Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Wenping Ma
@article{DBLP:journals/isci/NiuM23, author = {Xufeng Niu and Wenping Ma}, title = {Semi-supervised classifier ensemble model for high-dimensional data}, journal = {Inf. Sci.}, volume = {643}, pages = {119203}, year = {2023}, url = {https://doi.org/10.1016/j.ins.2023.119203}, doi = {10.1016/J.INS.2023.119203}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/NiuM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2102-12119, author = {Chun'e Zhao and Wenping Ma and Tongjiang Yan and Yuhua Sun}, title = {A new upper bound and optimal constructions of equi-difference conflict-avoiding codes on constant weight}, journal = {CoRR}, volume = {abs/2102.12119}, year = {2021}, url = {https://arxiv.org/abs/2102.12119}, eprinttype = {arXiv}, eprint = {2102.12119}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2102-12119.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-com/LuoM19, author = {Lianfei Luo and Wenping Ma}, title = {Balanced quaternary sequences of even period with optimal autocorrelation}, journal = {{IET} Commun.}, volume = {13}, number = {12}, pages = {1808--1812}, year = {2019}, url = {https://doi.org/10.1049/iet-com.2018.5192}, doi = {10.1049/IET-COM.2018.5192}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-com/LuoM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ma19, author = {Wenping Ma}, title = {Noninteractive Zero Knowledge Proof System for {NP} from Ring {LWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {972}, year = {2019}, url = {https://eprint.iacr.org/2019/972}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ma19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsjkx/LiM18, author = {Tongyue Li and Wenping Ma}, title = {WSN{\unicode{20013}}{\unicode{22522}}{\unicode{20110}}{\unicode{38750}}{\unicode{32447}}{\unicode{24615}}{\unicode{33258}}{\unicode{36866}}{\unicode{24212}}PSO{\unicode{30340}}{\unicode{20998}}{\unicode{31751}}{\unicode{31574}}{\unicode{30053}} (Clustering Method in Wireless Sensor Networks Using Nonlinear Adaptive {PSO} Algorithm)}, journal = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}}, volume = {45}, number = {5}, pages = {44--48}, year = {2018}, url = {https://doi.org/10.11896/j.issn.1002-137X.2018.05.007}, doi = {10.11896/J.ISSN.1002-137X.2018.05.007}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsjkx/LiM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ahswn/GaoM17, author = {Qiang Gao and Wenping Ma}, title = {A Broadcast-enhanced Key Predistribution Scheme Using Combinatorial KPSs Based on Orthogonal Arrays for the Temporal Layer}, journal = {Ad Hoc Sens. Wirel. Networks}, volume = {36}, number = {1-4}, pages = {193--210}, year = {2017}, url = {http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-36-number-1-4-2017/ahswn-36-1-4-p-193-210/}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ahswn/GaoM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ahswn/GaoML17, author = {Qiang Gao and Wenping Ma and Xiaoping Li}, title = {A Key Predistribution Scheme Based on Mixed-level Orthogonal Arrays}, journal = {Ad Hoc Sens. Wirel. Networks}, volume = {37}, number = {1-4}, pages = {53--69}, year = {2017}, url = {http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-37-number-1-4-2017/ahswn-37-1-4-p-53-69/}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ahswn/GaoML17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/WangM17, author = {Lili Wang and Wenping Ma}, title = {Quantum key agreement protocols with single photon in both polarization and spatial-mode degrees of freedom}, journal = {Quantum Inf. Process.}, volume = {16}, number = {5}, pages = {130}, year = {2017}, url = {https://doi.org/10.1007/s11128-017-1576-0}, doi = {10.1007/S11128-017-1576-0}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/WangM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YangM16, author = {Xiaopeng Yang and Wenping Ma}, title = {Two-party authenticated key exchange protocol using lattice-based cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {761}, year = {2016}, url = {http://eprint.iacr.org/2016/761}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YangM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YangM15, author = {Xiaopeng Yang and Wenping Ma}, title = {Strongly Secure Authenticated Key Exchange from Ideal Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {328}, year = {2015}, url = {http://eprint.iacr.org/2015/328}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YangM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/ZouMRW13, author = {Youjiao Zou and Wenping Ma and Zhanjun Ran and Shangping Wang}, title = {Newmultivariate hash function quadratic polynomials multiplying linear polynomials}, journal = {{IET} Inf. Secur.}, volume = {7}, number = {3}, pages = {181--188}, year = {2013}, url = {https://doi.org/10.1049/iet-ifs.2012.0035}, doi = {10.1049/IET-IFS.2012.0035}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/ZouMRW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/HeM13, author = {Tuo He and Wenping Ma}, title = {An Effective Fuzzy Keyword Search Scheme in Cloud Computing}, booktitle = {2013 5th International Conference on Intelligent Networking and Collaborative Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013}, pages = {786--789}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/INCoS.2013.150}, doi = {10.1109/INCOS.2013.150}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/incos/HeM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcp/SunM12, author = {Changxia Sun and Wenping Ma}, title = {Secure Attribute-based Threshold Signature without a Trusted Central Authority}, journal = {J. Comput.}, volume = {7}, number = {12}, pages = {2899--2905}, year = {2012}, url = {http://www.jcomputers.us/index.php?m=content\&\#38;c=index\&\#38;a=show\&\#38;catid=54\&\#38;id=590}, doi = {10.4304/JCP.7.12.2899-2905}, timestamp = {Thu, 25 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcp/SunM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MaS11, author = {Wenping Ma and Shaohui Sun}, title = {New designs of frequency hopping sequences with low hit zone}, journal = {Des. Codes Cryptogr.}, volume = {60}, number = {2}, pages = {145--153}, year = {2011}, url = {https://doi.org/10.1007/s10623-010-9422-8}, doi = {10.1007/S10623-010-9422-8}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MaS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/LiuMY11, author = {Weibo Liu and Wenping Ma and Yuanyuan Yang}, title = {Analysis and Improvement of the {BAN} Modified Andrew Secure {RPC} Protocol}, journal = {J. Networks}, volume = {6}, number = {4}, pages = {662--669}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.4.662-669}, doi = {10.4304/JNW.6.4.662-669}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LiuMY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZouMRW11, author = {Youjiao Zou and Wenping Ma and Zhanjun Ran and Shangping Wang}, title = {A New Multivariate Hash Function with {HAIFA} Construction}, booktitle = {{IEEE} 10th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, Changsha, China, 16-18 November, 2011}, pages = {884--888}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/TrustCom.2011.119}, doi = {10.1109/TRUSTCOM.2011.119}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZouMRW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1101-3398, author = {Wenping Ma}, title = {New Quadriphase Sequences families with Larger Linear Span and Size}, journal = {CoRR}, volume = {abs/1101.3398}, year = {2011}, url = {http://arxiv.org/abs/1101.3398}, eprinttype = {arXiv}, eprint = {1101.3398}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1101-3398.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnc/GaoMFGY10, author = {Sheng Gao and Wenping Ma and Jia Feng and Na Guo and Yajun Yan}, title = {Improved hill-climbing methods in the design of bijective S-boxes}, booktitle = {Sixth International Conference on Natural Computation, {ICNC} 2010, Yantai, Shandong, China, 10-12 August 2010}, pages = {2378--2380}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ICNC.2010.5584026}, doi = {10.1109/ICNC.2010.5584026}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/icnc/GaoMFGY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1010-5291, author = {Wenping Ma and Shaohui Sun}, title = {New Class of Optimal Frequency-Hopping Sequences by Polynomial Residue Class Rings}, journal = {CoRR}, volume = {abs/1010.5291}, year = {2010}, url = {http://arxiv.org/abs/1010.5291}, eprinttype = {arXiv}, eprint = {1010.5291}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1010-5291.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaYS10, author = {Wenping Ma and Chen Yang and Shaohui Sun}, title = {Golay Complementary Sequences Over the {QAM} Constellation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {163}, year = {2010}, url = {http://eprint.iacr.org/2010/163}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaYS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaYS10a, author = {Wenping Ma and Chen Yang and Shaohui Sun}, title = {New Methods to Construct Golay Complementary Sequences Over the {QAM} Constellation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {185}, year = {2010}, url = {http://eprint.iacr.org/2010/185}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaYS10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/QianMW08, author = {Jianfa Qian and Wenping Ma and Xinmei Wang}, title = {On the Gray Image of Cyclic Codes over Finite Chain Rings}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {91-A}, number = {9}, pages = {2685--2687}, year = {2008}, url = {https://doi.org/10.1093/ietfec/e91-a.9.2685}, doi = {10.1093/IETFEC/E91-A.9.2685}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/QianMW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/LiuSMLW08, author = {Jingwei Liu and Rong Sun and Wenping Ma and Ying Li and Xinmei Wang}, title = {Fair Exchange Signature Schemes}, booktitle = {22nd International Conference on Advanced Information Networking and Applications, {AINA} 2008, Workshops Proceedings, GinoWan, Okinawa, Japan, March 25-28, 2008}, pages = {422--427}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/WAINA.2008.51}, doi = {10.1109/WAINA.2008.51}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aina/LiuSMLW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/YangMHW07, author = {Chen Yang and Wenping Ma and Benxiong Huang and Xinmei Wang}, title = {Password-Based Access Control Scheme with Remote User Authentication Using Smart Cards}, booktitle = {21st International Conference on Advanced Information Networking and Applications {(AINA} 2007), Workshops Proceedings, Volume 2, May 21-23, 2007, Niagara Falls, Canada}, pages = {448--452}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/AINAW.2007.279}, doi = {10.1109/AINAW.2007.279}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/YangMHW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icicic/YangMW06, author = {Chen Yang and Wenping Ma and Xinmei Wang}, title = {New Traitor Tracing Scheme against Anonymous Attack}, booktitle = {First International Conference on Innovative Computing, Information and Control {(ICICIC} 2006), 30 August - 1 September 2006, Beijing, China}, pages = {389--392}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ICICIC.2006.122}, doi = {10.1109/ICICIC.2006.122}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icicic/YangMW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.