Debin Liu

Orcid: 0009-0006-8108-6951

According to our database1, Debin Liu authored at least 19 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Tensor-Empowered LSTM for Communication-Efficient and Privacy-Enhanced Cognitive Federated Learning in Intelligent Transportation Systems.
ACM Trans. Multim. Comput. Commun. Appl., February, 2024

2023
Tensor-Enabled Communication-Efficient and Trustworthy Federated Learning for Heterogeneous Intelligent Space-Air-Ground-Integrated IoT.
IEEE Internet Things J., 2023

Tensor-Empowered Federated Learning for Cyber-Physical-Social Computing and Communication Systems.
IEEE Commun. Surv. Tutorials, 2023

Plug-and-Play Multi-class Lane Detection Module.
Proceedings of the 2023 Workshop on Advanced Multimedia Computing for Smart Manufacturing and Engineering, 2023

2022
TT-TSVD: A Multi-modal Tensor Train Decomposition with Its Application in Convolutional Neural Networks for Smart Healthcare.
ACM Trans. Multim. Comput. Commun. Appl., 2022

A Tensor-Based Truthful Incentive Mechanism for Blockchain-Enabled Space-Air-Ground Integrated Vehicular Crowdsensing.
IEEE Trans. Intell. Transp. Syst., 2022

Lightweight Tensor Deep Computation Model With Its Application in Intelligent Transportation Systems.
IEEE Trans. Intell. Transp. Syst., 2022

2017
Combining convolutional neural network and self-adaptive algorithm to defeat synthetic multi-digit text-based CAPTCHA.
Proceedings of the IEEE International Conference on Industrial Technology, 2017

2014
Game Cross Efficiency for Systems with Two-Stage Structures.
J. Appl. Math., 2014

2012
Fuzzy data envelopment analysis models with assurance regions: A note.
Expert Syst. Appl., 2012

2011
Security Risk Management Using Incentives.
IEEE Secur. Priv., 2011

Beyond Risk-Based Access Control: Towards Incentive-Based Access Control.
Proceedings of the Financial Cryptography and Data Security, 2011

2010
Using Budget-Based Access Control to Manage Operational Risks Caused by Insiders.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2010

2009
Mitigating Inadvertent Insider Threats with Incentives.
Proceedings of the Financial Cryptography and Data Security, 2009

2008
Game-theoretic modeling and analysis of insider threats.
Int. J. Crit. Infrastructure Prot., 2008

2007
Mental Models of Computer Security Risks.
Proceedings of the 6th Annual Workshop on the Economics of Information Security, 2007

Mental Models of Security Risks.
Proceedings of the Financial Cryptography and Data Security, 2007

Phishing IQ Tests Measure Fear, Not Ability.
Proceedings of the Financial Cryptography and Data Security, 2007

2006
Proof of Work can Work.
Proceedings of the 5th Annual Workshop on the Economics of Information Security, 2006


  Loading...