default search action
Yanfei Zheng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j4]Ziyi Qi, Tingyao Li, Jun Chen, Jason C. Yam, Yang Wen, Gengyou Huang, Hua Zhong, Mingguang He, Dan Zhu, Rongping Dai, Bo Qian, Jingjing Wang, Chaoxu Qian, Wei Wang, Yanfei Zheng, Jian Zhang, Xianglong Yi, Zheyuan Wang, Bo Zhang, Chunyu Liu, Tianyu Cheng, Xiaokang Yang, Jun Li, Yan-Ting Pan, Xiaohu Ding, Ruilin Xiong, Yan Wang, Yan Zhou, Dagan Feng, Sichen Liu, Linlin Du, Jinliuxing Yang, Zhuoting Zhu, Lei Bi, Jinman Kim, Fangyao Tang, Yuzhou Zhang, Xiujuan Zhang, Haidong Zou, Marcus Ang, Clement C. Tham, Carol Y. Cheung, Chi Pui Pang, Bin Sheng, Xiangui He, Xun Xu:
A deep learning system for myopia onset prediction and intervention effectiveness evaluation in children. npj Digit. Medicine 7(1) (2024)
2010 – 2019
- 2012
- [j3]Longbin Lai, Linfeng Shen, Yanfei Zheng, Kefei Chen, Jing Zhang:
Analysis for REPERA: A Hybrid Data Protection Mechanism in Distributed Environment. Int. J. Cloud Appl. Comput. 2(1): 71-82 (2012)
2000 – 2009
- 2009
- [j2]Mi Wen, Yanfei Zheng, Wen-jun Ye, Kefei Chen, Weidong Qiu:
A key management protocol with robust continuity for sensor networks. Comput. Stand. Interfaces 31(4): 642-647 (2009) - [j1]Mi Wen, Ling Dong, Yanfei Zheng, Kefei Chen:
Towards Provable Security for Data Transmission Protocols in Sensor Network. J. Inf. Sci. Eng. 25(1): 319-333 (2009) - [c7]Bo Zhu, Yanfei Zheng, Yaowei Zhou, Kefei Chen:
How to Break LU Matrix Based Key Predistribution Schemes for Wireless Sensor Networks. MASS 2009: 237-245 - [c6]Weidong Qiu, Yaowei Zhou, Bo Zhu, Yanfei Zheng, Mi Wen, Zheng Gong:
Key-Insulated Encryption Based Key Pre-distribution Scheme for WSN. ISA 2009: 200-209 - 2008
- [i1]Bo Zhu, Yanfei Zheng, Yaowei Zhou, Kefei Chen:
Cryptanalysis of LU Decomposition-based Key Pre-distribution Scheme for Wireless Sensor Networks. IACR Cryptol. ePrint Arch. 2008: 411 (2008) - 2007
- [c5]Mi Wen, Ling Dong, Yanfei Zheng, Kefei Chen:
A Framework for Proving the Security of Data Transmission Protocols in Sensor Network. PAISI 2007: 288-294 - [c4]Hui Li, Yanfei Zheng, Mi Wen, Kefei Chen:
A Secure Time Synchronization Protocol for Sensor Network. PAKDD Workshops 2007: 515-526 - [c3]Mi Wen, Yanfei Zheng, Hui Li, Kefei Chen:
A Hierarchical Composition of LU Matrix-Based Key Distribution Scheme for Sensor Networks. PAKDD Workshops 2007: 608-620 - [c2]Ling Dong, Kefei Chen, Mi Wen, Yanfei Zheng:
Protocol Engineering Principles for Cryptographic Protocols Design. SNPD (3) 2007: 641-646 - 2006
- [c1]Hui Li, Kefei Chen, Yanfei Zheng, Mi Wen:
A Locally Group Key Management with Revocation and Self-healing Capability for Sensor Networks. ICSNC 2006: 29
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint