2010 [1] ZHANG Wenjuan, LI Zhaohui, HU Yonghui, XIA Wei, SIR Propagation model of Smart phone Bluetooth virus with bimodal variable infection rate, (2010第三届IEEE计算机与电气工程国际会议论文集第二卷,483-487页)(EI收录); [2] ZHANG Wenjuan, LI Zhaohui, HU Yonghui, XIA Wei, Cluster Features of Bluetooth Mobile Phone virus and Research on Strategies of Control & Prevention,2010 International Conference on Computational Intelligence and Security, CIS2010,(2010国际计算智能与信息安全会议论文集),p 474-477, ; [3] Shi, Peipei; Li, Zhaohui; Zhang, Tao,A technique of improved steganography text based on chaos and BPCS,Proceedings - 2nd IEEE International Conference on Advanced Computer Control, ICACC 2010, v 2, p 232-236, 2010, Proceedings - 2nd IEEE International Conference on Advanced Computer Control, ICACC 2010,; [4] Zhang, Tao; Li, Zhaohui; Shi, Peipei,Statistical analysis against improved BPCS steganography,Proceedings - 2nd IEEE International Conference on Advanced Computer Control, ICACC 2010, v 2, p 237-240, 2010, Proceedings - 2nd IEEE International Conference on Advanced Computer Control, ICACC 2010,; [5] Shi, Peipei; Li, Zhaohui,An improved BPCS steganography based on dynamic threshold, Proceedings - 2010 2nd International Conference on Multimedia Information Networking and Security, MINES 2010, p 388-391, 2010, Proceedings - 2010 2nd International Conference on Multimedia Information Networking and Security, MINES 2010,; [6] 基于置乱变换的DCT域数字水印改进算法,李朝晖 王旻,第一届中国网络攻防与系统安全会议(NADSS2010),23-28,北京。(A DCT Domain Watermarking Algorithm Based on Scrambling Transforming, LI Zhaohui, WANG Min, 1st Conference on Network Attack & Defense and System Security in China, Beijing, Nov. 2010. NADSS2010) 2009 [1] Wang, Xiao-Yu; Zhang, Han; Li, Zhao-Hui,An improved baptista encryption algorithm based on conservative chaotic system,5th International Conference on Natural Computation, ICNC 2009, v 5, p 442-446, 2009, 5th International Conference on Natural Computation, ICNC 2009,; [2] Zhang, Qing-Hua; Zhang, Han; Li, Zhao-Hui,One-way hash function construction based on conservative chaotic systems,5th International Conference on Information Assurance and Security, IAS 2009, v 2, p 402-405, 2009, 5th International Conference on Information Assurance and Security, IAS 2009,; [3] Wang, Tao; Zhang, Han; Li, Zhaohui; Zhang, Qing-Hua,The images encryption algorithm based on the multi-chaotic systems,1st International Conference on Multimedia Information Networking and Security, MINES 2009, v 2, p 145-148, 2009, 1st International Conference on Multimedia Information Networking and Security, MINES 2009; [4] Yuan, Kun; Zhang, Han; Li, Zhaohui,An improved AES algorithm based on chaos,1st International Conference on Multimedia Information Networking and Security, MINES 2009, v 2, p 326-329, 2009, 1st International Conference on Multimedia Information Networking and Security, MINES 2009,; [5] 手机蓝牙网络中一种具有可变感染率的SIRQD病毒传播模型,李朝晖 夏玮 张芷源, 《信息网络安全》,2009年第9期. 2008 [1] XIA, Wei; LI, Zhao-hui; CHEN, Zeng-qiang; YUAN, Zhu-zhi, Commwarrior worm propagation model for smart phone networks, Source: Journal of China Universities of Posts and Telecommunications, v 15, n 2, p 60-66, June 2008,; [2] 基于速度分级的手机蓝牙病毒传播模型研究,夏玮,李朝晖,陈增强,袁著址,《计算机工程》,第34卷第9期, 2008.5.( Epidemic Model of Mobile Phone Bluetooth Virus Based on Velocity Subsection, XIA Wei, LI Zhaohui, CHEN Zeng-qiang, YUAN Zhu-zhi, Computer Engineering, v 34, n 9, p 10-12, May 2008.) 2007 [1] 夏玮 李朝晖 陈增强 袁著祉,带有预防接种的手机蓝牙病毒传播模型, 《天津大学学报》, Vol.40 No.12 , p1426-1430, 2007.12 ;(Xia, Wei; Li, Zhao-Hui; Chen, Zeng-Qiang; Yuan, Zhu-Zhi, Epidemic model of mobile phone bluetooth virus with preventive inoculation, Tianjin Daxue Xuebao (Ziran Kexue yu Gongcheng Jishu Ban)/Journal of Tianjin University Science and Technology, v 40, n 12, p 1426-1430, December 2007 Language: Chinese,; [2] Xia, Wei; Li, Zhao-Hui; Chen, Zeng-Qiang; Yuan, Zhu-Zhi. The influence of smart Phone's mobility on bluetooth worm propagation, The 3rd IEEE International Conference on Wireless Communications, Networking and Mobile Computing (WiCom2007), p 2218-2221,September 21-23 2007. ;[3] Xia, Wei; Li, Zhaohui; Chen, Zengqiang; Yuan, Zhuzhi. Dynamic Epidemic Model of Smart Phone Virus Propagated through Bluetooth and MMS, IET Conference Publications, n 533 CP, p 948-953, 2007, The IET Communications Conference on Wireless, Mobile and Sensor Networks 2007(CCWMSN07) ,December12 -14 2007, Shanghai, China. ;[4] Zhang, Han; Huang, Jicai; Li, Zhaohui,New method of digital image scrambling based on binary tree generated by chaotic sequences,Proceedings of SPIE - The International Society for Optical Engineering, v 6790, 2007, MIPPR 2007: Remote Sensing and GIS Data Processing and Applications; and Innovative Multispectral Technology and Applications, 2006 [1] 张瀚 王秀峰 李朝晖等, 基于二维可逆非线性映射的图像加密算法,《南开大学学报(自然科学版)》,Vol.39(4):30-35 ,2006; [2] 图像加密灰级混合算法的研究,《计算机研究与发展》 Vol.43 Suppl.II, 2006年8月. CTCIS2006----中国可信计算与信息安全学术会议, 2006.10.河北保定; [3] 一种改进的(3,3)可视密钥分享方案,《武汉大学学报理学版》 Vol.52 S1, 2006年10月. CTCIS2006----中国可信计算与信息安全学术会议, 2006.10.河北保定. 2005 [1] 张瀚 王秀峰 李朝晖 刘大海, 一种基于混沌系统及Henon映射的快速图像加密算法,《计算机研究与发展》, Vol.42(12):2137-2142,2005.12. (Zhang, Han; Wang, Xiufeng; Li, Zhaohui; Liu, Dahai. A fast image encryption algorithm based on chaos system and Henon map, Jisuanji Yanjiu yu Fazhan/Computer Research and Development, v 42, n 12, p 2137-2142, December 2005 Language: Chinese.; [2] 张瀚 王秀峰 李朝晖 刘大海, 一种基于时空混沌的Hash函数构造,《物理学报》, Vol.54(9):4006-4011,2005.9;(Zhang, Han; Wang, Xiu-Feng; Li, Zhao-Hui; Liu, Da-Hai, One way Hash function construction based on Spatiotemporal chaos, Wuli Xuebao/Acta Physica Sinica, v 54, n 9, p 4006-4011, September 2005 Language: Chinese,, SCI: 960DD). 2003 [1] Zhang, Han; Wang, Xiu-Feng; Li, Zhao-Hui, A New Image Encryption Algorithm Based on Chaos System, Proceedings of the 2003 IEEE International Conference on Robotics, Intelligent Systems and Signal Processing. Changsha,China,2003,778~782. 2002 [1] Li, Zhao-Hui; Wang, Xiu-Feng; Zhang, Han. A research on gray level mixing function in two-dimensional chaotic map image encryption, Proceedings of SPIE - The International Society for Optical Engineering, v 4875, n 1, p 93-102, 2002. 图形、图像处理相关: [1] 李朝晖 王秀峰,影视字幕文字识别的研究,《计算机工程》, 第28卷第3期, 2002. 3, p175-176 ; [2] 李朝晖 王秀峰 夏玮,图像矩形窗口加权快速算法的构造思想,《小型微型计算机系统》,第23卷第2期, 2002.2, p142-144 (Inspec:7240502 ) ; [3] 夏玮 李朝晖,中值滤波的快速算法,《计算机工程与设计》, 第23卷第1期, 2002.1,p58-59. [4] 李朝晖 牟德一,同位素扫描仪的图像信号特点分析及处理方法,《计算机工程》,第27卷第6期总第155期, 2001.6, P83-84; [5] 一种增加图像数据量的算法,《微机发展》, 2001.3(第11卷第3期 总第59期)P46-47;. [6] 基于距离与灰度的混合加权平滑法, 《计算机应用研究》, 第18卷 2001年第1期, supplement,p377; [7] 三次B样条曲线特征多边形顶点的设计技巧,《河北理工学院学报》, 2000年第4期(第22卷第4期 总第75期) p60-63; [8] 用双向链表实现绘图软件中的几个常用功能,《河北理工学院学报》, 2000年第2期,p63-68; [9] 矩形窗口加权平滑的快速算法,《计算机应用研究》, No.1,1997,P64-65; [10] 矩形花键滚刀CAD系统的研究,《唐山工程技术学院学报》, Vol16, No.1, Sum42, 1994, P11-15; [11] 矩形花键滚刀工作图绘制的CAD研究, 《唐山工程技术学院学报》, Vol16, No.3, Sum44, 1994, P44-49. 计算机、网络、信息系统等相关: [1] 夏玮 李朝晖 张静等, 一种改进的无线传感器网络EEMCDS算法, 传感技术学报,Vol.20 No.9 2007年9月, (Inspec:9753889); [2] 企业网络信息管理系统的总体设计,《微机发展》, 2002.1 p83-84; [3] 异或运算的原理及其在计算机中的应用,《计算机应用研究》, 2001年12月 supplement; [4] 《互换性与测量技术》习题解答与指导系统,《计算机应用研究》, 第18卷 2001年第1期, supplement,p321-322; [5]为中文Windows增加Ucdos5.0的五笔字型输入法,《计算机应用研究》, No.3 ,1997,P230-231; [6] 以优质软件为教务管理现代化铺路,《河北大学学报》,Vol.17, 1997.12, P119-120; [7] 多种汉字艺术效果在C语言中的实现,《计算机应用研究》, Vol13,No.2,Sum70,1996,P68. 其他: [1] 热处理工艺对ZA27铸造合金组织及性能的影响,《河北理工学院学报》,1999.4; [2] 面向二十一世纪《机械制图》课程教学内容及教学方法改革的研究,《面向二十一世纪河北省各类高校教学内容与课程体系改革研究》,1999年6月,中国文联出版社; [3] ZA27合金淬火时效早期阶段的研究,《河北理工学院学报》,1998年第3期P20-24; [4] ZA27合金淬火时效早期过程的研究,《河北大学学报》, No.2,1997 (河北省第十届铸造年会优秀论文).