default search action
Huajie Xu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Guoshao Su, Yuanzhuo Qin, Huajie Xu, Jinfu Liang:
Automatic real-time crack detection using lightweight deep learning models. Eng. Appl. Artif. Intell. 138: 109340 (2024) - [j16]Yanping Zhou, Huajie Xu, Huiying Chen, Yuhong Sun:
The domestic patent application and international technological innovation in an open economy: promotion or substitution? Technol. Anal. Strateg. Manag. 36(9): 2257-2270 (2024) - 2023
- [j15]Huajie Xu, Yanping Zhou, Huiying Chen, Yuanyuan Kou:
Evolutionary game analysis of inter-organizational trust and technology sharing behavior in enterprise collaborative innovation. J. Intell. Fuzzy Syst. 45(4): 5723-5738 (2023) - [j14]Yuanyuan Kou, Huiying Chen, Kai Liu, Yanping Zhou, Huajie Xu:
Path Optimization of Technological Innovation Efficiency Improvement in China's High-Tech Industries Based on QCA and GA-PSO-BP Neural Network. Syst. 11(5): 233 (2023) - 2021
- [j13]Jiehan Zhang, Shengyang Jiang, Huajie Xu, Shihua Tong, Chen Lu, Shaowei Zhuang:
Diagnosis of Coronary Heart Disease by Optical Coherence Tomography Using Random Walk Algorithm. J. Medical Imaging Health Informatics 11(1): 127-132 (2021) - 2020
- [c7]Xiaoming Hu, Wenan Tan, Chuang Ma, Huajie Xu:
Certificateless Aggregate Signature Scheme with High Efficencicy in Vehicular Ad-hoc Network. EITCE 2020: 1008-1012
2010 – 2019
- 2019
- [j12]Xiaoming Hu, Huajie Xu, Jian Wang, WenAn Tan, Yinchun Yang:
A generic construction of identity-based proxy signature scheme in the standard model. Int. J. Inf. Comput. Secur. 11(1): 83-100 (2019) - [j11]Huajie Xu, Qinghua Wu, Xiaoming Hu:
基于轨迹多特性的隐私保护算法 (Privacy Protection Algorithm Based on Multi-characteristics of Trajectory). 计算机科学 46(1): 190-195 (2019) - [c6]Xiaoming Hu, Wenan Tan, Chengcheng Yu, Chuang Ma, Huajie Xu:
Security Anlysis of Certificateless Aggregate Signature Scheme in VANETs. CISP-BMEI 2019: 1-6 - 2017
- [j10]Xiaoming Hu, Jian Wang, Huajie Xu, Yinchun Yang, Xiaolin Xu:
An improved efficient identity-based proxy signature in the standard model. Int. J. Comput. Math. 94(1): 22-38 (2017) - [j9]Xiaoming Hu, Chuang Ma, Taozhi Si, Wenrong Jiang, Huajie Xu, Wenan Tan:
改进的无证书广义指定验证者聚合签名方案 (Improved Certificateless Aggregate Signature Scheme with Universal Designated Verifier). 计算机科学 44(8): 168-175 (2017) - [j8]Xiaoming Hu, WenAn Tan, Huajie Xu, Jian Wang, Chuang Ma:
Strong Designated Verifier Signature Schemes with Undeniable Property and Their Applications. Secur. Commun. Networks 2017: 7921782:1-7921782:9 (2017) - 2016
- [j7]Xiaoming Hu, WenAn Tan, Huajie Xu, Jian Wang:
Short and provably secure designated verifier proxy signature scheme. IET Inf. Secur. 10(2): 69-79 (2016) - [j6]Huajie Xu, Hongsen Tan, Xiaoming Hu:
基于自适应遗传算法和多条带策略的排样方法研究 (Research of Packing Method Based on Adaptive Genetic Algorithm and Multi-strip Strategy). 计算机科学 43(4): 274-278 (2016) - [j5]Xiaoming Hu, Huajie Xu, Yan Liu, Jian Wang, WenAn Tan, Xiaojun Zhang:
An efficient designated verifier signature scheme with pairing-free and low cost. Secur. Commun. Networks 9(18): 5724-5732 (2016) - [c5]Xiaoming Hu, Chuang Ma, Jian Wang, Huajie Xu, WenAn Tan:
An undeniable strong DSVS scheme with no bilinear pairings. CISP-BMEI 2016: 1944-1948 - [c4]Xiaoming Hu, Jian Wang, Huajie Xu, Yan Liu, Xiaojun Zhang:
Secure and Pairing-Free Identity-Based Batch Verification Scheme in Vehicle Ad-Hoc Networks. ICIC (3) 2016: 11-20 - 2015
- [j4]Xiaoming Hu, Yinchun Yang, Jian Wang, Huajie Xu, WenAn Tan:
Security Analysis of an Efficient Identity-Based Proxy Signature in the Standard Model. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(2): 758-761 (2015) - [j3]Xiaoming Hu, Jian Wang, Huajie Xu, WenAn Tan:
A short and highly efficient identity-based designated verifier proxy signature scheme. Secur. Commun. Networks 8(6): 907-916 (2015) - [c3]Xiaoming Hu, Hong Lu, Huajie Xu, Jian Wang, Yinchun Yang:
An Efficient Identity-Based Proxy Signature Scheme in the Standard Model with Tight Reduction. CISIS-ICEUTE 2015: 309-319 - 2014
- [j2]Xiaoming Hu, Jian Wang, Huajie Xu, Yinchun Yang:
Constant Size Ciphertext and Private Key HIBE without Random Oracles. J. Inf. Sci. Eng. 30(2): 333-345 (2014) - 2013
- [j1]Xiaoming Hu, Huajie Xu, Jian Wang, Yinchun Yang, Xiaolin Xu:
Short Hierarchical Identity-based Encryption in the Selective-ID Model. J. Softw. 8(7): 1613-1619 (2013) - 2010
- [c2]Xiaoming Hu, Tong Wang, Huajie Xu:
Cryptanalysis and Improvement of a HIBE and HIBS without Random Oracles. MVHI 2010: 389-392
2000 – 2009
- 2008
- [c1]Huajie Xu, Guohui Li:
Density-Based Probabilistic Clustering of Uncertain Data. CSSE (4) 2008: 474-477
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint