default search action
Tao Shang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j53]Ruizhong Du, Tianyang Chen, Jin Tian, Tao Shang:
StarCross: Redactable blockchain-based secure and lightweight data sharing framework for satellite-based IoT. Comput. Networks 253: 110718 (2024) - [j52]Kun Zhang, Tao Shang, Yao Tang, Jianwei Liu:
Zero-correlation linear analysis for block ciphers based on the Bernstein-Vazirani and Grover algorithms. Quantum Inf. Process. 23(8): 289 (2024) - [j51]Huiying Ma, Tao Shang, Gufeng Li, Zhaokun Li:
A High-Resolution Time Reversal Method for Target Localization in Reverberant Environments. Sensors 24(10): 3196 (2024) - [c40]Ruizhong Du, Yifan Wang, Mingyue Li, Tao Shang:
Privacy-Preserving Retrieval Scheme Over Medical Images Based on Vision Transformer. ICIC (8) 2024: 403-415 - 2023
- [j50]Gufeng Li, Tao Shang, Yinling Zhang:
Efficient mining high average-utility itemsets with effective pruning strategies and novel list structure. Appl. Intell. 53(5): 6099-6118 (2023) - [j49]Zelin Li, Gufeng Li, Le Zhao, Tao Shang:
List-based mining top-k average-utility itemsets with effective pruning and threshold raising strategies. Appl. Intell. 53(21): 25678-25696 (2023) - [j48]Yazhuo Jiang, Tao Shang, Yao Tang, Jianwei Liu:
Quantum Obfuscation of Generalized Quantum Power Functions with Coefficient. Entropy 25(11): 1524 (2023) - [j47]Qian Li, Tao Shang, Tang Tang:
Adaptive optimal power allocation scheme based on intelligent user association for NOMA-VLC systems. Opt. Switch. Netw. 47: 100714 (2023) - [j46]Yao Tang, Tao Shang, Jianwei Liu:
Dynamic full quantum one-way function based on quantum circuit mapping. Quantum Inf. Process. 22(8): 324 (2023) - [j45]Tao Shang, Shuolin Wang, Yazhuo Jiang, Jianwei Liu:
Two-round quantum homomorphic encryption scheme based on matrix decomposition. Quantum Inf. Process. 22(11): 422 (2023) - [j44]Fan Wang, Tao Shang, Chenhan Hu, Qing Liu:
Automatic Modulation Classification Using Hybrid Data Augmentation and Lightweight Neural Network. Sensors 23(9): 4187 (2023) - [j43]Yatong Jiang, Tao Shang, Jianwei Liu:
Secure Counting Query Protocol for Genomic Data. IEEE ACM Trans. Comput. Biol. Bioinform. 20(2): 1457-1468 (2023) - [j42]Yuanhao Liu, Fen Zhou, Tao Shang, Juan-Manuel Torres-Moreno:
Disaster Protection for Service Function Chain Provisioning in EO-DCNs. IEEE Trans. Netw. Serv. Manag. 20(3): 2356-2369 (2023) - [j41]Yatong Jiang, Tao Shang, Jianwei Liu:
Secure Gene Sequence Alignment Based on Garbled Circuit. IEEE Trans. Serv. Comput. 16(6): 4456-4466 (2023) - [j40]Qian Li, Tao Shang, Tang Tang, Zehui Xiong:
Adaptive User Association Scheme for Indoor Multi-User NOMA-VLC Systems. IEEE Wirel. Commun. Lett. 12(5): 873-877 (2023) - [c39]Shangnan Zhou, Yiwen Li, Tao Shang, Wanqiu Kong:
A Paradigm for Collaborative 3D Editing via List Conflict-free Replicated Data Types. CSAE 2023: 54:1-54:6 - [c38]Tao Shang, Yao Tang, Jianwei Liu:
Full Quantum One-way Function Based on Quantum Hypergraph State. WCSP 2023: 98-103 - [c37]Tao Shang, Jiayu Liu, Yuchen Liu, Yuanjing Zhang, Yazhuo Jiang, Ruizhong Du:
Quantum Network Coding Based on Quantum Steering. WCSP 2023: 171-176 - [c36]Gege Tian, Tao Shang, Qianyun Zhang, Kaiquan Cai, Liang Zhao:
Lightweight Group Pre-Handover Authentication Scheme for Aviation 5G Air-To-Ground Networks. WiMob 2023: 324-329 - 2022
- [j39]Yuanjing Zhang, Tao Shang, Ranyiliu Chen, Jianwei Liu:
Instantiation of quantum point obfuscation. Quantum Inf. Process. 21(1): 29 (2022) - [j38]Yao Tang, Tao Shang, Jianwei Liu:
Universal construction of a full quantum one-way function. Quantum Inf. Process. 21(7): 258 (2022) - [c35]Yuanhao Liu, Fen Zhou, Tao Shang, Juan-Manuel Torres-Moreno:
Power-efficient and Distance-adaptive Disaster Protection for Service Function Chain Provisioning. GLOBECOM 2022: 4407-4412 - [c34]Yuanhao Liu, Fen Zhou, Michal Pióro, Tao Shang, Juan-Manuel Torres-Moreno, Abderrahim Benslimane:
On Flow-based Directed p-Cycle Design in Elastic Optical Networks. ISCC 2022: 1-7 - [c33]Xueqin Gao, Tao Shang, Da Li, Jianwei Liu:
Quantitative Risk Assessment of Threats on SCADA Systems Using Attack Countermeasure Tree. PST 2022: 1-5 - [c32]Xinwei Li, Qianyun Zhang, Lexi Xu, Tao Shang:
A Compatible and Identity Privacy-preserving Security Protocol for ACARS. TrustCom 2022: 1048-1053 - 2021
- [j37]Tao Shang, Zheng Zhao, Xujie Ren, Jianwei Liu:
Differential identifiability clustering algorithms for big data analysis. Sci. China Inf. Sci. 64(5) (2021) - [j36]Yatong Jiang, Tao Shang, Jianwei Liu:
SM algorithms-based encryption scheme for large genomic data files. Digit. Commun. Networks 7(4): 543-550 (2021) - [j35]Tang Tang, Tao Shang, Qian Li:
Impact of Multiple Shadows on Visible Light Communication Channel. IEEE Commun. Lett. 25(2): 513-517 (2021) - [j34]Peiheng Qian, Tao Shang, Yan Gao, Guoqing Ding:
Research on dynamic handover decision algorithm based on fuzzy logic control in mobile FSO networks. Photonic Netw. Commun. 41(2): 136-147 (2021) - [j33]Yuanjing Zhang, Tao Shang, Jianwei Liu:
A multi-valued quantum fully homomorphic encryption scheme. Quantum Inf. Process. 20(3): 1-25 (2021) - [j32]Tao Shang, Yuanjing Zhang, Ran Liu, Jianwei Liu:
Quantum network coding reducing decoherence effect. Quantum Inf. Process. 20(8): 1-21 (2021) - [j31]Tao Shang, Feng Zhang, Xingyue Chen, Jianwei Liu, Xinxi Lu:
Identity-Based Dynamic Data Auditing for Big Data Storage. IEEE Trans. Big Data 7(6): 913-921 (2021) - [j30]Yuanhao Liu, Fen Zhou, Cao Chen, Zuqing Zhu, Tao Shang, Juan-Manuel Torres-Moreno:
Disaster Protection in Inter-DataCenter Networks Leveraging Cooperative Storage. IEEE Trans. Netw. Serv. Manag. 18(3): 2598-2611 (2021) - [c31]Chuyue Pan, Tao Shang, Jianwei Liu:
Quantum Asymmetric Encryption Based on Quantum Point Obfuscation. ICCS (6) 2021: 142-148 - [i1]Yuanhao Liu, Fen Zhou, Tao Shang:
A Novel Initialization Method for HybridUnderwater Optical Acoustic Networks. CoRR abs/2109.14738 (2021) - 2020
- [j29]Weiwei Gao, Li Chen, Tao Shang:
Stream of Unbalanced Medical Big Data Using Convolutional Neural Network. IEEE Access 8: 81310-81319 (2020) - [j28]Xingyue Chen, Tao Shang, Feng Zhang, Jianwei Liu, Zhenyu Guan:
Dynamic data auditing scheme for big data storage. Frontiers Comput. Sci. 14(1): 219-229 (2020) - [j27]Tao Shang, Yao Tang, Ranyiliu Chen, Jianwei Liu:
Full quantum one-way function for quantum cryptography. Quantum Eng. 2(1) (2020) - [j26]Ran Liu, Tao Shang, Jianwei Liu:
Quantum network coding utilizing quantum discord resource fully. Quantum Inf. Process. 19(2): 58 (2020) - [c30]Yuanhao Liu, Fen Zhou, Cao Chen, Zuqing Zhu, Tao Shang, Juan-Manuel Torres-Moreno:
Disaster Protection in Inter-DataCenter Networks leveraging Cooperative Storage. GLOBECOM 2020: 1-6 - [c29]Qian Li, Tao Shang, Tang Tang, Fen Zhou:
QoS-Oriented Adaptive User Association for NOMA in Visible Light Communications. ICCT 2020: 599-604 - [c28]Feng Zhang, Tao Shang, Jianwei Liu:
Imbalanced Encrypted Traffic Classification Scheme Using Random Forest. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2020: 837-842 - [c27]Yuan-Jing Zhang, Jianwei Liu, Tao Shang, Wei Wu:
Quantum Homomorphic Encryption Based on Quantum Obfuscation. IWCMC 2020: 2010-2015 - [c26]Hai-Zheng Sun, Tao Shang, Jianwei Liu:
Measurement-Device-Independent QKD Based on Orbital Angular Momentum with Dual Detectors. IWCMC 2020: 2028-2032 - [c25]Tang Tang, Tao Shang, Qian Li, Fen Zhou:
Quality-of-experience-oriented network selection for indoor VLC heterogeneous networks. WiMob 2020: 111-116
2010 – 2019
- 2019
- [j25]Qian Li, Tao Shang, Tang Tang, Zanyang Dong:
Optimal Power Allocation Scheme Based on Multi-Factor Control in Indoor NOMA-VLC Systems. IEEE Access 7: 82878-82887 (2019) - [j24]Tao Shang, Ranyiliu Chen, Qi Lei:
Quantum Random Oracle Model for Quantum Public-Key Encryption. IEEE Access 7: 130024-130031 (2019) - [j23]Mao Wu, Qingxiang Cai, Tao Shang:
Assessing the suitability of imperialist competitive algorithm for the predicting aims: an engineering case. Eng. Comput. 35(2): 627-636 (2019) - [j22]Tao Shang, Ran-yi-liu Chen, Jianwei Liu:
On the obfuscatability of quantum point functions. Quantum Inf. Process. 18(2): 55 (2019) - [j21]Ranyiliu Chen, Tao Shang, Jianwei Liu:
IND-secure quantum symmetric encryption based on point obfuscation. Quantum Inf. Process. 18(6): 161 (2019) - [j20]Tao Shang, Pei Zhao, Yan Gao, Yuanhao Liu:
Research on topology control based on Voronoi diagram algorithm in FSO networks. Telecommun. Syst. 72(1): 81-93 (2019) - [c24]Zheng Zhao, Tao Shang, Jianwei Liu:
Secure k-Anonymization Linked with Differential Identifiability (Workshop). ChinaCom (2) 2019: 307-316 - [c23]Tao Shang, Ran Liu, Chengran Fang, Jianwei Liu:
Quantum Network Coding Based on Entanglement Distribution. ICAIS (4) 2019: 13-24 - 2018
- [j19]Yuanhao Liu, Tao Shang, Yan Gao, Zanyang Dong:
Performance analysis of partial transmission cooperative strategy with unreliable relays. EURASIP J. Wirel. Commun. Netw. 2018: 198 (2018) - [j18]Tao Shang, Ke Li, Jianwei Liu:
Measurement-Device Independency Analysis of Continuous-Variable Quantum Digital Signature. Entropy 20(4): 291 (2018) - [j17]Liu Han, Tao Shang, Jisen Shu, Ahmed Jalal Khan Chowdhury:
Time series data intelligent clustering algorithm for landslide displacement prediction. J. Intell. Fuzzy Syst. 35(4): 4131-4140 (2018) - [c22]Zheng Zhao, Tao Shang, Jianwei Liu, Zhengyu Guan:
Clustering Algorithm for Privacy Preservation on MapReduce. ICCCS (2) 2018: 622-632 - [c21]Yuanhao Liu, Tao Shang:
Initialization of Hybrid Underwater Optical/Acoustic Network with Asymmetrical Duplex Link. ICTON 2018: 1-4 - [c20]Zhenyu Guan, Liangxu Bian, Tao Shang, Jianwei Liu:
When Machine Learning meets Security Issues: A survey. ISR 2018: 158-165 - [c19]Tao Shang, Haolin Zhuang, Jianwei Liu:
Comprehensive security management system for Hadoop platforms. ISR 2018: 172-177 - [c18]Zhenyu Guan, Yunhao Li, Tao Shang, Jianwei Liu, Maopeng Sun, Yin Li:
Implementation of SM4 on FPGA: Trade-Off Analysis between Area and Speed. ISR 2018: 192-197 - 2017
- [j16]Shuo Xiao, Wei Li, Tao Shang:
Fuzzy logic based high speed data transmission algorithm of sensor networks for target tracking. J. Intell. Fuzzy Syst. 33(5): 2887-2893 (2017) - [j15]Tao Shang, Ke Li, Jianwei Liu:
Continuous-variable quantum network coding for coherent states. Quantum Inf. Process. 16(4): 107 (2017) - [j14]Gang Du, Tao Shang, Jianwei Liu:
Quantum coordinated multi-point communication based on entanglement swapping. Quantum Inf. Process. 16(5): 116 (2017) - [j13]Ke Li, Tao Shang, Jianwei Liu:
Continuous-variable quantum homomorphic signature. Quantum Inf. Process. 16(10): 246 (2017) - [c17]Tao Shang, Zheng Zhao, Zhenyu Guan, Jianwei Liu:
A DP Canopy K-Means Algorithm for Privacy Preservation of Hadoop Platform. CSS 2017: 189-198 - [c16]Xingyue Chen, Tao Shang, Ilryong Kim, Jianwei Liu:
A Remote Data Integrity Checking Scheme for Big Data Storage. DSC 2017: 53-59 - [c15]Tao Shang, Ke Li, Ranyiliu Chen, Jianwei Liu:
Continuous-Variable Quantum Network Coding Against Pollution Attacks. QTOP@NetSys 2017: 196-206 - 2016
- [j12]Tao Shang, Zhuang Pei, Xiao-Jie Zhao, Jianwei Liu:
Quantum Network Coding Against Pollution Attacks. IEEE Commun. Lett. 20(7): 1369-1372 (2016) - [j11]Dongxu Cheng, Jianwei Liu, Zhenyu Guan, Tao Shang:
A One-Round Certificateless Authenticated Group Key Agreement Protocol for Mobile Ad Hoc Networks. IEICE Trans. Inf. Syst. 99-D(11): 2716-2722 (2016) - [j10]Tao Shang, Gang Du, Jianwei Liu:
Opportunistic quantum network coding based on quantum teleportation. Quantum Inf. Process. 15(4): 1743-1763 (2016) - [j9]Tao Shang, Jiao Li, Jianwei Liu:
Secure quantum network coding for controlled repeater networks. Quantum Inf. Process. 15(7): 2937-2953 (2016) - [c14]Xiaoyu Zhang, Lin Miao, Tao Shang:
Utility Analysis of Network Coding for Coordinated Formation Flight in Unmanned Aerial Vehicles. NaNA 2016: 419-422 - [c13]Tao Shang, Tianli Peng, Qi Lei, Jianwei Liu:
Homomorphic Signature for Generation-based Network Coding. SmartCloud 2016: 269-273 - 2015
- [j8]Tao Shang, Yintang Yang, Guang Ren, Bo Hu, Tao Ding, Wenwen Chen:
Topology Control Algorithm and Dynamic Management Scheme for Mobile FSO Networks. JOCN 7(9): 906-917 (2015) - [j7]Tao Shang, Xiao-Jie Zhao, Chao Wang, Jianwei Liu:
Quantum homomorphic signature. Quantum Inf. Process. 14(1): 393-410 (2015) - [j6]Tao Shang, Jiao Li, Zhuang Pei, Jianwei Liu:
Quantum network coding for general repeater networks. Quantum Inf. Process. 14(9): 3533-3552 (2015) - [c12]Tao Shang, Gang Du, Jianwei Liu:
Opportunistic Quantum Network Coding. GLOBECOM Workshops 2015: 1-6 - [c11]Tao Shang, Chunlei Zhang, Ke Li, Jianwei Liu:
Nonlinear Quantum Network Coding with Classical Communication Resource. GLOBECOM Workshops 2015: 1-6 - 2014
- [j5]Tao Shang, Xiao-Jie Zhao, Jianwei Liu:
Quantum Network Coding Based on Controlled Teleportation. IEEE Commun. Lett. 18(5): 865-868 (2014) - [j4]Tao Shang, Fu-Hua Huang, Kefei Mao, Jianwei Liu:
The effect of hexagonal grid topology on wireless communication networks based on network coding. Int. J. Commun. Syst. 27(9): 1319-1337 (2014) - 2013
- [j3]Tao Shang, Yong Fan, Jianwei Liu:
Throughput-delay analysis of one-to-many wireless multi-hop flows based on random linear network coding. J. Commun. Networks 15(4): 430-438 (2013) - [c10]Fu-Hua Huang, Tao Shang:
The Effect of Hexagonal Grid Topology on the Throughput Benefit of Network Coding. GreenCom/iThings/CPScom 2013: 580-584 - 2010
- [j2]Zhaohui Gan, Zhenkun Yang, Tao Shang, Tianyou Yu, Min Jiang:
Automated synthesis of passive analog filters using graph representation. Expert Syst. Appl. 37(3): 1887-1898 (2010) - [c9]Min Jiang, Jinshan Tang, Li Chen, Tao Shang, Zhaohui Gan, Xiaoming Liu, Qin Xu:
Articulated human body pose tracking by suppression based immune particle filter. ICIP 2010: 3273-3276
2000 – 2009
- 2009
- [j1]Tao Shang, Zengji Liu, Peng Yue, Jianping Chen:
Numerical analysis of fiber optical parameter amplifier based on triangular photonic crystal fiber. Sci. China Ser. F Inf. Sci. 52(7): 1272-1277 (2009) - [c8]Zhaohui Gan, Tao Shang, Gang Shi, Min Jiang:
Evolutionary Design of Combinational Logic Circuits Using an Improved Gene Expression-Based Clonal Selection Algorithm. ICNC (4) 2009: 37-41 - 2008
- [c7]Zhaohui Gan, Tao Shang, Gang Shi, Chao Chen:
Automatic Synthesis of Combinational Logic Circuit with Gene Expression-Based Clonal Selection Algorithm. ICNC (6) 2008: 278-282 - 2007
- [c6]Tao Shang, Shuoyu Wang:
Knowledge Acquisition Based on Human Adaptability. FSKD (2) 2007: 688-692 - [c5]Tao Shang, Shuoyu Wang, Shengnan Zhang:
The Effect of Map Information on Brain Activation During a Driving Task. LSMS (2) 2007: 236-245 - 2006
- [c4]Tao Shang, Shuoyu Wang:
An Imitation Method of Human Action Intelligence. ICICIC (2) 2006: 317-320 - 2005
- [c3]Tao Shang, Shuoyu Wang:
Analysis of environmental factors limiting humans' obstacle avoidance ability. AMT 2005: 369-374 - [c2]Tao Shang, Shuoyu Wang:
A novel imitation approach on human's obstacle avoidance ability considering knowledge radius. ROBIO 2005: 736-741 - 2004
- [c1]Tao Shang, Shuoyu Wang:
Acquisition and Analysis of Drivers' Action Intelligence. ROBIO 2004: 799-802
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint