2010 | ||
---|---|---|
39 | Binxing Fang, Yunchuan Guo, Yuan Zhou: Information content security on the Internet: the control model and its evaluation. Science in China Series F: Information Sciences 53(1): 30-49 (2010) | |
2009 | ||
38 | Yuanlong Shao, Yuan Zhou, Xiaofei He, Deng Cai, Hujun Bao: Semi-supervised topic modeling for image annotation. ACM Multimedia 2009: 521-524 | |
37 | Yueguo Chen, Su Chen, Yu Gu, Mei Hui, Feng Li, Chen Liu, Liangxu Liu, Beng Chin Ooi, Xiaoyan Yang, Dongxiang Zhang, Yuan Zhou: MarcoPolo: a community system for sharing and integrating travel information on maps. EDBT 2009: 1148-1151 | |
36 | Wei Chen, Shang-Hua Teng, Yajun Wang, Yuan Zhou: On the alpha-Sensitivity of Nash Equilibria in PageRank-Based Network Reputation Games. FAW 2009: 63-73 | |
35 | Yun Pan, Yuan Zhou, Licheng Wang: Modeling Internet Applications with Event Graphs. FSKD (5) 2009: 124-128 | |
34 | Mei Hui, Dawei Jiang, Guoliang Li, Yuan Zhou: Supporting Database Applications as a Service. ICDE 2009: 832-843 | |
33 | Qingshui Xue, Fengying Li, Yuan Zhou, Jiping Zhang, Zhenfu Cao, Haifeng Qian: An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System. MobiSec 2009: 58-70 | |
32 | Yunchuan Guo, Lihua Yin, Yuan Zhou, Chao Li, Li Guo: Simulation Analysis of Probabilistic Timing Covert Channels. NAS 2009: 325-332 | |
31 | Qingshui Xue, Fengying Li, Yuan Zhou, Jiping Zhang, Zhenfu Cao, Haifeng Qian: Bilinear-pairings Based Designated-verifier Threshold Proxy Signature Scheme. Security and Management 2009: 323-327 | |
30 | Pinyan Lu, Yajun Wang, Yuan Zhou: Tighter Bounds for Facility Games. WINE 2009: 137-148 | |
29 | Ryan O'Donnell, Yi Wu, Yuan Zhou: Optimal lower bounds for locality sensitive hashing (except when q is tiny) CoRR abs/0912.0250: (2009) | |
2008 | ||
28 | Yuan Zhou, Chunhe Xia, Haiquan Wang, Jianzhong Qi: Research on Survivability of Mobile Ad Hoc Network. CSSE (3) 2008: 1084-1088 | |
27 | Yuan Zhou, Mingshan Liu, Zi-da Zhang, Rong-lian Huang: Research on Application of Fuzzy Neural Network in Combine Harvester. FSKD (3) 2008: 231-235 | |
26 | Yuanchao Zhang, Jiefeng Jiang, Lei Lin, Feng Shi, Yuan Zhou, Chunshui Yu, Kuncheng Li, Tianzi Jiang: A Surface-Based Fractal Information Dimension Method for Cortical Complexity Analysis. MIAR 2008: 133-141 | |
25 | Haifeng Qian, Yuan Zhou, Zhibin Li, Zecheng Wang, Bing Zhang: Efficient public key encryption with smallest ciphertext expansion from factoring. Des. Codes Cryptography 49(1-3): 233-249 (2008) | |
2007 | ||
24 | Mingshan Liu, Yuan Zhou: Application of Artificial Intelligence Technology in Asphalt Concrete Mixer Control System. FSKD (4) 2007: 159-163 | |
23 | Feng Shi, Yong Liu, Tianzi Jiang, Yuan Zhou, Wanlin Zhu, Jiefeng Jiang, Haihong Liu, Zhening Liu: Regional Homogeneity and Anatomical Parcellation for fMRI Image Classification: Application to Schizophrenia and Normal Controls. MICCAI (2) 2007: 136-143 | |
22 | Mingshan Liu, Yuan Zhou: Application of Embedded System in Construction Machinery. SNPD (2) 2007: 406-411 | |
21 | Yuan Zhou, Binxing Fang, Zhenfu Cao, Xiao-chun Yun, Xiaoming Cheng: How to construct secure proxy cryptosystem. Inf. Sci. 177(19): 4095-4108 (2007) | |
20 | Zhenchuan Chai, Zhenfu Cao, Yuan Zhou: Efficient ID-Based Multi-Decrypter Encryption with Short Ciphertexts. J. Comput. Sci. Technol. 22(1): 103-108 (2007) | |
19 | Yuan Zhou, James M. Noras, S. J. Shepherd: Novel design of multiplier-less FFT processors. Signal Processing 87(6): 1402-1407 (2007) | |
2006 | ||
18 | Zhenchuan Chai, Zhenfu Cao, Yuan Zhou: Efficient ID-based Broadcast Threshold Decryption in Ad Hoc Network. IMSCCS (2) 2006: 148-154 | |
17 | Yuan Zhou, Zhenfu Cao, Zhenchuan Chai: Identity Based Key Insulated Signature. ISPEC 2006: 226-234 | |
16 | Yuan Zhou, Michael Garland: Interactive Point-Based Rendering of Higher-Order Tetrahedral Data. IEEE Trans. Vis. Comput. Graph. 12(5): 1229-1236 (2006) | |
2005 | ||
15 | Yuan Zhou, Zhenfu Cao, Rongxing Lu: Constructing Secure Warrant-Based Proxy Signcryption Schemes. CANS 2005: 172-185 | |
14 | Shanshan Duan, Zhenfu Cao, Yuan Zhou: Secure Delegation-by-Warrant ID-Based Proxy Signcryption Scheme. CIS (2) 2005: 445-450 | |
13 | Yuan Zhou, Zhenfu Cao, Zhenchuan Chai: Constructing Secure Proxy Cryptosystem. CISC 2005: 150-161 | |
12 | Yuan Zhou, Zhenfu Cao, Zhenchuan Chai: An Efficient Proxy-Protected Signature Scheme Based on Factoring. ISPA Workshops 2005: 332-341 | |
11 | Zhenchuan Chai, Zhenfu Cao, Yuan Zhou: Encryption Based on Reversible Second-Order Cellular Automata. ISPA Workshops 2005: 350-358 | |
10 | Michael Garland, Yuan Zhou: Quadric-based simplification in any dimension. ACM Trans. Graph. 24(2): 209-239 (2005) | |
9 | Rongxing Lu, Zhenfu Cao, Yuan Zhou: Threshold undeniable signature scheme based on conic. Applied Mathematics and Computation 162(1): 165-177 (2005) | |
8 | Rongxing Lu, Zhenfu Cao, Yuan Zhou: Proxy blind multi-signature scheme without a secure channel. Applied Mathematics and Computation 164(1): 179-187 (2005) | |
7 | Yuan Zhou, Zhenfu Cao, Rongxing Lu: Provably secure proxy-protected signature schemes based on factoring. Applied Mathematics and Computation 164(1): 83-98 (2005) | |
2004 | ||
6 | Yuan Zhou, Guangsheng Li, Qirong Mao, Yongzhao Zhan, Yibin Hou: Design and Simulation of Multicast Routing Protocol for Mobile Internet. APWeb 2004: 887-890 | |
5 | Yuan Zhou, Michael Garland, Robert Haber: Pixel-Exact Rendering of Spacetime Finite Element Solutions. IEEE Visualization 2004: 425-432 | |
4 | Reza Abedi, Shuo-Heng Chung, Jeff Erickson, Yong Fan, Michael Garland, Damrong Guoy, Robert Haber, John M. Sullivan, Shripad Thite, Yuan Zhou: Spacetime meshing with adaptive refinement and coarsening. Symposium on Computational Geometry 2004: 300-309 | |
3 | Yuan Zhou, Guangsheng Li, Yongzhao Zhan, Qirong Mao, Yibin Hou: DRMR: Dynamic-Ring-Based Multicast Routing Protocol for Ad Hoc Networks. J. Comput. Sci. Technol. 19(6): 909-919 (2004) | |
2001 | ||
2 | Yuan Zhou, Quan-Lin Li, Songde Ma: Visualization of Geostress Tensor along Oil Well Trajectory. Computer Graphics International 2001: 317-320 | |
1994 | ||
1 | Yuan Zhou: From Smart Guesser to Smart Navigator: Changes in Collection Development for Research Libraries in a Networked Environment. Library Trends 42(4): (1994) |