![]() | ![]() |
other persons with the same name:
2008 | ||
---|---|---|
83 | EE | Ning Zhang, Hong Bao: E-learning and Its Information Technology. CSSE (5) 2008: 396-399 |
82 | EE | Jihai Cao, Ning Zhang, Lin Song: A Fast Algorithm for the Chirp Rate Estimation. DELTA 2008: 45-48 |
81 | EE | Ning Zhang, Incheol Shin, Feng Zou, Weili Wu, My T. Thai: Trade-off scheme for fault tolerant connected dominating sets on size and diameter. FOWANC 2008: 1-8 |
80 | EE | Zhipeng Shen, Ning Zhang, Chen Guo: A General Fuzzified CMAC Controller with Eligibility. ISNN (2) 2008: 138-147 |
79 | EE | Ning Zhang: An Analysis Framework of Factors Influencing China Software and Information Service Offshore Outsourcing. ITNG 2008: 875-880 |
78 | EE | Ning Zhang: Characteristics of the Group Interest Network. NAA 2008: 620-627 |
77 | EE | Ning Zhang, Incheol Shin, Bo Li, Cem Boyaci, Ravi Tiwari, My T. Thai: New Approximation for Minimum-Weight Routing Backbone in Wireless Sensor Network. WASA 2008: 96-108 |
76 | EE | Daehee Hwang, Ning Zhang, Hookeun Lee, Eugene Yi, Hui Zhang, Inyoul Y. Lee, Leroy Hood, Ruedi Aebersold: MS-BID: a Java package for label-free LC-MS-based comparative proteomic analysis. Bioinformatics 24(22): 2641-2642 (2008) |
2007 | ||
75 | EE | Jay Chin, Ning Zhang, Aleksandra Nenadic, Li Yao, J. M. Brooke: Towards Context Constrained Authorisation for Pervasive Grid Computing. COMSWARE 2007 |
74 | EE | Yuansheng Huang, Ning Zhang, Lei Yu: CRM Method for Power Supply Enterprises Based on Analysis of Utility and Customers_ Credit and Multistage Fuzzy Evaluation. FSKD (3) 2007: 553-558 |
73 | EE | Ning Zhang, Hua Ye, Yutian Liu: Fuzzy Comprehensive Evaluation for Power Network Operating Schemes. FSKD (4) 2007: 593-597 |
72 | EE | Ning Zhang, Timothy Mount, Richard Boisvert: Generators Bidding Behavior in the NYISO Day-Ahead Wholesale Electricity Market. HICSS 2007: 123 |
71 | EE | Naikuo Yang, Howard Barringer, Ning Zhang: A Purpose-Based Access Control Model. IAS 2007: 143-148 |
70 | EE | Aleksandra Nenadic, Ning Zhang, Li Yao, Terry Morrow: Levels of Authentication Assurance: an Investigation. IAS 2007: 155-160 |
69 | EE | Li-Sha He, Ning Zhang, Li-Rong He, Ian Rogers: Secure M-commerce Transactions: A Third Party Based Signature Protocol. IAS 2007: 3-8 |
68 | EE | Li Zhang, Xiaolin Wu, Ning Zhang, Wen Gao, Qiang Wang, Debin Zhao: Context-based Arithmetic Coding Reexamined for DCT Video Compression. ISCAS 2007: 3147-3150 |
67 | EE | Zhuo Song, Ning Zhang, Zhuo Yang, Tao Zhang: Prediction of Helix, Strand Segments from Primary Protein Sequences by a Set of Neural Networks. ISNN (2) 2007: 1248-1253 |
66 | EE | Zhixiong Chen, Ning Zhang, Guozhen Xiao: Pseudo-Randomness of Discrete-Log Sequences from Elliptic Curves. Inscrypt 2007: 231-245 |
65 | EE | Ning Zhang, Ling Guan: Graph Cuts in Content-Based Image Classification and Retrieval with Relevance Feedback. PCM 2007: 30-39 |
64 | EE | Jianli Duan, Ning Zhang: Research on Visualization Techniques for Web Usability Analysis. SNPD (2) 2007: 788-791 |
63 | EE | Debin Pang, Ning Zhang: Analysis of Sidelobe Elevation for Polyphase Complementary Codes through the Non-ideal System. SNPD (3) 2007: 717-721 |
62 | EE | Ning Zhang, Li Yao, Aleksandra Nenadic, Jay Chin, Carole A. Goble, Alan L. Rector, David W. Chadwick, Sassa Otenko, Qi Shi: Achieving fine-grained access control in virtual organizations. Concurrency and Computation: Practice and Experience 19(9): 1333-1352 (2007) |
61 | EE | Ning Zhang, Jishou Ruan, Jie Wu, Tao Zhang: SHEETSPAIR: A Database of Amino Acid Pairs in Protein Sheet Structures. Data Science Journal 6: 589-595 (2007) |
60 | EE | QingHong Yan, Ning Zhang, Jie Wu, Tao Zhang: ERPDB: An Integrated Database of ERP Data for Neuroinformatics Research. Data Science Journal 6: 743-748 (2007) |
59 | EE | Ning Zhang, Zhixiong Chen, Guozhen Xiao: Efficient elliptic curve scalar multiplication algorithms resistant to power analysis. Inf. Sci. 177(10): 2119-2129 (2007) |
58 | EE | My T. Thai, Ning Zhang, Ravi Tiwari, Xiaochun Xu: On approximation algorithms of k-connected m-dominating sets in disk graphs. Theor. Comput. Sci. 385(1-3): 49-59 (2007) |
2006 | ||
57 | EE | Ian Featherstone, Ning Zhang: A mobility monitoring based advance reservation protocol. Q2SWinet 2006: 111-118 |
56 | EE | Junzhong Ji, Ning Zhang, Chunnian Liu, Ning Zhong: An Ant Colony Optimization Algorithm for Learning Classification Rules. Web Intelligence 2006: 1034-1037 |
55 | EE | Aleksandra Nenadic, Ning Zhang, Jay Chin, Carole A. Goble: FAME: Adding Multi-Level Authentication to Shibboleth. e-Science 2006: 157 |
54 | EE | Omaima Bamasak, Ning Zhang: Reputation management and signature delegation: A distributed approach. Electronic Commerce Research 6(3-4): 227-263 (2006) |
53 | EE | Ning Zhang, Xiaolin Wu: Lossless compression of color mosaic images. IEEE Transactions on Image Processing 15(6): 1379-1388 (2006) |
52 | EE | Jia Zhang, Ning Zhang, Liang-Jie Zhang: Auction-Based Pricing Model for Web Service Providers. Int. J. Web Service Res. 3(3): 82-107 (2006) |
51 | EE | Ning Zhang, Qi Shi, Madjid Merabti, Robert Askwith: Practical and efficient fair document exchange over networks. J. Network and Computer Applications 29(1): 46-61 (2006) |
2005 | ||
50 | EE | Omaima Bamasak, Ning Zhang: A Distributed Reputation Management Scheme for Mobile Agent-Based E-Commerce Applications . EEE 2005: 270-275 |
49 | EE | Aleksandra Nenadic, Ning Zhang, Qi Shi, Carole A. Goble: DSA-Based Verifiable and Recoverable Encryption of Signatures and Its Application in Certified E-Goods Delivery. EEE 2005: 94-99 |
48 | EE | Aleksandra Nenadic, Ning Zhang, Qi Shi, Carole A. Goble: Certified E-Mail Delivery with DSA Receipts. IPDPS 2005 |
47 | EE | Omaima Bamasak, Ning Zhang, Doug Edwards: DiSigncryption: An Integration of Agent-Based Signature Delegation with Distributed Reputation Management Schem. IPDPS 2005 |
46 | EE | Ning Zhang, Li Yao, Jay Chin, Aleksandra Nenadic, A. McNab, Alan L. Rector, Carole A. Goble, Qi Shi: Plugging a Scalable Authentication Framework into Shibboleth. WETICE 2005: 271-276 |
45 | EE | Xiaolin Wu, Sorina Dumitrescu, Ning Zhang: On multirate optimality of JPEG2000 code stream. IEEE Transactions on Image Processing 14(12): 2012-2023 (2005) |
44 | EE | Aleksandra Nenadic, Ning Zhang, Barry M. G. Cheetham, Carole A. Goble: RSA-based Certified Delivery of E-Goods Using Verifiable and Recoverable Signature Encryption. J. UCS 11(1): 175-192 (2005) |
43 | EE | Aleksandra Nenadic, Ning Zhang, Qi Shi: RSA-based Verifiable and Recoverable Encryption of Signatures and its application in certified e-mail delivery. Journal of Computer Security 13(5): 757-777 (2005) |
42 | EE | Ning Zhang, Qi Shi, Madjid Merabti: Revocation of privacy-enhanced public-key certificates. Journal of Systems and Software 75(1-2): 205-214 (2005) |
2004 | ||
41 | EE | Jia Zhang, Ning Zhang, Jen-Yao Chung: Assisting Seller Pricing Strategy Selection for Electronic Auctions. CEC 2004: 27-33 |
40 | EE | Ning Zhang, Jay Chin, Alan L. Rector, Carole A. Goble, Y. Li: Towards an Authentication Middleware to Support Ubiquitous Web Access. COMPSAC Workshops 2004: 36-38 |
39 | EE | Ning Zhang, Xiaolin Wu: Lossless compression of color mosaic images. ICIP 2004: 517-520 |
38 | EE | D. Critchlow, Ning Zhang: Revocation invocation for accountable anonymous PKI certificate trees. ISCC 2004: 386-392 |
37 | EE | Omaima Bamasak, Ning Zhang: A secure proxy signature protocol for agent-based M-commerce applications. ISCC 2004: 399-406 |
36 | EE | Aleksandra Nenadic, Ning Zhang, Stephen Barton: A secure and fair DSA-based signature exchange protocol. ISCC 2004: 412-417 |
35 | EE | Aleksandra Nenadic, Ning Zhang, Stephen Barton: A Security Protocol for Certified E-Goods Delivery. ITCC (1) 2004: 22- |
34 | EE | Omaima Bamasak, Ning Zhang: Achieving Distributed Trusted Services. ITCC (1) 2004: 56-61 |
33 | EE | Hongbo Li, Ronghua Xu, Ning Zhang: On Miquel's Five-Circle Theorem. IWMM/GIAE 2004: 217-228 |
32 | EE | Aleksandra Nenadic, Ning Zhang, Stephen Barton: Fair certified e-mail delivery. SAC 2004: 391-396 |
31 | EE | Li-Sha He, Ning Zhang: A new signature scheme: joint-signature. SAC 2004: 807-812 |
30 | EE | Omaima Bamasak, Ning Zhang: A secure method for signature delegation to mobile agents. SAC 2004: 813-818 |
29 | EE | D. Critchlow, Ning Zhang: Security enhanced accountable anonymous PKI certificates for mobile e-commerce. Computer Networks 45(4): 483-503 (2004) |
28 | EE | Ning Zhang, Qi Shi, Madjid Merabti, Robert Askwith: Autonomous mobile agent based fair exchange. Computer Networks 46(6): 751-770 (2004) |
27 | EE | Xiaolin Wu, Ning Zhang: Primary-consistent soft-decision color demosaicking for digital cameras (patent pending). IEEE Transactions on Image Processing 13(9): 1263-1274 (2004) |
26 | EE | Ning Zhang, Qi Shi, Madjid Merabti: A unified approach to a fair document exchange system. Journal of Systems and Software 72(1): 83-96 (2004) |
2003 | ||
25 | Omaima Bamasak, Ning Zhang: Towards a Secure Mobile Agent Based M-Commerce System. ICEIS (4) 2003: 408-412 | |
24 | Aleksandra Nenadic, Ning Zhang: Non-Repudiation and Fairness in Electronic Data Exchange. ICEIS (4) 2003: 55-62 | |
23 | Xiaolin Wu, Ning Zhang: Primary-consistent soft-decision color demosaic for digital cameras. ICIP (1) 2003: 477-480 | |
22 | EE | Li-Sha He, Ning Zhang: An Asymmetric Authentication Protocol for M-Commerce Applications. ISCC 2003: 244- |
21 | EE | Ning Zhang, Qi Shi, Madjid Merabti: An efficient protocol for anonymous and fair document exchange. Computer Networks 41(1): 19-28 (2003) |
2002 | ||
20 | Li-Sha He, Ning Zhang, Li-Rong He: A New End-to-End Authentication Protocol for Mobile Users to Access Internet Services. SEC 2002: 239-250 | |
19 | D. Critchlow, Ning Zhang: An Insight Into User Privacy and Accountable Anonymity for Mobile E-Commerce Transactions. SEC 2002: 411-422 | |
2001 | ||
18 | EE | Ning Zhang, Manhee Jo, Shigetomo Kimura, Yoshihiko Ebihara: A Study of Fairness for ATM ABR Service Based on Cell Delay. ICOIN 2001: 219- |
2000 | ||
17 | Ning Zhang, Xinggang Lin, Yujin Zhang: L-8 constrained micronoise filtering for high-fidelity image compression. VCIP 2000: 576-585 | |
16 | EE | Ning Zhang, Gang Feng: H2 Control design for fuzzy dynamic systems via LMI. Journal of Intelligent and Fuzzy Systems 8(4): 275-287 (2000) |
1999 | ||
15 | Ning Zhang, Qi Shi, Madjid Merabti: A Flexible Approach to Secure and Fair Document Exchange. Comput. J. 42(7): 569-581 (1999) | |
14 | EE | Anneliese von Mayrhauser, Ning Zhang: Automated regression testing using DBT and Sleuth. Journal of Software Maintenance 11(2): 93-116 (1999) |
1998 | ||
13 | EE | Zhixiu Han, Gang Feng, Ning Zhang: Dynamic output feedback Hinfinity controller design of fuzzy dynamic systems using LMI techniques. KES (2) 1998: 343-352 |
12 | EE | Qi Shi, Ning Zhang: An effective model for composition of secure systems. Journal of Systems and Software 43(3): 233-244 (1998) |
1996 | ||
11 | EE | Ning Zhang, Qi Shi: Security Issues in an EDI Environment. ACSAC 1996: 129-137 |
10 | EE | Qi Shi, Ning Zhang: Applying Composable Security Properties to Assessment of Information Systems. COMPSAC 1996: 118-123 |
9 | EE | Qi Shi, Ning Zhang: A general approach to secure components composition. HASE 1996: 263-286 |
8 | Ning Zhang, Qi Shi: Achieving Non-Repudiation of Receipt. Comput. J. 39(10): 844-853 (1996) | |
1995 | ||
7 | EE | Qi Shi, Ning Zhang: A General Approach to Evaluation of Secure Systems. COMPSAC 1995: 396-401 |
1993 | ||
6 | Ning Zhang, Solomon W. Golomb: Polyphase sequence with low autocorrelations. IEEE Transactions on Information Theory 39(3): 1085- (1993) | |
1990 | ||
5 | Ning Zhang, Solomon W. Golomb: A limit theorem for n-phase Barker sequences (corresp.). IEEE Transactions on Information Theory 36(4): 863- (1990) | |
4 | Ning Zhang, Solomon W. Golomb: Uniqueness of the generalized Barker sequence of length 6. IEEE Transactions on Information Theory 36(5): 1167- (1990) | |
3 | Ning Zhang, Solomon W. Golomb: On the crosscorrelation of generalized Barker sequences. IEEE Transactions on Information Theory 36(6): 1478- (1990) | |
1989 | ||
2 | José L. Encarnação, Geory Köberle, Ning Zhang: Distributed Supercomputing for Graphics Applications: A Case Study on an Implementation of the Radiosity Approach. Supercomputer 1989: 11-24 | |
1 | Ning Zhang, Solomon W. Golomb: Sixty-phase generalized Barker sequences. IEEE Transactions on Information Theory 35(4): 911- (1989) |