dblp.uni-trier.dewww.uni-trier.de

Yixian Yang

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
19EEZhiwei Wang, Xuyun Nie, Shihui Zheng, Yixian Yang, Zhihui Zhang: A New Construction of Multivariate Public Key Encryption Scheme through Internally Perturbed Plus. ICCSA (2) 2008: 1-13
18EEWei Zhang, Shize Guo, Kangfeng Zheng, Yixian Yang: A Defending Mechanism against DDoS Based on Registration and Authentication. ICYCS 2008: 2192-2197
17EENan Jiang, Zhaozhi Zhang, Xiaomin Ma, Jian Wang, Yixian Yang: Analysis of nonseparable property of multi-valued multi-threshold neuron. IJCNN 2008: 413-419
16EEJiao Wang, Yajian Zhou, Yixian Yang, Xinxin Niu: Classify the Majority of the Total Bytes on the Internet. ISIP 2008: 68-72
2007
15EELanlan Hu, Yixian Yang, Xinxin Niu: Improved Remote User Authentication Scheme Preserving User Anonymity. CNSR 2007: 323-328
14EELicheng Wang, Zhenfu Cao, Shihui Zheng, Xiaofang Huang, Yixian Yang: Transitive Signatures from Braid Groups. INDOCRYPT 2007: 183-196
13EENan Jiang, Yixian Yang, Xiaomin Ma, Zhaozhi Zhang: Using Three Layer Neural Network to Compute Multi-valued Functions. ISNN (3) 2007: 1-8
12EELanlan Hu, Xinxin Niu, Yixian Yang: An Efficient Multi-server Password Authenticated Key Agreement Scheme Using Smart Cards. MUE 2007: 903-907
11EEGuo-Sheng Xu, Yixian Yang, Li-ze Gu, Xinxin Niu: ID-Based Multi-proxy Sequential Signature System from Bilinear Pairing. Web Intelligence/IAT Workshops 2007: 315-318
2006
10EENan Jiang, Jian Wang, Xinxin Niu, Yixian Yang: Symmetric Steganography Secure Against Chosen Message and Original Cover Attacks. ICICIC (3) 2006: 661-664
9EEMing Chen, Ru Zhang, Xinxin Niu, Yixian Yang: Analysis of Current Steganography Tools: Classifications & Features. IIH-MSP 2006: 384-387
8EELixiang Li, Yixian Yang, Haipeng Peng, Xiangdong Wang: An Optimization Method Inspired by "chaotic" Ant Behavior. I. J. Bifurcation and Chaos 16(8): 2351-2364 (2006)
2005
7EEFenghua Lang, Jian Li, Yixian Yang: A Novel Fuzzy Anomaly Detection Method Based on Clonal Selection Clustering Algorithm. ICMLC 2005: 642-651
6EEYonggang Chu, Jun Li, Yixian Yang: The Architecture of the Large-scale Distributed Intrusion Detection System. PDCAT 2005: 130-133
2004
5EEZhaozhi Zhang, Xiaomin Ma, Yixian Yang: Erratum to: Bounds on the number of hidden neurons in three-layer binary neural networks [Neural Networks 16 (7) 995-1002]. Neural Networks 17(3): 465 (2004)
2003
4EEWang Tao, Yixian Yang, Xinxin Niu: New Efficient Timed Commitment Schemes. International Journal of Information Technology and Decision Making 2(2): 287-297 (2003)
3EEZhaozhi Zhang, Xiaomin Ma, Yixian Yang: Bounds on the number of hidden neurons in three-layer binary neural networks. Neural Networks 16(7): 995-1002 (2003)
2001
2EEZhaozhi Zhang, Xiaomin Ma, Yixian Yang: A unified method to construct neural network decoders for arbitrary codes and decoding rules. Discrete Mathematics 238(1-3): 171-181 (2001)
2000
1EEMing Zhong, Yunbo Feng, Yixian Yang: Single-Term Divisible Electronic Cash Based on Bit Commitment. ISCC 2000: 280-285

Coauthor Index

1Zhenfu Cao [14]
2Ming Chen [9]
3Yonggang Chu [6]
4Yunbo Feng [1]
5Li-ze Gu [11]
6Shize Guo [18]
7Lanlan Hu [12] [15]
8Xiaofang Huang [14]
9Nan Jiang [10] [13] [17]
10Fenghua Lang [7]
11Jian Li [7]
12Jun Li [6]
13Lixiang Li [8]
14Xiaomin Ma [2] [3] [5] [13] [17]
15Xuyun Nie [19]
16Xinxin Niu [4] [9] [10] [11] [12] [15] [16]
17Haipeng Peng [8]
18Wang Tao [4]
19Jian Wang [10] [17]
20Jiao Wang [16]
21Licheng Wang [14]
22Xiangdong Wang [8]
23Zhiwei Wang [19]
24Guo-Sheng Xu [11]
25Ru Zhang [9]
26Wei Zhang [18]
27Zhaozhi Zhang [2] [3] [5] [13] [17]
28Zhihui Zhang [19]
29Kangfeng Zheng [18]
30Shihui Zheng [14] [19]
31Ming Zhong [1]
32Yajian Zhou [16]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)