dblp.uni-trier.dewww.uni-trier.de

Jianhua Li

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
46EENing Liu, Jianhua Li, Liming Hao, Yue Wu, Ping Yi: Group-Based Trust Model in P2P System Based on Trusted Computing. CSSE (3) 2008: 797-801
45EEXiang Li, Jianhua Li: A New Blind Steganalysis Method for JPEG Images. CSSE (3) 2008: 939-942
44EETao Hu, Jianhua Li, Qingshan Wang: Adaptive workflow based on SOA and its application in Tourism Information Change Management. ICNSC 2008: 1185-1189
43EEJianhua Li, Weibin Guo, Hong Zheng: An Undergraduate Parallel and Distributed Computing Course in Multi-Core Era. ICYCS 2008: 2412-2416
42EEXinghao Jiang, Tanfeng Sun, Jianhua Li: A Novel Original Streaming Video Wavelet Domain Watermarking Algorithm in Copyright Protection. PCM 2008: 891-893
41EELinchun Li, Jianhua Li, Yue Wu, Ping Yi: A Group Key Management Scheme with Revocation and Loss-tolerance Capability for Wireless Sensor Networks. PerCom 2008: 324-329
40EEShaojun Zhang, Jianhua Li, Xiuzhen Chen, Lei Fan: Building network attack graph for alert causal correlation. Computers & Security 27(5-6): 188-196 (2008)
2007
39EEYan Gao, Shiwen Gu, Jianhua Li, Zhining Liao: The Multi-view Information Bottleneck Clustering. DASFAA 2007: 912-917
38EEDong Zheng, Xiangxue Li, Kefei Chen, Jianhua Li: Linkable Ring Signatures from Linear Feedback Shift Register. EUC Workshops 2007: 716-727
37EEYan Gao, Shiwen Gu, Jianhua Li, Zhining Liao: A Weighted Consensus Function Based on Information-Theoretic Principles to Combine Soft Clusterings. GrC 2007: 417-422
36EEChunbo Ma, Jun Ao, Jianhua Li: Chameleon-Based Deniable Authenticated Key Agreement Protocol Secure Against Forgery. HCI (15) 2007: 124-133
35EEChunbo Ma, Jun Ao, Jianhua Li: A Novel Verifier-Based Authenticated Key Agreement Protocol. ICIC (3) 2007: 1044-1050
34EEYi-qun Zhu, Jianhua Li, Quan-hai Zhang: A General Attribute based RBAC Model for Web Service. IEEE SCC 2007: 236-239
33EELaleh Behjat, Jianhua Li, L. Rakai, Jie Huang: Two Clustering Preprocessing Techniques for Large-Scale Circuits. ISCAS 2007: 1057-1060
32EEJianhua Li, Laleh Behjat, Jie Huang: An effective clustering algorithm for mixed-size placement. ISPD 2007: 111-118
31EEYun Ye, Xinghao Jiang, Tanfeng Sun, Jianhua Li: An Efficient Video Watermarking Scheme with Luminance Differential DC Coefficient Modification. PCM 2007: 437-440
30EETao Hu, Jianhua Li, Qingshan Wang: Information Grid Instant Service and its application in tourism. SMC 2007: 598-602
29EELinchun Li, Jianhua Li, Ling Tie, Jun Pan: ACKDs: An Authenticated Combinatorial Key Distribution Scheme for Wireless Sensor Networks. SNPD (2) 2007: 262-267
28EEJianhua Li, Shuming Gao, Yusheng Liu: Solid-based CAPP for surface micromachined MEMS devices. Computer-Aided Design 39(3): 190-201 (2007)
27EEJianhua Li, Laleh Behjat, Andrew A. Kennings: Net Cluster: A Net-Reduction-Based Clustering Preprocessing Algorithm for Partitioning and Placement. IEEE Trans. on CAD of Integrated Circuits and Systems 26(4): 669-679 (2007)
2006
26EEChunbo Ma, Jianhua Li: Adaptable Designated Group Signature. ICIC (1) 2006: 1053-1061
25EEMiaomiao Zhang, Gongliang Chen, Jianhua Li: Efficient ID-based Proxy Chameleon Signature from Bilinear Pairings. IMSCCS (2) 2006: 135-141
24EEJianhua Li, Laleh Behjat: Net cluster: a net-reduction based clustering preprocessing algorithm. ISPD 2006: 200-205
23EEJie Liu, Lei Fan, Jianhua Li: Cryptanalysis and improvement on Yang-Shieh authentication schemes. PST 2006: 64
22 Yi-qun Zhu, Jianhua Li, Quan-hai Zhang: An Extended Role-Based Access Control for Web Services. SECRYPT 2006: 471-474
21EEHao Chen, Liang Ma, Jianhua Li: Vectorial Resilient $PC(l)$ of Order $k$ Boolean Functions from AG-Codes CoRR abs/cs/0606011: (2006)
20EEHao Chen, Jianhua Li: Lower Bounds on the Algebraic Immunity of Boolean Functions CoRR abs/cs/0608080: (2006)
2005
19EEQiang Li, Jianhua Li: Topic-Specific Text Filtering Based on Multiple Reducts. AIS-ADM 2005: 175-183
18EEQiang Li, Jianhua Li: An Efficient Topic-Specific Web Text Filtering Framework. APWeb 2005: 157-163
17EEJianhua Li, Graeme Hirst: Semantic knowledge in word completion. ASSETS 2005: 121-128
16EEMengquan Lin, Qiangmin Wang, Jianhua Li: Methodology of Quantitative Risk Assessment for Information System Security. CIS (2) 2005: 526-531
15EEMin Zuo, Jianhua Li: Constructing Fair-Exchange P2P File Market. GCC 2005: 941-946
14EELan Li, Xinghao Jiang, Jianhua Li: Enforce Mandatory Access Control Policy on XML Documents. ICICS 2005: 336-349
13EEJianGuo Fu, Yingcai Wang, Jianhua Li, Zhenyu Zheng, Xingbo Yin: Recurrent Networks for Integrated Navigation. ISNN (3) 2005: 297-302
12EEQiang Sun, Jianhua Li, Xinran Liang, Shenghong Li: Using Double-Layer One-Class Classification for Anti-jamming Information Filtering. ISNN (3) 2005: 361-366
11EEMin Zuo, Kai Wang, Jianhua Li: The Application of Collaborative Filtering for Trust Management in P2P Communities. ISPA 2005: 383-394
10EEYijuan Shi, Gongliang Chen, Jianhua Li: ID-Based One Round Authenticated Group Key Agreement Protocol with Bilinear Pairings. ITCC (1) 2005: 757-761
9EEJianhua Li, Laleh Behjat, Blair Schiffner: A Structure Based Clustering Algorithm with Applications to VLSI Physical Design. IWSOC 2005: 270-274
8EEBlair Schiffner, Jianhua Li, Laleh Behjat: A Multivalue Eigenvalue Based Circuit Partitioning Technique. IWSOC 2005: 312-316
7EEYingjie Wang, Jianhua Li, Ling Tie: A simple protocol for deniable authentication based on ElGamal cryptography. Networks 45(4): 193-194 (2005)
2004
6EEQiang Li, Jianhua Li, Xiang Li, Shenghong Li: Evaluation Incompleteness of Knowledge in Data Mining. AWCC 2004: 278-284
5EEYingjie Wang, Jianhua Li, Ling Tie, Qiang Li: An Efficient Key Management for Large Dynamic Groups. CNSR 2004: 131-136
4EEGongshen Liu, Jianhua Li, Xiang Li, Qiang Li: New Feature Selection and Weighting Methods Based on Category Information. ICADL 2004: 330-338
3EEZhiyuan Hu, Yaowei Liu, Xiao Hu, Jianhua Li: Anonymous Micropayments Authentication(AMA) in Mobile Data Network. INFOCOM 2004
2 Yingjie Wang, Jianhua Li, Lei Fan: Cryptanalysis on a Blind Signature Scheme Based on ElGamal Signature. SNPD 2004: 349-351
2002
1EEJianhua Li, Xiaolong Wang: Combining Trigram and Automatic Weight Distribution in Chinese Spelling Error Correction. J. Comput. Sci. Technol. 17(6): 915-923 (2002)

Coauthor Index

1Jun Ao [35] [36]
2Laleh Behjat [8] [9] [24] [27] [32] [33]
3Gongliang Chen [10] [25]
4Hao Chen [20] [21]
5Kefei Chen [38]
6Xiuzhen Chen [40]
7Lei Fan [2] [23] [40]
8JianGuo Fu [13]
9Shuming Gao [28]
10Yan Gao [37] [39]
11Shiwen Gu [37] [39]
12Weibin Guo [43]
13Liming Hao [46]
14Graeme Hirst [17]
15Tao Hu [30] [44]
16Xiao Hu [3]
17Zhiyuan Hu [3]
18Jie Huang [32] [33]
19Xinghao Jiang [14] [31] [42]
20Andrew A. Kennings [27]
21Lan Li [14]
22Linchun Li [29] [41]
23Qiang Li [4] [5] [6] [18] [19]
24Shenghong Li [6] [12]
25Xiang Li [4] [6] [45]
26Xiangxue Li [38]
27Xinran Liang [12]
28Zhining Liao [37] [39]
29Mengquan Lin [16]
30Gongshen Liu [4]
31Jie Liu [23]
32Ning Liu [46]
33Yaowei Liu [3]
34Yusheng Liu [28]
35Chunbo Ma [26] [35] [36]
36Liang Ma [21]
37Jun Pan [29]
38L. Rakai [33]
39Blair Schiffner [8] [9]
40Yijuan Shi [10]
41Qiang Sun [12]
42Tanfeng Sun [31] [42]
43Ling Tie [5] [7] [29]
44Kai Wang [11]
45Qiangmin Wang [16]
46Qingshan Wang [30] [44]
47Xiaolong Wang [1]
48Yingcai Wang [13]
49Yingjie Wang [2] [5] [7]
50Yue Wu [41] [46]
51Yun Ye [31]
52Ping Yi [41] [46]
53Xingbo Yin [13]
54Miaomiao Zhang [25]
55Quan-hai Zhang [22] [34]
56Shaojun Zhang [40]
57Dong Zheng [38]
58Hong Zheng [43]
59Zhenyu Zheng [13]
60Yi-qun Zhu [22] [34]
61Min Zuo [11] [15]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)