default search action
Yanqin Zhu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Yali Bai, Chenwei Nie, Xun Yu, Mingyue Gou, Shuaibing Liu, Yanqin Zhu, Tiantian Jiang, Xiao Jia, Yadong Liu, Fei Nan, Liming Li, Bedir Tekinerdogan, Yang Song, Qingzhi Liu, Xiuliang Jin:
Comprehensive analysis of hyperspectral features for monitoring canopy maize leaf spot disease. Comput. Electron. Agric. 225: 109350 (2024)
2010 – 2019
- 2018
- [j12]Weiwei Ding, Jin Wang, Xiumin Wang, Kejie Lu, Ruimin Zhao, Yanqin Zhu:
On the optimal flow allocation and information theoretically secure network coding design for multiple multicasts. Int. J. Commun. Syst. 31(6) (2018) - [j11]Baishen Li, Lingzhi Li, Yong Sun, Yanqin Zhu:
基于伪梯度提升决策树的内网防御算法 (Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree). 计算机科学 45(4): 157-162 (2018) - [c29]Yanfei Wu, Yanqin Zhu, Zhe Yang:
Research of Node Incentive Strategy in Selfish Opportunistic Network. ICIS 2018: 525-530 - [c28]Jiaye Shao, Yanqin Zhu, Qijin Ji:
Secure Online/Offline Multi-Authority Attribute-Based Encryption for Resource-Constrained Devices in Cloud Computing. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 642-649 - 2017
- [c27]Jiaye Shao, Yanqin Zhu, Qijin Ji:
Privacy-preserving online/offline and outsourced multi-authority attribute-based encryption. ICIS 2017: 285-291 - [c26]Zhijian Wang, Yanqin Zhu:
Intrusion Detection System Based on Gaussian Mixture Model Using Hadoop Framework. ACIT/CSII/BCD 2017: 125-130 - [c25]Weiwei Ding, Jin Wang, Kejie Lu, Ruimin Zhao, Xiumin Wang, Yanqin Zhu:
Optimal Cache Management and Routing for Secure Content Delivery in Information-Centric Networks with Network Coding. ISPA/IUCC 2017: 267-274 - [c24]Jiaye Shao, Yanqin Zhu, Qijin Ji:
Efficient Decentralized Attribute-Based Encryption with Outsourced Computation for Mobile Cloud Computing. ISPA/IUCC 2017: 417-422 - [c23]Zhijian Wang, Yanqin Zhu:
A centralized HIDS framework for private cloud. SNPD 2017: 115-120 - [c22]Yanfei Wu, Yanqin Zhu, Zhe Yang:
Routing algorithm based on ant colony optimization for mobile social network. SNPD 2017: 297-302 - 2016
- [j10]Lingzhi Li, Zhe Yang, Jin Wang, Shukui Zhang, Yanqin Zhu:
Network coding with crowdsourcing-based trajectory estimation for vehicular networks. J. Netw. Comput. Appl. 64: 204-215 (2016) - [c21]Ruimin Zhao, Jin Wang, Kejie Lu, Xiangmao Chang, Lingzhi Li, Yanqin Zhu:
Optimal Transmission Topology Construction and Secure Linear Network Coding Design for Multicast with Integral Link Rates. HPCC/SmartCity/DSS 2016: 967-974 - [c20]Zhengqing Wen, Jin Wang, Kejie Lu, Jingya Zhou, Zhenguo Gao, Yanqin Zhu:
Optimal Rate Allocation and Linear Network Coding Design for Secure Multicast with Multiple Streams. HPCC/SmartCity/DSS 2016: 1037-1044 - [c19]Weiwei Ding, Jin Wang, Xiumin Wang, Ruimin Zhao, Yanqin Zhu:
Optimal Flow Allocation and Linear Network Coding Design for Multiple Multicasts under the Requirements of Information Theoretical Security. Trustcom/BigDataSE/ISPA 2016: 576-583 - [c18]Chengjin Jia, Jin Wang, Yanqin Zhu, Zhengqing Wen, Juncheng Jia:
Joint Selection of Providers and the New Comer for Optimal Repair in Distributed Storage Network with Network Coding. Trustcom/BigDataSE/ISPA 2016: 1567-1574 - 2015
- [j9]Jin Wang, Kejie Lu, Shukui Zhang, Jianxi Fan, Yanqin Zhu, Baolei Cheng:
An efficient communication relay placement algorithm for content-centric wireless mesh networks. Int. J. Commun. Syst. 28(2): 262-280 (2015) - [j8]Chang Zhu, Yanqin Zhu, Lingzhi Li:
Network Coding-Based Real-Time Retransmission Scheme in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 11: 536247:1-536247:7 (2015) - [j7]Chang Zhu, Jianguo Xu, Yanqin Zhu, Lingzhi Li:
Semi-progressive Network Coding Algorithm on Multi-core Processor. J. Comput. 10(1): 24-33 (2015) - [c17]Chengjin Jia, Jin Wang, Yanqin Zhu, Xin Wang, Kejie Lu, Xiumin Wang, Zhengqing Wen:
On the Optimal Provider Selection for Repair in Distributed Storage System with Network Coding. ICA3PP (4) 2015: 506-520 - 2014
- [c16]Qinqin Wang, Yanqin Zhu, Xizhao Luo:
Multi-user Searchable Encryption with Coarser-Grained Access Control without Key Sharing. CCBD 2014: 119-125 - [c15]Junsheng Wang, Jin Wang, Yanqin Zhu, Chengjin Jia:
An Efficient Short Null Keys Based Scheme for Securing Network Coding Against Pollution Attacks. ICoC 2014: 16-31 - [c14]Qijin Ji, Haifeng Shen, Yuqing Mao, Yanqin Zhu:
Stimulating High Quality Social Media through Knowledge Barter-Auctioning. SocialCom 2014: 4:1-4:8 - [c13]Qijin Ji, Haifeng Shen, Yuqing Mao, Yanqin Zhu:
Knowledge Barter-Auctioning: An Incentive for Quality of User-Generated Content in Online Communities. SocialCom 2014: 20:1-20:2 - 2013
- [j6]Lingzhi Li, Shukui Zhang, Zhe Yang, Yanqin Zhu:
Data Dissemination in Mobile Wireless Sensor Network Using Trajectory-Based Network Coding. Int. J. Distributed Sens. Networks 9 (2013) - [j5]Lingzhi Li, Shukui Zhang, Yanqin Zhu, Zhe Yang:
MCNC: Data Aggregation and Dissemination in Vehicular Ad hoc Networks Using Multicast Network Coding. Int. J. Distributed Sens. Networks 9 (2013) - [j4]Zhe Yang, Lingzhi Li, Shukui Zhang, Yong Sun, Yanqin Zhu:
Improved Message Diffusion Model for Node Coverage Problem of Ad Hoc Network Based on Node Visit Times. Int. J. Distributed Sens. Networks 9 (2013) - [j3]Yanqin Zhu, Haojun Zhang, Qijin Ji:
How Much Delay Has to Be Tolerated in a Mobile Social Network? Int. J. Distributed Sens. Networks 9 (2013) - [c12]Juan Zhang, Yanqin Zhu, Fangyuan Jin:
Practical and Secure Outsourcing of Linear Algebra in the Cloud. CBD 2013: 81-87 - [c11]Junsheng Wang, Jin Wang, Yanqin Zhu, Kejie Lu:
SNKC: An Efficient On-the-Fly Pollution Detection Scheme for Content Distribution with Network Coding. HPCC/EUC 2013: 2298-2305 - [c10]Guilin Wang, Haojun Zhang, Yanqin Zhu, Qijin Ji, Haifeng Shen:
Nash bargaining between friends for cooperative data distribution in a social peer-to-peer swarming system. ICMLC 2013: 1490-1495 - 2012
- [j2]Jin Wang, Xiumin Wang, Shukui Zhang, Yanqin Zhu, Juncheng Jia:
An Efficient Reliable Communication Scheme in Wireless Sensor Networks Using Linear Network Coding. Int. J. Distributed Sens. Networks 8 (2012) - [j1]Zhe Yang, Lingzhi Li, Qijin Ji, Yanqin Zhu:
Cocktail method for BitTorrent traffic identification in real time. J. Comput. 7(1): 85-95 (2012) - [c9]Yanqin Zhu, Jianjun Bian, Qijin Ji, Haojun Zhang:
Admission Control Strategy of Serving Peers in P2P VoD Systems. SNPD 2012: 49-53 - 2010
- [c8]Xizhao Luo, Peide Qian, Yanqin Zhu, Shangping Wang:
Leakage-resilient identity-based encryption scheme. NCM 2010: 324-329 - [c7]Zhe Yang, Lingzhi Li, Qijin Ji, Yanqin Zhu:
An Omnibus Identification of BitTorrent Traffic in a Stub Network. PAAP 2010: 346-353
2000 – 2009
- 2008
- [c6]Lei Wang, Yanqin Zhu, Lanfang Jin, Xizhao Luo:
Trust Mechanism in Distributed Access Control Model of P2P Networks. ACIS-ICIS 2008: 19-24 - 2007
- [c5]Ping Han, Yanqin Zhu, Yuemei Hu:
Design of Multi-signature Scheme in Wireless Networks. ACIS-ICIS 2007: 247-251 - [c4]Yueqin Liu, Yanqin Zhu, Yan Liu:
Design of PMI Supporting Self-administrative Sub-role Based Delegation. IMECS 2007: 1356-1360 - 2006
- [c3]Yanqin Zhu, Jiweni Yang, Qiaoming Zhu:
Enhancing Undergraduates' Capabilities of Practice and Innovation to Meet the Regional Needs. ACIS-ICIS 2006: 305-309 - [c2]Yanqin Zhu, Peide Qian, Yueqin Liu:
A Role-based PMI Authentication Model and its Application. SNPD 2006: 407-412 - 2005
- [c1]Yanqin Zhu, Fanzhang Li, Yuemei Hu:
The design and application of dynamic fuzzy expert database system. GrC 2005: 378-381
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-08 20:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint