Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Chunzhi
    Last name: Wang
    DBLP: 35/1681
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 25 of 34  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Na Deng, Xu Chen, Ou Ruan, Chunzhi Wang, Zhiwei Ye, Jingbai Tian.
    PaEffExtr: A Method to Extract Effect Statements Automatically from Patents.
    Complex, Intelligent, and Software Intensive Systems - Proceedings of the 11th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS-2017), Torino, Italy, July 10-12, 2017 2018 (0) 2017
    Conference paper
    Na Deng, Xu Chen, Ou Ruan, Chunzhi Wang, Zhiwei Ye, Jingbai Tian.
    The Construction Method of Clue Words Thesaurus in Chinese Patents Based on Iteration and Self-filtering.
    Advances in Internetworking, Data Web Technologies, The 5th International Conference on Emerging Internetworking, Data Web Technologies, EIDWT-2017, Wuhan, China, June 10-11, 2017. 2018 (0) 2017
    Conference paper
    Lingyu Yan, Fuhao Zou, Rui Guo, Lianli Gao, Ke Zhou, Chunzhi Wang.
    Feature aggregating hashing for image copy detection.
    World Wide Web 2016, Volume 19 (0) 2016
    Conference paper
    Chunzhi Wang, Gang Zhang, Hui Xu, Hongwei Chen.
    An ACO-based Link Load-Balancing Algorithm in SDN.
    7th International Conference on Cloud Computing and Big Data, CCBD 2016, Macau, China, November 16-18, 2016 2016 (0) 2016
    Conference paper
    Chunzhi Wang, Ming Hu, Hongwei Chen.
    Energy Saving of Elevator Group under Up-Peak Flow Based on Geese-PSO.
    7th International Conference on Cloud Computing and Big Data, CCBD 2016, Macau, China, November 16-18, 2016 2016 (0) 2016
    Conference paper
    Xinlu Zong, Yingli Jiang, Chunzhi Wang.
    Evacuation Behaviors and Link Selection Strategy Based on Artificial Fish Swarm Algorithm.
    7th International Conference on Cloud Computing and Big Data, CCBD 2016, Macau, China, November 16-18, 2016 2016 (0) 2016
    Journal article
    Chunhua Pan, Shunpeng Li, Qihui Zhu, Chunzhi Wang, Mingwu Zhang.
    Notes on Proxy Signcryption and Multi-proxy Signature Schemes.
    I. J. Network Security 2015, Volume 17 (0) 2015
    Conference paper
    Mingwu Zhang, Chunzhi Wang, Tsuyoshi Takagi, Yi Mu.
    Functional Encryption Resilient to Hard-to-Invert Leakage.
    Comput. J. 2015, Volume 58 (0) 2015
    Conference paper
    Lingyu Yan, Hefei Ling, Dengpan Ye, Chunzhi Wang, Zhiwei Ye, Hongwei Chen.
    Feature Fusion based Hashing for Large Scale Image Copy Detection.
    Int. J. Computational Intelligence Systems 2015, Volume 8 (0) 2015
    Conference paper
    Chunzhi Wang, Dongyang Yu, Hongwei Chen, Hui Xu.
    Applying Bayesian Trust Sampling to P2P Traffic Inspection.
    Control and Intelligent Systems 2015, Volume 43 (0) 2015
    Conference paper
    Chunzhi Wang, Yanmei Zhang.
    New Authentication Scheme for Wireless Body Area Networks Using the Bilinear Pairing.
    J. Medical Systems 2015, Volume 39 (0) 2015
    Conference paper
    Chunzhi Wang, Huili Zhang, Zhiwei Ye, Yuanli Du.
    A peer to peer traffic identification method based on support vector machine and artificial bee colony algorithm.
    IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, IDAACS 2015, Warsaw, Poland, September 24-26, 2015 2015 (0) 2015
    Conference paper
    Chunzhi Wang, Huili Zhang, Zhiwei Ye.
    A peer to peer traffic identification method based on wavelet and particle swarm optimization algorithm.
    IJWMIP 2015, Volume 13 (0) 2015
    Journal article
    Zhenhua Chen, Shundong Li, Chunzhi Wang, Mingwu Zhang.
    Comments on FHH Anonymous Multireceiver Encryption.
    I. J. Network Security 2014, Volume 16 (0) 2014
    Journal article
    Min Zhou, Mingwu Zhang, Chunzhi Wang, Bo Yang 0003.
    CCLAS: A Practical and Compact Certificateless Aggregate Signature with Share Extraction.
    I. J. Network Security 2014, Volume 16 (0) 2014
    Conference paper
    Zhenhua Chen, Shundong Li, Chunzhi Wang, Mingwu Zhang.
    Comments on FHH Anonymous Multireceiver Encryption.
    I. J. Network Security 2014, Volume 16 (0) 2014
    Conference paper
    Chunzhi Wang, Shuping Wang, Hui Xu, Hongwei Chen.
    A P2P Traffic Management Model Based on an ISP Game.
    JCP 2014, Volume 9 (0) 2014
    Journal article
    Chunzhi Wang, Shuping Wang, Hongwei Chen.
    A LRU-Based Query Algorithm for Gnutella Networks.
    Control and Intelligent Systems 2014, Volume 42 (0) 2014
    Conference paper
    Mingwu Zhang, Chunzhi Wang, Kirill Morozov.
    LR-FEAD: leakage-tolerating and attribute-hiding functional encryption mechanism with delegation in affine subspaces.
    The Journal of Supercomputing 2014, Volume 70 (0) 2014
    Conference paper
    Mingwu Zhang, Bo Yang 0003, Chunzhi Wang, Tsuyoshi Takagi.
    Unbounded anonymous hierarchical IBE with continual-key-leakage tolerance.
    Security and Communication Networks 2014, Volume 7 (0) 2014
    Conference paper
    Mingwu Zhang, Chunzhi Wang, Bo Yang, Tsuyoshi Takagi.
    Fully secure constructions of spatial encryption with vector privacy.
    Int. J. Communication Systems 2014, Volume 27 (0) 2014
    Conference paper
    Chunzhi Wang, Dongyang Yu, Hui Xu, Hongwei Chen.
    A Bayesian trust sampling method for P2P traffic inspection.
    Proceedings IEEE International Conference on Security, Pattern Analysis, and Cybernetics, SPAC 2014, Wuhan, China, October 18-19, 2014 2014 (0) 2014
    Conference paper
    Zhiwei Ye, Mingwei Wang, Chunzhi Wang, Hui Xu.
    P2P Traffic Identification Using Support Vector Machine and Cuckoo Search Algorithm Combined with Particle Swarm Optimization Algorithm.
    Frontiers in Internet Technologies - Third CCF Internet Conference of China, ICoC 2014, Shanghai, China, July 10-11, 2014, Revised Selected Papers 2015 (0) 2014
    Conference paper
    Mingwu Zhang, Wei Shi, Chunzhi Wang, Zhenhua Chen, Yi Mu.
    Leakage-resilient Attribute-based Encryptions with Fast Decryption: Model, Analysis and Construction.
    IACR Cryptology ePrint Archive 2013, Volume 2013 (0) 2013
    Conference paper
    Mingwu Zhang, Wei Shi, Chunzhi Wang, Zhenhua Chen, Yi Mu.
    Leakage-Resilient Attribute-Based Encryption with Fast Decryption: Models, Analysis and Constructions.
    Information Security Practice and Experience - 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013. Proceedings 2013 (0) 2013
    Show item 1 to 25 of 34  

    Your query returned 34 matches in the database.