default search action
Wenbao Han
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j35]Kaijun Zhang, Jiayu Yang, Yangfei Shao, Lehua Hu, Wei Ou, Wenbao Han, Qionglu Zhang:
Intrusion Detection Model for Internet of Vehicles Using GRIPCA and OWELM. IEEE Access 12: 28911-28925 (2024) - [j34]Mao Chen, Yuan Jiang, Ju Huang, Wei Ou, Wenbao Han, Qionglu Zhang:
An attribute-encryption-based cross-chain model in urban internet of vehicles. Comput. Electr. Eng. 115: 109136 (2024) - [j33]Nansen Wang, Jianing Zhang, Ju Huang, Wei Ou, Wenbao Han, Qionglu Zhang:
Telemedicine data secure sharing scheme based on heterogeneous federated learning. Cybersecur. 7(1): 56 (2024) - [j32]Zihao Xin, Sheng Liu, Xiaoyi Zhou, Wenbao Han, Jianqiang Ma:
A metaheuristic image cryptosystem using improved parallel model and many-objective optimization. IET Image Process. 18(11): 2838-2854 (2024) - [j31]Hongyu Guo, Haozhe Liang, Ju Huang, Wei Ou, Wenbao Han, Qionglu Zhang, Ruizhi Zhang:
A framework for efficient cross-chain token transfers in blockchain networks. J. King Saud Univ. Comput. Inf. Sci. 36(2): 101968 (2024) - [j30]Xiaoyi Zhou, Kaiyue Hou, Yu-Jian Zhuang, Zhaoxia Yin, Wenbao Han:
General Pairwise Modification Framework for Reversible Data Hiding in JPEG Images. IEEE Trans. Circuits Syst. Video Technol. 34(1): 153-167 (2024) - 2023
- [j29]Ning Li, Ruijie Zhang, Chengyu Zhu, Wei Ou, Wenbao Han, Qionglu Zhang:
A data sharing method for remote medical system based on federated distillation learning and consortium blockchain. Connect. Sci. 35(1) (2023) - [j28]Peirong Li, Wei Ou, Haozhe Liang, Wenbao Han, Qionglu Zhang, Guang Zeng:
A zero trust and blockchain-based defense model for smart electric vehicle chargers. J. Netw. Comput. Appl. 213: 103599 (2023) - 2022
- [j27]Wei Ou, Shiying Huang, Jingjing Zheng, Qionglu Zhang, Guang Zeng, Wenbao Han:
An overview on cross-chain: Mechanism, platforms, challenges and advances. Comput. Networks 218: 109378 (2022) - [j26]Xiangqi Wu, Peng Ma, Zihan Jin, Yuxuan Wu, Wenbao Han, Wei Ou:
A novel zero-watermarking scheme based on NSCT-SVD and blockchain for video copyright. EURASIP J. Wirel. Commun. Netw. 2022(1): 20 (2022) - [j25]Wei Ou, Shitao Xiao, Chengyu Zhu, Wenbao Han, Qionglu Zhang:
An overview of brain-like computing: Architecture, applications, and future trends. Frontiers Neurorobotics 16 (2022) - [j24]Wei Ou, Zihan Jin, Shiying Huang, Danlei Du, Jun Ye, Wenbao Han:
A brain-inspired multibranch parallel interactive vision mechanism for advanced driver assistance systems. Int. J. Sens. Networks 40(3): 203-216 (2022) - [c10]Nansen Wang, Wenbao Han, Wei Ou:
A Novel Security Scheme for Mobile Healthcare in Digital Twin. ML4CS (1) 2022: 425-441 - [c9]Ning Li, Nansen Wang, Wei Ou, Wenbao Han:
FedTD: Efficiently Share Telemedicine Data with Federated Distillation Learning. ML4CS (1) 2022: 501-515 - 2021
- [j23]Yongqiang Peng, Zongyao Chen, Zexuan Chen, Wei Ou, Wenbao Han, Jianqiang Ma:
BFLP: An Adaptive Federated Learning Framework for Internet of Vehicles. Mob. Inf. Syst. 2021: 6633332:1-6633332:18 (2021) - [j22]Xuan Wang, Jingjing Xu, Jiaxin Wang, Wei Ou, Jung-Yoon Kim, Wenbao Han:
BSVMS: Novel Autonomous Trustworthy Scheme for Video Monitoring. Wirel. Commun. Mob. Comput. 2021: 6518743:1-6518743:15 (2021)
2010 – 2019
- 2017
- [j21]Hao Feng, Guang Zeng, Wenbao Han, Yang Yang:
New strategy for searching disturbance vector of SHA-1 collision attack. Sci. China Inf. Sci. 60(12): 129101:1-129101:3 (2017) - [j20]Gang Yu, Xiaoxiao Ma, Zhenfu Cao, Guang Zeng, Wenbao Han:
Accountable CP-ABE with Public Verifiability: How to Effectively Protect the Outsourced Data in Cloud. Int. J. Found. Comput. Sci. 28(6): 705-724 (2017) - 2016
- [j19]Shuaiting Qiao, Wenbao Han, Yifa Li, Luyao Jiao:
Construction of Extended Multivariate Public Key Cryptosystems. Int. J. Netw. Secur. 18(1): 60-67 (2016) - [j18]Yunshan Hu, Yi Shen, Guang Zeng, Wenbao Han:
SHA-1充分条件自动化求解算法 (New Algorithm for Automatic Deriving Sufficient Conditions of SHA-1). 计算机科学 43(8): 123-127 (2016) - [c8]Gang Yu, Zhenfu Cao, Guang Zeng, Wenbao Han:
Accountable Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Public Verifiability and Nonrepudiation. ProvSec 2016: 3-18 - 2015
- [j17]Donghao Zhou, Wenbao Han, Yongjun Wang, Baodi Yuan:
Information diffusion network inferring and pathway tracking. Sci. China Inf. Sci. 58(9): 1-15 (2015) - [j16]Yuchen Tang, Guang Zeng, Wenbao Han:
Classification of disturbance vectors for collision attack in SHA-1. Sci. China Inf. Sci. 58(11): 1-10 (2015) - [j15]Huanguo Zhang, Wenbao Han, Xuejia Lai, Dongdai Lin, Jianfeng Ma, Jianhua Li:
Survey on cyberspace security. Sci. China Inf. Sci. 58(11): 1-43 (2015) - [j14]Xiyong Zhang, Weiwei Huang, Quanmei Chu, Wenbao Han:
Trace self-orthogonal relations of normal bases. Finite Fields Their Appl. 35: 284-317 (2015) - [j13]Xue Zhang, Guangsong Li, Wenbao Han, Huifang Ji:
A Novel ID-based Multi-domain Handover Protocol for Mesh Points in WMNs. KSII Trans. Internet Inf. Syst. 9(7): 2512-2529 (2015) - [j12]Xue Zhang, Huifang Ji, Guangsong Li, Wenbao Han:
基于身份的跨信任域签密方案 (Identity-based Signcryption Cross Autonomous Domains). 计算机科学 42(5): 165-168 (2015) - [j11]Yongguang Li, Guang Zeng, Wenbao Han:
缩减轮数Crypton算法中间相遇攻击的改进 (Improved Meet-in-the-middle Attack on Reduced-round Crypton Cipher). 计算机科学 42(11): 217-221 (2015) - [j10]Xue Zhang, Guangsong Li, Wenbao Han:
Ticket-Based Authentication for Fast Handover in Wireless Mesh Networks. Wirel. Pers. Commun. 85(3): 1509-1523 (2015) - 2014
- [c7]Lin Zhou, Fei Liu, Shuitao Gan, Xiaojun Qin, Wenbao Han:
Symbolic Execution of Network Software Based on Unit Testing. NAS 2014: 128-132 - 2013
- [c6]Lin Zhou, Shuitao Gan, Xiaojun Qin, Wenbao Han:
SECloud: Binary Analyzing Using Symbolic Execution in the Cloud. CBD 2013: 58-63 - [i5]Yongjuan Wang, Liren Ding, Wenbao Han, Xiangyu Wang:
The Improved Cube Attack on Grain-v1. IACR Cryptol. ePrint Arch. 2013: 417 (2013) - 2011
- [j9]Gang Yu, Hongzhi Yang, Shuqin Fan, Yong Shen, Wenbao Han:
Efficient Certificateless Signcryption Scheme from Weil Pairing. J. Networks 6(9): 1280-1287 (2011) - 2010
- [j8]Gang Yu, Xiaoxiao Ma, Yong Shen, Wenbao Han:
Provable secure identity based generalized signcryption scheme. Theor. Comput. Sci. 411(40-42): 3614-3624 (2010) - [i4]Gang Yu, Xiaoxiao Ma, Yong Shen, Wenbao Han:
Provable Secure Identity Based Generalized Signcryption Scheme. CoRR abs/1004.1304 (2010) - [i3]Huifang Ji, Wenbao Han, Long Zhao:
Certificateless generalized signcryption. IACR Cryptol. ePrint Arch. 2010: 204 (2010)
2000 – 2009
- 2009
- [c5]Guang Zeng, Yang Yang, Wenbao Han, Shuqin Fan:
Word Oriented Cascade Jump sigma-LFSR. AAECC 2009: 127-136 - [c4]Wei Ou, Xiaofeng Wang, Wenbao Han, Yongjun Wang:
Research on Trust Evaluation Model Based on TPM. FCST 2009: 593-597 - 2008
- [c3]Guang Zeng, Yang Yang, Wenbao Han, Shuqin Fan:
Reducible Polynomial over F2 Constructed by Trinomial sigma-LFSR. Inscrypt 2008: 192-200 - [i2]Yongjuan Wang, Shuqin Fan, Wenbao Han:
New construction of Boolean functions with maximun algebraic immunity. IACR Cryptol. ePrint Arch. 2008: 176 (2008) - 2007
- [j7]Guang Zeng, Kaicheng He, Wenbao Han:
A trinomial type of σ-LFSR oriented toward software implementation. Sci. China Ser. F Inf. Sci. 50(3): 359-372 (2007) - [j6]Shuqin Fan, Wenbao Han, Keqin Feng, Xiyong Zhang:
Primitive normal polynomials with the first two coefficients prescribed: A revised p-adic method. Finite Fields Their Appl. 13(3): 577-604 (2007) - [j5]Shuqin Fan, Wenbao Han, Keqin Feng:
Primitive normal polynomials with multiple coefficients prescribed: An asymptotic result. Finite Fields Their Appl. 13(4): 1029-1044 (2007) - [i1]Guang Zeng, Wenbao Han, Kaicheng He:
High Efficiency Feedback Shift Register: sigma-LFSR. IACR Cryptol. ePrint Arch. 2007: 114 (2007) - 2006
- [c2]Xiyong Zhang, Hua Guo, Wenbao Han:
Nonexistence of a Kind of Generalized Perfect Binary Array. SETA 2006: 304-312 - 2005
- [c1]Guangsong Li, Wenbao Han:
A New Scheme for Key Management in Ad Hoc Networks. ICN (2) 2005: 242-249 - 2004
- [j4]Shuqin Fan, Wenbao Han:
Primitive Polynomials over Finite Fields of Characteristic Two. Appl. Algebra Eng. Commun. Comput. 14(5): 381-395 (2004) - [j3]Shuqin Fan, Wenbao Han:
Character sums over Galois rings and primitive polynomials over finite fields. Finite Fields Their Appl. 10(1): 36-52 (2004) - [j2]Shuqin Fan, Wenbao Han:
Primitive polynomial with three coefficients prescribed. Finite Fields Their Appl. 10(4): 506-521 (2004) - 2003
- [j1]Shuqin Fan, Wenbao Han:
Random properties of the highest level sequences of primitive sequences over Z(2e). IEEE Trans. Inf. Theory 49(6): 1553-1557 (2003)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-04 20:39 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint