The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jianhua Li: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Qiang Li, Jianhua Li
    Topic-Specific Text Filtering Based on Multiple Reducts. [Citation Graph (0, 0)][DBLP]
    AIS-ADM, 2005, pp:175-183 [Conf]
  2. Qiang Li, Jianhua Li
    An Efficient Topic-Specific Web Text Filtering Framework. [Citation Graph (0, 0)][DBLP]
    APWeb, 2005, pp:157-163 [Conf]
  3. Jianhua Li, Graeme Hirst
    Semantic knowledge in word completion. [Citation Graph (0, 0)][DBLP]
    ASSETS, 2005, pp:121-128 [Conf]
  4. Qiang Li, Jianhua Li, Xiang Li, Shenghong Li
    Evaluation Incompleteness of Knowledge in Data Mining. [Citation Graph (0, 0)][DBLP]
    AWCC, 2004, pp:278-284 [Conf]
  5. Mengquan Lin, Qiangmin Wang, Jianhua Li
    Methodology of Quantitative Risk Assessment for Information System Security. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:526-531 [Conf]
  6. Yingjie Wang, Jianhua Li, Ling Tie, Qiang Li
    An Efficient Key Management for Large Dynamic Groups. [Citation Graph (0, 0)][DBLP]
    CNSR, 2004, pp:131-136 [Conf]
  7. Min Zuo, Jianhua Li
    Constructing Fair-Exchange P2P File Market. [Citation Graph (0, 0)][DBLP]
    GCC, 2005, pp:941-946 [Conf]
  8. Gongshen Liu, Jianhua Li, Xiang Li, Qiang Li
    New Feature Selection and Weighting Methods Based on Category Information. [Citation Graph (0, 0)][DBLP]
    ICADL, 2004, pp:330-338 [Conf]
  9. Chunbo Ma, Jianhua Li
    Adaptable Designated Group Signature. [Citation Graph (0, 0)][DBLP]
    ICIC (1), 2006, pp:1053-1061 [Conf]
  10. Lan Li, Xinghao Jiang, Jianhua Li
    Enforce Mandatory Access Control Policy on XML Documents. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:336-349 [Conf]
  11. Miaomiao Zhang, Gongliang Chen, Jianhua Li
    Efficient ID-based Proxy Chameleon Signature from Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    IMSCCS (2), 2006, pp:135-141 [Conf]
  12. Zhiyuan Hu, Yaowei Liu, Xiao Hu, Jianhua Li
    Anonymous Micropayments Authentication(AMA) in Mobile Data Network. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2004, pp:- [Conf]
  13. JianGuo Fu, Yingcai Wang, Jianhua Li, Zhenyu Zheng, Xingbo Yin
    Recurrent Networks for Integrated Navigation. [Citation Graph (0, 0)][DBLP]
    ISNN (3), 2005, pp:297-302 [Conf]
  14. Qiang Sun, Jianhua Li, Xinran Liang, Shenghong Li
    Using Double-Layer One-Class Classification for Anti-jamming Information Filtering. [Citation Graph (0, 0)][DBLP]
    ISNN (3), 2005, pp:361-366 [Conf]
  15. Min Zuo, Kai Wang, Jianhua Li
    The Application of Collaborative Filtering for Trust Management in P2P Communities. [Citation Graph (0, 0)][DBLP]
    ISPA, 2005, pp:383-394 [Conf]
  16. Jianhua Li, Laleh Behjat
    Net cluster: a net-reduction based clustering preprocessing algorithm. [Citation Graph (0, 0)][DBLP]
    ISPD, 2006, pp:200-205 [Conf]
  17. Yijuan Shi, Gongliang Chen, Jianhua Li
    ID-Based One Round Authenticated Group Key Agreement Protocol with Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:757-761 [Conf]
  18. Jianhua Li, Laleh Behjat, Blair Schiffner
    A Structure Based Clustering Algorithm with Applications to VLSI Physical Design. [Citation Graph (0, 0)][DBLP]
    IWSOC, 2005, pp:270-274 [Conf]
  19. Blair Schiffner, Jianhua Li, Laleh Behjat
    A Multivalue Eigenvalue Based Circuit Partitioning Technique. [Citation Graph (0, 0)][DBLP]
    IWSOC, 2005, pp:312-316 [Conf]
  20. Yi-qun Zhu, Jianhua Li, Quan-hai Zhang
    An Extended Role-Based Access Control for Web Services. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:471-474 [Conf]
  21. Yingjie Wang, Jianhua Li, Lei Fan
    Cryptanalysis on a Blind Signature Scheme Based on ElGamal Signature. [Citation Graph (0, 0)][DBLP]
    SNPD, 2004, pp:349-351 [Conf]
  22. Jianhua Li, Shuming Gao, Yusheng Liu
    Solid-based CAPP for surface micromachined MEMS devices. [Citation Graph (0, 0)][DBLP]
    Computer-Aided Design, 2007, v:39, n:3, pp:190-201 [Journal]
  23. Rui Jiang, Li Pan, Jian-Hua Li
    Further analysis of password authentication schemes based on authentication tests. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:6, pp:469-477 [Journal]
  24. Rui Jiang, Li Pan, Jian-Hua Li
    An improvement on efficient anonymous auction protocols. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:2, pp:169-174 [Journal]
  25. Jianhua Li, Xiaolong Wang
    Combining Trigram and Automatic Weight Distribution in Chinese Spelling Error Correction. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2002, v:17, n:6, pp:915-923 [Journal]
  26. Yingjie Wang, Jianhua Li, Ling Tie
    A simple protocol for deniable authentication based on ElGamal cryptography. [Citation Graph (0, 0)][DBLP]
    Networks, 2005, v:45, n:4, pp:193-194 [Journal]
  27. Yi-qun Zhu, Jianhua Li, Quan-hai Zhang
    A General Attribute based RBAC Model for Web Service. [Citation Graph (0, 0)][DBLP]
    IEEE SCC, 2007, pp:236-239 [Conf]
  28. Yan Gao, Shiwen Gu, Jianhua Li, Zhining Liao
    The Multi-view Information Bottleneck Clustering. [Citation Graph (0, 0)][DBLP]
    DASFAA, 2007, pp:912-917 [Conf]
  29. Chunbo Ma, Jun Ao, Jianhua Li
    Chameleon-Based Deniable Authenticated Key Agreement Protocol Secure Against Forgery. [Citation Graph (0, 0)][DBLP]
    HCI (15), 2007, pp:124-133 [Conf]
  30. Laleh Behjat, Jianhua Li, L. Rakai, Jie Huang
    Two Clustering Preprocessing Techniques for Large-Scale Circuits. [Citation Graph (0, 0)][DBLP]
    ISCAS, 2007, pp:1057-1060 [Conf]
  31. Jianhua Li, Laleh Behjat, Jie Huang
    An effective clustering algorithm for mixed-size placement. [Citation Graph (0, 0)][DBLP]
    ISPD, 2007, pp:111-118 [Conf]
  32. Hao Chen, Liang Ma, Jianhua Li
    Vectorial Resilient $PC(l)$ of Order $k$ Boolean Functions from AG-Codes [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  33. Hao Chen, Jianhua Li
    Lower Bounds on the Algebraic Immunity of Boolean Functions [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]

  34. An Improved Artificial Potential Field Algorithm for Virtual Human Path Planning. [Citation Graph (, )][DBLP]


  35. Linkable Ring Signatures from Linear Feedback Shift Register. [Citation Graph (, )][DBLP]


  36. A Novel Verifier-Based Authenticated Key Agreement Protocol. [Citation Graph (, )][DBLP]


  37. A LoSS Based On-line Detection of Abnormal Traffic Using Dynamic Detection Threshold. [Citation Graph (, )][DBLP]


  38. Outage Behavior of Multi-Antenna Multi-Relay Non-Regenerative Cooperative Networks. [Citation Graph (, )][DBLP]


  39. A Novel Real-Time MPEG-2 Video Watermarking Scheme in Copyright Protection. [Citation Graph (, )][DBLP]


  40. A Novel Original Streaming Video Wavelet Domain Watermarking Algorithm in Copyright Protection. [Citation Graph (, )][DBLP]


  41. An Efficient Video Watermarking Scheme with Luminance Differential DC Coefficient Modification. [Citation Graph (, )][DBLP]


  42. A Group Key Management Scheme with Revocation and Loss-tolerance Capability for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  43. Cryptanalysis and improvement on Yang-Shieh authentication schemes. [Citation Graph (, )][DBLP]


  44. Information Grid Instant Service and its application in tourism. [Citation Graph (, )][DBLP]


  45. ACKDs: An Authenticated Combinatorial Key Distribution Scheme for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  46. A Weighted Consensus Function Based on Information-Theoretic Principles to Combine Soft Clusterings. [Citation Graph (, )][DBLP]


  47. Performance Analysis of Authentication Method for Proxy Mobile IP Protocol. [Citation Graph (, )][DBLP]


  48. A New Blind Steganalysis Method for JPEG Images. [Citation Graph (, )][DBLP]


  49. Group-Based Trust Model in P2P System Based on Trusted Computing. [Citation Graph (, )][DBLP]


  50. An Undergraduate Parallel and Distributed Computing Course in Multi-Core Era. [Citation Graph (, )][DBLP]


  51. Adaptive workflow based on SOA and its application in Tourism Information Change Management. [Citation Graph (, )][DBLP]


  52. A Structural Study and Hyperedge Clustering Technique for Large Scale Circuits. [Citation Graph (, )][DBLP]


  53. Medication Reconciliation Using Natural Language Processing and Controlled Terminologies. [Citation Graph (, )][DBLP]


  54. Real-Time and Self-adaptive Method for Abnormal Traffic Detection Based on Self-similarity. [Citation Graph (, )][DBLP]


  55. AE-BP: Adaptive Erasure Belief Propagation Decoding Algorithm of LDPC Codes. [Citation Graph (, )][DBLP]


  56. Building network attack graph for alert causal correlation. [Citation Graph (, )][DBLP]


  57. Implementing a passive network covert timing channel. [Citation Graph (, )][DBLP]


Search in 0.156secs, Finished in 0.158secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002