default search action
Lihua Liu
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j55]Xiongtao Zhang, Ji Wang, Weidong Bao, Wenhua Xiao, Yaohong Zhang, Lihua Liu:
Self-adaptive asynchronous federated optimizer with adversarial sharpness-aware minimization. Future Gener. Comput. Syst. 161: 638-654 (2024) - [j54]Lihua Liu, Zhen Ke, Jiankai Li, Xiaojun Liu, Guangyou Fang:
Turn-Off Current and TEM Field Based on Distributed Capacitance Model of Multiple Coils in Helicopter Transient Electromagnetic System. IEEE Trans. Ind. Electron. 71(1): 1028-1036 (2024) - [c37]Mengna Zhu, Kaisheng Zeng, Jibing Wu, Lihua Liu, Hongbin Huang, Lei Hou, Juanzi Li:
LC4EE: LLMs as Good Corrector for Event Extraction. ACL (Findings) 2024: 12028-12038 - [c36]Jibing Wu, Ningchao Ge, Tengyun Wang, Xuan Li, Lihua Liu, Hongbin Huang:
FedPPQs: Optimizing Property Path Queries Evaluation over Federated RDF Systems. APWeb/WAIM (5) 2024: 347-351 - [c35]Jiehong Lin, Lihua Liu, Dekun Lu, Kui Jia:
SAM-6D: Segment Anything Model Meets Zero-Shot 6D Object Pose Estimation. CVPR 2024: 27906-27916 - [c34]Yuzhen Li, Zehang Deng, Yuxin Cao, Lihua Liu:
GRFormer: Grouped Residual Self-Attention for Lightweight Single Image Super-Resolution. ACM Multimedia 2024: 9378-9386 - [i79]Yuzhen Li, Zehang Deng, Yuxin Cao, Lihua Liu:
GRFormer: Grouped Residual Self-Attention for Lightweight Single Image Super-Resolution. CoRR abs/2408.07484 (2024) - [i78]Zhengjun Cao, Lihua Liu:
A note on "intelligent drone-assisted robust lightweight multi-factor authentication for military zone surveillance in the 6G era". IACR Cryptol. ePrint Arch. 2024: 13 (2024) - [i77]Zhengjun Cao, Lihua Liu:
The Practical Advantage of RSA over ECC and Pairings. IACR Cryptol. ePrint Arch. 2024: 608 (2024) - [i76]Zhengjun Cao, Lihua Liu:
A note on "a lightweight mutual and transitive authentication mechanism for IoT network". IACR Cryptol. ePrint Arch. 2024: 638 (2024) - [i75]Zhengjun Cao, Lihua Liu:
A note on "a new password-authenticated module learning with rounding-based key exchange protocol: Saber.PAKE". IACR Cryptol. ePrint Arch. 2024: 683 (2024) - [i74]Lihua Liu:
A Note on "Privacy Preserving n-Party Scalar Product Protocol". IACR Cryptol. ePrint Arch. 2024: 1102 (2024) - [i73]Zhengjun Cao, Lihua Liu:
A Note on "Secure and Distributed IoT Data Storage in Clouds Based on Secret Sharing and Collaborative Blockchain". IACR Cryptol. ePrint Arch. 2024: 1144 (2024) - [i72]Zhengjun Cao, Lihua Liu:
A Note on " Provably Secure and Lightweight Authentication Key Agreement Scheme for Smart Meters". IACR Cryptol. ePrint Arch. 2024: 1158 (2024) - [i71]Zhengjun Cao, Lihua Liu:
A note on "a novel authentication protocol for IoT-enabled devices". IACR Cryptol. ePrint Arch. 2024: 1191 (2024) - [i70]Zhengjun Cao, Lihua Liu:
Analysis of One Scheme for User Authentication and Session Key Agreement in Wireless Sensor Network Using Smart Card. IACR Cryptol. ePrint Arch. 2024: 1205 (2024) - [i69]Zhengjun Cao, Lihua Liu:
A Note on "Three-Factor Anonymous Authentication and Key Agreement Based on Fuzzy Biological Extraction for Industrial Internet of Things". IACR Cryptol. ePrint Arch. 2024: 1244 (2024) - [i68]Zhengjun Cao, Lihua Liu:
On the anonymity of one authenticated key agreement scheme for mobile vehicles-assisted precision agricultural IoT networks. IACR Cryptol. ePrint Arch. 2024: 1326 (2024) - [i67]Zhengjun Cao, Lihua Liu:
Design issues of "an anonymous authentication and key agreement protocol in smart living". IACR Cryptol. ePrint Arch. 2024: 1411 (2024) - [i66]Zhengjun Cao, Lihua Liu:
The Zeros of Zeta Function Revisited. IACR Cryptol. ePrint Arch. 2024: 1412 (2024) - [i65]Zhengjun Cao, Lihua Liu:
On the Anonymity of One Authentication and Key Agreement Scheme for Peer-to-Peer Cloud. IACR Cryptol. ePrint Arch. 2024: 1491 (2024) - [i64]Zhengjun Cao, Lihua Liu:
A Note on "Privacy-Preserving and Secure Cloud Computing: A Case of Large-Scale Nonlinear Programming". IACR Cryptol. ePrint Arch. 2024: 1588 (2024) - [i63]Zhengjun Cao, Lihua Liu:
Simplification Issues of An Authentication and Key Agreement Scheme for Smart Grid. IACR Cryptol. ePrint Arch. 2024: 1641 (2024) - 2023
- [j53]Tiezheng Wang, Fei Guo, Hengtao Qi, Liyuan Cui, Lihua Liu, Shougang Bao, Jianbo Teng:
The role of ultrasonography in diagnosing acute closed volar plate injury of proximal interphalangeal joint. BMC Medical Imaging 23(1): 117 (2023) - [j52]Caini Song, Libo Yao, Huisu Chen, Lihua Liu:
Analysis of hot spots and frontiers of nursing scenario simulation teaching research at home and abroad. Educ. Inf. Technol. 28(9): 11951-11961 (2023) - [c33]Ningchao Ge, Peng Peng, Jibing Wu, Lihua Liu, Haiwen Chen, Tengyun Wang:
Answering Property Path Queries over Federated RDF Systems. APWeb/WAIM (3) 2023: 16-31 - [c32]Lihua Liu, Jibing Wu, Xuan Li, Hongbin Huang:
Dynamic Ensemble Selection with Reinforcement Learning. ICIC (5) 2023: 629-640 - [c31]Kaiming Xiao, Haiwen Chen, Hongbin Huang, Lihua Liu, Jibing Wu:
A Quantitative Game-theoretical Study on Externalities of Long-lasting Humanitarian Relief Operations in Conflict Areas. IJCAI 2023: 6272-6280 - [c30]Lihua Liu, Mao Wang, Haiwei Jiang, Ziming Li, Peifan Shi, Youhuan Li:
Highly Applicable Linear Event Detection Algorithm on Social Media with Graph Stream. WISE 2023: 134-143 - [i62]Jiehong Lin, Lihua Liu, Dekun Lu, Kui Jia:
SAM-6D: Segment Anything Model Meets Zero-Shot 6D Object Pose Estimation. CoRR abs/2311.15707 (2023) - [i61]Zhengjun Cao, Lihua Liu:
A Note on "Secure Multifactor Authenticated Key Agreement Scheme for Industrial IoT". IACR Cryptol. ePrint Arch. 2023: 646 (2023) - [i60]Zhengjun Cao, Lihua Liu:
A note on "faster and efficient cloud-server-aided data de-duplication scheme with an authenticated key agreement for Industrial Internet-of-Things". IACR Cryptol. ePrint Arch. 2023: 658 (2023) - [i59]Zhengjun Cao, Lihua Liu:
A note on "a lightweight mutual authentication and key agreement protocol for remote surgery application in Tactile Internet environment". IACR Cryptol. ePrint Arch. 2023: 684 (2023) - [i58]Zhengjun Cao, Lihua Liu:
A Note on "A Secure Anonymous D2D Mutual Authentication and Key Agreement Protocol for IoT". IACR Cryptol. ePrint Arch. 2023: 726 (2023) - [i57]Zhengjun Cao, Lihua Liu:
A Note on "On the Design of Mutual Authentication and Key Agreement Protocol in Internet of Vehicles-Enabled Intelligent Transportation System". IACR Cryptol. ePrint Arch. 2023: 757 (2023) - [i56]Zhengjun Cao, Lihua Liu:
A Note on "Privacy-Preserving Multi-Keyword Searchable Encryption for Distributed Systems". IACR Cryptol. ePrint Arch. 2023: 814 (2023) - [i55]Zhengjun Cao, Lihua Liu:
A note on "LAKAF: lightweight authentication and key agreement framework for smart grid network". IACR Cryptol. ePrint Arch. 2023: 889 (2023) - [i54]Zhengjun Cao, Lihua Liu:
A note on "a multi-instance cancelable fingerprint biometric based secure session key agreement protocol employing elliptic curve cryptography and a double hash function". IACR Cryptol. ePrint Arch. 2023: 993 (2023) - [i53]Zhengjun Cao, Lihua Liu:
A Note on "A Lightweight and Privacy-Preserving Mutual Authentication and Key Agreement Protocol for Internet of Drones Environment". IACR Cryptol. ePrint Arch. 2023: 1065 (2023) - [i52]Zhengjun Cao, Lihua Liu:
A Note on "Authenticated Key Agreement Protocol for Secure Communication Establishment in Vehicle-to-Grid Environment With FPGA Implementation". IACR Cryptol. ePrint Arch. 2023: 1248 (2023) - [i51]Zhengjun Cao, Lihua Liu:
A note on "blockchain-assisted authentication and key agreement scheme for fog-based smart grid". IACR Cryptol. ePrint Arch. 2023: 1296 (2023) - [i50]Zhengjun Cao, Lihua Liu:
A note on "ISG-SLAS: secure and lightweight authentication and key agreement scheme for industrial smart grid using fuzzy extractor". IACR Cryptol. ePrint Arch. 2023: 1430 (2023) - [i49]Zhengjun Cao, Lihua Liu:
A note on "authenticated key agreement protocols for dew-assisted IoT systems". IACR Cryptol. ePrint Arch. 2023: 1497 (2023) - [i48]Zhengjun Cao, Lihua Liu:
A Note on "a two-factor security authentication scheme for wireless sensor networks in IoT environments". IACR Cryptol. ePrint Arch. 2023: 1540 (2023) - [i47]Zhengjun Cao, Lihua Liu:
Analysis of one semi-quantum-honest key agreement scheme in MSTSA structure without entanglement. IACR Cryptol. ePrint Arch. 2023: 1592 (2023) - [i46]Zhengjun Cao, Lihua Liu:
A Note on "A Time-Sensitive Token-Based Anonymous Authentication and Dynamic Group Key Agreement Scheme for Industry 5.0". IACR Cryptol. ePrint Arch. 2023: 1629 (2023) - [i45]Zhengjun Cao, Lihua Liu:
A note on "SCPUAK: smart card-based secure protocol for remote user authentication and key agreement". IACR Cryptol. ePrint Arch. 2023: 1671 (2023) - 2022
- [j51]Lihua Liu, Evianne Rovers, Matthieu Schapira:
ChemBioPort: an online portal to navigate the structure, function and chemical inhibition of the human proteome. Database J. Biol. Databases Curation 2022(2022) (2022) - [j50]Yangbin Zhang, Lihua Liu, Mao Wang, Jibing Wu, Hongbin Huang:
An improved routing protocol for raw data collection in multihop wireless sensor networks. Comput. Commun. 188: 66-80 (2022) - [j49]Zhengjun Cao, Lihua Liu:
A Note on the Insecurity of Cryptosystems Based on Chebyshev Polynomials. Int. J. Bifurc. Chaos 32(3): 2250044:1-2250044:8 (2022) - [j48]Zhen Ke, Lihua Liu, Longbin Jiang, Shichu Yan, Yicai Ji, Xiaojun Liu, Guangyou Fang:
A New Weak-Coupling Method with Eccentric Dual Bucking Coils Applied to the PRBS Helicopter TEM System. Sensors 22(7): 2675 (2022) - [j47]Yanmin Li, Lihua Liu, Jibing Wu, Mao Wang, Haohao Zhou, Hongbin Huang:
Optimal Searching Time Allocation for Information Collection Under Cooperative Path Planning of Multiple UAVs. IEEE Trans. Emerg. Top. Comput. Intell. 6(5): 1030-1043 (2022) - [c29]Lihua Liu, Mao Wang, Kaiming Xiao, Haiwen Chen:
A method for accelerating relations search over big data scenario. ACAI 2022: 29:1-29:6 - [c28]Hongbin Huang, Haopeng Duan, Lihua Liu, Kaiming Xiao:
A Two-stage Framework for Online Unmanned Aerial Vehicles Search Planning. ACAI 2022: 119:1-119:5 - [c27]Haoyu Yang, Kaiming Xiao, Lihua Liu, Hongbin Huang, Weiming Zhang:
An Online Learning Approach towards Far-sighted Emergency Relief Planning under Intentional Attacks in Conflict Areas. IJCAI 2022: 4679-4685 - 2021
- [j46]Huagang Liang, Lihua Liu, Ying Bo, Chao Zuo:
Semi-Supervised Video Object Segmentation Based on Local and Global Consistency Learning. IEEE Access 9: 127293-127304 (2021) - [j45]Zhengjun Cao, Xiqi Wang, Lihua Liu:
One privacy-preserving multi-keyword ranked search scheme revisited. Int. J. Inf. Comput. Secur. 16(3/4): 375-384 (2021) - [j44]Xu Cheng, Lihua Liu, Chen Song:
A Cyclic Information-Interaction Model for Remote Sensing Image Segmentation. Remote. Sens. 13(19): 3871 (2021) - [j43]Lihua Liu, Jutao Li, Ling Huang, Xiaojun Liu, Guangyou Fang:
Double Clamping Current Inverter With Adjustable Turn-off Time for Bucking Coil Helicopter Transient Electromagnetic Surveying. IEEE Trans. Ind. Electron. 68(6): 5405-5414 (2021) - [j42]Hualei Ju, Lihua Liu:
Innovation Trend of Edge Computing Technology Based on Patent Perspective. Wirel. Commun. Mob. Comput. 2021: 2609700:1-2609700:10 (2021) - [c26]Chen Song, Xu Cheng, Lihua Liu, Daqiu Li:
ACFIM: Adaptively Cyclic Feature Information-Interaction Model for Object Detection. PRCV (1) 2021: 379-391 - 2020
- [j41]Lihua Liu, Jianguo Zhu, Linfeng Zheng:
An Effective Method for Estimating State of Charge of Lithium-Ion Batteries Based on an Electrochemical Model and Nernst Equation. IEEE Access 8: 211738-211749 (2020) - [j40]Lihua Liu, Yang Li, Zhengjun Cao, Zhen Chen:
A Note On One Secure Data Self-Destructing Scheme In Cloud Computing. Int. J. Netw. Secur. 22(1): 36-40 (2020) - [j39]Zhengjun Cao, Zhen Chen, Ruizhong Wei, Lihua Liu:
Run-based Modular Reduction Method. Int. J. Netw. Secur. 22(2): 331-336 (2020) - [j38]Zhengjun Cao, Xiqi Wang, Lihua Liu:
A Note on One Popular Non-Interactive Zero-Knowledge Proof System. Int. J. Netw. Secur. 22(4): 681-685 (2020) - [j37]Zhi Geng, Lihua Liu, Jutao Li, Fubo Liu, Qimao Zhang, Xiaojun Liu, Guangyou Fang:
A Constant-Current Transmission Converter for Semi-airborne Transient Electromagnetic Surveying. IEEE Trans. Ind. Electron. 67(1): 542-550 (2020) - [c25]Hongjiang Liu, Mao Wang, Lihua Liu, Jibing Wu, Hongbin Huang:
Hull Number Detection for Ship Images Based on Image Super-Resolution. CISP-BMEI 2020: 339-344 - [c24]Tongfeng Yang, Jian Wu, Guorui Feng, Xu Chang, Lihua Liu:
A Deep Learning Approach to Detection of Warping Forgery in Images. ICAIS (2) 2020: 109-118 - [c23]Xindong Zhang, Chenguang Zhu, Yi Li, Jianmei Guo, Lihua Liu, Haobo Gu:
Precfix: large-scale patch recommendation by mining defect-patch pairs. ICSE (SEIP) 2020: 41-50 - [c22]Xindong Zhang, Chenguang Zhu, Yi Li, Jianmei Guo, Lihua Liu, Haobo Gu:
Large-scale patch recommendation at Alibaba. ICSE (Companion Volume) 2020: 252-253 - [i44]Zhengjun Cao, Lihua Liu:
Factoring Algorithm Based on Parameterized Newton Method. IACR Cryptol. ePrint Arch. 2020: 1142 (2020) - [i43]Zhengjun Cao, Lihua Liu, Leming Hong:
Evaluation Methods for Chebyshev Polynomials. IACR Cryptol. ePrint Arch. 2020: 1365 (2020)
2010 – 2019
- 2019
- [j36]Lihua Liu, Shangping Wang, Bintao He, Duo Zhang:
A Keyword-Searchable ABE Scheme From Lattice in Cloud Storage Environment. IEEE Access 7: 109038-109053 (2019) - [j35]Lihua Liu, David R. Damerell, Leonidas Koukouflis, Yufeng Tong, Brian D. Marsden, Matthieu Schapira:
UbiHub: a data hub for the explorers of ubiquitination pathways. Bioinform. 35(16): 2882-2884 (2019) - [j34]Jinluan Ren, Wen Cao, Bo Li, Lihua Liu, Lin Cai, Ruben Xing:
Big-Data Based Analysis for Communication Effect of Science-Technology Public Accounts on Social Media. Int. J. Inf. Syst. Serv. Sect. 11(3): 56-69 (2019) - [j33]Zhengjun Cao, Lihua Liu, Olivier Markowitch:
Comment on "Highly Efficient Linear Regression Outsourcing to a Cloud". IEEE Trans. Cloud Comput. 7(3): 893 (2019) - 2018
- [j32]Shangping Wang, Duo Zhang, Yaling Zhang, Lihua Liu:
Efficiently Revocable and Searchable Attribute-Based Encryption Scheme for Mobile Cloud Storage. IEEE Access 6: 30444-30457 (2018) - [j31]Jibing Wu, Lianfei Yu, Qun Zhang, Peiteng Shi, Lihua Liu, Su Deng, Hongbin Huang:
Multityped Community Discovery in Time-Evolving Heterogeneous Information Networks Based on Tensor Decomposition. Complex. 2018: 9653404:1-9653404:16 (2018) - [j30]Zhengjun Cao, Chong Mao, Lihua Liu, Wenping Kong, Jinbo Wang:
Analysis of One Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data. Int. J. Netw. Secur. 20(4): 683-688 (2018) - [i42]Zhengjun Cao, Lihua Liu:
A Note on "New techniques for noninteractive zero-knowledge". CoRR abs/1805.06351 (2018) - [i41]Zhengjun Cao, Zhen Chen, Lihua Liu:
Analysis of Nederlof's algorithm for subset sum. CoRR abs/1807.02075 (2018) - [i40]Zhengjun Cao, Lihua Liu:
New Algorithms for Subset Sum Problem. CoRR abs/1807.02611 (2018) - [i39]Zhengjun Cao, Lihua Liu:
Remarks on Bell's Inequality. IACR Cryptol. ePrint Arch. 2018: 231 (2018) - [i38]Zhengjun Cao, Jeffrey Uhlmann, Lihua Liu:
Analysis of Deutsch-Jozsa Quantum Algorithm. IACR Cryptol. ePrint Arch. 2018: 249 (2018) - [i37]Zhengjun Cao, Lihua Liu:
A Note On Groth-Ostrovsky-Sahai Non-Interactive Zero-Knowledge Proof System. IACR Cryptol. ePrint Arch. 2018: 327 (2018) - [i36]Zhengjun Cao, Lihua Liu:
A Note On Clauser-Horne-Shimony-Holt Inequality. IACR Cryptol. ePrint Arch. 2018: 410 (2018) - 2017
- [j29]Lihua Liu, Shangping Wang, Qiao Yan:
A Multi-Authority Key-Policy ABE Scheme from Lattices in Mobile Ad Hoc Networks. Ad Hoc Sens. Wirel. Networks 37(1-4): 117-143 (2017) - [j28]Jinluan Ren, Liping Zhao, Bo Li, Lihua Liu, Ruben Xing:
Measuring Service Utilities in Service Value Networks. Int. J. Inf. Syst. Serv. Sect. 9(2): 1-26 (2017) - [j27]Zhengjun Cao, Lihua Liu:
The Paillier's Cryptosystem and Some Variants Revisited. Int. J. Netw. Secur. 19(1): 91-98 (2017) - [j26]Zhengjun Cao, Lihua Liu:
A Note on Two Schemes for Secure Outsourcing of Linear Programming. Int. J. Netw. Secur. 19(2): 323-326 (2017) - [j25]Zhengjun Cao, Lihua Liu, Olivier Markowitch:
Analysis of One Scheme for Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates. Int. J. Netw. Secur. 19(6): 950-954 (2017) - [j24]Lihua Liu, Qiang Zhang, Dong Zhao, Aoqun Jian, Jianlong Ji, Qianqian Duan, Wendong Zhang, Shengbo Sang:
Preparation and Property Research of Strain Sensor Based on PDMS and Silver Nanomaterials. J. Sensors 2017: 7843052:1-7843052:8 (2017) - [j23]Jibing Wu, Zhifei Wang, Yahui Wu, Lihua Liu, Su Deng, Hongbin Huang:
A Tensor CP Decomposition Method for Clustering Heterogeneous Information Networks via Stochastic Gradient Descent Algorithms. Sci. Program. 2017: 2803091:1-2803091:13 (2017) - [j22]Yuting Chen, Lihua Liu, Zhiqiang Gong, Ping Zhong:
Learning CNN to Pair UAV Video Image Patches. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 10(12): 5752-5768 (2017) - [j21]Lihua Liu, Zongyang Shi, Kai Wu, Zhi Geng, Guangyou Fang:
A Bipolar Half-Sine Current Inverter for Airship-Borne Electromagnetic (AEM) Surveying. IEEE Trans. Ind. Electron. 64(12): 9477-9486 (2017) - 2016
- [j20]Zhengjun Cao, Lihua Liu, Zhenzhen Yan:
An Improved Lindell-Waisbard Private Web Search Scheme. Int. J. Netw. Secur. 18(3): 538-543 (2016) - [j19]Zhengjun Cao, Lihua Liu, Olivier Markowitch:
On Two Kinds of Flaws in Some Server-Aided Verification Schemes. Int. J. Netw. Secur. 18(6): 1054-1059 (2016) - [j18]Xiao Jia, Lihua Liu, Guangyou Fang:
The Finite-Conducting Ground's Effect on the Inductance of a Rectangular Loop. J. Sensors 2016: 2765812:1-2765812:11 (2016) - [j17]Zhengjun Cao, Lihua Liu:
Comment on "Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations". IEEE Trans. Parallel Distributed Syst. 27(5): 1551-1552 (2016) - [c21]Bo Li, Lihua Liu, Rui Huang, Jinluan Ren:
Analyzing the Impact of OWOM on Box Office Revenue in the World of Big Data. BigMM 2016: 166-169 - [i35]Zhengjun Cao, Lihua Liu:
A Note on "Confidentiality-Preserving Image Search: A Comparative Study Between Homomorphic Encryption and Distance-Preserving Randomization". CoRR abs/1601.01079 (2016) - [i34]Zhengjun Cao, Lihua Liu:
A note on "achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud". CoRR abs/1603.07399 (2016) - [i33]Zhengjun Cao, Lihua Liu:
A Note on the Alon-Kleitman Argument for Sum-free Subset Theorem. CoRR abs/1606.07823 (2016) - [i32]Zhengjun Cao, Lihua Liu:
A Note On One Realization of a Scalable Shor Algorithm. CoRR abs/1611.00028 (2016) - [i31]Zhengjun Cao, Lihua Liu:
A Note on "Outsourcing Large Matrix Inversion Computation to a Public Cloud". IACR Cryptol. ePrint Arch. 2016: 448 (2016) - [i30]Zhengjun Cao, Lihua Liu:
A Note on One Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud. IACR Cryptol. ePrint Arch. 2016: 698 (2016) - [i29]Zhengjun Cao, Lihua Liu:
A Note on One Privacy-Preserving Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data. IACR Cryptol. ePrint Arch. 2016: 699 (2016) - [i28]Zhengjun Cao, Lihua Liu:
The Reason Why Some Divide-and-Conquer Algorithms Cannot Be Efficiently Implemented. IACR Cryptol. ePrint Arch. 2016: 979 (2016) - 2015
- [j16]Shangping Wang, Lihua Liu, Jin Sun, Yaling Zhang:
Multi-party concurrent signatures scheme from lattice. Int. J. Inf. Commun. Technol. 7(2/3): 247-262 (2015) - [j15]Zhengjun Cao, Lihua Liu:
Improvement of Green-Hohenberger Adaptive Oblivious Transfer: A Review. Int. J. Netw. Secur. 17(4): 454-462 (2015) - [c20]Zhengjun Cao, Zhenzhen Yan, Lihua Liu:
A fast string matching algorithm based on lowlight characters in the pattern. ICACI 2015: 179-182 - [i27]Zhengjun Cao, Lihua Liu:
A Note On Boneh-Gentry-Waters Broadcast Encryption Scheme and Its Like. CoRR abs/1502.04544 (2015) - [i26]Zhengjun Cao, Lihua Liu:
On the Weakness of Fully Homomorphic Encryption. CoRR abs/1511.05341 (2015) - [i25]Zhengjun Cao, Lihua Liu:
The Paillier's Cryptosystem and Some Variants Revisited. CoRR abs/1511.05787 (2015) - [i24]Zhengjun Cao, Lihua Liu:
Comment on Two schemes for Secure Outsourcing of Linear Programming. CoRR abs/1511.06470 (2015) - [i23]Lihua Liu, Zhengjun Cao:
A Note on "Efficient Algorithms for Secure Outsourcing of Bilinear Pairings". CoRR abs/1512.05413 (2015) - [i22]Zhengjun Cao, Lihua Liu:
On the Disadvantages of Pairing-based Cryptography. IACR Cryptol. ePrint Arch. 2015: 84 (2015) - [i21]Zhengjun Cao, Lihua Liu:
A Note on the Lindell-Waisbard Private Web Search Scheme. IACR Cryptol. ePrint Arch. 2015: 299 (2015) - [i20]Zhengjun Cao, Lihua Liu:
Comment on "Realization of a scalable Shor algorithm". IACR Cryptol. ePrint Arch. 2015: 1133 (2015) - [i19]Zhengjun Cao, Zhenfu Cao, Lihua Liu:
Comment on Demonstrations of Shor's Algorithm in the Past Decades. IACR Cryptol. ePrint Arch. 2015: 1207 (2015) - 2014
- [j14]Muhammad A. Shah, Emily Denton, Lihua Liu, Matthieu Schapira:
ChromoHub V2: cancer genomics. Bioinform. 30(4): 590-592 (2014) - [j13]Xinfan Xia, Lihua Liu, Shengbo Ye, Hongfei Guan, Guangyou Fang:
A Novel Subnanosecond Monocycle Pulse Generator for UWB Radar Applications. J. Sensors 2014: 150549:1-150549:4 (2014) - [i18]Zhengjun Cao, Lihua Liu:
A Fast String Matching Algorithm Based on Lowlight Characters in the Pattern. CoRR abs/1401.7110 (2014) - [i17]Zhengjun Cao, Lihua Liu:
Remarks on AKS Primality Testing Algorithm and A Flaw in the Definition of P. CoRR abs/1402.0146 (2014) - [i16]Zhengjun Cao, Lihua Liu:
A Note on the Bellare-Rivest Protocol for Translucent Cryptography. CoRR abs/1408.3452 (2014) - [i15]Zhengjun Cao, Lihua Liu:
Remarks on the Cryptographic Primitive of Attribute-based Encryption. CoRR abs/1408.4846 (2014) - [i14]Zhengjun Cao, Lihua Liu:
A Note on the Quantum Modular Exponentiation Method Used in Shor's Factoring Algorithm. CoRR abs/1408.6252 (2014) - [i13]Zhengjun Cao, Lihua Liu:
The Barth-Boneh-Waters Private Broadcast Encryption Scheme Revisited. CoRR abs/1408.6610 (2014) - [i12]Zhengjun Cao, Lihua Liu:
A Note on the Bellare-Rivest Protocol for Translucent Cryptography. IACR Cryptol. ePrint Arch. 2014: 679 (2014) - [i11]Zhengjun Cao, Lihua Liu:
Remarks on the Cryptographic Primitive of Attribute-based Encryption. IACR Cryptol. ePrint Arch. 2014: 680 (2014) - [i10]Zhengjun Cao, Zhenfu Cao, Lihua Liu:
Remarks on Quantum Modular Exponentiation and Some Experimental Demonstrations of Shor's Algorithm. IACR Cryptol. ePrint Arch. 2014: 828 (2014) - [i9]Zhengjun Cao, Lihua Liu:
Analysis of Lewko-Sahai-Waters Revocation System. IACR Cryptol. ePrint Arch. 2014: 937 (2014) - 2013
- [j12]Caisheng Chen, Jincheng Huang, Lihua Liu:
Multiple solutions to the nonhomogeneous p-Kirchhoff elliptic equation with concave-convex nonlinearities. Appl. Math. Lett. 26(7): 754-759 (2013) - [c19]Jinluan Ren, Lihua Liu, Bo Li, Liping Zhao, Hu Liu, Xiaolong Liu, Cuiying Wei, Chuanzhen Wang:
Measuring the Utility of Mobile Phone Video Service Based on A Service Value Network Model. AMCIS 2013 - [c18]Lihua Liu, Zhengjun Cao, Qian Sha:
Improved Randomized Algorithm for Square Root Extraction. ICICA (2) 2013: 527-535 - [c17]Shangping Wang, Lihua Liu, Juanjuan Chen, Jin Sun, Xinwen Zhang, Yaling Zhang:
Lattice-Based Multi-party Concurrent Signatures Scheme. INCoS 2013: 568-572 - [i8]Zhengjun Cao, Lihua Liu:
Ordered Probability Mass Function. CoRR abs/1309.1432 (2013) - [i7]Zhengjun Cao, Lihua Liu:
Improvement of One Anonymous Identity-Based Encryption. IACR Cryptol. ePrint Arch. 2013: 505 (2013) - [i6]Zhengjun Cao, Lihua Liu:
Improvement of One Adaptive Oblivious Transfer Scheme. IACR Cryptol. ePrint Arch. 2013: 517 (2013) - [i5]Zhengjun Cao, Lihua Liu:
Improvement of Lin-Tzeng Solution to Yao's Millionaires Problem and Its Cheating Advantage Analysis. IACR Cryptol. ePrint Arch. 2013: 788 (2013) - [i4]Zhengjun Cao, Lihua Liu:
A Note on Bilinear Groups of a Large Composite Order. IACR Cryptol. ePrint Arch. 2013: 812 (2013) - 2012
- [j11]Lihua Liu, Xi Ting Zhen, Emily Denton, Brian D. Marsden, Matthieu Schapira:
ChromoHub: a data hub for navigators of chromatin-mediated signalling. Bioinform. 28(16): 2205-2206 (2012) - [j10]Lihua Liu, Desmond C. McLernon, Mounir Ghogho, Weidong Hu, Jian Huang:
Ballistic missile detection via micro-Doppler frequency estimation from radar return. Digit. Signal Process. 22(1): 87-95 (2012) - [j9]Lihua Liu, Xiaoyong Du, Mounir Ghogho, Weidong Hu, Desmond C. McLernon:
Precession missile feature extraction using sparse component analysis of radar measurements. EURASIP J. Adv. Signal Process. 2012: 24 (2012) - [j8]Lihua Liu, Mounir Ghogho, Desmond C. McLernon, Weidong Hu:
Pseudo-Maximum Likelihood Estimation of ballistic missile precession frequency. Signal Process. 92(9): 2018-2028 (2012) - [c16]Tao Zhou, Huiling Lu, Lihua Liu, Longquan Yong, Shouheng Tuo:
A new classification algorithm based on ensemble PSO_SVM and clustering analysis. GrC 2012: 673-677 - [c15]Zhigang Wen, Zibo Meng, Qing Wang, Lihua Liu, Junwei Zou, Li Wang:
An FPGA Real-Time Spectrum Sensing for Cognitive Radio in Very High Throughput WLAN. ICPCA/SWS 2012: 606-616 - [c14]Jinluan Ren, Hu Liu, Lihua Liu:
Mobile Phone TV Services Business Model Based on Value Co-creation. SRII Global Conference 2012: 435-439 - 2011
- [c13]Lihua Liu, Mounir Ghogho, Desmond C. McLernon, Weidong Hu:
Pseudo Maximum Likelihood Estimations of ballistic missile precession frequency. ICASSP 2011: 3796-3799 - 2010
- [j7]Lihua Liu, Yuzhen Bai:
Erratum to: "New oscillation criteria for second-order nonlinear neutral delay differential equations" [J. Comput. Appl. Math. 231(2009) 657-663]. J. Comput. Appl. Math. 233(10): 2755 (2010) - [j6]Lihua Liu, Guangyou Fang:
A Novel UWB Sampling Receiver and Its Applications for Impulse GPR Systems. IEEE Geosci. Remote. Sens. Lett. 7(4): 690-693 (2010) - [c12]Lihua Liu, Mounir Ghogho, Desmond C. McLernon, Weidong Hu:
Ballistic missile precessing frequency extraction based on maximum likelihood estimation. EUSIPCO 2010: 1562-1566 - [c11]Lihua Liu, Desmond C. McLernon, Mounir Ghogho, Weidong Hu:
Micro-Doppler extraction from ballistic missile radar returns using time-frequency analysis. ISWCS 2010: 780-784 - [c10]Lihua Liu, Zhengjun Cao:
Improvement of one escrow-free identity-based signature. WCNIS 2010: 602-606
2000 – 2009
- 2009
- [j5]Lihua Liu, Yuzhen Bai:
New oscillation criteria for second-order nonlinear neutral delay differential equations. J. Comput. Appl. Math. 231(2): 657-663 (2009) - [c9]Zhengjun Cao, Lihua Liu:
A General Attack against Several Group Signatures. ACIS-ICIS 2009: 635-640 - [c8]Lihua Liu, Zhengjun Cao:
Analysis of Two Signature Schemes from CIS'2006. CIS (1) 2009: 405-408 - [c7]Zhengjun Cao, Lihua Liu, Olivier Markowitch:
Generalized Greedy Algorithm for Shortest Superstring. Complex (2) 2009: 1526-1531 - 2008
- [c6]Zhengjun Cao, Lihua Liu:
A Group Key Agreement Scheme Revisited. IAS 2008: 95-98 - [c5]Lihua Liu, Mingyu Li, Qiong Li, Yan Liang:
Perceptually Transparent Information Hiding in G.729 Bitstream. IIH-MSP 2008: 406-409 - [p1]Lihua Liu, Zhengjun Cao:
Security Analysis of One Verifiable Encryption Scheme. Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing 2008: 181-187 - 2007
- [c4]Zhengjun Cao, Lihua Liu:
Boudot's Range-Bounded Commitment Scheme Revisited. ICICS 2007: 230-238 - [c3]Zhengjun Cao, Lihua Liu:
A Strong RSA Signature Scheme and Its Application. SNPD (1) 2007: 111-115 - 2006
- [j4]Lihua Liu, Hao Shen:
Explicit constructions of separating hash families from algebraic curves over finite fields. Des. Codes Cryptogr. 41(2): 221-233 (2006) - [j3]Lihua Liu, Zhengjun Cao:
On computing ordN(2) and its application. Inf. Comput. 204(7): 1173-1178 (2006) - [c2]Haeryong Park, Zhengjun Cao, Lihua Liu, Seongan Lim, Ikkwon Yie, Kilsoo Chun:
Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in CISC '05. Inscrypt 2006: 1-12 - 2005
- [j2]Fang Zhao, Zhenyu Xuan, Lihua Liu, Michael Q. Zhang:
TRED: a Transcriptional Regulatory Element Database and a platform for in silico gene regulation studies. Nucleic Acids Res. 33(Database-Issue): 103-107 (2005) - [i3]Lihua Liu, Zhengjun Cao:
On the Security of a Group Signature Scheme with Strong Separability. IACR Cryptol. ePrint Arch. 2005: 41 (2005) - 2004
- [i2]Lihua Liu, Zhengjun Cao:
Universal Forgeability of a Forward-Secure Blind Signature Scheme Proposed by Duc et al. IACR Cryptol. ePrint Arch. 2004: 262 (2004) - [i1]Zhengjun Cao, Lihua Liu:
Untraceability of Wang-Fu Group Signature Scheme. IACR Cryptol. ePrint Arch. 2004: 268 (2004) - 2000
- [j1]Jianer Chen, Lihua Liu, Weijia Jia:
Improvement on vertex cover for low-degree graphs. Networks 35(4): 253-259 (2000) - [c1]Jianer Chen, Lihua Liu, Songqiao Chen, Weijia Jia:
An Intuitive and Effective New Representation for Interconnection Network Structures. ISAAC 2000: 350-361
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint