Bo Qin

Orcid: 0000-0003-0927-254X

According to our database1, Bo Qin authored at least 216 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Industrial Wireless Internet Zero Trust Model: Zero Trust Meets Dynamic Federated Learning with Blockchain.
IEEE Wirel. Commun., April, 2024

A High-Efficiency and Incentive-Compatible Peer-to-Peer Energy Trading Mechanism.
IEEE Trans. Smart Grid, January, 2024

CAU: A Causality Attention Unit for Spatial-Temporal Sequence Forecast.
IEEE Trans. Multim., 2024

JEP-KD: Joint-Embedding Predictive Architecture Based Knowledge Distillation for Visual Speech Recognition.
CoRR, 2024

2023
A Novel Data Augmentation Method Based on CoralGAN for Prediction of Part Surface Roughness.
IEEE Trans. Neural Networks Learn. Syst., October, 2023

Security and privacy protection technologies in securing blockchain applications.
Inf. Sci., October, 2023

A collective attestation scheme towards cloud system.
Clust. Comput., October, 2023

A Scalable Cross-Chain Access Control and Identity Authentication Scheme.
Sensors, February, 2023

LuxGeo: Efficient and Security-Enhanced Geometric Range Queries.
IEEE Trans. Knowl. Data Eng., 2023

Enhanced Reduced-Order Extended State Observer for Motion Control of Differential Driven Mobile Robot.
IEEE Trans. Cybern., 2023

Slow-Varying Dynamics-Assisted Temporal Capsule Network for Machinery Remaining Useful Life Estimation.
IEEE Trans. Cybern., 2023

Eye Disease Net: an algorithmic model for rapid diagnosis of diseases.
PeerJ Comput. Sci., 2023

PIRT: A Physics-Informed Red Tide Deep Learning Forecast Model Considering Causal-Inferred Predictors Selection.
IEEE Geosci. Remote. Sens. Lett., 2023

Decentralized Finance (DeFi): A Survey.
IACR Cryptol. ePrint Arch., 2023

Weighted Joint Maximum Mean Discrepancy Enabled Multi-Source-Multi-Target Unsupervised Domain Adaptation Fault Diagnosis.
CoRR, 2023

Hard Sample Mining Enabled Contrastive Feature Learning for Wind Turbine Pitch System Fault Diagnosis.
CoRR, 2023

BDTS: Blockchain-Based Data Trading System.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

Subsidy Bridge: Rewarding Cross-Blockchain Relayers with Subsidy.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

When E-learning Meets Web 3.0: Applications and Challenges.
Proceedings of the 12th IEEE International Conference on Educational and Information Technology, 2023

IKE: Threshold Key Escrow Service with Intermediary Encryption.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023

A Computational Framework for Effective Representation and Extraction of Knowledge Graph for Power Plant Maintenance and Overhaul.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

DCSS: A Smart Contract-based Data Continuous Storage Scheme.
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2023

Understanding and Improving the Robustness of Terminology Constraints in Neural Machine Translation.
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2023

2022
Distributed Adaptive Control for Nonlinear Heterogeneous Multi-agent Systems with Different Dimensions and Time Delay.
Int. J. Comput. Commun. Control, July, 2022

A knowledge extraction framework for domain-specific application with simplified pre-trained language model and attention-based feature extractor.
Serv. Oriented Comput. Appl., 2022

BDTS: A Blockchain-based Data Trading System with Fair Exchange.
CoRR, 2022

Slow-varying Dynamics Assisted Temporal Capsule Network for Machinery Remaining Useful Life Estimation.
CoRR, 2022

Your Behaviors Reveal What You Need: A Practical Scheme Based on User Behaviors for Personalized Security Nudges.
Comput. Secur., 2022

The RoyalFlush System for the WMT 2022 Efficiency Task.
Proceedings of the Seventh Conference on Machine Translation, 2022

Squeezing Network Performance for Secure and Efficient PoW with Better Difficulty Adjustment.
Proceedings of the IEEE International Conference on Trust, 2022

Cloud-assisted Road Condition Monitoring with Privacy Protection in VANETs.
Proceedings of the 18th International Conference on Mobility, Sensing and Networking, 2022

Challenges of E-learning in Shenyang Jianzhu University.
Proceedings of the 2022 5th International Conference on Education Technology Management, 2022

How to improve students' intrinsic motivation and 4C skills in the virtual e-learning community and evaluate its results.
Proceedings of the 14th International Conference on Education Technology and Computers, 2022

An Intelligent System for Semantic Information Extraction and Knowledge Graph Construction from Multi-Type Data Sources.
Proceedings of the IEEE International Conference on e-Business Engineering, 2022

Simultaneous Extraction of Entities and Relations Based on Pre-trained Language Model and Pre-defined Language Templates.
Proceedings of the IEEE International Conference on e-Business Engineering, 2022

Topology-oriented 3D ocean flow field feature classification and tracking algorithm.
Proceedings of the ICDLT 2022: 6th International Conference on Deep Learning Technologies, Xi'an, China, July 26, 2022

Semi supervised ocean mesoscale vortex detection method based on feature invariance.
Proceedings of the ICDLT 2022: 6th International Conference on Deep Learning Technologies, Xi'an, China, July 26, 2022

PXCrypto: A Regulated Privacy-Preserving Cross-Chain Transaction Scheme.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2022

Light-weight Unsupervised Anomaly Detection for Encrypted Malware Traffic.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

Knowledge Mining Based Collaborative Framework for Manufacturing Value Chains.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

A Profiling and Query Platform for Research Management Based on Knowledge Graph.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

Handwritten Mathematical Expression Recognition via Attention Aggregation Based Bi-directional Mutual Learning.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Privacy-Preserving Lightweight Data Monitoring in Internet of Things Environments.
Wirel. Pers. Commun., 2021

A New Multitask Learning Method for Tool Wear Condition and Part Surface Quality Prediction.
IEEE Trans. Ind. Informatics, 2021

Log-Based Anomaly Detection With Robust Feature Extraction and Online Learning.
IEEE Trans. Inf. Forensics Secur., 2021

Fault Frequency Identification of Rolling Bearing Using Reinforced Ensemble Local Mean Decomposition.
J. Control. Sci. Eng., 2021

A Multi-Agent Reinforcement Learning Framework with Recurrent Communication Module for Traffic Light Control.
Proceedings of the 4th International Conference on Information Systems and Computer Aided Education, 2021

A Framework for Effective Knowledge Extraction from A Data Space Formed by Unstructured Technical Reports using Pre-trained Models.
Proceedings of the IEEE International Conference on e-Business Engineering, 2021

ET-SORT: A deep learning-based method for mesoscale eddies tracking in two-dimensional time-varying flow field.
Proceedings of the ICDLT 2021: 5th International Conference on Deep Learning Technologies, Qingdao, China, July 23, 2021

GDT-Net: A Model Based on Deep Learning for Water Surface Garbage Detection.
Proceedings of the ICDLT 2021: 5th International Conference on Deep Learning Technologies, Qingdao, China, July 23, 2021

2020
Functional Privacy-preserving Outsourcing Scheme with Computation Verifiability in Fog Computing.
KSII Trans. Internet Inf. Syst., 2020

Secure server-aided data sharing clique with attestation.
Inf. Sci., 2020

Preserving transaction privacy in bitcoin.
Future Gener. Comput. Syst., 2020

Cecoin: A decentralized PKI mitigating MitM attacks.
Future Gener. Comput. Syst., 2020

On the fine-grained fingerprinting threat to software-defined networks.
Future Gener. Comput. Syst., 2020

An organization-friendly blockchain system.
Comput. Secur., 2020

Experimental Comparisons of Verifiable Delay Functions.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020

Distributed Spatial Retrieval and Organization of Massive Ocean Spatiotemporal Data.
Proceedings of the 11th International Conference on Awareness Science and Technology, 2020

A Paid Message Forwarding Scheme Based on Social Network.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020

2019
Privacy-Preserving Cloud-Based Road Condition Monitoring With Source Authentication in VANETs.
IEEE Trans. Inf. Forensics Secur., 2019

基于ST-CNN的交通标志实时检测识别算法 (Real-time Detection and Recognition Algorithm of Traffic Signs Based on ST-CNN).
计算机科学, 2019

基于正交编码的大数据纯文本水印方法 (Big Data Plain Text Watermarking Based on Orthogonal Coding).
计算机科学, 2019

Securing messaging services through efficient signcryption with designated equality test.
Inf. Sci., 2019

A secure versatile light payment system based on blockchain.
Future Gener. Comput. Syst., 2019

A secure large-scale instant payment system based on blockchain.
Comput. Secur., 2019

Achieving liability in anonymous communication: Auditing and tracing.
Comput. Commun., 2019

Privacy Preserving Machine Learning with Limited Information Leakage.
Proceedings of the Network and System Security - 13th International Conference, 2019

Identifying Sources of Random Walk-Based Epidemic Spreading in Networks.
Proceedings of the Machine Learning and Intelligent Communications, 2019

MixGeo: efficient secure range queries on encrypted dense spatial data in the cloud.
Proceedings of the International Symposium on Quality of Service, 2019

An Approach to Recommendation of Verbosity Log Levels Based on Logging Intention.
Proceedings of the 2019 IEEE International Conference on Software Maintenance and Evolution, 2019

DTGuard: A Lightweight Defence Mechanism Against a New DoS Attack on SDN.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

Learning-Based Anomaly Cause Tracing with Synthetic Analysis of Logs from Multiple Cloud Service Components.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

A Flexible Instant Payment System Based on Blockchain.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

An Approach to Cloud Execution Failure Diagnosis Based on Exception Logs in OpenStack.
Proceedings of the 12th IEEE International Conference on Cloud Computing, 2019

2018
Efficient subtree-based encryption for fuzzy-entity data sharing.
Soft Comput., 2018

Ownership-hidden group-oriented proofs of storage from pre-homomorphic signatures.
Peer-to-Peer Netw. Appl., 2018

基于时空关系模型的交通信号灯的实时检测与识别 (Real-time Detection and Recognition of Traffic Light Based on Time-Space Model).
计算机科学, 2018

Multiple Feature Vectors Based Fault Classification for WSN Integrated Bearing of Rolling Mill.
J. Control. Sci. Eng., 2018

Lightweight and Manageable Digital Evidence Preservation System on Bitcoin.
J. Comput. Sci. Technol., 2018

Secure pay-TV for chained hotels.
Int. J. Inf. Sec., 2018

Privacy Protection Method Based on Access Control.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

Auditable Hierarchy-Private Public-Key Encryption.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

Linkable Group Signature for Auditing Anonymous Communication.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Distributed Aggregate Privacy-Preserving Authentication in VANETs.
IEEE Trans. Intell. Transp. Syst., 2017

Online/Offline Provable Data Possession.
IEEE Trans. Inf. Forensics Secur., 2017

Identity-Based Data Outsourcing With Comprehensive Auditing in Clouds.
IEEE Trans. Inf. Forensics Secur., 2017

Secure joint Bitcoin trading with partially blind fuzzy signatures.
Soft Comput., 2017

Certificateless and identity-based authenticated asymmetric group key agreement.
Int. J. Inf. Sec., 2017

Fine-Grained Fingerprinting Threats to Software-Defined Networks.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

TTP-free Fair Exchange of Digital Signatures with Bitcoin.
Proceedings of the Information Security Practice and Experience, 2017

Outsourcing Encrypted Excel Files.
Proceedings of the Information Security Practice and Experience, 2017

EyeSec: A Practical Shoulder-Surfing Resistant Gaze-Based Authentication System.
Proceedings of the Information Security Practice and Experience, 2017

Secure Communications in Unmanned Aerial Vehicle Network.
Proceedings of the Information Security Practice and Experience, 2017

Non-approximability and Polylogarithmic Approximations of the Single-Sink Unsplittable and Confluent Dynamic Flow Problems.
Proceedings of the 28th International Symposium on Algorithms and Computation, 2017

2016
Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response.
IEEE Trans. Computers, 2016

Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts.
IEEE Trans. Computers, 2016

Scalable privacy-enhanced traffic monitoring in vehicular ad hoc networks.
Soft Comput., 2016

SAKE: scalable authenticated key exchange for mobile e-health networks.
Secur. Commun. Networks, 2016

Energy-efficient sensor selection strategies based on sensing model clustering.
Int. J. Sens. Networks, 2016

Practical chosen-ciphertext secure Hierarchical Identity-Based Broadcast Encryption.
Int. J. Inf. Sec., 2016

Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing.
IACR Cryptol. ePrint Arch., 2016

Identity-based proxy re-encryption version 2: Making mobile access easy in cloud.
Future Gener. Comput. Syst., 2016

Batch Public Key Cryptosystem with batch multi-exponentiation.
Future Gener. Comput. Syst., 2016

Provably secure robust optimistic fair exchange of distributed signatures.
Future Gener. Comput. Syst., 2016

Versatile lightweight key distribution for big data privacy in vehicular ad hoc networks.
Concurr. Comput. Pract. Exp., 2016

Efficient group key management for secure big data in predictable large-scale networks.
Concurr. Comput. Pract. Exp., 2016

Towards cost-effective and low latency data center network architecture.
Comput. Commun., 2016

A Copy-Move Forgery Detection Scheme with Improved Clone Region Estimation.
Proceedings of the Third International Conference on Trustworthy Systems and their Applications, 2016

Distributed Bitcoin Account Management.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Analysis of SIFT Method Based on Swarm Intelligent Algorithms for Copy-Move Forgery Detection.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

On Sketching Quadratic Forms.
Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science, 2016

Online/Offline Public-Index Predicate Encryption for Fine-Grained Mobile Access Control.
Proceedings of the Computer Security - ESORICS 2016, 2016

Accelerating Oblivious Transfer with Batch Multi-exponentiation.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement Protocol for Secure Group Communications.
IEEE Trans. Inf. Forensics Secur., 2015

TPP: Traceable Privacy-Preserving Communication and Precise Reward for Vehicle-to-Grid Networks in Smart Grids.
IEEE Trans. Inf. Forensics Secur., 2015

Practical (fully) distributed signatures provably secure in the standard model.
Theor. Comput. Sci., 2015

Towards bandwidth guaranteed energy efficient data center networking.
J. Cloud Comput., 2015

Flexible attribute-based encryption applicable to secure e-healthcare records.
Int. J. Inf. Sec., 2015

On the Security of MTA-OTIBASs (Multiple-TA One-Time Identity-Based Aggregate Signatures).
CoRR, 2015

On the Security of Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response.
CoRR, 2015

Practical secure and privacy-preserving scheme for value-added applications in VANETs.
Comput. Commun., 2015

Further ideal multipartite access structures from integer polymatroids.
Sci. China Inf. Sci., 2015

Non-interactive Revocable Identity-Based Access Control over e-Healthcare Records.
Proceedings of the Information Security Practice and Experience, 2015

Expanding an Operating System's Working Space with a New Mode to Support Trust Measurement.
Proceedings of the Information Security Practice and Experience, 2015

Batch Blind Signatures on Elliptic Curves.
Proceedings of the Information Security Practice and Experience, 2015

Thermal error prediction of numerical control machine based on improved particle swarm optimized back propagation neural network.
Proceedings of the 11th International Conference on Natural Computation, 2015

An efficient framework for online virtual network embedding in virtualized cloud data centers.
Proceedings of the 4th IEEE International Conference on Cloud Networking, 2015

Group-oriented Proofs of Storage.
Proceedings of the 10th ACM Symposium on Information, 2015

Asymmetric Cross-cryptosystem Re-encryption Applicable to Efficient and Secure Mobile Access to Outsourced Data.
Proceedings of the 10th ACM Symposium on Information, 2015

Privacy-Preserving Traffic Monitoring in Vehicular Ad Hoc Networks.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

2014
Comparative analysis of metazoan chromatin organization Open.
Nat., 2014

FRR: Fair remote retrieval of outsourced private medical records in electronic health networks.
J. Biomed. Informatics, 2014

Signatures in hierarchical certificateless cryptography: Efficient constructions and provable security.
Inf. Sci., 2014

Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts.
Inf. Sci., 2014

Identity-based remote data possession checking in public clouds.
IET Inf. Secur., 2014

A Sketching Algorithm for Spectral Graph Sparsification.
CoRR, 2014

Efficient Sub-/Inter-Group Key Distribution for ad hoc Networks.
Proceedings of the Network and System Security - 8th International Conference, 2014

Provably Secure Certificateless Authenticated Asymmetric Group Key Agreement.
Proceedings of the Information Security Practice and Experience, 2014

A Provably Secure Ring Signature Scheme with Bounded Leakage Resilience.
Proceedings of the Information Security Practice and Experience, 2014

NovaCube: A low latency Torus-based network architecture for data centers.
Proceedings of the IEEE Global Communications Conference, 2014

Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage.
Proceedings of the Computer Security - ESORICS 2014, 2014

Practical Direct Chosen Ciphertext Secure Key-Policy Attribute-Based Encryption with Public Ciphertext Test.
Proceedings of the Computer Security - ESORICS 2014, 2014

Who Is Touching My Cloud.
Proceedings of the Computer Security - ESORICS 2014, 2014

Practical Distributed Signatures in the Standard Model.
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014

Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

Hierarchical Identity-Based Broadcast Encryption.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
Fast Transmission to Remote Cooperative Groups: A New Key Management Paradigm.
IEEE/ACM Trans. Netw., 2013

Identity-based optimistic fair exchange in the standard model.
Secur. Commun. Networks, 2013

Corrigendum: "Provably-secure electronic cash based on certicateless partially-blind signatures".
Electron. Commer. Res. Appl., 2013

Simultaneous authentication and secrecy in identity-based data upload to cloud.
Clust. Comput., 2013

CistromeFinder for ChIP-seq and DNase-seq data reuse.
Bioinform., 2013

ChainDroid: Safe and Flexible Access to Protected Android Resources Based on Call Chain.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Finding Key Leakage in Hierarchical Distribution of Encrypted Data.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key Agreement.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

A Generic Construction of Proxy Signatures from Certificateless Signatures.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

2012
Provably secure threshold public-key encryption with adaptive security and short ciphertexts.
Inf. Sci., 2012

Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme.
IET Inf. Secur., 2012

Improved one-to-many authentication scheme for access control in pay-TV systems.
IET Inf. Secur., 2012

CistromeMap: a knowledgebase and web server for ChIP-Seq and DNase-Seq studies in mouse and human.
Bioinform., 2012

Analysis and Improvements of Two Identity Based Anonymous Signcryption Schemes for Multiple Receivers.
Proceedings of the 11th IEEE International Conference on Trust, 2012

An Improved Binary Authentication Tree Algorithm for Vehicular Networks.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

A New Identity Based Signcryption Scheme in the Standard Model.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Practical Privacy for Value-Added Applications in Vehicular Ad Hoc Networks.
Proceedings of the Internet and Distributed Computing Systems, 2012

Convex hull-based support vector machine rule extraction.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012

2011
Solitonic Excitations and Interactions in the Three-Spine Alpha-Helical Protein with Inhomogeneity.
SIAM J. Appl. Math., 2011

Provably secure one-round identity-based authenticated asymmetric group key agreement protocol.
Inf. Sci., 2011

Provably-secure electronic cash based on certificateless partially-blind signatures.
Electron. Commer. Res. Appl., 2011

Asymmetric group key agreement protocol for open networks and its application to broadcast encryption.
Comput. Networks, 2011

Fully Distributed Broadcast Encryption.
Proceedings of the Provable Security - 5th International Conference, 2011

APPA: Aggregate Privacy-Preserving Authentication in Vehicular Ad Hoc Networks.
Proceedings of the Information Security, 14th International Conference, 2011

Distributed Privacy-Preserving Secure Aggregation in Vehicular Communication.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

SK-OFDM Robust to Frequency Selective Fading Channel with Spectral Nulls.
Proceedings of the Third International Conference on Communications and Mobile Computing, 2011

Regression rules extraction from artificial neural network based on least squares.
Proceedings of the Seventh International Conference on Natural Computation, 2011

Preserving Security and Privacy in Large-Scale VANETs.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

Bridging Broadcast Encryption and Group Key Agreement.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

2010
A 52-mW 3.1-10.6-GHz Fully Integrated Correlator for IR-UWB Transceivers in 0.18 μm CMOS.
IEEE Trans. Ind. Electron., 2010

1.8 pJ/Pulse Programmable Gaussian Pulse Generator for Full-Band Noncarrier Impulse-UWB Transceivers in 90-nm CMOS.
IEEE Trans. Ind. Electron., 2010

Identity-Based Authenticated Asymmetric Group Key Agreement Protocol.
IACR Cryptol. ePrint Arch., 2010

Efficient many-to-one authentication with certificateless aggregate signatures.
Comput. Networks, 2010

Adapting Open Information Extraction to Domain-Specific Relations.
AI Mag., 2010

Secure compression of privacy-preserving witnesses in vehicular ad hoc networks.
Proceedings of the IEEE 6th International Conference on Wireless and Mobile Computing, 2010

GPU-Based Parallelization Algorithm for 2D Line Integral Convolution.
Proceedings of the Advances in Swarm Intelligence, First International Conference, 2010

A Traffic Video Background Extraction Algorithm Based on Image Content Sensitivity.
Proceedings of the Advances in Swarm Intelligence, First International Conference, 2010

Topological simplification of planar flow field based on physical feature.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010

Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

Authenticated Asymmetric Group Key Agreement Protocol and Its Application.
Proceedings of IEEE International Conference on Communications, 2010

Hierarchical Certificateless Signatures.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

Ad hoc broadcast encryption.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Identity-Based Verifiably Encrypted Signatures without Random Oracles.
Proceedings of the Provable Security, Third International Conference, 2009

Lemmatic Machine Translation.
Proceedings of Machine Translation Summit XII: Papers, 2009

A Single-chip 33pJ/pulse 5th-derivative Gaussian based IR-UWB Transmitter in 0.13µm CMOS.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2009), 2009

Fast Rendering Algorithm of Underwater Optical Effect.
Proceedings of the Second International Symposium on Intelligent Information Technology and Security Informatics, 2009

Asymmetric Group Key Agreement.
Proceedings of the Advances in Cryptology, 2009

A Three-Phase Approach to Photometric Calibration for Multi-projector Display Using LCD Projectors.
Proceedings of the Computer Vision, 2009

Novel Efficient Certificateless Aggregate Signatures.
Proceedings of the Applied Algebra, 2009

Certificateless One-Way Authenticated Two-Party Key Agreement Protocol.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Privacy for Private Key in Signatures.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

Publicly Verifiable Privacy-Preserving Group Decryption.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

OceanGrid: Constructing Data Grid of Ocean Environmental Information.
Proceedings of the Third ChinaGrid Annual Conference, ChinaGrid 2008, Dunhuang, Gansu, 2008

2007
Short Group Signatures Without Random Oracles.
J. Comput. Sci. Technol., 2007

Group Decryption.
IACR Cryptol. ePrint Arch., 2007

A Varying Pulse Width Second Order Derivative Gaussian Pulse Generator for UWB Transceivers in CMOS.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2007), 2007

A High Resolution Video Display System by Seamlessly Tiling Multiple Projectors.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

Fast Detection of Vehicles Based-on the Moving Region.
Proceedings of the 10th International Conference on Computer-Aided Design and Computer Graphics, 2007

Cryptanalysis of BGW Broadcast Encryption Schemes for DVD Content Protection.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

A simple and quick method for rendering underwater optical effect.
Proceedings of the 4th International Conference on Computer Graphics, 2007

2006
A Quick Self-Adaptive Background Updating Algorithm Based on Moving Region.
Proceedings of the 2006 Joint Conference on Information Sciences, 2006

Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme).
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006

2005
Extended Methodology of RS Design and Instances Based on GIP.
J. Comput. Sci. Technol., 2005

<i>t</i>-Out-of-<i>n</i> String/Bit Oblivious Transfers Revisited.
Proceedings of the Information Security Practice and Experience, 2005

A Robust Statistical Method for Brain Magnetic Resonance Image Segmentation.
Proceedings of the Progress in Pattern Recognition, 2005

Real-Time Dynamic Cloud Modeling and Rendering.
Proceedings of the 2005 International Conference on Computer Graphics, 2005

2004
The Recognition of the Vehicle License Plate Based on Modular Networks.
Proceedings of the Advances in Neural Networks, 2004

How to conduct a sealed bargain on the internet.
Proceedings of the 3rd International Conference on Information Security, 2004

Simulation of the emission of frozen soil by using IEM.
Proceedings of the 2004 IEEE International Geoscience and Remote Sensing Symposium, 2004

Simulated radiation characteristics of frozen soil surface at typical microwave bands.
Proceedings of the 2004 IEEE International Geoscience and Remote Sensing Symposium, 2004


  Loading...