![](https://dblp.uni-trier.de/img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Jianhua Yan
Person information
Refine list
![note](https://dblp.uni-trier.de/img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j19]Jianhua Yan, Xiuhua Lu, Muzi Li, Licheng Wang, Jingxian Zhou, Wenbin Yao:
Practical NTRU Signcryption in the Standard Model. Entropy 25(12): 1651 (2023) - [j18]Yifei Gong
, Xiansen Xing, Yanan Li, Chun Zhu, Yanlin Li
, Jianhua Yan, Huilin Le
, Xiaoshuang Li:
Insights into the Movement and Diffusion Accumulation Characteristics of a Catastrophic Rock Avalanche Debris - A Case Study. Remote. Sens. 15(21): 5154 (2023) - 2021
- [c7]Zechao Liu, Yandong Li, Lifang Wu, Kejian Cui, Jianhua Yan, Hui Yu
:
Model guided DLP 3D printing for solid and hollow structure. HSI 2021: 1-6 - 2020
- [j17]Long Zhou, Joshua D. Schaefferkoetter, Ivan W. K. Tham, Gang Huang, Jianhua Yan
:
Supervised learning with cyclegan for low-dose FDG PET image denoising. Medical Image Anal. 65: 101770 (2020)
2010 – 2019
- 2019
- [j16]Jianhua Yan
, Licheng Wang, Muzi Li, Haseeb Ahmad, Jun Yue, Wenbin Yao:
Attribute-Based Signcryption From Lattices in the Standard Model. IEEE Access 7: 56039-56050 (2019) - [j15]Haibo Hong, Licheng Wang, Jun Shao, Jianhua Yan, Haseeb Ahmad, Guiyi Wei, Mande Xie, Yixian Yang:
A Miniature CCA Public Key Encryption Scheme Based on Non-abelian Factorization Problem in Finite Groups of Lie Type. Comput. J. 62(12): 1840-1848 (2019) - [j14]Jingxian Zhou, Jianhua Yan:
Secure and Efficient Identity-based Batch Verification Signature Scheme for ADS-B System. KSII Trans. Internet Inf. Syst. 13(12): 6243-6259 (2019) - 2018
- [j13]Licheng Wang, Jing Li, Lize Gu, Jianhua Yan, Zhiguo Qu:
An Efficient Construction of Quantum Attack Resistant Proxy Re-Encryption Based on (Semi)group Factorization Problems. Fundam. Informaticae 157(1-2): 47-62 (2018) - 2017
- [j12]Jianhua Yan, Licheng Wang, Jing Li, Muzi Li, Yixan Yang, Wenbin Yao:
Pre-image sample algorithm with irregular Gaussian distribution and construction of identity-based signature. Concurr. Comput. Pract. Exp. 29(20) (2017) - 2016
- [j11]Fei Li, Dongqing Xie, Wei Gao, Jianhua Yan, Xu An Wang
:
Round-optimal ID-based dynamic authenticated group key agreement. Int. J. High Perform. Syst. Archit. 6(3): 153-161 (2016) - [j10]Zhenhua Chen, Shundong Li, Qiong Huang, Jianhua Yan, Yong Ding:
A Joint Random Secret Sharing Scheme with Public Verifiability. Int. J. Netw. Secur. 18(5): 917-925 (2016) - [c6]Fei Li, Dongqing Xie, Wei Gao, Xu An Wang
, Jianhua Yan:
An ID-based Dynamic Authenticated Group Key Agreement Scheme with Optimal Round Complexity from Pairings. CISIS 2016: 468-472 - [c5]Licheng Wang, Jing Li, Jianhua Yan, Zhiguo Qu:
An Efficient Proxy Re-Encryption Based on (Semi) Group Factorization Problems. INCoS 2016: 199-202 - 2015
- [j9]Zhenhua Chen, Shundong Li, Youwen Zhu, Jianhua Yan, Xinli Xu:
A cheater identifiable multi-secret sharing scheme based on the Chinese remainder theorem. Secur. Commun. Networks 8(18): 3592-3601 (2015) - [j8]Jianhua Yan, Licheng Wang, Mianxiong Dong, Yixian Yang, Wenbin Yao:
Identity-based signcryption from lattices. Secur. Commun. Networks 8(18): 3751-3770 (2015) - [j7]Jianhua Yan, Keqi Zhang, Chengcui Zhang
, Shu-Ching Chen, Giri Narasimhan
:
Automatic Construction of 3-D Building Model From Airborne LIDAR Data Through 2-D Snake Algorithm. IEEE Trans. Geosci. Remote. Sens. 53(1): 3-14 (2015) - 2014
- [j6]Jing Li, Licheng Wang, Jianhua Yan, Xinxin Niu, Yixian Yang:
A (k, t, n) Verifiable Multi-secret Sharing Scheme Based on Adversary Structure. KSII Trans. Internet Inf. Syst. 8(12): 4552-4567 (2014) - 2013
- [j5]Yuanju Gan, Licheng Wang, Jianhua Yan, Yixian Yang:
CCA Secure Threshold KEM Scheme Against Adaptive Corruption Attacks in Standard Model. J. Softw. 8(5): 1245-1253 (2013) - [c4]Zheng Cui, Keqi Zhang, Chengcui Zhang, Jianhua Yan, Shu-Ching Chen:
A GUI based LIDAR data processing system for model generation and mapping. MapInteract 2013: 40-43 - 2012
- [j4]Jianhua Yan, Beata Planeta-Wilson, Richard E. Carson:
Direct 4-D PET List Mode Parametric Reconstruction With a Novel EM Algorithm. IEEE Trans. Medical Imaging 31(12): 2213-2223 (2012) - 2011
- [j3]Jianhua Yan, Jun Yu:
Emission image reconstruction based on incremental optimisation transfer algorithm. Int. J. Comput. Sci. Eng. 6(3): 146-150 (2011)
2000 – 2009
- 2007
- [c3]Jianhua Yan, Keqi Zhang, Chengcui Zhang, Shu-Ching Chen, Giri Narasimhan
:
A Graph Reduction Method for 2D Snake Problems. CVPR 2007 - 2006
- [j2]Keqi Zhang, Jianhua Yan, Shu-Ching Chen:
Automatic Construction of Building Footprints From Airborne LIDAR Data. IEEE Trans. Geosci. Remote. Sens. 44(9): 2523-2533 (2006) - [c2]Jianhua Yan, Jun Yu:
A Nonlinear Variational Model for PET Reconstruction. ICPR (4) 2006: 699-702 - [c1]Jianhua Yan, Jun Yu:
Emission Image Reconstruction Based on Incremental Optimization Transfer Algorithm. IMSCCS (2) 2006: 266-269 - 2003
- [j1]Keqi Zhang, Shu-Ching Chen, D. Whitman, Mei-Ling Shyu, Jianhua Yan, Chengcui Zhang
:
A progressive morphological filter for removing nonground measurements from airborne LIDAR data. IEEE Trans. Geosci. Remote. Sens. 41(4): 872-882 (2003)
Coauthor Index
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:58 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint