Hua Guo

According to our database1, Hua Guo authored at least 103 papers between 2005 and 2020.

Collaborative distances:



In proceedings 
PhD thesis 




Topic-Based Exploration and Embedded Visualizations for Research Idea Generation.
IEEE Trans. Vis. Comput. Graph., 2020

Distortion correction of single-shot EPI enabled by deep-learning.
NeuroImage, 2020

Research on Indoor Wireless Positioning Precision Optimization Based on UWB "In Prepress".
J. Web Eng., 2020

A unified framework of identity-based sequential aggregate signatures from 2-level HIBE schemes.
Inf. Sci., 2020

Deep residual network for highly accelerated fMRI reconstruction using variable density spiral trajectory.
Neurocomputing, 2020

Dynamics Analysis of a Stochastic Hybrid Logistic Model with Delay and Two-Pulse Perturbations.
Complex., 2020

Digital Innovation and Transformation to Business Ecosystems.
Proceedings of the Enterprise Information Systems - 22nd International Conference, 2020

Downward cross-modal plasticity in single-sided deafness.
NeuroImage, 2019

Toward Better Understanding of Task Difficulty during Physicians' Interaction with Electronic Health Record System (EHRs).
Int. J. Hum. Comput. Interact., 2019

Position-only synthesis of uniformly excited elliptical antenna arrays with minimum element spacing constraint.
EURASIP J. Wirel. Commun. Netw., 2019

Simulation and Experimental Study on gear Fault Diagnosis simulation Test Bench of wind Generator.
Mechatron. Syst. Control., 2019

A secure and efficient three-factor multi-gateway authentication protocol for wireless sensor networks.
Ad Hoc Networks, 2019

Development of an Automatic Grinding System for Servo Valve Spool Throttling Edge.
Proceedings of the 16th International Conference on Ubiquitous Robots, 2019

Hierarchical Ontology Graph for Solving Semantic Issues in Decision Support Systems.
Proceedings of the 21st International Conference on Enterprise Information Systems, 2019

A Secure Three-Factor Multiserver Authentication Protocol against the Honest-But-Curious Servers.
Wirel. Commun. Mob. Comput., 2018

Dual-TRACER: High resolution fMRI with constrained evolution reconstruction.
NeuroImage, 2018

基于随机森林的文本分类并行化 (Parallel Text Categorization of Random Forest).
计算机科学, 2018

Relating Task Demand, Mental Effort and Task Difficulty with Physicians' Performance during Interactions with Electronic Health Records (EHRs).
Int. J. Hum. Comput. Interact., 2018

Application of a Computer-Assisted Instruction System Based on Constructivism.
iJET, 2018

Self-healing group key distribution protocol in wireless sensor networks for secure IoT communications.
Future Gener. Comput. Syst., 2018

Multi-scale high order finite different reverse time migration imaging.
EURASIP J. Image Video Process., 2018

SGB-ELM: An Advanced Stochastic Gradient Boosting-Based Ensemble Scheme for Extreme Learning Machine.
Comput. Intell. Neurosci., 2018

Multi-Task Multi-View Learning Based on Cooperative Multi-Objective Optimization.
IEEE Access, 2018

Adaptive Backstepping Controller to Improve Handling Stability of Tractor-Aircraft System on Deck.
Proceedings of the 15th International Conference on Ubiquitous Robots, 2018

Development of a Performance Test Platform of Direct-Drive Servo Valve Linear Force Motor.
Proceedings of the 15th International Conference on Ubiquitous Robots, 2018

Super Slice Interpolation For Generating Thin-Slice Images From Multichannel Multislice MRI Data.
Proceedings of the 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2018

Fauxvea: Crowdsourcing Gaze Location Estimates for Visualization Analysis Tasks.
IEEE Trans. Vis. Comput. Graph., 2017

Denoise diffusion-weighted images using higher-order singular value decomposition.
NeuroImage, 2017

Observer-Based Stabilization Control of Time-Delay T-S Fuzzy Systems via the Non-Uniform Delay Partitioning Approach.
Cogn. Comput., 2017

Real-time Task Scheduling for joint energy efficiency optimization in data centers.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

An Improved Authentication Scheme for the Integrated EPR Information System.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Visualizing Self-Tracked Mobile Sensor and Self-Reflection Data to Help Sleep Clinicians Infer Patterns.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

On the Security of a Self-Healing Group Key Distribution Scheme.
Wirel. Pers. Commun., 2016

A Case Study Using Visualization Interaction Logs and Insight Metrics to Understand How Analysts Arrive at Insights.
IEEE Trans. Vis. Comput. Graph., 2016

Exponential Arithmetic Based Self-Healing Group Key Distribution Scheme with Backward Secrecy under the Resource-Constrained Wireless Networks.
Sensors, 2016

Improved multi-shot diffusion imaging using GRAPPA with a compact kernel.
NeuroImage, 2016

Development for arm reverse thrust characteristics test system of well radius measuring instrument.
Proceedings of the 13th International Conference on Ubiquitous Robots and Ambient Intelligence, 2016

Representing Uncertainty in Graph Edges: An Evaluation of Paired Visual Variables.
IEEE Trans. Vis. Comput. Graph., 2015

A Note on an Improved Self-Healing Group Key Distribution Scheme.
Sensors, 2015

Self-feeding MUSE: A robust method for high resolution diffusion imaging using interleaved EPI.
NeuroImage, 2015

Transferable conditional e-cash with optimal anonymity in the standard model.
IET Inf. Secur., 2015

Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme.
IACR Cryptol. ePrint Arch., 2015

Crowdsourcing from Scratch: A Pragmatic Experiment in Data Collection by Novice Requesters.
Proceedings of the Third AAAI Conference on Human Computation and Crowdsourcing, 2015

Opportunistic Cooperative Reliable Transmission Protocol for Wireless Sensor Networks.
J. Networks, 2014

Weighted Semiparameter Model and Its Application.
J. Appl. Math., 2014

Fair Multiple-bank E-cash in the Standard Model.
IACR Cryptol. ePrint Arch., 2014

Cloud manufacturing: a new manufacturing paradigm.
Enterp. Inf. Syst., 2014

Affiliation-Hiding Authenticated Asymmetric Group Key Agreement Based on Short Signature.
Comput. J., 2014

Key-Exposure Protection in Public Auditing with User Revocation in Cloud Storage.
Proceedings of the Trusted Systems - 6th International Conference, 2014

An insight- and task-based methodology for evaluating spatiotemporal visual analytics.
Proceedings of the 9th IEEE Conference on Visual Analytics Science and Technology, 2014

Experiments on a Parallel Nonlinear Jacobi-Davidson Algorithm.
Proceedings of the International Conference on Computational Science, 2014

Modeling and Mining Spatiotemporal Patterns of Infection Risk from Heterogeneous Data for Active Surveillance Planning.
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014

New construction of affiliation-hiding authenticated group key agreement.
Secur. Commun. Networks, 2013

Efficient and dynamic key management for multiple identities in identity-based systems.
Inf. Sci., 2013

Performance of chemical shift-based water-fat separation with self-calibrated fat spectrum is sensitive to echo times.
Int. J. Comput. Biol. Drug Des., 2013

Optimally Anonymous and Transferable Conditional E-cash.
IACR Cryptol. ePrint Arch., 2013

A large-scale nonlinear eigensolver for the analysis of dispersive nanostructures.
Comput. Phys. Commun., 2013

Cortical vessel imaging and visualization for image guided depth electrode insertion.
Comput. Medical Imaging Graph., 2013

Ancestor Excludable Hierarchical ID-Based Encryption Revisited.
Proceedings of the Network and System Security - 7th International Conference, 2013

Iteratively refined nonlocal total variation regularization for Parallel variable density spiral imaging reconstruction.
Proceedings of the Ninth International Conference on Natural Computation, 2013

Efficient Divisible E-Cash in the Standard Model.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Nonlinear coil sensitivity estimation for parallel magnetic resonance imaging using data-adaptive steering kernel regression method.
Proceedings of the 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2013

Multiple-Bank E-Cash without Random Oracles.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

Toward a visual interface for brain connectivity analysis.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013

Different Strokes for Different Folks: Visual Presentation Design between Disciplines.
IEEE Trans. Vis. Comput. Graph., 2012

Modelling of combinable relationship-based composition service network and the theoretical proof of its scale-free characteristics.
Enterp. Inf. Syst., 2012

Affiliation-Hiding Authenticated Asymmetric Group Key Agreement.
Comput. J., 2012

A provably secure authenticated key agreement protocol for wireless communications.
Comput. Electr. Eng., 2012

Anonymous Transferable Conditional E-cash.
Proceedings of the Security and Privacy in Communication Networks, 2012

Incorporating GOMS analysis into the design of an EEG data visual analysis tool.
Proceedings of the 7th IEEE Conference on Visual Analytics Science and Technology, 2012

Authenticated key exchange protocol with selectable identities.
Wirel. Commun. Mob. Comput., 2011

Inhibitor and Substrate Binding by Angiotensin-Converting Enzyme: Quantum Mechanical/Molecular Mechanical Molecular Dynamics Studies.
J. Chem. Inf. Model., 2011

Provably secure identity-based authenticated key agreement protocols with malicious private key generators.
Inf. Sci., 2011

Characterizations of Bent and Almost Bent Function on \mathbb<i>Z</i><sub><i>p</i></sub><sup>2</sup>.
Graphs Comb., 2011

Proof of a conjecture about rotation symmetric functions.
Discret. Math., 2011

An efficient and non-interactive hierarchical key agreement protocol.
Comput. Secur., 2011

An efficient dynamic authenticated key exchange protocol with selectable identities.
Comput. Math. Appl., 2011

Composable correlation mining of cloud service in cloud manufacturing.
Proceedings of the 2011 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM), 2011

Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security.
Int. J. Secur. Networks, 2010

Algorithms for Approximate Shortest Path Queries on Weighted Polyhedral Surfaces.
Discret. Comput. Geom., 2010

Proof of a Conjecture about Rotation Symmetric Functions
CoRR, 2010

Microbubbles as a novel contrast agent for brain MRI.
NeuroImage, 2009

Novel and Efficient Identity-Based Authenticated Key Agreement Protocols from Weil Pairings.
Proceedings of the Ubiquitous Intelligence and Computing, 6th International Conference, 2009

Server-Controlled Identity-Based Authenticated Key Exchange.
Proceedings of the Provable Security, Third International Conference, 2009

An Efficient Certificateless Encryption Scheme in the Standard Model.
Proceedings of the Third International Conference on Network and System Security, 2009

On the false-positive rate of Bloom filters.
Inf. Process. Lett., 2008

fficient and Provably Secure Generic Construction of Client-to-Client Password-Based Key Exchange Protocol.
Electron. Notes Theor. Comput. Sci., 2008

Cryptanalysis of simple three-party key exchange protocol.
Comput. Secur., 2008

On perfect nonlinear functions (Pi).
Appl. Algebra Eng. Commun. Comput., 2008

Shortest Path Queries in Polygonal Domains.
Proceedings of the Algorithmic Aspects in Information and Management, 2008

Shortest Path Queries Between Geometric Objects on Surfaces.
Proceedings of the Computational Science and Its Applications, 2007

Correction for direction-dependent distortions in diffusion tensor imaging using matched magnetic field maps.
NeuroImage, 2006

Partitioning planar graphs with costs and weights.
ACM J. Exp. Algorithmics, 2006

Nonexistence of a Kind of Generalized Perfect Binary Array.
Proceedings of the Sequences and Their Applications, 2006

Approximate Shortest Path Queries on Weighted Polyhedral Surfaces.
Proceedings of the Mathematical Foundations of Computer Science 2006, 2006

Key Techniques of Software Sharing for on Demand Service-Oriented Computing.
Proceedings of the Advances in Grid and Pervasive Computing, 2006

Research on Software License Manager and Sharing System in Grid.
Proceedings of the Grid and Cooperative Computing Workshops, 2006

A Note of Perfect Nonlinear Functions.
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006

Floating License Sharing System in Grid Environment.
Proceedings of the 2005 International Conference on Semantics, 2005

Construction of Overlay Network in P2P-based Resource Discovery Model in Grid Environment.
Proceedings of the 2005 International Conference on Semantics, 2005

The Campus Resource Management Based on Constellation Model in the ChinaGrid.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

A Constellation Resource Discovery Model Based on Scalable Multi-tape Universal Turing Machine.
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005

A Constellation Model for Grid Resource Management.
Proceedings of the Advanced Parallel Processing Technologies, 6th International Workshop, 2005