Donghua Huang

According to our database1, Donghua Huang authored at least 12 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Federated Learning with Class-Imbalanced Heterogeneous.
Proceedings of the 14th IEEE International Symposium on Parallel Architectures, 2023

FASTeller: A Hardware Partial Aggregator for Accurate Flow Counting in Cloud Networks.
Proceedings of the 31st IEEE International Conference on Network Protocols, 2023

2022
The distributed CERES-Maize model with crop parameters determined through data assimilation assists in regional irrigation schedule optimization.
Comput. Electron. Agric., 2022

2020
Design of a Humanoid Bipedal Robot Based on Kinematics and Dynamics Analysis of Human Lower Limbs.
Proceedings of the IEEE/ASME International Conference on Advanced Intelligent Mechatronics, 2020

2019
A High Completeness PoP Partition Algorithm for IP Geolocation.
IEEE Access, 2019

A Joint TDOA, FDOA and Doppler Rate Parameters Estimation Method and Its Performance Analysis.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

2017
Certificateless Hybrid Signcryption Scheme with Known Session-Specific Temporary Information Security.
Int. J. Netw. Secur., 2017

2015
3D face reconstruction from skull by regression modeling in shape parameter spaces.
Neurocomputing, 2015

2014
Craniofacial reconstruction based on multi-linear subspace analysis.
Multim. Tools Appl., 2014

2013
An Enhanced ECC Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices.
J. Softw., 2013

An Efficient Biometric Certificateless Signcryption Scheme.
J. Comput., 2013

2011
Face Reconstruction from Skull Based on Partial Least Squares Regression.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011


  Loading...