Bin Lian

Orcid: 0000-0001-9363-5782

According to our database1, Bin Lian authored at least 18 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Trusted Location Sharing on Enhanced Privacy-Protection IoT Without Trusted Center.
IEEE Internet Things J., April, 2024

Scbean: a python library for single-cell multi-omics data analysis.
Bioinform., February, 2024

Joint data augmentation and knowledge distillation for few-shot continual relation extraction.
Appl. Intell., 2024

2023
DA-HAR: Dual adversarial network for environment-independent WiFi human activity recognition.
Pervasive Mob. Comput., December, 2023

A multi-view latent variable model reveals cellular heterogeneity in complex tissues for paired multimodal single-cell data.
Bioinform., January, 2023

Leveled Fully Homomorphic Signcryption From Lattices.
IEEE Access, 2023

2022
Efficient High-Radix GF(p) Montgomery Modular Multiplication Via Deep Use Of Multipliers.
IEEE Trans. Circuits Syst. II Express Briefs, 2022

A Review on Rainfall Measurement Based on Commercial Microwave Links in Wireless Cellular Networks.
Sensors, 2022

Double-Blind Compact E-cash from Bilinear Map.
KSII Trans. Internet Inf. Syst., 2022

A sanitizable signcryption scheme with public verifiability via chameleon hash function.
J. Inf. Secur. Appl., 2022

2021
Compact E-Cash with Efficient Coin-Tracing.
IEEE Trans. Dependable Secur. Comput., 2021

2020
A practical solution to clone problem in anonymous information system.
Inf. Sci., 2020

2019
Compact E-Cash with Practical and Complete Tracing.
KSII Trans. Internet Inf. Syst., 2019

2015
Periodic K-Times Anonymous Authentication With Efficient Revocation of Violator's Credential.
IEEE Trans. Inf. Forensics Secur., 2015

面向决策的信任融合模型研究 (Research on Fusion Trust Model for Decision-making).
计算机科学, 2015

2014
The Effect of MAC Parameters on Energy Efficiency and Delay in Wireless Sensor Networks.
J. Networks, 2014

Provably secure E-cash system with practical and efficient complete tracing.
Int. J. Inf. Sec., 2014

DBSCAN Clustering Algorithm Applied to Identify Suspicious Financial Transactions.
Proceedings of the 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2014


  Loading...