2006 |
9 | EE | Jing Zhu,
Jian-Hua Li:
An HMM-Based Approach to Automatic Phrasing for Mandarin Text-to-Speech Synthesis.
ACL 2006 |
8 | EE | Wu Yang,
Xiao-chun Yun,
Jian-Hua Li:
An Efficient SVM-Based Method to Detect Malicious Attacks for Web Servers.
APWeb Workshops 2006: 835-841 |
7 | EE | Xiehua Li,
ShuTang Yang,
Jian-Hua Li,
HongWen Zhu:
Security Protocol Analysis with Improved Authentication Tests.
ISPEC 2006: 123-133 |
2005 |
6 | | Wu Yang,
Xiao-chun Yun,
Jian-Hua Li:
An Improved Network Intrusion Detection Method based on VQ-SVM.
IASTED PDCS 2005: 583-587 |
5 | EE | Rui Jiang,
Li Pan,
Jian-Hua Li:
An improvement on efficient anonymous auction protocols.
Computers & Security 24(2): 169-174 (2005) |
2004 |
4 | EE | Hong Hui,
Jian-Hua Li:
Compensatory Algorithm for Fingerprint Recognition.
ICBA 2004: 366-372 |
3 | EE | Rui Jiang,
Li Pan,
Jian-Hua Li:
Further analysis of password authentication schemes based on authentication tests.
Computers & Security 23(6): 469-477 (2004) |
2003 |
2 | EE | Bin Wang,
Jian-Hua Li,
Zhi-Peng Tong:
Cryptanalysis of an enhanced timestamp-based password authentication scheme.
Computers & Security 22(7): 643-645 (2003) |
2002 |
1 | | Lei Fan,
Jian-Hua Li,
HongWen Zhu:
An enhancement of timestamp-based password authentication scheme.
Computers & Security 21(7): 665-667 (2002) |