default search action
Huaixi Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Zhijie Xie, Fan Shi, Min Zhang, Huimin Ma, Huaixi Wang, Zhenhan Li, Yunyi Zhang:
GuessFuse: Hybrid Password Guessing With Multi-View. IEEE Trans. Inf. Forensics Secur. 19: 4215-4230 (2024) - [c15]Yelai Feng, Huaixi Wang, Yining Zhu, Xiandong Liu, Hongyi Lu, Qing Liu:
DAWN: Matrix Operation-Optimized Algorithm for Shortest Paths Problem on Unweighted Graphs. ICS 2024: 1-13 - 2022
- [i4]Yelai Feng, Huaixi Wang, Hongyi Lu, Chao Chang, Lei Luo, Fang Yang:
A Novel Faster All-Pair Shortest Path Algorithm Based on the Matrix Multiplication for GPUs. CoRR abs/2208.04514 (2022) - 2021
- [c14]Xufeng Zhu, Nina Shu, Huaixi Wang, Tao Wu:
A distributed traffic classification model based on Federated Learning. BigCom 2021: 75-81 - [c13]Huaixi Wang, Chen Wang, Nina Shu, Zhao Niu, Chao Chang, Peijia Shen:
Independent or Correlative: When the Betweenness Centrality Encounters Degree in the Networks? ICCT 2021: 472-479 - [c12]Nina Shu, Huaixi Wang, Chen Wang, Xufeng Zhu, Chunlai Ma, Chao Chang:
Global Betweenness Identities in the Networks. ICCT 2021: 783-786 - 2020
- [c11]Huaixi Wang, Chen Wang, Nina Shu, Chunlai Ma, Fang Yang:
The Betweenness Identities and Their Applications. ICCT 2020: 1065-1069 - [c10]Huaixi Wang, Tao Ma, Chen Wang, Nina Shu, Jun Huang, Minzhi Wang:
The Bridge and Link Betweenness in the Networks. ICCT 2020: 1097-1101 - [c9]Fang Yang, Tao Ma, Huaixi Wang, Mingzhi Wang, Jixiang Shan:
Identification of Key Nodes Based on Integrating of Global and Local Information. ICCT 2020: 1315-1319 - [c8]Mingzhi Wang, Tao Ma, Tao Wu, Chao Chang, Fang Yang, Huaixi Wang:
Dependency-Aware Dynamic Task Scheduling in Mobile-Edge Computing. MSN 2020: 785-790
2010 – 2019
- 2019
- [c7]Zhao Niu, Tao Ma, Nina Shu, Huaixi Wang:
Identification of Critical Nodes in Ad Hoc Network Based on the Analysis of Network Partition. ICCT 2019: 1048-1052 - [c6]Huaixi Wang, Chen Wang, Nina Shu, Jun Huang:
A Practical Image Encryption Algorithm for Privacy Protection. ICCT 2019: 1611-1615 - 2018
- [j5]Lintao Liu, Yuliang Lu, Xuehu Yan, Huaixi Wang:
Greyscale-images-oriented progressive secret sharing based on the linear congruence equation. Multim. Tools Appl. 77(16): 20569-20596 (2018) - [j4]Wanmeng Ding, Kesheng Liu, Xuehu Yan, Huaixi Wang, Lintao Liu, Qinghong Gong:
An Image Secret Sharing Method Based on Matrix Theory. Symmetry 10(10): 530 (2018) - 2017
- [c5]Huaixi Wang, Nina Shu, Chen Wang, Jianxiong Chen:
A novel linear secret sharing scheme with multiple prime moduli. ICNC-FSKD 2017: 1689-1693 - 2011
- [j3]Yan Zhu, Huaixi Wang, Zexing Hu, Gail-Joon Ahn, Hongxin Hu:
Zero-knowledge proofs of retrievability. Sci. China Inf. Sci. 54(8): 1608-1617 (2011) - [j2]Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Huaixi Wang, Shan-Biao Wang:
Provably Secure Role-Based Encryption with Revocation Mechanism. J. Comput. Sci. Technol. 26(4): 697-710 (2011) - [c4]Yan Zhu, Huaixi Wang, Zexing Hu, Gail-Joon Ahn, Hongxin Hu, Stephen S. Yau:
Dynamic audit services for integrity verification of outsourced storages in clouds. SAC 2011: 1550-1557 - 2010
- [j1]Huaixi Wang, Yan Zhu, Rong-Quan Feng, Stephen S. Yau:
Attribute-Based Signature with Policy-and-Endorsement Mechanism. J. Comput. Sci. Technol. 25(6): 1293-1304 (2010) - [c3]Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Huaixi Wang:
Cryptographic role-based security mechanisms based on role-key hierarchy. AsiaCCS 2010: 314-319 - [c2]Yan Zhu, Huaixi Wang, Zexing Hu, Gail-Joon Ahn, Hongxin Hu, Stephen S. Yau:
Efficient provable data possession for hybrid clouds. CCS 2010: 756-758 - [c1]Yan Zhu, Zexing Hu, Huaixi Wang, Hongxin Hu, Gail-Joon Ahn:
A collaborative framework for privacy protection in online social networks. CollaborateCom 2010: 1-10 - [i3]Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Huaixi Wang:
Cryptographic Role-based Security Mechanisms based on Role-Key Hierarchy. IACR Cryptol. ePrint Arch. 2010: 188 (2010) - [i2]Yan Zhu, Huaixi Wang, Zexing Hu, Gail-Joon Ahn, Hongxin Hu, Stephen S. Yau:
Efficient provable data possession for hybrid clouds. IACR Cryptol. ePrint Arch. 2010: 234 (2010) - [i1]Yan Zhu, Zexing Hu, Huaixi Wang, Hongxin Hu, Gail-Joon Ahn:
A Collaborative Framework for Privacy Protection in Online Social Networks. IACR Cryptol. ePrint Arch. 2010: 491 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-20 20:42 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint