Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Licheng Wang
@article{DBLP:journals/jzusc/Zheng0W24, author = {Shanshan Zheng and Shuai Liu and Licheng Wang}, title = {Event-triggered distributed optimization for model-free multi-agent systems}, journal = {Frontiers Inf. Technol. Electron. Eng.}, volume = {25}, number = {2}, pages = {214--224}, year = {2024}, url = {https://doi.org/10.1631/FITEE.2300568}, doi = {10.1631/FITEE.2300568}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jzusc/Zheng0W24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/automatica/WangWZW23, author = {Licheng Wang and Zidong Wang and Di Zhao and Guoliang Wei}, title = {Stabilization of linear discrete-time systems over resource-constrained networks under dynamical multiple description coding scheme}, journal = {Autom.}, volume = {156}, pages = {111160}, year = {2023}, url = {https://doi.org/10.1016/j.automatica.2023.111160}, doi = {10.1016/J.AUTOMATICA.2023.111160}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/automatica/WangWZW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bmcbi/SuoGYYHW23, author = {Jingwen Suo and Lize Gu and Xingyu Yan and Sijia Yang and Xiaoya Hu and Licheng Wang}, title = {{PP-DDP:} a privacy-preserving outsourcing framework for solving the double digest problem}, journal = {{BMC} Bioinform.}, volume = {24}, number = {1}, pages = {34}, year = {2023}, url = {https://doi.org/10.1186/s12859-023-05157-8}, doi = {10.1186/S12859-023-05157-8}, timestamp = {Tue, 07 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bmcbi/SuoGYYHW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/YanLLWZY23, author = {Jianhua Yan and Xiuhua Lu and Muzi Li and Licheng Wang and Jingxian Zhou and Wenbin Yao}, title = {Practical {NTRU} Signcryption in the Standard Model}, journal = {Entropy}, volume = {25}, number = {12}, pages = {1651}, year = {2023}, url = {https://doi.org/10.3390/e25121651}, doi = {10.3390/E25121651}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entropy/YanLLWZY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/WangDWHP23, author = {Wei Wang and Junke Duan and Licheng Wang and Xiaoya Hu and Haipeng Peng}, title = {Strongly Synchronized Redactable Blockchain Based on Verifiable Delay Functions}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {19}, pages = {16778--16792}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2023.3269817}, doi = {10.1109/JIOT.2023.3269817}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/WangDWHP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/remotesensing/WangLZDW23, author = {Licheng Wang and Jinxin Lu and Ronglei Zhou and Gaohui Duan and Zhongming Wen}, title = {Analysis of Soil Moisture Change Characteristics and Influencing Factors of Grassland on the Tibetan Plateau}, journal = {Remote. Sens.}, volume = {15}, number = {2}, pages = {298}, year = {2023}, url = {https://doi.org/10.3390/rs15020298}, doi = {10.3390/RS15020298}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/remotesensing/WangLZDW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/ShenWWWP23, author = {Xiaoying Shen and Zhen Wang and Baocang Wang and Licheng Wang and Qingqi Pei}, title = {A Privacy-Preserving Ride-Matching Scheme Without a Trusted Third-Party Server}, journal = {{IEEE} Syst. J.}, volume = {17}, number = {4}, pages = {6413--6424}, year = {2023}, url = {https://doi.org/10.1109/JSYST.2023.3289833}, doi = {10.1109/JSYST.2023.3289833}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sj/ShenWWWP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tac/LiuWWW23, author = {Shuai Liu and Zidong Wang and Licheng Wang and Guoliang Wei}, title = {Finite-Horizon {\textdollar}H{\_}\{{\textbackslash}infty \}{\textdollar} Filtering via a High-Rate Network With the FlexRay Protocol}, journal = {{IEEE} Trans. Autom. Control.}, volume = {68}, number = {6}, pages = {3596--3603}, year = {2023}, url = {https://doi.org/10.1109/TAC.2022.3190791}, doi = {10.1109/TAC.2022.3190791}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tac/LiuWWW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcasI/LuoLWT23, author = {Qi Luo and Shuai Liu and Licheng Wang and Engang Tian}, title = {Privacy-Preserved Distributed Optimization for Multi-Agent Systems With Antagonistic Interactions}, journal = {{IEEE} Trans. Circuits Syst. {I} Regul. Pap.}, volume = {70}, number = {3}, pages = {1350--1360}, year = {2023}, url = {https://doi.org/10.1109/TCSI.2022.3226578}, doi = {10.1109/TCSI.2022.3226578}, timestamp = {Sat, 11 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcasI/LuoLWT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcyb/ZhaoWWW23, author = {Di Zhao and Zidong Wang and Licheng Wang and Guoliang Wei}, title = {Proportional-Integral Observer Design for Multirate-Networked Systems Under Constrained Bit Rate: An Encoding-Decoding Mechanism}, journal = {{IEEE} Trans. Cybern.}, volume = {53}, number = {7}, pages = {4280--4291}, year = {2023}, url = {https://doi.org/10.1109/TCYB.2022.3165041}, doi = {10.1109/TCYB.2022.3165041}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcyb/ZhaoWWW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DuanWWG23, author = {Junke Duan and Licheng Wang and Wei Wang and Lize Gu}, title = {{TRCT:} {A} Traceable Anonymous Transaction Protocol for Blockchain}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {4391--4405}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2023.3296286}, doi = {10.1109/TIFS.2023.3296286}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/DuanWWG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/ChenTWL23, author = {Hui Chen and Engang Tian and Licheng Wang and Shuai Liu}, title = {A Joint Online Strategy of Measurement Outliers Diagnosis and State of Charge Estimation for Lithium-Ion Batteries}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {19}, number = {5}, pages = {6387--6397}, year = {2023}, url = {https://doi.org/10.1109/TII.2022.3202949}, doi = {10.1109/TII.2022.3202949}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/ChenTWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmm/ZhangMDWZ23, author = {Zhenrong Zhang and Jiefeng Ma and Jun Du and Licheng Wang and Jianshu Zhang}, title = {Multimodal Pre-Training Based on Graph Attention Network for Document Understanding}, journal = {{IEEE} Trans. Multim.}, volume = {25}, pages = {6743--6755}, year = {2023}, url = {https://doi.org/10.1109/TMM.2022.3214102}, doi = {10.1109/TMM.2022.3214102}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmm/ZhangMDWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsg/TianCWW23, author = {Engang Tian and Hui Chen and Changsong Wang and Licheng Wang}, title = {Security-Ensured State of Charge Estimation of Lithium-Ion Batteries Subject to Malicious Attacks}, journal = {{IEEE} Trans. Smart Grid}, volume = {14}, number = {3}, pages = {2250--2261}, year = {2023}, url = {https://doi.org/10.1109/TSG.2022.3202811}, doi = {10.1109/TSG.2022.3202811}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsg/TianCWW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsg/WangXYZWC23, author = {Licheng Wang and Luochen Xie and Yu Yang and Youbing Zhang and Kai Wang and Shijie Cheng}, title = {Distributed Online Voltage Control With Fast {PV} Power Fluctuations and Imperfect Communication}, journal = {{IEEE} Trans. Smart Grid}, volume = {14}, number = {5}, pages = {3681--3695}, year = {2023}, url = {https://doi.org/10.1109/TSG.2023.3236724}, doi = {10.1109/TSG.2023.3236724}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsg/WangXYZWC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/HuLWNO23, author = {Xiaoya Hu and Ruiqin Li and Licheng Wang and Yuqiao Ning and Kaoru Ota}, title = {A Data Sharing Scheme Based on Federated Learning in IoV}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {72}, number = {9}, pages = {11644--11656}, year = {2023}, url = {https://doi.org/10.1109/TVT.2023.3266100}, doi = {10.1109/TVT.2023.3266100}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/HuLWNO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/ZhangLLWWZ23, author = {Chuan Zhang and Haotian Liang and Zhuopeng Li and Tong Wu and Licheng Wang and Liehuang Zhu}, editor = {Jun Shao and Sokratis K. Katsikas and Weizhi Meng}, title = {PtbStolen: Pre-trained Encoder Stealing Through Perturbed Samples}, booktitle = {Emerging Information Security and Applications - 4th International Conference, {EISA} 2023, Hangzhou, China, December 6-7, 2023, Proceedings}, series = {Communications in Computer and Information Science}, volume = {2004}, pages = {1--19}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-9614-8\_1}, doi = {10.1007/978-981-99-9614-8\_1}, timestamp = {Thu, 11 Apr 2024 16:38:28 +0200}, biburl = {https://dblp.org/rec/conf/eisa/ZhangLLWWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-02596, author = {Licheng Wang and Tao Wang and Gang Huang and Ruifeng Yan and Kai Wang and Youbing Zhang and Shijie Cheng}, title = {A Soft Coordination Method of Heterogeneous Devices in Distribution System Voltage Control}, journal = {CoRR}, volume = {abs/2305.02596}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.02596}, doi = {10.48550/ARXIV.2305.02596}, eprinttype = {arXiv}, eprint = {2305.02596}, timestamp = {Wed, 10 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-02596.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amc/WangC22, author = {Licheng Wang and Hui Chen}, title = {Event-based joint state and fault estimation: The envelope-constrained H{\(\infty\)} criterion}, journal = {Appl. Math. Comput.}, volume = {419}, pages = {126873}, year = {2022}, url = {https://doi.org/10.1016/j.amc.2021.126873}, doi = {10.1016/J.AMC.2021.126873}, timestamp = {Mon, 24 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/amc/WangC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/apin/YangXZLWXS22, author = {Sijia Yang and Haoyi Xiong and Yunchao Zhang and Yi Ling and Licheng Wang and Kaibo Xu and Zeyi Sun}, title = {{OGM:} Online gaussian graphical models on the fly}, journal = {Appl. Intell.}, volume = {52}, number = {3}, pages = {3103--3117}, year = {2022}, url = {https://doi.org/10.1007/s10489-021-02563-4}, doi = {10.1007/S10489-021-02563-4}, timestamp = {Tue, 27 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/apin/YangXZLWXS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aslib/ZhangWXSXJW22, author = {Guangyao Zhang and Licheng Wang and Weixi Xie and Furong Shang and Xinlu Xia and Chunlin Jiang and Xianwen Wang}, title = {"This article is interesting, however": exploring the language use in the peer review comment of articles published in the {BMJ}}, journal = {Aslib J. Inf. Manag.}, volume = {74}, number = {3}, pages = {399--416}, year = {2022}, url = {https://doi.org/10.1108/AJIM-06-2021-0172}, doi = {10.1108/AJIM-06-2021-0172}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aslib/ZhangWXSXJW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/automatica/WangWZW22, author = {Licheng Wang and Zidong Wang and Di Zhao and Guoliang Wei}, title = {Event-based state estimation under constrained bit rate: An encoding-decoding approach}, journal = {Autom.}, volume = {143}, pages = {110421}, year = {2022}, url = {https://doi.org/10.1016/j.automatica.2022.110421}, doi = {10.1016/J.AUTOMATICA.2022.110421}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/automatica/WangWZW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/HongSWXWYHL22, author = {Haibo Hong and Jun Shao and Licheng Wang and Mande Xie and Guiyi Wei and Yixian Yang and Song Han and Jianhong Lin}, title = {A {CCA} secure public key encryption scheme based on finite groups of Lie type}, journal = {Sci. China Inf. Sci.}, volume = {65}, number = {1}, year = {2022}, url = {https://doi.org/10.1007/s11432-019-2704-7}, doi = {10.1007/S11432-019-2704-7}, timestamp = {Tue, 13 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/HongSWXWYHL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/TongBDLW22, author = {Xiaofei Tong and Jingguo Bi and Yufei Duan and Lixiang Li and Licheng Wang}, title = {Security Analysis of {DBTRU} Cryptosystem}, journal = {Entropy}, volume = {24}, number = {10}, pages = {1349}, year = {2022}, url = {https://doi.org/10.3390/e24101349}, doi = {10.3390/E24101349}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entropy/TongBDLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/WangZZDY22, author = {Licheng Wang and Di Zhao and Yuhan Zhang and Derui Ding and Xiao{-}jian Yi}, title = {Gain-scheduled state estimation for discrete-time complex networks under bit-rate constraints}, journal = {Neurocomputing}, volume = {488}, pages = {120--129}, year = {2022}, url = {https://doi.org/10.1016/j.neucom.2022.03.002}, doi = {10.1016/J.NEUCOM.2022.03.002}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijon/WangZZDY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/WangZWDL22, author = {Licheng Wang and Di Zhao and Yu{-}Ang Wang and Derui Ding and Hongjian Liu}, title = {Partial-neurons-based state estimation for artificial neural networks under constrained bit rate: The finite-time case}, journal = {Neurocomputing}, volume = {488}, pages = {144--153}, year = {2022}, url = {https://doi.org/10.1016/j.neucom.2022.03.001}, doi = {10.1016/J.NEUCOM.2022.03.001}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijon/WangZWDL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsysc/WangLZDY22, author = {Licheng Wang and Shuai Liu and Yuhan Zhang and Derui Ding and Xiao{-}jian Yi}, title = {Non-fragile \emph{l}\({}_{\mbox{2}}\)-\emph{l}\({}_{\mbox{{\(\infty\)}}}\) state estimation for time-delayed artificial neural networks: an adaptive event-triggered approach}, journal = {Int. J. Syst. Sci.}, volume = {53}, number = {10}, pages = {2247--2259}, year = {2022}, url = {https://doi.org/10.1080/00207721.2022.2049919}, doi = {10.1080/00207721.2022.2049919}, timestamp = {Sun, 03 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsysc/WangLZDY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ShenWWDZ22, author = {Xiaoying Shen and Baocang Wang and Licheng Wang and Pu Duan and Benyu Zhang}, title = {Group public key encryption supporting equality test without bilinear pairings}, journal = {Inf. Sci.}, volume = {605}, pages = {202--224}, year = {2022}, url = {https://doi.org/10.1016/j.ins.2022.05.001}, doi = {10.1016/J.INS.2022.05.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/ShenWWDZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsa/OdoomHW22, author = {Justice Odoom and Xiaofang Huang and Licheng Wang}, title = {Stateless forward-secure key-insulated linkable ring signature scheme in ID-based setting}, journal = {J. Syst. Archit.}, volume = {129}, pages = {102600}, year = {2022}, url = {https://doi.org/10.1016/j.sysarc.2022.102600}, doi = {10.1016/J.SYSARC.2022.102600}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsa/OdoomHW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/YanGSW22, author = {Xingyu Yan and Lize Gu and Jingwen Suo and Licheng Wang}, title = {Leveraging the hardness of dihedral coset problem for quantum cryptography}, journal = {Quantum Inf. Process.}, volume = {21}, number = {9}, pages = {308}, year = {2022}, url = {https://doi.org/10.1007/s11128-022-03592-9}, doi = {10.1007/S11128-022-03592-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/YanGSW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcasI/WangTWL22, author = {Licheng Wang and Engang Tian and Changsong Wang and Shuai Liu}, title = {Secure Estimation Against Malicious Attacks for Lithium-Ion Batteries Under Cloud Environments}, journal = {{IEEE} Trans. Circuits Syst. {I} Regul. Pap.}, volume = {69}, number = {10}, pages = {4237--4247}, year = {2022}, url = {https://doi.org/10.1109/TCSI.2022.3187725}, doi = {10.1109/TCSI.2022.3187725}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcasI/WangTWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcyb/LiuWWW22, author = {Shuai Liu and Zidong Wang and Licheng Wang and Guoliang Wei}, title = {H{\(\infty\)} Pinning Control of Complex Dynamical Networks Under Dynamic Quantization Effects: {A} Coupled Backward Riccati Equation Approach}, journal = {{IEEE} Trans. Cybern.}, volume = {52}, number = {8}, pages = {7377--7387}, year = {2022}, url = {https://doi.org/10.1109/TCYB.2020.3021982}, doi = {10.1109/TCYB.2020.3021982}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcyb/LiuWWW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tie/ChenTW22, author = {Hui Chen and Engang Tian and Licheng Wang}, title = {State-of-Charge Estimation of Lithium-Ion Batteries Subject to Random Sensor Data Unavailability: {A} Recursive Filtering Approach}, journal = {{IEEE} Trans. Ind. Electron.}, volume = {69}, number = {5}, pages = {5175--5184}, year = {2022}, url = {https://doi.org/10.1109/TIE.2021.3078376}, doi = {10.1109/TIE.2021.3078376}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tie/ChenTW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsmc/LiuWWW22, author = {Shuai Liu and Zidong Wang and Licheng Wang and Guoliang Wei}, title = {Recursive Set-Membership State Estimation Over a FlexRay Network}, journal = {{IEEE} Trans. Syst. Man Cybern. Syst.}, volume = {52}, number = {6}, pages = {3591--3601}, year = {2022}, url = {https://doi.org/10.1109/TSMC.2021.3071390}, doi = {10.1109/TSMC.2021.3071390}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsmc/LiuWWW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/swarm/WuPLSWK22, author = {Wei Wu and Haipeng Peng and Lixiang Li and Harry Eugene Stanley and Licheng Wang and J{\"{u}}rgen Kurths}, editor = {Ying Tan and Yuhui Shi and Ben Niu}, title = {A Novel Intelligent Ant Colony System Based on Blockchain}, booktitle = {Advances in Swarm Intelligence - 13th International Conference, {ICSI} 2022, Xi'an, China, July 15-19, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13344}, pages = {230--246}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-09677-8\_20}, doi = {10.1007/978-3-031-09677-8\_20}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/swarm/WuPLSWK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-13530, author = {Zhenrong Zhang and Jiefeng Ma and Jun Du and Licheng Wang and Jianshu Zhang}, title = {Multimodal Pre-training Based on Graph Attention Network for Document Understanding}, journal = {CoRR}, volume = {abs/2203.13530}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.13530}, doi = {10.48550/ARXIV.2203.13530}, eprinttype = {arXiv}, eprint = {2203.13530}, timestamp = {Tue, 29 Mar 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-13530.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-16993, author = {Xingyu Yan and Licheng Wang and Weiqiang Wen and Ziyi Li and Jingwen Suo and Lize Gu}, title = {Post-Quantum {\(\kappa\)}-to-1 Trapdoor Claw-free Functions from Extrapolated Dihedral Cosets}, journal = {CoRR}, volume = {abs/2211.16993}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.16993}, doi = {10.48550/ARXIV.2211.16993}, eprinttype = {arXiv}, eprint = {2211.16993}, timestamp = {Fri, 02 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-16993.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhouZZDHWL22, author = {You Zhou and Zongyang Zhang and Haibin Zhang and Sisi Duan and Bin Hu and Licheng Wang and Jianwei Liu}, title = {Dory: Asynchronous {BFT} with Reduced Communication and Improved Efficiency}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1709}, year = {2022}, url = {https://eprint.iacr.org/2022/1709}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ZhouZZDHWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhuWAX21, author = {Huijun Zhu and Licheng Wang and Haseeb Ahmad and Dong Xie}, title = {Pairing-Free for Public Key Encryption With Equality Test Scheme}, journal = {{IEEE} Access}, volume = {9}, pages = {77239--77249}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3081709}, doi = {10.1109/ACCESS.2021.3081709}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZhuWAX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/apin/YangXXWBS21, author = {Sijia Yang and Haoyi Xiong and Kaibo Xu and Licheng Wang and Jiang Bian and Zeyi Sun}, title = {Improving covariance-regularized discriminant analysis for EHR-based predictive analytics of diseases}, journal = {Appl. Intell.}, volume = {51}, number = {1}, pages = {377--395}, year = {2021}, url = {https://doi.org/10.1007/s10489-020-01810-4}, doi = {10.1007/S10489-020-01810-4}, timestamp = {Tue, 27 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/apin/YangXXWBS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/complexity/WangLSZWSDL21, author = {Kai Wang and Chunli Liu and Jianrui Sun and Kun Zhao and Licheng Wang and Jinyan Song and Chongxiong Duan and Liwei Li}, title = {State of Charge Estimation of Composite Energy Storage Systems with Supercapacitors and Lithium Batteries}, journal = {Complex.}, volume = {2021}, pages = {8816250:1--8816250:15}, year = {2021}, url = {https://doi.org/10.1155/2021/8816250}, doi = {10.1155/2021/8816250}, timestamp = {Fri, 16 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/complexity/WangLSZWSDL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cssp/LiuWW21, author = {Linlin Liu and Guoliang Wei and Licheng Wang}, title = {Pinning Synchronization Control for a Class of Dynamical Networks with Coupled Time-Varying Delays: An Interval-Observer-Based Approach}, journal = {Circuits Syst. Signal Process.}, volume = {40}, number = {1}, pages = {154--173}, year = {2021}, url = {https://doi.org/10.1007/s00034-020-01488-6}, doi = {10.1007/S00034-020-01488-6}, timestamp = {Tue, 19 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cssp/LiuWW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/JadoonLW21, author = {Ahmer Khan Jadoon and Jing Li and Licheng Wang}, title = {Physical layer authentication for automotive cyber physical systems based on modified {HB} protocol}, journal = {Frontiers Comput. Sci.}, volume = {15}, number = {3}, pages = {153809}, year = {2021}, url = {https://doi.org/10.1007/s11704-020-0010-4}, doi = {10.1007/S11704-020-0010-4}, timestamp = {Fri, 01 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/JadoonLW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/information/PanYPGW21, author = {Ping Pan and Junzhi Ye and Yun Pan and Lize Gu and Licheng Wang}, title = {New Commitment Schemes Based on Conjugacy Problems over Rubik's Groups}, journal = {Inf.}, volume = {12}, number = {8}, pages = {294}, year = {2021}, url = {https://doi.org/10.3390/info12080294}, doi = {10.3390/INFO12080294}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/information/PanYPGW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/MaPZZWJ21, author = {Lichuan Ma and Qingqi Pei and Lu Zhou and Haojin Zhu and Licheng Wang and Yusheng Ji}, title = {Federated Data Cleaning: Collaborative and Privacy-Preserving Data Cleaning for Edge Intelligence}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {8}, pages = {6757--6770}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2020.3027980}, doi = {10.1109/JIOT.2020.3027980}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/MaPZZWJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/LiWW21, author = {Xin Li and Guoliang Wei and Licheng Wang}, title = {Distributed set-membership filtering for discrete-time systems subject to denial-of-service attacks and fading measurements: {A} zonotopic approach}, journal = {Inf. Sci.}, volume = {547}, pages = {49--67}, year = {2021}, url = {https://doi.org/10.1016/j.ins.2020.07.041}, doi = {10.1016/J.INS.2020.07.041}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/LiWW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kais/YangXHXWZS21, author = {Sijia Yang and Haoyi Xiong and Di Hu and Kaibo Xu and Licheng Wang and Peizhen Zhu and Zeyi Sun}, title = {Generalising combinatorial discriminant analysis through conditioning truncated Rayleigh flow}, journal = {Knowl. Inf. Syst.}, volume = {63}, number = {8}, pages = {2189--2208}, year = {2021}, url = {https://doi.org/10.1007/s10115-021-01587-z}, doi = {10.1007/S10115-021-01587-Z}, timestamp = {Tue, 27 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/kais/YangXHXWZS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/ShenWPLL21, author = {Xiaoying Shen and Licheng Wang and Qingqi Pei and Yuan Liu and Miaomiao Li}, title = {Location privacy-preserving in online taxi-hailing services}, journal = {Peer-to-Peer Netw. Appl.}, volume = {14}, number = {1}, pages = {69--81}, year = {2021}, url = {https://doi.org/10.1007/s12083-020-00982-7}, doi = {10.1007/S12083-020-00982-7}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/ShenWPLL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhouNW21, author = {Yunhong Zhou and Jiehui Nan and Licheng Wang}, title = {Fine-Grained Attribute-Based Multikeyword Search for Shared Multiowner in Internet of Things}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {6649119:1--6649119:14}, year = {2021}, url = {https://doi.org/10.1155/2021/6649119}, doi = {10.1155/2021/6649119}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhouNW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tac/WangWSW21, author = {Licheng Wang and Zidong Wang and Bo Shen and Guoliang Wei}, title = {Recursive Filtering With Measurement Fading: {A} Multiple Description Coding Scheme}, journal = {{IEEE} Trans. Autom. Control.}, volume = {66}, number = {11}, pages = {5144--5159}, year = {2021}, url = {https://doi.org/10.1109/TAC.2020.3034196}, doi = {10.1109/TAC.2020.3034196}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tac/WangWSW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcyb/ChenWWS21, author = {Yun Chen and Zidong Wang and Licheng Wang and Weiguo Sheng}, title = {Finite-Horizon H\({}_{\mbox{{\(\infty\)}}}\) State Estimation for Stochastic Coupled Networks With Random Inner Couplings Using Round-Robin Protocol}, journal = {{IEEE} Trans. Cybern.}, volume = {51}, number = {3}, pages = {1204--1215}, year = {2021}, url = {https://doi.org/10.1109/TCYB.2020.3004288}, doi = {10.1109/TCYB.2020.3004288}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcyb/ChenWWS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tetci/BianYXWFSGW21, author = {Jiang Bian and Sijia Yang and Haoyi Xiong and Licheng Wang and Yanjie Fu and Zeyi Sun and Zhishan Guo and Jun Wang}, title = {{CRLEDD:} Regularized Causalities Learning for Early Detection of Diseases Using Electronic Health Record {(EHR)} Data}, journal = {{IEEE} Trans. Emerg. Top. Comput. Intell.}, volume = {5}, number = {4}, pages = {541--553}, year = {2021}, url = {https://doi.org/10.1109/TETCI.2020.3010017}, doi = {10.1109/TETCI.2020.3010017}, timestamp = {Tue, 27 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tetci/BianYXWFSGW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/TangTWWY21, author = {Zhenhui Tang and Engang Tian and Yongxiong Wang and Licheng Wang and Taicheng Yang}, title = {Nondestructive Defect Detection in Castings by Using Spatial Attention Bilinear Convolutional Neural Network}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {17}, number = {1}, pages = {82--89}, year = {2021}, url = {https://doi.org/10.1109/TII.2020.2985159}, doi = {10.1109/TII.2020.2985159}, timestamp = {Sat, 14 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tii/TangTWWY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/GuanWWS21, author = {Qi Guan and Guoliang Wei and Licheng Wang and Yan Song}, title = {A Novel Feature Points Tracking Algorithm in Terms of IMU-Aided Information Fusion}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {17}, number = {8}, pages = {5304--5313}, year = {2021}, url = {https://doi.org/10.1109/TII.2020.3024079}, doi = {10.1109/TII.2020.3024079}, timestamp = {Fri, 18 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/GuanWWS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/Pattaranantakul21, author = {Montida Pattaranantakul and Qipeng Song and Yanmei Tian and Licheng Wang and Zonghua Zhang and Ahmed Meddahi and Chalee Vorakulpipat}, title = {On Achieving Trustworthy Service Function Chaining}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {18}, number = {3}, pages = {3140--3153}, year = {2021}, url = {https://doi.org/10.1109/TNSM.2021.3081014}, doi = {10.1109/TNSM.2021.3081014}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnsm/Pattaranantakul21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssps/WangXL21, author = {Licheng Wang and Yougen Xu and Zhiwen Liu}, title = {A Closed-Form Target Localization Method for {FDA-MIMO} Based on root-MUSIC and {ESPRIT} Algorithm}, booktitle = {{SSPS} 2021: The 3rd International Symposium on Signal Processing Systems, Beijing China, March 26 - 28, 2021}, pages = {19--24}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3481113.3481115}, doi = {10.1145/3481113.3481115}, timestamp = {Tue, 15 Feb 2022 19:07:39 +0100}, biburl = {https://dblp.org/rec/conf/ssps/WangXL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ShenWZL20, author = {Xiaoying Shen and Licheng Wang and Huijun Zhu and Yuan Liu}, title = {A Multivariate Public Key Encryption Scheme With Equality Test}, journal = {{IEEE} Access}, volume = {8}, pages = {75463--75472}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2988732}, doi = {10.1109/ACCESS.2020.2988732}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ShenWZL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/PanPWW20, author = {Ping Pan and Yun Pan and Zhen Wang and Licheng Wang}, title = {Provably Secure Encryption Schemes With Zero Setup and Linear Speed by Using Rubik's Cubes}, journal = {{IEEE} Access}, volume = {8}, pages = {122251--122258}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3007335}, doi = {10.1109/ACCESS.2020.3007335}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/PanPWW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/ZhouZW20, author = {Yunhong Zhou and Shihui Zheng and Licheng Wang}, title = {Privacy-Preserving and Efficient Public Key Encryption with Keyword Search Based on {CP-ABE} in Cloud}, journal = {Cryptogr.}, volume = {4}, number = {4}, pages = {28}, year = {2020}, url = {https://doi.org/10.3390/cryptography4040028}, doi = {10.3390/CRYPTOGRAPHY4040028}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/ZhouZW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/ZhouLTAW20, author = {Yunhong Zhou and Na Li and Yanmei Tian and Dezhi An and Licheng Wang}, title = {Public Key Encryption with Keyword Search in Cloud: {A} Survey}, journal = {Entropy}, volume = {22}, number = {4}, pages = {421}, year = {2020}, url = {https://doi.org/10.3390/e22040421}, doi = {10.3390/E22040421}, timestamp = {Fri, 25 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entropy/ZhouLTAW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/LiuWSL20, author = {Yuan Liu and Licheng Wang and Xiaoying Shen and Lixiang Li}, title = {New Constructions of Identity-Based Dual Receiver Encryption from Lattices}, journal = {Entropy}, volume = {22}, number = {6}, pages = {599}, year = {2020}, url = {https://doi.org/10.3390/e22060599}, doi = {10.3390/E22060599}, timestamp = {Fri, 25 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entropy/LiuWSL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/HuZZW20, author = {Xiaoya Hu and Hong Zhao and Shihui Zheng and Licheng Wang}, title = {{CBOL:} Cross-Bank Over-Loan Prevention, Revisited}, journal = {Entropy}, volume = {22}, number = {6}, pages = {619}, year = {2020}, url = {https://doi.org/10.3390/e22060619}, doi = {10.3390/E22060619}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entropy/HuZZW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/ZhaoBZW20, author = {Hong Zhao and Xue Bai and Shihui Zheng and Licheng Wang}, title = {RZcoin: Ethereum-Based Decentralized Payment with Optional Privacy Service}, journal = {Entropy}, volume = {22}, number = {7}, pages = {712}, year = {2020}, url = {https://doi.org/10.3390/e22070712}, doi = {10.3390/E22070712}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entropy/ZhaoBZW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/ZhangLGZW20, author = {Yuan Zhang and Yuan Liu and Yurong Guo and Shihui Zheng and Licheng Wang}, title = {Adaptively Secure Efficient {(H)IBE} over Ideal Lattice with Short Parameters}, journal = {Entropy}, volume = {22}, number = {11}, pages = {1247}, year = {2020}, url = {https://doi.org/10.3390/e22111247}, doi = {10.3390/E22111247}, timestamp = {Thu, 31 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entropy/ZhangLGZW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/TianWWZ20, author = {Xin Tian and Guoliang Wei and Licheng Wang and Jun Zhou}, title = {Wireless-sensor-network-based target localization: {A} semidefinite relaxation approach with adaptive threshold correction}, journal = {Neurocomputing}, volume = {405}, pages = {229--238}, year = {2020}, url = {https://doi.org/10.1016/j.neucom.2020.04.046}, doi = {10.1016/J.NEUCOM.2020.04.046}, timestamp = {Wed, 15 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijon/TianWWZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsysc/WeiLWD20, author = {Guoliang Wei and Linlin Liu and Licheng Wang and Derui Ding}, title = {Event-triggered control for discrete-time systems with unknown nonlinearities: an interval observer-based approach}, journal = {Int. J. Syst. Sci.}, volume = {51}, number = {6}, pages = {1019--1031}, year = {2020}, url = {https://doi.org/10.1080/00207721.2020.1746441}, doi = {10.1080/00207721.2020.1746441}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsysc/WeiLWD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/HanLZXRHWS20, author = {Song Han and Jianhong Lin and Shuai Zhao and Guangquan Xu and Siqi Ren and Daojing He and Licheng Wang and Leyun Shi}, title = {Location Privacy-Preserving Distance Computation for Spatial Crowdsourcing}, journal = {{IEEE} Internet Things J.}, volume = {7}, number = {8}, pages = {7550--7563}, year = {2020}, url = {https://doi.org/10.1109/JIOT.2020.2985454}, doi = {10.1109/JIOT.2020.2985454}, timestamp = {Tue, 13 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/HanLZXRHWS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itc/NiuWT20, author = {Guochen Niu and Licheng Wang and Zheng Tan}, title = {Mismatch Removal Based on Gaussian Mixture Model for Aircraft Surface Texture Mapping}, journal = {Inf. Technol. Control.}, volume = {49}, number = {1}, pages = {80--87}, year = {2020}, url = {https://doi.org/10.5755/j01.itc.49.1.22855}, doi = {10.5755/J01.ITC.49.1.22855}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itc/NiuWT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kybernetika/XuZW20, author = {Lili Xu and Sunjie Zhang and Licheng Wang}, title = {Distributed resilient filtering of large-scale systems with channel scheduling}, journal = {Kybernetika}, volume = {56}, number = {1}, pages = {170--188}, year = {2020}, url = {https://doi.org/10.14736/kyb-2020-1-0170}, doi = {10.14736/KYB-2020-1-0170}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/kybernetika/XuZW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/SuoWYZZ20, author = {Jingwen Suo and Licheng Wang and Sijia Yang and Wenjie Zheng and Jiankang Zhang}, title = {Quantum algorithms for typical hard problems: a perspective of cryptanalysis}, journal = {Quantum Inf. Process.}, volume = {19}, number = {6}, pages = {178}, year = {2020}, url = {https://doi.org/10.1007/s11128-020-02673-x}, doi = {10.1007/S11128-020-02673-X}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/SuoWYZZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiuWSLA20, author = {Yuan Liu and Licheng Wang and Xiaoying Shen and Lixiang Li and Dezhi An}, title = {Space-Efficient Key-Policy Attribute-Based Encryption from Lattices and Two-Dimensional Attributes}, journal = {Secur. Commun. Networks}, volume = {2020}, pages = {2345369:1--2345369:11}, year = {2020}, url = {https://doi.org/10.1155/2020/2345369}, doi = {10.1155/2020/2345369}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiuWSLA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnn/ChenWWS20, author = {Yun Chen and Zidong Wang and Licheng Wang and Weiguo Sheng}, title = {Mixed {\textdollar}H{\_}2/H{\_}{\textbackslash}infty{\textdollar} State Estimation for Discrete-Time Switched Complex Networks With Random Coupling Strengths Through Redundant Channels}, journal = {{IEEE} Trans. Neural Networks Learn. Syst.}, volume = {31}, number = {10}, pages = {4130--4142}, year = {2020}, url = {https://doi.org/10.1109/TNNLS.2019.2952249}, doi = {10.1109/TNNLS.2019.2952249}, timestamp = {Fri, 25 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnn/ChenWWS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhaoCDSWL20, author = {Xiaopeng Zhao and Zhenfu Cao and Xiaolei Dong and Jun Shao and Licheng Wang and Zhusen Liu}, editor = {Joseph K. Liu and Hui Cui}, title = {New Assumptions and Efficient Cryptosystems from the e-th Power Residue Symbol}, booktitle = {Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12248}, pages = {408--424}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-55304-3\_21}, doi = {10.1007/978-3-030-55304-3\_21}, timestamp = {Sat, 20 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ZhaoCDSWL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/KangLYXA0FWD20, author = {Qi Kang and Ji Liu and Sijia Yang and Haoyi Xiong and Haozhe An and Xingjian Li and Zhi Feng and Licheng Wang and Dejing Dou}, editor = {Xintao Wu and Chris Jermaine and Li Xiong and Xiaohua Hu and Olivera Kotevska and Siyuan Lu and Weija Xu and Srinivas Aluru and Chengxiang Zhai and Eyhab Al{-}Masri and Zhiyuan Chen and Jeff Saltz}, title = {Quasi-optimal Data Placement for Secure Multi-tenant Data Federation on the Cloud}, booktitle = {2020 {IEEE} International Conference on Big Data {(IEEE} BigData 2020), Atlanta, GA, USA, December 10-13, 2020}, pages = {1954--1963}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/BigData50022.2020.9377953}, doi = {10.1109/BIGDATA50022.2020.9377953}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bigdataconf/KangLYXA0FWD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/Wang0PW20, author = {Cong Wang and Chen Chen and Qingqi Pei and Licheng Wang}, title = {{IDDS:} An {ICN} based Data Dissemination Scheme for Vehicular Networks}, booktitle = {2020 {IEEE} International Conference on Communications, {ICC} 2020, Dublin, Ireland, June 7-11, 2020}, pages = {1--7}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICC40277.2020.9148865}, doi = {10.1109/ICC40277.2020.9148865}, timestamp = {Wed, 20 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/Wang0PW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhaoCDSWL20, author = {Xiaopeng Zhao and Zhenfu Cao and Xiaolei Dong and Jun Shao and Licheng Wang and Zhusen Liu}, title = {New Assumptions and Efficient Cryptosystems from the e-th Power Residue Symbol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {245}, year = {2020}, url = {https://eprint.iacr.org/2020/245}, timestamp = {Sat, 20 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhaoCDSWL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/au/Wang19b, author = {Licheng Wang}, title = {Impacts of large-scale {PV} integration on power distribution systems and investigation of possible solutions}, school = {University of Queensland, Australia}, year = {2019}, url = {https://doi.org/10.14264/uql.2019.809}, doi = {10.14264/UQL.2019.809}, timestamp = {Sat, 28 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/au/Wang19b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LiuWLY19, author = {Yuan Liu and Licheng Wang and Lixiang Li and Xixi Yan}, title = {Secure and Efficient Multi-Authority Attribute-Based Encryption Scheme From Lattices}, journal = {{IEEE} Access}, volume = {7}, pages = {3665--3674}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2018.2888850}, doi = {10.1109/ACCESS.2018.2888850}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LiuWLY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LiWCW19, author = {Yonggang Li and Yun Wu and Chaoyuan Cui and Licheng Wang}, title = {{RMVP:} {A} Real-Time Method to Monitor Random Processes of Virtual Machine}, journal = {{IEEE} Access}, volume = {7}, pages = {15845--15860}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2893627}, doi = {10.1109/ACCESS.2019.2893627}, timestamp = {Tue, 30 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LiWCW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LiuWWSL19, author = {Zhanqiang Liu and Licheng Wang and Xianmin Wang and Xiaoying Shen and Lixiang Li}, title = {Secure Remote Sensing Image Registration Based on Compressed Sensing in Cloud Setting}, journal = {{IEEE} Access}, volume = {7}, pages = {36516--36526}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2903826}, doi = {10.1109/ACCESS.2019.2903826}, timestamp = {Sat, 13 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LiuWWSL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WangTPY19, author = {Licheng Wang and Yanmei Tian and Yun Pan and Yixian Yang}, title = {New Construction of Blind Signatures From Braid Groups}, journal = {{IEEE} Access}, volume = {7}, pages = {36549--36557}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2904146}, doi = {10.1109/ACCESS.2019.2904146}, timestamp = {Tue, 16 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/WangTPY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LvWZDG19, author = {Pin Lv and Licheng Wang and Huijun Zhu and Wenbo Deng and Lize Gu}, title = {An IOT-Oriented Privacy-Preserving Publish/Subscribe Model Over Blockchains}, journal = {{IEEE} Access}, volume = {7}, pages = {41309--41314}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2907599}, doi = {10.1109/ACCESS.2019.2907599}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LvWZDG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/YanWLAYY19, author = {Jianhua Yan and Licheng Wang and Muzi Li and Haseeb Ahmad and Jun Yue and Wenbin Yao}, title = {Attribute-Based Signcryption From Lattices in the Standard Model}, journal = {{IEEE} Access}, volume = {7}, pages = {56039--56050}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2900003}, doi = {10.1109/ACCESS.2019.2900003}, timestamp = {Fri, 31 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/YanWLAYY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LiW19h, author = {Miaomiao Li and Licheng Wang}, title = {A Survey on Personalized News Recommendation Technology}, journal = {{IEEE} Access}, volume = {7}, pages = {145861--145879}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2944927}, doi = {10.1109/ACCESS.2019.2944927}, timestamp = {Thu, 07 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/LiW19h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/YangBWZFX19, author = {Sijia Yang and Jiang Bian and Licheng Wang and Haojin Zhu and Yanjie Fu and Haoyi Xiong}, title = {EdgeSense: Edge-Mediated Spatial- Temporal Crowdsensing}, journal = {{IEEE} Access}, volume = {7}, pages = {1495122--95131}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2018.2870298}, doi = {10.1109/ACCESS.2018.2870298}, timestamp = {Wed, 16 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/YangBWZFX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bmcbi/WangSPL19, author = {Licheng Wang and Jingwen Suo and Yun Pan and Lixiang Li}, title = {DDmap: a {MATLAB} package for the double digest problem using multiple genetic operators}, journal = {{BMC} Bioinform.}, volume = {20}, number = {1}, pages = {348:1--348:12}, year = {2019}, url = {https://doi.org/10.1186/s12859-019-2862-x}, doi = {10.1186/S12859-019-2862-X}, timestamp = {Sat, 13 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bmcbi/WangSPL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/HongWSYAWXY19, author = {Haibo Hong and Licheng Wang and Jun Shao and Jianhua Yan and Haseeb Ahmad and Guiyi Wei and Mande Xie and Yixian Yang}, title = {A Miniature {CCA} Public Key Encryption Scheme Based on Non-abelian Factorization Problem in Finite Groups of Lie Type}, journal = {Comput. J.}, volume = {62}, number = {12}, pages = {1840--1848}, year = {2019}, url = {https://doi.org/10.1093/comjnl/bxz068}, doi = {10.1093/COMJNL/BXZ068}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/HongWSYAWXY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/complexity/HuangWW19, author = {Yinuo Huang and Licheng Wang and Kai Wang}, title = {Investigation of Var Compensation Schemes in Unbalanced Distribution Systems}, journal = {Complex.}, volume = {2019}, pages = {7824743:1--7824743:13}, year = {2019}, url = {https://doi.org/10.1155/2019/7824743}, doi = {10.1155/2019/7824743}, timestamp = {Wed, 11 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/complexity/HuangWW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/LiWWWHL19, author = {Jing Li and Licheng Wang and Lihua Wang and Xianmin Wang and Zhengan Huang and Jin Li}, title = {Verifiable Chebyshev maps-based chaotic encryption schemes with outsourcing computations in the cloud/fog scenarios}, journal = {Concurr. Comput. Pract. Exp.}, volume = {31}, number = {22}, year = {2019}, url = {https://doi.org/10.1002/cpe.4523}, doi = {10.1002/CPE.4523}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/LiWWWHL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/WangLLLGL19, author = {Licheng Wang and Lixiang Li and Jin Li and Jing Li and Brij B. Gupta and Xia Liu}, title = {Compressive Sensing of Medical Images With Confidentially Homomorphic Aggregations}, journal = {{IEEE} Internet Things J.}, volume = {6}, number = {2}, pages = {1402--1409}, year = {2019}, url = {https://doi.org/10.1109/JIOT.2018.2844727}, doi = {10.1109/JIOT.2018.2844727}, timestamp = {Sat, 13 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/WangLLLGL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/WangMZTO19, author = {Licheng Wang and Yan Meng and Haojin Zhu and Minxing Tang and Kaoru Ota}, title = {Edge-Assisted Stream Scheduling Scheme for the Green-Communication-Based IoT}, journal = {{IEEE} Internet Things J.}, volume = {6}, number = {4}, pages = {7282--7292}, year = {2019}, url = {https://doi.org/10.1109/JIOT.2019.2915793}, doi = {10.1109/JIOT.2019.2915793}, timestamp = {Mon, 27 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/WangMZTO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/WangWWA19, author = {Licheng Wang and Zidong Wang and Guoliang Wei and Fuad E. Alsaadi}, title = {Variance-constrained \emph{H}\({}_{\mbox{{\(\infty\)}}}\) state estimation for time-varying multi-rate systems with redundant channels: The finite-horizon case}, journal = {Inf. Sci.}, volume = {501}, pages = {222--235}, year = {2019}, url = {https://doi.org/10.1016/j.ins.2019.05.073}, doi = {10.1016/J.INS.2019.05.073}, timestamp = {Thu, 08 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/WangWWA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/WangSLSY19, author = {Licheng Wang and Xiaoying Shen and Jing Li and Jun Shao and Yixian Yang}, title = {Cryptographic primitives in blockchains}, journal = {J. Netw. Comput. Appl.}, volume = {127}, pages = {43--58}, year = {2019}, url = {https://doi.org/10.1016/j.jnca.2018.11.003}, doi = {10.1016/J.JNCA.2018.11.003}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/WangSLSY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpdc/LiWHWX19, author = {Jing Li and Xianmin Wang and Zhengan Huang and Licheng Wang and Yang Xiang}, title = {Multi-level multi-secret sharing scheme for decentralized e-voting in cloud computing}, journal = {J. Parallel Distributed Comput.}, volume = {130}, pages = {91--97}, year = {2019}, url = {https://doi.org/10.1016/j.jpdc.2019.04.003}, doi = {10.1016/J.JPDC.2019.04.003}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpdc/LiWHWX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcyb/WangWWA19, author = {Licheng Wang and Zidong Wang and Guoliang Wei and Fuad E. Alsaadi}, title = {Observer-Based Consensus Control for Discrete-Time Multiagent Systems With Coding-Decoding Communication Protocol}, journal = {{IEEE} Trans. Cybern.}, volume = {49}, number = {12}, pages = {4335--4345}, year = {2019}, url = {https://doi.org/10.1109/TCYB.2018.2863664}, doi = {10.1109/TCYB.2018.2863664}, timestamp = {Sat, 30 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcyb/WangWWA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/FengHXSYZWCYL19, author = {Zhi Feng and Jun Huan and Haoyi Xiong and Chuanyuan Song and Sijia Yang and Baoxin Zhao and Licheng Wang and Zeyu Chen and Shengwen Yang and Liping Liu}, editor = {Chaitanya K. Baru and Jun Huan and Latifur Khan and Xiaohua Hu and Ronay Ak and Yuanyuan Tian and Roger S. Barga and Carlo Zaniolo and Kisung Lee and Yanfang (Fanny) Ye}, title = {SecureGBM: Secure Multi-Party Gradient Boosting}, booktitle = {2019 {IEEE} International Conference on Big Data {(IEEE} BigData), Los Angeles, CA, USA, December 9-12, 2019}, pages = {1312--1321}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/BigData47090.2019.9006000}, doi = {10.1109/BIGDATA47090.2019.9006000}, timestamp = {Tue, 18 Oct 2022 14:44:48 +0200}, biburl = {https://dblp.org/rec/conf/bigdataconf/FengHXSYZWCYL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/BaiWZYL19, author = {Xue Bai and Licheng Wang and Lijing Zhou and Sijia Yang and Lixiang Li}, title = {RZcash: {A} Privacy Protection Scheme for the Account-based Blockchain}, booktitle = {17th International Conference on Privacy, Security and Trust, {PST} 2019, Fredericton, NB, Canada, August 26-28, 2019}, pages = {1--9}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/PST47121.2019.8949060}, doi = {10.1109/PST47121.2019.8949060}, timestamp = {Sat, 13 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pst/BaiWZYL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/HuWZLY19, author = {Xiaoya Hu and Licheng Wang and Lijing Zhou and Lixiang Li and Sijia Yang}, title = {A blockchain-based loan over-prevention mechanism}, booktitle = {17th International Conference on Privacy, Security and Trust, {PST} 2019, Fredericton, NB, Canada, August 26-28, 2019}, pages = {1--9}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/PST47121.2019.8949077}, doi = {10.1109/PST47121.2019.8949077}, timestamp = {Sat, 13 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pst/HuWZLY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/Pattaranantakul19, author = {Montida Pattaranantakul and Qipeng Song and Yanmei Tian and Licheng Wang and Zonghua Zhang and Ahmed Meddahi}, editor = {Songqing Chen and Kim{-}Kwang Raymond Choo and Xinwen Fu and Wenjing Lou and Aziz Mohaisen}, title = {Footprints: Ensuring Trusted Service Function Chaining in the World of {SDN} and {NFV}}, booktitle = {Security and Privacy in Communication Networks - 15th {EAI} International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {305}, pages = {287--301}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-37231-6\_16}, doi = {10.1007/978-3-030-37231-6\_16}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/Pattaranantakul19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1911-11997, author = {Zhi Feng and Haoyi Xiong and Chuanyuan Song and Sijia Yang and Baoxin Zhao and Licheng Wang and Zeyu Chen and Shengwen Yang and Liping Liu and Jun Huan}, title = {SecureGBM: Secure Multi-Party Gradient Boosting}, journal = {CoRR}, volume = {abs/1911.11997}, year = {2019}, url = {http://arxiv.org/abs/1911.11997}, eprinttype = {arXiv}, eprint = {1911.11997}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1911-11997.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/QiuXAW18, author = {Shuming Qiu and Guoai Xu and Haseeb Ahmad and Licheng Wang}, title = {A Robust Mutual Authentication Scheme Based on Elliptic Curve Cryptography for Telecare Medical Information Systems}, journal = {{IEEE} Access}, volume = {6}, pages = {7452--7463}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2017.2780124}, doi = {10.1109/ACCESS.2017.2780124}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/QiuXAW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HuangYW18, author = {Qinlong Huang and Yixian Yang and Licheng Wang}, title = {Correction to "Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things"}, journal = {{IEEE} Access}, volume = {6}, pages = {17245}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2823178}, doi = {10.1109/ACCESS.2018.2823178}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/HuangYW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhouWSL18, author = {Lijing Zhou and Licheng Wang and Yiru Sun and Pin Lv}, title = {BeeKeeper: {A} Blockchain-Based IoT System With Secure Storage and Homomorphic Computation}, journal = {{IEEE} Access}, volume = {6}, pages = {43472--43488}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2847632}, doi = {10.1109/ACCESS.2018.2847632}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZhouWSL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhouWSA18, author = {Lijing Zhou and Licheng Wang and Yi{-}Ru Sun and Tianyi Ai}, title = {AntNest: Fully Non-Interactive Secure Multi-Party Computation}, journal = {{IEEE} Access}, volume = {6}, pages = {75639--75649}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2883775}, doi = {10.1109/ACCESS.2018.2883775}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZhouWSA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/AhmadDWAHY18, author = {Haseeb Ahmad and Ali Daud and Licheng Wang and Ibrar Ahmad and Muhammad Hafeez and Yixian Yang}, title = {Quantifying team precedence in the game of cricket}, journal = {Clust. Comput.}, volume = {21}, number = {1}, pages = {523--537}, year = {2018}, url = {https://doi.org/10.1007/s10586-017-0919-z}, doi = {10.1007/S10586-017-0919-Z}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cluster/AhmadDWAHY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/WangZDWCY18, author = {Licheng Wang and Zonghua Zhang and Mianxiong Dong and Lihua Wang and Zhenfu Cao and Yixian Yang}, title = {Securing Named Data Networking: Attribute-Based Encryption and Beyond}, journal = {{IEEE} Commun. Mag.}, volume = {56}, number = {11}, pages = {76--81}, year = {2018}, url = {https://doi.org/10.1109/MCOM.2018.1701123}, doi = {10.1109/MCOM.2018.1701123}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/WangZDWCY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/AhmadWHLDAY18, author = {Haseeb Ahmad and Licheng Wang and Haibo Hong and Jing Li and Hassan Dawood and Manzoor Ahmed and Yixian Yang}, title = {Primitives towards verifiable computation: a survey}, journal = {Frontiers Comput. Sci.}, volume = {12}, number = {3}, pages = {451--478}, year = {2018}, url = {https://doi.org/10.1007/s11704-016-6148-4}, doi = {10.1007/S11704-016-6148-4}, timestamp = {Sat, 31 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fcsc/AhmadWHLDAY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/LiWNGQ18, author = {Jing Li and Licheng Wang and Xinxin Niu and Lize Gu and Zhiguo Qu}, title = {Star-Topological Encryption: Talking to the Sever but Hiding Identities to Others}, journal = {Fundam. Informaticae}, volume = {157}, number = {1-2}, pages = {29--46}, year = {2018}, url = {https://doi.org/10.3233/FI-2018-1616}, doi = {10.3233/FI-2018-1616}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/LiWNGQ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/WangLGYQ18, author = {Licheng Wang and Jing Li and Lize Gu and Jianhua Yan and Zhiguo Qu}, title = {An Efficient Construction of Quantum Attack Resistant Proxy Re-Encryption Based on (Semi)group Factorization Problems}, journal = {Fundam. Informaticae}, volume = {157}, number = {1-2}, pages = {47--62}, year = {2018}, url = {https://doi.org/10.3233/FI-2018-1617}, doi = {10.3233/FI-2018-1617}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/WangLGYQ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeejas/WangWLW18, author = {Zidong Wang and Licheng Wang and Shuai Liu and Guoliang Wei}, title = {Encoding-Decoding-Based control and filtering of networked systems: insights, developments and opportunities}, journal = {{IEEE} {CAA} J. Autom. Sinica}, volume = {5}, number = {1}, pages = {3--18}, year = {2018}, url = {https://doi.org/10.1109/JAS.2017.7510727}, doi = {10.1109/JAS.2017.7510727}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeejas/WangWLW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/LiuWWW18, author = {Shuai Liu and Zidong Wang and Licheng Wang and Guoliang Wei}, title = {On quantized H{\(\infty\)} filtering for multi-rate systems under stochastic communication protocols: The finite-horizon case}, journal = {Inf. Sci.}, volume = {459}, pages = {211--223}, year = {2018}, url = {https://doi.org/10.1016/j.ins.2018.02.050}, doi = {10.1016/J.INS.2018.02.050}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/LiuWWW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ZhuWQN18, author = {Huijun Zhu and Licheng Wang and Shuming Qiu and Xinxin Niu}, title = {New Public Key Encryption with Equality Test Based on non-Abelian Factorization Problems}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {12}, number = {2}, pages = {764--785}, year = {2018}, url = {https://doi.org/10.3837/tiis.2018.02.013}, doi = {10.3837/TIIS.2018.02.013}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/ZhuWQN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jms/ZhouWS18, author = {Lijing Zhou and Licheng Wang and Yiru Sun}, title = {MIStore: a Blockchain-Based Medical Insurance Storage System}, journal = {J. Medical Syst.}, volume = {42}, number = {8}, pages = {149:1--149:17}, year = {2018}, url = {https://doi.org/10.1007/s10916-018-0996-4}, doi = {10.1007/S10916-018-0996-4}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jms/ZhouWS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/ZhouWAS18, author = {Lijing Zhou and Licheng Wang and Tianyi Ai and Yiru Sun}, title = {BeeKeeper 2.0: Confidential Blockchain-Enabled IoT System with Fully Homomorphic Computation}, journal = {Sensors}, volume = {18}, number = {11}, pages = {3785}, year = {2018}, url = {https://doi.org/10.3390/s18113785}, doi = {10.3390/S18113785}, timestamp = {Sat, 30 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/ZhouWAS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/LiLWHAN18, author = {Jing Li and Xiong Li and Licheng Wang and Debiao He and Haseeb Ahmad and Xinxin Niu}, title = {Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption}, journal = {Soft Comput.}, volume = {22}, number = {3}, pages = {707--714}, year = {2018}, url = {https://doi.org/10.1007/s00500-017-2482-1}, doi = {10.1007/S00500-017-2482-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/soco/LiLWHAN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcyb/WangWHW18, author = {Licheng Wang and Zidong Wang and Qing{-}Long Han and Guoliang Wei}, title = {Event-Based Variance-Constrained {\textdollar}\{{\textbackslash}mathcal \{H\}\}{\_}\{{\textbackslash}infty \}{\textdollar} Filtering for Stochastic Parameter Systems Over Sensor Networks With Successive Missing Measurements}, journal = {{IEEE} Trans. Cybern.}, volume = {48}, number = {3}, pages = {1007--1017}, year = {2018}, url = {https://doi.org/10.1109/TCYB.2017.2671032}, doi = {10.1109/TCYB.2017.2671032}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcyb/WangWHW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcyb/WangWHW18a, author = {Licheng Wang and Zidong Wang and Qing{-}Long Han and Guoliang Wei}, title = {Synchronization Control for a Class of Discrete-Time Dynamical Networks With Packet Dropouts: {A} Coding-Decoding-Based Approach}, journal = {{IEEE} Trans. Cybern.}, volume = {48}, number = {8}, pages = {2437--2448}, year = {2018}, url = {https://doi.org/10.1109/TCYB.2017.2740309}, doi = {10.1109/TCYB.2017.2740309}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcyb/WangWHW18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnn/WangWWA18, author = {Licheng Wang and Zidong Wang and Guoliang Wei and Fuad E. Alsaadi}, title = {Finite-Time State Estimation for Recurrent Delayed Neural Networks With Component-Based Event-Triggering Protocol}, journal = {{IEEE} Trans. Neural Networks Learn. Syst.}, volume = {29}, number = {4}, pages = {1046--1057}, year = {2018}, url = {https://doi.org/10.1109/TNNLS.2016.2635080}, doi = {10.1109/TNNLS.2016.2635080}, timestamp = {Mon, 09 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnn/WangWWA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ZhouWS18, author = {Lijing Zhou and Licheng Wang and Yiru Sun}, title = {On Efficient Constructions of Lightweight {MDS} Matrices}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2018}, number = {1}, pages = {180--200}, year = {2018}, url = {https://doi.org/10.13154/tosc.v2018.i1.180-200}, doi = {10.13154/TOSC.V2018.I1.180-200}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/ZhouWS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsg/YanLSWH18, author = {Ruifeng Yan and Yong Li and Tapan Kumar Saha and Licheng Wang and Mohammed Imran Hossain}, title = {Modeling and Analysis of Open-Delta Step Voltage Regulators for Unbalanced Distribution Network With Photovoltaic Power Generation}, journal = {{IEEE} Trans. Smart Grid}, volume = {9}, number = {3}, pages = {2224--2234}, year = {2018}, url = {https://doi.org/10.1109/TSG.2016.2609440}, doi = {10.1109/TSG.2016.2609440}, timestamp = {Wed, 11 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsg/YanLSWH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsg/WangYS18, author = {Licheng Wang and Ruifeng Yan and Tapan Kumar Saha}, title = {Voltage Management for Large Scale {PV} Integration into Weak Distribution Systems}, journal = {{IEEE} Trans. Smart Grid}, volume = {9}, number = {5}, pages = {4128--4139}, year = {2018}, url = {https://doi.org/10.1109/TSG.2017.2651030}, doi = {10.1109/TSG.2017.2651030}, timestamp = {Thu, 13 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsg/WangYS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/JadoonWLZ18, author = {Ahmer Khan Jadoon and Licheng Wang and Tong Li and Muhammad Azam Zia}, title = {Lightweight Cryptographic Techniques for Automotive Cybersecurity}, journal = {Wirel. Commun. Mob. Comput.}, volume = {2018}, pages = {1640167:1--1640167:15}, year = {2018}, url = {https://doi.org/10.1155/2018/1640167}, doi = {10.1155/2018/1640167}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wicomm/JadoonWLZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/www/HuangWY18, author = {Qinlong Huang and Licheng Wang and Yixian Yang}, title = {{DECENT:} Secure and fine-grained data access control with policy updating for constrained IoT devices}, journal = {World Wide Web}, volume = {21}, number = {1}, pages = {151--167}, year = {2018}, url = {https://doi.org/10.1007/s11280-017-0462-0}, doi = {10.1007/S11280-017-0462-0}, timestamp = {Wed, 24 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/www/HuangWY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhouWSL18, author = {Lijing Zhou and Licheng Wang and Yiru Sun and Pin Lv}, title = {Loamit: {A} Blockchain-based Residual Loanable-limit Query System}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {655}, year = {2018}, url = {https://eprint.iacr.org/2018/655}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhouWSL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aaecc/HongWASY17, author = {Haibo Hong and Licheng Wang and Haseeb Ahmad and Jun Shao and Yixian Yang}, title = {Minimal logarithmic signatures for one type of classical groups}, journal = {Appl. Algebra Eng. Commun. Comput.}, volume = {28}, number = {2}, pages = {177--192}, year = {2017}, url = {https://doi.org/10.1007/s00200-016-0302-y}, doi = {10.1007/S00200-016-0302-Y}, timestamp = {Sat, 20 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aaecc/HongWASY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AhmadDWHDY17, author = {Haseeb Ahmad and Ali Daud and Licheng Wang and Haibo Hong and Hussain Dawood and Yixian Yang}, title = {Prediction of Rising Stars in the Game of Cricket}, journal = {{IEEE} Access}, volume = {5}, pages = {4104--4124}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2682162}, doi = {10.1109/ACCESS.2017.2682162}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/AhmadDWHDY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HuangYW17, author = {Qinlong Huang and Yixian Yang and Licheng Wang}, title = {Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things}, journal = {{IEEE} Access}, volume = {5}, pages = {12941--12950}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2727054}, doi = {10.1109/ACCESS.2017.2727054}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/HuangYW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhuWAN17, author = {Huijun Zhu and Licheng Wang and Haseeb Ahmad and Xinxin Niu}, title = {Key-Policy Attribute-Based Encryption With Equality Test in Cloud Computing}, journal = {{IEEE} Access}, volume = {5}, pages = {20428--20439}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2756070}, doi = {10.1109/ACCESS.2017.2756070}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZhuWAN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/HongWAYQ17, author = {Haibo Hong and Licheng Wang and Haseeb Ahmad and Yixian Yang and Zhiguo Qu}, title = {Minimum length key in {MST} cryptosystems}, journal = {Sci. China Inf. Sci.}, volume = {60}, number = {5}, pages = {052106:1--052106:11}, year = {2017}, url = {https://doi.org/10.1007/s11432-015-5479-3}, doi = {10.1007/S11432-015-5479-3}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/HongWAYQ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/YanWLLYY17, author = {Jianhua Yan and Licheng Wang and Jing Li and Muzi Li and Yixan Yang and Wenbin Yao}, title = {Pre-image sample algorithm with irregular Gaussian distribution and construction of identity-based signature}, journal = {Concurr. Comput. Pract. Exp.}, volume = {29}, number = {20}, year = {2017}, url = {https://doi.org/10.1002/cpe.3925}, doi = {10.1002/CPE.3925}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/YanWLLYY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/ZhuWAN17, author = {Huijun Zhu and Licheng Wang and Haseeb Ahmad and Xinxin Niu}, title = {Pairing-free equality test over short ciphertexts}, journal = {Int. J. Distributed Sens. Networks}, volume = {13}, number = {6}, year = {2017}, url = {https://doi.org/10.1177/1550147717715605}, doi = {10.1177/1550147717715605}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/ZhuWAN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HuangWY17, author = {Qinlong Huang and Licheng Wang and Yixian Yang}, title = {Secure and Privacy-Preserving Data Sharing and Collaboration in Mobile Healthcare Social Networks of Smart Cities}, journal = {Secur. Commun. Networks}, volume = {2017}, pages = {6426495:1--6426495:12}, year = {2017}, url = {https://doi.org/10.1155/2017/6426495}, doi = {10.1155/2017/6426495}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HuangWY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iconac/WangWW17, author = {Licheng Wang and Zidong Wang and Guoliang Wei}, title = {Event-triggered variance-constrained finite-horizon state estimation for discrete-time systems with redundant channels}, booktitle = {23rd International Conference on Automation and Computing, {ICAC} 2017, Huddersfield, United Kingdom, September 7-8, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/IConAC.2017.8081967}, doi = {10.23919/ICONAC.2017.8081967}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iconac/WangWW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhouWS17, author = {Lijing Zhou and Licheng Wang and Yiru Sun}, title = {On the Efficient Construction of Lightweight Orthogonal {MDS} Matrices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {371}, year = {2017}, url = {http://eprint.iacr.org/2017/371}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhouWS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiW17a, author = {Jing Li and Licheng Wang}, title = {Noiseless Fully Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {839}, year = {2017}, url = {http://eprint.iacr.org/2017/839}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiW17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhouWS17a, author = {Lijing Zhou and Licheng Wang and Yiru Sun}, title = {CP-consensus: a Blockchain Protocol Based on Synchronous Timestamps of Compass Satellite}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1059}, year = {2017}, url = {http://eprint.iacr.org/2017/1059}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhouWS17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/SongWWCN16, author = {Lingwei Song and Jinxia Wei and Licheng Wang and Chenlei Cao and Xinxin Niu}, title = {Identity-based storage management and integrity verify protocol for secure outsourcing in multi-cloud}, journal = {Concurr. Comput. Pract. Exp.}, volume = {28}, number = {6}, pages = {1930--1945}, year = {2016}, url = {https://doi.org/10.1002/cpe.3662}, doi = {10.1002/CPE.3662}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/SongWWCN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ffa/HongWALYW16, author = {Haibo Hong and Licheng Wang and Haseeb Ahmad and Jing Li and Yixian Yang and Changzhong Wu}, title = {Construction of {DNA} codes by using algebraic number theory}, journal = {Finite Fields Their Appl.}, volume = {37}, pages = {328--343}, year = {2016}, url = {https://doi.org/10.1016/j.ffa.2015.10.008}, doi = {10.1016/J.FFA.2015.10.008}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ffa/HongWALYW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/WangLA16, author = {Licheng Wang and Jing Li and Haseeb Ahmad}, title = {Challenges of Fully Homomorphic Encryptions for the Internet of Things}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {99-D}, number = {8}, pages = {1982--1990}, year = {2016}, url = {https://doi.org/10.1587/transinf.2015INI0003}, doi = {10.1587/TRANSINF.2015INI0003}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/WangLA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijgs/WeiLWW16, author = {Guoliang Wei and Shuai Liu and Licheng Wang and Yongxiong Wang}, title = {Event-based distributed set-membership filtering for a class of time-varying non-linear systems over sensor networks with saturation effects}, journal = {Int. J. Gen. Syst.}, volume = {45}, number = {5}, pages = {532--547}, year = {2016}, url = {https://doi.org/10.1080/03081079.2015.1106738}, doi = {10.1080/03081079.2015.1106738}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijgs/WeiLWW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcyb/WangWHW16, author = {Licheng Wang and Zidong Wang and Tingwen Huang and Guoliang Wei}, title = {An Event-Triggered Approach to State Estimation for a Class of Complex Networks With Mixed Time Delays and Nonlinearities}, journal = {{IEEE} Trans. Cybern.}, volume = {46}, number = {11}, pages = {2497--2508}, year = {2016}, url = {https://doi.org/10.1109/TCYB.2015.2478860}, doi = {10.1109/TCYB.2015.2478860}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcyb/WangWHW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bwcca/LiLWHN16, author = {Jing Li and Xiong Li and Licheng Wang and Debiao He and Xinxin Niu}, editor = {Leonard Barolli and Fatos Xhafa and Kangbin Yim}, title = {Oblivious Transfer Protocols Based on Group Factoring Problem}, booktitle = {Advances on Broad-Band Wireless Computing, Communication and Applications, Proceedings of the 11th International Conference On Broad-Band Wireless Computing, Communication and Applications, {BWCCA} 2016, Soonchunhyang University, Asan, Korea, November 5-7, 2016}, series = {Lecture Notes on Data Engineering and Communications Technologies}, volume = {2}, pages = {885--892}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49106-6\_90}, doi = {10.1007/978-3-319-49106-6\_90}, timestamp = {Wed, 04 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bwcca/LiLWHN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiWZN16, author = {Jing Li and Licheng Wang and Zonghua Zhang and Xinxin Niu}, editor = {Xiaofeng Chen and XiaoFeng Wang and Xinyi Huang}, title = {Novel Constructions of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable Family}, booktitle = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016}, pages = {895--900}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2897845.2897920}, doi = {10.1145/2897845.2897920}, timestamp = {Mon, 25 Apr 2022 08:42:03 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LiWZN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/WangLYQ16, author = {Licheng Wang and Jing Li and Jianhua Yan and Zhiguo Qu}, editor = {Fatos Xhafa and Leonard Barolli and V{\'{a}}clav Sn{\'{a}}sel and Ivan Zelinka}, title = {An Efficient Proxy Re-Encryption Based on (Semi) Group Factorization Problems}, booktitle = {2016 International Conference on Intelligent Networking and Collaborative Systems, INCoS 2016, Ostrawva, Czech Republic, September 7-9, 2016}, pages = {199--202}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/INCoS.2016.12}, doi = {10.1109/INCOS.2016.12}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/incos/WangLYQ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/LiWN16, author = {Jing Li and Licheng Wang and Xinxin Niu}, editor = {Fatos Xhafa and Leonard Barolli and V{\'{a}}clav Sn{\'{a}}sel and Ivan Zelinka}, title = {A Star-Topological Privacy Encryption for Telecare Medical Information Systems}, booktitle = {2016 International Conference on Intelligent Networking and Collaborative Systems, INCoS 2016, Ostrawva, Czech Republic, September 7-9, 2016}, pages = {311--317}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/INCoS.2016.11}, doi = {10.1109/INCOS.2016.11}, timestamp = {Sat, 31 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/incos/LiWN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/HongSWAY16, author = {Haibo Hong and Jun Shao and Licheng Wang and Haseeb Ahmad and Yixian Yang}, title = {Public Key Encryption in Non-Abelian Groups}, journal = {CoRR}, volume = {abs/1605.06608}, year = {2016}, url = {http://arxiv.org/abs/1605.06608}, eprinttype = {arXiv}, eprint = {1605.06608}, timestamp = {Sat, 20 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/HongSWAY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhouWS16, author = {Lijing Zhou and Licheng Wang and Yiru Sun}, title = {Construction of Lightweight {MDS} Matrices over Matrix Polynomial Residue Ring}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1173}, year = {2016}, url = {http://eprint.iacr.org/2016/1173}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhouWS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HongWY15, author = {Haibo Hong and Licheng Wang and Yixian Yang}, title = {Minimal logarithmic signatures for the unitary group U\({}_{\mbox{n}}\)(q)}, journal = {Des. Codes Cryptogr.}, volume = {77}, number = {1}, pages = {179--191}, year = {2015}, url = {https://doi.org/10.1007/s10623-014-9996-7}, doi = {10.1007/S10623-014-9996-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HongWY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YanWDYY15, author = {Jianhua Yan and Licheng Wang and Mianxiong Dong and Yixian Yang and Wenbin Yao}, title = {Identity-based signcryption from lattices}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3751--3770}, year = {2015}, url = {https://doi.org/10.1002/sec.1297}, doi = {10.1002/SEC.1297}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YanWDYY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/YangQZW15, author = {Chunli Yang and Peigang Qiu and Shihui Zheng and Licheng Wang}, editor = {Jeng{-}Shyang Pan and Ivan Lee and Hsiang{-}Cheh Huang and Ching{-}Yu Yang}, title = {An Efficient Lattice-Based Proxy Signature Scheme without Trapdoor}, booktitle = {2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, {IIH-MSP} 2015, Adelaide, Australia, September 23-25, 2015}, pages = {189--194}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/IIH-MSP.2015.90}, doi = {10.1109/IIH-MSP.2015.90}, timestamp = {Mon, 06 Apr 2020 19:01:12 +0200}, biburl = {https://dblp.org/rec/conf/iih-msp/YangQZW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wasa/WangPJA15, author = {Licheng Wang and Yun Pan and Minzheng Jia and Haseeb Ahmad}, editor = {Kuai Xu and Haojin Zhu}, title = {A Heuristic Stream Order Scheduling Algorithm for Intra-Superframe Power Management in WPANs}, booktitle = {Wireless Algorithms, Systems, and Applications - 10th International Conference, {WASA} 2015, Qufu, China, August 10-12, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9204}, pages = {539--549}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-21837-3\_53}, doi = {10.1007/978-3-319-21837-3\_53}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/wasa/WangPJA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/HongWALY15, author = {Haibo Hong and Licheng Wang and Haseeb Ahmad and Jing Li and Yixian Yang}, title = {Minimal Logarithmic Signatures for Sporadic Groups}, journal = {CoRR}, volume = {abs/1507.01162}, year = {2015}, url = {http://arxiv.org/abs/1507.01162}, eprinttype = {arXiv}, eprint = {1507.01162}, timestamp = {Sat, 31 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/HongWALY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/HongWAY15, author = {Haibo Hong and Licheng Wang and Haseeb Ahmad and Yixian Yang}, title = {Minimal Logarithmic Signatures for one type of Classical Groups}, journal = {CoRR}, volume = {abs/1507.01163}, year = {2015}, url = {http://arxiv.org/abs/1507.01163}, eprinttype = {arXiv}, eprint = {1507.01163}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/HongWAY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiW15, author = {Jing Li and Licheng Wang}, title = {Noise-free Symmetric Fully Homomorphic Encryption based on noncommutative rings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {641}, year = {2015}, url = {http://eprint.iacr.org/2015/641}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aaecc/HongWYA14, author = {Haibo Hong and Licheng Wang and Yixian Yang and Haseeb Ahmad}, title = {All exceptional groups of lie type have minimal logarithmic signatures}, journal = {Appl. Algebra Eng. Commun. Comput.}, volume = {25}, number = {4}, pages = {287--296}, year = {2014}, url = {https://doi.org/10.1007/s00200-014-0226-3}, doi = {10.1007/S00200-014-0226-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aaecc/HongWYA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/LuWJWY14, author = {Xiuhua Lu and Qiaoyan Wen and Zhengping Jin and Licheng Wang and Chunli Yang}, title = {A lattice-based signcryption scheme without random oracles}, journal = {Frontiers Comput. Sci.}, volume = {8}, number = {4}, pages = {667--675}, year = {2014}, url = {https://doi.org/10.1007/s11704-014-3163-1}, doi = {10.1007/S11704-014-3163-1}, timestamp = {Mon, 19 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/LuWJWY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/GanWWPY14, author = {Yuanju Gan and Lihua Wang and Licheng Wang and Ping Pan and Yixian Yang}, title = {Efficient threshold public key encryption with full security based on dual pairing vector spaces}, journal = {Int. J. Commun. Syst.}, volume = {27}, number = {12}, pages = {4059--4077}, year = {2014}, url = {https://doi.org/10.1002/dac.2598}, doi = {10.1002/DAC.2598}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/GanWWPY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijgs/WeiHWS14, author = {Guoliang Wei and Fei Han and Licheng Wang and Yan Song}, title = {Reliable \emph{H}\({}_{\mbox{{\(\infty\)}}}\) filtering for discrete piecewise linear systems with infinite distributed delays}, journal = {Int. J. Gen. Syst.}, volume = {43}, number = {3-4}, pages = {346--358}, year = {2014}, url = {https://doi.org/10.1080/03081079.2014.892255}, doi = {10.1080/03081079.2014.892255}, timestamp = {Fri, 18 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijgs/WeiHWS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/WangWL14, author = {Licheng Wang and Guoliang Wei and Wangyan Li}, title = {Probability-dependent H\({}_{\mbox{{\(\infty\)}}}\) synchronization control for dynamical networks with randomly varying nonlinearities}, journal = {Neurocomputing}, volume = {133}, pages = {369--376}, year = {2014}, url = {https://doi.org/10.1016/j.neucom.2013.12.045}, doi = {10.1016/J.NEUCOM.2013.12.045}, timestamp = {Sat, 27 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijon/WangWL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LuWLWZ14, author = {Xiuhua Lu and Qiaoyan Wen and Wenmin Li and Licheng Wang and Hua Zhang}, title = {A Fuzzy Identity-Based Signcryption Scheme from Lattices}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {8}, number = {11}, pages = {4203--4225}, year = {2014}, url = {https://doi.org/10.3837/tiis.2014.11.031}, doi = {10.3837/TIIS.2014.11.031}, timestamp = {Thu, 14 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/LuWLWZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LiWYNY14, author = {Jing Li and Licheng Wang and Jianhua Yan and Xinxin Niu and Yixian Yang}, title = {A (k, t, n) Verifiable Multi-secret Sharing Scheme Based on Adversary Structure}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {8}, number = {12}, pages = {4552--4567}, year = {2014}, url = {https://doi.org/10.3837/tiis.2014.12.018}, doi = {10.3837/TIIS.2014.12.018}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/LiWYNY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcn/YangZWLY14, author = {Chunli Yang and Shihui Zheng and Licheng Wang and Xiuhua Lu and Yixian Yang}, title = {Hierarchical identity-based broadcast encryption scheme from {LWE}}, journal = {J. Commun. Networks}, volume = {16}, number = {3}, pages = {258--263}, year = {2014}, url = {https://doi.org/10.1109/JCN.2014.000045}, doi = {10.1109/JCN.2014.000045}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcn/YangZWLY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/GanWWPY13, author = {Yuanju Gan and Lihua Wang and Licheng Wang and Ping Pan and Yixian Yang}, title = {Efficient Construction of CCA-Secure Threshold {PKE} Based on Hashed Diffie-Hellman Assumption}, journal = {Comput. J.}, volume = {56}, number = {10}, pages = {1249--1257}, year = {2013}, url = {https://doi.org/10.1093/comjnl/bxs167}, doi = {10.1093/COMJNL/BXS167}, timestamp = {Thu, 16 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/GanWWPY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/PanWYGWX13, author = {Ping Pan and Licheng Wang and Yixian Yang and Yuanju Gan and Lihua Wang and Chengqian Xu}, title = {Chameleon Hash Functions and One-Time Signature Schemes from Inner Automorphism Groups}, journal = {Fundam. Informaticae}, volume = {126}, number = {1}, pages = {103--119}, year = {2013}, url = {https://doi.org/10.3233/FI-2013-873}, doi = {10.3233/FI-2013-873}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/PanWYGWX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/GanWWPY13, author = {Yuanju Gan and Lihua Wang and Licheng Wang and Ping Pan and Yixian Yang}, title = {Publicly Verifiable Secret Sharing Scheme with Provable Security against Chosen Secret Attacks}, journal = {Int. J. Distributed Sens. Networks}, volume = {9}, year = {2013}, url = {https://doi.org/10.1155/2013/902462}, doi = {10.1155/2013/902462}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/GanWWPY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/WangWS13, author = {Licheng Wang and Guoliang Wei and Huisheng Shu}, title = {State estimation for complex networks with randomly occurring coupling delays}, journal = {Neurocomputing}, volume = {122}, pages = {513--520}, year = {2013}, url = {https://doi.org/10.1016/j.neucom.2013.05.010}, doi = {10.1016/J.NEUCOM.2013.05.010}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijon/WangWS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/WangSCMYW13, author = {Lihua Wang and Jun Shao and Zhenfu Cao and Masahiro Mambo and Akihiro Yamamura and Licheng Wang}, title = {Certificate-based proxy decryption systems with revocability in the standard model}, journal = {Inf. Sci.}, volume = {247}, pages = {188--201}, year = {2013}, url = {https://doi.org/10.1016/j.ins.2013.06.026}, doi = {10.1016/J.INS.2013.06.026}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/WangSCMYW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/GanWYY13, author = {Yuanju Gan and Licheng Wang and Jianhua Yan and Yixian Yang}, title = {{CCA} Secure Threshold {KEM} Scheme Against Adaptive Corruption Attacks in Standard Model}, journal = {J. Softw.}, volume = {8}, number = {5}, pages = {1245--1253}, year = {2013}, url = {https://doi.org/10.4304/jsw.8.5.1245-1253}, doi = {10.4304/JSW.8.5.1245-1253}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/GanWYY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/GuWODCY13, author = {Lize Gu and Licheng Wang and Kaoru Ota and Mianxiong Dong and Zhenfu Cao and Yixian Yang}, title = {New public key cryptosystems based on non-Abelian factorization problems}, journal = {Secur. Commun. Networks}, volume = {6}, number = {7}, pages = {912--922}, year = {2013}, url = {https://doi.org/10.1002/sec.710}, doi = {10.1002/SEC.710}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/GuWODCY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CaoDWS13a, author = {Zhenfu Cao and Xiaolei Dong and Licheng Wang and Jun Shao}, title = {More Efficient Cryptosystems From k-th Power Residues}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {569}, year = {2013}, url = {http://eprint.iacr.org/2013/569}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CaoDWS13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShaoWDC13, author = {Jun Shao and Licheng Wang and Xiaolei Dong and Zhenfu Cao}, title = {New Efficient Identity-Based Encryption From Factorization}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {570}, year = {2013}, url = {http://eprint.iacr.org/2013/570}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShaoWDC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/WangWMO12, author = {Lihua Wang and Licheng Wang and Masahiro Mambo and Eiji Okamoto}, title = {Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {95-A}, number = {1}, pages = {70--88}, year = {2012}, url = {https://doi.org/10.1587/transfun.E95.A.70}, doi = {10.1587/TRANSFUN.E95.A.70}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/WangWMO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/WangWZYH12, author = {Zhiwei Wang and Licheng Wang and Shihui Zheng and Yixian Yang and Zhengming Hu}, title = {Provably Secure and Efficient Identity-based Signature Scheme Based on Cubic Residues}, journal = {Int. J. Netw. Secur.}, volume = {14}, number = {1}, pages = {33--38}, year = {2012}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v14-n1/ijns-2012-v14-n1-p33-38.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/WangWZYH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/PanWWLY12, author = {Ping Pan and Lihua Wang and Licheng Wang and Lixiang Li and Yixian Yang}, title = {{CSP-DHIES:} a new public-key encryption scheme from matrix conjugation}, journal = {Secur. Commun. Networks}, volume = {5}, number = {7}, pages = {809--822}, year = {2012}, url = {https://doi.org/10.1002/sec.376}, doi = {10.1002/SEC.376}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/PanWWLY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhouDBW11, author = {GuangXu Zhou and Rustu Murat Demirer and Coskun Bayrak and Licheng Wang}, title = {Enable delegation for {RBAC} with Secure Authorization Certificate}, journal = {Comput. Secur.}, volume = {30}, number = {8}, pages = {780--790}, year = {2011}, url = {https://doi.org/10.1016/j.cose.2011.06.005}, doi = {10.1016/J.COSE.2011.06.005}, timestamp = {Fri, 06 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZhouDBW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/WangWPZY11, author = {Licheng Wang and Lihua Wang and Yun Pan and Zonghua Zhang and Yixian Yang}, title = {Discrete logarithm based additively homomorphic encryption and secure data aggregation}, journal = {Inf. Sci.}, volume = {181}, number = {16}, pages = {3308--3322}, year = {2011}, url = {https://doi.org/10.1016/j.ins.2011.04.002}, doi = {10.1016/J.INS.2011.04.002}, timestamp = {Thu, 16 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/WangWPZY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/DongWZCW11, author = {Xiaolei Dong and Lifei Wei and Haojin Zhu and Zhenfu Cao and Licheng Wang}, title = {: An Efficient Privacy-Preserving Data-Forwarding Scheme for Service-Oriented Vehicular Ad Hoc Networks}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {60}, number = {2}, pages = {580--591}, year = {2011}, url = {https://doi.org/10.1109/TVT.2010.2095432}, doi = {10.1109/TVT.2010.2095432}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/DongWZCW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/ZhengWY10, author = {Shihui Zheng and Licheng Wang and Yixian Yang}, title = {A new impossible differential attack on {SAFER} ciphers}, journal = {Comput. Electr. Eng.}, volume = {36}, number = {1}, pages = {180--189}, year = {2010}, url = {https://doi.org/10.1016/j.compeleceng.2009.08.004}, doi = {10.1016/J.COMPELECENG.2009.08.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/ZhengWY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/WangWCYN10, author = {Licheng Wang and Lihua Wang and Zhenfu Cao and Yixian Yang and Xinxin Niu}, title = {Conjugate adjoining problem in braid groups and new design of braid-based signatures}, journal = {Sci. China Inf. Sci.}, volume = {53}, number = {3}, pages = {524--536}, year = {2010}, url = {https://doi.org/10.1007/s11432-010-0046-4}, doi = {10.1007/S11432-010-0046-4}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/WangWCYN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/LuoYWN10, author = {Mingxing Luo and Yixian Yang and Licheng Wang and Xinxin Niu}, title = {Secure network coding in the presence of eavesdroppers}, journal = {Sci. China Inf. Sci.}, volume = {53}, number = {3}, pages = {648--658}, year = {2010}, url = {https://doi.org/10.1007/s11432-010-0052-6}, doi = {10.1007/S11432-010-0052-6}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/LuoYWN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/WangWYH10, author = {Zhiwei Wang and Licheng Wang and Yixian Yang and Zhengming Hu}, title = {Comment on Wu et al.'s Server-aided Verification Signature Schemes}, journal = {Int. J. Netw. Secur.}, volume = {10}, number = {2}, pages = {158--160}, year = {2010}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v10-n2/ijns-2010-v10-n2-p158-160.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/WangWYH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/WangCW10, author = {Hongbing Wang and Zhenfu Cao and Licheng Wang}, title = {Multi-use and unidirectional identity-based proxy re-encryption schemes}, journal = {Inf. Sci.}, volume = {180}, number = {20}, pages = {4042--4059}, year = {2010}, url = {https://doi.org/10.1016/j.ins.2010.06.029}, doi = {10.1016/J.INS.2010.06.029}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/WangCW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/WangWCOS10, author = {Lihua Wang and Licheng Wang and Zhenfu Cao and Eiji Okamoto and Jun Shao}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {New Constructions of Public-Key Encryption Schemes from Conjugacy Search Problems}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {1--17}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_1}, doi = {10.1007/978-3-642-21518-6\_1}, timestamp = {Sat, 20 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/WangWCOS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/WangWMO10, author = {Lihua Wang and Licheng Wang and Masahiro Mambo and Eiji Okamoto}, editor = {Miguel Soriano and Sihan Qing and Javier L{\'{o}}pez}, title = {Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities}, booktitle = {Information and Communications Security - 12th International Conference, {ICICS} 2010, Barcelona, Spain, December 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6476}, pages = {383--400}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17650-0\_27}, doi = {10.1007/978-3-642-17650-0\_27}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/WangWMO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icira/WangDW10, author = {Licheng Wang and Han Ding and Shaojun Wang}, editor = {Honghai Liu and Han Ding and Zhenhua Xiong and Xiangyang Zhu}, title = {Measurement Error Compensation Using Data Fusion Technique for Laser Scanner on AACMMs}, booktitle = {Intelligent Robotics and Applications - Third International Conference, {ICIRA} 2010, Shanghai, China, November 10-12, 2010. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {6425}, pages = {576--586}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16587-0\_53}, doi = {10.1007/978-3-642-16587-0\_53}, timestamp = {Wed, 02 Nov 2022 08:13:16 +0100}, biburl = {https://dblp.org/rec/conf/icira/WangDW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pairing/WangWMO10, author = {Lihua Wang and Licheng Wang and Masahiro Mambo and Eiji Okamoto}, editor = {Marc Joye and Atsuko Miyaji and Akira Otsuka}, title = {New Identity-Based Proxy Re-encryption Schemes to Prevent Collusion Attacks}, booktitle = {Pairing-Based Cryptography - Pairing 2010 - 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6487}, pages = {327--346}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17455-1\_21}, doi = {10.1007/978-3-642-17455-1\_21}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/pairing/WangWMO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmic/WangU09, author = {Licheng Wang and Tamon Ueda}, title = {Mesoscopic simulation of chloride ions diffusion in frost-damaged concrete}, journal = {Int. J. Model. Identif. Control.}, volume = {7}, number = {2}, pages = {148--154}, year = {2009}, url = {https://doi.org/10.1504/IJMIC.2009.027068}, doi = {10.1504/IJMIC.2009.027068}, timestamp = {Thu, 17 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmic/WangU09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnhpca/HuangW09, author = {Xiaofang Huang and Licheng Wang}, editor = {Wu Zhang and Zhangxin Chen and Craig C. Douglas and Weiqin Tong}, title = {A Fair Concurrent Signature Scheme Based on Identity}, booktitle = {High Performance Computing and Applications, Second International Conference, {HPCA} 2009, Shanghai, China, August 10-12, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5938}, pages = {198--205}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-11842-5\_26}, doi = {10.1007/978-3-642-11842-5\_26}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cnhpca/HuangW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cso/HePPW09, author = {Yuling He and Yun Pan and Ping Pan and Licheng Wang}, editor = {Lean Yu and Kin Keung Lai and Shashi Kant Mishra}, title = {Simulation of Key Management Protocol in Wireless Sensor Networks}, booktitle = {Proceedings of the Second International Joint Conference on Computational Sciences and Optimization, {CSO} 2009, Sanya, Hainan, China, 24-26 April 2009, Volume 2}, pages = {333--335}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CSO.2009.332}, doi = {10.1109/CSO.2009.332}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cso/HePPW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fskd/PanZW09, author = {Yun Pan and Yuan Zhou and Licheng Wang}, editor = {Yixin Chen and Hepu Deng and Degan Zhang and Yingyuan Xiao}, title = {Modeling Internet Applications with Event Graphs}, booktitle = {Sixth International Conference on Fuzzy Systems and Knowledge Discovery, {FSKD} 2009, Tianjin, China, 14-16 August 2009, 6 Volumes}, pages = {124--128}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/FSKD.2009.425}, doi = {10.1109/FSKD.2009.425}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fskd/PanZW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/WangWPZY09, author = {Licheng Wang and Lihua Wang and Yun Pan and Zonghua Zhang and Yixian Yang}, editor = {Sihan Qing and Chris J. Mitchell and Guilin Wang}, title = {Discrete-Log-Based Additively Homomorphic Encryption and Secure {WSN} Data Aggregation}, booktitle = {Information and Communications Security, 11th International Conference, {ICICS} 2009, Beijing, China, December 14-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5927}, pages = {493--502}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-11145-7\_39}, doi = {10.1007/978-3-642-11145-7\_39}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/WangWPZY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiWLY09, author = {Zhimin Li and Licheng Wang and Daofeng Li and Yixian Yang}, title = {Collision Attacks on NaSHA-384/512}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {26}, year = {2009}, url = {http://eprint.iacr.org/2009/026}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiWLY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangWCOS09, author = {Licheng Wang and Lihua Wang and Zhenfu Cao and Eiji Okamoto and Jun Shao}, title = {New Cryptosystems From CSP-Based Self-Distributive Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {566}, year = {2009}, url = {http://eprint.iacr.org/2009/566}, timestamp = {Sat, 20 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangWCOS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/DongCW08, author = {Xiaolei Dong and Zhenfu Cao and Licheng Wang}, title = {New designing of cryptosystems based on quadratic fields}, journal = {Sci. China Ser. {F} Inf. Sci.}, volume = {51}, number = {8}, pages = {1106--1116}, year = {2008}, url = {https://doi.org/10.1007/s11432-008-0091-4}, doi = {10.1007/S11432-008-0091-4}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/DongCW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/WangCCQB08, author = {Licheng Wang and Zhenfu Cao and Feng Cao and Haifeng Qian and Haiyong Bao}, title = {Biased Bit Commitment and Applications}, journal = {J. Inf. Sci. Eng.}, volume = {24}, number = {2}, pages = {441--452}, year = {2008}, url = {http://www.iis.sinica.edu.tw/page/jise/2008/200803\_08.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/WangCCQB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/LuCWS07, author = {Rongxing Lu and Zhenfu Cao and Licheng Wang and Congkai Sun}, title = {A secure anonymous routing protocol with authenticated key exchange for ad hoc networks}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {5}, pages = {521--527}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.11.007}, doi = {10.1016/J.CSI.2006.11.007}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/LuCWS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/WangCLQ07, author = {Licheng Wang and Zhenfu Cao and Xiangxue Li and Haifeng Qian}, title = {Simulatability and security of certificateless threshold signatures}, journal = {Inf. Sci.}, volume = {177}, number = {6}, pages = {1382--1394}, year = {2007}, url = {https://doi.org/10.1016/j.ins.2006.08.008}, doi = {10.1016/J.INS.2006.08.008}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/WangCLQ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ShaoCWL07, author = {Jun Shao and Zhenfu Cao and Licheng Wang and Rongxing Lu}, editor = {Joachim Biskup and Javier L{\'{o}}pez}, title = {Efficient Password-Based Authenticated Key Exchange Without Public Information}, booktitle = {Computer Security - {ESORICS} 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4734}, pages = {299--310}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74835-9\_20}, doi = {10.1007/978-3-540-74835-9\_20}, timestamp = {Tue, 02 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ShaoCWL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/WangCZHY07, author = {Licheng Wang and Zhenfu Cao and Shihui Zheng and Xiaofang Huang and Yixian Yang}, editor = {K. Srinathan and C. Pandu Rangan and Moti Yung}, title = {Transitive Signatures from Braid Groups}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4859}, pages = {183--196}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77026-8\_14}, doi = {10.1007/978-3-540-77026-8\_14}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/WangCZHY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/ShaoCWL07, author = {Jun Shao and Zhenfu Cao and Licheng Wang and Xiaohui Liang}, editor = {K. Srinathan and C. Pandu Rangan and Moti Yung}, title = {Proxy Re-signature Schemes Without Random Oracles}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4859}, pages = {197--209}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77026-8\_15}, doi = {10.1007/978-3-540-77026-8\_15}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/ShaoCWL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CaoDW07, author = {Zhenfu Cao and Xiaolei Dong and Licheng Wang}, title = {New Public Key Cryptosystems Using Polynomials over Non-commutative Rings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {9}, year = {2007}, url = {http://eprint.iacr.org/2007/009}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CaoDW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShaoCWL07a, author = {Jun Shao and Zhenfu Cao and Licheng Wang and Rongxing Lu}, title = {Efficient Password-based Authenticated Key Exchange without Public Information}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {326}, year = {2007}, url = {http://eprint.iacr.org/2007/326}, timestamp = {Tue, 02 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShaoCWL07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShaoCWL07b, author = {Jun Shao and Zhenfu Cao and Licheng Wang and Xiaohui Liang}, title = {Proxy Re-Signature Schemes without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {396}, year = {2007}, url = {http://eprint.iacr.org/2007/396}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShaoCWL07b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imsccs/WangCCQ06, author = {Licheng Wang and Zhenfu Cao and Feng Cao and Haifeng Qian}, editor = {Jun Ni and Jack J. Dongarra}, title = {Cryptanalysis and Improvement on An ID-Based Key Issuing Protocol}, booktitle = {Interdisciplinary and Multidisciplinary Research in Computer Science, {IEEE} {CS} Proceeding of the First International Multi-Symposium of Computer and Computational Sciences (IMSCCS{\(\vert\)}06), June 20-24, 2006, Zhejiang University, Hangzhou, China, Vol. 2}, pages = {8--12}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/IMSCCS.2006.205}, doi = {10.1109/IMSCCS.2006.205}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imsccs/WangCCQ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imsccs/CaoCW06, author = {Feng Cao and Zhenfu Cao and Licheng Wang}, editor = {Jun Ni and Jack J. Dongarra}, title = {An Improvement of an Identity-Based Key Issuing Protocol}, booktitle = {Interdisciplinary and Multidisciplinary Research in Computer Science, {IEEE} {CS} Proceeding of the First International Multi-Symposium of Computer and Computational Sciences (IMSCCS{\(\vert\)}06), June 20-24, 2006, Zhejiang University, Hangzhou, China, Vol. 2}, pages = {13--18}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/IMSCCS.2006.185}, doi = {10.1109/IMSCCS.2006.185}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imsccs/CaoCW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imsccs/QianCWG06, author = {Haifeng Qian and Zhenfu Cao and Licheng Wang and Sheng Guo}, editor = {Jun Ni and Jack J. Dongarra}, title = {Cryptanalysis of Chang-Lin-Lam's ID-based Multisignature Scheme}, booktitle = {Interdisciplinary and Multidisciplinary Research in Computer Science, {IEEE} {CS} Proceeding of the First International Multi-Symposium of Computer and Computational Sciences (IMSCCS{\(\vert\)}06), June 20-24, 2006, Zhejiang University, Hangzhou, China, Vol. 2}, pages = {113--116}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/IMSCCS.2006.206}, doi = {10.1109/IMSCCS.2006.206}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imsccs/QianCWG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangCLWQ06, author = {Miaomiao Zhang and Gongliang Chen and Jianhua Li and Licheng Wang and Haifeng Qian}, title = {A New Construction of Time Capsule Signature}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {113}, year = {2006}, url = {http://eprint.iacr.org/2006/113}, timestamp = {Sun, 03 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangCLWQ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DongWC06, author = {Xiaolei Dong and Licheng Wang and Zhenfu Cao}, title = {New Public Key Authentication Frameworks with Lite Certification Authority}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {154}, year = {2006}, url = {http://eprint.iacr.org/2006/154}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DongWC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShaoCW06, author = {Jun Shao and Zhenfu Cao and Licheng Wang}, title = {Efficient ID-based Threshold Signature Schemes without Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {308}, year = {2006}, url = {http://eprint.iacr.org/2006/308}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShaoCW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/PanYW05, author = {Yun Pan and Zhenwei Yu and Licheng Wang}, editor = {Yue Hao and Jiming Liu and Yuping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Hybrid Genetic Algorithm for Solving the Degree-Constrained Minimal Bandwidth Multicast Routing Problem}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {3801}, pages = {285--290}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596448\_41}, doi = {10.1007/11596448\_41}, timestamp = {Tue, 23 Feb 2021 17:25:41 +0100}, biburl = {https://dblp.org/rec/conf/cis/PanYW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.