Liu, Yizhong; Liu, Jianwei; Hei, Yiming; Xia, Yu; Wu, Qianhong A secure cross-shard view-change protocol for sharding blockchains. (English) Zbl 1522.94074 Baek, Joonsang (ed.) et al., Information security and privacy. 26th Australasian conference, ACISP 2021, virtual event, December 1–3, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13083, 372-390 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Liu} et al., Lect. Notes Comput. Sci. 13083, 372--390 (2021; Zbl 1522.94074) Full Text: DOI
Geng, Yifu; Qin, Bo; Shi, Wenchang; Wu, Qianhong A paid message forwarding scheme based on social network. (English) Zbl 1479.91279 Wu, Yongdong (ed.) et al., Information security and cryptology. 16th international conference, Inscrypt 2020, Guangzhou, China, December 11–14, 2020. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 12612, 177-192 (2021). Reviewer: Yilun Shang (Newcastle) MSC: 91D30 94A62 94A60 PDFBibTeX XMLCite \textit{Y. Geng} et al., Lect. Notes Comput. Sci. 12612, 177--192 (2021; Zbl 1479.91279) Full Text: DOI
Lang, Ji; Wu, Qianhong Modeling of the transient cerebrospinal fluid flow under external impacts. (English) Zbl 1482.76155 Eur. J. Mech., B, Fluids 87, 171-179 (2021). MSC: 76Z05 76D05 92C10 PDFBibTeX XMLCite \textit{J. Lang} and \textit{Q. Wu}, Eur. J. Mech., B, Fluids 87, 171--179 (2021; Zbl 1482.76155) Full Text: DOI
Wu, Q.; Peng, M. J.; Fu, Y. D.; Cheng, Y. M. The dimension splitting interpolating element-free Galerkin method for solving three-dimensional transient heat conduction problems. (English) Zbl 1521.80025 Eng. Anal. Bound. Elem. 128, 326-341 (2021). MSC: 80M10 65M60 80M20 PDFBibTeX XMLCite \textit{Q. Wu} et al., Eng. Anal. Bound. Elem. 128, 326--341 (2021; Zbl 1521.80025) Full Text: DOI
Feng, Hanwen; Liu, Jianwei; Li, Dawei; Li, Ya-Nan; Wu, Qianhong Traceable ring signatures: general framework and post-quantum security. (English) Zbl 1466.94026 Des. Codes Cryptography 89, No. 6, 1111-1145 (2021). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{H. Feng} et al., Des. Codes Cryptography 89, No. 6, 1111--1145 (2021; Zbl 1466.94026) Full Text: DOI
Guo, Y. L.; Wu, Q. H.; Wang, L.; Tang, G. F. Stability enhancement of one-cycle controlled buck-boost converters with a composite function embedded. (English) Zbl 1468.94944 IEEE Trans. Circuits Syst. I, Regul. Pap. 67, No. 10, 3512-3520 (2020). MSC: 94C60 34H20 PDFBibTeX XMLCite \textit{Y. L. Guo} et al., IEEE Trans. Circuits Syst. I, Regul. Pap. 67, No. 10, 3512--3520 (2020; Zbl 1468.94944)
Wang, Yujue; Pang, HweeHwa; Deng, Robert H.; Ding, Yong; Wu, Qianhong; Qin, Bo; Fan, Kefeng Secure server-aided data sharing clique with attestation. (English) Zbl 1458.68054 Inf. Sci. 522, 80-98 (2020). MSC: 68P25 PDFBibTeX XMLCite \textit{Y. Wang} et al., Inf. Sci. 522, 80--98 (2020; Zbl 1458.68054) Full Text: DOI Link
Deng, Hua; Qin, Zheng; Wu, Qianhong; Guan, Zhenyu; Zhou, Yunya Flexible attribute-based proxy re-encryption for efficient data sharing. (English) Zbl 1456.68030 Inf. Sci. 511, 94-113 (2020). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{H. Deng} et al., Inf. Sci. 511, 94--113 (2020; Zbl 1456.68030) Full Text: DOI
Feng, Hanwen; Liu, Jianwei; Wu, Qianhong; Li, Ya-Nan Traceable ring signatures with post-quantum security. (English) Zbl 1457.94206 Jarecki, Stanislaw (ed.), Topics in cryptology – CT-RSA 2020. The cryptographers’ track at the RSA conference 2020, San Francisco, CA, USA, February 24–28, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12006, 442-468 (2020). MSC: 94A62 94A60 81P94 PDFBibTeX XMLCite \textit{H. Feng} et al., Lect. Notes Comput. Sci. 12006, 442--468 (2020; Zbl 1457.94206) Full Text: DOI
Wu, Q.; Liu, F. B.; Cheng, Y. M. The interpolating element-free Galerkin method for three-dimensional elastoplasticity problems. (English) Zbl 1464.74218 Eng. Anal. Bound. Elem. 115, 156-167 (2020). MSC: 74S05 65N30 74C05 PDFBibTeX XMLCite \textit{Q. Wu} et al., Eng. Anal. Bound. Elem. 115, 156--167 (2020; Zbl 1464.74218) Full Text: DOI
Zhang, Z.; Tan, Z. J.; Yao, X. X.; Hu, C. P.; Ge, P.; Wan, Z. Y.; Li, J. Y.; Wu, Q. Numerical methods for microstructural evolutions in laser additive manufacturing. (English) Zbl 1443.80011 Comput. Math. Appl. 78, No. 7, 2296-2307 (2019). MSC: 80-10 65C05 PDFBibTeX XMLCite \textit{Z. Zhang} et al., Comput. Math. Appl. 78, No. 7, 2296--2307 (2019; Zbl 1443.80011) Full Text: DOI
Wang, Zhipeng; Wu, Qianhong A practical lattice-based sequential aggregate signature. (English) Zbl 1426.94132 Steinfeld, Ron (ed.) et al., Provable security. 13th international conference, ProvSec 2019, Cairns, QLD, Australia, October 1–4, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11821, 94-109 (2019). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{Z. Wang} and \textit{Q. Wu}, Lect. Notes Comput. Sci. 11821, 94--109 (2019; Zbl 1426.94132) Full Text: DOI
Wang, Qiuyun; Zhu, Zenghao; Nathan, Rungun; Wu, Qianhong On the study of fluid flow in a soft porous media using a scaled-up indenter. (English) Zbl 1472.76104 Eur. J. Mech., B, Fluids 76, 332-339 (2019). MSC: 76S05 76-05 PDFBibTeX XMLCite \textit{Q. Wang} et al., Eur. J. Mech., B, Fluids 76, 332--339 (2019; Zbl 1472.76104) Full Text: DOI
Liu, Weiran; Liu, Jianwei; Wu, Qianhong; Qin, Bo; Naccache, David; Ferradi, Houda Efficient subtree-based encryption for fuzzy-entity data sharing. (English) Zbl 1402.68056 Soft Comput. 22, No. 23, 7961-7976 (2018). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{W. Liu} et al., Soft Comput. 22, No. 23, 7961--7976 (2018; Zbl 1402.68056) Full Text: DOI
Zhong, Lin; Wu, Qianhong; Qin, Bo; Zheng, Haibin; Liu, Jianwei Auditable hierarchy-private public-key encryption. (English) Zbl 1444.94117 Susilo, Willy (ed.) et al., Information security and privacy. 23rd Australasian conference, ACISP 2018, Wollongong, NSW, Australia, July 11–13, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10946, 322-340 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{L. Zhong} et al., Lect. Notes Comput. Sci. 10946, 322--340 (2018; Zbl 1444.94117) Full Text: DOI
Zheng, Haibin; Wu, Qianhong; Qin, Bo; Zhong, Lin; He, Shuangyu; Liu, Jianwei Linkable group signature for auditing anonymous communication. (English) Zbl 1444.94116 Susilo, Willy (ed.) et al., Information security and privacy. 23rd Australasian conference, ACISP 2018, Wollongong, NSW, Australia, July 11–13, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10946, 304-321 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{H. Zheng} et al., Lect. Notes Comput. Sci. 10946, 304--321 (2018; Zbl 1444.94116) Full Text: DOI
Feng, Hanwen; Liu, Jianwei; Wu, Qianhong; Liu, Weiran Predicate fully homomorphic encryption: achieving fine-grained access control over manipulable ciphertext. (English) Zbl 1426.94097 Chen, Xiaofeng (ed.) et al., Information security and cryptology. 13th international conference, Inscrypt 2017, Xi’an, China, November 3–5, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10726, 278-298 (2018). MSC: 94A60 68M11 PDFBibTeX XMLCite \textit{H. Feng} et al., Lect. Notes Comput. Sci. 10726, 278--298 (2018; Zbl 1426.94097) Full Text: DOI
Wang, Zhen; Luo, Xiling; Wu, Qianhong Verifiably encrypted group signatures. (English) Zbl 1439.94090 Okamoto, Tatsuaki (ed.) et al., Provable security. 11th international conference, ProvSec 2017, Xi’an, China, October 23–25, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10005, 107-126 (2017). MSC: 94A62 PDFBibTeX XMLCite \textit{Z. Wang} et al., Lect. Notes Comput. Sci. 10005, 107--126 (2017; Zbl 1439.94090) Full Text: DOI
Liang, Zhi; Wu, Qianhong; Liu, Weiran; Liu, Jianwei; Xiao, Fu Provably secure self-extractable encryption. (English) Zbl 1439.94039 Okamoto, Tatsuaki (ed.) et al., Provable security. 11th international conference, ProvSec 2017, Xi’an, China, October 23–25, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10005, 3-23 (2017). MSC: 94A60 68P25 68P27 PDFBibTeX XMLCite \textit{Z. Liang} et al., Lect. Notes Comput. Sci. 10005, 3--23 (2017; Zbl 1439.94039) Full Text: DOI
Mao, Jian; Zhang, Yan; Li, Pei; Li, Teng; Wu, Qianhong; Liu, Jianwei A position-aware Merkle tree for dynamic cloud data integrity verification. (English) Zbl 1381.68013 Soft Comput. 21, No. 8, 2151-2164 (2017). MSC: 68M11 68P20 68Q25 PDFBibTeX XMLCite \textit{J. Mao} et al., Soft Comput. 21, No. 8, 2151--2164 (2017; Zbl 1381.68013) Full Text: DOI
Sun, Jiameng; Zhu, Binrui; Qin, Jing; Hu, Jiankun; Wu, Qianhong Confidentiality-preserving publicly verifiable computation. (English) Zbl 1417.94081 Int. J. Found. Comput. Sci. 28, No. 6, 799-818 (2017). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{J. Sun} et al., Int. J. Found. Comput. Sci. 28, No. 6, 799--818 (2017; Zbl 1417.94081) Full Text: DOI
Chen, J. J.; Wu, Q. H.; Zhang, L. L.; Wu, P. Z. Multi-objective mean-variance-skewness model for nonconvex and stochastic optimal power flow considering wind power and load uncertainties. (English) Zbl 1380.90242 Eur. J. Oper. Res. 263, No. 2, 719-732 (2017). MSC: 90C29 90B25 90C15 90C26 90C59 90C90 PDFBibTeX XMLCite \textit{J. J. Chen} et al., Eur. J. Oper. Res. 263, No. 2, 719--732 (2017; Zbl 1380.90242) Full Text: DOI
Xu, Peng; Liang, Shuai; Wang, Wei; Susilo, Willy; Wu, Qianhong; Jin, Hai Dynamic searchable symmetric encryption with physical deletion and small leakage. (English) Zbl 1386.94088 Pieprzyk, Josef (ed.) et al., Information security and privacy. 22nd Australasian conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017. Proceedings. Part I. Cham: Springer (ISBN 978-3-319-60054-3/pbk; 978-3-319-60055-0/ebook). Lecture Notes in Computer Science 10342, 207-226 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{P. Xu} et al., Lect. Notes Comput. Sci. 10342, 207--226 (2017; Zbl 1386.94088) Full Text: DOI Link
Gu, X. B.; Wu, Q. H. The application of nonordinary, state-based peridynamic theory on the damage process of the rock-like materials. (English) Zbl 1400.74074 Math. Probl. Eng. 2016, Article ID 9794605, 9 p. (2016). MSC: 74L10 74A45 PDFBibTeX XMLCite \textit{X. B. Gu} and \textit{Q. H. Wu}, Math. Probl. Eng. 2016, Article ID 9794605, 9 p. (2016; Zbl 1400.74074) Full Text: DOI
Xu, Peng; Jiao, Tengfei; Wu, Qianhong; Wang, Wei; Jin, Hai Conditional identity-based broadcast proxy re-encryption and its application to cloud email. (English) Zbl 1360.94339 IEEE Trans. Comput. 65, No. 1, 66-79 (2016). MSC: 94A60 68M11 PDFBibTeX XMLCite \textit{P. Xu} et al., IEEE Trans. Comput. 65, No. 1, 66--79 (2016; Zbl 1360.94339) Full Text: DOI
Wu, Qianhong; Qin, Bo; Zhang, Lei; Domingo-Ferrer, Josep; Farràs, Oriol; Manjón, Jesús A. Contributory broadcast encryption with efficient encryption and short ciphertexts. (English) Zbl 1360.94337 IEEE Trans. Comput. 65, No. 2, 466-479 (2016). MSC: 94A60 94A29 PDFBibTeX XMLCite \textit{Q. Wu} et al., IEEE Trans. Comput. 65, No. 2, 466--479 (2016; Zbl 1360.94337) Full Text: DOI
Zhang, Lei; Hu, Chuanyan; Wu, Qianhong; Domingo-Ferrer, Josep; Qin, Bo Privacy-preserving vehicular communication authentication with hierarchical aggregation and fast response. (English) Zbl 1360.94357 IEEE Trans. Comput. 65, No. 8, 2562-2574 (2016). MSC: 94A62 PDFBibTeX XMLCite \textit{L. Zhang} et al., IEEE Trans. Comput. 65, No. 8, 2562--2574 (2016; Zbl 1360.94357) Full Text: DOI
He, Kun; Chen, Jing; Du, Ruiying; Wu, Qianhong; Xue, Guoliang; Zhang, Xiang DeyPoS: deduplicatable dynamic proof of storage for multi-user environments. (English) Zbl 1360.68429 IEEE Trans. Comput. 65, No. 12, 3631-3645 (2016). MSC: 68P25 68P20 PDFBibTeX XMLCite \textit{K. He} et al., IEEE Trans. Comput. 65, No. 12, 3631--3645 (2016; Zbl 1360.68429) Full Text: DOI
Ren, Yili; Luo, Xiling; Wu, Qianhong; Liu, Joseph K.; Zhang, Peng Towards certificate-based group encryption. (English) Zbl 1381.94084 Chen, Liqun (ed.) et al., Provable security. 10th international conference, ProvSec 2016, Nanjing, China, November 10–11, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-47421-2/pbk; 978-3-319-47422-9/ebook). Lecture Notes in Computer Science 10005, 296-305 (2016). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{Y. Ren} et al., Lect. Notes Comput. Sci. 10005, 296--305 (2016; Zbl 1381.94084) Full Text: DOI
Luo, Xiling; Ren, Yili; Liu, Jingwen; Hu, Jiankun; Liu, Weiran; Wang, Zhen; Xu, Wei; Wu, Qianhong Identity-based group encryption. (English) Zbl 1346.94115 Liu, Joseph K.K. (ed.) et al., Information security and privacy. 21st Australasian conference, ACISP 2016, Melbourne, VIC, Australia, July 4–6, 2016. Proceedings. Part II. Cham: Springer (ISBN 978-3-319-40366-3/pbk; 978-3-319-40367-0/ebook). Lecture Notes in Computer Science 9723, 87-102 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{X. Luo} et al., Lect. Notes Comput. Sci. 9723, 87--102 (2016; Zbl 1346.94115) Full Text: DOI
Jiang, Tao; Chen, Xiaofeng; Wu, Qianhong; Ma, Jianfeng; Susilo, Willy; Lou, Wenjing Towards efficient fully randomized message-locked encryption. (English) Zbl 1403.94064 Liu, Joseph K. (ed.) et al., Information security and privacy. 21st Australasian conference, ACISP 2016, Melbourne, VIC, Australia, July 4–6, 2016. Proceedings. Part I. Cham: Springer (ISBN 978-3-319-40252-9/pbk; 978-3-319-40253-6/ebook). Lecture Notes in Computer Science 9722, 361-375 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{T. Jiang} et al., Lect. Notes Comput. Sci. 9722, 361--375 (2016; Zbl 1403.94064) Full Text: DOI Link
Sun, Yang; Wu, Qianhong; Liu, Jingwen; Liu, Jianwei; Huang, Xinyi; Qin, Bo; Hu, Wei Accelerating oblivious transfer with batch multi-exponentiation. (English) Zbl 1409.94906 Liu, Joseph K. (ed.) et al., Information security and privacy. 21st Australasian conference, ACISP 2016, Melbourne, VIC, Australia, July 4–6, 2016. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 9722, 310-326 (2016). MSC: 94A60 68M12 PDFBibTeX XMLCite \textit{Y. Sun} et al., Lect. Notes Comput. Sci. 9722, 310--326 (2016; Zbl 1409.94906) Full Text: DOI
Sun, Yang; Wu, Qianhong; Qin, Bo; Wang, Yujue; Liu, Jianwei Batch blind signatures on elliptic curves. (English) Zbl 1403.94099 Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 192-206 (2015). MSC: 94A62 14G50 PDFBibTeX XMLCite \textit{Y. Sun} et al., Lect. Notes Comput. Sci. 9065, 192--206 (2015; Zbl 1403.94099) Full Text: DOI
Wang, Yujue; Wong, Duncan S.; Wu, Qianhong; Chow, Sherman S. M.; Qin, Bo; Liu, Jianwei; Ding, Yong Practical (fully) distributed signatures provably secure in the standard model. (English) Zbl 1339.94082 Theor. Comput. Sci. 595, 143-158 (2015). MSC: 94A62 PDFBibTeX XMLCite \textit{Y. Wang} et al., Theor. Comput. Sci. 595, 143--158 (2015; Zbl 1339.94082) Full Text: DOI
Zhang, Chuan-Ke; He, Yong; Jiang, L.; Wu, Min; Wu, Q. H. Stability analysis of sampled-data systems considering time delays and its application to electric power markets. (English) Zbl 1395.93362 J. Franklin Inst. 351, No. 9, 4457-4478 (2014). MSC: 93C57 93C23 93D09 93D15 93C05 93C95 PDFBibTeX XMLCite \textit{C.-K. Zhang} et al., J. Franklin Inst. 351, No. 9, 4457--4478 (2014; Zbl 1395.93362) Full Text: DOI
Deng, Hua; Wu, Qianhong; Qin, Bo; Domingo-Ferrer, Josep; Zhang, Lei; Liu, Jianwei; Shi, Wenchang Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts. (English) Zbl 1341.68043 Inf. Sci. 275, 370-384 (2014). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{H. Deng} et al., Inf. Sci. 275, 370--384 (2014; Zbl 1341.68043) Full Text: DOI
Zhang, Lei; Wu, Qianhong; Domingo-Ferrer, Josep; Qin, Bo; Zeng, Peng Signatures in hierarchical certificateless cryptography: efficient constructions and provable security. (English) Zbl 1341.94024 Inf. Sci. 272, 223-237 (2014). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{L. Zhang} et al., Inf. Sci. 272, 223--237 (2014; Zbl 1341.94024) Full Text: DOI
Yue, X. D.; Miao, D. Q.; Cao, L. B.; Wu, Q.; Chen, Y. F. An efficient color quantization based on generic roughness measure. (English) Zbl 1339.68298 Pattern Recognition 47, No. 4, 1777-1789 (2014). MSC: 68U10 94A08 PDFBibTeX XMLCite \textit{X. D. Yue} et al., Pattern Recognition 47, No. 4, 1777--1789 (2014; Zbl 1339.68298) Full Text: DOI
Zhang, Lei; Wu, Qianhong; Domingo-Ferrer, Josep; Qin, Bo; Chow, Sherman S. M.; Shi, Wenchang Secure one-to-group communications escrow-free ID-based asymmetric group key agreement. (English) Zbl 1347.94065 Lin, Dongdai (ed.) et al., Information security and cryptology. 9th international conference, Inscrypt 2013, Guangzhou, China, November 27–30, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12086-7/pbk; 978-3-319-12087-4/ebook). Lecture Notes in Computer Science 8567, 239-254 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{L. Zhang} et al., Lect. Notes Comput. Sci. 8567, 239--254 (2014; Zbl 1347.94065) Full Text: DOI
Liu, Weiran; Liu, Jianwei; Wu, Qianhong; Qin, Bo; Zhou, Yunya Practical direct chosen ciphertext secure key-policy attribute-based encryption with public ciphertext test. (English) Zbl 1443.94071 Kutyłowski, Mirosław (ed.) et al., Computer security – ESORICS 2014. 19th European symposium on research in computer security, Wrocław, Poland, September 7–11, 2014. Proceedings, Part II. Berlin: Springer. Lect. Notes Comput. Sci. 8713, 91-108 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{W. Liu} et al., Lect. Notes Comput. Sci. 8713, 91--108 (2014; Zbl 1443.94071) Full Text: DOI
Liu, Weiran; Liu, Jianwei; Wu, Qianhong; Qin, Bo Hierarchical identity-based broadcast encryption. (English) Zbl 1337.94050 Susilo, Willy (ed.) et al., Information security and privacy. 19th Australasian conference, ACISP 2014, Wollongong, NSW, Australia, July 7–9, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-08343-8/pbk). Lecture Notes in Computer Science 8544, 242-257 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{W. Liu} et al., Lect. Notes Comput. Sci. 8544, 242--257 (2014; Zbl 1337.94050) Full Text: DOI
Wang, Yujue; Wong, Duncan S.; Wu, Qianhong; Chow, Sherman S. M.; Qin, Bo; Liu, Jianwei Practical distributed signatures in the standard model. (English) Zbl 1337.94103 Benaloh, Josh (ed.), Topics in cryptology – CT-RSA 2014. The cryptographer’s track at the RSA conference 2014, San Francisco, CA, USA, February 25–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-04851-2/pbk). Lecture Notes in Computer Science 8366, 307-326 (2014). MSC: 94A62 PDFBibTeX XMLCite \textit{Y. Wang} et al., Lect. Notes Comput. Sci. 8366, 307--326 (2014; Zbl 1337.94103) Full Text: DOI
Xu, Peng; Jin, Hai; Wu, Qianhong; Wang, Wei Public-key encryption with fuzzy keyword search: a provably secure scheme under keyword guessing attack. (English) Zbl 1365.94466 IEEE Trans. Comput. 62, No. 11, 2266-2277 (2013). MSC: 94A60 94D05 68P25 PDFBibTeX XMLCite \textit{P. Xu} et al., IEEE Trans. Comput. 62, No. 11, 2266--2277 (2013; Zbl 1365.94466) Full Text: DOI
Wang, Y. M.; Wu, Q. Construction of operator-orthogonalwavelet-based elements for adaptive analysis of thin plate bending problems. (English) Zbl 1356.74127 CMES, Comput. Model. Eng. Sci. 93, No. 1, 17-45 (2013). MSC: 74K20 74S05 65N30 65T60 74G60 PDFBibTeX XMLCite \textit{Y. M. Wang} and \textit{Q. Wu}, CMES, Comput. Model. Eng. Sci. 93, No. 1, 17--45 (2013; Zbl 1356.74127) Full Text: DOI
Zhang, Chuan-Ke; Jiang, L.; He, Yong; Wu, Q. H.; Wu, Min Asymptotical synchronization for chaotic Lur’e systems using sampled-data control. (English) Zbl 1308.34078 Commun. Nonlinear Sci. Numer. Simul. 18, No. 10, 2743-2751 (2013). MSC: 34H10 93C57 34D06 PDFBibTeX XMLCite \textit{C.-K. Zhang} et al., Commun. Nonlinear Sci. Numer. Simul. 18, No. 10, 2743--2751 (2013; Zbl 1308.34078) Full Text: DOI
Liao, H. L.; Wu, Q. H. Multi-objective optimization by learning automata. (English) Zbl 1268.90080 J. Glob. Optim. 55, No. 2, 459-487 (2013). MSC: 90C29 PDFBibTeX XMLCite \textit{H. L. Liao} and \textit{Q. H. Wu}, J. Glob. Optim. 55, No. 2, 459--487 (2013; Zbl 1268.90080) Full Text: DOI
Xiong, Hu; Wu, Qianhong; Chen, Zhong An efficient provably secure certificateless aggregate signature applicable to mobile computation. (English) Zbl 1318.94087 Control Cybern. 41, No. 2, 373-391 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{H. Xiong} et al., Control Cybern. 41, No. 2, 373--391 (2012; Zbl 1318.94087)
Qin, Bo; Wu, Qianhong; Domingo-Ferrer, Josep; Susilo, Willy Robust distributed privacy-preserving secure aggregation in vehicular communication. (English) Zbl 1318.93007 Control Cybern. 41, No. 2, 277-296 (2012). MSC: 93A14 94A60 93A15 PDFBibTeX XMLCite \textit{B. Qin} et al., Control Cybern. 41, No. 2, 277--296 (2012; Zbl 1318.93007)
Yu, T.; Zhou, Baolong; Chan, K. W.; Yuan, Ye; Yang, B.; Wu, Q. H. \(R(\lambda)\) imitation learning for automatic generation control of interconnected power grids. (English) Zbl 1258.49067 Automatica 48, No. 9, 2130-2136 (2012). MSC: 49N90 68T05 PDFBibTeX XMLCite \textit{T. Yu} et al., Automatica 48, No. 9, 2130--2136 (2012; Zbl 1258.49067) Full Text: DOI
Qin, Bo; Wu, Qianhong; Zhang, Lei; Farràs, Oriol; Domingo-Ferrer, Josep Provably secure threshold public-key encryption with adaptive security and short ciphertexts. (English) Zbl 1250.94042 Inf. Sci. 210, 67-80 (2012). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{B. Qin} et al., Inf. Sci. 210, 67--80 (2012; Zbl 1250.94042) Full Text: DOI
Zhang, Lei; Zhang, Futai; Wu, Qianhong Delegation of signing rights using certificateless proxy signatures. (English) Zbl 1239.94080 Inf. Sci. 184, No. 1, 298-309 (2012). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{L. Zhang} et al., Inf. Sci. 184, No. 1, 298--309 (2012; Zbl 1239.94080) Full Text: DOI
Zhang, Lei; Wu, Qianhong; Qin, Bo; Domingo-Ferrer, Josep Provably secure one-round identity-based authenticated asymmetric group key agreement protocol. (English) Zbl 1242.94033 Inf. Sci. 181, No. 19, 4318-4329 (2011). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{L. Zhang} et al., Inf. Sci. 181, No. 19, 4318--4329 (2011; Zbl 1242.94033) Full Text: DOI
Wu, Qianhong; Qin, Bo; Zhang, Lei; Domingo-Ferrer, Josep; Farràs, Oriol Bridging broadcast encryption and group key agreement. (English) Zbl 1227.94067 Lee, Dong Hoon (ed.) et al., Advances in cryptology – ASIACRYPT 2011. 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4–8, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25384-3/pbk). Lecture Notes in Computer Science 7073, 143-160 (2011). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{Q. Wu} et al., Lect. Notes Comput. Sci. 7073, 143--160 (2011; Zbl 1227.94067) Full Text: DOI
Wu, Qianhong; Qin, Bo; Zhang, Lei; Domingo-Ferrer, Josep Fully distributed broadcast encryption. (English) Zbl 1298.94111 Boyen, Xavier (ed.) et al., Provable security. 5th international conference, ProvSec 2011, Xi’an, China, October 16–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-24315-8/pbk). Lecture Notes in Computer Science 6980, 102-119 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{Q. Wu} et al., Lect. Notes Comput. Sci. 6980, 102--119 (2011; Zbl 1298.94111) Full Text: DOI
Chen, Xiaofeng; Wu, Qianhong; Zhang, Fangguo; Tian, Haibo; Wei, Baodian; Lee, Byoungcheon; Lee, Hyunrok; Kim, Kwangjo New receipt-free voting scheme using double-trapdoor commitment. (English) Zbl 1251.94025 Inf. Sci. 181, No. 8, 1493-1502 (2011). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{X. Chen} et al., Inf. Sci. 181, No. 8, 1493--1502 (2011; Zbl 1251.94025) Full Text: DOI
Nikolaidis, K.; Goulermas, J. Y.; Wu, Q. H. A class boundary preserving algorithm for data condensation. (English) Zbl 1209.68421 Pattern Recognition 44, No. 3, 704-715 (2011). MSC: 68T05 68T10 PDFBibTeX XMLCite \textit{K. Nikolaidis} et al., Pattern Recognition 44, No. 3, 704--715 (2011; Zbl 1209.68421) Full Text: DOI
Wang, Houzhen; Zhang, Huanguo; Wu, Qianhong; Zhang, Yu; Li, Chunlei; Zhang, Xinyu Design theory and method of multivariate hash function. (English) Zbl 1497.94123 Sci. China, Inf. Sci. 53, No. 10, 1977-1987 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{H. Wang} et al., Sci. China, Inf. Sci. 53, No. 10, 1977--1987 (2010; Zbl 1497.94123) Full Text: DOI
Wang, Houzhen; Zhang, Huanguo; Guan, Haiming; Wu, Qianhong Multivariable algebra theory and its application in cryptography. (Chinese. English summary) Zbl 1240.94097 J. Beijing Univ. Technol. 36, No. 5, 627-634 (2010). MSC: 94A60 11T71 PDFBibTeX XMLCite \textit{H. Wang} et al., J. Beijing Univ. Technol. 36, No. 5, 627--634 (2010; Zbl 1240.94097)
Qin, Bo; Wu, Qianhong; Zhang, Lei; Domingo-Ferrer, Josep Threshold public-key encryption with adaptive security and short ciphertexts. (English) Zbl 1295.94134 Soriano, Miguel (ed.) et al., Information and communications security. 12th international conference, ICICS 2010, Barcelona, Spain, December 15–17, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17649-4/pbk). Lecture Notes in Computer Science 6476, 62-76 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Qin} et al., Lect. Notes Comput. Sci. 6476, 62--76 (2010; Zbl 1295.94134) Full Text: DOI
Zhang, Lei; Qin, Bo; Wu, Qianhong; Zhang, Futai Efficient many-to-one authentication with certificateless aggregate signatures. (English) Zbl 1346.68088 Comput. Netw. 54, No. 14, 2482-2491 (2010). MSC: 68P25 68M11 68M12 94A60 94A62 PDFBibTeX XMLCite \textit{L. Zhang} et al., Comput. Netw. 54, No. 14, 2482--2491 (2010; Zbl 1346.68088) Full Text: DOI
Zhang, Lei; Wu, Qianhong; Qin, Bo; Domingo-Ferrer, Josep Identity-based authenticated asymmetric group key agreement protocol. (English) Zbl 1282.94074 Thai, My T. (ed.) et al., Computing and combinatorics. 16th annual international conference, COCOON 2010, Nha Trang, Vietnam, July 19–21, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14030-3/pbk). Lecture Notes in Computer Science 6196, 510-519 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{L. Zhang} et al., Lect. Notes Comput. Sci. 6196, 510--519 (2010; Zbl 1282.94074) Full Text: DOI
Zhang, Lei; Zhang, Futai; Wu, Qianhong; Domingo-Ferrer, Josep Simulatable certificateless two-party authenticated key agreement protocol. (English) Zbl 1185.94085 Inf. Sci. 180, No. 6, 1020-1030 (2010). MSC: 94A62 PDFBibTeX XMLCite \textit{L. Zhang} et al., Inf. Sci. 180, No. 6, 1020--1030 (2010; Zbl 1185.94085) Full Text: DOI
Chu, Ying; Mi, Hua; Ji, Zhen; Wu, Q. H. A simultaneous algebraic reconstruction technique based on intelligent particle optimizer. (Chinese. English summary) Zbl 1212.68386 J. Shenzhen Univ., Sci. Eng. 26, No. 2, 111-115 (2009). MSC: 68U10 68T20 94A08 PDFBibTeX XMLCite \textit{Y. Chu} et al., J. Shenzhen Univ., Sci. Eng. 26, No. 2, 111--115 (2009; Zbl 1212.68386)
Zhang, Lei; Qin, Bo; Wu, Qianhong; Zhang, Futai Novel efficient certificateless aggregate signatures. (English) Zbl 1273.94370 Bras-Amorós, Maria (ed.) et al., Applied algebra, algebraic algorithms and error-correcting codes. 18th international symposium, AAECC-18, Tarragona, Sapin, June 8–12, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02180-0/pbk). Lecture Notes in Computer Science 5527, 235-238 (2009). MSC: 94A62 PDFBibTeX XMLCite \textit{L. Zhang} et al., Lect. Notes Comput. Sci. 5527, 235--238 (2009; Zbl 1273.94370) Full Text: DOI
Zhang, Lei; Wu, Qianhong; Qin, Bo Identity-based verifiably encrypted signatures without random oracles. (English) Zbl 1267.94135 Pieprzyk, Josef (ed.) et al., Provable security. Third international conference, ProvSec 2009, Guangzhou, China, November 11–13, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04641-4/pbk). Lecture Notes in Computer Science 5848, 76-89 (2009). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{L. Zhang} et al., Lect. Notes Comput. Sci. 5848, 76--89 (2009; Zbl 1267.94135) Full Text: DOI
Wu, Qianhong; Mu, Yi; Susilo, Willy; Qin, Bo; Domingo-Ferrer, Josep Asymmetric group key agreement. (English) Zbl 1239.94078 Joux, Antoine (ed.), Advances in cryptology – EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26–30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-01000-2/pbk). Lecture Notes in Computer Science 5479, 153-170 (2009). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{Q. Wu} et al., Lect. Notes Comput. Sci. 5479, 153--170 (2009; Zbl 1239.94078) Full Text: DOI
Wu, Qianhong; Qin, Bo; Mu, Yi; Susilo, Willy Privacy for private key in signatures. (English) Zbl 1237.94099 Yung, Moti (ed.) et al., Information security and cryptology. 4th international conference, Inscrypt 2008, Beijing, China, December 14–17, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-642-01439-0/pbk). Lecture Notes in Computer Science 5487, 84-95 (2009). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{Q. Wu} et al., Lect. Notes Comput. Sci. 5487, 84--95 (2009; Zbl 1237.94099) Full Text: DOI
Qin, Bo; Wu, Qianhong; Susilo, Willy; Mu, Yi Publicly verifiable privacy-preserving group decryption. (English) Zbl 1237.94090 Yung, Moti (ed.) et al., Information security and cryptology. 4th international conference, Inscrypt 2008, Beijing, China, December 14–17, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-642-01439-0/pbk). Lecture Notes in Computer Science 5487, 72-83 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Qin} et al., Lect. Notes Comput. Sci. 5487, 72--83 (2009; Zbl 1237.94090) Full Text: DOI Link
Wu, Q. H.; Lu, Zhen; Ji, Tianyao Protective relaying of power systems using mathematical morphology. (English) Zbl 1196.94002 Power Systems. London: Springer (ISBN 978-1-84882-498-0/hbk; 978-1-84882-499-7/ebook). xxii, 207 p. (2009). MSC: 94-01 94A12 94A08 PDFBibTeX XMLCite \textit{Q. H. Wu} et al., Protective relaying of power systems using mathematical morphology. London: Springer (2009; Zbl 1196.94002) Full Text: DOI
Ji, T. Y.; Lu, Z.; Wu, Q. H. Detection of power disturbances using morphological gradient wavelet. (English) Zbl 1186.94159 Signal Process. 88, No. 2, 255-267 (2008). MSC: 94A12 PDFBibTeX XMLCite \textit{T. Y. Ji} et al., Signal Process. 88, No. 2, 255--267 (2008; Zbl 1186.94159) Full Text: DOI
Mu, Yi; Wong, Duncan; Chen, Liqun; Susilo, Willy; Wu, Qianhong Concurrent signatures without a conventional keystone. (English) Zbl 1157.94371 Li, Yongqing (ed.) et al., Coding and cryptology. Proceedings of the first international workshop, Wuyi Mountain, Fujian, China, June 11–15, 2007. Hackensack, NJ: World Scientific (ISBN 978-981-283-223-8/hbk). Series on Coding Theory and Cryptology 4, 196-213 (2008). MSC: 94A62 PDFBibTeX XMLCite \textit{Y. Mu} et al., Ser. Coding Theory Cryptol. 4, 196--213 (2008; Zbl 1157.94371) Full Text: DOI
Grünewald, S.; Huber, K. T.; Wu, Q. Two novel closure rules for constructing phylogenetic super-networks. (English) Zbl 1147.92029 Bull. Math. Biol. 70, No. 7, 1906-1924 (2008). MSC: 92D15 05C05 05C90 PDFBibTeX XMLCite \textit{S. Grünewald} et al., Bull. Math. Biol. 70, No. 7, 1906--1924 (2008; Zbl 1147.92029) Full Text: DOI
Lau, K. W.; Wu, Q. H. Local prediction of nonlinear time series using support vector regression. (English) Zbl 1132.62080 Pattern Recognition 41, No. 5, 1539-1547 (2008). MSC: 62M20 37M10 37D45 62M10 PDFBibTeX XMLCite \textit{K. W. Lau} and \textit{Q. H. Wu}, Pattern Recognition 41, No. 5, 1539--1547 (2008; Zbl 1132.62080) Full Text: DOI
Ji, T. Y.; Lu, Z.; Wu, Q. H. Optimal soft morphological filter for periodic noise removal using a particle swarm optimiser with passive congregation. (English) Zbl 1186.94158 Signal Process. 87, No. 11, 2799-2809 (2007). MSC: 94A12 PDFBibTeX XMLCite \textit{T. Y. Ji} et al., Signal Process. 87, No. 11, 2799--2809 (2007; Zbl 1186.94158) Full Text: DOI
An, Congpei; Wu, Qianhong Study of the application of the gilding-box method for calculate multifractal spectrum in the distribution of surface layer and in-depth elements. (Chinese. English summary) Zbl 1164.86307 Math. Pract. Theory 37, No. 13, 66-72 (2007). MSC: 86A60 28A80 PDFBibTeX XMLCite \textit{C. An} and \textit{Q. Wu}, Math. Pract. Theory 37, No. 13, 66--72 (2007; Zbl 1164.86307)
Wang, Baocang; Wu, Qianhong; Hu, Yupu A knapsack-based probabilistic encryption scheme. (English) Zbl 1142.94361 Inf. Sci. 177, No. 19, 3981-3994 (2007). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Wang} et al., Inf. Sci. 177, No. 19, 3981--3994 (2007; Zbl 1142.94361) Full Text: DOI
Grünewald, S.; Huber, K. T.; Wu, Q. Phylogenetic networks form partial trees. arXiv:0709.0283 Preprint, arXiv:0709.0283 [math.CO] (2007). MSC: 05C99 92D15 BibTeX Cite \textit{S. Grünewald} et al., ``Phylogenetic networks form partial trees'', Preprint, arXiv:0709.0283 [math.CO] (2007) Full Text: arXiv
Wu, Qianhong; Susilo, Willy; Mu, Yi; Zhang, Fanguo Efficient partially blind signatures with provable security. (English) Zbl 1171.94366 Gavrilova, Marina (ed.) et al., Computational science and its applications – ICCSA 2006. International conference, Glasgow, UK, May 8–11, 2006. Proceedings, Part III. Berlin: Springer (ISBN 3-540-34075-0/pbk). Lecture Notes in Computer Science 3982, 345-354 (2006). MSC: 94A62 PDFBibTeX XMLCite \textit{Q. Wu} et al., Lect. Notes Comput. Sci. 3982, 345--354 (2006; Zbl 1171.94366) Full Text: DOI
Au, Man Ho; Wu, Qianhong; Susilo, Willy; Mu, Yi Compact e-cash from bounded accumulator. (English) Zbl 1177.94179 Abe, Masayuki (ed.), Topics in cryptology – CT-RSA 2007. The cryptographers’ track at the RSA conference 2007, San Francisco, CA, USA, February 5-9, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-69327-7/pbk). Lecture Notes in Computer Science 4377, 178-195 (2006). MSC: 94A62 68P25 PDFBibTeX XMLCite \textit{M. H. Au} et al., Lect. Notes Comput. Sci. 4377, 178--195 (2006; Zbl 1177.94179) Full Text: DOI
Wu, Qianhong; Zhang, Fanguo; Susilo, Willy; Mu, Yi An efficient static blind ring signature scheme. (English) Zbl 1185.94084 Won, Dongho (ed.) et al., Information security and cryptology – ICISC 2005. 8th international conference, Seoul, Korea, December 1–2, 2005. Revised selected papers. Berlin: Springer (ISBN 3-540-33354-1/pbk). Lecture Notes in Computer Science 3935, 410-423 (2006). MSC: 94A62 PDFBibTeX XMLCite \textit{Q. Wu} et al., Lect. Notes Comput. Sci. 3935, 410--423 (2006; Zbl 1185.94084) Full Text: DOI
Tillotson, P. R. J.; Wu, Q. H.; Hughes, P. M. Reinforcement learning and multi-agent control within an internet environment. (English) Zbl 1267.93189 Ruano, A. E. (ed.), Intelligent control systems using computational intelligence techniques. London: The Institution of Electrical Engineers (IEE) (ISBN 0-86341-489-3/hbk). IEE Control Engineering Series 70, 327-347 (2005). MSC: 93E35 PDFBibTeX XMLCite \textit{P. R. J. Tillotson} et al., IEE Control Eng. Ser. 70, 327--347 (2005; Zbl 1267.93189)
Zhang, Jianhong; Wu, Qianhong; Wang, Yumin A new efficient group signature with forward security. (English) Zbl 1082.68575 Informatica, Ljubl. 29, No. 3, 321-325 (2005). MSC: 68P25 PDFBibTeX XMLCite \textit{J. Zhang} et al., Informatica, Ljubl. 29, No. 3, 321--325 (2005; Zbl 1082.68575)
Wu, Q.; Andreopoulos, Y.; Xanthos, S.; Weinbaum, S. Dynamic compression of highly compressible porous media with application to snow compaction. (English) Zbl 1078.76507 J. Fluid Mech. 542, 281-304 (2005). MSC: 76-05 76S05 86A40 PDFBibTeX XMLCite \textit{Q. Wu} et al., J. Fluid Mech. 542, 281--304 (2005; Zbl 1078.76507) Full Text: DOI
Wu, Qianhong; Qin, Bo; Wang, Changjie; Chen, Xiaofeng; Wang, Yumin \(t\)-out-of-\(n\) string/bit oblivious transfers revisited. (English) Zbl 1118.68487 Deng, Robert H. (ed.) et al., Information security practice and experience. First international conference, ISPEC 2005, Singapore, April 11–14, 2005. Proceedings. Berlin: Springer (ISBN 3-540-25584-2/pbk). Lecture Notes in Computer Science 3439, 410-421 (2005). MSC: 68P25 94A60 94A62 PDFBibTeX XMLCite \textit{Q. Wu} et al., Lect. Notes Comput. Sci. 3439, 410--421 (2005; Zbl 1118.68487) Full Text: DOI
Welter, K. B.; Wu, Q.; You, Y.; Abel, K.; McCreary, D.; Bajorek, S. M.; Reyes, J. N. jun. Experimental investigation and theoretical modeling of liquid entrainment in a horizontal tee with a vertical-up branch. (English) Zbl 1136.76678 Int. J. Multiphase Flow 30, No. 12, 1451-1484 (2004). MSC: 76Txx PDFBibTeX XMLCite \textit{K. B. Welter} et al., Int. J. Multiphase Flow 30, No. 12, 1451--1484 (2004; Zbl 1136.76678) Full Text: DOI
Wu, Qianhong; Chen, Xiaofeng; Wang, Changjie; Wang, Yumin Shared-key signature and its application to anonymous authentication in ad hoc group. (English) Zbl 1109.68492 Zhang, Kan (ed.) et al., Information security. 7th international conference, ISC 2004, Palo Alto, CA, USA, September 27–29, 2004. Proceedings. Berlin: Springer (ISBN 3-540-23208-7/pbk). Lecture Notes in Computer Science 3225, 330-341 (2004). MSC: 68P25 94A62 PDFBibTeX XMLCite \textit{Q. Wu} et al., Lect. Notes Comput. Sci. 3225, 330--341 (2004; Zbl 1109.68492) Full Text: DOI
Wu, Q. H.; Jiang, L.; Wen, J. Y. Decentralized adaptive control of interconnected nonlinear systems using high gain observer. (English) Zbl 1061.93060 Int. J. Control 77, No. 8, 703-712 (2004). MSC: 93C40 93A14 PDFBibTeX XMLCite \textit{Q. H. Wu} et al., Int. J. Control 77, No. 8, 703--712 (2004; Zbl 1061.93060) Full Text: DOI
Lau, K. W.; Wu, Q. H. Leave one support vector out cross validation for fast estimation of generalization errors. (English) Zbl 1070.68590 Pattern Recognition 37, No. 9, 1835-1840 (2004). MSC: 68T10 PDFBibTeX XMLCite \textit{K. W. Lau} and \textit{Q. H. Wu}, Pattern Recognition 37, No. 9, 1835--1840 (2004; Zbl 1070.68590) Full Text: DOI
Lau, K. W.; Wu, Q. H. Online training of support vector classifier. (English) Zbl 1054.68123 Pattern Recognition 36, No. 8, 1913-1920 (2003). MSC: 68T10 PDFBibTeX XMLCite \textit{K. W. Lau} and \textit{Q. H. Wu}, Pattern Recognition 36, No. 8, 1913--1920 (2003; Zbl 1054.68123) Full Text: DOI
Feng, J. Q.; Buse, D. P.; Wu, Q. H.; Fitch, J. Distributed mobile communication base station diagnosis and monitoring using multi-agents. (English) Zbl 1020.68624 Yin, Hujun (ed.) et al., Intelligent data engineering and automated learning - IDEAL 2002. Third international conference, Manchester, UK, August 12-14, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2412, 267-272 (2002). MSC: 68U99 68M10 68M14 68T35 PDFBibTeX XMLCite \textit{J. Q. Feng} et al., Lect. Notes Comput. Sci. 2412, 267--272 (2002; Zbl 1020.68624) Full Text: Link
Meng, L.; Wu, Q. H.; Yong, Z. Z. A genetic hard \(c\)-means clustering algorithm. (English) Zbl 1001.68201 Dyn. Contin. Discrete Impuls. Syst., Ser. B, Appl. Algorithms 9, No. 3, 421-438 (2002). MSC: 68W05 68T05 68P10 PDFBibTeX XMLCite \textit{L. Meng} et al., Dyn. Contin. Discrete Impuls. Syst., Ser. B, Appl. Algorithms 9, No. 3, 421--438 (2002; Zbl 1001.68201)
Chen, T.; Wu, Q. H.; Rahmani-Torkaman, R.; Hughes, J. A pseudo top-hat mathematical morphological approach to edge detection in dark regions. (English) Zbl 0988.68210 Pattern Recognition 35, No. 1, 199-210 (2002). MSC: 68U10 68T10 PDFBibTeX XMLCite \textit{T. Chen} et al., Pattern Recognition 35, No. 1, 199--210 (2002; Zbl 0988.68210) Full Text: DOI
Wu, Q.-H. Robust stability analysis of control systems with interval plants. (English) Zbl 1017.93076 Int. J. Control 74, No. 9, 921-937 (2001). Reviewer: Didier Henrion (Toulouse) MSC: 93D09 93B40 93B60 PDFBibTeX XMLCite \textit{Q. H. Wu}, Int. J. Control 74, No. 9, 921--937 (2001; Zbl 1017.93076) Full Text: DOI
Cao, Y. J.; Jiang, L.; Wu, Q. H. An evolutionary programming approach to mixed-variable optimization problems. (English) Zbl 1168.90636 Appl. Math. Modelling 24, No. 12, 931-942 (2000). MSC: 90C39 49L20 68T05 PDFBibTeX XMLCite \textit{Y. J. Cao} et al., Appl. Math. Modelling 24, No. 12, 931--942 (2000; Zbl 1168.90636) Full Text: DOI
Wu, Q.; Ishii, M. Sensitivity study on double-sensor conductivity probe for the measurement of interfacial area concentration in bubbly flow. (English) Zbl 1137.76789 Int. J. Multiphase Flow 25, No. 1, 155-173 (1999). MSC: 76Txx PDFBibTeX XMLCite \textit{Q. Wu} and \textit{M. Ishii}, Int. J. Multiphase Flow 25, No. 1, 155--173 (1999; Zbl 1137.76789) Full Text: DOI
Cao, Y. J.; Wu, Q. H. Optimization of control parameters in genetic algorithms: A stochastic approach. (English) Zbl 1020.65032 Int. J. Syst. Sci. 30, No. 5, 551-559 (1999). MSC: 65K05 90C15 60J05 65C50 PDFBibTeX XMLCite \textit{Y. J. Cao} and \textit{Q. H. Wu}, Int. J. Syst. Sci. 30, No. 5, 551--559 (1999; Zbl 1020.65032) Full Text: DOI
Wu, Q.; Kim, S.; Ishii, M.; Beus, S. G. One-group interfacial area transport in vertical bubbly flow. (English) Zbl 0940.76529 Int. J. Heat Mass Transfer 41, No. 8-9, 1103-1112 (1998). MSC: 76T10 80A20 PDFBibTeX XMLCite \textit{Q. Wu} et al., Int. J. Heat Mass Transfer 41, No. 8--9, 1103--1112 (1998; Zbl 0940.76529) Full Text: DOI
Wu, Q.-H. Computation of the stability radius of a Hurwitz polynomial with diamond-like uncertainties. (English) Zbl 0909.93053 Syst. Control Lett. 35, No. 1, 45-60 (1998). MSC: 93D09 93B60 93C80 PDFBibTeX XMLCite \textit{Q. H. Wu}, Syst. Control Lett. 35, No. 1, 45--60 (1998; Zbl 0909.93053) Full Text: DOI
Wu, Q.; Field, A. J.; Kelly, P. H. J. M-tree: A parallel abstract data type for block-irregular adaptive applications. (English) Zbl 0996.68837 Lengauer, Christian (ed.) et al., Euro-par ’97 parallel processing. 3rd international Euro-Par conference, Passau, Germany, August 26-29, 1997. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1300, 638-649 (1997). MSC: 68U99 68Q65 PDFBibTeX XMLCite \textit{Q. Wu} et al., Lect. Notes Comput. Sci. 1300, 638--649 (1997; Zbl 0996.68837)
Hodgkinson, I. J.; Kassam, S.; Wu, Q. H. Eigenequations and compact algorithms for bulk and layered anisotropic optical media: Reflection and refraction at a crystal-crystal interface. (English) Zbl 0876.65022 J. Comput. Phys. 133, No. 1, 75-83 (1997). MSC: 65F15 35Q60 78A05 65N25 PDFBibTeX XMLCite \textit{I. J. Hodgkinson} et al., J. Comput. Phys. 133, No. 1, 75--83 (1997; Zbl 0876.65022) Full Text: DOI