default search action
Qiuhua Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j25]Yun Liu, Huimei Liu, Weiheng Xu, Leiguang Wang, Qiuhua Wang, Guanglong Ou, Mei Wu, Zehu Hong:
Advances and challenges of carbon storage estimation in tea plantation. Ecol. Informatics 81: 102616 (2024) - [j24]Qiuhua Wang, Chengyu Li, Tianyu Xia, Yizhi Ren, Dong Wang, Guoyan Zhang, Kim-Kwang Raymond Choo:
Optimal Selfish Mining-Based Denial-of-Service Attack. IEEE Trans. Inf. Forensics Secur. 19: 835-850 (2024) - [j23]Weifeng Yin, Lifeng Yuan, Yizhi Ren, Weizhi Meng, Dong Wang, Qiuhua Wang:
Differential Cryptanalysis of Bloom Filters for Privacy-Preserving Record Linkage. IEEE Trans. Inf. Forensics Secur. 19: 6665-6678 (2024) - 2023
- [j22]Qiuhua Wang, Rui Zhang, Chuangchuang Li, Chengyu Li, Yeru Wang, Yizhi Ren, Kim-Kwang Raymond Choo:
S-DeepTrust: A deep trust prediction method based on sentiment polarity perception. Inf. Sci. 633: 104-121 (2023) - 2022
- [j21]Qiuhua Wang, Hui Yang, Guohua Wu, Kim-Kwang Raymond Choo, Zheng Zhang, Gongxun Miao, Yizhi Ren:
Black-box adversarial attacks on XSS attack detection model. Comput. Secur. 113: 102554 (2022) - [j20]Qiuhua Wang, Tianyu Xia, Dong Wang, Yizhi Ren, Gongxun Miao, Kim-Kwang Raymond Choo:
SDoS: Selfish Mining-Based Denial-of-Service Attack. IEEE Trans. Inf. Forensics Secur. 17: 3335-3349 (2022) - 2021
- [j19]Qiuhua Wang, Mingyang Kang, Lifeng Yuan, Yunlu Wang, Gongxun Miao, Kim-Kwang Raymond Choo:
On the Application of Channel Characteristic-Based Physical Layer Authentication in Industrial Wireless Networks. KSII Trans. Internet Inf. Syst. 15(6): 2255-2281 (2021) - [j18]Guohua Wu, Mingyao Wang, Qiuhua Wang, Ye Yao, Lifeng Yuan, Gongxun Miao:
A Novel Threshold Changeable Secret Image Sharing Scheme. Symmetry 13(2): 286 (2021) - [j17]Rui Wang, Guohua Wu, Qiuhua Wang, Lifeng Yuan, Zhen Zhang, Gongxun Miao:
Reversible Data Hiding in Encrypted Images Using Median Edge Detector and Two's Complement. Symmetry 13(6): 921 (2021) - 2020
- [j16]Qiuhua Wang, Mingyang Kang, Guohua Wu, Yizhi Ren, Chunhua Su:
A Practical Secret Key Generation Scheme Based on Wireless Channel Characteristics for 5G Networks. IEICE Trans. Inf. Syst. 103-D(2): 230-238 (2020) - [j15]Qiuyun Lyu, Yizhen Qi, Xiaochen Zhang, Huaping Liu, Qiuhua Wang, Ning Zheng:
SBAC: A secure blockchain-based access control framework for information-centric networking. J. Netw. Comput. Appl. 149 (2020) - [j14]Qiuhua Wang, Hao Liu, Xing Jin, Zhen Wang:
A Heterogeneous Network Modeling Method Based on Public Goods Game Theory to Explore Cooperative Behavior in VANETs. Sensors 20(6): 1802 (2020) - [j13]Yingpei Zeng, Mingmin Lin, Shanqing Guo, Yanzhao Shen, Tingting Cui, Ting Wu, Qiuhua Zheng, Qiuhua Wang:
MultiFuzz: A Coverage-Based Multiparty-Protocol Fuzzer for IoT Publish/Subscribe Protocols. Sensors 20(18): 5194 (2020) - 2019
- [j12]Qiuhua Wang, Xiaoqin Ouyang, Jiacheng Zhan:
A Classification Algorithm Based on Data Clustering and Data Reduction for Intrusion Detection System over Big Data. KSII Trans. Internet Inf. Syst. 13(7): 3714-3732 (2019) - [j11]Qiuhua Wang, Jiacheng Zhan, Xiaoqin Ouyang, Yizhi Ren:
SPS and DPS: Two New Grid-Based Source Location Privacy Protection Schemes in Wireless Sensor Networks. Sensors 19(9): 2074 (2019) - 2018
- [j10]Qiuhua Wang, Hongxia Zhang, Qiuyun Lyu, Xiaojun Wang, Jianrong Bao:
A Novel Physical Channel Characteristics-based Channel Hopping Scheme for Jamming-resistant in Wireless Communication. Int. J. Netw. Secur. 20(3): 439-446 (2018) - 2017
- [j9]Qiuhua Wang, Qiuyun Lyu, Xiaojun Wang, Jianrong Bao:
A New Low-BMR Quantization Method for Wireless Channel Characteristics-based Secret Key Generation. KSII Trans. Internet Inf. Syst. 11(10): 5080-5097 (2017) - [j8]Bo Yang, Lei Wu, Binlong Wang, Qiuhua Wang:
Digital Closed-Loop Driving Technique Using the PFD-Based CORDIC Algorithm for a Biaxial Resonant Microaccelerometer. J. Sensors 2017: 7861025:1-7861025:14 (2017) - [j7]Qiuhua Wang:
A Novel Physical Layer Assisted Authentication Scheme for Mobile Wireless Sensor Networks. Sensors 17(2): 289 (2017) - 2016
- [j6]Qiuhua Wang, Xiaojun Wang, Qiuyun Lv, Jianrong Bao:
Methods for Improving the Rate of Secret Key Generation based on Wireless Channel Characteristics. J. Networks 11(2): 46-55 (2016) - 2015
- [j5]Lin You, Younan Yuan, Wangke Yu, Qiuhua Wang:
A Key Distribution Scheme for WSN Based on Hash Chains and Deployment Knowledge. Int. J. Distributed Sens. Networks 11: 640792:1-640792:12 (2015) - [j4]Qiuhua Wang, Xiaojun Wang, Qiuyun Lv, Xueyi Ye, Yi Luo, Lin You:
Analysis of the information theoretically secret key agreement by public discussion. Secur. Commun. Networks 8(15): 2507-2523 (2015) - 2013
- [j3]Qiuhua Wang, Huifang Chen, Lei Xie, Kuang Wang:
One-way hash chain-based self-healing group key distribution scheme with collusion resistance capability in wireless sensor networks. Ad Hoc Networks 11(8): 2500-2511 (2013) - 2012
- [j2]Qiuhua Wang, Huifang Chen, Lei Xie, Kuang Wang:
Long-lived Self-healing Group Key Distribution Scheme in Wireless Sensor Networks. J. Networks 7(7): 1024-1030 (2012) - [j1]Qiuhua Wang, Huifang Chen, Lei Xie, Kuang Wang:
Access-polynomial-based self-healing group key distribution scheme for resource-constrained wireless networks. Secur. Commun. Networks 5(12): 1363-1374 (2012)
Conference and Workshop Papers
- 2022
- [c4]Zuohua Chen, Guohua Wu, Qiuhua Wang, Zhen Zhang, Qisen Xi, Yizhi Ren, Lifeng Yuan:
Label Semantic Extension for Chinese Event Extraction. NLPCC (1) 2022: 197-208 - 2017
- [c3]Weili Kou, Lili Wei, Changxian Liang, Ning Lu, Qiuhua Wang:
An IDL-Based Parallel Model for Scientific Computations on Multi-core Computers. DMBD 2017: 464-471 - 2011
- [c2]Qiuhua Wang:
Practicality Analysis of the Self-Healing Group Key Distribution Schemes for Resource-Constricted Wireless Sensor Networks. CMC 2011: 37-40 - 2010
- [c1]Qiuhua Wang:
Self-healing key distribution for large-scale wireless sensor networks. IWACI 2010: 588-592
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint