Name
Papers
Collaborators
YANG LU
44
226
Citations 
PageRank 
Referers 
207
21.64
635
Referees 
References 
650
435
Search Limit
100650
Title
Citations
PageRank
Year
Lightweight Public Key Authenticated Encryption With Keyword Search Against Adaptively-Chosen-Targets Adversaries for Mobile Devices10.352022
Design and Implementation of "Winning Luding Bridge" Immersion FPS Game Based on Unity3D Technology.00.342021
Channel Modeling of BPLC at Customer Side Based on Parameter Estimation.00.342021
Research on Smart Agriculture IoT System Based Heterogeneous Networking Technology.00.342021
Detecting and Understanding Branching Frequency Changes in Process Models00.342021
Design and Implementation of "The Belt and Road Initiative" Immersive Interaction System Based on UE4+GIS Platform.00.342021
"Dawn of South Lake" - - Design and Implementation of Immersive Interactive System Based on Virtual Reality Technology.00.342021
Distributed safe reinforcement learning for multi-robot motion planning.00.342021
Short-Term Power Load Probability Density Forecasting Based on a Double-Layer LSTM-Attention Quantile Regression.00.342021
From Data Flows to Privacy Issues: A User-Centric Semantic Model for Representing and Discovering Privacy Issues00.342020
A Novel Approach to Discover Switch Behaviours in Process Mining.00.342020
Keyword guessing attacks on a public key encryption with keyword search scheme without random oracle and its improvement.30.382019
Constructing Designated Server Public Key Encryption With Keyword Search Schemes Withstanding Keyword Guessing Attacks00.342019
Constructing pairing-free certificateless public key encryption with keyword search.20.402019
Optimizing Speech-Input Length for Speaker-Independent Depression Classification00.342019
A Forward-Secure Certificate-Based Signature Scheme with Enhanced Security in the Standard Model.00.342019
SCF-PEPCKS: Secure Channel Free Public Key Encryption With Privacy-Conserving Keyword Search.00.342019
Multi-Scale Dual-Branch Fully Convolutional Network for Hand Parsing.00.342019
Information Communication Technology and Global Logistic Performance.00.342019
2018 Low-Power Image Recognition Challenge.00.342018
Weakness and Improvement of a Certificate-Based Key-Insulated Signature in the Standard Model.00.342017
Industry 4.0: A Survey on Technologies, Applications and Open Research Issues672.832017
Industry 4.0: A Survey on Technologies, Applications and Open Research Issues672.832017
Efficient designated server identity-based encryption with conjunctive keyword search.60.442017
Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model.00.342017
New Construction of Short Certificate-Based Signature against Existential Forgery Attacks.00.342017
Enhanced Certificate-Based Encryption Scheme without Bilinear Pairings", KSII Transactions on Internet and Information Systems.00.342016
Comment on a certificateless one-pass and two-party authenticated key agreement protocol.00.342016
A pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds130.562016
Multi-scale Shot Segmentation Based on Weighted Subregion Color Histogram.00.342015
The Visual Object Tracking Vot2014 Challenge Results240.972015
Efficient Certificate-Based Proxy Re-encryption Scheme for Data Sharing in Public Clouds.30.392015
Learning FRAME Models Using CNN Filters for Knowledge Visualization.10.432015
An improved certificateless strong key-insulated signature scheme in the standard model.30.382015
3D Reconstruction and Visualization of Volume Data in Electrical Capacitance Tomography.00.342013
Application of FDTD and Harmony Search Algorithm for Inverse Scattering Problem.00.342013
LSBN: A Large-Scale Bayesian Structure Learning Framework for Model Averaging10.412012
Efficient and Generic Construction of Certification-Based Encryption in the Standard Model Based on the NIZK Proof System.00.342012
LAGE: A Java Framework to reconstruct Gene Regulatory Networks from Large-Scale Continues Expression Data00.342012
Adaptive Compressive Sampling for Wideband Signals30.422011
Further Observations on Certificate-Base Encryption and its Generic Construction from Certificateless Public Key Encryption.00.342010
Threshold Certificate-based Encryption10.352009
An Energy Optimization Protocol Based on Cross-Layer for Wireless Sensor Networks120.692008
Towards Efficient and Flexible KNN Query Processing in Real-Life Road Networks00.342008