BibTeX records: Wenping Ma

download as .bib file

@article{DBLP:journals/isci/NiuM23,
  author       = {Xufeng Niu and
                  Wenping Ma},
  title        = {Semi-supervised classifier ensemble model for high-dimensional data},
  journal      = {Inf. Sci.},
  volume       = {643},
  pages        = {119203},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ins.2023.119203},
  doi          = {10.1016/J.INS.2023.119203},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/NiuM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2102-12119,
  author       = {Chun'e Zhao and
                  Wenping Ma and
                  Tongjiang Yan and
                  Yuhua Sun},
  title        = {A new upper bound and optimal constructions of equi-difference conflict-avoiding
                  codes on constant weight},
  journal      = {CoRR},
  volume       = {abs/2102.12119},
  year         = {2021},
  url          = {https://arxiv.org/abs/2102.12119},
  eprinttype    = {arXiv},
  eprint       = {2102.12119},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2102-12119.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-com/LuoM19,
  author       = {Lianfei Luo and
                  Wenping Ma},
  title        = {Balanced quaternary sequences of even period with optimal autocorrelation},
  journal      = {{IET} Commun.},
  volume       = {13},
  number       = {12},
  pages        = {1808--1812},
  year         = {2019},
  url          = {https://doi.org/10.1049/iet-com.2018.5192},
  doi          = {10.1049/IET-COM.2018.5192},
  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-com/LuoM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Ma19,
  author       = {Wenping Ma},
  title        = {Noninteractive Zero Knowledge Proof System for {NP} from Ring {LWE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {972},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/972},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Ma19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsjkx/LiM18,
  author       = {Tongyue Li and
                  Wenping Ma},
  title        = {WSN{\unicode{20013}}{\unicode{22522}}{\unicode{20110}}{\unicode{38750}}{\unicode{32447}}{\unicode{24615}}{\unicode{33258}}{\unicode{36866}}{\unicode{24212}}PSO{\unicode{30340}}{\unicode{20998}}{\unicode{31751}}{\unicode{31574}}{\unicode{30053}}
                  (Clustering Method in Wireless Sensor Networks Using Nonlinear Adaptive
                  {PSO} Algorithm)},
  journal      = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}},
  volume       = {45},
  number       = {5},
  pages        = {44--48},
  year         = {2018},
  url          = {https://doi.org/10.11896/j.issn.1002-137X.2018.05.007},
  doi          = {10.11896/J.ISSN.1002-137X.2018.05.007},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsjkx/LiM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ahswn/GaoM17,
  author       = {Qiang Gao and
                  Wenping Ma},
  title        = {A Broadcast-enhanced Key Predistribution Scheme Using Combinatorial
                  KPSs Based on Orthogonal Arrays for the Temporal Layer},
  journal      = {Ad Hoc Sens. Wirel. Networks},
  volume       = {36},
  number       = {1-4},
  pages        = {193--210},
  year         = {2017},
  url          = {http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-36-number-1-4-2017/ahswn-36-1-4-p-193-210/},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ahswn/GaoM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ahswn/GaoML17,
  author       = {Qiang Gao and
                  Wenping Ma and
                  Xiaoping Li},
  title        = {A Key Predistribution Scheme Based on Mixed-level Orthogonal Arrays},
  journal      = {Ad Hoc Sens. Wirel. Networks},
  volume       = {37},
  number       = {1-4},
  pages        = {53--69},
  year         = {2017},
  url          = {http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-37-number-1-4-2017/ahswn-37-1-4-p-53-69/},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ahswn/GaoML17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/WangM17,
  author       = {Lili Wang and
                  Wenping Ma},
  title        = {Quantum key agreement protocols with single photon in both polarization
                  and spatial-mode degrees of freedom},
  journal      = {Quantum Inf. Process.},
  volume       = {16},
  number       = {5},
  pages        = {130},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11128-017-1576-0},
  doi          = {10.1007/S11128-017-1576-0},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/WangM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangM16,
  author       = {Xiaopeng Yang and
                  Wenping Ma},
  title        = {Two-party authenticated key exchange protocol using lattice-based
                  cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {761},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/761},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YangM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangM15,
  author       = {Xiaopeng Yang and
                  Wenping Ma},
  title        = {Strongly Secure Authenticated Key Exchange from Ideal Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {328},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/328},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YangM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/ZouMRW13,
  author       = {Youjiao Zou and
                  Wenping Ma and
                  Zhanjun Ran and
                  Shangping Wang},
  title        = {Newmultivariate hash function quadratic polynomials multiplying linear
                  polynomials},
  journal      = {{IET} Inf. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {181--188},
  year         = {2013},
  url          = {https://doi.org/10.1049/iet-ifs.2012.0035},
  doi          = {10.1049/IET-IFS.2012.0035},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/ZouMRW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/HeM13,
  author       = {Tuo He and
                  Wenping Ma},
  title        = {An Effective Fuzzy Keyword Search Scheme in Cloud Computing},
  booktitle    = {2013 5th International Conference on Intelligent Networking and Collaborative
                  Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013},
  pages        = {786--789},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/INCoS.2013.150},
  doi          = {10.1109/INCOS.2013.150},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/incos/HeM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcp/SunM12,
  author       = {Changxia Sun and
                  Wenping Ma},
  title        = {Secure Attribute-based Threshold Signature without a Trusted Central
                  Authority},
  journal      = {J. Comput.},
  volume       = {7},
  number       = {12},
  pages        = {2899--2905},
  year         = {2012},
  url          = {http://www.jcomputers.us/index.php?m=content\&\#38;c=index\&\#38;a=show\&\#38;catid=54\&\#38;id=590},
  doi          = {10.4304/JCP.7.12.2899-2905},
  timestamp    = {Thu, 25 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcp/SunM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MaS11,
  author       = {Wenping Ma and
                  Shaohui Sun},
  title        = {New designs of frequency hopping sequences with low hit zone},
  journal      = {Des. Codes Cryptogr.},
  volume       = {60},
  number       = {2},
  pages        = {145--153},
  year         = {2011},
  url          = {https://doi.org/10.1007/s10623-010-9422-8},
  doi          = {10.1007/S10623-010-9422-8},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MaS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/LiuMY11,
  author       = {Weibo Liu and
                  Wenping Ma and
                  Yuanyuan Yang},
  title        = {Analysis and Improvement of the {BAN} Modified Andrew Secure {RPC}
                  Protocol},
  journal      = {J. Networks},
  volume       = {6},
  number       = {4},
  pages        = {662--669},
  year         = {2011},
  url          = {https://doi.org/10.4304/jnw.6.4.662-669},
  doi          = {10.4304/JNW.6.4.662-669},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/LiuMY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZouMRW11,
  author       = {Youjiao Zou and
                  Wenping Ma and
                  Zhanjun Ran and
                  Shangping Wang},
  title        = {A New Multivariate Hash Function with {HAIFA} Construction},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {884--888},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.119},
  doi          = {10.1109/TRUSTCOM.2011.119},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZouMRW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1101-3398,
  author       = {Wenping Ma},
  title        = {New Quadriphase Sequences families with Larger Linear Span and Size},
  journal      = {CoRR},
  volume       = {abs/1101.3398},
  year         = {2011},
  url          = {http://arxiv.org/abs/1101.3398},
  eprinttype    = {arXiv},
  eprint       = {1101.3398},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1101-3398.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnc/GaoMFGY10,
  author       = {Sheng Gao and
                  Wenping Ma and
                  Jia Feng and
                  Na Guo and
                  Yajun Yan},
  title        = {Improved hill-climbing methods in the design of bijective S-boxes},
  booktitle    = {Sixth International Conference on Natural Computation, {ICNC} 2010,
                  Yantai, Shandong, China, 10-12 August 2010},
  pages        = {2378--2380},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICNC.2010.5584026},
  doi          = {10.1109/ICNC.2010.5584026},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/icnc/GaoMFGY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1010-5291,
  author       = {Wenping Ma and
                  Shaohui Sun},
  title        = {New Class of Optimal Frequency-Hopping Sequences by Polynomial Residue
                  Class Rings},
  journal      = {CoRR},
  volume       = {abs/1010.5291},
  year         = {2010},
  url          = {http://arxiv.org/abs/1010.5291},
  eprinttype    = {arXiv},
  eprint       = {1010.5291},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1010-5291.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaYS10,
  author       = {Wenping Ma and
                  Chen Yang and
                  Shaohui Sun},
  title        = {Golay Complementary Sequences Over the {QAM} Constellation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {163},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/163},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaYS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaYS10a,
  author       = {Wenping Ma and
                  Chen Yang and
                  Shaohui Sun},
  title        = {New Methods to Construct Golay Complementary Sequences Over the {QAM}
                  Constellation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {185},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/185},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaYS10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/QianMW08,
  author       = {Jianfa Qian and
                  Wenping Ma and
                  Xinmei Wang},
  title        = {On the Gray Image of Cyclic Codes over Finite Chain Rings},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {91-A},
  number       = {9},
  pages        = {2685--2687},
  year         = {2008},
  url          = {https://doi.org/10.1093/ietfec/e91-a.9.2685},
  doi          = {10.1093/IETFEC/E91-A.9.2685},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/QianMW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/LiuSMLW08,
  author       = {Jingwei Liu and
                  Rong Sun and
                  Wenping Ma and
                  Ying Li and
                  Xinmei Wang},
  title        = {Fair Exchange Signature Schemes},
  booktitle    = {22nd International Conference on Advanced Information Networking and
                  Applications, {AINA} 2008, Workshops Proceedings, GinoWan, Okinawa,
                  Japan, March 25-28, 2008},
  pages        = {422--427},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/WAINA.2008.51},
  doi          = {10.1109/WAINA.2008.51},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aina/LiuSMLW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/YangMHW07,
  author       = {Chen Yang and
                  Wenping Ma and
                  Benxiong Huang and
                  Xinmei Wang},
  title        = {Password-Based Access Control Scheme with Remote User Authentication
                  Using Smart Cards},
  booktitle    = {21st International Conference on Advanced Information Networking and
                  Applications {(AINA} 2007), Workshops Proceedings, Volume 2, May 21-23,
                  2007, Niagara Falls, Canada},
  pages        = {448--452},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/AINAW.2007.279},
  doi          = {10.1109/AINAW.2007.279},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/YangMHW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icicic/YangMW06,
  author       = {Chen Yang and
                  Wenping Ma and
                  Xinmei Wang},
  title        = {New Traitor Tracing Scheme against Anonymous Attack},
  booktitle    = {First International Conference on Innovative Computing, Information
                  and Control {(ICICIC} 2006), 30 August - 1 September 2006, Beijing,
                  China},
  pages        = {389--392},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICICIC.2006.122},
  doi          = {10.1109/ICICIC.2006.122},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icicic/YangMW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics