Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Community Detection Method of Complex Network Based on ACO Pheromone of TSP

    Community detection method of complex network with a combination of TSP model and ant colony optimization is proposed in this paper. The topology relationship of network node is transformed into distance, thus...

    Si Liu, Cong Feng, Ming-Sheng Hu, Zhi-Juan Jia in Intelligent Computing Methodologies (2014)

  2. No Access

    Chapter and Conference Paper

    Cascading Failures in Power Grid under Three Node Attack Strategies

    This paper studies cascading failures of power grid under three node attack strategies based on the local preferential redistribution rule of the broken node’s load. The initial load of a node with degree k is k ...

    Sui-Min Jia, Yun-Ye Wang, Cong Feng, Zhi-Juan Jia in Intelligent Computing Methodologies (2014)

  3. No Access

    Chapter and Conference Paper

    Complex Network Construction Method of Disaster Regional Association Based on Optimized Compressive Sensing

    Iming at the disaster regional association issues, a complex network construction method of disaster regional association based on compressive sensing is proposed in this paper. The disaster system dynamic equ...

    Si Liu, Cong Feng, Zhi-Juan Jia, Ming-Sheng Hu in Intelligent Computing Methodologies (2014)

  4. No Access

    Chapter and Conference Paper

    Dynamical Distribution of Capacities Strategy for Suppressing Cascading Failure in Power Grid

    This paper studies the suppressing effect of Dynamical distribution of capacities (DDC) strategy in cascading failure of power grid. This strategy is proposed based on load characteristics and transmission met...

    Zhi-Juan Jia, Yu Zhang, Cong Feng, Ming-Sheng Hu in Intelligent Computing Methodologies (2014)

  5. No Access

    Chapter and Conference Paper

    A Blind Signature Scheme Applying on Electronic Payment Scene Based on Quantum Secret Sharing

    The basic idea of quantum secret sharing is to share classical information through qu...

    Jia-lei Zhang, Ming-sheng Hu, Bei Gong in Security and Privacy in New Computing Envi… (2019)

  6. No Access

    Chapter and Conference Paper

    A New Signcryption Scheme Based on Elliptic Curves

    Based on the intractable problem of discrete logarithm in ECC and the intractability of reversing a one-way hash function, this paper presents a signcryption scheme with public verifiability and forward securi...

    Wen-jun Cui, Zhi-juan Jia, Ming-sheng Hu in Security and Privacy in New Computing Envi… (2019)