Baohua Huang

According to our database1, Baohua Huang authored at least 29 papers between 2005 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
A Center-Based Secure and Stable Clustering Algorithm for VANETs on Highways.
Wireless Communications and Mobile Computing, 2019

Krylov subspace methods to solve a class of tensor equations via the Einstein product.
Numerical Lin. Alg. with Applic., 2019

Finite iterative algorithm for the symmetric periodic least squares solutions of a class of periodic Sylvester matrix equations.
Numerical Algorithms, 2019

The least squares solution of a class of generalized Sylvester-transpose matrix equations with the norm inequality constraint.
J. Global Optimization, 2019

Iterative criteria for identifying strong H-tensors.
J. Computational Applied Mathematics, 2019

A Shamanskii-like self-adaptive Levenberg-Marquardt method for nonlinear equations.
Computers & Mathematics with Applications, 2019

Convergent conditions of the generalized Newton method for absolute value equation over second order cones.
Appl. Math. Lett., 2019

2018
Some iterative methods for the largest positive definite solution to a class of nonlinear matrix equation.
Numerical Algorithms, 2018

An iterative algorithm for the least Frobenius norm Hermitian and generalized skew Hamiltonian solutions of the generalized coupled Sylvester-conjugate matrix equations.
Numerical Algorithms, 2018

The relaxed gradient-based iterative algorithms for a class of generalized coupled Sylvester-conjugate matrix equations.
J. Franklin Institute, 2018

Improving security and stability of ad hoc on-demand distance vector with fuzzy neural network in vehicular ad hoc network.
IJDSN, 2018

Enhancing negative messages broadcasting with Meet-Table and TTL in VANET.
EURASIP J. Wireless Comm. and Networking, 2018

Gradient-based iterative algorithms for generalized coupled Sylvester-conjugate matrix equations.
Computers & Mathematics with Applications, 2018

An iterative algorithm for the least Frobenius norm least squares solution of a class of generalized coupled Sylvester-transpose linear matrix equations.
Applied Mathematics and Computation, 2018

Improving Security and Stability of AODV with Fuzzy Neural Network in VANET.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

A Secure AODV Protocol Improvement Scheme Based on Fuzzy Neural Network.
Proceedings of the Security and Privacy in Communication Networks, 2018

A Homomorphic Searching Scheme For Sensitive Data In NoSQL Database.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Stable Clustering for VANETs on Highways.
Proceedings of the 2018 IEEE/ACM Symposium on Edge Computing, 2018

2017
Symmetric least squares solution of a class of Sylvester matrix equations via MINIRES algorithm.
J. Franklin Institute, 2017

On the least squares generalized Hamiltonian solution of generalized coupled Sylvester-conjugate matrix equations.
Computers & Mathematics with Applications, 2017

Distributing Negative Messages in VANET Based on Meet-Table and Cloud Computing.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

PaJDBC: A Transparent Privacy-Aware Database Accessing Middleware for Java.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Enhancing Negative Messages Broadcasting with Meet-Table and TTL in VANET.
Proceedings of the 2017 International Conference on Identification, 2017

Meet-fog for accurate distribution of negative messages in VANET.
Proceedings of the Workshop on Smart Internet of Things, SmartIoT@SEC 2017, 2017

Online learner emotional analysis based on big dataset of online learning forum.
Proceedings of the 10th International Congress on Image and Signal Processing, 2017

2016
Optimizing Propagation Network of Certificate Revocation in VANET with Meet-Table.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

A transparent framework based on accessing bridge and mobile app for protecting database privacy with PKI.
Proceedings of the 2nd ACM Workshop on Privacy-Aware Mobile Computing, 2016

2015
One transmission scheme based on variable MSK modulator for wireless physical layer security.
Proceedings of the International Conference on Wireless Communications & Signal Processing, 2015

2005
Dynamic Role and Context-Based Access Control for Grid Applications.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005


  Loading...