Resource Type

Journal Article 499

Conference Videos 8

Year

2024 2

2023 46

2022 64

2021 39

2020 33

2019 32

2018 35

2017 27

2016 28

2015 35

2014 13

2013 16

2012 16

2011 9

2010 11

2009 8

2008 16

2007 16

2006 19

2005 5

open ︾

Keywords

multi-objective optimization 24

Multi-agent systems 10

Multi-agent system 8

multi-objective 5

different 4

genetic algorithm 4

robust design 4

Artificial intelligence 3

Multi-objective optimization 3

5G 2

Adsorption 2

Antenna-in-package (AiP) 2

CO2 emissions 2

COVID-19 2

Capillary gel electrophoresis 2

Lattice 2

Multi-model 2

Provable security 2

Reinforcement learning 2

open ︾

Search scope:

排序: Display mode:

Certificateless broadcast multi-signature for network coding Research Article

Huifang YU, Zhewei QI

Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 9,   Pages 1369-1377 doi: 10.1631/FITEE.2200271

Abstract: To solve these problems, the certificateless broadcast multi-signature for (NC-CLBMS) method is devised, where each source node user generates a multi-signature about the message vector, and the intermediateNC-CLBMS is a multi-source multi-signature method with anti-pollution and anti-forgery advantages; moreover, it has a fixed signature length and its computation efficiency is very high.

Keywords: Network coding     Certificateless multi-signature     Linear combination     Homomorphic hash function    

Design of bio-oil additives via molecular signature descriptors using a multi-stage computer-aided molecular

Frontiers of Chemical Science and Engineering 2022, Volume 16, Issue 2,   Pages 168-182 doi: 10.1007/s11705-021-2056-8

Abstract: different property prediction models consist different levels of structural information, molecular signatureThus, a multi-stage framework was developed by developing consistency rules that restrict the number

Keywords: computer-aided molecular design     bio-oil additives     molecular signature descriptor    

Low-computation certificateless hybrid signcryption scheme Article

Hui-fang YU, Bo YANG

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 7,   Pages 928-940 doi: 10.1631/FITEE.1601054

Abstract: In this paper, we apply the technique of certificateless hybrid signcryption to an elliptic-curve cryptosystem, and construct a low-computation certificateless hybrid signcryption scheme.

Keywords: Hybrid signcryption     Scalar multiplication     Certificateless cryptosystem     Provable security    

The Generating Lock P<G,X,X'>and Its Central Encrypting System

Shi Kaiquan,Chen Zexiong

Strategic Study of CAE 2000, Volume 2, Issue 2,   Pages 41-46

Abstract: single-tooth central encrypting system, and the generating lock P <G ,X, X´> and multi-toothThe single-tooth encrypting-decrypting algorithm multi-tooth encrypting-decrypting algorithm, multi-toothstatic encrypting-decrypting algorithm, multi-tooth dynamic encrypting-decrypting algorithm as well

Keywords: the generating lock     the central encrypting system     multi-tooth encrypting-decrypting algorithm     P    X     X'     > existence theorem     digital signature uniqueness theorem    

Efficient identity-based signature over NTRU lattice

Jia XIE,Yu-pu HU,Jun-tao GAO,Wen GAO

Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 2,   Pages 135-142 doi: 10.1631/FITEE.1500197

Abstract:

Identity-based signature has become an important technique for lightweight authentication as soonThereafter, identity-based signature schemes based on the integer factorization problem and discreteIn this study, an efficient identity-based signature scheme is presented over the number theory researchThe new scheme is more efficient than other lattice- and identity-based signature schemes.

Keywords: Identity     Signature     Lattice     Number theory research unit (NTRU)    

Constructing pairing-free certificateless public key encryption with keyword search Research Articles

Yang LU, Ji-guo LI

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 8,   Pages 1049-1060 doi: 10.1631/FITEE.1700534

Abstract: Certificateless cryptography (CLC) is a novel cryptographic primitive that has many merits.Motivated by the appealing features of CLC, three certificateless encryption with keyword search (CLEKS

Keywords: Searchable public key encryption     Certificateless public key encryption with keyword search     Bilinear pairing    

Aleakage-resilient certificateless public key encryption scheme withCCA2security None

Yan-wei ZHOU, Bo YANG, Hao CHENG, Qing-long WANG

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 4,   Pages 481-493 doi: 10.1631/FITEE.1601849

Abstract: performance, a new construction of a chosen ciphertext attack 2 (CCA2) secure, leakage-resilient, and certificateless

Keywords: Certificateless public-key encryption     Leakage-resilience     Provable security     CCA2 security     Decisional Diffie-Hellman    

Machine learning modeling identifies hypertrophic cardiomyopathy subtypes with genetic signature

Frontiers of Medicine 2023, Volume 17, Issue 4,   Pages 768-780 doi: 10.1007/s11684-023-0982-1

Abstract: Previous studies have revealed that patients with hypertrophic cardiomyopathy (HCM) exhibit differences in symptom severity and prognosis, indicating potential HCM subtypes among these patients. Here, 793 patients with HCM were recruited at an average follow-up of 32.78 ± 27.58 months to identify potential HCM subtypes by performing consensus clustering on the basis of their echocardiography features. Furthermore, we proposed a systematic method for illustrating the relationship between the phenotype and genotype of each HCM subtype by using machine learning modeling and interactome network detection techniques based on whole-exome sequencing data. Another independent cohort that consisted of 414 patients with HCM was recruited to replicate the findings. Consequently, two subtypes characterized by different clinical outcomes were identified in HCM. Patients with subtype 2 presented asymmetric septal hypertrophy associated with a stable course, while those with subtype 1 displayed left ventricular systolic dysfunction and aggressive progression. Machine learning modeling based on personal whole-exome data identified 46 genes with mutation burden that could accurately predict subtype propensities. Furthermore, the patients in another cohort predicted as subtype 1 by the 46-gene model presented increased left ventricular end-diastolic diameter and reduced left ventricular ejection fraction. By employing echocardiography and genetic screening for the 46 genes, HCM can be classified into two subtypes with distinct clinical outcomes.

Keywords: machine learning methods     hypertrophic cardiomyopathy     genetic risk    

Novel efficient identity-based signature on lattices

Jiang-shan Chen, Yu-pu Hu, Hong-mei Liang, Wen Gao,JSChen@mnnu.edu.cn

Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 2,   Pages 141-286 doi: 10.1631/FITEE.1900318

Abstract: With the rapid development of electronic information technology, digital signature has become an indispensableTo overcome this problem, we construct an IBS scheme on s by employing Lyubashevsky’s signature scheme

Keywords: Identity-based signature     Lattice     Strong unforgeability     Random oracle model    

Carcinogens that induce the A:T>T:A nucleotide substitutions in the genome

Guangbiao Zhou, Xinchun Zhao

Frontiers of Medicine 2018, Volume 12, Issue 2,   Pages 236-238 doi: 10.1007/s11684-017-0611-y

Abstract:

Recently, Ng . reported that the A:T>T:A substitutions, proposed to be a signature of aristolochicchloride and its reactive metabolites chloroethylene oxide, melphalan and chlorambucil, also cause this signature

Keywords: genomic signature     carcinogen     aristolochic acid     tobacco smoke     vinyl chloride     hepatocellular carcinoma    

Current Status and Future Development of Quantum Cryptographic Protocols

Zhang Xue, Gao Fei, Qin Sujuan, Zhang Ping

Strategic Study of CAE 2022, Volume 24, Issue 4,   Pages 145-155 doi: 10.15302/J-SSCAE-2022.04.015

Abstract: text-align: justify;">Theoretically, QSS has broad research prospects, such as the (k, n) threshold scheme, multi-partyto multi-party secret sharing, and rational secret sharing protocols., which is different from the practical application of a digital signature.This is considered one of the most important basic protocols for secure multi-party computation.significant advantages in some scenarios; for example, a private network with few functions (“multi-function

Keywords: quantum cryptography     protocols     quantum key distribution     quantum digital signature     quantum private    

Development and Application of Network Electronic Identity Management in Major Countries and Regions around the World

Hu Chuanping,Chen Bing and Fang Binxing、Zou Xiang

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 99-103 doi: 10.15302/J-SSCAE-2016.06.020

Abstract:

This paper analyzes and sorts out the latest developments and typical applications of network electronic identity management in major countries and regions around the world, and discusses development trends in network identity management technology. It outlines network electronic identity management in China according to the 13th Five-Year Plan, including the development of ideas and constructive suggestions, the strengthening of network space identity management, and the construction of a network space identity management system. Such a system can help to regulate the behavior of Internet users, fight against network crime, build network power, safeguard national security and cyberspace sovereignty, and protect the privacy of network users; thus, it provides a reference for China’s network identity management development during the 13th Five-Year Plan.

Keywords: network electronic identity     identity management     digital signature    

Multi-objective optimization for the multi-mode finance-based project scheduling problem

Sameh Al-SHIHABI, Mohammad AlDURGAM

Frontiers of Engineering Management 2020, Volume 7, Issue 2,   Pages 223-237 doi: 10.1007/s42524-020-0097-1

Abstract: The FBSP is extended to consider different execution modes that result in the multi-mode FBSP (MMFBSPNo exact models are available for contractors who look for optimal solutions to the multi-objective MMFBSPMoreover, its current version, CPLEX 12.9, solves multi-objective optimization problems.This study presents a mixed-integer linear programming model for the multi-objective MMFBSP.Using CPLEX 12.9, we discuss several techniques that researchers can use to optimize a multi-objective

Keywords: multi-objective optimization     finance-based scheduling     multi-mode project scheduling     mixed-integer linear    

Build orientation determination of multi-feature mechanical parts in selective laser melting via multi-objective

Frontiers of Mechanical Engineering 2023, Volume 18, Issue 2, doi: 10.1007/s11465-022-0737-8

Abstract: This study proposes a method to determine the build orientation of multi-feature mechanical parts (MFMPsLastly, a multi-objective decision making method integrated by the technique for order of preference

Keywords: selective laser melting (SLM)     build orientation determination     multi-feature mechanical part (MFMP)     fuzzy analytical hierarchy process     multi-objective decision making (MODM)    

A power resource dispatching framework with a privacy protection function in the Power Internet of Things Research Article

Shuanggen LIU, Shuangzi ZHENG, Wenbo ZHANG, Runsheng FU

Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 9,   Pages 1354-1368 doi: 10.1631/FITEE.2100518

Abstract: Smart meters in the generate a large amount of power data. However, data privacy in the process of calculation, storage, and transmission is an urgent problem to be solved. Therefore, in this paper we propose a power resource dispatching framework (PRDF) with a privacy protection function, which uses a scheme based on . Using pseudonyms and aggregating users’ power data, PRDF not only protects users’ privacy, but also reduces the computing cost and communication overhead under traditional cloud computing. In addition, if the control center finds that a user has submitted abnormal data, it can send a request to the user management center to track the real identity of the user. Our scheme satisfies security requirements based on the , including confidentiality and unforgeability. Furthermore, we compare our scheme with other schemes by simulations. Simulation results show that compared with traditional methods, our method performs better in terms of the computation cost.

Keywords: Power Internet of Things     Cloud-fog cooperation     Elliptic curve     Random oracle model     Certificateless    

Title Author Date Type Operation

Certificateless broadcast multi-signature for network coding

Huifang YU, Zhewei QI

Journal Article

Design of bio-oil additives via molecular signature descriptors using a multi-stage computer-aided molecular

Journal Article

Low-computation certificateless hybrid signcryption scheme

Hui-fang YU, Bo YANG

Journal Article

The Generating Lock P<G,X,X'>and Its Central Encrypting System

Shi Kaiquan,Chen Zexiong

Journal Article

Efficient identity-based signature over NTRU lattice

Jia XIE,Yu-pu HU,Jun-tao GAO,Wen GAO

Journal Article

Constructing pairing-free certificateless public key encryption with keyword search

Yang LU, Ji-guo LI

Journal Article

Aleakage-resilient certificateless public key encryption scheme withCCA2security

Yan-wei ZHOU, Bo YANG, Hao CHENG, Qing-long WANG

Journal Article

Machine learning modeling identifies hypertrophic cardiomyopathy subtypes with genetic signature

Journal Article

Novel efficient identity-based signature on lattices

Jiang-shan Chen, Yu-pu Hu, Hong-mei Liang, Wen Gao,JSChen@mnnu.edu.cn

Journal Article

Carcinogens that induce the A:T>T:A nucleotide substitutions in the genome

Guangbiao Zhou, Xinchun Zhao

Journal Article

Current Status and Future Development of Quantum Cryptographic Protocols

Zhang Xue, Gao Fei, Qin Sujuan, Zhang Ping

Journal Article

Development and Application of Network Electronic Identity Management in Major Countries and Regions around the World

Hu Chuanping,Chen Bing and Fang Binxing、Zou Xiang

Journal Article

Multi-objective optimization for the multi-mode finance-based project scheduling problem

Sameh Al-SHIHABI, Mohammad AlDURGAM

Journal Article

Build orientation determination of multi-feature mechanical parts in selective laser melting via multi-objective

Journal Article

A power resource dispatching framework with a privacy protection function in the Power Internet of Things

Shuanggen LIU, Shuangzi ZHENG, Wenbo ZHANG, Runsheng FU

Journal Article