<?xml version="1.0"?>
<dblpperson name="Qixiang Mei" pid="11/4559" n="21">
<person key="homepages/11/4559" mdate="2009-06-10">
<author pid="11/4559">Qixiang Mei</author>
</person>
<r><article key="journals/caaitrit/XiaoJMZ24" mdate="2024-04-01">
<author orcid="0000-0002-3389-6689" pid="89/5116">Xiuchun Xiao</author>
<author pid="264/2180">Chengze Jiang</author>
<author pid="11/4559">Qixiang Mei</author>
<author orcid="0000-0002-4870-1493" pid="39/2699-1">Yudong Zhang 0001</author>
<title>Noise-tolerate and adaptive coefficient zeroing neural network for solving dynamic matrix square root.</title>
<pages>167-177</pages>
<year>2024</year>
<month>February</month>
<volume>9</volume>
<journal>CAAI Trans. Intell. Technol.</journal>
<number>1</number>
<ee type="oa">https://doi.org/10.1049/cit2.12183</ee>
<url>db/journals/caaitrit/caaitrit9.html#XiaoJMZ24</url>
</article>
</r>
<r><article key="journals/access/WuJCMX21" mdate="2021-11-03">
<author orcid="0000-0003-2053-562X" pid="203/9539">Jiahao Wu</author>
<author pid="264/2180">Chengze Jiang</author>
<author orcid="0000-0001-5625-4614" pid="239/7196">Baitao Chen</author>
<author pid="11/4559">Qixiang Mei</author>
<author orcid="0000-0002-3389-6689" pid="89/5116">Xiuchun Xiao</author>
<title>Solving Time-Varying Complex-Valued Sylvester Equation via Adaptive Coefficient and Non-Convex Projection Zeroing Neural Network.</title>
<pages>135890-135898</pages>
<year>2021</year>
<volume>9</volume>
<journal>IEEE Access</journal>
<ee type="oa">https://doi.org/10.1109/ACCESS.2021.3116152</ee>
<url>db/journals/access/access9.html#WuJCMX21</url>
</article>
</r>
<r><article key="journals/scn/DongHMG21" mdate="2023-08-28">
<author pid="266/1576">Youxia Dong</author>
<author orcid="0000-0001-6129-1188" pid="62/4668">Xiaoling Huang</author>
<author pid="11/4559">Qixiang Mei</author>
<author pid="130/1079">Yuanju Gan</author>
<title>Self-Adaptive Image Encryption Algorithm Based on Quantum Logistic Map.</title>
<pages>6674948:1-6674948:12</pages>
<year>2021</year>
<volume>2021</volume>
<journal>Secur. Commun. Networks</journal>
<ee type="oa">https://doi.org/10.1155/2021/6674948</ee>
<ee>https://www.wikidata.org/entity/Q114974833</ee>
<url>db/journals/scn/scn2021.html#DongHMG21</url>
</article>
</r>
<r><inproceedings key="conf/ccoms/JiaoYM21" mdate="2021-07-28">
<author pid="230/0629">Kaixin Jiao</author>
<author pid="24/7376">Guodong Ye</author>
<author pid="11/4559">Qixiang Mei</author>
<title>Image Encryption Scheme Based on Quantum Logistic Map and Cellular Automata.</title>
<pages>375-379</pages>
<year>2021</year>
<booktitle>ICCCS</booktitle>
<ee>https://doi.org/10.1109/ICCCS52626.2021.9449238</ee>
<crossref>conf/ccoms/2021</crossref>
<url>db/conf/ccoms/icccs2021.html#JiaoYM21</url>
</inproceedings>
</r>
<r><article key="journals/cluster/ZouDMZ19" mdate="2020-10-26">
<author pid="72/7731">Ajin Zou</author>
<author pid="40/6831">Rui Deng</author>
<author pid="11/4559">Qixiang Mei</author>
<author orcid="0000-0002-4461-8844" pid="235/0659">Lang Zou</author>
<title>Fault diagnosis of a transformer based on polynomial neural networks.</title>
<pages>9941-9949</pages>
<year>2019</year>
<volume>22</volume>
<journal>Clust. Comput.</journal>
<number>Supplement</number>
<ee>https://doi.org/10.1007/s10586-017-1020-3</ee>
<url>db/journals/cluster/cluster22.html#ZouDMZ19</url>
</article>
</r>
<r><article key="journals/jsjkx/LiuZM19" mdate="2020-03-12">
<author pid="259/5906">Jiacun Liu</author>
<author pid="259/5794">Guiyan Zhao</author>
<author pid="11/4559">Qixiang Mei</author>
<title>&#36845;&#20195;&#23398;&#20064;&#25511;&#21046;&#30340;&#26368;&#20248;&#23398;&#20064;&#24459;&#21644;&#31616;&#21270;&#23398;&#20064;&#24459;&#30340;&#39057;&#22495;&#30740;&#31350; (Study of Optimal Learning Law and Simplified Learning Law of Iterative Learning Control in Frequency Domain).</title>
<pages>327-332</pages>
<year>2019</year>
<volume>46</volume>
<journal>&#35745;&#31639;&#26426;&#31185;&#23398;</journal>
<number>2</number>
<ee type="oa">https://doi.org/10.11896/j.issn.1002-137X.2019.02.050</ee>
<ee type="oa">http://www.jsjkx.com/EN/10.11896/j.issn.1002-137X.2019.02.050</ee>
<url>db/journals/jsjkx/jsjkx46.html#LiuZM19</url>
</article>
</r>
<r><article key="journals/tdsc/MaoLMCW16" mdate="2024-02-05">
<author pid="59/3361">Xianping Mao</author>
<author pid="20/2135">Junzuo Lai</author>
<author pid="11/4559">Qixiang Mei</author>
<author pid="66/5496">Kefei Chen</author>
<author orcid="0000-0003-4067-8230" pid="81/1232-1">Jian Weng 0001</author>
<title>Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption.</title>
<pages>533-546</pages>
<year>2016</year>
<volume>13</volume>
<journal>IEEE Trans. Dependable Secur. Comput.</journal>
<number>5</number>
<ee>https://doi.org/10.1109/TDSC.2015.2423669</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/TDSC.2015.2423669</ee>
<ee>https://www.wikidata.org/entity/Q121133794</ee>
<url>db/journals/tdsc/tdsc13.html#MaoLMCW16</url>
</article>
</r>
<r><article key="journals/ijics/XuLM15" mdate="2023-08-28">
<author pid="26/5544-2">Haixia Xu 0002</author>
<author pid="51/3716-1">Bao Li 0001</author>
<author pid="11/4559">Qixiang Mei</author>
<title>Complementary witness soundness for witness indistinguishable proof system and CCA2 public-key encryption schemes.</title>
<pages>14-38</pages>
<year>2015</year>
<volume>7</volume>
<journal>Int. J. Inf. Comput. Secur.</journal>
<number>1</number>
<ee>https://doi.org/10.1504/IJICS.2015.069211</ee>
<ee>https://www.wikidata.org/entity/Q114964453</ee>
<url>db/journals/ijics/ijics7.html#XuLM15</url>
</article>
</r>
<r><article key="journals/scn/MaoLCWM15" mdate="2025-01-19">
<author pid="59/3361">Xianping Mao</author>
<author pid="20/2135">Junzuo Lai</author>
<author pid="66/5496">Kefei Chen</author>
<author orcid="0000-0003-4067-8230" pid="81/1232-1">Jian Weng 0001</author>
<author pid="11/4559">Qixiang Mei</author>
<title>Efficient revocable identity-based encryption from multilinear maps.</title>
<pages>3511-3522</pages>
<year>2015</year>
<volume>8</volume>
<journal>Secur. Commun. Networks</journal>
<number>18</number>
<ee>https://doi.org/10.1002/sec.1274</ee>
<ee>https://www.wikidata.org/entity/Q123191946</ee>
<url>db/journals/scn/scn8.html#MaoLCWM15</url>
</article>
</r>
<r><inproceedings key="conf/iwsec/JiaLLM14" mdate="2022-09-07">
<author pid="14/9237">Dingding Jia</author>
<author pid="51/3716-1">Bao Li 0001</author>
<author pid="40/7264">Xianhui Lu</author>
<author pid="11/4559">Qixiang Mei</author>
<title>Related Key Secure PKE from Hash Proof Systems.</title>
<pages>250-265</pages>
<year>2014</year>
<booktitle>IWSEC</booktitle>
<ee>https://doi.org/10.1007/978-3-319-09843-2_19</ee>
<crossref>conf/iwsec/2014</crossref>
<url>db/conf/iwsec/iwsec2014.html#JiaLLM14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ispec/JiaLLM13" mdate="2026-01-30">
<author pid="14/9237">Dingding Jia</author>
<author pid="51/3716-1">Bao Li 0001</author>
<author pid="68/8688-2">Yamin Liu 0002</author>
<author pid="11/4559">Qixiang Mei</author>
<title>Improving the Message-Ciphertext Rate of Lewko's Fully Secure IBE Scheme.</title>
<pages>105-116</pages>
<year>2013</year>
<booktitle>ISPEC</booktitle>
<ee>https://doi.org/10.1007/978-3-642-38033-4_8</ee>
<crossref>conf/ispec/2013</crossref>
<url>db/conf/ispec/ispec2013.html#JiaLLM13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/provsec/JiaLLM13" mdate="2022-09-07">
<author pid="14/9237">Dingding Jia</author>
<author pid="40/7264">Xianhui Lu</author>
<author pid="51/3716-1">Bao Li 0001</author>
<author pid="11/4559">Qixiang Mei</author>
<title>RKA Secure PKE Based on the DDH and HR Assumptions.</title>
<pages>271-287</pages>
<year>2013</year>
<booktitle>ProvSec</booktitle>
<ee>https://doi.org/10.1007/978-3-642-41227-1_16</ee>
<crossref>conf/provsec/2013</crossref>
<url>db/conf/provsec/provsec2013.html#JiaLLM13</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/JiaLLM13" mdate="2026-01-30">
<author pid="14/9237">Dingding Jia</author>
<author pid="51/3716-1">Bao Li 0001</author>
<author pid="68/8688-2">Yamin Liu 0002</author>
<author pid="11/4559">Qixiang Mei</author>
<title>Improving the Message-ciphertext Rate of Lewko's Fully Secure IBE Scheme.</title>
<pages>159</pages>
<year>2013</year>
<volume>2013</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2013/159</ee>
<url>db/journals/iacr/iacr2013.html#JiaLLM13</url>
</article>
</r>
<r><inproceedings key="conf/incos/XuLM12" mdate="2022-09-08">
<author pid="26/5544-2">Haixia Xu 0002</author>
<author pid="51/3716-1">Bao Li 0001</author>
<author pid="11/4559">Qixiang Mei</author>
<title>Complementary Witness Soundness Witness Indistinguishable Proof System and CCA2 Public-Key Encryption Schemes.</title>
<pages>270-278</pages>
<year>2012</year>
<booktitle>INCoS</booktitle>
<ee>https://doi.org/10.1109/iNCoS.2012.51</ee>
<crossref>conf/incos/2012</crossref>
<url>db/conf/incos/incos2012.html#XuLM12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ispec/LuLML12" mdate="2026-01-30">
<author pid="40/7264">Xianhui Lu</author>
<author pid="51/3716-1">Bao Li 0001</author>
<author pid="11/4559">Qixiang Mei</author>
<author pid="68/8688-2">Yamin Liu 0002</author>
<title>Improved Efficiency of Chosen Ciphertext Secure Encryption from Factoring.</title>
<pages>34-45</pages>
<year>2012</year>
<booktitle>ISPEC</booktitle>
<ee>https://doi.org/10.1007/978-3-642-29101-2_3</ee>
<crossref>conf/ispec/2012</crossref>
<url>db/conf/ispec/ispec2012.html#LuLML12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cisc/LuLML11" mdate="2026-01-30">
<author pid="40/7264">Xianhui Lu</author>
<author pid="51/3716-1">Bao Li 0001</author>
<author pid="11/4559">Qixiang Mei</author>
<author pid="68/8688-2">Yamin Liu 0002</author>
<title>Improved Tradeoff between Encapsulation and Decapsulation of HK09.</title>
<pages>131-141</pages>
<year>2011</year>
<booktitle>Inscrypt</booktitle>
<ee>https://doi.org/10.1007/978-3-642-34704-7_11</ee>
<crossref>conf/cisc/2011</crossref>
<url>db/conf/cisc/inscrypt2011.html#LuLML11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/pkc/MeiLLJ11" mdate="2022-09-07">
<author pid="11/4559">Qixiang Mei</author>
<author pid="51/3716-1">Bao Li 0001</author>
<author pid="40/7264">Xianhui Lu</author>
<author pid="14/9237">Dingding Jia</author>
<title>Chosen Ciphertext Secure Encryption under Factoring Assumption Revisited.</title>
<pages>210-227</pages>
<year>2011</year>
<booktitle>Public Key Cryptography</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-19379-8_13</ee>
<crossref>conf/pkc/2011</crossref>
<url>db/conf/pkc/pkc2011.html#MeiLLJ11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/provsec/LuLMX11" mdate="2022-09-07">
<author pid="40/7264">Xianhui Lu</author>
<author pid="51/3716-1">Bao Li 0001</author>
<author pid="11/4559">Qixiang Mei</author>
<author pid="26/5544-2">Haixia Xu 0002</author>
<title>Key-Dependent Message Security for Division Function: Discouraging Anonymous Credential Sharing.</title>
<pages>297-308</pages>
<year>2011</year>
<booktitle>ProvSec</booktitle>
<ee>https://doi.org/10.1007/978-3-642-24316-5_21</ee>
<crossref>conf/provsec/2011</crossref>
<url>db/conf/provsec/provsec2011.html#LuLMX11</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/MeiLLJ10" mdate="2022-09-07">
<author pid="11/4559">Qixiang Mei</author>
<author pid="51/3716-1">Bao Li 0001</author>
<author pid="40/7264">Xianhui Lu</author>
<author pid="14/9237">Dingding Jia</author>
<title>Chosen Ciphertext Secure Encryption over Semi-smooth Subgroup.</title>
<pages>172</pages>
<year>2010</year>
<volume>2010</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2010/172</ee>
<url>db/journals/iacr/iacr2010.html#MeiLLJ10</url>
</article>
</r>
<r><inproceedings key="conf/ccs/BoyenMW05" mdate="2020-11-10">
<author pid="53/4957">Xavier Boyen</author>
<author pid="11/4559">Qixiang Mei</author>
<author pid="w/BrentWaters">Brent Waters</author>
<title>Direct chosen ciphertext security from identity-based techniques.</title>
<pages>320-329</pages>
<year>2005</year>
<crossref>conf/ccs/2005</crossref>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/1102120.1102162</ee>
<url>db/conf/ccs/ccs2005.html#BoyenMW05</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/iacr/BoyenMW05" mdate="2020-05-11">
<author pid="53/4957">Xavier Boyen</author>
<author pid="11/4559">Qixiang Mei</author>
<author pid="w/BrentWaters">Brent Waters</author>
<title>Direct Chosen Ciphertext Security from Identity-Based Techniques.</title>
<pages>288</pages>
<year>2005</year>
<volume>2005</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2005/288</ee>
<url>db/journals/iacr/iacr2005.html#BoyenMW05</url>
</article>
</r>
<coauthors n="26" nc="5">
<co c="3"><na f="b/Boyen:Xavier" pid="53/4957">Xavier Boyen</na></co>
<co c="0"><na f="c/Chen:Baitao" pid="239/7196">Baitao Chen</na></co>
<co c="1"><na f="c/Chen:Kefei" pid="66/5496">Kefei Chen</na></co>
<co c="2"><na f="d/Deng:Rui" pid="40/6831">Rui Deng</na></co>
<co c="0"><na f="d/Dong:Youxia" pid="266/1576">Youxia Dong</na></co>
<co c="0"><na f="g/Gan:Yuanju" pid="130/1079">Yuanju Gan</na></co>
<co c="0"><na f="h/Huang:Xiaoling" pid="62/4668">Xiaoling Huang</na></co>
<co c="1"><na f="j/Jia:Dingding" pid="14/9237">Dingding Jia</na></co>
<co c="0"><na f="j/Jiang:Chengze" pid="264/2180">Chengze Jiang</na></co>
<co c="0"><na f="j/Jiao:Kaixin" pid="230/0629">Kaixin Jiao</na></co>
<co c="1"><na f="l/Lai:Junzuo" pid="20/2135">Junzuo Lai</na></co>
<co c="1"><na f="l/Li_0001:Bao" pid="51/3716-1">Bao Li 0001</na></co>
<co c="4"><na f="l/Liu:Jiacun" pid="259/5906">Jiacun Liu</na></co>
<co c="1"><na f="l/Liu_0002:Yamin" pid="68/8688-2">Yamin Liu 0002</na></co>
<co c="1"><na f="l/Lu:Xianhui" pid="40/7264">Xianhui Lu</na></co>
<co c="1"><na f="m/Mao:Xianping" pid="59/3361">Xianping Mao</na></co>
<co c="3"><na f="w/Waters:Brent" pid="w/BrentWaters">Brent Waters</na></co>
<co c="1"><na f="w/Weng_0001:Jian" pid="81/1232-1">Jian Weng 0001</na></co>
<co c="0"><na f="w/Wu:Jiahao" pid="203/9539">Jiahao Wu</na></co>
<co c="0"><na f="x/Xiao:Xiuchun" pid="89/5116">Xiuchun Xiao</na></co>
<co c="1"><na f="x/Xu_0002:Haixia" pid="26/5544-2">Haixia Xu 0002</na></co>
<co c="0"><na f="y/Ye:Guodong" pid="24/7376">Guodong Ye</na></co>
<co c="0"><na f="z/Zhang_0001:Yudong" pid="39/2699-1">Yudong Zhang 0001</na></co>
<co c="4"><na f="z/Zhao:Guiyan" pid="259/5794">Guiyan Zhao</na></co>
<co c="2"><na f="z/Zou:Ajin" pid="72/7731">Ajin Zou</na></co>
<co c="2"><na f="z/Zou:Lang" pid="235/0659">Lang Zou</na></co>
</coauthors>
</dblpperson>

