![]() | 2010 | |
---|---|---|
39 | ![]() ![]() ![]() ![]() ![]() ![]() | Binxing Fang, Yunchuan Guo, Yuan Zhou: Information content security on the Internet: the control model and its evaluation. Science in China Series F: Information Sciences 53(1): 30-49 (2010) |
2009 | ||
38 | ![]() ![]() ![]() ![]() ![]() ![]() | Yuanlong Shao, Yuan Zhou, Xiaofei He, Deng Cai, Hujun Bao: Semi-supervised topic modeling for image annotation. ACM Multimedia 2009: 521-524 |
37 | ![]() ![]() ![]() ![]() ![]() ![]() | Yueguo Chen, Su Chen, Yu Gu, Mei Hui, Feng Li, Chen Liu, Liangxu Liu, Beng Chin Ooi, Xiaoyan Yang, Dongxiang Zhang, Yuan Zhou: MarcoPolo: a community system for sharing and integrating travel information on maps. EDBT 2009: 1148-1151 |
36 | ![]() ![]() ![]() ![]() ![]() ![]() | Wei Chen, Shang-Hua Teng, Yajun Wang, Yuan Zhou: On the alpha-Sensitivity of Nash Equilibria in PageRank-Based Network Reputation Games. FAW 2009: 63-73 |
35 | ![]() ![]() ![]() ![]() ![]() ![]() | Yun Pan, Yuan Zhou, Licheng Wang: Modeling Internet Applications with Event Graphs. FSKD (5) 2009: 124-128 |
34 | ![]() ![]() ![]() ![]() ![]() ![]() | Mei Hui, Dawei Jiang, Guoliang Li, Yuan Zhou: Supporting Database Applications as a Service. ICDE 2009: 832-843 |
33 | ![]() ![]() ![]() ![]() ![]() ![]() | Qingshui Xue, Fengying Li, Yuan Zhou, Jiping Zhang, Zhenfu Cao, Haifeng Qian: An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System. MobiSec 2009: 58-70 |
32 | ![]() ![]() ![]() ![]() ![]() ![]() | Yunchuan Guo, Lihua Yin, Yuan Zhou, Chao Li, Li Guo: Simulation Analysis of Probabilistic Timing Covert Channels. NAS 2009: 325-332 |
31 | ![]() ![]() ![]() ![]() ![]() ![]() | Qingshui Xue, Fengying Li, Yuan Zhou, Jiping Zhang, Zhenfu Cao, Haifeng Qian: Bilinear-pairings Based Designated-verifier Threshold Proxy Signature Scheme. Security and Management 2009: 323-327 |
30 | ![]() ![]() ![]() ![]() ![]() ![]() | Pinyan Lu, Yajun Wang, Yuan Zhou: Tighter Bounds for Facility Games. WINE 2009: 137-148 |
29 | ![]() ![]() ![]() ![]() ![]() ![]() | Ryan O'Donnell, Yi Wu, Yuan Zhou: Optimal lower bounds for locality sensitive hashing (except when q is tiny) CoRR abs/0912.0250: (2009) |
2008 | ||
28 | ![]() ![]() ![]() ![]() ![]() ![]() | Yuan Zhou, Chunhe Xia, Haiquan Wang, Jianzhong Qi: Research on Survivability of Mobile Ad Hoc Network. CSSE (3) 2008: 1084-1088 |
27 | ![]() ![]() ![]() ![]() ![]() ![]() | Yuan Zhou, Mingshan Liu, Zi-da Zhang, Rong-lian Huang: Research on Application of Fuzzy Neural Network in Combine Harvester. FSKD (3) 2008: 231-235 |
26 | ![]() ![]() ![]() ![]() ![]() ![]() | Yuanchao Zhang, Jiefeng Jiang, Lei Lin, Feng Shi, Yuan Zhou, Chunshui Yu, Kuncheng Li, Tianzi Jiang: A Surface-Based Fractal Information Dimension Method for Cortical Complexity Analysis. MIAR 2008: 133-141 |
25 | ![]() ![]() ![]() ![]() ![]() ![]() | Haifeng Qian, Yuan Zhou, Zhibin Li, Zecheng Wang, Bing Zhang: Efficient public key encryption with smallest ciphertext expansion from factoring. Des. Codes Cryptography 49(1-3): 233-249 (2008) |
2007 | ||
24 | ![]() ![]() ![]() ![]() ![]() ![]() | Mingshan Liu, Yuan Zhou: Application of Artificial Intelligence Technology in Asphalt Concrete Mixer Control System. FSKD (4) 2007: 159-163 |
23 | ![]() ![]() ![]() ![]() ![]() ![]() | Feng Shi, Yong Liu, Tianzi Jiang, Yuan Zhou, Wanlin Zhu, Jiefeng Jiang, Haihong Liu, Zhening Liu: Regional Homogeneity and Anatomical Parcellation for fMRI Image Classification: Application to Schizophrenia and Normal Controls. MICCAI (2) 2007: 136-143 |
22 | ![]() ![]() ![]() ![]() ![]() ![]() | Mingshan Liu, Yuan Zhou: Application of Embedded System in Construction Machinery. SNPD (2) 2007: 406-411 |
21 | ![]() ![]() ![]() ![]() ![]() ![]() | Yuan Zhou, Binxing Fang, Zhenfu Cao, Xiao-chun Yun, Xiaoming Cheng: How to construct secure proxy cryptosystem. Inf. Sci. 177(19): 4095-4108 (2007) |
20 | ![]() ![]() ![]() ![]() ![]() ![]() | Zhenchuan Chai, Zhenfu Cao, Yuan Zhou: Efficient ID-Based Multi-Decrypter Encryption with Short Ciphertexts. J. Comput. Sci. Technol. 22(1): 103-108 (2007) |
19 | ![]() ![]() ![]() ![]() ![]() ![]() | Yuan Zhou, James M. Noras, S. J. Shepherd: Novel design of multiplier-less FFT processors. Signal Processing 87(6): 1402-1407 (2007) |
2006 | ||
18 | ![]() ![]() ![]() ![]() ![]() ![]() | Zhenchuan Chai, Zhenfu Cao, Yuan Zhou: Efficient ID-based Broadcast Threshold Decryption in Ad Hoc Network. IMSCCS (2) 2006: 148-154 |
17 | ![]() ![]() ![]() ![]() ![]() ![]() | Yuan Zhou, Zhenfu Cao, Zhenchuan Chai: Identity Based Key Insulated Signature. ISPEC 2006: 226-234 |
16 | ![]() ![]() ![]() ![]() ![]() ![]() | Yuan Zhou, Michael Garland: Interactive Point-Based Rendering of Higher-Order Tetrahedral Data. IEEE Trans. Vis. Comput. Graph. 12(5): 1229-1236 (2006) |
2005 | ||
15 | ![]() ![]() ![]() ![]() ![]() ![]() | Yuan Zhou, Zhenfu Cao, Rongxing Lu: Constructing Secure Warrant-Based Proxy Signcryption Schemes. CANS 2005: 172-185 |
14 | ![]() ![]() ![]() ![]() ![]() ![]() | Shanshan Duan, Zhenfu Cao, Yuan Zhou: Secure Delegation-by-Warrant ID-Based Proxy Signcryption Scheme. CIS (2) 2005: 445-450 |
13 | ![]() ![]() ![]() ![]() ![]() ![]() | Yuan Zhou, Zhenfu Cao, Zhenchuan Chai: Constructing Secure Proxy Cryptosystem. CISC 2005: 150-161 |
12 | ![]() ![]() ![]() ![]() ![]() ![]() | Yuan Zhou, Zhenfu Cao, Zhenchuan Chai: An Efficient Proxy-Protected Signature Scheme Based on Factoring. ISPA Workshops 2005: 332-341 |
11 | ![]() ![]() ![]() ![]() ![]() ![]() | Zhenchuan Chai, Zhenfu Cao, Yuan Zhou: Encryption Based on Reversible Second-Order Cellular Automata. ISPA Workshops 2005: 350-358 |
10 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael Garland, Yuan Zhou: Quadric-based simplification in any dimension. ACM Trans. Graph. 24(2): 209-239 (2005) |
9 | ![]() ![]() ![]() ![]() ![]() ![]() | Rongxing Lu, Zhenfu Cao, Yuan Zhou: Threshold undeniable signature scheme based on conic. Applied Mathematics and Computation 162(1): 165-177 (2005) |
8 | ![]() ![]() ![]() ![]() ![]() ![]() | Rongxing Lu, Zhenfu Cao, Yuan Zhou: Proxy blind multi-signature scheme without a secure channel. Applied Mathematics and Computation 164(1): 179-187 (2005) |
7 | ![]() ![]() ![]() ![]() ![]() ![]() | Yuan Zhou, Zhenfu Cao, Rongxing Lu: Provably secure proxy-protected signature schemes based on factoring. Applied Mathematics and Computation 164(1): 83-98 (2005) |
2004 | ||
6 | ![]() ![]() ![]() ![]() ![]() ![]() | Yuan Zhou, Guangsheng Li, Qirong Mao, Yongzhao Zhan, Yibin Hou: Design and Simulation of Multicast Routing Protocol for Mobile Internet. APWeb 2004: 887-890 |
5 | ![]() ![]() ![]() ![]() ![]() ![]() | Yuan Zhou, Michael Garland, Robert Haber: Pixel-Exact Rendering of Spacetime Finite Element Solutions. IEEE Visualization 2004: 425-432 |
4 | ![]() ![]() ![]() ![]() ![]() ![]() | Reza Abedi, Shuo-Heng Chung, Jeff Erickson, Yong Fan, Michael Garland, Damrong Guoy, Robert Haber, John M. Sullivan, Shripad Thite, Yuan Zhou: Spacetime meshing with adaptive refinement and coarsening. Symposium on Computational Geometry 2004: 300-309 |
3 | ![]() ![]() ![]() ![]() ![]() ![]() | Yuan Zhou, Guangsheng Li, Yongzhao Zhan, Qirong Mao, Yibin Hou: DRMR: Dynamic-Ring-Based Multicast Routing Protocol for Ad Hoc Networks. J. Comput. Sci. Technol. 19(6): 909-919 (2004) |
2001 | ||
2 | ![]() ![]() ![]() ![]() ![]() ![]() | Yuan Zhou, Quan-Lin Li, Songde Ma: Visualization of Geostress Tensor along Oil Well Trajectory. Computer Graphics International 2001: 317-320 |
1994 | ||
1 | ![]() ![]() ![]() ![]() ![]() ![]() | Yuan Zhou: From Smart Guesser to Smart Navigator: Changes in Collection Development for Research Libraries in a Networked Environment. Library Trends 42(4): (1994) |