default search action
Chuanda Qi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j12]Zhenghui Liu, Yancong Yang, Da Luo, Chuanda Qi:
Speech watermarking robust against recapturing and de-synchronization attacks. Multim. Tools Appl. 79(9-10): 6009-6024 (2020) - [j11]Yin Li, Shantanu Sharma, Yu Zhang, Xingpo Ma, Chuanda Qi:
On the Complexity of Hybrid n-Term Karatsuba Multiplier for Trinomials. IEEE Trans. Circuits Syst. I Regul. Pap. 67-I(3): 852-865 (2020)
2010 – 2019
- 2019
- [i5]Yin Li, Yu Zhang, Xingpo Ma, Chuanda Qi:
On the Complexity of non-recursive n-term Karatsuba Multiplier for Trinomials. IACR Cryptol. ePrint Arch. 2019: 111 (2019) - 2018
- [j10]Yin Li, Xingpo Ma, Qing Chen, Chuanda Qi:
Efficient Square-Based Montgomery Multiplier for All Type C.1 Pentanomials. IEEE Access 6: 16755-16769 (2018) - [j9]Yin Li, Yu Zhang, Xiaoli Guo, Chuanda Qi:
N-Term Karatsuba Algorithm and its Application to Multiplier Designs for Special Trinomials. IEEE Access 6: 43056-43069 (2018) - [j8]Hejun Xuan, Shiwei Wei, Wuning Tong, Daohua Liu, Chuanda Qi:
Fault-Tolerant Scheduling Algorithm With Re-Allocation for Divisible Task. IEEE Access 6: 73147-73157 (2018) - [j7]Xingpo Ma, Junbin Liang, Jianxin Wang, Sheng Wen, Tian Wang, Yin Li, Wenpeng Ma, Chuanda Qi:
Secure fine-grained spatio-temporal Top-k queries in TMWSNs. Future Gener. Comput. Syst. 86: 174-184 (2018) - [j6]Xingpo Ma, Junbin Liang, Ren Ping Liu, Wei Ni, Yin Li, Ran Li, Wenpeng Ma, Chuanda Qi:
A Survey on Data Storage and Information Discovery in the WSANs-Based Edge Computing Systems. Sensors 18(2): 546 (2018) - [j5]Xingpo Ma, Xingjian Liu, Junbin Liang, Yin Li, Ran Li, Wenpeng Ma, Chuanda Qi:
A Comparative Study on Two Typical Schemes for Securing Spatial-Temporal Top-k Queries in Two-Tiered Mobile Wireless Sensor Networks. Sensors 18(3): 871 (2018) - [c4]Zhenghui Liu, Yanli Li, Fang Sun, Junjie He, Chuanda Qi, Da Luo:
A Robust Recoverable Algorithm Used for Digital Speech Forensics Based on DCT. ICCCS (6) 2018: 300-311 - [i4]Yin Li, Yu Zhang, Xiaoli Guo, Chuanda Qi:
N-term Karatsuba Algorithm and its Application to Multiplier designs for Special Trinomials. IACR Cryptol. ePrint Arch. 2018: 605 (2018) - 2017
- [j4]Fang Sun, Zhenghui Liu, Chuanda Qi:
Speech Content Authentication Scheme based on High-Capacity Watermark Embedding. Int. J. Digit. Crime Forensics 9(2): 1-14 (2017) - [j3]Zhenghui Liu, Jiwu Huang, Xingming Sun, Chuanda Qi:
A security watermark scheme used for digital speech forensics. Multim. Tools Appl. 76(7): 9297-9317 (2017) - [j2]Zhenghui Liu, Da Luo, Jiwu Huang, J. Wang, Chuanda Qi:
Tamper recovery algorithm for digital speech signal based on DWT and DCT. Multim. Tools Appl. 76(10): 12481-12504 (2017) - [j1]Yin Li, Xingpo Ma, Yu Zhang, Chuanda Qi:
Mastrovito Form of Non-Recursive Karatsuba Multiplier for All Trinomials. IEEE Trans. Computers 66(9): 1573-1584 (2017) - [i3]Yin Li, Xingpo Ma, Qin Chen, Chuanda Qi:
Efficient Square-based Montgomery Multiplier for All Type C.1 Pentanomials. IACR Cryptol. ePrint Arch. 2017: 836 (2017) - 2016
- [i2]Yin Li, Xingpo Ma, Yu Zhang, Chuanda Qi:
Mastrovito form of Karatsuba Multiplier for All Trinomials. IACR Cryptol. ePrint Arch. 2016: 694 (2016) - 2015
- [c3]Jing Wang, Zhenghui Liu, Junjie He, Chuanda Qi:
An Authentication and Recovery Scheme for Digital Speech Signal Based on DWT. IWDW 2015: 206-219 - 2014
- [c2]Lin Ding, Chenhui Jin, Jie Guan, Chuanda Qi:
New Treatment of the BSW Sampling and Its Applications to Stream Ciphers. AFRICACRYPT 2014: 136-146 - [i1]Lin Ding, Chenhui Jin, Jie Guan, Chuanda Qi:
New Treatment of the BSW Sampling and Its Applications to Stream Ciphers. IACR Cryptol. ePrint Arch. 2014: 277 (2014)
2000 – 2009
- 2009
- [c1]Gang Li, Yanling Li, Chuanda Qi:
Analysis on a Non-repudiable Threshold Proxy Signature Scheme with Known Signers. ISNN (2) 2009: 904-910
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:49 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint