| 2006 |
| 9 | EE | Jing Zhu,
Jian-Hua Li:
An HMM-Based Approach to Automatic Phrasing for Mandarin Text-to-Speech Synthesis.
ACL 2006 |
| 8 | EE | Wu Yang,
Xiao-chun Yun,
Jian-Hua Li:
An Efficient SVM-Based Method to Detect Malicious Attacks for Web Servers.
APWeb Workshops 2006: 835-841 |
| 7 | EE | Xiehua Li,
ShuTang Yang,
Jian-Hua Li,
HongWen Zhu:
Security Protocol Analysis with Improved Authentication Tests.
ISPEC 2006: 123-133 |
| 2005 |
| 6 | | Wu Yang,
Xiao-chun Yun,
Jian-Hua Li:
An Improved Network Intrusion Detection Method based on VQ-SVM.
IASTED PDCS 2005: 583-587 |
| 5 | EE | Rui Jiang,
Li Pan,
Jian-Hua Li:
An improvement on efficient anonymous auction protocols.
Computers & Security 24(2): 169-174 (2005) |
| 2004 |
| 4 | EE | Hong Hui,
Jian-Hua Li:
Compensatory Algorithm for Fingerprint Recognition.
ICBA 2004: 366-372 |
| 3 | EE | Rui Jiang,
Li Pan,
Jian-Hua Li:
Further analysis of password authentication schemes based on authentication tests.
Computers & Security 23(6): 469-477 (2004) |
| 2003 |
| 2 | EE | Bin Wang,
Jian-Hua Li,
Zhi-Peng Tong:
Cryptanalysis of an enhanced timestamp-based password authentication scheme.
Computers & Security 22(7): 643-645 (2003) |
| 2002 |
| 1 | | Lei Fan,
Jian-Hua Li,
HongWen Zhu:
An enhancement of timestamp-based password authentication scheme.
Computers & Security 21(7): 665-667 (2002) |