Search the dblp DataBase
Jianhua Li :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Qiang Li , Jianhua Li Topic-Specific Text Filtering Based on Multiple Reducts. [Citation Graph (0, 0)][DBLP ] AIS-ADM, 2005, pp:175-183 [Conf ] Qiang Li , Jianhua Li An Efficient Topic-Specific Web Text Filtering Framework. [Citation Graph (0, 0)][DBLP ] APWeb, 2005, pp:157-163 [Conf ] Jianhua Li , Graeme Hirst Semantic knowledge in word completion. [Citation Graph (0, 0)][DBLP ] ASSETS, 2005, pp:121-128 [Conf ] Qiang Li , Jianhua Li , Xiang Li , Shenghong Li Evaluation Incompleteness of Knowledge in Data Mining. [Citation Graph (0, 0)][DBLP ] AWCC, 2004, pp:278-284 [Conf ] Mengquan Lin , Qiangmin Wang , Jianhua Li Methodology of Quantitative Risk Assessment for Information System Security. [Citation Graph (0, 0)][DBLP ] CIS (2), 2005, pp:526-531 [Conf ] Yingjie Wang , Jianhua Li , Ling Tie , Qiang Li An Efficient Key Management for Large Dynamic Groups. [Citation Graph (0, 0)][DBLP ] CNSR, 2004, pp:131-136 [Conf ] Min Zuo , Jianhua Li Constructing Fair-Exchange P2P File Market. [Citation Graph (0, 0)][DBLP ] GCC, 2005, pp:941-946 [Conf ] Gongshen Liu , Jianhua Li , Xiang Li , Qiang Li New Feature Selection and Weighting Methods Based on Category Information. [Citation Graph (0, 0)][DBLP ] ICADL, 2004, pp:330-338 [Conf ] Chunbo Ma , Jianhua Li Adaptable Designated Group Signature. [Citation Graph (0, 0)][DBLP ] ICIC (1), 2006, pp:1053-1061 [Conf ] Lan Li , Xinghao Jiang , Jianhua Li Enforce Mandatory Access Control Policy on XML Documents. [Citation Graph (0, 0)][DBLP ] ICICS, 2005, pp:336-349 [Conf ] Miaomiao Zhang , Gongliang Chen , Jianhua Li Efficient ID-based Proxy Chameleon Signature from Bilinear Pairings. [Citation Graph (0, 0)][DBLP ] IMSCCS (2), 2006, pp:135-141 [Conf ] Zhiyuan Hu , Yaowei Liu , Xiao Hu , Jianhua Li Anonymous Micropayments Authentication(AMA) in Mobile Data Network. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2004, pp:- [Conf ] JianGuo Fu , Yingcai Wang , Jianhua Li , Zhenyu Zheng , Xingbo Yin Recurrent Networks for Integrated Navigation. [Citation Graph (0, 0)][DBLP ] ISNN (3), 2005, pp:297-302 [Conf ] Qiang Sun , Jianhua Li , Xinran Liang , Shenghong Li Using Double-Layer One-Class Classification for Anti-jamming Information Filtering. [Citation Graph (0, 0)][DBLP ] ISNN (3), 2005, pp:361-366 [Conf ] Min Zuo , Kai Wang , Jianhua Li The Application of Collaborative Filtering for Trust Management in P2P Communities. [Citation Graph (0, 0)][DBLP ] ISPA, 2005, pp:383-394 [Conf ] Jianhua Li , Laleh Behjat Net cluster: a net-reduction based clustering preprocessing algorithm. [Citation Graph (0, 0)][DBLP ] ISPD, 2006, pp:200-205 [Conf ] Yijuan Shi , Gongliang Chen , Jianhua Li ID-Based One Round Authenticated Group Key Agreement Protocol with Bilinear Pairings. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:757-761 [Conf ] Jianhua Li , Laleh Behjat , Blair Schiffner A Structure Based Clustering Algorithm with Applications to VLSI Physical Design. [Citation Graph (0, 0)][DBLP ] IWSOC, 2005, pp:270-274 [Conf ] Blair Schiffner , Jianhua Li , Laleh Behjat A Multivalue Eigenvalue Based Circuit Partitioning Technique. [Citation Graph (0, 0)][DBLP ] IWSOC, 2005, pp:312-316 [Conf ] Yi-qun Zhu , Jianhua Li , Quan-hai Zhang An Extended Role-Based Access Control for Web Services. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:471-474 [Conf ] Yingjie Wang , Jianhua Li , Lei Fan Cryptanalysis on a Blind Signature Scheme Based on ElGamal Signature. [Citation Graph (0, 0)][DBLP ] SNPD, 2004, pp:349-351 [Conf ] Jianhua Li , Shuming Gao , Yusheng Liu Solid-based CAPP for surface micromachined MEMS devices. [Citation Graph (0, 0)][DBLP ] Computer-Aided Design, 2007, v:39, n:3, pp:190-201 [Journal ] Rui Jiang , Li Pan , Jian-Hua Li Further analysis of password authentication schemes based on authentication tests. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2004, v:23, n:6, pp:469-477 [Journal ] Rui Jiang , Li Pan , Jian-Hua Li An improvement on efficient anonymous auction protocols. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2005, v:24, n:2, pp:169-174 [Journal ] Jianhua Li , Xiaolong Wang Combining Trigram and Automatic Weight Distribution in Chinese Spelling Error Correction. [Citation Graph (0, 0)][DBLP ] J. Comput. Sci. Technol., 2002, v:17, n:6, pp:915-923 [Journal ] Yingjie Wang , Jianhua Li , Ling Tie A simple protocol for deniable authentication based on ElGamal cryptography. [Citation Graph (0, 0)][DBLP ] Networks, 2005, v:45, n:4, pp:193-194 [Journal ] Yi-qun Zhu , Jianhua Li , Quan-hai Zhang A General Attribute based RBAC Model for Web Service. [Citation Graph (0, 0)][DBLP ] IEEE SCC, 2007, pp:236-239 [Conf ] Yan Gao , Shiwen Gu , Jianhua Li , Zhining Liao The Multi-view Information Bottleneck Clustering. [Citation Graph (0, 0)][DBLP ] DASFAA, 2007, pp:912-917 [Conf ] Chunbo Ma , Jun Ao , Jianhua Li Chameleon-Based Deniable Authenticated Key Agreement Protocol Secure Against Forgery. [Citation Graph (0, 0)][DBLP ] HCI (15), 2007, pp:124-133 [Conf ] Laleh Behjat , Jianhua Li , L. Rakai , Jie Huang Two Clustering Preprocessing Techniques for Large-Scale Circuits. [Citation Graph (0, 0)][DBLP ] ISCAS, 2007, pp:1057-1060 [Conf ] Jianhua Li , Laleh Behjat , Jie Huang An effective clustering algorithm for mixed-size placement. [Citation Graph (0, 0)][DBLP ] ISPD, 2007, pp:111-118 [Conf ] Hao Chen , Liang Ma , Jianhua Li Vectorial Resilient $PC(l)$ of Order $k$ Boolean Functions from AG-Codes [Citation Graph (0, 0)][DBLP ] CoRR, 2006, v:0, n:, pp:- [Journal ] Hao Chen , Jianhua Li Lower Bounds on the Algebraic Immunity of Boolean Functions [Citation Graph (0, 0)][DBLP ] CoRR, 2006, v:0, n:, pp:- [Journal ] An Improved Artificial Potential Field Algorithm for Virtual Human Path Planning. [Citation Graph (, )][DBLP ] Linkable Ring Signatures from Linear Feedback Shift Register. [Citation Graph (, )][DBLP ] A Novel Verifier-Based Authenticated Key Agreement Protocol. [Citation Graph (, )][DBLP ] A LoSS Based On-line Detection of Abnormal Traffic Using Dynamic Detection Threshold. [Citation Graph (, )][DBLP ] Outage Behavior of Multi-Antenna Multi-Relay Non-Regenerative Cooperative Networks. [Citation Graph (, )][DBLP ] A Novel Real-Time MPEG-2 Video Watermarking Scheme in Copyright Protection. [Citation Graph (, )][DBLP ] A Novel Original Streaming Video Wavelet Domain Watermarking Algorithm in Copyright Protection. [Citation Graph (, )][DBLP ] An Efficient Video Watermarking Scheme with Luminance Differential DC Coefficient Modification. [Citation Graph (, )][DBLP ] A Group Key Management Scheme with Revocation and Loss-tolerance Capability for Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Cryptanalysis and improvement on Yang-Shieh authentication schemes. [Citation Graph (, )][DBLP ] Information Grid Instant Service and its application in tourism. [Citation Graph (, )][DBLP ] ACKDs: An Authenticated Combinatorial Key Distribution Scheme for Wireless Sensor Networks. [Citation Graph (, )][DBLP ] A Weighted Consensus Function Based on Information-Theoretic Principles to Combine Soft Clusterings. [Citation Graph (, )][DBLP ] Performance Analysis of Authentication Method for Proxy Mobile IP Protocol. [Citation Graph (, )][DBLP ] A New Blind Steganalysis Method for JPEG Images. [Citation Graph (, )][DBLP ] Group-Based Trust Model in P2P System Based on Trusted Computing. [Citation Graph (, )][DBLP ] An Undergraduate Parallel and Distributed Computing Course in Multi-Core Era. [Citation Graph (, )][DBLP ] Adaptive workflow based on SOA and its application in Tourism Information Change Management. [Citation Graph (, )][DBLP ] A Structural Study and Hyperedge Clustering Technique for Large Scale Circuits. [Citation Graph (, )][DBLP ] Medication Reconciliation Using Natural Language Processing and Controlled Terminologies. [Citation Graph (, )][DBLP ] Real-Time and Self-adaptive Method for Abnormal Traffic Detection Based on Self-similarity. [Citation Graph (, )][DBLP ] AE-BP: Adaptive Erasure Belief Propagation Decoding Algorithm of LDPC Codes. [Citation Graph (, )][DBLP ] Building network attack graph for alert causal correlation. [Citation Graph (, )][DBLP ] Implementing a passive network covert timing channel. [Citation Graph (, )][DBLP ] Search in 0.005secs, Finished in 0.006secs