BibTeX records: Longjuan Wang

download as .bib file

@article{DBLP:journals/entropy/DuGWWYLWWGZSXY20,
  author    = {Wenhua Du and
               Xiaoming Guo and
               Zhijian Wang and
               Junyuan Wang and
               Mingrang Yu and
               Chuanjiang Li and
               Guanjun Wang and
               Longjuan Wang and
               Huaichao Guo and
               Jinjie Zhou and
               Yanjun Shao and
               Huiling Xue and
               Xingyan Yao},
  title     = {A New Fuzzy Logic Classifier Based on Multiscale Permutation Entropy
               and Its Application in Bearing Fault Diagnosis},
  journal   = {Entropy},
  volume    = {22},
  number    = {1},
  pages     = {27},
  year      = {2020},
  url       = {https://doi.org/10.3390/e22010027},
  doi       = {10.3390/e22010027},
  timestamp = {Fri, 25 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/entropy/DuGWWYLWWGZSXY20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2002-01391,
  author    = {Minghan Chen and
               Fangyan Dai and
               Bingjie Yan and
               Jieren Cheng and
               Longjuan Wang},
  title     = {Encryption Algorithm for {TCP} Session Hijacking},
  journal   = {CoRR},
  volume    = {abs/2002.01391},
  year      = {2020},
  url       = {https://arxiv.org/abs/2002.01391},
  eprinttype = {arXiv},
  eprint    = {2002.01391},
  timestamp = {Mon, 10 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/corr/abs-2002-01391.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/WangT19,
  author    = {Longjuan Wang and
               Fangming Tang},
  editor    = {Xingming Sun and
               Zhaoqing Pan and
               Elisa Bertino},
  title     = {Comparison of the Legal Principle Foundation of Chinese and American
               Secret Information Access Control Technique},
  booktitle = {Artificial Intelligence and Security - 5th International Conference,
               {ICAIS} 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part
               {III}},
  series    = {Lecture Notes in Computer Science},
  volume    = {11634},
  pages     = {644--657},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-24271-8\_57},
  doi       = {10.1007/978-3-030-24271-8\_57},
  timestamp = {Fri, 19 Jul 2019 12:53:39 +0200},
  biburl    = {https://dblp.org/rec/conf/icccsec/WangT19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic/YaoDLWLWW11,
  author    = {Xiaoming Yao and
               Wencai Du and
               Taijun Li and
               Longjuan Wang and
               Honglei Li and
               Hanwei Wu and
               Zequn Wang},
  editor    = {Dehuai Zeng},
  title     = {Statistical Modeling for LSB-Based Image Steganalysis: {A} Systematic
               Perspective},
  booktitle = {Applied Informatics and Communication - International Conference,
               {ICAIC} 2011, Xi'an, China, August 20-21, 2011, Proceedings, Part
               {I}},
  series    = {Communications in Computer and Information Science},
  volume    = {224},
  pages     = {663--671},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-23214-5\_85},
  doi       = {10.1007/978-3-642-23214-5\_85},
  timestamp = {Fri, 19 May 2017 01:26:23 +0200},
  biburl    = {https://dblp.org/rec/conf/icaic/YaoDLWLWW11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics