Bin Lu

According to our database1, Bin Lu authored at least 99 papers between 2002 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Automatic Cardiothoracic Ratio Calculation With Deep Learning.
IEEE Access, 2019

A Parallel Algorithm for Bayesian Text Classification Based on Noise Elimination and Dimension Reduction in Spark Computing Environment.
Proceedings of the Cloud Computing - CLOUD 2019, 2019

2018
Brillouin Frequency Shift of Fiber Distributed Sensors Extracted from Noisy Signals by Quadratic Fitting.
Sensors, 2018

Exception Handling-Based Dynamic Software Watermarking.
IEEE Access, 2018

Towards Accurate and Complete Registration of Coronary Arteries in CTA Images.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2018, 2018

Lumen Segmentation of Aortic Dissection with Cascaded Convolutional Network.
Proceedings of the Statistical Atlases and Computational Models of the Heart. Atrial Segmentation and LV Quantification Challenges, 2018

Analysis and Improvement on an Image Encryption Algorithm Based on Bit Level Permutation.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
Improved analytical model of surface potential with modified boundary conditions for double gate tunnel FETs.
Microelectronics Reliability, 2017

Bayesian regularized quantile structural equation models.
J. Multivariate Analysis, 2017

Secure numerical and logical multi party operations.
J. Inf. Sec. Appl., 2017

Feature Encodings and Poolings for Action and Event Recognition: A Comprehensive Survey.
Information, 2017

2016
Event Bank based multimedia representation via latent group logistic regression minimization.
Neurocomputing, 2016

An Image Encryption Algorithm Based on Information Hiding.
I. J. Bifurcation and Chaos, 2016

Random table and hash coding-based binary code obfuscation against stack trace analysis.
IET Information Security, 2016

Subdomain and Access Pattern Privacy - Trading off Confidentiality and Performance.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

2015
Multimedia event detection with ℓ2-regularized logistic Gaussian mixture regression.
Neural Computing and Applications, 2015

Differential attack on image encryption algorithm using binary bitplane.
Proceedings of the 12th International Conference on Fuzzy Systems and Knowledge Discovery, 2015

2014
Requirements Elicitation and Specification Using the Agent Paradigm: The Case Study of an Aircraft Turnaround Simulator.
IEEE Trans. Software Eng., 2014

A Data Obfuscation Based on State Transition Graph of Mealy Automata.
Proceedings of the Intelligent Computing Theory - 10th International Conference, 2014

Mixed Obfuscation of Overlapping Instruction and Self-Modify Code Based on Hyper-Chaotic Opaque Predicates.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

2013
AlGaN/GaN-based power semiconductor switches.
PhD thesis, 2013

A 2-chain can interlock with an open 10-chain.
CoRR, 2013

Overview of the Patent Machine Translation Task at the NTCIR-10 Workshop.
Proceedings of the 10th NTCIR Conference on Evaluation of Information Access Technologies, 2013

Embedding change rate estimation based on ensemble learning.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013

Empirical analysis of the coauthorship network based on DBLP.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2013

Practical aspects of rotor cage fault detection for medium-voltage induction motors.
Proceedings of the 2013 IEEE Industry Applications Society Annual Meeting, 2013

Operand stack dependence based Java static software birthmark.
Proceedings of the 10th International Conference on Fuzzy Systems and Knowledge Discovery, 2013

Reflections on the Enterprise to Change Management Concept: In Perspective of Concept Innovation.
Proceedings of The Eighth International Conference on Bio-Inspired Computing: Theories and Applications, 2013

Comparable Multilingual Patents as Large-Scale Parallel Corpora.
Proceedings of the Building and Using Comparable Corpora., 2013

2012
On the Robustness of Look-Up Table Digital Predistortion in the Presence of Loop Delay Error.
IEEE Trans. on Circuits and Systems, 2012

SPA Comprehensive Evaluation Model and its Application in the Risk Assessment of Electric Power Information Network.
JNW, 2012

Division theorem combined with the Riccati equation for solving some nonlinear Schrödinger-like equations.
Applied Mathematics and Computation, 2012

2011
Magnetic Effects of DC Signal Injection on Induction Motors for Thermal Evaluation of Stator Windings.
IEEE Trans. Industrial Electronics, 2011

A Static Software Birthmark based on Use-define Chains for Detecting the Theft of Java Programs.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Overview of the Patent Machine Translation Task at the NTCIR-9 Workshop.
Proceedings of the 9th NTCIR Workshop Meeting on Evaluation of Information Access Technologies: Information Retrieval, 2011

Multi-aspect Sentiment Analysis with Topic Models.
Proceedings of the Data Mining Workshops (ICDMW), 2011

Leaf Image Classification with Shape Context and SIFT Descriptors.
Proceedings of the 2011 International Conference on Digital Image Computing: Techniques and Applications (DICTA), 2011

Joint Bilingual Sentiment Classification with Unlabeled Parallel Corpora.
Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies, 2011

2010
Opportunities and Challenges of Wireless Sensor Networks in Smart Grid.
IEEE Trans. Industrial Electronics, 2010

Travelling wave solutions of nonlinear partial equations by using the first integral method.
Applied Mathematics and Computation, 2010

CityU-DAC: Disambiguating Sentiment-Ambiguous Adjectives within Context.
Proceedings of the 5th International Workshop on Semantic Evaluation, 2010

Supervised Approaches and Dependency Parsing for Chinese Opinion Analysis at NTCIR-8.
Proceedings of the 8th NTCIR Workshop Meeting on Evaluation of Information Access Technologies: Information Retrieval, 2010

Identifying Opinion Holders and Targets with Dependency Parser in Chinese News Texts.
Proceedings of the Human Language Technologies: Conference of the North American Chapter of the Association of Computational Linguistics, Proceedings, June 2, 2010, Los Angeles, California, USA, 2010

Combining a large sentiment lexicon and machine learning for subjectivity classification.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010

A Risk Assessment Algorithm Based on Utility Theory.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence, 2010

Engaging Stakeholders with Agent-Oriented Requirements Modelling.
Proceedings of the Agent-Oriented Software Engineering XI - 11th International Workshop, 2010

Learning Chinese Polarity Lexicons by Integration of Graph Models and Morphological Features.
Proceedings of the Information Retrieval Technology, 2010

Mining Large-scale Parallel Corpora from Multilingual Patents: An English-Chinese example and its application to SMT.
Proceedings of the CIPS-SIGHAN Joint Conference on Chinese Language Processing, 2010

2009
Impaired-Cooling-Condition Detection Using DC-Signal Injection for Soft-Starter-Connected Induction Motors.
IEEE Trans. Industrial Electronics, 2009

Online and Remote Motor Energy Monitoring and Fault Diagnostics Using Wireless Sensor Networks.
IEEE Trans. Industrial Electronics, 2009

Mashup by Surfing a Web of Data APIs.
PVLDB, 2009

ViWoSG: A distributed scene graph of ultramassive distributed virtual environments.
Science in China Series F: Information Sciences, 2009

sMash: semantic-based mashup navigation for data API network.
Proceedings of the 18th International Conference on World Wide Web, 2009

Towards Bilingual Term Extraction in Comparable Patents.
Proceedings of the 23rd Pacific Asia Conference on Language, Information and Computation, 2009

Deriving Similarity Graphs from Open Linked Data on Semantic Web.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2009

Degradation of Humic Acid by TiO2 Nonutubes/UV/O3.
Proceedings of the 2009 International Conference on Environmental Science and Information Application Technology, 2009

Removal of Phosphate from Aqueous Solution Using Iron-Oxide-Coated Sand Filter Media: Batch Studies.
Proceedings of the 2009 International Conference on Environmental Science and Information Application Technology, 2009

Ethanethiol Removal Using a Novel Plasma Reactor Combined with Mn/?-Al2O3.
Proceedings of the 2009 International Conference on Environmental Science and Information Application Technology, 2009

Nonlinear static-rank computation.
Proceedings of the 18th ACM Conference on Information and Knowledge Management, 2009

2008
Network Security Fundamentals.
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008

A Remote and Sensorless Stator Winding Resistance Estimation Method for Thermal Protection of Soft-Starter-Connected Induction Machines.
IEEE Trans. Industrial Electronics, 2008

A Survey on Testing and Monitoring Methods for Stator Insulation Systems of Low-Voltage Induction Machines Focusing on Turn Insulation Problems.
IEEE Trans. Industrial Electronics, 2008

Load Balancing Oriented Economic Grid Resource Scheduling.
Proceedings of the PACIIA 2008, 2008

An Universal Flexible Utility Function in Grid Economy.
Proceedings of the PACIIA 2008, 2008

A Political News Corpus in Chinese for Opinion Analysis.
Proceedings of the 2nd International Workshop on Evaluating Information Access, 2008

Supervised Approaches and Ensemble Techniques for Chinese Opinion Analysis at NTCIR-7.
Proceedings of the 7th NTCIR Workshop Meeting on Evaluation of Information Access Technologies: Information Retrieval, 2008

Feature n-gram Set Based Software Zero-Watermarking.
Proceedings of the International Symposium on Information Processing, 2008

Hiding Informationin in Java Class File.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008

Grid Load Balancing Scheduling Algorithm Based on Statistics Thinking.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

A Remote and Sensorless Thermal Protection Scheme for Soft-Starter-Connected Induction Motors.
Proceedings of the Industry Applications Society Annual Meeting, 2008

A Literature Review of IGBT Fault Diagnostic and Protection Methods for Power Inverters.
Proceedings of the Industry Applications Society Annual Meeting, 2008

BITBot-a modelling and simulation platform for robots.
Proceedings of the 8th IEEE-RAS International Conference on Humanoid Robots, 2008

Grid Resource Organization and Discovery Based on Hyper Topology Space.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

Supporting Evolving Multi-agent Systems with a System Evolution Directory.
Proceedings of the 19th Australian Software Engineering Conference (ASWEC 2008), 2008

2007
A Low-Cost Real-Time Hardware-in-the-Loop Testing Approach of Power Electronics Controls.
IEEE Trans. Industrial Electronics, 2007

A Software Birthmark Based on Dynamic Opcode n-gram.
Proceedings of the First IEEE International Conference on Semantic Computing (ICSC 2007), 2007

Topology Control for Secured Coverage in Wireless Sensor Networks.
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007

Multi-granular Control of Double Inverted Pendulum Based on Universal Logics Fuzzy Neural Networks.
Proceedings of the Advances in Neural Networks, 2007

Fuzzy Control of a Double Inverted Pendulum Based on Hyper Topology Space.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

A Multi-Granular Fuzzy Comprehensive Evaluation Method.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

2006
Assessing local influence for nonlinear structural equation models with ignorable missing data.
Computational Statistics & Data Analysis, 2006

Pathway analysis using random forests classification and regression.
Bioinformatics, 2006

Real-Time Steganography in Compressed Video.
Proceedings of the Multimedia Content Representation, 2006

A Chaos-Based Robust Software Watermarking.
Proceedings of the Information Security Practice and Experience, 2006

Immune Multiobjective Optimization Algorithm for Unsupervised Feature Selection.
Proceedings of the Applications of Evolutionary Computing, 2006

A Distributed GLR Scheme for 3G Cellular Networks.
Proceedings of the 10th International Conference on CSCW in Design, 2006

Grid Resource Model Based on Hyper Topology Space.
Proceedings of the 10th International Conference on CSCW in Design, 2006

2005
Security in QoS signaling systems for mobile ad hoc networks.
Proceedings of the 2005 IEEE International Conference on Wireless And Mobile Computing, 2005

A Lightweight Authentication Protocol for Mobile Ad Hoc Networks.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Whisper - A Lightweight Anonymous Communication Mechanism in Wireless Ad-hoc Networks.
Proceedings of the 2005 International Conference on Wireless Networks, 2005

IFMOA: Immune Forgetting Multiobjective Optimization Algorithm.
Proceedings of the Advances in Natural Computation, First International Conference, 2005

Clone Selection Based Multicast Routing Algorithm.
Proceedings of the Advances in Natural Computation, First International Conference, 2005

IFCPA: Immune Forgetting Clonal Programming Algorithm for Large Parameter Optimization Problems.
Proceedings of the Advances in Natural Computation, First International Conference, 2005

Performance assessment of an artificial immune system multiobjective optimizer by two improved metrics.
Proceedings of the Genetic and Evolutionary Computation Conference, 2005

Clonal Selection with Immune Dominance and Anergy Based Multiobjective Optimization.
Proceedings of the Evolutionary Multi-Criterion Optimization, 2005

Clonal Selection Algorithm for Dynamic Multiobjective Optimization.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
Static output feedback H/sub /spl infin// controller design for fuzzy systems subject to sensor nonlinearities.
Proceedings of the IEEE International Conference on Systems, 2004

2003
Riemann and Edalat integration on domains.
Theor. Comput. Sci., 2003

2002
Cooperative security-enforcement routing in mobile ad hoc networks.
Proceedings of The Fourth IEEE Conference on Mobile and Wireless Communications Networks, 2002


  Loading...