BibTeX records: Wenfang Zhang

download as .bib file

@article{DBLP:journals/tits/WangZWKF24,
  author       = {Yu Wang and
                  Wenfang Zhang and
                  Xiaomin Wang and
                  Muhammad Khurram Khan and
                  Pingzhi Fan},
  title        = {Security Enhanced Authentication Protocol for Space-Ground Integrated
                  Railway Networks},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {25},
  number       = {1},
  pages        = {370--385},
  year         = {2024},
  url          = {https://doi.org/10.1109/TITS.2023.3307453},
  doi          = {10.1109/TITS.2023.3307453},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tits/WangZWKF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhangJYWK23,
  author       = {Wenfang Zhang and
                  Heng Jiao and
                  Zhuoqun Yan and
                  Xiaomin Wang and
                  Muhammad Khurram Khan},
  title        = {Security analysis and improvement of a public auditing scheme for
                  secure data storage in fog-to-cloud computing},
  journal      = {Comput. Secur.},
  volume       = {125},
  pages        = {103019},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103019},
  doi          = {10.1016/J.COSE.2022.103019},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhangJYWK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/HuangZZ23,
  author       = {Xi Huang and
                  Wenfang Zhang and
                  Shibin Zhang},
  title        = {Efficient multiparty quantum private comparison protocol based on
                  single photons and rotation encryption},
  journal      = {Quantum Inf. Process.},
  volume       = {22},
  number       = {7},
  pages        = {272},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11128-023-04027-9},
  doi          = {10.1007/S11128-023-04027-9},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/HuangZZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csse/ZhangZSSJ22,
  author       = {Xiaorui Zhang and
                  Wenfang Zhang and
                  Wei Sun and
                  Xingming Sun and
                  Sunil Kumar Jha},
  title        = {A Robust 3-D Medical Watermarking Based on Wavelet Transform for Data
                  Protection},
  journal      = {Comput. Syst. Sci. Eng.},
  volume       = {41},
  number       = {3},
  pages        = {1043--1056},
  year         = {2022},
  url          = {https://doi.org/10.32604/csse.2022.022305},
  doi          = {10.32604/CSSE.2022.022305},
  timestamp    = {Fri, 03 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csse/ZhangZSSJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/WangZWGKF22,
  author       = {Yu Wang and
                  Wenfang Zhang and
                  Xiaomin Wang and
                  Wei Guo and
                  Muhammad Khurram Khan and
                  Pingzhi Fan},
  title        = {Improving the Security of {LTE-R} for High-Speed Railway: From the
                  Access Authentication View},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {23},
  number       = {2},
  pages        = {1332--1346},
  year         = {2022},
  url          = {https://doi.org/10.1109/TITS.2020.3024684},
  doi          = {10.1109/TITS.2020.3024684},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tits/WangZWGKF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/WangZWKF21,
  author       = {Yu Wang and
                  Wenfang Zhang and
                  Xiaomin Wang and
                  Muhammad Khurram Khan and
                  Pingzhi Fan},
  title        = {Efficient Privacy-Preserving Authentication Scheme With Fine-Grained
                  Error Location for Cloud-Based {VANET}},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {70},
  number       = {10},
  pages        = {10436--10449},
  year         = {2021},
  url          = {https://doi.org/10.1109/TVT.2021.3107524},
  doi          = {10.1109/TVT.2021.3107524},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tvt/WangZWKF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/ZhuZWLZ20,
  author       = {Mengying Zhu and
                  Xiaolin Zheng and
                  Yan Wang and
                  Qianqiao Liang and
                  Wenfang Zhang},
  editor       = {Christian Bessiere},
  title        = {Online Portfolio Selection with Cardinality Constraint and Transaction
                  Costs based on Contextual Bandit},
  booktitle    = {Proceedings of the Twenty-Ninth International Joint Conference on
                  Artificial Intelligence, {IJCAI} 2020},
  pages        = {4682--4689},
  publisher    = {ijcai.org},
  year         = {2020},
  url          = {https://doi.org/10.24963/ijcai.2020/646},
  doi          = {10.24963/IJCAI.2020/646},
  timestamp    = {Thu, 21 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcai/ZhuZWLZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/LeiZWW19,
  author       = {Liting Lei and
                  Wenfang Zhang and
                  Yu Wang and
                  Xiaomin Wang},
  title        = {A pairing-free identity-based handover {AKE} protocol with anonymity
                  in the heterogeneous wireless networks},
  journal      = {Int. J. Commun. Syst.},
  volume       = {32},
  number       = {12},
  year         = {2019},
  url          = {https://doi.org/10.1002/dac.4000},
  doi          = {10.1002/DAC.4000},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/LeiZWW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caasafeproc/YangWZZS19,
  author       = {Jing Yang and
                  Xiaomin Wang and
                  Wenfang Zhang and
                  Qiming Zheng and
                  Ci Song},
  title        = {Transient Fault Diagnosis of Track Circuit Based on {MFCC-DTW}},
  booktitle    = {{CAA} Symposium on Fault Detection, Supervision and Safety for Technical
                  Processes, {SAFEPROCESS} 2019, Xiamen, China, July 5-7, 2019},
  pages        = {379--384},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SAFEPROCESS45799.2019.9213379},
  doi          = {10.1109/SAFEPROCESS45799.2019.9213379},
  timestamp    = {Tue, 17 Aug 2021 21:08:50 +0200},
  biburl       = {https://dblp.org/rec/conf/caasafeproc/YangWZZS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhengWKZGG18,
  author       = {Qiming Zheng and
                  Xiaomin Wang and
                  Muhammad Khurram Khan and
                  Wenfang Zhang and
                  Brij B. Gupta and
                  Wei Guo},
  title        = {A Lightweight Authenticated Encryption Scheme Based on Chaotic {SCML}
                  for Railway Cloud Service},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {711--722},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2017.2775038},
  doi          = {10.1109/ACCESS.2017.2775038},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ZhengWKZGG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhangWK15,
  author       = {Wenfang Zhang and
                  Xiaomin Wang and
                  Muhammad Khurram Khan},
  title        = {A virtual bridge certificate authority-based cross-domain authentication
                  mechanism for distributed collaborative manufacturing systems},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {6},
  pages        = {937--951},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1051},
  doi          = {10.1002/SEC.1051},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhangWK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyberc/ChenZW14,
  author       = {Zhen Chen and
                  Wenfang Zhang and
                  Xiaomin Wang},
  title        = {A Robust Collaborative Threshold Authenticated Encryption Scheme Based
                  on Message Blocking},
  booktitle    = {2014 International Conference on Cyber-Enabled Distributed Computing
                  and Knowledge Discovery, CyberC 2014, Shanghai, China, October 13-15,
                  2014},
  pages        = {10--13},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CyberC.2014.12},
  doi          = {10.1109/CYBERC.2014.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyberc/ChenZW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyberc/ChenZW14a,
  author       = {Zhen Chen and
                  Wenfang Zhang and
                  Xiaomin Wang},
  title        = {A Robust Collaborative Threshold Authenticated Encryption Scheme Based
                  on Message Blocking},
  booktitle    = {2014 International Conference on Cyber-Enabled Distributed Computing
                  and Knowledge Discovery, CyberC 2014, Shanghai, China, October 13-15,
                  2014},
  pages        = {27--30},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CyberC.2014.15},
  doi          = {10.1109/CYBERC.2014.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cyberc/ChenZW14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isbast/LiuWZG14,
  author       = {Wenyang Liu and
                  Xiaomin Wang and
                  Wenfang Zhang and
                  Xianfeng Guo},
  title        = {A lightweight blockcipher based on chaotic maps},
  booktitle    = {2014 International Symposium on Biometrics and Security Technologies,
                  {ISBAST} 2014, Kuala Lumpur, Malaysia, August 26-27, 2014},
  pages        = {150--155},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ISBAST.2014.7013112},
  doi          = {10.1109/ISBAST.2014.7013112},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isbast/LiuWZG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/WangZGZ13,
  author       = {Xiaomin Wang and
                  Wenfang Zhang and
                  Wei Guo and
                  Jiashu Zhang},
  title        = {Secure chaotic system with application to chaotic ciphers},
  journal      = {Inf. Sci.},
  volume       = {221},
  pages        = {555--570},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ins.2012.09.037},
  doi          = {10.1016/J.INS.2012.09.037},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/WangZGZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/WangGZKA13,
  author       = {Xiaomin Wang and
                  Wei Guo and
                  Wenfang Zhang and
                  Muhammad Khurram Khan and
                  Khaled Alghathbar},
  title        = {Cryptanalysis and improvement on a parallel keyed hash function based
                  on chaotic neural network},
  journal      = {Telecommun. Syst.},
  volume       = {52},
  number       = {2},
  pages        = {515--524},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11235-011-9457-9},
  doi          = {10.1007/S11235-011-9457-9},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/WangGZKA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cma/ZhangZHF12,
  author       = {Jianhua Zhang and
                  Wenfang Zhang and
                  Guolian Hou and
                  Fang Fang},
  title        = {Dynamic modeling and multivariable control of organic Rankine cycles
                  in waste heat utilizing processes},
  journal      = {Comput. Math. Appl.},
  volume       = {64},
  number       = {5},
  pages        = {908--921},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.camwa.2012.01.054},
  doi          = {10.1016/J.CAMWA.2012.01.054},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cma/ZhangZHF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/swarm/ZhangZLH11,
  author       = {Jianhua Zhang and
                  Wenfang Zhang and
                  Ying Li and
                  Guolian Hou},
  editor       = {Ying Tan and
                  Yuhui Shi and
                  Yi Chai and
                  Guoyin Wang},
  title        = {Controller Design for a Heat Exchanger in Waste Heat Utilizing Systems},
  booktitle    = {Advances in Swarm Intelligence - Second International Conference,
                  {ICSI} 2011, Chongqing, China, June 12-15, 2011, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6729},
  pages        = {379--386},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21524-7\_46},
  doi          = {10.1007/978-3-642-21524-7\_46},
  timestamp    = {Tue, 11 Jul 2023 08:21:51 +0200},
  biburl       = {https://dblp.org/rec/conf/swarm/ZhangZLH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GaoWZ11,
  author       = {Li Gao and
                  Xiaomin Wang and
                  Wenfang Zhang},
  title        = {Chaotic Hash Function Based on Tandem-DM Construction},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {1745--1749},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.244},
  doi          = {10.1109/TRUSTCOM.2011.244},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GaoWZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/paciia/WangZ08,
  author       = {Xiaomin Wang and
                  Wenfang Zhang},
  title        = {An Efficient and Secure Biometric Remote User Authentication Scheme
                  Using Smart Cards},
  booktitle    = {{PACIIA} 2008, Volume 2, 2008 {IEEE} Pacific-Asia Workshop on Computational
                  Intelligence and Industrial Application, 19-20 December 2008, Wuhan,
                  China},
  pages        = {913--917},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/PACIIA.2008.382},
  doi          = {10.1109/PACIIA.2008.382},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/paciia/WangZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/WangZZK07,
  author       = {Xiaomin Wang and
                  Wenfang Zhang and
                  Jiashu Zhang and
                  Muhammad Khurram Khan},
  title        = {Cryptanalysis and improvement on two efficient remote user authentication
                  scheme using smart cards},
  journal      = {Comput. Stand. Interfaces},
  volume       = {29},
  number       = {5},
  pages        = {507--512},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.csi.2006.11.005},
  doi          = {10.1016/J.CSI.2006.11.005},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csi/WangZZK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/WangZZ06,
  author       = {Xiaomin Wang and
                  Jiashu Zhang and
                  Wenfang Zhang},
  editor       = {David Pointcheval and
                  Yi Mu and
                  Kefei Chen},
  title        = {Chaotic Keystream Generator Using Coupled NDFs with Parameter Perturbing},
  booktitle    = {Cryptology and Network Security, 5th International Conference, {CANS}
                  2006, Suzhou, China, December 8-10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4301},
  pages        = {270--285},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935070\_19},
  doi          = {10.1007/11935070\_19},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/WangZZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics