Name
Papers
Collaborators
HAN JIANG
34
94
Citations 
PageRank 
Referers 
14
12.05
61
Referees 
References 
470
189
Search Limit
100470
Title
Citations
PageRank
Year
EDGE Enhancement Network for Weakly Supervised Semantic Segmentation.00.342021
SSE - Scale-adaptive Soft Erase Weakly Supervised Segmentation Network for Thyroid Ultrasound Images.00.342021
Self-Organizing Slot Access for Neighboring Cooperation in UAV Swarms.20.392020
Multi-scale Object Detection in Optical Remote Sensing Images Using Atrous Feature Pyramid Network.00.342020
Semi-Automated Generation of Road Transition Lines Using Mobile Laser Scanning Data20.362020
Research on Key Exchange Protocol Based on LWE00.342019
Decentralization is Vulnerable Under the Gap Game10.632019
Multi-Attention Object Detection Model in Remote Sensing Images Based on Multi-Scale.10.352019
Measuring students' thermal comfort and its impact on learning.10.352019
Privacy preserved wireless sensor location protocols based on mobile edge computing10.362019
Blind Image Inpainting Using Pyramid GAN on Thyroid Ultrasound Images.00.342019
A comparison of clustering algorithms applied to fluid characterization using NMR T1-T2 maps of shale00.342019
Game-Theoretic Learning Approaches for Secure D2D Communications Against Full-Duplex Active Eavesdropper.00.342019
Keyword guessing on multi-user searchable encryption00.342019
An Efficient Strong Designated Verifier Signature Based on ℛ-SIS Assumption.00.342019
A Provably-Secure Two-Factor Authenticated Key Exchange Protocol with Stronger Anonymity.00.342018
Analysis on the Block Reward of Fork After Withholding (FAW).00.342018
Towards Security Authentication for IoT Devices with Lattice-Based ZK.00.342018
A New Post-Quantum Blind Signature From Lattice Assumptions.00.342018
Predicting When Teachers Look at Their Students in 1-on-1 Tutoring Sessions00.342018
An efficient symmetric searchable encryption scheme for dynamic dataset in cloud computing paradigms.00.342018
Multi-user searchable encryption with a designated server.10.362017
Implementation and Optimization of GPU-Based Static State Security Analysis in Power Systems.00.342017
An Efficient CPA-Secure Encryption Scheme with Equality Test00.342017
A Two-Layered Parallel Static Security Assessment for Large-Scale Grids Based on GPU.10.372017
Data Sharing with Fine-Grained Access Control for Multi-tenancy Cloud Storage System.00.342016
Practical Server-Aided K-Out-Of-N Oblivious Transfer Protocol00.342016
Fast Cut-and-Choose Bilateral Oblivious Transfer for Malicious Adversaries00.342016
A Fine-Grained Parallel Power Flow Method For Large Scale Grid Based On Lightweight Gpu Threads00.342016
Several Oblivious Transfer Variants in Cut-and-Choose Scenario.00.342015
Cut-and-Choose Bilateral Oblivious Transfer and Its Application20.402015
Efficient ORAM Based on Binary Tree without Data Overflow and Evictions.00.342015
Cut-and-Choose Bilateral Oblivious Transfer and Its Application in Secure Two-party Computation.00.342014
A New Cross-realm Group Password-based Authenticated Key Exchange Protocol20.372011