2008 | ||
---|---|---|
46 | EE | Ning Liu, Jianhua Li, Liming Hao, Yue Wu, Ping Yi: Group-Based Trust Model in P2P System Based on Trusted Computing. CSSE (3) 2008: 797-801 |
45 | EE | Xiang Li, Jianhua Li: A New Blind Steganalysis Method for JPEG Images. CSSE (3) 2008: 939-942 |
44 | EE | Tao Hu, Jianhua Li, Qingshan Wang: Adaptive workflow based on SOA and its application in Tourism Information Change Management. ICNSC 2008: 1185-1189 |
43 | EE | Jianhua Li, Weibin Guo, Hong Zheng: An Undergraduate Parallel and Distributed Computing Course in Multi-Core Era. ICYCS 2008: 2412-2416 |
42 | EE | Xinghao Jiang, Tanfeng Sun, Jianhua Li: A Novel Original Streaming Video Wavelet Domain Watermarking Algorithm in Copyright Protection. PCM 2008: 891-893 |
41 | EE | Linchun Li, Jianhua Li, Yue Wu, Ping Yi: A Group Key Management Scheme with Revocation and Loss-tolerance Capability for Wireless Sensor Networks. PerCom 2008: 324-329 |
40 | EE | Shaojun Zhang, Jianhua Li, Xiuzhen Chen, Lei Fan: Building network attack graph for alert causal correlation. Computers & Security 27(5-6): 188-196 (2008) |
2007 | ||
39 | EE | Yan Gao, Shiwen Gu, Jianhua Li, Zhining Liao: The Multi-view Information Bottleneck Clustering. DASFAA 2007: 912-917 |
38 | EE | Dong Zheng, Xiangxue Li, Kefei Chen, Jianhua Li: Linkable Ring Signatures from Linear Feedback Shift Register. EUC Workshops 2007: 716-727 |
37 | EE | Yan Gao, Shiwen Gu, Jianhua Li, Zhining Liao: A Weighted Consensus Function Based on Information-Theoretic Principles to Combine Soft Clusterings. GrC 2007: 417-422 |
36 | EE | Chunbo Ma, Jun Ao, Jianhua Li: Chameleon-Based Deniable Authenticated Key Agreement Protocol Secure Against Forgery. HCI (15) 2007: 124-133 |
35 | EE | Chunbo Ma, Jun Ao, Jianhua Li: A Novel Verifier-Based Authenticated Key Agreement Protocol. ICIC (3) 2007: 1044-1050 |
34 | EE | Yi-qun Zhu, Jianhua Li, Quan-hai Zhang: A General Attribute based RBAC Model for Web Service. IEEE SCC 2007: 236-239 |
33 | EE | Laleh Behjat, Jianhua Li, L. Rakai, Jie Huang: Two Clustering Preprocessing Techniques for Large-Scale Circuits. ISCAS 2007: 1057-1060 |
32 | EE | Jianhua Li, Laleh Behjat, Jie Huang: An effective clustering algorithm for mixed-size placement. ISPD 2007: 111-118 |
31 | EE | Yun Ye, Xinghao Jiang, Tanfeng Sun, Jianhua Li: An Efficient Video Watermarking Scheme with Luminance Differential DC Coefficient Modification. PCM 2007: 437-440 |
30 | EE | Tao Hu, Jianhua Li, Qingshan Wang: Information Grid Instant Service and its application in tourism. SMC 2007: 598-602 |
29 | EE | Linchun Li, Jianhua Li, Ling Tie, Jun Pan: ACKDs: An Authenticated Combinatorial Key Distribution Scheme for Wireless Sensor Networks. SNPD (2) 2007: 262-267 |
28 | EE | Jianhua Li, Shuming Gao, Yusheng Liu: Solid-based CAPP for surface micromachined MEMS devices. Computer-Aided Design 39(3): 190-201 (2007) |
27 | EE | Jianhua Li, Laleh Behjat, Andrew A. Kennings: Net Cluster: A Net-Reduction-Based Clustering Preprocessing Algorithm for Partitioning and Placement. IEEE Trans. on CAD of Integrated Circuits and Systems 26(4): 669-679 (2007) |
2006 | ||
26 | EE | Chunbo Ma, Jianhua Li: Adaptable Designated Group Signature. ICIC (1) 2006: 1053-1061 |
25 | EE | Miaomiao Zhang, Gongliang Chen, Jianhua Li: Efficient ID-based Proxy Chameleon Signature from Bilinear Pairings. IMSCCS (2) 2006: 135-141 |
24 | EE | Jianhua Li, Laleh Behjat: Net cluster: a net-reduction based clustering preprocessing algorithm. ISPD 2006: 200-205 |
23 | EE | Jie Liu, Lei Fan, Jianhua Li: Cryptanalysis and improvement on Yang-Shieh authentication schemes. PST 2006: 64 |
22 | Yi-qun Zhu, Jianhua Li, Quan-hai Zhang: An Extended Role-Based Access Control for Web Services. SECRYPT 2006: 471-474 | |
21 | EE | Hao Chen, Liang Ma, Jianhua Li: Vectorial Resilient $PC(l)$ of Order $k$ Boolean Functions from AG-Codes CoRR abs/cs/0606011: (2006) |
20 | EE | Hao Chen, Jianhua Li: Lower Bounds on the Algebraic Immunity of Boolean Functions CoRR abs/cs/0608080: (2006) |
2005 | ||
19 | EE | Qiang Li, Jianhua Li: Topic-Specific Text Filtering Based on Multiple Reducts. AIS-ADM 2005: 175-183 |
18 | EE | Qiang Li, Jianhua Li: An Efficient Topic-Specific Web Text Filtering Framework. APWeb 2005: 157-163 |
17 | EE | Jianhua Li, Graeme Hirst: Semantic knowledge in word completion. ASSETS 2005: 121-128 |
16 | EE | Mengquan Lin, Qiangmin Wang, Jianhua Li: Methodology of Quantitative Risk Assessment for Information System Security. CIS (2) 2005: 526-531 |
15 | EE | Min Zuo, Jianhua Li: Constructing Fair-Exchange P2P File Market. GCC 2005: 941-946 |
14 | EE | Lan Li, Xinghao Jiang, Jianhua Li: Enforce Mandatory Access Control Policy on XML Documents. ICICS 2005: 336-349 |
13 | EE | JianGuo Fu, Yingcai Wang, Jianhua Li, Zhenyu Zheng, Xingbo Yin: Recurrent Networks for Integrated Navigation. ISNN (3) 2005: 297-302 |
12 | EE | Qiang Sun, Jianhua Li, Xinran Liang, Shenghong Li: Using Double-Layer One-Class Classification for Anti-jamming Information Filtering. ISNN (3) 2005: 361-366 |
11 | EE | Min Zuo, Kai Wang, Jianhua Li: The Application of Collaborative Filtering for Trust Management in P2P Communities. ISPA 2005: 383-394 |
10 | EE | Yijuan Shi, Gongliang Chen, Jianhua Li: ID-Based One Round Authenticated Group Key Agreement Protocol with Bilinear Pairings. ITCC (1) 2005: 757-761 |
9 | EE | Jianhua Li, Laleh Behjat, Blair Schiffner: A Structure Based Clustering Algorithm with Applications to VLSI Physical Design. IWSOC 2005: 270-274 |
8 | EE | Blair Schiffner, Jianhua Li, Laleh Behjat: A Multivalue Eigenvalue Based Circuit Partitioning Technique. IWSOC 2005: 312-316 |
7 | EE | Yingjie Wang, Jianhua Li, Ling Tie: A simple protocol for deniable authentication based on ElGamal cryptography. Networks 45(4): 193-194 (2005) |
2004 | ||
6 | EE | Qiang Li, Jianhua Li, Xiang Li, Shenghong Li: Evaluation Incompleteness of Knowledge in Data Mining. AWCC 2004: 278-284 |
5 | EE | Yingjie Wang, Jianhua Li, Ling Tie, Qiang Li: An Efficient Key Management for Large Dynamic Groups. CNSR 2004: 131-136 |
4 | EE | Gongshen Liu, Jianhua Li, Xiang Li, Qiang Li: New Feature Selection and Weighting Methods Based on Category Information. ICADL 2004: 330-338 |
3 | EE | Zhiyuan Hu, Yaowei Liu, Xiao Hu, Jianhua Li: Anonymous Micropayments Authentication(AMA) in Mobile Data Network. INFOCOM 2004 |
2 | Yingjie Wang, Jianhua Li, Lei Fan: Cryptanalysis on a Blind Signature Scheme Based on ElGamal Signature. SNPD 2004: 349-351 | |
2002 | ||
1 | EE | Jianhua Li, Xiaolong Wang: Combining Trigram and Automatic Weight Distribution in Chinese Spelling Error Correction. J. Comput. Sci. Technol. 17(6): 915-923 (2002) |