Skip navigation

Items where Author is "Du, Wencai"

Items where Author is "Du, Wencai"

Up a level
Export as [feed] RSS
Group by: Item Type | Uncontrolled Keywords | No Grouping
Number of items: 9.

Article

Liang, Shengbin, Chen, Xinan ORCID: 0000-0001-7641-3897 , Ma, Jixin ORCID: 0000-0001-7458-7412 , Du, Wencai ORCID: 0000-0003-0428-0057 , Ma, Huawei ORCID: 0000-0002-7432-5583 and Li, Xingwang (2021) An improved double channel long short-term memory model for medical text classification. Journal of Healthcare Engineering, 2021:6664893. pp. 1-8. ISSN 2040-2295 (Print), 2040-2309 (Online) (doi:https://doi.org/10.1155/2021/6664893)

Dai, Jingguo, Ren, Jia ORCID: 0000-0002-4000-1353 , Du, Wencai, Shikhin, Vladimir and Ma, Jixin (2018) An improved evolutionary approach-based hybrid algorithm for Bayesian network structure learning in dynamic constrained search space. Neural Computing and Applications, 32 (5). pp. 1413-1434. ISSN 0941-0643 (Print), 1433-3058 (Online) (doi:https://doi.org/10.1007/s00521-018-3650-7)

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai and Zhao, Yongzhe (2011) Ergodic matrix and hybrid-key based image cryptosystem. International Journal of Image, Graphics and Signal Processing (IJIGSP), 3 (4). pp. 1-9. ISSN 2074-9074 (Print), 2074-9082 (Online) (doi:https://doi.org/10.5815/ijigsp.2011.04.01)

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai and Chen, Mingrui (2010) An efficient algorithm to solve linear equations over finite field IFq. Natural Science Journal of Hainan University, 28 (4). pp. 45-49. ISSN 1004-1729

Conference Proceedings

Yao, Xiaoming, Du, Wencai, Zhou, Xiaoyi and Ma, Jixin (2016) Security and privacy for data mining of RFID-enabled product supply chains. In: IEEE International Conference on Science and Information Conference (SAI 2016). IEEE, pp. 1037-1046. ISBN 978-1-4673-8460-5 (doi:https://doi.org/10.1109/SAI.2016.7556106)

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Chen, Mingrui and Zhao, Youngzhe (2010) Cryptanalysis of the bisectional MQ equations system. In: Proceedings - 10th IEEE International Conference on Computer and Information Technology, CIT-2010, 7th IEEE International Conference on Embedded Software and Systems, ICESS-2010, ScalCom-2010. IEEE Computer Society, Piscataway, USA, pp. 1038-1043. ISBN 9781424475476 (doi:https://doi.org/10.1109/CIT.2010.190)

Hawthorne, James and Anthony, Richard (2010) A methodology for the use of the teleo-reactive programming technique in autonomic computing. In: Proceedings: 11th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD2010). IEEE Computer Society, Los Alamitos, CA, USA, pp. 245-250. ISBN 978-0-7695-4088-7 (doi:https://doi.org/10.1109/SNPD.2010.44)

Zhou, Xiaoyi, Ma, Jixin, Du, Wencai, Zhao, Bo, Petridis, Miltos and Zhao, Yongzhe (2010) BMQE system: a MQ equations system based on ergodic matrix. In: SECRYPT 2010: Proceedings of the International Conference on Security and Cryptography. SciTePress – Science and Technology Publications, Portugal, pp. 431-435. ISBN 9789898425188

Conference or Conference Paper

Zhou, Xiangming, Ma, Jixin, Du, Wencai and Zhao, Yongzhe (2010) A hybrid-key based image encryption and authentication scheme with the use of ergodic matrix. In: 2nd International Symposium on Computer Network and Multimedia Technology, 24-26 December 2010, Wuhan, China.

This list was generated on Tue Apr 16 21:51:21 2024 UTC.