基本介紹
- 中文名:李朝暉
- 國籍:中國
- 民族:漢族
- 職業:南開大學教授
人物生涯
信息安全相關
2010
[1] ZHANG Wenjuan, LI Zhaohui, HU Yonghui, XIA Wei, SIR Propagation model of Smart phone Bluetooth virus with bimodal variable infection rate, (2010第三屆IEEE計算機與電氣工程國際會議論文集第二卷,483-487頁)(EI收錄);
[2] ZHANG Wenjuan, LI Zhaohui, HU Yonghui, XIA Wei, Cluster Features of Bluetooth Mobile Phone virus and Research on Strategies of Control & Prevention,2010 International Conference on Computational Intelligence and Security, CIS2010,(2010國際計算智慧型與信息安全會議論文集),p 474-477, ;
[3] Shi, Peipei; Li, Zhaohui; Zhang, Tao,A technique of improved steganography text based on chaos and BPCS,Proceedings - 2nd IEEE International Conference on Advanced Computer Control, ICACC 2010, v 2, p 232-236, 2010, Proceedings - 2nd IEEE International Conference on Advanced Computer Control, ICACC 2010,;
[4] Zhang, Tao; Li, Zhaohui; Shi, Peipei,Statistical analysis against improved BPCS steganography,Proceedings - 2nd IEEE International Conference on Advanced Computer Control, ICACC 2010, v 2, p 237-240, 2010, Proceedings - 2nd IEEE International Conference on Advanced Computer Control, ICACC 2010,;
[5] Shi, Peipei; Li, Zhaohui,An improved BPCS steganography based on dynamic threshold, Proceedings - 2010 2nd International Conference on Multimedia Information Networking and Security, MINES 2010, p 388-391, 2010, Proceedings - 2010 2nd International Conference on Multimedia Information Networking and Security, MINES 2010,;
[6] 基於置亂變換的DCT域數字水印改進算法,李朝暉 王旻,第一屆中國網路攻防與系統安全會議(NADSS2010),23-28,北京。(A DCT Domain Watermarking Algorithm Based on Scrambling Transforming, LI Zhaohui, WANG Min, 1st Conference on Network Attack & Defense and System Security in China, Beijing, Nov. 2010. NADSS2010)
2009
[1] Wang, Xiao-Yu; Zhang, Han; Li, Zhao-Hui,An improved baptista encryption algorithm based on conservative chaotic system,5th International Conference on Natural Computation, ICNC 2009, v 5, p 442-446, 2009, 5th International Conference on Natural Computation, ICNC 2009,;
[2] Zhang, Qing-Hua; Zhang, Han; Li, Zhao-Hui,One-way hash function construction based on conservative chaotic systems,5th International Conference on Information Assurance and Security, IAS 2009, v 2, p 402-405, 2009, 5th International Conference on Information Assurance and Security, IAS 2009,;
[3] Wang, Tao; Zhang, Han; Li, Zhaohui; Zhang, Qing-Hua,The images encryption algorithm based on the multi-chaotic systems,1st International Conference on Multimedia Information Networking and Security, MINES 2009, v 2, p 145-148, 2009, 1st International Conference on Multimedia Information Networking and Security, MINES 2009;
[4] Yuan, Kun; Zhang, Han; Li, Zhaohui,An improved AES algorithm based on chaos,1st International Conference on Multimedia Information Networking and Security, MINES 2009, v 2, p 326-329, 2009, 1st International Conference on Multimedia Information Networking and Security, MINES 2009,;
[5] 手機藍牙網路中一種具有可變感染率的SIRQD病毒傳播模型,李朝暉 夏瑋 張芷源, 《信息網路安全》,2009年第9期.
2008
[1] XIA, Wei; LI, Zhao-hui; CHEN, Zeng-qiang; YUAN, Zhu-zhi, Commwarrior worm propagation model for smart phone networks, Source: Journal of China Universities of Posts and Telecommunications, v 15, n 2, p 60-66, June 2008,;
[2] 基於速度分級的手機藍牙病毒傳播模型研究,夏瑋,李朝暉,陳增強,袁著址,《計算機工程》,第34卷第9期, 2008.5.( Epidemic Model of Mobile Phone Bluetooth Virus Based on Velocity Subsection, XIA Wei, LI Zhaohui, CHEN Zeng-qiang, YUAN Zhu-zhi, Computer Engineering, v 34, n 9, p 10-12, May 2008.)
2007
[1] 夏瑋 李朝暉 陳增強 袁著祉,帶有預防接種的手機藍牙病毒傳播模型, 《天津大學學報》, Vol.40 No.12 , p1426-1430, 2007.12 ;(Xia, Wei; Li, Zhao-Hui; Chen, Zeng-Qiang; Yuan, Zhu-Zhi, Epidemic model of mobile phone bluetooth virus with preventive inoculation, Tianjin Daxue Xuebao (Ziran Kexue yu Gongcheng Jishu Ban)/Journal of Tianjin University Science and Technology, v 40, n 12, p 1426-1430, December 2007 Language: Chinese,;
[2] Xia, Wei; Li, Zhao-Hui; Chen, Zeng-Qiang; Yuan, Zhu-Zhi. The influence of smart Phone's mobility on bluetooth worm propagation, The 3rd IEEE International Conference on Wireless Communications, Networking and Mobile Computing (WiCom2007), p 2218-2221,September 21-23 2007. ;
2006
[1] 張瀚 王秀峰 李朝暉等, 基於二維可逆非線性映射的圖像加密算法,《南開大學學報(自然科學版)》,Vol.39(4):30-35 ,2006;
[2] 圖像加密灰級混合算法的研究,《計算機研究與發展》 Vol.43 Suppl.II, 2006年8月. CTCIS2006----中國可信計算與信息安全學術會議, 2006.10.河北保定;
[3] 一種改進的(3,3)可視密鑰分享方案,《武漢大學學報理學版》 Vol.52 S1, 2006年10月. CTCIS2006----中國可信計算與信息安全學術會議, 2006.10.河北保定.
2005
[1] 張瀚 王秀峰 李朝暉 劉大海, 一種基於混沌系統及Henon映射的快速圖像加密算法,《計算機研究與發展》, Vol.42(12):2137-2142,2005.12. (Zhang, Han; Wang, Xiufeng; Li, Zhaohui; Liu, Dahai. A fast image encryption algorithm based on chaos system and Henon map, Jisuanji Yanjiu yu Fazhan/Computer Research and Development, v 42, n 12, p 2137-2142, December 2005 Language: Chinese.;
[2] 張瀚 王秀峰 李朝暉 劉大海, 一種基於時空混沌的Hash函式構造,《物理學報》, Vol.54(9):4006-4011,2005.9;(Zhang, Han; Wang, Xiu-Feng; Li, Zhao-Hui; Liu, Da-Hai, One way Hash function construction based on Spatiotemporal chaos, Wuli Xuebao/Acta Physica Sinica, v 54, n 9, p 4006-4011, September 2005 Language: Chinese,, SCI: 960DD).
2003
[1] Zhang, Han; Wang, Xiu-Feng; Li, Zhao-Hui, A New Image Encryption Algorithm Based on Chaos System, Proceedings of the 2003 IEEE International Conference on Robotics, Intelligent Systems and Signal Processing. Changsha,China,2003,778~782.
2002
[1] Li, Zhao-Hui; Wang, Xiu-Feng; Zhang, Han. A research on gray level mixing function in two-dimensional chaotic map image encryption, Proceedings of SPIE - The International Society for Optical Engineering, v 4875, n 1, p 93-102, 2002.
[1] 李朝暉 王秀峰,影視字幕文字識別的研究,《計算機工程》, 第28卷第3期, 2002. 3, p175-176 ;
[2] 李朝暉 王秀峰 夏瑋,圖像矩形視窗加權快速算法的構造思想,《小型微型計算機系統》,第23卷第2期, 2002.2, p142-144 (Inspec:7240502 ) ;
[3] 夏瑋 李朝暉,中值濾波的快速算法,《計算機工程與設計》, 第23卷第1期, 2002.1,p58-59.
[4] 李朝暉 牟德一,同位素掃瞄器的圖像信號特點分析及處理方法,《計算機工程》,第27卷第6期總第155期, 2001.6, P83-84;
[5] 一種增加圖像數據量的算法,《微機發展》, 2001.3(第11卷第3期 總第59期)P46-47;.
[6] 基於距離與灰度的混合加權平滑法, 《計算機套用研究》, 第18卷 2001年第1期, supplement,p377;
[7] 三次B樣條曲線特徵多邊形頂點的設計技巧,《河北理工學院學報》, 2000年第4期(第22卷第4期 總第75期) p60-63;
[8] 用雙向鍊表實現繪圖軟體中的幾個常用功能,《河北理工學院學報》, 2000年第2期,p63-68;
[9] 矩形視窗加權平滑的快速算法,《計算機套用研究》, No.1,1997,P64-65;
[10] 矩形花鍵滾刀CAD系統的研究,《唐山工程技術學院學報》, Vol16, No.1, Sum42, 1994, P11-15;
[11] 矩形花鍵滾刀工作圖繪製的CAD研究, 《唐山工程技術學院學報》, Vol16, No.3, Sum44, 1994, P44-49.
計算機、網路、信息系統等相關:
[1] 夏瑋 李朝暉 張靜等, 一種改進的無線感測器網路EEMCDS算法, 感測技術學報,Vol.20 No.9 2007年9月, (Inspec:9753889);
[2] 企業網路信息管理系統的總體設計,《微機發展》, 2002.1 p83-84;
[3] 異或運算的原理及其在計算機中的套用,《計算機套用研究》, 2001年12月 supplement;
[4] 《互換性與測量技術》習題解答與指導系統,《計算機套用研究》, 第18卷 2001年第1期, supplement,p321-322;
[5]為中文Windows增加Ucdos5.0的五筆字型輸入法,《計算機套用研究》, No.3 ,1997,P230-231;
[6] 以優質軟體為教務管理現代化鋪路,《河北大學學報》,Vol.17, 1997.12, P119-120;
[7] 多種漢字藝術效果在C語言中的實現,《計算機套用研究》, Vol13,No.2,Sum70,1996,P68.
其他:
[1] 熱處理工藝對ZA27鑄造合金組織及性能的影響,《河北理工學院學報》,1999.4;
[2] 面向二十一世紀《機械製圖》課程教學內容及教學方法改革的研究,《面向二十一世紀河北省各類高校教學內容與課程體系改革研究》,1999年6月,中國文聯出版社;
[3] ZA27合金淬火時效早期階段的研究,《河北理工學院學報》,1998年第3期P20-24;
[4] ZA27合金淬火時效早期過程的研究,《河北大學學報》, No.2,1997 (河北省第十屆鑄造年會優秀論文).