Search

Your search keyword '"Li, Zhoujun"' showing total 43 results

Search Constraints

Start Over You searched for: Author "Li, Zhoujun" Remove constraint Author: "Li, Zhoujun" Publisher elsevier b.v. Remove constraint Publisher: elsevier b.v.
43 results on '"Li, Zhoujun"'

Search Results

17. Cryptanalysis of simple three-party key exchange protocol

18. A unified framework of identity-based sequential aggregate signatures from 2-level HIBE schemes.

19. Response selection with topic clues for retrieval-based chatbots.

20. Effect of test configurations and loading protocols on performance of timber-concrete connectors.

21. A novel fuzzy identity based signature scheme based on the short integer solution problem.

22. An efficient dynamic authenticated key exchange protocol with selectable identities

23. Provably secure identity-based authenticated key agreement protocols with malicious private key generators

24. fficient and Provably Secure Generic Construction of Client-to-Client Password-Based Key Exchange Protocol.

25. Modeling and Verifying Time Sensitive Security Protocols with Constraints.

26. A Novel Derivation Framework For Definite Logic Program.

27. PPMGS: An efficient and effective solution for distributed privacy-preserving semi-supervised learning.

28. From content to links: Social image embedding with deep multimodal model.

29. Improved-ELM method for detecting false data attack in smart grid.

30. Named entity disambiguation for questions in community question answering.

31. Social image tagging using graph-based reinforcement on multi-type interrelated objects.

32. Efficient and dynamic key management for multiple identities in identity-based systems

33. Adversarial learning for multi-view network embedding on incomplete graphs.

34. Visual-textual sentiment classification with bi-directional multi-level attention networks.

35. Network embedding by fusing multimodal contents and links.

36. Image–text sentiment analysis via deep multimodal attentive fusion.

37. Unsupervised geographically discriminative feature learning for landmark tagging.

38. Response selection from unstructured documents for human-computer conversation systems.

39. Dynamic self-attention with vision synchronization networks for video question answering.

40. A new methodology for anomaly detection of attacks in IEC 61850-based substation system.

41. A provably secure authenticated key agreement protocol for wireless communications

42. Dual self-attention with co-attention networks for visual question answering.

43. An improved ELM-based and data preprocessing integrated approach for phishing detection considering comprehensive features.

Catalog

Books, media, physical & digital resources