default search action
Jihong Han
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j7]Jialiang Song, Jihong Han, Xirui Zhang, Lulu Shao, Yang Wang:
OCFSII: A New Feature Selection Based on Orthogonal Centroid both Inter-class and Intra-class for Vulnerability Classification. Int. J. Netw. Secur. 21(3): 368-377 (2019) - [j6]Xiaohu Liu, Hengwei Zhang, Yuchen Zhang, Lulu Shao, Jihong Han:
Active Defense Strategy Selection Method Based on Two-Way Signaling Game. Secur. Commun. Networks 2019: 1362964:1-1362964:14 (2019) - 2016
- [j5]Hengwei Zhang, Jian Zhang, Jihong Han:
基于非合作博弈攻击预测的防御策略选取方法 (Defense Strategies Selection Method Based on Non-cooperative Game Attack Forecast). 计算机科学 43(1): 195-201 (2016) - [j4]Hengwei Zhang, Jiajing He, Jihong Han, Jindong Wang:
基于智能优化算法的模糊软子空间聚类方法 (Fuzzy Soft Subspace Clustering Method Based on Intelligent Optimization Algorithm). 计算机科学 43(3): 256-261 (2016) - 2015
- [j3]Hengwei Zhang, Jihong Han, Guang Kou, Bo Wei:
云计算环境中服务动态选择算法研究 (Research on Service Dynamic Selection Algorithm in Cloud Computing). 计算机科学 42(5): 251-254 (2015) - [j2]Hengwei Zhang, Jihong Han, Bo Wei, Jindong Wang:
基于Map-Reduce模型的云资源调度方法研究 (Research on Cloud Resource Scheduling Method Based on Map-Reduce). 计算机科学 42(8): 118-123 (2015) - 2012
- [c4]Hailin Li, Yadi Wang, Jihong Han:
A Novel Method for Modeling Complex Network of Software System Security. SERE (Companion) 2012: 24-26
2000 – 2009
- 2009
- [j1]Jihong Han, Zhiyong Zhou, Yadi Wang:
Automatic Verification for Secrecy of Cryptographic Protocols in First-Order Logic. Int. J. Distributed Sens. Networks 5(1): 14 (2009) - [c3]Hengjun Wang, Yadi Wang, Jihong Han:
A Security Architecture for Tactical Mobile Ad Hoc Networks. WKDD 2009: 312-315 - 2008
- [c2]Hengjun Wang, Yadi Wang, Jihong Han, Yuchen Zhang, Min Liu:
Analysis of Distributed CA Model for MANETs Based on Queuing Theory. PACIIA (1) 2008: 497-501 - [c1]Yuchen Zhang, Jing Liu, Yadi Wang, Jihong Han, Hengjun Wang, Kun Wang:
Identity-Based Threshold Key Management for Ad Hoc Networks. PACIIA (2) 2008: 797-801
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:48 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint