
Wenping Ma
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Other persons with the same name
- Wenping Ma 0001
— Xidian University, Key Laboratory of Intelligent Perception and Image Understanding, Xi'an, China
- Wenping Ma 0002
— Xidian University, State Key Laboratory of Integrated Service Networks (ISN), Xi'an, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j24]Hui Han
, Jianjun Mu
, Yu-Cheng He
, Xiaopeng Jiao
, Wenping Ma:
Rate-Improved Permutation Codes for Correcting a Single Burst of Deletions. IEEE Commun. Lett. 25(1): 49-53 (2021) - 2020
- [j23]Hui Han
, Jianjun Mu
, Yu-Cheng He
, Xiaopeng Jiao
, Wenping Ma:
Multi-Permutation Codes Correcting a Single Burst Unstable Deletions in Flash Memory. IEEE Commun. Lett. 24(4): 720-724 (2020)
2010 – 2019
- 2019
- [j22]Lianfei Luo, Wenping Ma:
Balanced quaternary sequences of even period with optimal autocorrelation. IET Commun. 13(12): 1808-1812 (2019) - [j21]Chengli Zhang, Wenping Ma, Feifei Zhao:
Trapdoor function based on the Ring-LWE and applications in communications. J. Ambient Intell. Humaniz. Comput. 10(5): 1821-1827 (2019) - [c16]Huili Wang, Wenping Ma, Haibin Zheng, Qianhong Wu:
Distributed Secure Storage System Based on Blockchain and TPA. NSS 2019: 255-271 - [c15]Huili Wang, Wenping Ma, Haibin Zheng, Zhi Liang, Qianhong Wu:
Privacy-Preserving Sequential Data Publishing. NSS 2019: 596-614 - [c14]Pengfei Huang, Handing Wang, Wenping Ma:
Stochastic Ranking for Offline Data-Driven Evolutionary Optimization Using Radial Basis Function Networks with Multiple Kernels. SSCI 2019: 2050-2057 - [i7]Wenping Ma:
Noninteractive Zero Knowledge Proof System for NP from Ring LWE. IACR Cryptol. ePrint Arch. 2019: 972 (2019) - 2018
- [j20]Lianfei Luo, Wenping Ma, Feifei Zhao:
Binary Sequence Pairs of Period pm-1 with Optimal Three-Level Correlation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(8): 1263-1266 (2018) - [j19]Tongyue Li, Wenping Ma:
WSN中基于非线性自适应PSO的分簇策略 (Clustering Method in Wireless Sensor Networks Using Nonlinear Adaptive PSO Algorithm). 计算机科学 45(5): 44-48 (2018) - [j18]Chen Li
, Wenping Ma:
Comments on "An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys". IEEE Trans. Inf. Forensics Secur. 13(10): 2668-2669 (2018) - 2017
- [j17]Qiang Gao, Wenping Ma:
A Broadcast-enhanced Key Predistribution Scheme Using Combinatorial KPSs Based on Orthogonal Arrays for the Temporal Layer. Ad Hoc Sens. Wirel. Networks 36(1-4): 193-210 (2017) - [j16]Qiang Gao, Wenping Ma, Xiaoping Li:
A Key Predistribution Scheme Based on Mixed-level Orthogonal Arrays. Ad Hoc Sens. Wirel. Networks 37(1-4): 53-69 (2017) - [j15]Lili Wang, Wenping Ma:
Quantum key agreement protocols with single photon in both polarization and spatial-mode degrees of freedom. Quantum Inf. Process. 16(5): 130 (2017) - 2016
- [j14]Lu Zhang
, Wenping Ma, Dan Zhang:
Stacked Sparse Autoencoder in PolSAR Data Classification Using Local Spatial Information. IEEE Geosci. Remote. Sens. Lett. 13(9): 1359-1363 (2016) - [c13]Wenping Ma, Zhizhou Li, Puzhao Zhang, Tianyu Hu:
DNN-Based Joint Classification for Multi-source Image Change Detection. BIC-TA (1) 2016: 425-430 - [i6]Xiaopeng Yang, Wenping Ma:
Two-party authenticated key exchange protocol using lattice-based cryptography. IACR Cryptol. ePrint Arch. 2016: 761 (2016) - 2015
- [j13]Yinfang Hong, Hui Li, Wenping Ma, Xinmei Wang:
Reduced Complexity Belief Propagation Decoding Algorithm for Polar Codes Based on the Principle of Equal Spacing. IEICE Trans. Commun. 98-B(9): 1824-1831 (2015) - [i5]Xiaopeng Yang, Wenping Ma:
Strongly Secure Authenticated Key Exchange from Ideal Lattices. IACR Cryptol. ePrint Arch. 2015: 328 (2015) - 2014
- [j12]Ruochen Liu, Fei He, Jing Liu, Wenping Ma, Yangyang Li:
A point symmetry-based clonal selection clustering algorithm and its application in image compression. Pattern Anal. Appl. 17(3): 633-654 (2014) - [c12]Jianshe Wu, Lin Yuan, Qingliang Gong, Wenping Ma, Jingjing Ma, Yangyang Li:
A compression optimization algorithm for community detection. IEEE Congress on Evolutionary Computation 2014: 667-671 - [c11]Tuo He, Maode Ma, Wenping Ma, Bingsheng He:
A novel authenticated multi-party key agreement for private cloud. ICC 2014: 3776-3781 - [c10]Shuyuan Yang, Bin Li, Min Wang, Wenping Ma:
Compressive Direction-of-Arrival Estimation via Regularized Multiple Measurement FOCUSS algorithm. IJCNN 2014: 2800-2803 - 2013
- [j11]Xiaoping Li, Wenping Ma, Tongjiang Yan, Xubo Zhao:
Linear Complexity of Binary Whiteman Generalized Cyclotomic Sequences of Order 4. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(1): 363-366 (2013) - [j10]Xiaoping Li, Wenping Ma, Tongjiang Yan, Xubo Zhao:
Linear Complexity of a New Generalized Cyclotomic Sequence of Order Two of Length pq. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(5): 1001-1005 (2013) - [j9]Chun'e Zhao, Wenping Ma, Tongjiang Yan, Yuhua Sun:
Autocorrelation Values of Generalized Cyclotomic Sequences of Order Six. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(10): 2045-2048 (2013) - [j8]Youjiao Zou, Wenping Ma, Zhanjun Ran, Shangping Wang
:
Newmultivariate hash function quadratic polynomials multiplying linear polynomials. IET Inf. Secur. 7(3): 181-188 (2013) - [c9]Tuo He, Wenping Ma:
An Effective Fuzzy Keyword Search Scheme in Cloud Computing. INCoS 2013: 786-789 - 2012
- [j7]Jianfa Qian, Wenping Ma:
Secret Sharing Schemes from Linear Codes over Finite Rings. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(7): 1193-1196 (2012) - [j6]Changxia Sun, Wenping Ma:
Secure Attribute-based Threshold Signature without a Trusted Central Authority. J. Comput. 7(12): 2899-2905 (2012) - [c8]Wenping Ma, Yuanyuan Huang, Congling Li, Jing Liu:
Image segmentation based on a hybrid Immune Memetic Algorithm. IEEE Congress on Evolutionary Computation 2012: 1-8 - 2011
- [j5]Wenping Ma, Shaohui Sun:
New designs of frequency hopping sequences with low hit zone. Des. Codes Cryptogr. 60(2): 145-153 (2011) - [j4]Sheng Gao, Wenping Ma, Zepeng Zhuo, Fenghe Wang:
On cross-correlation indicators of an S-box. Frontiers Comput. Sci. China 5(4): 448-453 (2011) - [j3]Weibo Liu, Wenping Ma, Yuanyuan Yang:
Analysis and Improvement of the BAN Modified Andrew Secure RPC Protocol. J. Networks 6(4): 662-669 (2011) - [c7]Youjiao Zou, Wenping Ma, Zhanjun Ran, Shangping Wang
:
A New Multivariate Hash Function with HAIFA Construction. TrustCom 2011: 884-888 - [i4]Wenping Ma:
New Quadriphase Sequences families with Larger Linear Span and Size. CoRR abs/1101.3398 (2011) - 2010
- [j2]Yuanyuan Yang, Wenping Ma, Weibo Liu, Qi Jiang:
Security Analysis of the Newest ID-Transfer Scheme for Low-Cost RFID Tags. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(10): 1837-1839 (2010) - [c6]Sheng Gao, Wenping Ma, Jia Feng, Na Guo, Yajun Yan:
Improved hill-climbing methods in the design of bijective S-boxes. ICNC 2010: 2378-2380 - [i3]Wenping Ma, Shaohui Sun:
New Class of Optimal Frequency-Hopping Sequences by Polynomial Residue Class Rings. CoRR abs/1010.5291 (2010) - [i2]Wenping Ma, Chen Yang, Shaohui Sun:
Golay Complementary Sequences Over the QAM Constellation. IACR Cryptol. ePrint Arch. 2010: 163 (2010) - [i1]Wenping Ma, Chen Yang, Shaohui Sun:
New Methods to Construct Golay Complementary Sequences Over the QAM Constellation. IACR Cryptol. ePrint Arch. 2010: 185 (2010)
2000 – 2009
- 2008
- [j1]Jianfa Qian, Wenping Ma, Xinmei Wang:
On the Gray Image of Cyclic Codes over Finite Chain Rings. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(9): 2685-2687 (2008) - [c5]Jingwei Liu, Rong Sun, Wenping Ma, Ying Li, Xinmei Wang:
Fair Exchange Signature Schemes. AINA Workshops 2008: 422-427 - 2007
- [c4]Chen Yang, Wenping Ma, Benxiong Huang, Xinmei Wang:
Password-Based Access Control Scheme with Remote User Authentication Using Smart Cards. AINA Workshops (2) 2007: 448-452 - [c3]Chen Yang, Wenping Ma, Xinmei Wang:
Novel Remote User Authentication Scheme Using Bilinear Pairings. ATC 2007: 306-312 - 2006
- [c2]Chen Yang, Xiangguo Cheng, Wenping Ma, Xinmei Wang:
A New ID-Based Broadcast Encryption Scheme. ATC 2006: 487-492 - [c1]Chen Yang, Wenping Ma, Xinmei Wang:
New Traitor Tracing Scheme against Anonymous Attack. ICICIC (1) 2006: 389-392
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-02-12 21:25 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint