The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Dong Zheng: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Zheng Dong, Huang Zheng, Kefei Chen, Weidong Kou
    ID-Based Proxy Blind Signature. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2004, pp:380-383 [Conf]
  2. Yongguo Liu, Wei Zhang, Dong Zheng, Kefei Chen
    A Novel Clustering Technique Based on Improved Noising Method. [Citation Graph (0, 0)][DBLP]
    CIARP, 2005, pp:81-92 [Conf]
  3. Yongguo Liu, Dong Zheng, Shiqun Li, Libin Wang, Kefei Chen
    A Tabu Clustering Method with DHB Operation and Mergence and Partition Operation. [Citation Graph (0, 0)][DBLP]
    Discovery Science, 2005, pp:380-382 [Conf]
  4. Longjun Zhang, Han Wei, Zheng Dong, Kefei Chen
    A Security Solution of WLAN Based on Public Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    ICPADS (2), 2005, pp:422-427 [Conf]
  5. Changshe Ma, Kefei Chen, Dong Zheng, Shengli Liu
    Efficient and Proactive Threshold Signcryption. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:233-243 [Conf]
  6. Dong Zheng, Junshan Zhang
    Channel-Aware Weighted Proportional Fair Medium Access Control in Wireless LANs with MIMO links. [Citation Graph (0, 0)][DBLP]
    QSHINE, 2005, pp:24- [Conf]
  7. Changshe Ma, Kefei Chen, Shengli Liu, Dong Zheng
    Transitive Signatures Based on Bilinear Maps. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:48-56 [Conf]
  8. Yan Liu, Dong Zheng, Jiying Zhao
    A Rectification Scheme for RST Invariant Image Watermarking. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:314-318 [Journal]
  9. Dong Zheng, Jiying Zhao, Abdulmotaleb El-Saddik
    RST-invariant digital image watermarking based on log-polar mapping and phase correlation. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Circuits Syst. Video Techn., 2003, v:13, n:8, pp:753-765 [Journal]
  10. Dong Zheng, Yan Liu, Jiying Zhao
    RST invariant digital image watermarking based on a new phase-only filtering method. [Citation Graph (0, 0)][DBLP]
    Signal Processing, 2005, v:85, n:12, pp:2354-2370 [Journal]
  11. Xiangxue Li, Dong Zheng, Kefei Chen
    Efficient Blind Signatures from Linear Feedback Shift Register. [Citation Graph (0, 0)][DBLP]
    CDVE, 2007, pp:423-425 [Conf]
  12. Xiangxue Li, Dong Zheng, Kefei Chen
    Efficient Linkable Ring Signatures and Threshold Signatures from Linear Feedback Shift Register. [Citation Graph (0, 0)][DBLP]
    ICA3PP, 2007, pp:95-106 [Conf]
  13. Dong Zheng, Junshan Zhang
    Joint Optimal Channel Probing and Transmission in Collocated Wireless Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2007, pp:2266-2270 [Conf]
  14. Junshan Zhang, Dong Zheng, Mung Chiang
    The Impact of Stochastic Noisy Feedback on Distributed Network Utility Maximization. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2007, pp:222-230 [Conf]
  15. Dong Zheng, Yan Liu, Jiying Zhao
    A Survey of RST Invariant Image Watermarking Algorithms. [Citation Graph (0, 0)][DBLP]
    CCECE, 2006, pp:2086-2089 [Conf]
  16. Dong Zheng, Yan Liu, Jiying Zhao, Abdulmotaleb El-Saddik
    A survey of RST invariant image watermarking algorithms. [Citation Graph (0, 0)][DBLP]
    ACM Comput. Surv., 2007, v:39, n:2, pp:- [Journal]
  17. Yan Liu, Dong Zheng, Jiying Zhao
    An image rectification scheme and its applications in RST invariant digital image watermarking. [Citation Graph (0, 0)][DBLP]
    Multimedia Tools Appl., 2007, v:34, n:1, pp:57-84 [Journal]
  18. Huiyan Qi, Dong Zheng, Jiying Zhao
    Human visual system based adaptive digital image watermarking. [Citation Graph (0, 0)][DBLP]
    Signal Processing, 2008, v:88, n:1, pp:174-188 [Journal]

  19. Identity-Based Threshold Key-Insulated Encryption without Random Oracles. [Citation Graph (, )][DBLP]


  20. Linkable Ring Signatures from Linear Feedback Shift Register. [Citation Graph (, )][DBLP]


  21. Distributed Opportunistic Scheduling for MIMO Ad-Hoc Networks. [Citation Graph (, )][DBLP]


  22. Distributed Opportunistic Scheduling For Ad-Hoc Communications under Noisy Channel Estimation. [Citation Graph (, )][DBLP]


  23. Rate distortion optimized curve determination for curved wavelet image coding. [Citation Graph (, )][DBLP]


  24. A Rotation Invariant Feature and Image Normalization Based Image Watermarking Algorithm. [Citation Graph (, )][DBLP]


  25. Channel Aware Distributed Scheduling for Exploiting Multi-Receiver Diversity and Multiuser Diversity in Ad-Hoc Networks: A Unified PHY/MAC Approach. [Citation Graph (, )][DBLP]


  26. CSMA-Based Distributed Scheduling in Multi-hop MIMO Networks under SINR Model. [Citation Graph (, )][DBLP]


  27. Distributed Opportunistic Scheduling for Ad-Hoc Communications Under Delay Constraints. [Citation Graph (, )][DBLP]


  28. Distributed opportunistic scheduling for ad-hoc communications: an optimal stopping approach. [Citation Graph (, )][DBLP]


  29. A Tamper-Evident Voting Machine Resistant to Covert Channels. [Citation Graph (, )][DBLP]


  30. AE-BP: Adaptive Erasure Belief Propagation Decoding Algorithm of LDPC Codes. [Citation Graph (, )][DBLP]


  31. Distributed Opportunistic Scheduling For Ad-Hoc Communications Under Noisy Channel Estimation [Citation Graph (, )][DBLP]


  32. Distributed Opportunistic Scheduling for MIMO Ad-Hoc Networks [Citation Graph (, )][DBLP]


  33. Distributed Opportunistic Scheduling With Two-Level Probing [Citation Graph (, )][DBLP]


Search in 0.125secs, Finished in 0.127secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002