Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
MingChu Li
Mingchu Li
2010 – today
- 2013
[j56]MingChu Li: Hamiltonian claw-free graphs involving minimum degrees. Discrete Applied Mathematics 161(10-11): 1530-1537 (2013)
[j55]Xing-Tian Wang, Chin-Chen Chang, Thai Son Nguyen, MingChu Li: Reversible data hiding for high quality images exploiting interpolation and direction order mechanism. Digital Signal Processing 23(2): 569-577 (2013)
[j54]MingChu Li, Lifeng Yuan, He Jiang, Bing Liu, H. J. Broersma: Tank-Ring Factors in Supereulerian Claw-Free Graphs. Graphs and Combinatorics 29(3): 599-608 (2013)
[j53]Xiaodong Chen, Mingchu Li, Xin Ma, Xinxin Fan: Hamiltonian Connectedness in Claw-Free Graphs. Graphs and Combinatorics 29(5): 1259-1267 (2013)
[j52]Chin-Chen Chang, Kuo-Nan Chen, Zhi-Hui Wang, MingChu Li: Lossless Information Hiding in the VQ Index Table. JSW 8(3): 547-553 (2013)
[j51]Zhenzhou Guo, Mingchu Li, Xinxin Fan: Attribute-based ring signcryption scheme. Security and Communication Networks 6(6): 790-796 (2013)
[j50]Xinxin Fan, Mingchu Li, Hui Zhao, Xiaodong Chen, Zhenzhou Guo, Dong Jiao, Weifeng Sun: Peer cluster: a maximum flow-based trust mechanism in P2P file sharing networks. Security and Communication Networks 6(9): 1126-1142 (2013)
[j49]Yizhi Ren, Mingchu Li, Yang Xiang, Yongrui Cui, Kouichi Sakurai: Evolution of cooperation in reputation system by group-based scheme. The Journal of Supercomputing 63(1): 171-190 (2013)
[c35]Xin Gu, Mingchu Li, Shuzhen Xu: Research on Indirect Cost of Irregular Flight. ANT/SEIT 2013: 1053-1058
[c34]Yuanfang Chen, Noël Crespi, Lin Lv, Mingchu Li, Antonio M. Ortiz, Lei Shu: Locating using prior information: wireless indoor localization algorithm. SIGCOMM 2013: 463-464- 2012
[j48]Yongrui Cui, MingChu Li, Yang Xiang, Yizhi Ren, Silvio Cesare: A QoS-based fine-grained reputation system in the grid environment. Concurrency and Computation: Practice and Experience 24(17): 1990-2006 (2012)
[j47]Yuanfang Chen, Mingchu Li, Lei Shu, Lei Wang, Takahiro Hara: A proportional fairness backoff scheme for funnelling effect in wireless sensor networks. Trans. Emerging Telecommunications Technologies 23(6): 585-597 (2012)
[j46]Dong Jiao, Mingchu Li, Yan Yu, Jinping Ou: Self-Healing Key-Distribution Scheme with Collusion Attack Resistance Based on One-Way Key Chains and Secret Sharing in Wireless Sensor Networks. IJDSN 2012 (2012)
[j45]Zhi-Hui Wang, Chin-Chen Chang, MingChu Li: Optimizing least-significant-bit substitution using cat swarm optimization strategy. Inf. Sci. 192: 98-108 (2012)
[j44]Weifeng Sun, Qiufen Xia, Zichuan Xu, Mingchu Li, Zhenquan Qin: A Game Theoretic Resource Allocation Model Based on Extended Second Price Sealed Auction in Grid Computing. JCP 7(1): 65-75 (2012)
[j43]Chi Lin, Guowei Wu, Feng Xia, Mingchu Li, Lin Yao, Zhongyi Pei: Energy efficient ant colony algorithms for data aggregation in wireless sensor networks. J. Comput. Syst. Sci. 78(6): 1686-1702 (2012)
[j42]Xinxin Fan, Mingchu Li, Jianhua Ma, Yizhi Ren, Hui Zhao, Zhiyuan Su: Behavior-based reputation management in P2P file-sharing networks. J. Comput. Syst. Sci. 78(6): 1737-1750 (2012)
[j41]Laiping Zhao, Yizhi Ren, MingChu Li, Kouichi Sakurai: Flexible service selection with user-specific QoS support in service-oriented architecture. J. Network and Computer Applications 35(3): 962-973 (2012)
[j40]Wei-Tong Hu, MingChu Li, Cheng Guo, Yizhi Ren: Reversible secret image sharing with steganography and dynamic embedding. Security and Communication Networks 5(11): 1267-1276 (2012)
[j39]Xing-Tian Wang, Chin-Chen Chang, Chia-Chun Lin, MingChu Li: A novel multi-group exploiting modification direction method based on switch map. Signal Processing 92(6): 1525-1535 (2012)
[c33]Xinxin Fan, Ling Liu, Mingchu Li, Zhiyuan Su: EigenTrustp++: Attack resilient trust management. CollaborateCom 2012: 416-425
[c32]Weifeng Sun, Haotian Wang, Mingchu Li, Mengci Zhou, Zhenquan Qin: Research and simulation of transport protocols optimization on wireless multi-hop networks. LCN Workshops 2012: 702-709
[c31]Guanghai Cui, Mingchu Li, Zhen Wang, Linlin Tian, Jianhua Ma: Analysis and Evaluation Framework Based on Spatial Evolutionary Game Theory for Incentive Mechanism in Peer-to-Peer Network. TrustCom 2012: 287-294
[c30]Kun Lu, Hua Jiang, Mingchu Li, Sheng Zhao, Jianhua Ma: Resources Collaborative Scheduling Model Based on Trust Mechanism in Cloud. TrustCom 2012: 863-868
[c29]Linlin Tian, Mingchu Li, Weifeng Sun, Xiaowei Zhao, Baohui Wang, Jianhua Ma: Evolution of Cooperation Based on Reputation on Dynamical Networks. TrustCom 2012: 1399-1404
[i2]Chi Lin, Guowei Wu, Feng Xia, Mingchu Li, Lin Yao, Zhongyi Pei: Energy Efficient Ant Colony Algorithms for Data Aggregation in Wireless Sensor Networks. CoRR abs/1201.0119 (2012)- 2011
[j38]Jingyu Hua, MingChu Li, Yizhi Ren, Kouichi Sakurai: Efficient Context-Sensitive Intrusion Detection Based on State Transition Table. IEICE Transactions 94-A(1): 255-264 (2011)
[j37]MingChu Li, Xiaodong Chen, Hajo Broersma: Hamiltonian connectedness in 4-connected hourglass-free claw-free graphs. Journal of Graph Theory 68(4): 285-298 (2011)
[j36]Zhi-Hui Wang, Chin-Chen Chang, MingChu Li, Tzu-Chuen Lu: A Simple Image Encoding Method with Data Lossless Information Hiding. JNW 6(3): 400-407 (2011)
[j35]Yizhi Ren, MingChu Li, Kouichi Sakurai: FineTrust: a fine-grained trust model for peer-to-peer networks. Security and Communication Networks 4(1): 61-69 (2011)
[j34]Hui Zhao, Mingchu Li, Xinxin Fan: A formal separation method of protocols to eliminate parallel attacks in virtual organization. Security and Communication Networks 4(12): 1461-1468 (2011)
[c28]Yuanfang Chen, Lei Shu, Mingchu Li, Ziqi Fan, Lei Wang, Takahiro Hara: The Insights of DV-Based Localization Algorithms in the Wireless Sensor Networks with Duty-Cycled and Radio Irregular Sensors. ICC 2011: 1-6
[c27]Shuai Yue, Zhi-Hui Wang, Ching-Yun Chang, Chin-Chen Chang, MingChu Li: Image Data Hiding Schemes Based on Graph Coloring. UIC 2011: 476-489
[e3]Xiamu Niu, Mingchu Li, Yôiti Suzuki, Jeng-Shyang Pan, Lakhmi C. Jain (Eds.): Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2011, Dalian, China, October 14-16, 2011. IEEE 2011, ISBN 978-1-4577-1397-2- 2010
[j33]Hong-Jian Lai, Mingchu Li, Yehong Shao, Liming Xiong: Spanning eulerian subgraphs in N2-locally connected claw-free graphs. Ars Comb. 94 (2010)
[j32]Liming Xiong, Mingchu Li: Supereulerian index is stable under contractions and closures. Ars Comb. 97 (2010)
[j31]Weifeng Sun, Juanyun Wang, Boxiang Dong, Mingchu Li, Zhenquan Qin: A Mediated RSA-based End Entity Certificates Revocation Mechanism with Secure Concerned in Grid. IJIPM 1(2): 103-114 (2010)
[j30]Chin-Chen Chang, Pei-Yu Lin, Zhi-Hui Wang, MingChu Li: A Sudoku-based Secret Image Sharing Scheme with Reversibility (Invited Paper). JCM 5(1): 5-12 (2010)
[j29]Zhi-Hui Wang, Chin-Chen Chang, Kuo-Nan Chen, MingChu Li: An encoding method for both image compression and data lossless information hiding. Journal of Systems and Software 83(11): 2073-2082 (2010)
[j28]Yu Zong, Guandong Xu, Yanchun Zhang, He Jiang, MingChu Li: A robust iterative refinement clustering algorithm with smoothing search space. Knowl.-Based Syst. 23(5): 389-396 (2010)
[c26]Chin-Chen Chang, Kuo-Nan Chen, Zhi-Hui Wang, MingChu Li: A technique of embedding digital data in an image compression code reversibly. ICUIMC 2010: 13
[c25]Zhi-Hui Wang, Chin-Chen Chang, MingChu Li, Tzu-Chuen Lu: A simple image encoding method with data lossless information hiding. ICUIMC 2010: 44
[c24]Yanchuan Huang, Mingchu Li, Chuang Lin, Linlin Tian: Gabor-Based Kernel Independent Component Analysis for Face Recognition. IIH-MSP 2010: 376-379
[c23]Weifeng Sun, Boxiang Dong, Zhenquan Qin, Juanyun Wang, Mingchu Li: A Low-Level Security Solving Method in Grid. IIH-MSP 2010: 727-730
[c22]Zhenquan Qin, Lei Wang, Mingchu Li, Weifeng Sun: An Efficient Trust Mechanism in P2P Network. IIH-MSP 2010: 731-734
[c21]Laiping Zhao, Yizhi Ren, MingChu Li, Kouichi Sakurai: SPSE: A flexible QoS-based service scheduling algorithm for service-oriented Grid. IPDPS Workshops 2010: 1-8
[c20]Feng Xia, Zhenzhen Xu, Lin Yao, Weifeng Sun, Mingchu Li: Prediction-based Data Transmission for Energy Conservation in Wireless Body Sensors. WICON 2010: 1-9
[e2]Tai-Hoon Kim, Alan Chin-Chen Chang, MingChu Li, Chunming Rong, Charalampos Z. Patrikakis, Dominik Slezak (Eds.): Communication and Networking - International Conference, FGCN 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings, Part I. Communications in Computer and Information Science 119, Springer 2010, ISBN 978-3-642-17586-2
2000 – 2009
- 2009
[j27]MingChu Li, Yongrui Cui, Liming Xiong, Yuan Tian, He Jiang, Xu Yuan: Circumferences and minimum degrees in 3-connected claw-free graphs. Discrete Mathematics 309(11): 3580-3587 (2009)
[j26]Yongrui Cui, MingChu Li, Yizhi Ren, Kouichi Sakurai: An Adaptive Reputation-Based Algorithm for Grid Virtual Organization Formation. IEICE Transactions 92-A(5): 1339-1346 (2009)
[j25]Cheng Guo, MingChu Li, Kouichi Sakurai: A New Secret Sharing Scheme Based on the Multi-Dealer. IEICE Transactions 92-A(5): 1373-1378 (2009)
[j24]Yizhi Ren, MingChu Li, Kouichi Sakurai: Modeling Security Bridge Certificate Authority Architecture. IEICE Transactions 92-A(6): 1544-1547 (2009)
[j23]Zhi-Hui Wang, Chin-Chen Chang, Chia-Chen Lin, MingChu Li: A reversible information hiding scheme using left-right and up-down chinese character representation. Journal of Systems and Software 82(8): 1362-1369 (2009)
[c19]Jing Hu, Mingchu Li, Weifeng Sun, Yuanfang Chen: An Ant Colony Optimization for Grid Task Scheduling with Multiple QoS Dimensions. GCC 2009: 415-419
[c18]Zhi-Hui Wang, MingChu Li, Mao-Hua Chen, Chin-Chen Chang: A New Intelligent Authorization Agent Model in Grid. HIS (1) 2009: 394-398
[c17]Chin-Chen Chang, Chi-Shiang Chan, Zhi-Hui Wang, MingChu Li: Reversible Steganography for VQ Indices Using the Modified State Codebook. IIH-MSP 2009: 320-323
[c16]The Duc Kieu, Chin-Chen Chang, Zhi-Hui Wang, MingChu Li: Sharing Secrets and Reversibly Reconstructing the Cover Image Using Two Meaningful Shadows. IIH-MSP 2009: 324-327
[c15]Jingyu Hua, MingChu Li, Kouichi Sakurai, Yizhi Ren: Efficient Intrusion Detection Based on Static Analysis and Stack Walks. IWSEC 2009: 158-173
[c14]Yuanfang Chen, Yuanfang Chen, Mingchu Li, Lei Wang, Lei Shu: A Proportional Fair Backoff Scheme for Wireless Sensor Networks. MASS 2009: 971-976
[c13]Jinpei Pan, Mingchu Li, Weifeng Sun, Jing Hu: A Mediated RSA-Based End Entity Certificates Revocation Mechanism in Grid. NCM 2009: 247-250
[e1]Dominik Slezak, Tai-Hoon Kim, Alan Chin-Chen Chang, Thanos Vasilakos, MingChu Li, Kouichi Sakurai (Eds.): Communication and Networking - International Conference, FGCN/ACN 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings. Communications in Computer and Information Science 56, Springer 2009, ISBN 978-3-642-10843-3
[i1]Feng Xia, Zhenzhen Xu, Lin Yao, Weifeng Sun, Mingchu Li: Prediction-Based Data Transmission for Energy Conservation in Wireless Body Sensors. CoRR abs/0912.2430 (2009)- 2008
[j22]He Jiang, Xianchao Zhang, Guoliang Chen, MingChu Li: Backbone analysis and algorithm design for the quadratic assignment problem. Science in China Series F: Information Sciences 51(5): 476-488 (2008)
[j21]MingChu Li, Liming Xiong, H. J. Broersma: Connected even factors in claw-free graphs. Discrete Mathematics 308(11): 2282-2284 (2008)
[j20]Liming Xiong, Qiuxin Wu, MingChu Li: Radius and subpancyclicity in line graphs. Discrete Mathematics 308(23): 5325-5333 (2008)
[c12]MingChu Li, Yizhi Ren, Kouichi Sakurai, Yongrui Cui, Zhi-Hui Wang: Granularity Considering in a Trust Model for P2P Networks. AINA Workshops 2008: 307-312
[c11]Yizhi Ren, MingChu Li, Cheng Guo, Yongrui Cui, Kouichi Sakurai: Trust Similarity Measure in Trust Model for P2P Networks. EUC (2) 2008: 107-112
[c10]MingChu Li, Yongrui Cui, Yizhi Ren, Yuan Tian: Intelligent Security Multi-agent Framework in Grid Computing. ICNSC 2008: 1142-1147
[c9]Yu Zong, Xianchao Zhang, He Jiang, MingChu Li: A Creditable Subspace Labeling Method Based on D-S Evidence Theory. PAKDD 2008: 839-848- 2007
[j19]MingChu Li, Cheng Guo, Liming Xiong, Dengxin Li, Hong-Jian Lai: Quadrangularly connected claw-free graphs. Discrete Mathematics 307(9-10): 1205-1211 (2007)
[j18]Liming Xiong, MingChu Li: On the 2-factor index of a graph. Discrete Mathematics 307(21): 2478-2483 (2007)
[c8]He Jiang, Xianchao Zhang, MingChu Li: Backbone of the p-Median Problem. Australian Conference on Artificial Intelligence 2007: 699-704
[c7]He Jiang, Xianchao Zhang, MingChu Li, HaoYang Che: Using Gavish-Grave LP to Formulate the Directed Black and White Traveling Salesman Problem. International Conference on Computational Science (3) 2007: 293-298
[c6]MingChu Li, Liming Xiong, Hong Liu: Linear Polynomial-Time Algorithms To Construct 4-Connected 4-Regular Locally Connected Claw-Free Graphs. International Conference on Computational Science (3) 2007: 329-333- 2006
[j17]MingChu Li: Circumferences of regular claw-free graphs. Discrete Mathematics 306(21): 2682-2694 (2006)
[c5]MingChu Li, Hongyan Yao, Jianbo Ma: Recovery Mechanism of Online Certification Chain in Grid Computing. ARES 2006: 558-562
[c4]MingChu Li, Hongyan Yao: Recovery Mechanism of Cooperative Process Chain in Grid. ARES 2006: 571-576
[c3]MingChu Li, Yongrui Cui, Yuan Tian, Dong Wang, Songyuan Yan: A New Architecture of Grid Security System Construction. ICPP Workshops 2006: 100-108- 2005
[j16]MingChu Li, Liming Xiong: Circumferences and Minimum Degrees in 3-Connected Claw-Free Graphs. Electronic Notes in Discrete Mathematics 22: 93-99 (2005)
[j15]Tomás Kaiser, MingChu Li, Zdenek Ryjácek, Liming Xiong: Hourglasses and Hamilton cycles in 4-connected claw-free graphs. Journal of Graph Theory 48(4): 267-276 (2005)
[c2]Weisheng Si, MingChu Li: On the Connectedness of Peer-to-Peer Overlay Networks. ICPADS (1) 2005: 474-480- 2004
[j14]Liming Xiong, Hajo Broersma, Xueliang Li, MingChu Li: The hamiltonian index of a graph and its branch-bonds. Discrete Mathematics 285(1-3): 279-288 (2004)
[j13]
[c1]Qing Xu, Roberto Brunelli, Stefano Messelodi, Jiawan Zhang, MingChu Li: Image Coherence Based Adaptive Sampling for Image Synthesis. ICCSA (2) 2004: 693-702- 2003
[j12]- 2002
[j11]- 2001
[j10]MingChu Li: Hamiltonian Cycles in Almost Claw-Free Graphs. Graphs and Combinatorics 17(4): 687-706 (2001)- 2000
[j9]MingChu Li: On hamiltonian connectedness of K1, 4-free graphs. Discrete Mathematics 216(1-3): 279-285 (2000)
[j8]MingChu Li: Longest Cycles in Almost Claw-Free Graphs. Graphs and Combinatorics 16(2): 177-198 (2000)
1990 – 1999
- 1998
[j7]
[j6]
[j5]MingChu Li: Hamiltonian Connectedness in Claw-Free Graphs. Graphs and Combinatorics 14(1): 45-58 (1998)- 1996
[j4]MingChu Li: Hamiltonian cycles in regular 3-connected claw-free graphs. Discrete Mathematics 156(1-3): 171-196 (1996)- 1995
[j3]MingChu Li: Longest cycles in regular 2-connected claw-free graphs. Discrete Mathematics 137(1-3): 277-295 (1995)- 1994
[j2]Mingchu Li: Two edge-disjoint hamiltonian cycles in graphs. Graphs and Combinatorics 10(2-4): 169-178 (1994)- 1993
[j1]MingChu Li: Hamiltonian cycles in 3-connected claw-free graphs. Journal of Graph Theory 17(3): 303-313 (1993)
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 10:56 CEST by the dblp team



