default search action
Lianhai Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j43]Shujiang Xu, Lulu Zhang, Lianhai Wang, Miodrag J. Mihaljevic, Shuhui Zhang, Wei Shao, Qizheng Wang:
Relay network-based cross-chain data interaction protocol with integrity audit. Comput. Electr. Eng. 117: 109262 (2024) - [j42]Shuhui Zhang, Hanwen Tian, Lianhai Wang, Shujiang Xu, Wei Shao:
A reputation-based dynamic reorganization scheme for blockchain network sharding. Connect. Sci. 36(1) (2024) - [j41]Xiaoyi Yang, Yanqi Zhao, Sufang Zhou, Lianhai Wang:
A lightweight delegated private set intersection cardinality protocol. Comput. Stand. Interfaces 87: 103760 (2024) - [j40]Qiming Yu, Shilei Liao, Lianhai Wang, Yong Yu, Lingyue Zhang, Yanqi Zhao:
A regulated anonymous cryptocurrency with batch linkability. Comput. Stand. Interfaces 87: 103770 (2024) - [j39]Lianhai Wang, Xiaoqian Liu, Wei Shao, Chenxi Guan, Qihao Huang, Shujiang Xu, Shuhui Zhang:
A Blockchain-Based Privacy-Preserving Healthcare Data Sharing Scheme for Incremental Updates. Symmetry 16(1): 89 (2024) - [j38]Haoyang An, Debiao He, Cong Peng, Min Luo, Lianhai Wang:
Efficient Certificateless Online/Offline Signcryption Scheme Without Bilinear Pairing for Smart Home Consumer Electronics. IEEE Trans. Consumer Electron. 70(1): 4005-4015 (2024) - [j37]Lianhai Wang, Huilin Li, Yannan Li, Yong Yu, Xiaojiang Du:
Self-Tallying Voting with Blockchain in Wireless Network Environment. IEEE Wirel. Commun. 31(5): 142-147 (2024) - 2023
- [j36]Shujiang Xu, Jinrong Zhong, Lianhai Wang, Debiao He, Shuhui Zhang, Wei Shao:
A privacy-preserving and efficient data sharing scheme with trust authentication based on blockchain for mHealth. Connect. Sci. 35(1) (2023) - [j35]Wei Shao, Jinpeng Wang, Lianhai Wang, Chunfu Jia, Shujiang Xu, Shuhui Zhang:
Auditable Blockchain Rewriting in Permissioned Setting With Mandatory Revocability for IoT. IEEE Internet Things J. 10(24): 21322-21336 (2023) - [j34]Qing Fan, Debiao He, Jianhua Chen, Cong Peng, Lianhai Wang:
Isoga: An Isogeny-Based Quantum-Resist Searchable Encryption Scheme Against Keyword Guessing Attacks. IEEE Syst. J. 17(2): 2101-2112 (2023) - [j33]Miodrag J. Mihaljevic, Milica Knezevic, Dragan Urosevic, Lianhai Wang, Shujiang Xu:
An Approach for Blockchain and Symmetric Keys Broadcast Encryption Based Access Control in IoT. Symmetry 15(2): 299 (2023) - [j32]Shuhui Zhang, Changdong Hu, Lianhai Wang, Miodrag J. Mihaljevic, Shujiang Xu, Tian Lan:
A Malware Detection Approach Based on Deep Learning and Memory Forensics. Symmetry 15(3): 758 (2023) - [c28]Shujiang Xu, Fansheng Wang, Lianhai Wang, Miodrag J. Mihaljevic, Shuhui Zhang, Wei Shao, Qihao Huang:
Trusted Auditing of Data Operation Behaviors in Cloud based on Blockchain and TEE. ISPA/BDCloud/SocialCom/SustainCom 2023: 447-455 - [c27]Lianhai Wang, Qihao Huang, Wei Shao, Jinpeng Wang, Xiaoqian Liu, Fansheng Wang:
Felix: A Model of Detecting Off-chain Abnormal States in Decentralized Applications. TrustCom 2023: 275-283 - 2022
- [j31]Miodrag J. Mihaljevic, Lianhai Wang, Shujiang Xu:
An Approach for Security Enhancement of Certain Encryption Schemes Employing Error Correction Coding and Simulated Synchronization Errors. Entropy 24(3): 406 (2022) - [j30]Junbin Shi, Qiming Yu, Yong Yu, Lianhai Wang, Wenzheng Zhang:
Privacy protection in social applications: A ciphertext policy attribute-based encryption with keyword search. Int. J. Intell. Syst. 37(12): 12152-12168 (2022) - [j29]Jing Wang, Libing Wu, Huaqun Wang, Kim-Kwang Raymond Choo, Lianhai Wang, Debiao He:
A Secure and Efficient Multiserver Authentication and Key Agreement Protocol for Internet of Vehicles. IEEE Internet Things J. 9(23): 24398-24416 (2022) - [j28]Junbin Shi, Yong Yu, Qiming Yu, Huilin Li, Lianhai Wang:
Toward Data Security in 6G Networks: A Public-Key Searchable Encryption Approach. IEEE Netw. 36(4): 166-173 (2022) - [j27]Quanrun Li, Min Luo, Chingfang Hsu, Lianhai Wang, Debiao He:
A Quantum Secure and Noninteractive Identity-Based Aggregate Signature Protocol From Lattices. IEEE Syst. J. 16(3): 4816-4826 (2022) - [j26]Miodrag J. Mihaljevic, Aleksandar Radonjic, Lianhai Wang, Shujiang Xu:
Security Enhanced Symmetric Key Encryption Employing an Integer Code for the Erasure Channel. Symmetry 14(8): 1709 (2022) - [j25]Miodrag J. Mihaljevic, Lianhai Wang, Shujiang Xu, Milan Todorovic:
An Approach for Blockchain Pool Mining Employing the Consensus Protocol Robust against Block Withholding and Selfish Mining Attacks. Symmetry 14(8): 1711 (2022) - [j24]Lianhai Wang, Yannan Li, Qiming Yu, Yong Yu:
Outsourced Data Integrity Checking with Practical Key Update in Edge-Cloud Resilient Networks. IEEE Wirel. Commun. 29(3): 56-62 (2022) - [c26]Shujiang Xu, Fansheng Wang, Lianhai Wang, Xu Chang, Tongfeng Yang, Weijun Yang:
A Method of Traceless File Deletion for NTFS File System. CSS 2022: 109-117 - [c25]Shujiang Xu, Chaoyang Zhang, Lianhai Wang, Shuhui Zhang, Wei Shao:
A Cross Data Center Access Control Model by Constructing GAS on Blockchain. ICPADS 2022: 312-321 - 2021
- [j23]Wei Wang, Lianhai Wang, Peijun Zhang, Shujiang Xu, Kunlun Fu, Lianxin Song, Shanshan Hu:
A privacy protection scheme for telemedicine diagnosis based on double blockchain. J. Inf. Secur. Appl. 61: 102845 (2021) - [j22]Ruonan Wang, Min Luo, Yihong Wen, Lianhai Wang, Kim-Kwang Raymond Choo, Debiao He:
The Applications of Blockchain in Artificial Intelligence. Secur. Commun. Networks 2021: 6126247:1-6126247:16 (2021) - [j21]Peijun Zhang, Lianhai Wang, Wei Wang, Kunlun Fu, Jinpeng Wang:
A Blockchain System Based on Quantum-Resistant Digital Signature. Secur. Commun. Networks 2021: 6671648:1-6671648:13 (2021) - [j20]Dawei Zhao, Gaoxi Xiao, Zhen Wang, Lianhai Wang, Lijuan Xu:
Minimum Dominating Set of Multiplex Networks: Definition, Application, and Identification. IEEE Trans. Syst. Man Cybern. Syst. 51(12): 7823-7837 (2021) - [c24]Shujiang Xu, Fengkai Liu, Lingyun Meng, Lianhai Wang, Xu Chang, Weijun Yang:
A Scheme of Traceless File Deletion for Windows FAT32 File System. ICEA 2021: 89-93 - [c23]Kunlun Fu, Lianhai Wang, Wei Shao, Wei Wang, Shuhui Zhang, Shujiang Xu, Shanshan Hu:
Supervisory Scheme for Blockchain Privacy Protection Technique Based on Group Signature. ICEA 2021: 223-228 - 2020
- [j19]Yuhua Sun, Tongjiang Yan, Zhixiong Chen, Lianhai Wang:
The 2-adic complexity of a class of binary sequences with optimal autocorrelation magnitude. Cryptogr. Commun. 12(4): 675-683 (2020) - [j18]Lijuan Xu, Bailing Wang, Lianhai Wang, Dawei Zhao, Xiaohui Han, Shumian Yang:
PLC-SEIFF: A programmable logic controller security incident forensics framework based on automatic construction of security constraints. Comput. Secur. 92: 101749 (2020) - [j17]Shidong Zhang, Tongjiang Yan, Yuhua Sun, Lianhai Wang:
Linear Complexity of Two Classes of Binary Interleaved Sequences with Low Autocorrelation. Int. J. Netw. Secur. 22(1): 150-154 (2020) - [j16]Jinhui Liu, Lianhai Wang, Yong Yu:
Improved Security of a Pairing-Free Certificateless Aggregate Signature in Healthcare Wireless Medical Sensor Networks. IEEE Internet Things J. 7(6): 5256-5266 (2020) - [j15]Liang Fang, Guozhen Shi, Lianhai Wang, Yongjun Li, Shujiang Xu, Yunchuan Guo:
Incentive mechanism for cooperative authentication: An evolutionary game approach. Inf. Sci. 527: 369-381 (2020) - [j14]Yannan Li, Yong Yu, Chunwei Lou, Nadra Guizani, Lianhai Wang:
Decentralized Public Key Infrastructures atop Blockchain. IEEE Netw. 34(6): 133-139 (2020) - [j13]Yong Yu, Yanqi Zhao, Yannan Li, Xiaojiang Du, Lianhai Wang, Mohsen Guizani:
Blockchain-Based Anonymous Authentication With Selective Revocation for Smart Industrial Applications. IEEE Trans. Ind. Informatics 16(5): 3290-3300 (2020)
2010 – 2019
- 2019
- [j12]Honglong Chen, Jinnan Fu, Lei Zhang, Shuai Wang, Kai Lin, Leyi Shi, Lianhai Wang:
Deformable Convolutional Matrix Factorization for Document Context-Aware Recommendation in Social Networks. IEEE Access 7: 66347-66357 (2019) - [j11]Xiaohui Han, Lianhai Wang, Shujiang Xu, Dawei Zhao, Guangqi Liu:
Recognizing roles of online illegal gambling participants: An ensemble learning approach. Comput. Secur. 87 (2019) - [j10]Chuan Chen, Lixiang Li, Haipeng Peng, Yixian Yang, Ling Mi, Lianhai Wang:
A new fixed-time stability theorem and its application to the synchronization control of memristive neural networks. Neurocomputing 349: 290-300 (2019) - [j9]Dawei Zhao, Lianhai Wang, Zhen Wang, Gaoxi Xiao:
Virus Propagation and Patch Distribution in Multiplex Networks: Modeling, Analysis, and Optimal Allocation. IEEE Trans. Inf. Forensics Secur. 14(7): 1755-1767 (2019) - [c22]Weinan Zhang, Lianhai Wang, Yongli Zan:
A Method for User Avatar Authenticity Based on Multi-feature Fusion. CCIR 2019: 148-160 - [c21]Jingjing Li, Yang Liu, Hongri Liu, Bailing Wang, Wei Wang, Lianhai Wang:
Analysis of the Influence of Individual Web Behavior Pattern on Group Behavior Simulation. DSC 2019: 428-431 - [c20]Xun He, Lianhai Wang, Weinan Zhang, Peijun Zhang:
Research on the Quality Prediction of Online Chinese Question Answering Community Answers Based on Comments. ICBDT 2019: 114-120 - [c19]Huxiao Liu, Lianhai Wang, Weinan Zhang, Wei Wang:
An Illegal Billboard Advertisement Detection Framework Based on Machine Learning. ICBDT 2019: 159-164 - [c18]Shuhui Zhang, Lianhai Wang, Lijuan Xu, Shujiang Xu, Xiaohui Han, Shumian Yang:
Virtual Machine Memory Forensics Method for XenServer Platform. NaNA 2019: 302-308 - 2018
- [j8]Liang Ge, Lianhai Wang, Yanzhen Chang:
A Sparse Grid Stochastic Collocation Upwind Finite Volume Element Method for the Constrained Optimal Control Problem Governed by Random Convection Diffusion Equations. J. Sci. Comput. 77(1): 524-551 (2018) - [j7]Shuhui Zhang, Xiangxu Meng, Lianhai Wang, Lijuan Xu, Xiaohui Han:
Secure Virtualization Environment Based on Advanced Memory Introspection. Secur. Commun. Networks 2018: 9410278:1-9410278:16 (2018) - [j6]Dawei Zhao, Bo Gao, Yaofei Wang, Lianhai Wang, Zhen Wang:
Optimal Dismantling of Interdependent Networks Based on Inverse Explosive Percolation. IEEE Trans. Circuits Syst. II Express Briefs 65-II(7): 953-957 (2018) - [c17]Xiaohui Han, Lianhai Wang, Shujiang Xu, Dawei Zhao, Guangqi Liu:
Role Recognition of Illegal Online Gambling Participants Using Monetary Transaction Data. ICICS 2018: 584-597 - [c16]Shumian Yang, Lianhai Wang, Dawei Zhao, Guangqi Liu, Shuhui Zhang:
The Design of a Cloud Forensics Middleware System Base on Memory Analysis. SoCPaR 2018: 258-267 - 2017
- [j5]Xiaohui Han, Lianhai Wang, Chaoran Cui, Jun Ma, Shuhui Zhang:
Linking Multiple Online Identities in Criminal Investigations: A Spectral Co-Clustering Framework. IEEE Trans. Inf. Forensics Secur. 12(9): 2242-2255 (2017) - [c15]Shujiang Xu, Lianhai Wang, Guangqi Liu, Xiaohui Han, Dawei Zhao, Lijuan Xu:
The Categories of Quantum Information Hiding Protocol. ICCCS (1) 2017: 143-152 - [c14]Shuhui Zhang, Xiangxu Meng, Lianhai Wang, Guangqi Liu:
Research on Linux Kernel Version Diversity for Precise Memory Analysis. ICPCSEE (1) 2017: 373-385 - [c13]Xiaohui Han, Lianhai Wang, Shujiang Xu, Guangqi Liu, Dawei Zhao:
Linking social network accounts by modeling user spatiotemporal habits. ISI 2017: 19-24 - 2016
- [j4]Shuhui Zhang, Xiangxu Meng, Lianhai Wang:
An adaptive approach for Linux memory analysis based on kernel code reconstruction. EURASIP J. Inf. Secur. 2016: 14 (2016) - [c12]Guangqi Liu, Lianhai Wang, Shujiang Xu, Dawei Zhao, Shumian Yang:
Video forensics research based on authenticity and integrity. ICIA 2016: 1223-1226 - [c11]Xiaohui Han, Lianhai Wang, Lijuan Xu, Shuihui Zhang:
Social Media account linkage using user-generated geo-location data. ISI 2016: 157-162 - [i2]Dawei Zhao, Zhen Wang, Gaoxi Xiao, Bo Gao, Lianhai Wang:
The robustness of interdependent networks under the interplay between cascading failures and virus propagation. CoRR abs/1608.01037 (2016) - 2015
- [j3]Dawei Zhao, Lianhai Wang, Lijuan Xu, Zhen Wang:
Finding another yourself in multiplex networks. Appl. Math. Comput. 266: 599-604 (2015) - [i1]Dawei Zhao, Lianhai Wang, Zhen Wang:
The robustness of multiplex networks under layer node-based attack. CoRR abs/1509.03002 (2015) - 2014
- [j2]Hengjian Li, Jiashu Zhang, Lianhai Wang:
Robust palmprint identification based on directional representations and compressed sensing. Multim. Tools Appl. 70(3): 2331-2345 (2014) - [c10]Shuhui Zhang, Lianhai Wang, Xiaohui Han:
A KVM Virtual Machine Memory Forensics Method Based on VMCS. CIS 2014: 657-661 - 2013
- [c9]Lijuan Xu, Lianhai Wang:
Research on Extracting System Logged-In Password Forensically from Windows Memory Image File. CIS 2013: 716-720 - [c8]Hengjian Li, Lianhai Wang, Jiashu Zhang, Zutao Zhang:
Face recognition using sparse representation classifier with Volterra kernels. ICMV 2013: 906709 - [c7]Shuhui Zhang, Lianhai Wang:
Forensic analysis of social networking application on iOS devices. ICMV 2013: 906715 - 2012
- [j1]Hengjian Li, Lianhai Wang, Ruichao Zhang, Lu Wu:
A High Performance and Secure Palmprint Template Protection Scheme. J. Softw. 7(8): 1827-1834 (2012) - [c6]Hengjian Li, Lianhai Wang, Zutao Zhang:
Robust Palmprint Recognition Based on Directional Representations. Intelligent Information Processing 2012: 372-381 - 2010
- [c5]Lianhai Wang, Lijuan Xu, Shuhui Zhang:
Network Connections Information Extraction of 64-Bit Windows 7 Memory Images. e-Forensics 2010: 90-98 - [c4]Lijuan Xu, Lianhai Wang, Lei Zhang, Zhigang Kong:
Acquisition of Network Connection Status Information from Physical Memory on Windows Vista Operating System. e-Forensics 2010: 122-130 - [c3]Lei Zhang, Lianhai Wang, Ruichao Zhang, Shuhui Zhang, Yang Zhou:
Live Memory Acquisition through FireWire. e-Forensics 2010: 159-167
2000 – 2009
- 2009
- [c2]Ruichao Zhang, Lianhai Wang, Shuhui Zhang:
Windows Memory Analysis Based on KPCR. IAS 2009: 677-680 - [c1]Shumian Yang, Lianhai Wang, Jian Liu:
Algorithm for Agent Collaborative Learning Task Allocation Based Graph Framework. BIFE 2009: 215-218
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 20:42 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint