Search the dblp DataBase
Dong Zheng :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Zheng Dong , Huang Zheng , Kefei Chen , Weidong Kou ID-Based Proxy Blind Signature. [Citation Graph (0, 0)][DBLP ] AINA (2), 2004, pp:380-383 [Conf ] Yongguo Liu , Wei Zhang , Dong Zheng , Kefei Chen A Novel Clustering Technique Based on Improved Noising Method. [Citation Graph (0, 0)][DBLP ] CIARP, 2005, pp:81-92 [Conf ] Yongguo Liu , Dong Zheng , Shiqun Li , Libin Wang , Kefei Chen A Tabu Clustering Method with DHB Operation and Mergence and Partition Operation. [Citation Graph (0, 0)][DBLP ] Discovery Science, 2005, pp:380-382 [Conf ] Longjun Zhang , Han Wei , Zheng Dong , Kefei Chen A Security Solution of WLAN Based on Public Key Cryptosystem. [Citation Graph (0, 0)][DBLP ] ICPADS (2), 2005, pp:422-427 [Conf ] Changshe Ma , Kefei Chen , Dong Zheng , Shengli Liu Efficient and Proactive Threshold Signcryption. [Citation Graph (0, 0)][DBLP ] ISC, 2005, pp:233-243 [Conf ] Dong Zheng , Junshan Zhang Channel-Aware Weighted Proportional Fair Medium Access Control in Wireless LANs with MIMO links. [Citation Graph (0, 0)][DBLP ] QSHINE, 2005, pp:24- [Conf ] Changshe Ma , Kefei Chen , Shengli Liu , Dong Zheng Transitive Signatures Based on Bilinear Maps. [Citation Graph (0, 0)][DBLP ] WOSIS, 2005, pp:48-56 [Conf ] Yan Liu , Dong Zheng , Jiying Zhao A Rectification Scheme for RST Invariant Image Watermarking. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:314-318 [Journal ] Dong Zheng , Jiying Zhao , Abdulmotaleb El-Saddik RST-invariant digital image watermarking based on log-polar mapping and phase correlation. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Circuits Syst. Video Techn., 2003, v:13, n:8, pp:753-765 [Journal ] Dong Zheng , Yan Liu , Jiying Zhao RST invariant digital image watermarking based on a new phase-only filtering method. [Citation Graph (0, 0)][DBLP ] Signal Processing, 2005, v:85, n:12, pp:2354-2370 [Journal ] Xiangxue Li , Dong Zheng , Kefei Chen Efficient Blind Signatures from Linear Feedback Shift Register. [Citation Graph (0, 0)][DBLP ] CDVE, 2007, pp:423-425 [Conf ] Xiangxue Li , Dong Zheng , Kefei Chen Efficient Linkable Ring Signatures and Threshold Signatures from Linear Feedback Shift Register. [Citation Graph (0, 0)][DBLP ] ICA3PP, 2007, pp:95-106 [Conf ] Dong Zheng , Junshan Zhang Joint Optimal Channel Probing and Transmission in Collocated Wireless Networks. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2007, pp:2266-2270 [Conf ] Junshan Zhang , Dong Zheng , Mung Chiang The Impact of Stochastic Noisy Feedback on Distributed Network Utility Maximization. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2007, pp:222-230 [Conf ] Dong Zheng , Yan Liu , Jiying Zhao A Survey of RST Invariant Image Watermarking Algorithms. [Citation Graph (0, 0)][DBLP ] CCECE, 2006, pp:2086-2089 [Conf ] Dong Zheng , Yan Liu , Jiying Zhao , Abdulmotaleb El-Saddik A survey of RST invariant image watermarking algorithms. [Citation Graph (0, 0)][DBLP ] ACM Comput. Surv., 2007, v:39, n:2, pp:- [Journal ] Yan Liu , Dong Zheng , Jiying Zhao An image rectification scheme and its applications in RST invariant digital image watermarking. [Citation Graph (0, 0)][DBLP ] Multimedia Tools Appl., 2007, v:34, n:1, pp:57-84 [Journal ] Huiyan Qi , Dong Zheng , Jiying Zhao Human visual system based adaptive digital image watermarking. [Citation Graph (0, 0)][DBLP ] Signal Processing, 2008, v:88, n:1, pp:174-188 [Journal ] Identity-Based Threshold Key-Insulated Encryption without Random Oracles. [Citation Graph (, )][DBLP ] Linkable Ring Signatures from Linear Feedback Shift Register. [Citation Graph (, )][DBLP ] Distributed Opportunistic Scheduling for MIMO Ad-Hoc Networks. [Citation Graph (, )][DBLP ] Distributed Opportunistic Scheduling For Ad-Hoc Communications under Noisy Channel Estimation. [Citation Graph (, )][DBLP ] Rate distortion optimized curve determination for curved wavelet image coding. [Citation Graph (, )][DBLP ] A Rotation Invariant Feature and Image Normalization Based Image Watermarking Algorithm. [Citation Graph (, )][DBLP ] Channel Aware Distributed Scheduling for Exploiting Multi-Receiver Diversity and Multiuser Diversity in Ad-Hoc Networks: A Unified PHY/MAC Approach. [Citation Graph (, )][DBLP ] CSMA-Based Distributed Scheduling in Multi-hop MIMO Networks under SINR Model. [Citation Graph (, )][DBLP ] Distributed Opportunistic Scheduling for Ad-Hoc Communications Under Delay Constraints. [Citation Graph (, )][DBLP ] Distributed opportunistic scheduling for ad-hoc communications: an optimal stopping approach. [Citation Graph (, )][DBLP ] A Tamper-Evident Voting Machine Resistant to Covert Channels. [Citation Graph (, )][DBLP ] AE-BP: Adaptive Erasure Belief Propagation Decoding Algorithm of LDPC Codes. [Citation Graph (, )][DBLP ] Distributed Opportunistic Scheduling For Ad-Hoc Communications Under Noisy Channel Estimation [Citation Graph (, )][DBLP ] Distributed Opportunistic Scheduling for MIMO Ad-Hoc Networks [Citation Graph (, )][DBLP ] Distributed Opportunistic Scheduling With Two-Level Probing [Citation Graph (, )][DBLP ] Search in 0.006secs, Finished in 0.282secs