default search action
Yao Hao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Yuxiang Chen, Yao Hao, Zhongqiang Yi, Xiaoyu Guo, Chunxiang Xu:
BCS: Blockchain-based Ciphertext Storage Scheme Supporting Data Hierarchical Management. J. Inf. Sci. Eng. 40(1): 1-26 (2024) - [i2]Zehao Dong, Yixin Chen, Hiram Gay, Yao Hao, Geoffrey D. Hugo, Pamela Samson, Tianyu Zhao:
Large-Language-Model Empowered Dose Volume Histogram Prediction for Intensity Modulated Radiotherapy. CoRR abs/2402.07167 (2024) - 2023
- [j6]Yuxiang Chen, Guishan Dong, Chunxiang Xu, Yao Hao, Yue Zhao:
EStore: A User-Friendly Encrypted Storage Scheme for Distributed File Systems. Sensors 23(20): 8526 (2023) - [j5]Lu Xu, Christopher P. Pacia, Yan Gong, Zhongtao Hu, Chih-Yen Chien, Leqi Yang, H. Michael Gach, Yao Hao, Hassanzadeh Comron, Jiayi Huang, Eric C. Leuthardt, Hong Chen:
Characterization of the Targeting Accuracy of a Neuronavigation-Guided Transcranial FUS System In Vitro, In Vivo, and In Silico. IEEE Trans. Biomed. Eng. 70(5): 1528-1538 (2023) - [c15]Yao Hao, Zhiqiu Huang, Hongjing Guo, Guohua Shen:
Test Input Selection for Deep Neural Network Enhancement Based on Multiple-Objective Optimization. SANER 2023: 534-545 - [i1]Xiyao Jin, Yao Hao, Jessica Hilliard, Zhehao Zhang, Maria A. Thomas, Hua Li, Abhinav K. Jha, Geoffrey D. Hugo:
A quality assurance framework for real-time monitoring of deep learning segmentation models in radiotherapy. CoRR abs/2305.11715 (2023) - 2022
- [j4]Jingwei Li, Suyu Huang, Yanjing Ren, Zuoru Yang, Patrick P. C. Lee, Xiaosong Zhang, Yao Hao:
Enabling Secure and Space-Efficient Metadata Management in Encrypted Deduplication. IEEE Trans. Computers 71(4): 959-970 (2022) - [c14]Yuxiang Chen, Yao Hao, Zhongqiang Yi, Xiaoyu Guo, Chunxiang Xu:
Ciphertext storage scheme supporting data hierarchical management and control. NaNA 2022: 205-212 - 2021
- [j3]Yiming Liu, Qi Zeng, Yue Zhao, Kaijun Wu, Yao Hao:
Novel channel-hopping pattern-based wireless IoT networks in smart cities for reducing multi-access interference and jamming attacks. EURASIP J. Wirel. Commun. Netw. 2021(1): 152 (2021) - [c13]Yuxiang Chen, Yao Hao, Zhongqiang Yi, Kaijun Wu, Qi Zhao, Xue Wang:
Searchable Encryption System for Big Data Storage. ICPCSEE (2) 2021: 139-150 - [c12]Yuxiang Chen, Yao Hao, Kaijun Wu, Zhongqiang Yi, Haiyang Peng, Sijie Liao:
Research on Data Security of Unmanned Aerial Vehicles. NaNA 2021: 186-193 - [c11]Yue Zhao, Yarang Yang, Yiru Niu, Dongyu Yang, Bo Tian, Yao Hao, Kaijun Wu:
The Cooperative Authentication Mechanism and Performance Evaluation for Unmanned Systems. NaNA 2021: 212-216 - 2020
- [c10]Yuxiang Chen, Jian Bai, Yao Hao, Sijie Liao, Zhongqiang Yi, Hao Zhang:
Blockchain-based Dynamic Group Management for Multiple Keywords Searchable Encryption Technology. CyberC 2020: 1-6 - [c9]Guishan Dong, Yuxiang Chen, Yao Hao, Jian Bai, Zhaolei Zhang, Sijie Liao:
A Unified Trust Service Scheme for Heterogeneous Identity Alliance. NaNA 2020: 167-173 - [c8]Kaijun Wu, Anjie Peng, Yao Hao, Qi Zhao:
Adversarial Examples Detection Using Random Projections of Residuals. NaNA 2020: 282-285 - [c7]Bo Tian, Kaijun Wu, Yao Hao, Xue Wang, Hao Zhang, Dongyu Yang:
Optimal Asynchronous FHMA System with Generalized Orthogonal Hopping Patterns. NaNA 2020: 286-291 - [c6]Haiyang Peng, Guishan Dong, Yao Hao, Yue Zhao, Yuxiang Chen:
Searchable encryption scheme with limited search scope for group users. NaNA 2020: 430-435
2010 – 2019
- 2019
- [j2]Guishan Dong, Yuxiang Chen, Jia Fan, Yao Hao, Feng Li:
区块链应用中的隐私保护策略研究 (Research on Privacy Protection Strategies in Blockchain Application). 计算机科学 46(5): 29-35 (2019) - [c5]Jia Fan, Zhen Wang, Yili Luo, Jian Bai, Yarong Li, Yao Hao:
A new stealth address scheme for blockchain. ACM TUR-C 2019: 67:1-67:7 - [c4]Yuxiang Chen, Guishan Dong, Jian Bai, Yao Hao, Feng Li, Haiyang Peng:
Trust Enhancement Scheme for Cross Domain Authentication of PKI System. CyberC 2019: 103-110 - [c3]Yuxiang Chen, Guishan Dong, Yao Hao, Zhaolei Zhang, Haiyang Peng, Shui Yu:
An Open Identity Authentication Scheme Based on Blockchain. ICA3PP (1) 2019: 421-438 - [c2]Guishan Dong, Yuxiang Chen, Yao Hao, Zhaolei Zhang, Peng Zhang, Shui Yu:
Tiger Tally: Cross-Domain Scheme for Different Authentication Mechanism. ICA3PP (1) 2019: 533-549 - 2018
- [j1]Guishan Dong, Yuxiang Chen, Zhaolei Zhang, Jian Bai, Yao Hao:
基于区块链的身份管理认证研究 (Research on Identity Management Authentication Based on Blockchain). 计算机科学 45(11): 52-59 (2018) - [c1]Guishan Dong, Yuxiang Chen, Jia Fan, Dijun Liu, Yao Hao, Zhen Wang:
A Privacy-User-Friendly Scheme for Wearable Smart Sensing Devices Based on Blockchain. MASS 2018: 481-486
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint