Hanlin Zhang

Orcid: 0000-0001-8869-6863

According to our database1, Hanlin Zhang authored at least 101 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Eliminating Rogue Access Point Attacks in IoT: A Deep Learning Approach With Physical-Layer Feature Purification and Device Identification.
IEEE Internet Things J., April, 2024

Iterative Graph Self-Distillation.
IEEE Trans. Knowl. Data Eng., March, 2024

Dual Regression-Enhanced Gaze Target Detection in the Wild.
IEEE Trans. Cybern., January, 2024

Follow My Instruction and Spill the Beans: Scalable Data Extraction from Retrieval-Augmented Generation Systems.
CoRR, 2024

2023
A novel coalition game based distributed cooperative content caching in mobile edge networks.
Veh. Commun., December, 2023

Efficient, secure and verifiable outsourcing scheme for SVD-based collaborative filtering recommender system.
Future Gener. Comput. Syst., December, 2023

Component preserving laplacian eigenmaps for data reconstruction and dimensionality reduction.
Appl. Intell., December, 2023

Improving the transferability of adversarial examples via direction tuning.
Inf. Sci., November, 2023

A Deep-Reinforcement-Learning-Based Computation Offloading With Mobile Vehicles in Vehicular Edge Computing.
IEEE Internet Things J., September, 2023

Action density based frame sampling for human action recognition in videos.
J. Vis. Commun. Image Represent., February, 2023

Example query on ontology-labels knowledge graph based on filter-refine strategy.
World Wide Web (WWW), January, 2023

A verifiable and privacy-preserving framework for federated recommendation system.
J. Ambient Intell. Humaniz. Comput., 2023

Watermarks in the Sand: Impossibility of Strong Watermarking for Generative Models.
IACR Cryptol. ePrint Arch., 2023

A Study on the Calibration of In-context Learning.
CoRR, 2023

DeepHEN: quantitative prediction essential lncRNA genes and rethinking essentialities of lncRNA genes.
CoRR, 2023

Do the Rewards Justify the Means? Measuring Trade-Offs Between Rewards and Ethical Behavior in the MACHIAVELLI Benchmark.
CoRR, 2023

Fuzziness-tuned: Improving the Transferability of Adversarial Examples.
CoRR, 2023

Efficient Privacy-Preserving Multi-Functional Data Aggregation Scheme for Multi-Tier IoT System.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

Fatigue Detection Based on Multiple Visual Features in Virtual Driving System.
Proceedings of the 49th Annual Conference of the IEEE Industrial Electronics Society, 2023

Secure parallel Outsourcing Scheme for Large-scale Matrix Multiplication on Distributed Cloud Servers.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

Do the Rewards Justify the Means? Measuring Trade-Offs Between Rewards and Ethical Behavior in the Machiavelli Benchmark.
Proceedings of the International Conference on Machine Learning, 2023

SecureGAN: Secure Three-Party GAN Training.
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023

Towards Distributed Graph Representation Learning.
Proceedings of the Computer Supported Cooperative Work and Social Computing, 2023

Improved Logical Reasoning of Language Models via Differentiable Symbolic Programming.
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2023, 2023

2022
Factorizing Historical User Actions for Next-Day Purchase Prediction.
ACM Trans. Web, 2022

SPPS: A Search Pattern Privacy System for Approximate Shortest Distance Query of Encrypted Graphs in IIoT.
IEEE Trans. Syst. Man Cybern. Syst., 2022

Novel Secure Outsourcing of Modular Inversion for Arbitrary and Variable Modulus.
IEEE Trans. Serv. Comput., 2022

Machine Learning on Cloud With Blockchain: A Secure, Verifiable and Fair Approach to Outsource the Linear Regression.
IEEE Trans. Netw. Sci. Eng., 2022

Secure Edge-Aided Computations for Social Internet-of-Things Systems.
IEEE Trans. Comput. Soc. Syst., 2022

Vision-Based Gaze Estimation: A Review.
IEEE Trans. Cogn. Dev. Syst., 2022

A general hierarchical ensemble-learning framework for structural reliability analysis.
Reliab. Eng. Syst. Saf., 2022

An Improved Outsourcing Algorithm to Solve Quadratic Congruence Equations in Internet of Things.
IEEE Internet Things J., 2022

The Impact of Symbolic Representations on In-context Learning for Few-shot Reasoning.
CoRR, 2022

A Closer Look at the Calibration of Differentially Private Learners.
CoRR, 2022

FACM: Correct the Output of Deep Neural Network with Middle Layers Features against Adversarial Samples.
CoRR, 2022

Mask-Guided Divergence Loss Improves the Generalization and Robustness of Deep Neural Network.
CoRR, 2022

Enhancing the Transferability of Adversarial Examples via a Few Queries.
CoRR, 2022

Can Transformers be Strong Treatment Effect Estimators?
CoRR, 2022

Stochastic Neural Networks with Infinite Width are Deterministic.
CoRR, 2022

Privacy-Preserving and verifiable SRC-based face recognition with cloud/edge server assistance.
Comput. Secur., 2022

Privacy-Preserving cloud-Aided broad learning system.
Comput. Secur., 2022

A Novel Lyapunov based Dynamic Resource Allocation for UAVs-assisted Edge Computing.
Comput. Networks, 2022

An Efficient Vertex-Driven Temporal Graph Model and Subgraph Clustering Method.
IEEE Access, 2022

Robust Nonlinear Model Predictive Control for Ship Dynamic Positioning Using Laguerre Function.
IEEE Access, 2022

Toward learning human-aligned cross-domain robust models by countering misaligned features.
Proceedings of the Uncertainty in Artificial Intelligence, 2022

Privacy-Preserving and Verifiable Outsourcing Message Transmission and Authentication Protocol in IoT.
Proceedings of the IEEE International Conference on Trust, 2022

Outlier Constrained Unsupervised Domain Adaptation Algorithm for Gaze Estimation.
Proceedings of the Intelligent Robotics and Applications - 15th International Conference, 2022

A Coarse-to-Fine Human Visual Focus Estimation for ASD Toddlers in Early Screening.
Proceedings of the Intelligent Robotics and Applications - 15th International Conference, 2022

Multi-task Facial Landmark Detection Network for Early ASD Screening.
Proceedings of the Intelligent Robotics and Applications - 15th International Conference, 2022

MLPSI: Multi-party Privacy Set Intersection with Linear Complexity.
Proceedings of the 5th International Conference on Big Data Technologies, 2022

Towards Principled Disentanglement for Domain Generalization.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

2021
Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification.
IEEE Trans. Dependable Secur. Comput., 2021

Lattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations and basic countermeasures.
J. Comput. Syst. Sci., 2021

Blockchain-Aided Privacy-Preserving Outsourcing Algorithms of Bilinear Pairings for Internet of Things Devices.
IEEE Internet Things J., 2021

Secure Cloud-Aided Object Recognition on Hyperspectral Remote Sensing Images.
IEEE Internet Things J., 2021

Toward Learning Human-aligned Cross-domain Robust Models by Countering Misaligned Features.
CoRR, 2021

Learning Domain Invariant Representations for Generalizable Person Re-Identification.
CoRR, 2021

A novel Latency-Guaranteed based Resource Double Auction for market-oriented edge computing.
Comput. Networks, 2021

CrowdSJ: Skyline-Join Query Processing of Incomplete Datasets With Crowdsourcing.
IEEE Access, 2021

2020
An Edge Computing Based Public Vehicle System for Smart Transportation.
IEEE Trans. Veh. Technol., 2020

How to Securely Outsource Finding the Min-Cut of Undirected Edge-Weighted Graphs.
IEEE Trans. Inf. Forensics Secur., 2020

How to securely outsource the extended euclidean algorithm for large-scale polynomials over finite fields.
Inf. Sci., 2020

Blockchain-based two-party fair contract signing scheme.
Inf. Sci., 2020

Practical and Secure Outsourcing Algorithms for Solving Quadratic Congruences in Internet of Things.
IEEE Internet Things J., 2020

Efficient and Secure Outsourcing Scheme for RSA Decryption in Internet of Things.
IEEE Internet Things J., 2020

Privacy-Preserving and Distributed Algorithms for Modular Exponentiation in IoT With Edge Computing Assistance.
IEEE Internet Things J., 2020

A novel multitype-users welfare equilibrium based real-time pricing in smart grid.
Future Gener. Comput. Syst., 2020

Modelling Multi-Exit Large-Venue Pedestrian Evacuation With Dual-Strategy Adaptive Particle Swarm Optimization.
IEEE Access, 2020

Towards Interpretable Natural Language Understanding with Explanations as Latent Variables.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

Research on Reliability-Centered Maintenance Strategy of Container Terminal Shore Crane.
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020

The Research on Control and Dynamic Property of Autonomous Vehicle Adaptive Lidar System.
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020

2019
基于D-S证据理论的直觉模糊群决策信息集结方法 (Intuitionistic Fuzzy Group Decision Making Information Aggregation Method Based on D-S Evidence Theory).
计算机科学, 2019

Secure Outsourcing Algorithm for Signature Generation in Privacy-preserving Public Cloud Storage Auditing.
J. Inf. Sci. Eng., 2019

Practical and Secure Outsourcing Algorithms of Matrix Operations Based on a Novel Matrix Encryption Method.
IEEE Access, 2019

An Energy Scheduling Strategy With Priority Within Islanded Microgrids.
IEEE Access, 2019

Utility-Time Social Event Planning on EBSN.
Proceedings of the 20th IEEE International Conference on Mobile Data Management, 2019

Multi-level Container Checkpoint Performance Optimization Strategy in SDDC.
Proceedings of the 4th International Conference on Big Data and Computing, 2019

Secure Outsourcing Algorithm for Bilinear Pairings without Pre-Computation.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

2018
Intrusion-resilient identity-based signatures: Concrete scheme in the standard model and generic construction.
Inf. Sci., 2018

Enabling secure auditing and deduplicating data without owner-relationship exposure in cloud storage.
Clust. Comput., 2018

Cloud Storage for Electronic Health Records Based on Secret Sharing With Verifiable Reconstruction Outsourcing.
IEEE Access, 2018

Rapid Determination of Meat Moisture Content Using Radio-Frequency Dielectric Measurement.
IEEE Access, 2018

Enabling Efficient Verifiable Fuzzy Keyword Search Over Encrypted Data in Cloud Computing.
IEEE Access, 2018

A High-Performance Adaptive Strategy of Container Checkpoint Based on Pre-replication.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018

KPI Data Anomaly Detection Strategy for Intelligent Operation and Maintenance Under Cloud Environment.
Proceedings of the Intelligent Information Processing IX, 2018

Adaptive Anomaly Detection Strategy Based on Reinforcement Learning.
Proceedings of the Data Science, 2018

A Framework to Enable Multiple Coexisting Internet of Things Applications.
Proceedings of the 2018 International Conference on Computing, 2018

2017
How to securely outsource the inversion modulo a large composite number.
J. Syst. Softw., 2017

Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium.
J. Netw. Comput. Appl., 2017

A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications.
IEEE Internet Things J., 2017

Remote data possession checking with privacy-preserving authenticators for cloud storage.
Future Gener. Comput. Syst., 2017

2016
Nondestructive In Situ Measurement Method for Kernel Moisture Content in Corn Ear.
Sensors, 2016

A streaming-based network monitoring and threat detection system.
Proceedings of the 14th IEEE International Conference on Software Engineering Research, 2016

Ultra-Dense Networks: Survey of State of the Art and Future Directions.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

2015
A cloud computing based system for cyber security management.
Int. J. Parallel Emergent Distributed Syst., 2015

ScanMe mobile: a local and cloud hybrid service for analyzing APKs.
Proceedings of the 2015 Conference on research in adaptive and convergent systems, 2015

2013
On effective data aggregation techniques in host-based intrusion detection in MANET.
Int. J. Secur. Networks, 2013

UMPCA Based Feature Extraction for ECG.
Proceedings of the Advances in Neural Networks - ISNN 2013, 2013

On behavior-based detection of malware on Android platform.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

A 12-lead clinical ECG classification method based on Semi-supervised Discriminant Analysis.
Proceedings of the 6th International Conference on Biomedical Engineering and Informatics, 2013

2010
An Agent-based Optimization Approach for Distributed Project Scheduling in Supply Chain with Partial Information Sharing.
Proceedings of the ICAART 2010 - Proceedings of the International Conference on Agents and Artificial Intelligence, Volume 1, 2010


  Loading...