Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Wenfang Zhang
@article{DBLP:journals/tits/WangZWKF24, author = {Yu Wang and Wenfang Zhang and Xiaomin Wang and Muhammad Khurram Khan and Pingzhi Fan}, title = {Security Enhanced Authentication Protocol for Space-Ground Integrated Railway Networks}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {25}, number = {1}, pages = {370--385}, year = {2024}, url = {https://doi.org/10.1109/TITS.2023.3307453}, doi = {10.1109/TITS.2023.3307453}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tits/WangZWKF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhangJYWK23, author = {Wenfang Zhang and Heng Jiao and Zhuoqun Yan and Xiaomin Wang and Muhammad Khurram Khan}, title = {Security analysis and improvement of a public auditing scheme for secure data storage in fog-to-cloud computing}, journal = {Comput. Secur.}, volume = {125}, pages = {103019}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103019}, doi = {10.1016/J.COSE.2022.103019}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZhangJYWK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/HuangZZ23, author = {Xi Huang and Wenfang Zhang and Shibin Zhang}, title = {Efficient multiparty quantum private comparison protocol based on single photons and rotation encryption}, journal = {Quantum Inf. Process.}, volume = {22}, number = {7}, pages = {272}, year = {2023}, url = {https://doi.org/10.1007/s11128-023-04027-9}, doi = {10.1007/S11128-023-04027-9}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/HuangZZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csse/ZhangZSSJ22, author = {Xiaorui Zhang and Wenfang Zhang and Wei Sun and Xingming Sun and Sunil Kumar Jha}, title = {A Robust 3-D Medical Watermarking Based on Wavelet Transform for Data Protection}, journal = {Comput. Syst. Sci. Eng.}, volume = {41}, number = {3}, pages = {1043--1056}, year = {2022}, url = {https://doi.org/10.32604/csse.2022.022305}, doi = {10.32604/CSSE.2022.022305}, timestamp = {Fri, 03 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csse/ZhangZSSJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/WangZWGKF22, author = {Yu Wang and Wenfang Zhang and Xiaomin Wang and Wei Guo and Muhammad Khurram Khan and Pingzhi Fan}, title = {Improving the Security of {LTE-R} for High-Speed Railway: From the Access Authentication View}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {23}, number = {2}, pages = {1332--1346}, year = {2022}, url = {https://doi.org/10.1109/TITS.2020.3024684}, doi = {10.1109/TITS.2020.3024684}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tits/WangZWGKF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/WangZWKF21, author = {Yu Wang and Wenfang Zhang and Xiaomin Wang and Muhammad Khurram Khan and Pingzhi Fan}, title = {Efficient Privacy-Preserving Authentication Scheme With Fine-Grained Error Location for Cloud-Based {VANET}}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {70}, number = {10}, pages = {10436--10449}, year = {2021}, url = {https://doi.org/10.1109/TVT.2021.3107524}, doi = {10.1109/TVT.2021.3107524}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tvt/WangZWKF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/ZhuZWLZ20, author = {Mengying Zhu and Xiaolin Zheng and Yan Wang and Qianqiao Liang and Wenfang Zhang}, editor = {Christian Bessiere}, title = {Online Portfolio Selection with Cardinality Constraint and Transaction Costs based on Contextual Bandit}, booktitle = {Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, {IJCAI} 2020}, pages = {4682--4689}, publisher = {ijcai.org}, year = {2020}, url = {https://doi.org/10.24963/ijcai.2020/646}, doi = {10.24963/IJCAI.2020/646}, timestamp = {Thu, 21 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/ZhuZWLZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/LeiZWW19, author = {Liting Lei and Wenfang Zhang and Yu Wang and Xiaomin Wang}, title = {A pairing-free identity-based handover {AKE} protocol with anonymity in the heterogeneous wireless networks}, journal = {Int. J. Commun. Syst.}, volume = {32}, number = {12}, year = {2019}, url = {https://doi.org/10.1002/dac.4000}, doi = {10.1002/DAC.4000}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/LeiZWW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caasafeproc/YangWZZS19, author = {Jing Yang and Xiaomin Wang and Wenfang Zhang and Qiming Zheng and Ci Song}, title = {Transient Fault Diagnosis of Track Circuit Based on {MFCC-DTW}}, booktitle = {{CAA} Symposium on Fault Detection, Supervision and Safety for Technical Processes, {SAFEPROCESS} 2019, Xiamen, China, July 5-7, 2019}, pages = {379--384}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SAFEPROCESS45799.2019.9213379}, doi = {10.1109/SAFEPROCESS45799.2019.9213379}, timestamp = {Tue, 17 Aug 2021 21:08:50 +0200}, biburl = {https://dblp.org/rec/conf/caasafeproc/YangWZZS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhengWKZGG18, author = {Qiming Zheng and Xiaomin Wang and Muhammad Khurram Khan and Wenfang Zhang and Brij B. Gupta and Wei Guo}, title = {A Lightweight Authenticated Encryption Scheme Based on Chaotic {SCML} for Railway Cloud Service}, journal = {{IEEE} Access}, volume = {6}, pages = {711--722}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2017.2775038}, doi = {10.1109/ACCESS.2017.2775038}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ZhengWKZGG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhangWK15, author = {Wenfang Zhang and Xiaomin Wang and Muhammad Khurram Khan}, title = {A virtual bridge certificate authority-based cross-domain authentication mechanism for distributed collaborative manufacturing systems}, journal = {Secur. Commun. Networks}, volume = {8}, number = {6}, pages = {937--951}, year = {2015}, url = {https://doi.org/10.1002/sec.1051}, doi = {10.1002/SEC.1051}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhangWK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyberc/ChenZW14, author = {Zhen Chen and Wenfang Zhang and Xiaomin Wang}, title = {A Robust Collaborative Threshold Authenticated Encryption Scheme Based on Message Blocking}, booktitle = {2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2014, Shanghai, China, October 13-15, 2014}, pages = {10--13}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CyberC.2014.12}, doi = {10.1109/CYBERC.2014.12}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyberc/ChenZW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyberc/ChenZW14a, author = {Zhen Chen and Wenfang Zhang and Xiaomin Wang}, title = {A Robust Collaborative Threshold Authenticated Encryption Scheme Based on Message Blocking}, booktitle = {2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2014, Shanghai, China, October 13-15, 2014}, pages = {27--30}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CyberC.2014.15}, doi = {10.1109/CYBERC.2014.15}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cyberc/ChenZW14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isbast/LiuWZG14, author = {Wenyang Liu and Xiaomin Wang and Wenfang Zhang and Xianfeng Guo}, title = {A lightweight blockcipher based on chaotic maps}, booktitle = {2014 International Symposium on Biometrics and Security Technologies, {ISBAST} 2014, Kuala Lumpur, Malaysia, August 26-27, 2014}, pages = {150--155}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISBAST.2014.7013112}, doi = {10.1109/ISBAST.2014.7013112}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/isbast/LiuWZG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/WangZGZ13, author = {Xiaomin Wang and Wenfang Zhang and Wei Guo and Jiashu Zhang}, title = {Secure chaotic system with application to chaotic ciphers}, journal = {Inf. Sci.}, volume = {221}, pages = {555--570}, year = {2013}, url = {https://doi.org/10.1016/j.ins.2012.09.037}, doi = {10.1016/J.INS.2012.09.037}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/WangZGZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/WangGZKA13, author = {Xiaomin Wang and Wei Guo and Wenfang Zhang and Muhammad Khurram Khan and Khaled Alghathbar}, title = {Cryptanalysis and improvement on a parallel keyed hash function based on chaotic neural network}, journal = {Telecommun. Syst.}, volume = {52}, number = {2}, pages = {515--524}, year = {2013}, url = {https://doi.org/10.1007/s11235-011-9457-9}, doi = {10.1007/S11235-011-9457-9}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/WangGZKA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cma/ZhangZHF12, author = {Jianhua Zhang and Wenfang Zhang and Guolian Hou and Fang Fang}, title = {Dynamic modeling and multivariable control of organic Rankine cycles in waste heat utilizing processes}, journal = {Comput. Math. Appl.}, volume = {64}, number = {5}, pages = {908--921}, year = {2012}, url = {https://doi.org/10.1016/j.camwa.2012.01.054}, doi = {10.1016/J.CAMWA.2012.01.054}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cma/ZhangZHF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/swarm/ZhangZLH11, author = {Jianhua Zhang and Wenfang Zhang and Ying Li and Guolian Hou}, editor = {Ying Tan and Yuhui Shi and Yi Chai and Guoyin Wang}, title = {Controller Design for a Heat Exchanger in Waste Heat Utilizing Systems}, booktitle = {Advances in Swarm Intelligence - Second International Conference, {ICSI} 2011, Chongqing, China, June 12-15, 2011, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {6729}, pages = {379--386}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21524-7\_46}, doi = {10.1007/978-3-642-21524-7\_46}, timestamp = {Tue, 11 Jul 2023 08:21:51 +0200}, biburl = {https://dblp.org/rec/conf/swarm/ZhangZLH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GaoWZ11, author = {Li Gao and Xiaomin Wang and Wenfang Zhang}, title = {Chaotic Hash Function Based on Tandem-DM Construction}, booktitle = {{IEEE} 10th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, Changsha, China, 16-18 November, 2011}, pages = {1745--1749}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/TrustCom.2011.244}, doi = {10.1109/TRUSTCOM.2011.244}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GaoWZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/paciia/WangZ08, author = {Xiaomin Wang and Wenfang Zhang}, title = {An Efficient and Secure Biometric Remote User Authentication Scheme Using Smart Cards}, booktitle = {{PACIIA} 2008, Volume 2, 2008 {IEEE} Pacific-Asia Workshop on Computational Intelligence and Industrial Application, 19-20 December 2008, Wuhan, China}, pages = {913--917}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/PACIIA.2008.382}, doi = {10.1109/PACIIA.2008.382}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/paciia/WangZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/WangZZK07, author = {Xiaomin Wang and Wenfang Zhang and Jiashu Zhang and Muhammad Khurram Khan}, title = {Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {5}, pages = {507--512}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.11.005}, doi = {10.1016/J.CSI.2006.11.005}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/WangZZK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/WangZZ06, author = {Xiaomin Wang and Jiashu Zhang and Wenfang Zhang}, editor = {David Pointcheval and Yi Mu and Kefei Chen}, title = {Chaotic Keystream Generator Using Coupled NDFs with Parameter Perturbing}, booktitle = {Cryptology and Network Security, 5th International Conference, {CANS} 2006, Suzhou, China, December 8-10, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4301}, pages = {270--285}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935070\_19}, doi = {10.1007/11935070\_19}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cans/WangZZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.