Остановите войну!
for scientists:
default search action
Xian Wang 0002
- > Home > Persons > Xian Wang 0002
Publications
- 2017
- [j20]Shiang-Feng Tzeng, Shi-Jinn Horng, Tianrui Li, Xian Wang, Po-Hsian Huang, Muhammad Khurram Khan:
Enhancing Security and Privacy for Identity-Based Batch Verification Scheme in VANETs. IEEE Trans. Veh. Technol. 66(4): 3235-3248 (2017) - 2015
- [j17]Shi-Jinn Horng, Shiang-Feng Tzeng, Po-Hsian Huang, Xian Wang, Tianrui Li, Muhammad Khurram Khan:
An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks. Inf. Sci. 317: 48-66 (2015) - 2014
- [j14]Shi-Jinn Horng, Mahmoud E. Farfoura, Pingzhi Fan, Xian Wang, Tianrui Li, Jing-Ming Guo:
A low cost fragile watermarking scheme in H.264/AVC compressed domain. Multim. Tools Appl. 72(3): 2469-2495 (2014) - [j13]Shi-Jinn Horng, Didi Rosiyadi, Pingzhi Fan, Xian Wang, Muhammad Khurram Khan:
An adaptive watermarking scheme for e-government document images. Multim. Tools Appl. 72(3): 3085-3103 (2014) - [j12]Xian Wang, Xianfu Lei, Pingzhi Fan, Rose Qingyang Hu, Shi-Jinn Horng:
Cost Analysis of Movement-Based Location Management in PCS Networks: An Embedded Markov Chain Approach. IEEE Trans. Veh. Technol. 63(4): 1886-1902 (2014) - [j10]Shi-Jinn Horng, Shiang-Feng Tzeng, Xian Wang, Shaojie Qiao, Xun Gong, Muhammad Khurram Khan:
Cryptanalysis on a Portable Privacy-Preserving Authentication and Access Control Protocol in VANETs. Wirel. Pers. Commun. 79(2): 1445-1454 (2014) - 2013
- [j9]Shi-Jinn Horng, Shiang-Feng Tzeng, Pingzhi Fan, Xian Wang, Tianrui Li, Muhammad Khurram Khan:
Secure Convertible Undeniable Signature Scheme Using Extended Euclidean Algorithm without Random Oracles. KSII Trans. Internet Inf. Syst. 7(6): 1512-1532 (2013) - [j8]Shi-Jinn Horng, Shiang-Feng Tzeng, Yi Pan, Pingzhi Fan, Xian Wang, Tianrui Li, Muhammad Khurram Khan:
b-SPECS+: Batch Verification for Secure Pseudonymous Authentication in VANET. IEEE Trans. Inf. Forensics Secur. 8(11): 1860-1875 (2013) - [c5]Ling-Yuan Hsu, Shi-Jinn Horng, Pingzhi Fan, Hsien-Hsin Chou, Xian Wang, Minyi Guo:
Adaptive Non-Local Means for Image Denoising using Turbulent PSO with No-Reference Measures. ISBAST 2013: 251-258 - 2012
- [j6]Didi Rosiyadi, Shi-Jinn Horng, Pingzhi Fan, Xian Wang, Muhammad Khurram Khan, Yi Pan:
Copyright Protection for E-Government Document Images. IEEE Multim. 19(3): 62-73 (2012) - [c3]Hung-Chuan Lai, Shi-Jinn Horng, Pingzhi Fan, Xian Wang, Yi Pan:
An Efficient Run Time Control Flow Errors Detection by DCT Technique. ISBAST 2012: 134-150 - 2011
- [c2]Xian Wang, Shi-Jinn Horng, Ray-Guang Cheng, Pingzhi Fan:
Call dropping performance of the relay station (RS)-first channel access scheme in LTE-Advanced relay networks. ATNAC 2011: 1-6 - [c1]Xian Wang, Shi-Jinn Horng, Ray-Guang Cheng, Pingzhi Fan:
Call dropping performance analysis of the eNB-first channel access policy in LTE-Advanced relay networks. WiMob 2011: 43-50
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-10 23:37 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint