×
Verification Code:
换一张
Forgotten Password?
Stay signed in
×
Login
中文
|
English
BNBU
|
Library
Login
Register
Home
Publications
Faculty/School
Scholars
Analysis
Search
ALL
ORCID
Title
Creator
Date Issued
Keyword
Document Type
Original Document Type
Indexed By
Publisher
Status
Collection
Faculty of Science and Tech...
3
Research outside affiliate...
12
Authors
JIA Weijia
9
WANG Tian
2
LUO Zongwei
2
XU Baojun
1
LEE ShuTak
1
Document Type
Journal article
11
Conference paper
3
Review
1
Date Issued
2024
1
2023
1
2022
1
2019
1
2017
1
2016
2
More...
Language
英语English
12
中文Chinese
3
Indexed By
SCIE
5
中文核心期刊要目总览
4
CPCI-S
3
CSCD
3
EI
1
Funding Organization
Keyword
authentication
4
Anonymous authentication
3
Group signature
3
Authentication
2
Key exchange
2
RFID
2
More...
Source Publication
小型微型计算机系统/Journal of Chines...
3
2016 1st IEEE International...
1
ACM Transactions on Interne...
1
Advanced Science Letters
1
Chinese Journal of Electron...
1
Critical Reviews in Food Sc...
1
More...
Funding Project
×
Knowledge Map
Feedback
Browse/Search Results: 1-10 of 15
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Journal Impact Factor Ascending
Journal Impact Factor Descending
Submit date Ascending
Submit date Descending
Author Ascending
Author Descending
Issue Date Ascending
Issue Date Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Title Ascending
Title Descending
ReLU-oscillator: Chaotic VGG10 model for real-time neural style transfer on painting authentication
Journal article
Expert Systems with Applications,2024, volume: 255
Authors:
Shi, Nuobei
;
Chen, Zhuohui
;
Chen, Ling
;
Lee, Raymond S.T.
Favorite
  |  
View/Download:6/0
  |  
Submit date:2024/12/16
Activation function
Convolutional Neural Network (CNN)
Neural Style Transfer (NST)
Painting authentication
ReLU-Oscillator
Review of the recent developments in metabolomics-based phytochemical research
Review
2023
Authors:
Pandohee, Jessica
;
Kyereh, Emmanuel
;
Kulshrestha, Saurabh
;
Xu, Baojun
;
Mahomoodally, Mohamad Fawzi
Favorite
  |  
View/Download:7/0
  |  
Submit date:2022/02/23
authentication
drug discovery
food chemistry
Metabonomics
natural product
Conditional Identity Privacy-Preserving Authentication Scheme Based on Cooperation of Multiple Fog Servers under Fog Computing-Based IoVs
Journal article
ACM Transactions on Internet Technology,2022, volume: 22, issue: 14, pages: 1-28
Authors:
Xia, Zhuoqun
;
Zeng, Lingxuan
;
Gu, Ke
;
Li, Xiong
;
Jia, Weijia
Favorite
  |  
View/Download:15/0
  |  
Submit date:2022/07/01
Internet of vehicles
Identity privacy-preserving
Authentication
Fog computing
A collusion-resistant public auditing scheme for shared cloud data
Journal article
International Journal of Information Technology and Management,2019, volume: 18, issue: 2-3, pages: 195-212
Authors:
Nan, Fulin
;
Tian, Hui
;
Wang, Tian
;
Cai, Yiqiao
;
Chen, Yonghong
Favorite
  |  
View/Download:2/0
  |  
Submit date:2021/12/02
Cloud storage
Collusion attack
Local authentication server
Public auditing
Shared data
User revocation
智能医疗环境下一种可证明安全的RFID离线互认证方案
Journal article
小型微型计算机系统/Journal of Chinese Computer Systems,2017, volume: 38, issue: 12, pages: 2714-2718
Authors:
周志彬
;
刘琴
;
王国军
;
贾维嘉
Favorite
  |  
View/Download:0/0
  |  
Submit date:2021/09/15
RFID
椭圆曲线加密
身份认证
隐私保护
elliptic curve cryptography
authentication
privacy protection
A novel secure message delivery and authentication method for vehicular ad hoc networks
Conference paper
2016 1st IEEE International Conference on Computer Communication and the Internet, ICCCI 2016, Wuhan, CHINA, OCT 13-15, 2016
Authors:
Liu, Huaijin
;
Chen, Yonghong
;
Tian, Hui
;
Wang, Tian
;
Cai, Yiqiao
Favorite
  |  
View/Download:3/0
  |  
Submit date:2021/12/02
aggregate MAC
authentication
dissemination
security
VANET
Toward Optimal DoS-Resistant Authentication in Crowdsensing Networks via Evolutionary Game
Conference paper
Proceedings - International Conference on Distributed Computing Systems, Nara, Japan, 27-30 June 2016
Authors:
Ruan, Na
;
Gao, Lei
;
Zhu, Haojin
;
Jia, Weijia
;
Li, Xiang
Favorite
  |  
View/Download:3/0
  |  
Submit date:2021/07/30
Broadcast Authentication Protocol
Denial of Service
Evolutionary Game
Lightweight Network
Timed Efficient Stream Loss-tolerant Authentication (TESLA)
采用群证明技术的RFID安全用药方案
Journal article
小型微型计算机系统/Journal of Chinese Computer Systems,2015, volume: 36, issue: 10, pages: 2349-2353
Authors:
周志彬
;
刘琴
;
王国军
;
贾维嘉
Favorite
  |  
View/Download:0/0
  |  
Submit date:2021/09/16
RFID
智能医疗
身份认证
隐私保护
intelligent medical
authentication
privacy protection
Anonymous authentication without home server in mobile roaming networks
Journal article
Chinese Journal of Electronics,2013, volume: 22, issue: 2, pages: 382-386
Authors:
Jiang, Chunlin
;
Jia, Weijia
;
Gu, Ke
;
Xu, Ning
Favorite
  |  
View/Download:4/0
  |  
Submit date:2021/05/10
Anonymous authentication
Group signature
Key exchange
Mobile roaming networks
Efficient authentication protocol using elliptic curve with user anonymity for heterogeneous wireless networks
Journal article
Journal of Information and Computational Science,2012, volume: 9, issue: 4, pages: 1055-1061
Authors:
Jiang, Chunlin
;
Jia, Weijia
;
Gu, Ke
Favorite
  |  
View/Download:3/0
  |  
Submit date:2021/05/10
Anonymous authentication
Elliptic curve
Group signature
Heterogeneous wireless networks