Chi Lin

According to our database1, Chi Lin authored at least 63 papers between 1984 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Abnormal gesture recognition based on multi-model fusion strategy.
Mach. Vis. Appl., 2019

Execution allowance based fixed priority scheduling for probabilistic real-time systems.
Journal of Systems and Software, 2019

Double warning thresholds for preemptive charging scheduling in Wireless Rechargeable Sensor Networks.
Computer Networks, 2019

When Wireless Charging Meets Fresnel Zones: Even Obstacles Can Enhance Charging Efficiency.
Proceedings of the 16th Annual IEEE International Conference on Sensing, 2019

Maximizing Energy Efficiency of Period-Area Coverage with UAVs for Wireless Rechargeable Sensor Networks.
Proceedings of the 16th Annual IEEE International Conference on Sensing, 2019

Minimizing Charging Delay for Directional Charging in Wireless Rechargeable Sensor Networks.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

CoDoC: A Novel Attack for Wireless Rechargeable Sensor Networks through Denial of Charge.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Missing Value Imputations by Rule-Based Incomplete Data Fuzzy Modeling.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
GTCCS: A Game Theoretical Collaborative Charging Scheduling for On-Demand Charging Architecture.
IEEE Trans. Vehicular Technology, 2018

TSCA: A Temporal-Spatial Real-Time Charging Scheduling Algorithm for On-Demand Architecture in Wireless Rechargeable Sensor Networks.
IEEE Trans. Mob. Comput., 2018

OPPC: An Optimal Path Planning Charging Scheme Based on Schedulability Evaluation for WRSNs.
ACM Trans. Embedded Comput. Syst., 2018

Broadcast tree construction framework in tactile internet via dynamic algorithm.
Journal of Systems and Software, 2018

Hybrid charging scheduling schemes for three-dimensional underwater wireless rechargeable sensor networks.
Journal of Systems and Software, 2018

Compromising location privacies for vehicles cloud computing.
IJWGS, 2018

FMD: A DoS mitigation scheme based on flow migration in software-defined networking.
Int. J. Communication Systems, 2018

MPF: Prolonging Network Lifetime of Wireless Rechargeable Sensor Networks by Mixing Partial Charge and Full Charge.
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018

WiAU: An Accurate Device-Free Authentication System with ResNet.
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018

ThunderLoc: Smartphone-Based Crowdsensing for Thunder Localization.
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018

mTS: Temporal-and Spatial-Collaborative Charging for Wireless Rechargeable Sensor Networks with Multiple Vehicles.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

3DCS: A 3-D Dynamic Collaborative Scheduling Scheme for Wireless Rechargeable Sensor Networks with Heterogeneous Chargers.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

Partial Charging Scheduling in Wireless Rechargeable Sensor Networks.
Proceedings of the IEEE Global Communications Conference, 2018

Large-Scale Isolated Gesture Recognition Using a Refined Fused Model Based on Masked Res-C3D Network and Skeleton LSTM.
Proceedings of the 13th IEEE International Conference on Automatic Face & Gesture Recognition, 2018

VizWiz Grand Challenge: Answering Visual Questions From Blind People.
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition, 2018

2017
P2S: A Primary and Passer-By Scheduling Algorithm for On-Demand Charging Architecture in Wireless Rechargeable Sensor Networks.
IEEE Trans. Vehicular Technology, 2017

Effective hybrid load scheduling of online and offline clusters for e-health service.
Neurocomputing, 2017

Application of Improved Software Phase-Locked-Loop in DSTATCOM.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017

Digital Harmonic Detection with Rapid Response and High Steady Precision.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017

Results and Analysis of ChaLearn LAP Multi-modal Isolated and Continuous Gesture Recognition, and Real Versus Fake Expressed Emotions Challenges.
Proceedings of the 2017 IEEE International Conference on Computer Vision Workshops, 2017

2016
MREA: a minimum resource expenditure node capture attack in wireless sensor networks.
Security and Communication Networks, 2016

Clustering and splitting charging algorithms for large scaled wireless rechargeable sensor networks.
Journal of Systems and Software, 2016

GTCharge: A game theoretical collaborative charging scheme for wireless rechargeable sensor networks.
Journal of Systems and Software, 2016

TADP: Enabling temporal and distantial priority scheduling for on-demand charging architecture in wireless rechargeable sensor Networks.
Journal of Systems Architecture - Embedded Systems Design, 2016

Differential Privacy Preserving in Big Data Analytics for Connected Health.
J. Medical Systems, 2016

A low-cost node capture attack algorithm for wireless sensor networks.
Int. J. Communication Systems, 2016

An anonymous authentication scheme in data-link layer for VANETs.
IJAHUC, 2016

A differential privacy protection scheme for sensitive big data in body sensor networks.
Annales des Télécommunications, 2016

2015
Maximizing destructiveness of node capture attack in wireless sensor networks.
The Journal of Supercomputing, 2015

GTRF: A Game Theory Approach for Regulating Node Behavior in Real-Time Wireless Sensor Networks.
Sensors, 2015

Protecting location privacy and query privacy: a combined clustering approach.
Concurrency and Computation: Practice and Experience, 2015

A Multi-node Renewable Algorithm Based on Charging Range in Large-Scale Wireless Sensor Network.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

Compromising Ad-Hoc Networks by Attacking Weakly Connected Dominating Set.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

Minimizing Resource Expenditure While Maximizing Destructiveness for Node Capture Attacks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

VCLT: An Accurate Trajectory Tracking Attack Based on Crowdsourcing in VANETs.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

DWDP: A Double Warning Thresholds with Double Preemptive Scheduling Scheme for Wireless Rechargeable Sensor Networks.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

A Collaborated IPv6-Packets Matching Mechanism Base on Flow Label in OpenFlow.
Proceedings of the Collaborative Computing: Networking, Applications, and Worksharing, 2015

Protecting Privacy for Big Data in Body Sensor Networks: A Differential Privacy Approach.
Proceedings of the Collaborative Computing: Networking, Applications, and Worksharing, 2015

Event-Driven Gait Recognition Method Based on Dynamic Temporal Segmentation.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

2014
SOS: a secure social-aware credit-based stimulating mechanism for BikeNet.
IJAHUC, 2014

2013
Enhancing the attacking efficiency of the node capture attack in WSN: a matrix approach.
The Journal of Supercomputing, 2013

A high efficient node capture attack algorithm in wireless sensor network based on route minimum key set.
Security and Communication Networks, 2013

Enhancing Efficiency of Node Compromise Attacks in Vehicular Ad-hoc Networks Using Connected Dominating Set.
MONET, 2013

A Secure Social-Aware Incentive Scheme for Delay Tolerant Networks.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Partitioned Fixed-Priority Real-Time Scheduling Based on Dependent Task-Split on Multicore Platform.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Biometrics-based Data Link Layer Anonymous Authentication in VANETs.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

2012
Energy efficient ant colony algorithms for data aggregation in wireless sensor networks.
J. Comput. Syst. Sci., 2012

A Clustering K-Anonymity Scheme for Location Privacy Preservation.
IEICE Transactions, 2012

A Combined Clustering Scheme for Protecting Location Privacy and Query Privacy in Pervasive Environments.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Location Anonymity Based on Fake Queries in Continuous Location-Based Services.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Tree-based Multicast Key Management in ubiquitous computing environment.
IJAHUC, 2011

A Selfish Node Preventive Real Time Fault Tolerant Routing Protocol for WSNs.
Proceedings of the 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, 2011

2010
Dynamical Jumping Real-Time Fault-Tolerant Routing Protocol for Wireless Sensor Networks.
Sensors, 2010

A Clustering-Based Location Privacy Protection Scheme for Pervasive Computing.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010

1984
Matched Filters for Bin Picking.
IEEE Trans. Pattern Anal. Mach. Intell., 1984


  Loading...