Skip navigation

Items where Author is "Du, Wencai"

Items where Author is "Du, Wencai"

Up a level
Export as [feed] RSS
Group by: Item Type | Uncontrolled Keywords | No Grouping
Number of items: 43.

Anti-counterfeiting

Yao, Xiaoming, Du, Wencai, Zhou, Xiaoyi and Ma, Jixin (2016) Security and privacy for data mining of RFID-enabled product supply chains. In: IEEE International Conference on Science and Information Conference (SAI 2016). IEEE, pp. 1037-1046. ISBN 978-1-4673-8460-5 (doi:https://doi.org/10.1109/SAI.2016.7556106)

asymmetric

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai and Zhao, Yongzhe (2011) Ergodic matrix and hybrid-key based image cryptosystem. International Journal of Image, Graphics and Signal Processing (IJIGSP), 3 (4). pp. 1-9. ISSN 2074-9074 (Print), 2074-9082 (Online) (doi:https://doi.org/10.5815/ijigsp.2011.04.01)

autonomics

Hawthorne, James and Anthony, Richard (2010) A methodology for the use of the teleo-reactive programming technique in autonomic computing. In: Proceedings: 11th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD2010). IEEE Computer Society, Los Alamitos, CA, USA, pp. 245-250. ISBN 978-0-7695-4088-7 (doi:https://doi.org/10.1109/SNPD.2010.44)

Bayesian networks

Dai, Jingguo, Ren, Jia ORCID: 0000-0002-4000-1353 , Du, Wencai, Shikhin, Vladimir and Ma, Jixin (2018) An improved evolutionary approach-based hybrid algorithm for Bayesian network structure learning in dynamic constrained search space. Neural Computing and Applications, 32 (5). pp. 1413-1434. ISSN 0941-0643 (Print), 1433-3058 (Online) (doi:https://doi.org/10.1007/s00521-018-3650-7)

bisectional

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Petridis, Miltos and Zhao, Yongzhe (2010) BMQE system: a MQ equations system based on ergodic matrix. In: SECRYPT 2010: Proceedings of the International Conference on Security and Cryptography. SciTePress – Science and Technology Publications, Portugal, pp. 431-435. ISBN 9789898425188

complexity theory

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Petridis, Miltos and Zhao, Yongzhe (2010) BMQE system: a MQ equations system based on ergodic matrix. In: SECRYPT 2010: Proceedings of the International Conference on Security and Cryptography. SciTePress – Science and Technology Publications, Portugal, pp. 431-435. ISBN 9789898425188

cryptanalysis

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Chen, Mingrui and Zhao, Youngzhe (2010) Cryptanalysis of the bisectional MQ equations system. In: Proceedings - 10th IEEE International Conference on Computer and Information Technology, CIT-2010, 7th IEEE International Conference on Embedded Software and Systems, ICESS-2010, ScalCom-2010. IEEE Computer Society, Piscataway, USA, pp. 1038-1043. ISBN 9781424475476 (doi:https://doi.org/10.1109/CIT.2010.190)

Differential Privacy

Yao, Xiaoming, Du, Wencai, Zhou, Xiaoyi and Ma, Jixin (2016) Security and privacy for data mining of RFID-enabled product supply chains. In: IEEE International Conference on Science and Information Conference (SAI 2016). IEEE, pp. 1037-1046. ISBN 978-1-4673-8460-5 (doi:https://doi.org/10.1109/SAI.2016.7556106)

diffusion

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai and Zhao, Yongzhe (2011) Ergodic matrix and hybrid-key based image cryptosystem. International Journal of Image, Graphics and Signal Processing (IJIGSP), 3 (4). pp. 1-9. ISSN 2074-9074 (Print), 2074-9082 (Online) (doi:https://doi.org/10.5815/ijigsp.2011.04.01)

Zhou, Xiangming, Ma, Jixin, Du, Wencai and Zhao, Yongzhe (2010) A hybrid-key based image encryption and authentication scheme with the use of ergodic matrix. In: 2nd International Symposium on Computer Network and Multimedia Technology, 24-26 December 2010, Wuhan, China.

e-Pedigree

Yao, Xiaoming, Du, Wencai, Zhou, Xiaoyi and Ma, Jixin (2016) Security and privacy for data mining of RFID-enabled product supply chains. In: IEEE International Conference on Science and Information Conference (SAI 2016). IEEE, pp. 1037-1046. ISBN 978-1-4673-8460-5 (doi:https://doi.org/10.1109/SAI.2016.7556106)

entropy

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai and Zhao, Yongzhe (2011) Ergodic matrix and hybrid-key based image cryptosystem. International Journal of Image, Graphics and Signal Processing (IJIGSP), 3 (4). pp. 1-9. ISSN 2074-9074 (Print), 2074-9082 (Online) (doi:https://doi.org/10.5815/ijigsp.2011.04.01)

ergodic matrix

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai and Zhao, Yongzhe (2011) Ergodic matrix and hybrid-key based image cryptosystem. International Journal of Image, Graphics and Signal Processing (IJIGSP), 3 (4). pp. 1-9. ISSN 2074-9074 (Print), 2074-9082 (Online) (doi:https://doi.org/10.5815/ijigsp.2011.04.01)

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Petridis, Miltos and Zhao, Yongzhe (2010) BMQE system: a MQ equations system based on ergodic matrix. In: SECRYPT 2010: Proceedings of the International Conference on Security and Cryptography. SciTePress – Science and Technology Publications, Portugal, pp. 431-435. ISBN 9789898425188

Zhou, Xiangming, Ma, Jixin, Du, Wencai and Zhao, Yongzhe (2010) A hybrid-key based image encryption and authentication scheme with the use of ergodic matrix. In: 2nd International Symposium on Computer Network and Multimedia Technology, 24-26 December 2010, Wuhan, China.

finite field

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Chen, Mingrui and Zhao, Youngzhe (2010) Cryptanalysis of the bisectional MQ equations system. In: Proceedings - 10th IEEE International Conference on Computer and Information Technology, CIT-2010, 7th IEEE International Conference on Embedded Software and Systems, ICESS-2010, ScalCom-2010. IEEE Computer Society, Piscataway, USA, pp. 1038-1043. ISBN 9781424475476 (doi:https://doi.org/10.1109/CIT.2010.190)

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai and Chen, Mingrui (2010) An efficient algorithm to solve linear equations over finite field IFq. Natural Science Journal of Hainan University, 28 (4). pp. 45-49. ISSN 1004-1729

fixing variables

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Petridis, Miltos and Zhao, Yongzhe (2010) BMQE system: a MQ equations system based on ergodic matrix. In: SECRYPT 2010: Proceedings of the International Conference on Security and Cryptography. SciTePress – Science and Technology Publications, Portugal, pp. 431-435. ISBN 9789898425188

Galois fields

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Petridis, Miltos and Zhao, Yongzhe (2010) BMQE system: a MQ equations system based on ergodic matrix. In: SECRYPT 2010: Proceedings of the International Conference on Security and Cryptography. SciTePress – Science and Technology Publications, Portugal, pp. 431-435. ISBN 9789898425188

gaussian elimination

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai and Chen, Mingrui (2010) An efficient algorithm to solve linear equations over finite field IFq. Natural Science Journal of Hainan University, 28 (4). pp. 45-49. ISSN 1004-1729

genetic algorithm

Dai, Jingguo, Ren, Jia ORCID: 0000-0002-4000-1353 , Du, Wencai, Shikhin, Vladimir and Ma, Jixin (2018) An improved evolutionary approach-based hybrid algorithm for Bayesian network structure learning in dynamic constrained search space. Neural Computing and Applications, 32 (5). pp. 1413-1434. ISSN 0941-0643 (Print), 1433-3058 (Online) (doi:https://doi.org/10.1007/s00521-018-3650-7)

hybrid-key

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai and Zhao, Yongzhe (2011) Ergodic matrix and hybrid-key based image cryptosystem. International Journal of Image, Graphics and Signal Processing (IJIGSP), 3 (4). pp. 1-9. ISSN 2074-9074 (Print), 2074-9082 (Online) (doi:https://doi.org/10.5815/ijigsp.2011.04.01)

Zhou, Xiangming, Ma, Jixin, Du, Wencai and Zhao, Yongzhe (2010) A hybrid-key based image encryption and authentication scheme with the use of ergodic matrix. In: 2nd International Symposium on Computer Network and Multimedia Technology, 24-26 December 2010, Wuhan, China.

Image encryption

Zhou, Xiangming, Ma, Jixin, Du, Wencai and Zhao, Yongzhe (2010) A hybrid-key based image encryption and authentication scheme with the use of ergodic matrix. In: 2nd International Symposium on Computer Network and Multimedia Technology, 24-26 December 2010, Wuhan, China.

linear equation

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai and Chen, Mingrui (2010) An efficient algorithm to solve linear equations over finite field IFq. Natural Science Journal of Hainan University, 28 (4). pp. 45-49. ISSN 1004-1729

medical text classification

Liang, Shengbin, Chen, Xinan ORCID: 0000-0001-7641-3897 , Ma, Jixin ORCID: 0000-0001-7458-7412 , Du, Wencai ORCID: 0000-0003-0428-0057 , Ma, Huawei ORCID: 0000-0002-7432-5583 and Li, Xingwang (2021) An improved double channel long short-term memory model for medical text classification. Journal of Healthcare Engineering, 2021:6664893. pp. 1-8. ISSN 2040-2295 (Print), 2040-2309 (Online) (doi:https://doi.org/10.1155/2021/6664893)

methodology

Hawthorne, James and Anthony, Richard (2010) A methodology for the use of the teleo-reactive programming technique in autonomic computing. In: Proceedings: 11th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD2010). IEEE Computer Society, Los Alamitos, CA, USA, pp. 245-250. ISBN 978-0-7695-4088-7 (doi:https://doi.org/10.1109/SNPD.2010.44)

Multiparty Security

Yao, Xiaoming, Du, Wencai, Zhou, Xiaoyi and Ma, Jixin (2016) Security and privacy for data mining of RFID-enabled product supply chains. In: IEEE International Conference on Science and Information Conference (SAI 2016). IEEE, pp. 1037-1046. ISBN 978-1-4673-8460-5 (doi:https://doi.org/10.1109/SAI.2016.7556106)

multivariate quadratic

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Chen, Mingrui and Zhao, Youngzhe (2010) Cryptanalysis of the bisectional MQ equations system. In: Proceedings - 10th IEEE International Conference on Computer and Information Technology, CIT-2010, 7th IEEE International Conference on Embedded Software and Systems, ICESS-2010, ScalCom-2010. IEEE Computer Society, Piscataway, USA, pp. 1038-1043. ISBN 9781424475476 (doi:https://doi.org/10.1109/CIT.2010.190)

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Petridis, Miltos and Zhao, Yongzhe (2010) BMQE system: a MQ equations system based on ergodic matrix. In: SECRYPT 2010: Proceedings of the International Conference on Security and Cryptography. SciTePress – Science and Technology Publications, Portugal, pp. 431-435. ISBN 9789898425188

mutual information

Dai, Jingguo, Ren, Jia ORCID: 0000-0002-4000-1353 , Du, Wencai, Shikhin, Vladimir and Ma, Jixin (2018) An improved evolutionary approach-based hybrid algorithm for Bayesian network structure learning in dynamic constrained search space. Neural Computing and Applications, 32 (5). pp. 1413-1434. ISSN 0941-0643 (Print), 1433-3058 (Online) (doi:https://doi.org/10.1007/s00521-018-3650-7)

NP-hard

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Petridis, Miltos and Zhao, Yongzhe (2010) BMQE system: a MQ equations system based on ergodic matrix. In: SECRYPT 2010: Proceedings of the International Conference on Security and Cryptography. SciTePress – Science and Technology Publications, Portugal, pp. 431-435. ISBN 9789898425188

polynomials

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Petridis, Miltos and Zhao, Yongzhe (2010) BMQE system: a MQ equations system based on ergodic matrix. In: SECRYPT 2010: Proceedings of the International Conference on Security and Cryptography. SciTePress – Science and Technology Publications, Portugal, pp. 431-435. ISBN 9789898425188

public key cryptography

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Petridis, Miltos and Zhao, Yongzhe (2010) BMQE system: a MQ equations system based on ergodic matrix. In: SECRYPT 2010: Proceedings of the International Conference on Security and Cryptography. SciTePress – Science and Technology Publications, Portugal, pp. 431-435. ISBN 9789898425188

public key cryptosystems

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Chen, Mingrui and Zhao, Youngzhe (2010) Cryptanalysis of the bisectional MQ equations system. In: Proceedings - 10th IEEE International Conference on Computer and Information Technology, CIT-2010, 7th IEEE International Conference on Embedded Software and Systems, ICESS-2010, ScalCom-2010. IEEE Computer Society, Piscataway, USA, pp. 1038-1043. ISBN 9781424475476 (doi:https://doi.org/10.1109/CIT.2010.190)

relinearization

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Chen, Mingrui and Zhao, Youngzhe (2010) Cryptanalysis of the bisectional MQ equations system. In: Proceedings - 10th IEEE International Conference on Computer and Information Technology, CIT-2010, 7th IEEE International Conference on Embedded Software and Systems, ICESS-2010, ScalCom-2010. IEEE Computer Society, Piscataway, USA, pp. 1038-1043. ISBN 9781424475476 (doi:https://doi.org/10.1109/CIT.2010.190)

software paradigm

Hawthorne, James and Anthony, Richard (2010) A methodology for the use of the teleo-reactive programming technique in autonomic computing. In: Proceedings: 11th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD2010). IEEE Computer Society, Los Alamitos, CA, USA, pp. 245-250. ISBN 978-0-7695-4088-7 (doi:https://doi.org/10.1109/SNPD.2010.44)

software strategy

Hawthorne, James and Anthony, Richard (2010) A methodology for the use of the teleo-reactive programming technique in autonomic computing. In: Proceedings: 11th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD2010). IEEE Computer Society, Los Alamitos, CA, USA, pp. 245-250. ISBN 978-0-7695-4088-7 (doi:https://doi.org/10.1109/SNPD.2010.44)

Statistical analysis

Zhou, Xiangming, Ma, Jixin, Du, Wencai and Zhao, Yongzhe (2010) A hybrid-key based image encryption and authentication scheme with the use of ergodic matrix. In: 2nd International Symposium on Computer Network and Multimedia Technology, 24-26 December 2010, Wuhan, China.

structure learning

Dai, Jingguo, Ren, Jia ORCID: 0000-0002-4000-1353 , Du, Wencai, Shikhin, Vladimir and Ma, Jixin (2018) An improved evolutionary approach-based hybrid algorithm for Bayesian network structure learning in dynamic constrained search space. Neural Computing and Applications, 32 (5). pp. 1413-1434. ISSN 0941-0643 (Print), 1433-3058 (Online) (doi:https://doi.org/10.1007/s00521-018-3650-7)

Supply Chain

Yao, Xiaoming, Du, Wencai, Zhou, Xiaoyi and Ma, Jixin (2016) Security and privacy for data mining of RFID-enabled product supply chains. In: IEEE International Conference on Science and Information Conference (SAI 2016). IEEE, pp. 1037-1046. ISBN 978-1-4673-8460-5 (doi:https://doi.org/10.1109/SAI.2016.7556106)

symmetric

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai and Zhao, Yongzhe (2011) Ergodic matrix and hybrid-key based image cryptosystem. International Journal of Image, Graphics and Signal Processing (IJIGSP), 3 (4). pp. 1-9. ISSN 2074-9074 (Print), 2074-9082 (Online) (doi:https://doi.org/10.5815/ijigsp.2011.04.01)

Temporal Relation

Yao, Xiaoming, Du, Wencai, Zhou, Xiaoyi and Ma, Jixin (2016) Security and privacy for data mining of RFID-enabled product supply chains. In: IEEE International Conference on Science and Information Conference (SAI 2016). IEEE, pp. 1037-1046. ISBN 978-1-4673-8460-5 (doi:https://doi.org/10.1109/SAI.2016.7556106)

This list was generated on Fri Apr 19 11:42:56 2024 UTC.