科研论文:
(1) Wang H, Feng Y, Ding Y, Shijie Tang. A multi-key SMC protocol and multi-key FHE based on some-are-errorless LWE[J]. Soft Computing, 2017(2): 1-10. (SCI)
(2) Yong D, Bo H, Huiyong W*, Xiumin Li. Ciphertext retrieval via attribute-based FHE in cloud computing[J]. Soft Computing (2018) 22: 7753. https://doi.org/10.1007/ s00500-018-3404-6. (SCI)
(3) 王会勇, 冯勇. 基于同态加密的可验证隐私数据聚合方案[J]. 四川大学学报(工程科学版), 2016, (04):144-149. (EI)
(4) 王会勇, 冯勇, 赵岭忠, 唐士杰. 基于多密钥同态技术的安全多方计算协议[J]. 华南理工大学学报: 自然科学版, 2017, 45(7): 69-76. (EI)
(5) Wang H, Ding Y, Tang S, Wang J. An Efficient Privacy-Preserving Palmprint Authentication Scheme Based on Homomorphic Encryption[C]//International Symposium on Cyberspace Safety and Security. Springer, Cham, 2017: 503-512. (EI)
(6) 王会勇,孙爽,冯勇. 基于中国剩余定理的公钥加密方案同态性[J]. 计算机应用,2015,(06):1668-1672. (核心)
(7) Wang H, Feng Y, Ding Y, Shijie Tang. A Homomorphic Arithmetic Model via HElib[J]. Journal of Computational and Theoretical Nanoscience, 2017, 14(11): 5166-5173.
(8) Yong ding, BoHan, Huiyong Wang*,A privacy- preserving iris verification scheme based on homomorphic encryption[C]//the 5th International Conference on Artificial Intelligence and Security (ICAIS 2019), accepted. (EI)
(9) Yong ding, Xiaoqing Cui, Huiyong Wang*,A multi-source method for identifying information dissemination in networks [C]//the 5th International Conference on Artificial Intelligence and Security (ICAIS 2019), accepted. (EI)
(10) Huiyong Wang.#, Shijie Tang, Analysis and modification on existing objective weighting methods in MADM, WGEC 2009, e-Science 2010, Guilin, P.R. China, 2009.10.22-10.25 (EI)
(11) Huiyong Wang.#, Jikui Wang, Shijie Tang, Variable weights in MADM. ICISS2010, e-Science 2010, Guilin, P.R. China, 2010.10.20-10.24 (EI)
(12) 王曌,丁勇,王会勇. 基于环上容错学习和GSW的层次型全同态加密方案[J]. 计算机应用, 2016,(04):962-965. (核心)
(13) 王继奎,王会勇. 基于银行家算法的进程安全序列全搜索算法[J]. 甘肃科学学报, 2009, (02):152-154.
(14) 孙爽,吴文渊,王会勇. 基于HElib的并行多比特明文同态比较模型[J]. 计算机应用, 2015, (S2):53-56+69. (核心)
(15) 王继奎,王会勇,李振东. 基于J2EE的项目评奖系统的设计与实现[J]. 电脑知识与技术, 2010,(18):4975-4977.
(16) 张炘,王会勇,廖频. 基带回波扩散参数AT-Tree模式挖掘实现[J]. 科技通报,2015,31(02):179-181. [2017-09-24]. DOI:10.13774/j.cnki.kjtb.2015.02.060
(17) 张炘,王会勇. 频域徙动运动参数闭频繁项集挖掘算法[J]. 科技通报,2014, 30(10):190-192. [2017-09-24]. DOI:10.13774/j.cnki.kjtb.2014.10.064
(18) Jikui Wang, Huiyong Wang.#, Shijie Tang, An algorithm proving the Resource- allocation-graph algorithm, ICISS2010, e-Science 2010, Guilin, P.R. China, 2010.10. 20-10.24 (EI)
(19) Zhang X, Liao P, Wang HY. A New Association Rules Mining Algorithm Based on Vector[C]//Genetic and Evolutionary Computing, 2009. WGEC'09. 3rd International Conference on. IEEE, 2009: 429-432. (EI)
(20) 徐增敏,崔忠宁,王会勇,陈光喜. 虚拟场景中异步消息的通信设计[J]. 小型微型计算机系统,2014,35(11):2548-2552.
(21) Sun Z, Chen Y, Li X, et al. A Bayesian regularized artificial neural network for adaptive optics forecasting[J]. Optics Communications, 2017, 382:519-527. (SCI)
(22) Gao Z, Ding Y, Wang H, et al. A New Way for Extracting Region of Interest from Palmprint by Detecting Key Points[C]//International Symposium on Cyberspace Safety and Security. Springer, Cham, 2017: 442-451. (EI)
(23)熊婉君,韦永壮,王会勇. 一个基于整数的全同态加密改进方案[J]. 密码学报, 2016, (01):67-78. (核心)
(24)王继奎,王会勇. 法院数字档案领域模型设计[J]. 电脑知识与技术, 2010, (24): 6795-6796.
已发表的教学论文
(1) 王会勇, 浅谈“概率”定义的教学[J], 科学时代, 2009, (18), 206-207.
(2) 王会勇,唐士杰. 关于理工科学生数学教学效果的调查分析[J]. 科技信息, 2013, (02):63-64.
(3) 王会勇, 联系教学在复变函数与高等数学课程中的实践[J], 高等理科教育. 2010教育教学专刊.
(4) 王会勇. 浅谈复变函数中有限孤立奇点的类型判断[J]. 科技信息(学术研究),2008,(29):105-106.
(5) 唐川,王会勇,郭斐. 世界经济论坛预测信息技术拐点及其社会影响[J]. 科研信息化技术与应用,2015,6(05):91-94.
(6) 王会勇, 用MATLAB和建模实践改造线性代数课程的困难与对策[J], 教师纵横(网络出版), 2010(10).
(7) 吴孙勇,王会勇,薛秋条. 复变函数教学中的一些难点处理[J]. 科技信息,2011,(20):436+439.