Search Results - "Qu, Haipeng"
-
1
Identity-Based Matchmaking Encryption with Equality Test
Published in Entropy (Basel, Switzerland) (01-01-2024)“…The identity-based encryption with equality test (IBEET) has become a hot research topic in cloud computing as it provides an equality test for ciphertexts…”
Get full text
Journal Article -
2
Finite p-groups whose nonnormal subgroups are metacyclic
Published in Science China. Mathematics (01-07-2020)“…For an odd prime p , we give a criterion for finite p -groups whose nonnormal subgroups are metacyclic, and based on the criterion, the p -groups whose…”
Get full text
Journal Article -
3
A Fuzzer for Detecting Use-After-Free Vulnerabilities
Published in Mathematics (Basel) (01-11-2024)“…Fuzzing is an extensively used automated vulnerability detection technique. Most existing fuzzers are guided by edge coverage, which makes them less effective…”
Get full text
Journal Article -
4
Advanced Temperature-Varied ECU Fingerprints for Source Identification and Intrusion Detection in Controller Area Networks
Published in Security and communication networks (2020)“…External wireless interfaces and the lack of security design of controller area network (CAN) standards make it vulnerable to CAN-targeting attacks…”
Get full text
Journal Article -
5
MooFuzz: Many-Objective Optimization Seed Schedule for Fuzzer
Published in Mathematics (Basel) (01-01-2021)“…Coverage-based Greybox Fuzzing (CGF) is a practical and effective solution for finding bugs and vulnerabilities in software. A key challenge of CGF is how to…”
Get full text
Journal Article -
6
Finite p-groups with few non-major k-maximal subgroups
Published in Chinese annals of mathematics. Serie B (2018)“…A subgroup of index p k of a finite p -group G is called a k -maximal subgroup of G . Denote by d ( G ) the number of elements in a minimal generator-system of…”
Get full text
Journal Article -
7
Finite p-groups with a minimal non-abelian subgroup of index p (II)
Published in Science China. Mathematics (01-04-2014)“…We classify completely three-generator finite p -groups G such that Φ( G ) ⩽ Z ( G ) and | G ′| ⩽ p 2 . This paper is a part of the classification of finite p…”
Get full text
Journal Article -
8
Finite p-groups with a minimal non-abelian subgroup of index p (III)
Published in Science China. Mathematics (01-04-2015)“…This paper finishes the classification of three-generator finite p -groups G such that Φ( G ) ⩽ Z ( G ). This paper is a part of classification of finite p…”
Get full text
Journal Article -
9
Finite p-groups all of whose maximal abelian subgroups are soft
Published in Science China. Mathematics (01-11-2010)“…A subgroup A of a p -group G is said to be soft in G if C G ( A ) = A and | N G ( A / A | = p . In this paper we determined finite p -groups all of whose…”
Get full text
Journal Article -
10
Localization with Single Stationary Anchor for Mobile Node in Wireless Sensor Networks
Published in International journal of distributed sensor networks (01-04-2013)“…We proposed a localization algorithm named LSARSSI for mobile node based on RSSI (received signal strength indicator) between locating sensor node with inertia…”
Get full text
Journal Article -
11
Finite p-groups with three character codegrees
Published in Communications in algebra (02-10-2024)“…For an irreducible character χ of a finite group G, the codegree of χ is defined as | G : ker ( χ ) | / χ ( 1 ) . In this paper, we characterize finite…”
Get full text
Journal Article -
12
A note on the bound for the class of certain nilpotent groups
Published in Communications in algebra (03-05-2024)“…Assume G is a nilpotent group of class > 3 in which every proper subgroup has class at most 3. In this note, we give the exact upper bound of class of G…”
Get full text
Journal Article -
13
FINITE GROUPS WHICH HAVE MANY NORMAL SUBGROUPS
Published in Journal of the Korean Mathematical Society (01-11-2009)“…In this paper we classify finite groups whose nonnormal subgroups are of order p or pq, where p, q are primes. As a by-product, we also classify the finite…”
Get full text
Journal Article -
14
On Hua-Tuan’s conjecture II
Published in Science China. Mathematics (2011)“…Let G be a group of order p n , p a prime. For 0 ⩽ m ⩽ n , s m ( G ) denotes the number of subgroups of order p m of G . Loo-Keng Hua and Hsio-Fu Tuan had ever…”
Get full text
Journal Article -
15
Finite p-Groups in Which the Number of Subgroups of Possible Order Is Less Than or Equal to p^3
Published in Chinese annals of mathematics. Serie B (01-07-2010)“…In this paper, groups of order p^n in which the number of subgroups of possible order is less than or equal to p3 ale classified. It turns out that if p 〉 2,…”
Get full text
Journal Article -
16
On The Security Of A Novel Construction Of Certificateless Aggregate Signature Scheme For Healthcare Wireless Medical Sensor Networks
Published in Computer journal (09-10-2024)“…Abstract Recently, Qiao et al. proposed a novel construction of certificateless aggregate signature (CLAS) scheme to ensure the integrity and authenticity of…”
Get full text
Journal Article -
17
Finite p-groups in which the number of subgroups of possible order is less than or equal to p3
Published in Chinese annals of mathematics. Serie B (2010)“…In this paper, groups of order p n in which the number of subgroups of possible order is less than or equal to p 3 are classified. It turns out that if p > 2,…”
Get full text
Journal Article -
18
Generic construction of public key encryption, identity-based encryption and signcryption with equality test
Published in Information sciences (01-07-2018)“…Public key encryption with equality test (PKEET) allows the cloud server to test whether two ciphertexts are generated on the same message. Recently, Lee…”
Get full text
Journal Article -
19
The number of conjugacy classes of nonnormal subgroups of finite p-groups
Published in Journal of algebra (15-11-2016)“…Assume k is a positive integer and p is a prime. Let ν(G) be the number of conjugacy classes of nonnormal subgroups of a finite group G and…”
Get full text
Journal Article -
20
Improving transferable adversarial attack via feature-momentum
Published in Computers & security (01-05-2023)“…Transferable adversarial attackusing adversarial perturbations made on known models to attack unknown modelshas made significant progress in recent years. The…”
Get full text
Journal Article