Guohua Cui

According to our database1, Guohua Cui authored at least 45 papers between 2000 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Configuration selection for tip-over stability of a modular reconfigurable mobile manipulator under various application situations.
Robotica, March, 2023

The Rotor Position Study of Brushless DC Motors Without Position Sensors.
Proceedings of the 19th International Conference on Natural Computation, 2023

2022
Intelligent Machine Fault Diagnosis Using Convolutional Neural Networks and Transfer Learning.
IEEE Access, 2022

Distributed Multi-Attention Generative Adversarial Network for Surrounding Vehicles Trajectories Prediction Based On Comprehensive Social Repulsion.
IEEE Access, 2022

2021
Multipedestrian Online Tracking Based on Social Force-Predicted Deformable Key-Points Mapping via Compressive Sensing.
IEEE Syst. J., 2021

Research on a New Flexible Tactile Sensor for Detecting Vertical and Sliding Tactile Signals.
Proceedings of the Intelligent Robotics and Applications - 14th International Conference, 2021

Research on Robot Classifiable Grasp Detection Method Based on Convolutional Neural Network.
Proceedings of the Intelligent Robotics and Applications - 14th International Conference, 2021

Vibration Test and Analysis of a Six-Degree-of-Freedom Cooperative Robot Manipulator End.
Proceedings of the Intelligent Robotics and Applications - 14th International Conference, 2021

Fault Diagnosis of Rolling Bearing Based on Wavelet Packet and RBF Neural Network.
Proceedings of the 6th International Conference on Control, Robotics and Cybernetics, 2021

Design of Intelligent Grabbing System Based on ROS.
Proceedings of the 6th International Conference on Control, Robotics and Cybernetics, 2021

Comparative Study of Slam Algorithms for Mobile Robots in Complex Environment.
Proceedings of the 6th International Conference on Control, Robotics and Cybernetics, 2021

2020
Studies of grinding depth and Influential Factors for Concrete pipe Port-grinding robots.
Int. J. Robotics Autom., 2020

2019
Kinematic Performance Analysis of a cable-Driven redundant actuated Parallel manipulator.
Int. J. Robotics Autom., 2019

Kinematics simulation of 5-DOF parallel mechanisms.
Proceedings of the RICAI 2019: International Conference on Robotics, 2019

Cooperative Robot Grasping Based On Supervised Learning.
Proceedings of the RICAI 2019: International Conference on Robotics, 2019

Minimally Invasive Instrument Joint Design Based on Variable Stiffness of Transmission Efficiency.
Proceedings of the Intelligent Robotics and Applications - 12th International Conference, 2019

2018
Reliability Evaluation and Robust Design of a Sensor in an Entire Roller-Embedded Shapemeter.
Sensors, 2018

2014
A New Secure Authenticated Group Key Transfer Protocol.
Wirel. Pers. Commun., 2014

An Ideal Multi-secret Sharing Scheme Based on Connectivity of Graphs.
Wirel. Pers. Commun., 2014

On mitigating hotspots to maximize network lifetime in multi-hop wireless sensor network with guaranteed transport delay and reliability.
Peer-to-Peer Netw. Appl., 2014

Kinematics Dexterity Analysis and Optimization of 4-UPS-UPU Parallel Robot Manipulator.
Proceedings of the Intelligent Robotics and Applications - 7th International Conference, 2014

2013
Deployment guidelines for achieving maximum lifetime and avoiding energy holes in sensor network.
Inf. Sci., 2013

An Efficient Adaptive Anticollision Algorithm Based on 4-Ary Pruning Query Tree.
Int. J. Distributed Sens. Networks, 2013

2012
A novel Group Key Transfer Protocol.
IACR Cryptol. ePrint Arch., 2012

Efficient Fair Secure Two-Party Computation.
Proceedings of the 2012 IEEE Asia-Pacific Services Computing Conference, 2012

2011
A novel linear multi-secret sharing scheme for group communication in wireless mesh networks.
J. Netw. Comput. Appl., 2011

An Efficient Protocol for the Commit-Prove-Fair-Open functionality.
IACR Cryptol. ePrint Arch., 2011

2010
Secure Authentication Scheme based on IBE.
J. Networks, 2010

An Uncertainty Enhanced Trust Evolution Strategy for e-Science.
J. Comput. Sci. Technol., 2010

One-time encryption-key technique for the traditional DL-based encryption scheme with anonymity.
Inf. Sci., 2010

A more efficient accountable authority IBE scheme under the DL assumption.
Sci. China Inf. Sci., 2010

A Risk-Aware Resource Service Decision Strategy for Global Computing.
Proceedings of the Autonomic and Trusted Computing - 7th International Conference, 2010

2009
A Secure Hierarchical Identify Authentication Scheme Combining Trust Mechanism in Mobile IPv6 Networks.
J. Networks, 2009

Efficient and provably secure password-based group key agreement protocol.
Comput. Stand. Interfaces, 2009

A Risk-Aware Reputation Mechanism for Resource Sharing on Grids.
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009

2008
Cryptanalysis of an Improved Forward Secure Proxy Signature Scheme.
Proceedings of the PACIIA 2008, 2008

An Effective Congestion Avoidance Altering Routing Protocol in Sensor Networks.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

A Cluster Based Secure Cryptography for Sensor Networks.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
A Secure Data Transmission Protocol for Mobile Ad Hoc Networks.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2007

Scalable Group Key Management Protocol Based on Key Material Transmitting Tree.
Proceedings of the Information Security Practice and Experience, 2007

2006
A Hybrid Group Key Management Scheme for Two-Layered Ad Hoc Networks.
Proceedings of the 9th International Conference in Information Technology, 2006

2005
Secure Efficient Proxy Blind Signature Schemes Based DLP.
Proceedings of the 7th IEEE International Conference on E-Commerce Technology (CEC 2005), 2005

A fair e-cash payment scheme based on credit.
Proceedings of the 7th International Conference on Electronic Commerce, 2005

A proxy blind signature schemes based DLP and applying in e-voting.
Proceedings of the 7th International Conference on Electronic Commerce, 2005

2000
On a Session Key Compromise Problem in [KC95] protocol.
ACM SIGOPS Oper. Syst. Rev., 2000


  Loading...