The SCEAS System
Navigation Menu

Search the dblp DataBase


Wenping Ma: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Chen Yang, Wenping Ma, Benxiong Huang, Xinmei Wang
    Password-Based Access Control Scheme with Remote User Authentication Using Smart Cards. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (2), 2007, pp:448-452 [Conf]
  2. Chen Yang, Xiangguo Cheng, Wenping Ma, Xinmei Wang
    A New ID-Based Broadcast Encryption Scheme. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:487-492 [Conf]
  3. Wenping Ma, Ronghua Shang, Licheng Jiao
    A Novel Clonal Selection Algorithm for Face Detection. [Citation Graph (0, 0)][DBLP]
    Australian Conference on Artificial Intelligence, 2006, pp:799-807 [Conf]
  4. Wenping Ma, Licheng Jiao, Maoguo Gong, Fang Liu
    An Novel Artificial Immune Systems Multi-objective Optimization Algorithm for 0/1 Knapsack Problems. [Citation Graph (0, 0)][DBLP]
    CIS (1), 2005, pp:793-798 [Conf]
  5. Wenping Ma, Ronghua Shang
    SAR Image Classification Based on Clonal Selection Algorithm. [Citation Graph (0, 0)][DBLP]
    ICNC (1), 2006, pp:927-934 [Conf]
  6. Ronghua Shang, Wenping Ma
    Immune Clonal MO Algorithm for ZDT Problems. [Citation Graph (0, 0)][DBLP]
    ICNC (2), 2006, pp:100-109 [Conf]
  7. Ronghua Shang, Wenping Ma, Wei Zhang
    Immune Clonal MO Algorithm for 0/1 Knapsack Problems. [Citation Graph (0, 0)][DBLP]
    ICNC (1), 2006, pp:870-878 [Conf]
  8. Wenping Ma, Licheng Jiao, Maoguo Gong, Ronghua Shang
    Immune Clonal Selection Evolutionary Strategy for Constrained Optimization. [Citation Graph (0, 0)][DBLP]
    PRICAI, 2006, pp:661-670 [Conf]
  9. Chen Yang, Wenping Ma, Xinmei Wang
    New Traitor Tracing Scheme against Anonymous Attack. [Citation Graph (0, 0)][DBLP]
    ICICIC (1), 2006, pp:389-392 [Conf]
  10. Chen Yang, Wenping Ma, Xinmei Wang
    Novel Remote User Authentication Scheme Using Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:306-312 [Conf]

  11. Fair Exchange Signature Schemes. [Citation Graph (, )][DBLP]

  12. Large-scale optimization using immune algorithm. [Citation Graph (, )][DBLP]

  13. Orthogonal immune algorithm with diversity-based selection for numerical optimization. [Citation Graph (, )][DBLP]

  14. Improved hill-climbing methods in the design of bijective S-boxes. [Citation Graph (, )][DBLP]

  15. Solving multidimensional knapsack problems by an immune-inspired algorithm. [Citation Graph (, )][DBLP]

  16. Unsupervised texture image segmentation using multiobjective evolutionary clustering ensemble algorithm. [Citation Graph (, )][DBLP]

  17. Hybrid Immune Algorithm with intelligent recombination. [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002