default search action
Hang Li 0006
Person information
- affiliation: Shenyang Normal University, Software College, China
Other persons with the same name
- Hang Li — disambiguation page
- Hang Li 0001 — ByteDance, China (and 4 more)
- Hang Li 0002 — Hangzhou Dianzi University, School of Electronics and Information, China (and 2 more)
- Hang Li 0003 — Shenzhen Research Institute of Big Data, Shenzhen, Guangdong, China (and 2 more)
- Hang Li 0004 — Beijing University of Posts and Telecommunications, School of Information and Communication Engineering, China
- Hang Li 0005 — University of New South Wales, School of Electrical Engineering and Telecommunications, Sydney, NSW, Australia
- Hang Li 0007 — Michigan State University, East Lansing, MI, USA (and 1 more)
- Hang Li 0008 — Army Engineering University of PLA, PLAUST, College of Command and Control Engineering, Nanjing, China
- Hang Li 0009 — University of Queensland, IElab, Brisbane, Australia
- Hang Li 0010 — Ludwig Maximilian University of Munich, Munich, Germany (and 1 more)
- Hang Li 0011 — NEC Corporation, Kawasaki, Japan
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j31]Muhammad Ibrar, Shoulin Yin, Hang Li, Shahid Karim, Asif Ali Laghari:
Comprehensive review of emerging cybersecurity trends and developments. Int. J. Electron. Secur. Digit. Forensics 16(5): 633-647 (2024) - [j30]Shoulin Yin, Hang Li, Asif Ali Laghari, Thippa Reddy Gadekallu, Gabriel Avelino R. Sampedro, Ahmad S. Almadhor:
An Anomaly Detection Model Based on Deep Auto-Encoder and Capsule Graph Convolution via Sparrow Search Algorithm in 6G Internet of Everything. IEEE Internet Things J. 11(18): 29402-29411 (2024) - [j29]Shoulin Yin, Hang Li, Lin Teng, Asif Ali Laghari, Vania Vieira Estrela:
Attribute-based multiparty searchable encryption model for privacy protection of text data. Multim. Tools Appl. 83(15): 45881-45902 (2024) - 2023
- [j28]Asif Ali Laghari, Sana Shahid, Rahul Yadav, Shahid Karim, Awais Khan Jumani, Hang Li, Shoulin Yin:
The state of art and review on video streaming. J. High Speed Networks 29(3): 211-236 (2023) - [j27]Asif Ali Laghari, Hang Li, Shoulin Yin, Shahid Karim, Abdullah Ayub Khan, Muhammad Ibrar:
Blockchain applications for Internet of Things (IoT): A review. Multiagent Grid Syst. 19(4): 363-379 (2023) - [j26]Muhammad Ibrar, Shahid Karim, Shoulin Yin, Hang Li, Asif Ali Laghari:
Impact of Covid-19 epidemic on online learning and educational resources in China. EAI Endorsed Trans. Pervasive Health Technol. 9(1) (2023) - 2022
- [j25]Qingwu Shi, Shoulin Yin, Kun Wang, Lin Teng, Hang Li:
Multichannel convolutional neural network-based fuzzy active contour model for medical image segmentation. Evol. Syst. 13(4): 535-549 (2022) - 2021
- [j24]Shoulin Yin, Hang Li:
GSAPSO-MQC: medical image encryption based on genetic simulated annealing particle swarm optimization and modified quantum chaos system. Evol. Intell. 14(4): 1817-1829 (2021) - [j23]Shoulin Yin, Hang Li, Asif Ali Laghari, Shahid Karim, Awais Khan Jumani:
A Bagging Strategy-Based Kernel Extreme Learning Machine for Complex Network Intrusion Detection. EAI Endorsed Trans. Scalable Inf. Syst. 8(33): e8 (2021) - 2020
- [j22]Lin Teng, Hang Li, Shoulin Yin, Yang Sun:
A Modified Advanced Encryption Standard for Data Security. Int. J. Netw. Secur. 22(1): 112-117 (2020) - [j21]Lei Meng, Shoulin Yin, Chu Zhao, Hang Li, Yang Sun:
An Improved Image Encryption Algorithm Based on Chaotic Mapping and Discrete Wavelet Transform Domain. Int. J. Netw. Secur. 22(1): 155-160 (2020) - [j20]Chu Zhao, Shoulin Yin, Hang Li, Yang Sun:
Medical Image Encryption Based on Stream Cipher Algorithm and Krill Group. Int. J. Netw. Secur. 22(2): 314-320 (2020) - [j19]Jing Bi, Shoulin Yin, Hang Li, Lin Teng, Chu Zhao:
Research on Medical Image Encryption Method Based on Improved Krill Herb Algorithm and Chaotic Systems. Int. J. Netw. Secur. 22(3): 484-489 (2020) - [j18]Xiaowei Wang, Shoulin Yin, Hang Li, Jiachi Wang, Lin Teng:
A Network Intrusion Detection Method Based on Deep Multi-scale Convolutional Neural Network. Int. J. Wirel. Inf. Networks 27(4): 503-517 (2020) - [j17]Shoulin Yin, Hang Li, Desheng Liu, Shahid Karim:
Active contour modal based on density-oriented BIRCH clustering method for medical image segmentation. Multim. Tools Appl. 79(41-42): 31049-31068 (2020) - [j16]Shoulin Yin, Hang Li:
Hot Region Selection Based on Selective Search and Modified Fuzzy C-Means in Remote Sensing Images. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 13: 5862-5871 (2020)
2010 – 2019
- 2019
- [j15]Yang Sun, Shoulin Yin, Hang Li, Lin Teng, Shahid Karim:
GPOGC: Gaussian Pigeon-Oriented Graph Clustering Algorithm for Social Networks Cluster. IEEE Access 7: 99254-99262 (2019) - [j14]Yang Sun, Lin Teng, Shoulin Yin, Hang Li:
A new wolf colony search algorithm based on search strategy for solving travelling salesman problem. Int. J. Comput. Sci. Eng. 18(1): 1-11 (2019) - [j13]Jing Yu, Hang Li, Shoulin Yin:
New intelligent interface study based on K-means gaze tracking. Int. J. Comput. Sci. Eng. 18(1): 12-20 (2019) - [j12]Lin Teng, Hang Li:
CSDK: A Chi-square distribution-Kernel method for image de-noising under the Internet of things big data environment. Int. J. Distributed Sens. Networks 15(5) (2019) - [j11]Shoulin Yin, Hang Li, Lin Teng:
A Novel Proxy Re-encryption Scheme Based on Identity Property and Stateless Broadcast Encryption Under Cloud Environment. Int. J. Netw. Secur. 21(5): 797-803 (2019) - [j10]Shoulin Yin, Hang Li, Lin Teng:
A New Chi-square Distribution De-noising Method for Image Encryption. Int. J. Netw. Secur. 21(5): 804-811 (2019) - [j9]Yang Sun, Shoulin Yin, Hang Li:
A New Wavelet Threshold Function Based on Gaussian Kernel Function for Image De-noising. J. Inf. Hiding Multim. Signal Process. 10(1): 91-101 (2019) - [c6]Jiachi Wang, Hang Li, Shoulin Yin, Yang Sun:
Research on Improved Pedestrian Detection Algorithm Based on Convolutional Neural Network. iThings/GreenCom/CPSCom/SmartData 2019: 254-258 - 2018
- [j8]Lin Teng, Hang Li, Shoulin Yin:
Modified pyramid dual tree direction filter-based image denoising via curvature scale and nonlocal mean multigrade remnant filter. Int. J. Commun. Syst. 31(16) (2018) - [j7]Lin Teng, Hang Li, Jie Liu, Shoulin Yin:
An Efficient and Secure Cipher-Text Retrieval Scheme Based on Mixed Homomorphic Encryption and Multi-Attribute Sorting Method. Int. J. Netw. Secur. 20(5): 872-878 (2018) - [j6]Lin Teng, Hang Li:
A High-efficiency Discrete Logarithm-based Multi-proxy Blind Signature Scheme via Elliptic Curve and Bilinear Mapping. Int. J. Netw. Secur. 20(6): 1200-1205 (2018) - [j5]Lin Teng, Hang Li:
A New Frog Leaping Algorithm Based on Simulated Annealing and Immunization Algorithm for Low-power Mapping in Network-on-chip. J. Inf. Hiding Multim. Signal Process. 9(3): 716-722 (2018) - [j4]Yue Zhao, Hang Li, Shoulin Yin, Yang Sun:
A New Chinese Word Segmentation Method Based on Maximum Matching. J. Inf. Hiding Multim. Signal Process. 9(6): 1528-1535 (2018) - 2017
- [j3]Jie Liu, Shoulin Yin, Hang Li, Lin Teng:
A Density-based Clustering Method for K-anonymity Privacy Protection. J. Inf. Hiding Multim. Signal Process. 8(1): 12-18 (2017) - [j2]Hang Li, Shoulin Yin, Chu Zhao, Lin Teng:
A Proxy Re-Encryption Scheme Based on Elliptic Curve Group. J. Inf. Hiding Multim. Signal Process. 8(1): 218-227 (2017) - [c5]Yang Sun, Lin Teng, Shoulin Yin, Jie Liu, Hang Li:
Study a Join Query Strategy Over Data Stream Based on Sliding Windows. DMBD 2017: 334-342 - 2016
- [j1]Shoulin Yin, Hang Li, Jie Liu:
A New Provable Secure Certificateless Aggregate Signcryption Scheme. J. Inf. Hiding Multim. Signal Process. 7(6): 1274-1281 (2016)
2000 – 2009
- 2009
- [c4]Jing Bi, Kai Song, Hang Li:
Application of IP Multicast Technology in Computer Laboratory Teaching System. HIS (2) 2009: 199-202 - [c3]Jing Bi, Kai Song, Hang Li:
The Level Filling Algorithm for Clockwise Edge. HIS (3) 2009: 425-427 - [c2]Hang Li, Xuehua Yang:
Distributed Hierarchical Fault Management Paradigms of Satellite Network. PACCS 2009: 159-162 - 2007
- [c1]Hang Li, Jie Liu, Jing Bi:
Fault Tolerant Reconstruction Algorithm Based on Distributed Agents for Network Management. IIH-MSP 2007: 79-82
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-14 00:52 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint