default search action
Qixiang Mei
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Xiuchun Xiao, Chengze Jiang, Qixiang Mei, Yudong Zhang:
Noise-tolerate and adaptive coefficient zeroing neural network for solving dynamic matrix square root. CAAI Trans. Intell. Technol. 9(1): 167-177 (2024) - 2021
- [j7]Jiahao Wu, Chengze Jiang, Baitao Chen, Qixiang Mei, Xiuchun Xiao:
Solving Time-Varying Complex-Valued Sylvester Equation via Adaptive Coefficient and Non-Convex Projection Zeroing Neural Network. IEEE Access 9: 135890-135898 (2021) - [j6]Youxia Dong, Xiaoling Huang, Qixiang Mei, Yuanju Gan:
Self-Adaptive Image Encryption Algorithm Based on Quantum Logistic Map. Secur. Commun. Networks 2021: 6674948:1-6674948:12 (2021) - [c10]Kaixin Jiao, Guodong Ye, Qixiang Mei:
Image Encryption Scheme Based on Quantum Logistic Map and Cellular Automata. ICCCS 2021: 375-379
2010 – 2019
- 2019
- [j5]Ajin Zou, Rui Deng, Qixiang Mei, Lang Zou:
Fault diagnosis of a transformer based on polynomial neural networks. Clust. Comput. 22(Supplement): 9941-9949 (2019) - [j4]Jiacun Liu, Guiyan Zhao, Qixiang Mei:
迭代学习控制的最优学习律和简化学习律的频域研究 (Study of Optimal Learning Law and Simplified Learning Law of Iterative Learning Control in Frequency Domain). 计算机科学 46(2): 327-332 (2019) - 2016
- [j3]Xianping Mao, Junzuo Lai, Qixiang Mei, Kefei Chen, Jian Weng:
Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption. IEEE Trans. Dependable Secur. Comput. 13(5): 533-546 (2016) - 2015
- [j2]Haixia Xu, Bao Li, Qixiang Mei:
Complementary witness soundness for witness indistinguishable proof system and CCA2 public-key encryption schemes. Int. J. Inf. Comput. Secur. 7(1): 14-38 (2015) - [j1]Xianping Mao, Junzuo Lai, Kefei Chen, Jian Weng, Qixiang Mei:
Efficient revocable identity-based encryption from multilinear maps. Secur. Commun. Networks 8(18): 3511-3522 (2015) - 2014
- [c9]Dingding Jia, Bao Li, Xianhui Lu, Qixiang Mei:
Related Key Secure PKE from Hash Proof Systems. IWSEC 2014: 250-265 - 2013
- [c8]Dingding Jia, Bao Li, Yamin Liu, Qixiang Mei:
Improving the Message-Ciphertext Rate of Lewko's Fully Secure IBE Scheme. ISPEC 2013: 105-116 - [c7]Dingding Jia, Xianhui Lu, Bao Li, Qixiang Mei:
RKA Secure PKE Based on the DDH and HR Assumptions. ProvSec 2013: 271-287 - [i3]Dingding Jia, Bao Li, Yamin Liu, Qixiang Mei:
Improving the Message-ciphertext Rate of Lewko's Fully Secure IBE Scheme. IACR Cryptol. ePrint Arch. 2013: 159 (2013) - 2012
- [c6]Haixia Xu, Bao Li, Qixiang Mei:
Complementary Witness Soundness Witness Indistinguishable Proof System and CCA2 Public-Key Encryption Schemes. INCoS 2012: 270-278 - [c5]Xianhui Lu, Bao Li, Qixiang Mei, Yamin Liu:
Improved Efficiency of Chosen Ciphertext Secure Encryption from Factoring. ISPEC 2012: 34-45 - 2011
- [c4]Xianhui Lu, Bao Li, Qixiang Mei, Yamin Liu:
Improved Tradeoff between Encapsulation and Decapsulation of HK09. Inscrypt 2011: 131-141 - [c3]Qixiang Mei, Bao Li, Xianhui Lu, Dingding Jia:
Chosen Ciphertext Secure Encryption under Factoring Assumption Revisited. Public Key Cryptography 2011: 210-227 - [c2]Xianhui Lu, Bao Li, Qixiang Mei, Haixia Xu:
Key-Dependent Message Security for Division Function: Discouraging Anonymous Credential Sharing. ProvSec 2011: 297-308 - 2010
- [i2]Qixiang Mei, Bao Li, Xianhui Lu, Dingding Jia:
Chosen Ciphertext Secure Encryption over Semi-smooth Subgroup. IACR Cryptol. ePrint Arch. 2010: 172 (2010)
2000 – 2009
- 2005
- [c1]Xavier Boyen, Qixiang Mei, Brent Waters:
Direct chosen ciphertext security from identity-based techniques. CCS 2005: 320-329 - [i1]Xavier Boyen, Qixiang Mei, Brent Waters:
Direct Chosen Ciphertext Security from Identity-Based Techniques. IACR Cryptol. ePrint Arch. 2005: 288 (2005)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint