2008 |
46 | EE | Ning Liu,
Jianhua Li,
Liming Hao,
Yue Wu,
Ping Yi:
Group-Based Trust Model in P2P System Based on Trusted Computing.
CSSE (3) 2008: 797-801 |
45 | EE | Xiang Li,
Jianhua Li:
A New Blind Steganalysis Method for JPEG Images.
CSSE (3) 2008: 939-942 |
44 | EE | Tao Hu,
Jianhua Li,
Qingshan Wang:
Adaptive workflow based on SOA and its application in Tourism Information Change Management.
ICNSC 2008: 1185-1189 |
43 | EE | Jianhua Li,
Weibin Guo,
Hong Zheng:
An Undergraduate Parallel and Distributed Computing Course in Multi-Core Era.
ICYCS 2008: 2412-2416 |
42 | EE | Xinghao Jiang,
Tanfeng Sun,
Jianhua Li:
A Novel Original Streaming Video Wavelet Domain Watermarking Algorithm in Copyright Protection.
PCM 2008: 891-893 |
41 | EE | Linchun Li,
Jianhua Li,
Yue Wu,
Ping Yi:
A Group Key Management Scheme with Revocation and Loss-tolerance Capability for Wireless Sensor Networks.
PerCom 2008: 324-329 |
40 | EE | Shaojun Zhang,
Jianhua Li,
Xiuzhen Chen,
Lei Fan:
Building network attack graph for alert causal correlation.
Computers & Security 27(5-6): 188-196 (2008) |
2007 |
39 | EE | Yan Gao,
Shiwen Gu,
Jianhua Li,
Zhining Liao:
The Multi-view Information Bottleneck Clustering.
DASFAA 2007: 912-917 |
38 | EE | Dong Zheng,
Xiangxue Li,
Kefei Chen,
Jianhua Li:
Linkable Ring Signatures from Linear Feedback Shift Register.
EUC Workshops 2007: 716-727 |
37 | EE | Yan Gao,
Shiwen Gu,
Jianhua Li,
Zhining Liao:
A Weighted Consensus Function Based on Information-Theoretic Principles to Combine Soft Clusterings.
GrC 2007: 417-422 |
36 | EE | Chunbo Ma,
Jun Ao,
Jianhua Li:
Chameleon-Based Deniable Authenticated Key Agreement Protocol Secure Against Forgery.
HCI (15) 2007: 124-133 |
35 | EE | Chunbo Ma,
Jun Ao,
Jianhua Li:
A Novel Verifier-Based Authenticated Key Agreement Protocol.
ICIC (3) 2007: 1044-1050 |
34 | EE | Yi-qun Zhu,
Jianhua Li,
Quan-hai Zhang:
A General Attribute based RBAC Model for Web Service.
IEEE SCC 2007: 236-239 |
33 | EE | Laleh Behjat,
Jianhua Li,
L. Rakai,
Jie Huang:
Two Clustering Preprocessing Techniques for Large-Scale Circuits.
ISCAS 2007: 1057-1060 |
32 | EE | Jianhua Li,
Laleh Behjat,
Jie Huang:
An effective clustering algorithm for mixed-size placement.
ISPD 2007: 111-118 |
31 | EE | Yun Ye,
Xinghao Jiang,
Tanfeng Sun,
Jianhua Li:
An Efficient Video Watermarking Scheme with Luminance Differential DC Coefficient Modification.
PCM 2007: 437-440 |
30 | EE | Tao Hu,
Jianhua Li,
Qingshan Wang:
Information Grid Instant Service and its application in tourism.
SMC 2007: 598-602 |
29 | EE | Linchun Li,
Jianhua Li,
Ling Tie,
Jun Pan:
ACKDs: An Authenticated Combinatorial Key Distribution Scheme for Wireless Sensor Networks.
SNPD (2) 2007: 262-267 |
28 | EE | Jianhua Li,
Shuming Gao,
Yusheng Liu:
Solid-based CAPP for surface micromachined MEMS devices.
Computer-Aided Design 39(3): 190-201 (2007) |
27 | EE | Jianhua Li,
Laleh Behjat,
Andrew A. Kennings:
Net Cluster: A Net-Reduction-Based Clustering Preprocessing Algorithm for Partitioning and Placement.
IEEE Trans. on CAD of Integrated Circuits and Systems 26(4): 669-679 (2007) |
2006 |
26 | EE | Chunbo Ma,
Jianhua Li:
Adaptable Designated Group Signature.
ICIC (1) 2006: 1053-1061 |
25 | EE | Miaomiao Zhang,
Gongliang Chen,
Jianhua Li:
Efficient ID-based Proxy Chameleon Signature from Bilinear Pairings.
IMSCCS (2) 2006: 135-141 |
24 | EE | Jianhua Li,
Laleh Behjat:
Net cluster: a net-reduction based clustering preprocessing algorithm.
ISPD 2006: 200-205 |
23 | EE | Jie Liu,
Lei Fan,
Jianhua Li:
Cryptanalysis and improvement on Yang-Shieh authentication schemes.
PST 2006: 64 |
22 | | Yi-qun Zhu,
Jianhua Li,
Quan-hai Zhang:
An Extended Role-Based Access Control for Web Services.
SECRYPT 2006: 471-474 |
21 | EE | Hao Chen,
Liang Ma,
Jianhua Li:
Vectorial Resilient $PC(l)$ of Order $k$ Boolean Functions from AG-Codes
CoRR abs/cs/0606011: (2006) |
20 | EE | Hao Chen,
Jianhua Li:
Lower Bounds on the Algebraic Immunity of Boolean Functions
CoRR abs/cs/0608080: (2006) |
2005 |
19 | EE | Qiang Li,
Jianhua Li:
Topic-Specific Text Filtering Based on Multiple Reducts.
AIS-ADM 2005: 175-183 |
18 | EE | Qiang Li,
Jianhua Li:
An Efficient Topic-Specific Web Text Filtering Framework.
APWeb 2005: 157-163 |
17 | EE | Jianhua Li,
Graeme Hirst:
Semantic knowledge in word completion.
ASSETS 2005: 121-128 |
16 | EE | Mengquan Lin,
Qiangmin Wang,
Jianhua Li:
Methodology of Quantitative Risk Assessment for Information System Security.
CIS (2) 2005: 526-531 |
15 | EE | Min Zuo,
Jianhua Li:
Constructing Fair-Exchange P2P File Market.
GCC 2005: 941-946 |
14 | EE | Lan Li,
Xinghao Jiang,
Jianhua Li:
Enforce Mandatory Access Control Policy on XML Documents.
ICICS 2005: 336-349 |
13 | EE | JianGuo Fu,
Yingcai Wang,
Jianhua Li,
Zhenyu Zheng,
Xingbo Yin:
Recurrent Networks for Integrated Navigation.
ISNN (3) 2005: 297-302 |
12 | EE | Qiang Sun,
Jianhua Li,
Xinran Liang,
Shenghong Li:
Using Double-Layer One-Class Classification for Anti-jamming Information Filtering.
ISNN (3) 2005: 361-366 |
11 | EE | Min Zuo,
Kai Wang,
Jianhua Li:
The Application of Collaborative Filtering for Trust Management in P2P Communities.
ISPA 2005: 383-394 |
10 | EE | Yijuan Shi,
Gongliang Chen,
Jianhua Li:
ID-Based One Round Authenticated Group Key Agreement Protocol with Bilinear Pairings.
ITCC (1) 2005: 757-761 |
9 | EE | Jianhua Li,
Laleh Behjat,
Blair Schiffner:
A Structure Based Clustering Algorithm with Applications to VLSI Physical Design.
IWSOC 2005: 270-274 |
8 | EE | Blair Schiffner,
Jianhua Li,
Laleh Behjat:
A Multivalue Eigenvalue Based Circuit Partitioning Technique.
IWSOC 2005: 312-316 |
7 | EE | Yingjie Wang,
Jianhua Li,
Ling Tie:
A simple protocol for deniable authentication based on ElGamal cryptography.
Networks 45(4): 193-194 (2005) |
2004 |
6 | EE | Qiang Li,
Jianhua Li,
Xiang Li,
Shenghong Li:
Evaluation Incompleteness of Knowledge in Data Mining.
AWCC 2004: 278-284 |
5 | EE | Yingjie Wang,
Jianhua Li,
Ling Tie,
Qiang Li:
An Efficient Key Management for Large Dynamic Groups.
CNSR 2004: 131-136 |
4 | EE | Gongshen Liu,
Jianhua Li,
Xiang Li,
Qiang Li:
New Feature Selection and Weighting Methods Based on Category Information.
ICADL 2004: 330-338 |
3 | EE | Zhiyuan Hu,
Yaowei Liu,
Xiao Hu,
Jianhua Li:
Anonymous Micropayments Authentication(AMA) in Mobile Data Network.
INFOCOM 2004 |
2 | | Yingjie Wang,
Jianhua Li,
Lei Fan:
Cryptanalysis on a Blind Signature Scheme Based on ElGamal Signature.
SNPD 2004: 349-351 |
2002 |
1 | EE | Jianhua Li,
Xiaolong Wang:
Combining Trigram and Automatic Weight Distribution in Chinese Spelling Error Correction.
J. Comput. Sci. Technol. 17(6): 915-923 (2002) |