785},
  year         = {2018},
  url          = {https://doi.org/10.3390/s18113785},
  doi          = {10.3390/S18113785},
  timestamp    = {Sat, 30 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/ZhouWAS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/LiLWHAN18,
  author       = {Jing Li and
                  Xiong Li and
                  Licheng Wang and
                  Debiao He and
                  Haseeb Ahmad and
                  Xinxin Niu},
  title        = {Fuzzy encryption in cloud computation: efficient verifiable outsourced
                  attribute-based encryption},
  journal      = {Soft Comput.},
  volume       = {22},
  number       = {3},
  pages        = {707--714},
  year         = {2018},
  url          = {https://doi.org/10.1007/s00500-017-2482-1},
  doi          = {10.1007/S00500-017-2482-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/soco/LiLWHAN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcyb/WangWHW18,
  author       = {Licheng Wang and
                  Zidong Wang and
                  Qing{-}Long Han and
                  Guoliang Wei},
  title        = {Event-Based Variance-Constrained {\textdollar}\{{\textbackslash}mathcal
                  \{H\}\}{\_}\{{\textbackslash}infty \}{\textdollar} Filtering for Stochastic
                  Parameter Systems Over Sensor Networks With Successive Missing Measurements},
  journal      = {{IEEE} Trans. Cybern.},
  volume       = {48},
  number       = {3},
  pages        = {1007--1017},
  year         = {2018},
  url          = {https://doi.org/10.1109/TCYB.2017.2671032},
  doi          = {10.1109/TCYB.2017.2671032},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcyb/WangWHW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcyb/WangWHW18a,
  author       = {Licheng Wang and
                  Zidong Wang and
                  Qing{-}Long Han and
                  Guoliang Wei},
  title        = {Synchronization Control for a Class of Discrete-Time Dynamical Networks
                  With Packet Dropouts: {A} Coding-Decoding-Based Approach},
  journal      = {{IEEE} Trans. Cybern.},
  volume       = {48},
  number       = {8},
  pages        = {2437--2448},
  year         = {2018},
  url          = {https://doi.org/10.1109/TCYB.2017.2740309},
  doi          = {10.1109/TCYB.2017.2740309},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcyb/WangWHW18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnn/WangWWA18,
  author       = {Licheng Wang and
                  Zidong Wang and
                  Guoliang Wei and
                  Fuad E. Alsaadi},
  title        = {Finite-Time State Estimation for Recurrent Delayed Neural Networks
                  With Component-Based Event-Triggering Protocol},
  journal      = {{IEEE} Trans. Neural Networks Learn. Syst.},
  volume       = {29},
  number       = {4},
  pages        = {1046--1057},
  year         = {2018},
  url          = {https://doi.org/10.1109/TNNLS.2016.2635080},
  doi          = {10.1109/TNNLS.2016.2635080},
  timestamp    = {Mon, 09 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnn/WangWWA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ZhouWS18,
  author       = {Lijing Zhou and
                  Licheng Wang and
                  Yiru Sun},
  title        = {On Efficient Constructions of Lightweight {MDS} Matrices},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2018},
  number       = {1},
  pages        = {180--200},
  year         = {2018},
  url          = {https://doi.org/10.13154/tosc.v2018.i1.180-200},
  doi          = {10.13154/TOSC.V2018.I1.180-200},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/ZhouWS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/YanLSWH18,
  author       = {Ruifeng Yan and
                  Yong Li and
                  Tapan Kumar Saha and
                  Licheng Wang and
                  Mohammed Imran Hossain},
  title        = {Modeling and Analysis of Open-Delta Step Voltage Regulators for Unbalanced
                  Distribution Network With Photovoltaic Power Generation},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {9},
  number       = {3},
  pages        = {2224--2234},
  year         = {2018},
  url          = {https://doi.org/10.1109/TSG.2016.2609440},
  doi          = {10.1109/TSG.2016.2609440},
  timestamp    = {Wed, 11 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsg/YanLSWH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/WangYS18,
  author       = {Licheng Wang and
                  Ruifeng Yan and
                  Tapan Kumar Saha},
  title        = {Voltage Management for Large Scale {PV} Integration into Weak Distribution
                  Systems},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {9},
  number       = {5},
  pages        = {4128--4139},
  year         = {2018},
  url          = {https://doi.org/10.1109/TSG.2017.2651030},
  doi          = {10.1109/TSG.2017.2651030},
  timestamp    = {Thu, 13 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsg/WangYS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/JadoonWLZ18,
  author       = {Ahmer Khan Jadoon and
                  Licheng Wang and
                  Tong Li and
                  Muhammad Azam Zia},
  title        = {Lightweight Cryptographic Techniques for Automotive Cybersecurity},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2018},
  pages        = {1640167:1--1640167:15},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/1640167},
  doi          = {10.1155/2018/1640167},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/JadoonWLZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/www/HuangWY18,
  author       = {Qinlong Huang and
                  Licheng Wang and
                  Yixian Yang},
  title        = {{DECENT:} Secure and fine-grained data access control with policy
                  updating for constrained IoT devices},
  journal      = {World Wide Web},
  volume       = {21},
  number       = {1},
  pages        = {151--167},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11280-017-0462-0},
  doi          = {10.1007/S11280-017-0462-0},
  timestamp    = {Wed, 24 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/www/HuangWY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhouWSL18,
  author       = {Lijing Zhou and
                  Licheng Wang and
                  Yiru Sun and
                  Pin Lv},
  title        = {Loamit: {A} Blockchain-based Residual Loanable-limit Query System},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {655},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/655},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhouWSL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aaecc/HongWASY17,
  author       = {Haibo Hong and
                  Licheng Wang and
                  Haseeb Ahmad and
                  Jun Shao and
                  Yixian Yang},
  title        = {Minimal logarithmic signatures for one type of classical groups},
  journal      = {Appl. Algebra Eng. Commun. Comput.},
  volume       = {28},
  number       = {2},
  pages        = {177--192},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00200-016-0302-y},
  doi          = {10.1007/S00200-016-0302-Y},
  timestamp    = {Sat, 20 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aaecc/HongWASY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AhmadDWHDY17,
  author       = {Haseeb Ahmad and
                  Ali Daud and
                  Licheng Wang and
                  Haibo Hong and
                  Hussain Dawood and
                  Yixian Yang},
  title        = {Prediction of Rising Stars in the Game of Cricket},
  journal      = {{IEEE} Access},
  volume       = {5},
  pages        = {4104--4124},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACCESS.2017.2682162},
  doi          = {10.1109/ACCESS.2017.2682162},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/AhmadDWHDY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HuangYW17,
  author       = {Qinlong Huang and
                  Yixian Yang and
                  Licheng Wang},
  title        = {Secure Data Access Control With Ciphertext Update and Computation
                  Outsourcing in Fog Computing for Internet of Things},
  journal      = {{IEEE} Access},
  volume       = {5},
  pages        = {12941--12950},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACCESS.2017.2727054},
  doi          = {10.1109/ACCESS.2017.2727054},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/HuangYW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhuWAN17,
  author       = {Huijun Zhu and
                  Licheng Wang and
                  Haseeb Ahmad and
                  Xinxin Niu},
  title        = {Key-Policy Attribute-Based Encryption With Equality Test in Cloud
                  Computing},
  journal      = {{IEEE} Access},
  volume       = {5},
  pages        = {20428--20439},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACCESS.2017.2756070},
  doi          = {10.1109/ACCESS.2017.2756070},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZhuWAN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/HongWAYQ17,
  author       = {Haibo Hong and
                  Licheng Wang and
                  Haseeb Ahmad and
                  Yixian Yang and
                  Zhiguo Qu},
  title        = {Minimum length key in {MST} cryptosystems},
  journal      = {Sci. China Inf. Sci.},
  volume       = {60},
  number       = {5},
  pages        = {052106:1--052106:11},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11432-015-5479-3},
  doi          = {10.1007/S11432-015-5479-3},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/HongWAYQ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/YanWLLYY17,
  author       = {Jianhua Yan and
                  Licheng Wang and
                  Jing Li and
                  Muzi Li and
                  Yixan Yang and
                  Wenbin Yao},
  title        = {Pre-image sample algorithm with irregular Gaussian distribution and
                  construction of identity-based signature},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {29},
  number       = {20},
  year         = {2017},
  url          = {https://doi.org/10.1002/cpe.3925},
  doi          = {10.1002/CPE.3925},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/YanWLLYY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/ZhuWAN17,
  author       = {Huijun Zhu and
                  Licheng Wang and
                  Haseeb Ahmad and
                  Xinxin Niu},
  title        = {Pairing-free equality test over short ciphertexts},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {13},
  number       = {6},
  year         = {2017},
  url          = {https://doi.org/10.1177/1550147717715605},
  doi          = {10.1177/1550147717715605},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/ZhuWAN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HuangWY17,
  author       = {Qinlong Huang and
                  Licheng Wang and
                  Yixian Yang},
  title        = {Secure and Privacy-Preserving Data Sharing and Collaboration in Mobile
                  Healthcare Social Networks of Smart Cities},
  journal      = {Secur. Commun. Networks},
  volume       = {2017},
  pages        = {6426495:1--6426495:12},
  year         = {2017},
  url          = {https://doi.org/10.1155/2017/6426495},
  doi          = {10.1155/2017/6426495},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HuangWY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iconac/WangWW17,
  author       = {Licheng Wang and
                  Zidong Wang and
                  Guoliang Wei},
  title        = {Event-triggered variance-constrained finite-horizon state estimation
                  for discrete-time systems with redundant channels},
  booktitle    = {23rd International Conference on Automation and Computing, {ICAC}
                  2017, Huddersfield, United Kingdom, September 7-8, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/IConAC.2017.8081967},
  doi          = {10.23919/ICONAC.2017.8081967},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iconac/WangWW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhouWS17,
  author       = {Lijing Zhou and
                  Licheng Wang and
                  Yiru Sun},
  title        = {On the Efficient Construction of Lightweight Orthogonal {MDS} Matrices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {371},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/371},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhouWS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiW17a,
  author       = {Jing Li and
                  Licheng Wang},
  title        = {Noiseless Fully Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {839},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/839},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiW17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhouWS17a,
  author       = {Lijing Zhou and
                  Licheng Wang and
                  Yiru Sun},
  title        = {CP-consensus: a Blockchain Protocol Based on Synchronous Timestamps
                  of Compass Satellite},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1059},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1059},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhouWS17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/SongWWCN16,
  author       = {Lingwei Song and
                  Jinxia Wei and
                  Licheng Wang and
                  Chenlei Cao and
                  Xinxin Niu},
  title        = {Identity-based storage management and integrity verify protocol for
                  secure outsourcing in multi-cloud},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {28},
  number       = {6},
  pages        = {1930--1945},
  year         = {2016},
  url          = {https://doi.org/10.1002/cpe.3662},
  doi          = {10.1002/CPE.3662},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/SongWWCN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ffa/HongWALYW16,
  author       = {Haibo Hong and
                  Licheng Wang and
                  Haseeb Ahmad and
                  Jing Li and
                  Yixian Yang and
                  Changzhong Wu},
  title        = {Construction of {DNA} codes by using algebraic number theory},
  journal      = {Finite Fields Their Appl.},
  volume       = {37},
  pages        = {328--343},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.ffa.2015.10.008},
  doi          = {10.1016/J.FFA.2015.10.008},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ffa/HongWALYW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/WangLA16,
  author       = {Licheng Wang and
                  Jing Li and
                  Haseeb Ahmad},
  title        = {Challenges of Fully Homomorphic Encryptions for the Internet of Things},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {99-D},
  number       = {8},
  pages        = {1982--1990},
  year         = {2016},
  url          = {https://doi.org/10.1587/transinf.2015INI0003},
  doi          = {10.1587/TRANSINF.2015INI0003},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/WangLA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijgs/WeiLWW16,
  author       = {Guoliang Wei and
                  Shuai Liu and
                  Licheng Wang and
                  Yongxiong Wang},
  title        = {Event-based distributed set-membership filtering for a class of time-varying
                  non-linear systems over sensor networks with saturation effects},
  journal      = {Int. J. Gen. Syst.},
  volume       = {45},
  number       = {5},
  pages        = {532--547},
  year         = {2016},
  url          = {https://doi.org/10.1080/03081079.2015.1106738},
  doi          = {10.1080/03081079.2015.1106738},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijgs/WeiLWW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcyb/WangWHW16,
  author       = {Licheng Wang and
                  Zidong Wang and
                  Tingwen Huang and
                  Guoliang Wei},
  title        = {An Event-Triggered Approach to State Estimation for a Class of Complex
                  Networks With Mixed Time Delays and Nonlinearities},
  journal      = {{IEEE} Trans. Cybern.},
  volume       = {46},
  number       = {11},
  pages        = {2497--2508},
  year         = {2016},
  url          = {https://doi.org/10.1109/TCYB.2015.2478860},
  doi          = {10.1109/TCYB.2015.2478860},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcyb/WangWHW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bwcca/LiLWHN16,
  author       = {Jing Li and
                  Xiong Li and
                  Licheng Wang and
                  Debiao He and
                  Xinxin Niu},
  editor       = {Leonard Barolli and
                  Fatos Xhafa and
                  Kangbin Yim},
  title        = {Oblivious Transfer Protocols Based on Group Factoring Problem},
  booktitle    = {Advances on Broad-Band Wireless Computing, Communication and Applications,
                  Proceedings of the 11th International Conference On Broad-Band Wireless
                  Computing, Communication and Applications, {BWCCA} 2016, Soonchunhyang
                  University, Asan, Korea, November 5-7, 2016},
  series       = {Lecture Notes on Data Engineering and Communications Technologies},
  volume       = {2},
  pages        = {885--892},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49106-6\_90},
  doi          = {10.1007/978-3-319-49106-6\_90},
  timestamp    = {Wed, 04 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bwcca/LiLWHN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiWZN16,
  author       = {Jing Li and
                  Licheng Wang and
                  Zonghua Zhang and
                  Xinxin Niu},
  editor       = {Xiaofeng Chen and
                  XiaoFeng Wang and
                  Xinyi Huang},
  title        = {Novel Constructions of Cramer-Shoup Like Cryptosystems Based on Index
                  Exchangeable Family},
  booktitle    = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016},
  pages        = {895--900},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2897845.2897920},
  doi          = {10.1145/2897845.2897920},
  timestamp    = {Mon, 25 Apr 2022 08:42:03 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/LiWZN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/WangLYQ16,
  author       = {Licheng Wang and
                  Jing Li and
                  Jianhua Yan and
                  Zhiguo Qu},
  editor       = {Fatos Xhafa and
                  Leonard Barolli and
                  V{\'{a}}clav Sn{\'{a}}sel and
                  Ivan Zelinka},
  title        = {An Efficient Proxy Re-Encryption Based on (Semi) Group Factorization
                  Problems},
  booktitle    = {2016 International Conference on Intelligent Networking and Collaborative
                  Systems, INCoS 2016, Ostrawva, Czech Republic, September 7-9, 2016},
  pages        = {199--202},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/INCoS.2016.12},
  doi          = {10.1109/INCOS.2016.12},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/incos/WangLYQ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/LiWN16,
  author       = {Jing Li and
                  Licheng Wang and
                  Xinxin Niu},
  editor       = {Fatos Xhafa and
                  Leonard Barolli and
                  V{\'{a}}clav Sn{\'{a}}sel and
                  Ivan Zelinka},
  title        = {A Star-Topological Privacy Encryption for Telecare Medical Information
                  Systems},
  booktitle    = {2016 International Conference on Intelligent Networking and Collaborative
                  Systems, INCoS 2016, Ostrawva, Czech Republic, September 7-9, 2016},
  pages        = {311--317},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/INCoS.2016.11},
  doi          = {10.1109/INCOS.2016.11},
  timestamp    = {Sat, 31 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/incos/LiWN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/HongSWAY16,
  author       = {Haibo Hong and
                  Jun Shao and
                  Licheng Wang and
                  Haseeb Ahmad and
                  Yixian Yang},
  title        = {Public Key Encryption in Non-Abelian Groups},
  journal      = {CoRR},
  volume       = {abs/1605.06608},
  year         = {2016},
  url          = {http://arxiv.org/abs/1605.06608},
  eprinttype    = {arXiv},
  eprint       = {1605.06608},
  timestamp    = {Sat, 20 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/HongSWAY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhouWS16,
  author       = {Lijing Zhou and
                  Licheng Wang and
                  Yiru Sun},
  title        = {Construction of Lightweight {MDS} Matrices over Matrix Polynomial
                  Residue Ring},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1173},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1173},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhouWS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HongWY15,
  author       = {Haibo Hong and
                  Licheng Wang and
                  Yixian Yang},
  title        = {Minimal logarithmic signatures for the unitary group U\({}_{\mbox{n}}\)(q)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {77},
  number       = {1},
  pages        = {179--191},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10623-014-9996-7},
  doi          = {10.1007/S10623-014-9996-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HongWY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YanWDYY15,
  author       = {Jianhua Yan and
                  Licheng Wang and
                  Mianxiong Dong and
                  Yixian Yang and
                  Wenbin Yao},
  title        = {Identity-based signcryption from lattices},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3751--3770},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1297},
  doi          = {10.1002/SEC.1297},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YanWDYY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/YangQZW15,
  author       = {Chunli Yang and
                  Peigang Qiu and
                  Shihui Zheng and
                  Licheng Wang},
  editor       = {Jeng{-}Shyang Pan and
                  Ivan Lee and
                  Hsiang{-}Cheh Huang and
                  Ching{-}Yu Yang},
  title        = {An Efficient Lattice-Based Proxy Signature Scheme without Trapdoor},
  booktitle    = {2015 International Conference on Intelligent Information Hiding and
                  Multimedia Signal Processing, {IIH-MSP} 2015, Adelaide, Australia,
                  September 23-25, 2015},
  pages        = {189--194},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/IIH-MSP.2015.90},
  doi          = {10.1109/IIH-MSP.2015.90},
  timestamp    = {Mon, 06 Apr 2020 19:01:12 +0200},
  biburl       = {https://dblp.org/rec/conf/iih-msp/YangQZW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wasa/WangPJA15,
  author       = {Licheng Wang and
                  Yun Pan and
                  Minzheng Jia and
                  Haseeb Ahmad},
  editor       = {Kuai Xu and
                  Haojin Zhu},
  title        = {A Heuristic Stream Order Scheduling Algorithm for Intra-Superframe
                  Power Management in WPANs},
  booktitle    = {Wireless Algorithms, Systems, and Applications - 10th International
                  Conference, {WASA} 2015, Qufu, China, August 10-12, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9204},
  pages        = {539--549},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-21837-3\_53},
  doi          = {10.1007/978-3-319-21837-3\_53},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/wasa/WangPJA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/HongWALY15,
  author       = {Haibo Hong and
                  Licheng Wang and
                  Haseeb Ahmad and
                  Jing Li and
                  Yixian Yang},
  title        = {Minimal Logarithmic Signatures for Sporadic Groups},
  journal      = {CoRR},
  volume       = {abs/1507.01162},
  year         = {2015},
  url          = {http://arxiv.org/abs/1507.01162},
  eprinttype    = {arXiv},
  eprint       = {1507.01162},
  timestamp    = {Sat, 31 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/HongWALY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/HongWAY15,
  author       = {Haibo Hong and
                  Licheng Wang and
                  Haseeb Ahmad and
                  Yixian Yang},
  title        = {Minimal Logarithmic Signatures for one type of Classical Groups},
  journal      = {CoRR},
  volume       = {abs/1507.01163},
  year         = {2015},
  url          = {http://arxiv.org/abs/1507.01163},
  eprinttype    = {arXiv},
  eprint       = {1507.01163},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/HongWAY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiW15,
  author       = {Jing Li and
                  Licheng Wang},
  title        = {Noise-free Symmetric Fully Homomorphic Encryption based on noncommutative
                  rings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {641},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/641},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aaecc/HongWYA14,
  author       = {Haibo Hong and
                  Licheng Wang and
                  Yixian Yang and
                  Haseeb Ahmad},
  title        = {All exceptional groups of lie type have minimal logarithmic signatures},
  journal      = {Appl. Algebra Eng. Commun. Comput.},
  volume       = {25},
  number       = {4},
  pages        = {287--296},
  year         = {2014},
  url          = {https://doi.org/10.1007/s00200-014-0226-3},
  doi          = {10.1007/S00200-014-0226-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aaecc/HongWYA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/LuWJWY14,
  author       = {Xiuhua Lu and
                  Qiaoyan Wen and
                  Zhengping Jin and
                  Licheng Wang and
                  Chunli Yang},
  title        = {A lattice-based signcryption scheme without random oracles},
  journal      = {Frontiers Comput. Sci.},
  volume       = {8},
  number       = {4},
  pages        = {667--675},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11704-014-3163-1},
  doi          = {10.1007/S11704-014-3163-1},
  timestamp    = {Mon, 19 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/LuWJWY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/GanWWPY14,
  author       = {Yuanju Gan and
                  Lihua Wang and
                  Licheng Wang and
                  Ping Pan and
                  Yixian Yang},
  title        = {Efficient threshold public key encryption with full security based
                  on dual pairing vector spaces},
  journal      = {Int. J. Commun. Syst.},
  volume       = {27},
  number       = {12},
  pages        = {4059--4077},
  year         = {2014},
  url          = {https://doi.org/10.1002/dac.2598},
  doi          = {10.1002/DAC.2598},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/GanWWPY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijgs/WeiHWS14,
  author       = {Guoliang Wei and
                  Fei Han and
                  Licheng Wang and
                  Yan Song},
  title        = {Reliable \emph{H}\({}_{\mbox{{\(\infty\)}}}\) filtering for discrete
                  piecewise linear systems with infinite distributed delays},
  journal      = {Int. J. Gen. Syst.},
  volume       = {43},
  number       = {3-4},
  pages        = {346--358},
  year         = {2014},
  url          = {https://doi.org/10.1080/03081079.2014.892255},
  doi          = {10.1080/03081079.2014.892255},
  timestamp    = {Fri, 18 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijgs/WeiHWS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijon/WangWL14,
  author       = {Licheng Wang and
                  Guoliang Wei and
                  Wangyan Li},
  title        = {Probability-dependent H\({}_{\mbox{{\(\infty\)}}}\) synchronization
                  control for dynamical networks with randomly varying nonlinearities},
  journal      = {Neurocomputing},
  volume       = {133},
  pages        = {369--376},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.neucom.2013.12.045},
  doi          = {10.1016/J.NEUCOM.2013.12.045},
  timestamp    = {Sat, 27 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijon/WangWL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/LuWLWZ14,
  author       = {Xiuhua Lu and
                  Qiaoyan Wen and
                  Wenmin Li and
                  Licheng Wang and
                  Hua Zhang},
  title        = {A Fuzzy Identity-Based Signcryption Scheme from Lattices},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {8},
  number       = {11},
  pages        = {4203--4225},
  year         = {2014},
  url          = {https://doi.org/10.3837/tiis.2014.11.031},
  doi          = {10.3837/TIIS.2014.11.031},
  timestamp    = {Thu, 14 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itiis/LuWLWZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/LiWYNY14,
  author       = {Jing Li and
                  Licheng Wang and
                  Jianhua Yan and
                  Xinxin Niu and
                  Yixian Yang},
  title        = {A (k, t, n) Verifiable Multi-secret Sharing Scheme Based on Adversary
                  Structure},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {8},
  number       = {12},
  pages        = {4552--4567},
  year         = {2014},
  url          = {https://doi.org/10.3837/tiis.2014.12.018},
  doi          = {10.3837/TIIS.2014.12.018},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/LiWYNY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcn/YangZWLY14,
  author       = {Chunli Yang and
                  Shihui Zheng and
                  Licheng Wang and
                  Xiuhua Lu and
                  Yixian Yang},
  title        = {Hierarchical identity-based broadcast encryption scheme from {LWE}},
  journal      = {J. Commun. Networks},
  volume       = {16},
  number       = {3},
  pages        = {258--263},
  year         = {2014},
  url          = {https://doi.org/10.1109/JCN.2014.000045},
  doi          = {10.1109/JCN.2014.000045},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcn/YangZWLY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/GanWWPY13,
  author       = {Yuanju Gan and
                  Lihua Wang and
                  Licheng Wang and
                  Ping Pan and
                  Yixian Yang},
  title        = {Efficient Construction of CCA-Secure Threshold {PKE} Based on Hashed
                  Diffie-Hellman Assumption},
  journal      = {Comput. J.},
  volume       = {56},
  number       = {10},
  pages        = {1249--1257},
  year         = {2013},
  url          = {https://doi.org/10.1093/comjnl/bxs167},
  doi          = {10.1093/COMJNL/BXS167},
  timestamp    = {Thu, 16 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/GanWWPY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/PanWYGWX13,
  author       = {Ping Pan and
                  Licheng Wang and
                  Yixian Yang and
                  Yuanju Gan and
                  Lihua Wang and
                  Chengqian Xu},
  title        = {Chameleon Hash Functions and One-Time Signature Schemes from Inner
                  Automorphism Groups},
  journal      = {Fundam. Informaticae},
  volume       = {126},
  number       = {1},
  pages        = {103--119},
  year         = {2013},
  url          = {https://doi.org/10.3233/FI-2013-873},
  doi          = {10.3233/FI-2013-873},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/PanWYGWX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/GanWWPY13,
  author       = {Yuanju Gan and
                  Lihua Wang and
                  Licheng Wang and
                  Ping Pan and
                  Yixian Yang},
  title        = {Publicly Verifiable Secret Sharing Scheme with Provable Security against
                  Chosen Secret Attacks},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {9},
  year         = {2013},
  url          = {https://doi.org/10.1155/2013/902462},
  doi          = {10.1155/2013/902462},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/GanWWPY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijon/WangWS13,
  author       = {Licheng Wang and
                  Guoliang Wei and
                  Huisheng Shu},
  title        = {State estimation for complex networks with randomly occurring coupling
                  delays},
  journal      = {Neurocomputing},
  volume       = {122},
  pages        = {513--520},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.neucom.2013.05.010},
  doi          = {10.1016/J.NEUCOM.2013.05.010},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijon/WangWS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/WangSCMYW13,
  author       = {Lihua Wang and
                  Jun Shao and
                  Zhenfu Cao and
                  Masahiro Mambo and
                  Akihiro Yamamura and
                  Licheng Wang},
  title        = {Certificate-based proxy decryption systems with revocability in the
                  standard model},
  journal      = {Inf. Sci.},
  volume       = {247},
  pages        = {188--201},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ins.2013.06.026},
  doi          = {10.1016/J.INS.2013.06.026},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/WangSCMYW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsw/GanWYY13,
  author       = {Yuanju Gan and
                  Licheng Wang and
                  Jianhua Yan and
                  Yixian Yang},
  title        = {{CCA} Secure Threshold {KEM} Scheme Against Adaptive Corruption Attacks
                  in Standard Model},
  journal      = {J. Softw.},
  volume       = {8},
  number       = {5},
  pages        = {1245--1253},
  year         = {2013},
  url          = {https://doi.org/10.4304/jsw.8.5.1245-1253},
  doi          = {10.4304/JSW.8.5.1245-1253},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsw/GanWYY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/GuWODCY13,
  author       = {Lize Gu and
                  Licheng Wang and
                  Kaoru Ota and
                  Mianxiong Dong and
                  Zhenfu Cao and
                  Yixian Yang},
  title        = {New public key cryptosystems based on non-Abelian factorization problems},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {7},
  pages        = {912--922},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.710},
  doi          = {10.1002/SEC.710},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/GuWODCY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CaoDWS13a,
  author       = {Zhenfu Cao and
                  Xiaolei Dong and
                  Licheng Wang and
                  Jun Shao},
  title        = {More Efficient Cryptosystems From k-th Power Residues},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {569},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/569},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CaoDWS13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShaoWDC13,
  author       = {Jun Shao and
                  Licheng Wang and
                  Xiaolei Dong and
                  Zhenfu Cao},
  title        = {New Efficient Identity-Based Encryption From Factorization},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {570},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/570},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShaoWDC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/WangWMO12,
  author       = {Lihua Wang and
                  Licheng Wang and
                  Masahiro Mambo and
                  Eiji Okamoto},
  title        = {Identity-Based Proxy Cryptosystems with Revocability and Hierarchical
                  Confidentialities},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {95-A},
  number       = {1},
  pages        = {70--88},
  year         = {2012},
  url          = {https://doi.org/10.1587/transfun.E95.A.70},
  doi          = {10.1587/TRANSFUN.E95.A.70},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/WangWMO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WangWZYH12,
  author       = {Zhiwei Wang and
                  Licheng Wang and
                  Shihui Zheng and
                  Yixian Yang and
                  Zhengming Hu},
  title        = {Provably Secure and Efficient Identity-based Signature Scheme Based
                  on Cubic Residues},
  journal      = {Int. J. Netw. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {33--38},
  year         = {2012},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v14-n1/ijns-2012-v14-n1-p33-38.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/WangWZYH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/PanWWLY12,
  author       = {Ping Pan and
                  Lihua Wang and
                  Licheng Wang and
                  Lixiang Li and
                  Yixian Yang},
  title        = {{CSP-DHIES:} a new public-key encryption scheme from matrix conjugation},
  journal      = {Secur. Commun. Networks},
  volume       = {5},
  number       = {7},
  pages        = {809--822},
  year         = {2012},
  url          = {https://doi.org/10.1002/sec.376},
  doi          = {10.1002/SEC.376},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/PanWWLY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhouDBW11,
  author       = {GuangXu Zhou and
                  Rustu Murat Demirer and
                  Coskun Bayrak and
                  Licheng Wang},
  title        = {Enable delegation for {RBAC} with Secure Authorization Certificate},
  journal      = {Comput. Secur.},
  volume       = {30},
  number       = {8},
  pages        = {780--790},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.cose.2011.06.005},
  doi          = {10.1016/J.COSE.2011.06.005},
  timestamp    = {Fri, 06 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhouDBW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/WangWPZY11,
  author       = {Licheng Wang and
                  Lihua Wang and
                  Yun Pan and
                  Zonghua Zhang and
                  Yixian Yang},
  title        = {Discrete logarithm based additively homomorphic encryption and secure
                  data aggregation},
  journal      = {Inf. Sci.},
  volume       = {181},
  number       = {16},
  pages        = {3308--3322},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.ins.2011.04.002},
  doi          = {10.1016/J.INS.2011.04.002},
  timestamp    = {Thu, 16 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/WangWPZY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/DongWZCW11,
  author       = {Xiaolei Dong and
                  Lifei Wei and
                  Haojin Zhu and
                  Zhenfu Cao and
                  Licheng Wang},
  title        = {: An Efficient Privacy-Preserving Data-Forwarding Scheme for Service-Oriented
                  Vehicular Ad Hoc Networks},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {60},
  number       = {2},
  pages        = {580--591},
  year         = {2011},
  url          = {https://doi.org/10.1109/TVT.2010.2095432},
  doi          = {10.1109/TVT.2010.2095432},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/DongWZCW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/ZhengWY10,
  author       = {Shihui Zheng and
                  Licheng Wang and
                  Yixian Yang},
  title        = {A new impossible differential attack on {SAFER} ciphers},
  journal      = {Comput. Electr. Eng.},
  volume       = {36},
  number       = {1},
  pages        = {180--189},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.compeleceng.2009.08.004},
  doi          = {10.1016/J.COMPELECENG.2009.08.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/ZhengWY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/WangWCYN10,
  author       = {Licheng Wang and
                  Lihua Wang and
                  Zhenfu Cao and
                  Yixian Yang and
                  Xinxin Niu},
  title        = {Conjugate adjoining problem in braid groups and new design of braid-based
                  signatures},
  journal      = {Sci. China Inf. Sci.},
  volume       = {53},
  number       = {3},
  pages        = {524--536},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11432-010-0046-4},
  doi          = {10.1007/S11432-010-0046-4},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/WangWCYN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/LuoYWN10,
  author       = {Mingxing Luo and
                  Yixian Yang and
                  Licheng Wang and
                  Xinxin Niu},
  title        = {Secure network coding in the presence of eavesdroppers},
  journal      = {Sci. China Inf. Sci.},
  volume       = {53},
  number       = {3},
  pages        = {648--658},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11432-010-0052-6},
  doi          = {10.1007/S11432-010-0052-6},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/LuoYWN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WangWYH10,
  author       = {Zhiwei Wang and
                  Licheng Wang and
                  Yixian Yang and
                  Zhengming Hu},
  title        = {Comment on Wu et al.'s Server-aided Verification Signature Schemes},
  journal      = {Int. J. Netw. Secur.},
  volume       = {10},
  number       = {2},
  pages        = {158--160},
  year         = {2010},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n2/ijns-2010-v10-n2-p158-160.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/WangWYH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/WangCW10,
  author       = {Hongbing Wang and
                  Zhenfu Cao and
                  Licheng Wang},
  title        = {Multi-use and unidirectional identity-based proxy re-encryption schemes},
  journal      = {Inf. Sci.},
  volume       = {180},
  number       = {20},
  pages        = {4042--4059},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.ins.2010.06.029},
  doi          = {10.1016/J.INS.2010.06.029},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/WangCW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/WangWCOS10,
  author       = {Lihua Wang and
                  Licheng Wang and
                  Zhenfu Cao and
                  Eiji Okamoto and
                  Jun Shao},
  editor       = {Xuejia Lai and
                  Moti Yung and
                  Dongdai Lin},
  title        = {New Constructions of Public-Key Encryption Schemes from Conjugacy
                  Search Problems},
  booktitle    = {Information Security and Cryptology - 6th International Conference,
                  Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6584},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-21518-6\_1},
  doi          = {10.1007/978-3-642-21518-6\_1},
  timestamp    = {Sat, 20 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/WangWCOS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/WangWMO10,
  author       = {Lihua Wang and
                  Licheng Wang and
                  Masahiro Mambo and
                  Eiji Okamoto},
  editor       = {Miguel Soriano and
                  Sihan Qing and
                  Javier L{\'{o}}pez},
  title        = {Identity-Based Proxy Cryptosystems with Revocability and Hierarchical
                  Confidentialities},
  booktitle    = {Information and Communications Security - 12th International Conference,
                  {ICICS} 2010, Barcelona, Spain, December 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6476},
  pages        = {383--400},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17650-0\_27},
  doi          = {10.1007/978-3-642-17650-0\_27},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/WangWMO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icira/WangDW10,
  author       = {Licheng Wang and
                  Han Ding and
                  Shaojun Wang},
  editor       = {Honghai Liu and
                  Han Ding and
                  Zhenhua Xiong and
                  Xiangyang Zhu},
  title        = {Measurement Error Compensation Using Data Fusion Technique for Laser
                  Scanner on AACMMs},
  booktitle    = {Intelligent Robotics and Applications - Third International Conference,
                  {ICIRA} 2010, Shanghai, China, November 10-12, 2010. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6425},
  pages        = {576--586},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16587-0\_53},
  doi          = {10.1007/978-3-642-16587-0\_53},
  timestamp    = {Wed, 02 Nov 2022 08:13:16 +0100},
  biburl       = {https://dblp.org/rec/conf/icira/WangDW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/WangWMO10,
  author       = {Lihua Wang and
                  Licheng Wang and
                  Masahiro Mambo and
                  Eiji Okamoto},
  editor       = {Marc Joye and
                  Atsuko Miyaji and
                  Akira Otsuka},
  title        = {New Identity-Based Proxy Re-encryption Schemes to Prevent Collusion
                  Attacks},
  booktitle    = {Pairing-Based Cryptography - Pairing 2010 - 4th International Conference,
                  Yamanaka Hot Spring, Japan, December 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6487},
  pages        = {327--346},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17455-1\_21},
  doi          = {10.1007/978-3-642-17455-1\_21},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/WangWMO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmic/WangU09,
  author       = {Licheng Wang and
                  Tamon Ueda},
  title        = {Mesoscopic simulation of chloride ions diffusion in frost-damaged
                  concrete},
  journal      = {Int. J. Model. Identif. Control.},
  volume       = {7},
  number       = {2},
  pages        = {148--154},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJMIC.2009.027068},
  doi          = {10.1504/IJMIC.2009.027068},
  timestamp    = {Thu, 17 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijmic/WangU09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnhpca/HuangW09,
  author       = {Xiaofang Huang and
                  Licheng Wang},
  editor       = {Wu Zhang and
                  Zhangxin Chen and
                  Craig C. Douglas and
                  Weiqin Tong},
  title        = {A Fair Concurrent Signature Scheme Based on Identity},
  booktitle    = {High Performance Computing and Applications, Second International
                  Conference, {HPCA} 2009, Shanghai, China, August 10-12, 2009, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5938},
  pages        = {198--205},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-11842-5\_26},
  doi          = {10.1007/978-3-642-11842-5\_26},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cnhpca/HuangW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cso/HePPW09,
  author       = {Yuling He and
                  Yun Pan and
                  Ping Pan and
                  Licheng Wang},
  editor       = {Lean Yu and
                  Kin Keung Lai and
                  Shashi Kant Mishra},
  title        = {Simulation of Key Management Protocol in Wireless Sensor Networks},
  booktitle    = {Proceedings of the Second International Joint Conference on Computational
                  Sciences and Optimization, {CSO} 2009, Sanya, Hainan, China, 24-26
                  April 2009, Volume 2},
  pages        = {333--335},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CSO.2009.332},
  doi          = {10.1109/CSO.2009.332},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cso/HePPW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fskd/PanZW09,
  author       = {Yun Pan and
                  Yuan Zhou and
                  Licheng Wang},
  editor       = {Yixin Chen and
                  Hepu Deng and
                  Degan Zhang and
                  Yingyuan Xiao},
  title        = {Modeling Internet Applications with Event Graphs},
  booktitle    = {Sixth International Conference on Fuzzy Systems and Knowledge Discovery,
                  {FSKD} 2009, Tianjin, China, 14-16 August 2009, 6 Volumes},
  pages        = {124--128},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/FSKD.2009.425},
  doi          = {10.1109/FSKD.2009.425},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fskd/PanZW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/WangWPZY09,
  author       = {Licheng Wang and
                  Lihua Wang and
                  Yun Pan and
                  Zonghua Zhang and
                  Yixian Yang},
  editor       = {Sihan Qing and
                  Chris J. Mitchell and
                  Guilin Wang},
  title        = {Discrete-Log-Based Additively Homomorphic Encryption and Secure {WSN}
                  Data Aggregation},
  booktitle    = {Information and Communications Security, 11th International Conference,
                  {ICICS} 2009, Beijing, China, December 14-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5927},
  pages        = {493--502},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-11145-7\_39},
  doi          = {10.1007/978-3-642-11145-7\_39},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/WangWPZY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiWLY09,
  author       = {Zhimin Li and
                  Licheng Wang and
                  Daofeng Li and
                  Yixian Yang},
  title        = {Collision Attacks on NaSHA-384/512},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {26},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/026},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiWLY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangWCOS09,
  author       = {Licheng Wang and
                  Lihua Wang and
                  Zhenfu Cao and
                  Eiji Okamoto and
                  Jun Shao},
  title        = {New Cryptosystems From CSP-Based Self-Distributive Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {566},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/566},
  timestamp    = {Sat, 20 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangWCOS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/DongCW08,
  author       = {Xiaolei Dong and
                  Zhenfu Cao and
                  Licheng Wang},
  title        = {New designing of cryptosystems based on quadratic fields},
  journal      = {Sci. China Ser. {F} Inf. Sci.},
  volume       = {51},
  number       = {8},
  pages        = {1106--1116},
  year         = {2008},
  url          = {https://doi.org/10.1007/s11432-008-0091-4},
  doi          = {10.1007/S11432-008-0091-4},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/DongCW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/WangCCQB08,
  author       = {Licheng Wang and
                  Zhenfu Cao and
                  Feng Cao and
                  Haifeng Qian and
                  Haiyong Bao},
  title        = {Biased Bit Commitment and Applications},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {24},
  number       = {2},
  pages        = {441--452},
  year         = {2008},
  url          = {http://www.iis.sinica.edu.tw/page/jise/2008/200803\_08.html},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/WangCCQB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/LuCWS07,
  author       = {Rongxing Lu and
                  Zhenfu Cao and
                  Licheng Wang and
                  Congkai Sun},
  title        = {A secure anonymous routing protocol with authenticated key exchange
                  for ad hoc networks},
  journal      = {Comput. Stand. Interfaces},
  volume       = {29},
  number       = {5},
  pages        = {521--527},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.csi.2006.11.007},
  doi          = {10.1016/J.CSI.2006.11.007},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csi/LuCWS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/WangCLQ07,
  author       = {Licheng Wang and
                  Zhenfu Cao and
                  Xiangxue Li and
                  Haifeng Qian},
  title        = {Simulatability and security of certificateless threshold signatures},
  journal      = {Inf. Sci.},
  volume       = {177},
  number       = {6},
  pages        = {1382--1394},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.ins.2006.08.008},
  doi          = {10.1016/J.INS.2006.08.008},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/WangCLQ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ShaoCWL07,
  author       = {Jun Shao and
                  Zhenfu Cao and
                  Licheng Wang and
                  Rongxing Lu},
  editor       = {Joachim Biskup and
                  Javier L{\'{o}}pez},
  title        = {Efficient Password-Based Authenticated Key Exchange Without Public
                  Information},
  booktitle    = {Computer Security - {ESORICS} 2007, 12th European Symposium On Research
                  In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4734},
  pages        = {299--310},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74835-9\_20},
  doi          = {10.1007/978-3-540-74835-9\_20},
  timestamp    = {Tue, 02 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/ShaoCWL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/WangCZHY07,
  author       = {Licheng Wang and
                  Zhenfu Cao and
                  Shihui Zheng and
                  Xiaofang Huang and
                  Yixian Yang},
  editor       = {K. Srinathan and
                  C. Pandu Rangan and
                  Moti Yung},
  title        = {Transitive Signatures from Braid Groups},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2007, 8th International Conference
                  on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4859},
  pages        = {183--196},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77026-8\_14},
  doi          = {10.1007/978-3-540-77026-8\_14},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/WangCZHY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/ShaoCWL07,
  author       = {Jun Shao and
                  Zhenfu Cao and
                  Licheng Wang and
                  Xiaohui Liang},
  editor       = {K. Srinathan and
                  C. Pandu Rangan and
                  Moti Yung},
  title        = {Proxy Re-signature Schemes Without Random Oracles},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2007, 8th International Conference
                  on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4859},
  pages        = {197--209},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77026-8\_15},
  doi          = {10.1007/978-3-540-77026-8\_15},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/ShaoCWL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CaoDW07,
  author       = {Zhenfu Cao and
                  Xiaolei Dong and
                  Licheng Wang},
  title        = {New Public Key Cryptosystems Using Polynomials over Non-commutative
                  Rings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {9},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/009},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CaoDW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShaoCWL07a,
  author       = {Jun Shao and
                  Zhenfu Cao and
                  Licheng Wang and
                  Rongxing Lu},
  title        = {Efficient Password-based Authenticated Key Exchange without Public
                  Information},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {326},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/326},
  timestamp    = {Tue, 02 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShaoCWL07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShaoCWL07b,
  author       = {Jun Shao and
                  Zhenfu Cao and
                  Licheng Wang and
                  Xiaohui Liang},
  title        = {Proxy Re-Signature Schemes without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {396},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/396},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShaoCWL07b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imsccs/WangCCQ06,
  author       = {Licheng Wang and
                  Zhenfu Cao and
                  Feng Cao and
                  Haifeng Qian},
  editor       = {Jun Ni and
                  Jack J. Dongarra},
  title        = {Cryptanalysis and Improvement on An ID-Based Key Issuing Protocol},
  booktitle    = {Interdisciplinary and Multidisciplinary Research in Computer Science,
                  {IEEE} {CS} Proceeding of the First International Multi-Symposium
                  of Computer and Computational Sciences (IMSCCS{\(\vert\)}06), June
                  20-24, 2006, Zhejiang University, Hangzhou, China, Vol. 2},
  pages        = {8--12},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/IMSCCS.2006.205},
  doi          = {10.1109/IMSCCS.2006.205},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imsccs/WangCCQ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imsccs/CaoCW06,
  author       = {Feng Cao and
                  Zhenfu Cao and
                  Licheng Wang},
  editor       = {Jun Ni and
                  Jack J. Dongarra},
  title        = {An Improvement of an Identity-Based Key Issuing Protocol},
  booktitle    = {Interdisciplinary and Multidisciplinary Research in Computer Science,
                  {IEEE} {CS} Proceeding of the First International Multi-Symposium
                  of Computer and Computational Sciences (IMSCCS{\(\vert\)}06), June
                  20-24, 2006, Zhejiang University, Hangzhou, China, Vol. 2},
  pages        = {13--18},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/IMSCCS.2006.185},
  doi          = {10.1109/IMSCCS.2006.185},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imsccs/CaoCW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imsccs/QianCWG06,
  author       = {Haifeng Qian and
                  Zhenfu Cao and
                  Licheng Wang and
                  Sheng Guo},
  editor       = {Jun Ni and
                  Jack J. Dongarra},
  title        = {Cryptanalysis of Chang-Lin-Lam's ID-based Multisignature Scheme},
  booktitle    = {Interdisciplinary and Multidisciplinary Research in Computer Science,
                  {IEEE} {CS} Proceeding of the First International Multi-Symposium
                  of Computer and Computational Sciences (IMSCCS{\(\vert\)}06), June
                  20-24, 2006, Zhejiang University, Hangzhou, China, Vol. 2},
  pages        = {113--116},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/IMSCCS.2006.206},
  doi          = {10.1109/IMSCCS.2006.206},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imsccs/QianCWG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangCLWQ06,
  author       = {Miaomiao Zhang and
                  Gongliang Chen and
                  Jianhua Li and
                  Licheng Wang and
                  Haifeng Qian},
  title        = {A New Construction of Time Capsule Signature},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {113},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/113},
  timestamp    = {Sun, 03 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangCLWQ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DongWC06,
  author       = {Xiaolei Dong and
                  Licheng Wang and
                  Zhenfu Cao},
  title        = {New Public Key Authentication Frameworks with Lite Certification Authority},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {154},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/154},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DongWC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShaoCW06,
  author       = {Jun Shao and
                  Zhenfu Cao and
                  Licheng Wang},
  title        = {Efficient ID-based Threshold Signature Schemes without Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {308},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/308},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShaoCW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/PanYW05,
  author       = {Yun Pan and
                  Zhenwei Yu and
                  Licheng Wang},
  editor       = {Yue Hao and
                  Jiming Liu and
                  Yuping Wang and
                  Yiu{-}ming Cheung and
                  Hujun Yin and
                  Licheng Jiao and
                  Jianfeng Ma and
                  Yong{-}Chang Jiao},
  title        = {Hybrid Genetic Algorithm for Solving the Degree-Constrained Minimal
                  Bandwidth Multicast Routing Problem},
  booktitle    = {Computational Intelligence and Security, International Conference,
                  {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3801},
  pages        = {285--290},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11596448\_41},
  doi          = {10.1007/11596448\_41},
  timestamp    = {Tue, 23 Feb 2021 17:25:41 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/PanYW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics