2008 |
19 | EE | Zhiwei Wang,
Xuyun Nie,
Shihui Zheng,
Yixian Yang,
Zhihui Zhang:
A New Construction of Multivariate Public Key Encryption Scheme through Internally Perturbed Plus.
ICCSA (2) 2008: 1-13 |
18 | EE | Wei Zhang,
Shize Guo,
Kangfeng Zheng,
Yixian Yang:
A Defending Mechanism against DDoS Based on Registration and Authentication.
ICYCS 2008: 2192-2197 |
17 | EE | Nan Jiang,
Zhaozhi Zhang,
Xiaomin Ma,
Jian Wang,
Yixian Yang:
Analysis of nonseparable property of multi-valued multi-threshold neuron.
IJCNN 2008: 413-419 |
16 | EE | Jiao Wang,
Yajian Zhou,
Yixian Yang,
Xinxin Niu:
Classify the Majority of the Total Bytes on the Internet.
ISIP 2008: 68-72 |
2007 |
15 | EE | Lanlan Hu,
Yixian Yang,
Xinxin Niu:
Improved Remote User Authentication Scheme Preserving User Anonymity.
CNSR 2007: 323-328 |
14 | EE | Licheng Wang,
Zhenfu Cao,
Shihui Zheng,
Xiaofang Huang,
Yixian Yang:
Transitive Signatures from Braid Groups.
INDOCRYPT 2007: 183-196 |
13 | EE | Nan Jiang,
Yixian Yang,
Xiaomin Ma,
Zhaozhi Zhang:
Using Three Layer Neural Network to Compute Multi-valued Functions.
ISNN (3) 2007: 1-8 |
12 | EE | Lanlan Hu,
Xinxin Niu,
Yixian Yang:
An Efficient Multi-server Password Authenticated Key Agreement Scheme Using Smart Cards.
MUE 2007: 903-907 |
11 | EE | Guo-Sheng Xu,
Yixian Yang,
Li-ze Gu,
Xinxin Niu:
ID-Based Multi-proxy Sequential Signature System from Bilinear Pairing.
Web Intelligence/IAT Workshops 2007: 315-318 |
2006 |
10 | EE | Nan Jiang,
Jian Wang,
Xinxin Niu,
Yixian Yang:
Symmetric Steganography Secure Against Chosen Message and Original Cover Attacks.
ICICIC (3) 2006: 661-664 |
9 | EE | Ming Chen,
Ru Zhang,
Xinxin Niu,
Yixian Yang:
Analysis of Current Steganography Tools: Classifications & Features.
IIH-MSP 2006: 384-387 |
8 | EE | Lixiang Li,
Yixian Yang,
Haipeng Peng,
Xiangdong Wang:
An Optimization Method Inspired by "chaotic" Ant Behavior.
I. J. Bifurcation and Chaos 16(8): 2351-2364 (2006) |
2005 |
7 | EE | Fenghua Lang,
Jian Li,
Yixian Yang:
A Novel Fuzzy Anomaly Detection Method Based on Clonal Selection Clustering Algorithm.
ICMLC 2005: 642-651 |
6 | EE | Yonggang Chu,
Jun Li,
Yixian Yang:
The Architecture of the Large-scale Distributed Intrusion Detection System.
PDCAT 2005: 130-133 |
2004 |
5 | EE | Zhaozhi Zhang,
Xiaomin Ma,
Yixian Yang:
Erratum to: Bounds on the number of hidden neurons in three-layer binary neural networks [Neural Networks 16 (7) 995-1002].
Neural Networks 17(3): 465 (2004) |
2003 |
4 | EE | Wang Tao,
Yixian Yang,
Xinxin Niu:
New Efficient Timed Commitment Schemes.
International Journal of Information Technology and Decision Making 2(2): 287-297 (2003) |
3 | EE | Zhaozhi Zhang,
Xiaomin Ma,
Yixian Yang:
Bounds on the number of hidden neurons in three-layer binary neural networks.
Neural Networks 16(7): 995-1002 (2003) |
2001 |
2 | EE | Zhaozhi Zhang,
Xiaomin Ma,
Yixian Yang:
A unified method to construct neural network decoders for arbitrary codes and decoding rules.
Discrete Mathematics 238(1-3): 171-181 (2001) |
2000 |
1 | EE | Ming Zhong,
Yunbo Feng,
Yixian Yang:
Single-Term Divisible Electronic Cash Based on Bit Commitment.
ISCC 2000: 280-285 |