Hua Guo

Orcid: 0000-0002-0462-0827

According to our database1, Hua Guo authored at least 132 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Correction to: An Ostensive Information Architecture to Enhance Semantic Interoperability for Healthcare Information Systems.
Inf. Syst. Frontiers, April, 2024

An Ostensive Information Architecture to Enhance Semantic Interoperability for Healthcare Information Systems.
Inf. Syst. Frontiers, February, 2024

CWT-Based Magnetic Anomaly Data Denoising Method Combining Stochastic Resonance System and Pixel Connectivity Thresholding.
IEEE Trans. Instrum. Meas., 2024

Intelligent control strategy for industrial furnaces based on yield classification prediction using a gray relative correlation-convolutional neural network-multilayer perceptron (GCM) machine learning model.
PeerJ Comput. Sci., 2024

2023
Efficient Self-learning Evolutionary Neural Architecture Search.
Appl. Soft Comput., October, 2023

Real-Time Risk Detection Method and Protection Strategy for Intelligent Ship Network Security Based on Cloud Computing.
Symmetry, April, 2023

A novel two-factor multi-gateway authentication protocol for WSNs.
Ad Hoc Networks, March, 2023

Some New Methods to Generate Short Addition Chains.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

A Lightweight Authentication and Key Agreement Protocol for IoT-Enabled Smart Grid System.
Sensors, 2023

Research on knowledge representation and modeling of health management based on fuzzy ontology.
J. Intell. Fuzzy Syst., 2023

East: Efficient and Accurate Secure Transformer Framework for Inference.
CoRR, 2023

A New Method of Construction of Permutation Trinomials with Coefficients 1.
Proceedings of the 9th Intl Conference on Big Data Security on Cloud, 2023

2022
UWB indoor positioning optimization algorithm based on genetic annealing and clustering analysis.
Frontiers Neurorobotics, September, 2022

A Lightweight Mutual Authentication Protocol for IoT.
J. Commun. Inf. Networks, June, 2022

Investigating Neural Substrates of Individual Independence and Interdependence Orientations via Efficiency-Based Dynamic Functional Connectivity: A Machine Learning Approach.
IEEE Trans. Cogn. Dev. Syst., 2022

Cryptanalysis of a white-box SM4 implementation based on collision attack.
IET Inf. Secur., 2022

An Enhanced Belief Propagation Flipping Decoder for Polar Codes with Stepping Strategy.
Entropy, 2022

Some New Methods to Generate Short Addition Chains.
CoRR, 2022

Revenue and Expenditure Forecast and Cloud Audit Warning of Pension Insurance Fund for Urban Workers Based on Neural Network.
Proceedings of the 11th International Conference on Software and Information Engineering, 2022

Research on Improved DV-Hop Algorithm Based on Multiple Communication Radius and Hop Distance Correction.
Proceedings of the 2022 7th International Conference on Cloud Computing and Internet of Things, 2022

2021
A Secure Distance-Bounding Protocol with Mutual Authentication.
Secur. Commun. Networks, 2021

Case Studies on the Motivation and Performance of Contributors Who Verify and Maintain In-Flux Tabular Datasets.
Proc. ACM Hum. Comput. Interact., 2021

The divided brain: Functional brain asymmetry underlying self-construal.
NeuroImage, 2021

High-fidelity diffusion tensor imaging of the cervical spinal cord using point-spread-function encoded EPI.
NeuroImage, 2021

High-resolution whole-brain diffusion MRI at 3T using simultaneous multi-slab (SMSlab) acquisition.
NeuroImage, 2021

Widespread plasticity of cognition-related brain networks in single-sided deafness revealed by randomized window-based dynamic functional connectivity.
Medical Image Anal., 2021

A New Method of Construction of Permutation Trinomials with Coefficients 1.
CoRR, 2021

An Improved Tikhonov-Regularized Variable Projection Algorithm for Separable Nonlinear Least Squares.
Axioms, 2021

Lock Violation for Fault-tolerant Distributed Database System<sup>*</sup>.
Proceedings of the 37th IEEE International Conference on Data Engineering, 2021

2020
Topic-Based Exploration and Embedded Visualizations for Research Idea Generation.
IEEE Trans. Vis. Comput. Graph., 2020

Distortion correction of single-shot EPI enabled by deep-learning.
NeuroImage, 2020

Research on Indoor Wireless Positioning Precision Optimization Based on UWB "In Prepress".
J. Web Eng., 2020

A unified framework of identity-based sequential aggregate signatures from 2-level HIBE schemes.
Inf. Sci., 2020

Deep residual network for highly accelerated fMRI reconstruction using variable density spiral trajectory.
Neurocomputing, 2020

Dynamics Analysis of a Stochastic Hybrid Logistic Model with Delay and Two-Pulse Perturbations.
Complex., 2020

Digital Innovation and Transformation to Business Ecosystems.
Proceedings of the Enterprise Information Systems - 22nd International Conference, 2020

2019
Downward cross-modal plasticity in single-sided deafness.
NeuroImage, 2019

Toward Better Understanding of Task Difficulty during Physicians' Interaction with Electronic Health Record System (EHRs).
Int. J. Hum. Comput. Interact., 2019

Position-only synthesis of uniformly excited elliptical antenna arrays with minimum element spacing constraint.
EURASIP J. Wirel. Commun. Netw., 2019

Simulation and Experimental Study on gear Fault Diagnosis simulation Test Bench of wind Generator.
Mechatron. Syst. Control., 2019

A secure and efficient three-factor multi-gateway authentication protocol for wireless sensor networks.
Ad Hoc Networks, 2019

Development of an Automatic Grinding System for Servo Valve Spool Throttling Edge.
Proceedings of the 16th International Conference on Ubiquitous Robots, 2019

Hierarchical Ontology Graph for Solving Semantic Issues in Decision Support Systems.
Proceedings of the 21st International Conference on Enterprise Information Systems, 2019

2018
A Secure Three-Factor Multiserver Authentication Protocol against the Honest-But-Curious Servers.
Wirel. Commun. Mob. Comput., 2018

Dual-TRACER: High resolution fMRI with constrained evolution reconstruction.
NeuroImage, 2018

基于随机森林的文本分类并行化 (Parallel Text Categorization of Random Forest).
计算机科学, 2018

Relating Task Demand, Mental Effort and Task Difficulty with Physicians' Performance during Interactions with Electronic Health Records (EHRs).
Int. J. Hum. Comput. Interact., 2018

Application of a Computer-Assisted Instruction System Based on Constructivism.
Int. J. Emerg. Technol. Learn., 2018

Self-healing group key distribution protocol in wireless sensor networks for secure IoT communications.
Future Gener. Comput. Syst., 2018

Multi-scale high order finite different reverse time migration imaging.
EURASIP J. Image Video Process., 2018

SGB-ELM: An Advanced Stochastic Gradient Boosting-Based Ensemble Scheme for Extreme Learning Machine.
Comput. Intell. Neurosci., 2018

Multi-Task Multi-View Learning Based on Cooperative Multi-Objective Optimization.
IEEE Access, 2018

Adaptive Backstepping Controller to Improve Handling Stability of Tractor-Aircraft System on Deck.
Proceedings of the 15th International Conference on Ubiquitous Robots, 2018

Development of a Performance Test Platform of Direct-Drive Servo Valve Linear Force Motor.
Proceedings of the 15th International Conference on Ubiquitous Robots, 2018

Super Slice Interpolation For Generating Thin-Slice Images From Multichannel Multislice MRI Data.
Proceedings of the 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2018

2017
Fauxvea: Crowdsourcing Gaze Location Estimates for Visualization Analysis Tasks.
IEEE Trans. Vis. Comput. Graph., 2017

Denoise diffusion-weighted images using higher-order singular value decomposition.
NeuroImage, 2017

Observer-Based Stabilization Control of Time-Delay T-S Fuzzy Systems via the Non-Uniform Delay Partitioning Approach.
Cogn. Comput., 2017

Real-time Task Scheduling for joint energy efficiency optimization in data centers.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

An Improved Authentication Scheme for the Integrated EPR Information System.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Visualizing Self-Tracked Mobile Sensor and Self-Reflection Data to Help Sleep Clinicians Infer Patterns.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

2016
On the Security of a Self-Healing Group Key Distribution Scheme.
Wirel. Pers. Commun., 2016

A Case Study Using Visualization Interaction Logs and Insight Metrics to Understand How Analysts Arrive at Insights.
IEEE Trans. Vis. Comput. Graph., 2016

Exponential Arithmetic Based Self-Healing Group Key Distribution Scheme with Backward Secrecy under the Resource-Constrained Wireless Networks.
Sensors, 2016

Improved multi-shot diffusion imaging using GRAPPA with a compact kernel.
NeuroImage, 2016

Development for arm reverse thrust characteristics test system of well radius measuring instrument.
Proceedings of the 13th International Conference on Ubiquitous Robots and Ambient Intelligence, 2016

2015
Representing Uncertainty in Graph Edges: An Evaluation of Paired Visual Variables.
IEEE Trans. Vis. Comput. Graph., 2015

A Note on an Improved Self-Healing Group Key Distribution Scheme.
Sensors, 2015

Self-feeding MUSE: A robust method for high resolution diffusion imaging using interleaved EPI.
NeuroImage, 2015

Transferable conditional e-cash with optimal anonymity in the standard model.
IET Inf. Secur., 2015

Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme.
IACR Cryptol. ePrint Arch., 2015

Crowdsourcing from Scratch: A Pragmatic Experiment in Data Collection by Novice Requesters.
Proceedings of the Third AAAI Conference on Human Computation and Crowdsourcing, 2015

2014
Opportunistic Cooperative Reliable Transmission Protocol for Wireless Sensor Networks.
J. Networks, 2014

Weighted Semiparameter Model and Its Application.
J. Appl. Math., 2014

Fair Multiple-bank E-cash in the Standard Model.
IACR Cryptol. ePrint Arch., 2014

Cloud manufacturing: a new manufacturing paradigm.
Enterp. Inf. Syst., 2014

Affiliation-Hiding Authenticated Asymmetric Group Key Agreement Based on Short Signature.
Comput. J., 2014

Key-Exposure Protection in Public Auditing with User Revocation in Cloud Storage.
Proceedings of the Trusted Systems - 6th International Conference, 2014

An insight- and task-based methodology for evaluating spatiotemporal visual analytics.
Proceedings of the 9th IEEE Conference on Visual Analytics Science and Technology, 2014

Experiments on a Parallel Nonlinear Jacobi-Davidson Algorithm.
Proceedings of the International Conference on Computational Science, 2014

Modeling and Mining Spatiotemporal Patterns of Infection Risk from Heterogeneous Data for Active Surveillance Planning.
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014

2013
New construction of affiliation-hiding authenticated group key agreement.
Secur. Commun. Networks, 2013

Efficient and dynamic key management for multiple identities in identity-based systems.
Inf. Sci., 2013

Performance of chemical shift-based water-fat separation with self-calibrated fat spectrum is sensitive to echo times.
Int. J. Comput. Biol. Drug Des., 2013

Optimally Anonymous and Transferable Conditional E-cash.
IACR Cryptol. ePrint Arch., 2013

A large-scale nonlinear eigensolver for the analysis of dispersive nanostructures.
Comput. Phys. Commun., 2013

Cortical vessel imaging and visualization for image guided depth electrode insertion.
Comput. Medical Imaging Graph., 2013

Ancestor Excludable Hierarchical ID-Based Encryption Revisited.
Proceedings of the Network and System Security - 7th International Conference, 2013

Iteratively refined nonlocal total variation regularization for Parallel variable density spiral imaging reconstruction.
Proceedings of the Ninth International Conference on Natural Computation, 2013

Efficient Divisible E-Cash in the Standard Model.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Nonlinear coil sensitivity estimation for parallel magnetic resonance imaging using data-adaptive steering kernel regression method.
Proceedings of the 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2013

Multiple-Bank E-Cash without Random Oracles.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

Toward a visual interface for brain connectivity analysis.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013

2012
Different Strokes for Different Folks: Visual Presentation Design between Disciplines.
IEEE Trans. Vis. Comput. Graph., 2012

Modelling of combinable relationship-based composition service network and the theoretical proof of its scale-free characteristics.
Enterp. Inf. Syst., 2012

Affiliation-Hiding Authenticated Asymmetric Group Key Agreement.
Comput. J., 2012

A provably secure authenticated key agreement protocol for wireless communications.
Comput. Electr. Eng., 2012

Anonymous Transferable Conditional E-cash.
Proceedings of the Security and Privacy in Communication Networks, 2012

Incorporating GOMS analysis into the design of an EEG data visual analysis tool.
Proceedings of the 7th IEEE Conference on Visual Analytics Science and Technology, 2012

2011
Authenticated key exchange protocol with selectable identities.
Wirel. Commun. Mob. Comput., 2011

Inhibitor and Substrate Binding by Angiotensin-Converting Enzyme: Quantum Mechanical/Molecular Mechanical Molecular Dynamics Studies.
J. Chem. Inf. Model., 2011

Provably secure identity-based authenticated key agreement protocols with malicious private key generators.
Inf. Sci., 2011

Characterizations of Bent and Almost Bent Function on \mathbb<i>Z</i><sub><i>p</i></sub><sup>2</sup>.
Graphs Comb., 2011

Proof of a conjecture about rotation symmetric functions.
Discret. Math., 2011

An efficient and non-interactive hierarchical key agreement protocol.
Comput. Secur., 2011

An efficient dynamic authenticated key exchange protocol with selectable identities.
Comput. Math. Appl., 2011

Composable correlation mining of cloud service in cloud manufacturing.
Proceedings of the 2011 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM), 2011

2010
Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security.
Int. J. Secur. Networks, 2010

Algorithms for Approximate Shortest Path Queries on Weighted Polyhedral Surfaces.
Discret. Comput. Geom., 2010

Proof of a Conjecture about Rotation Symmetric Functions
CoRR, 2010

2009
Microbubbles as a novel contrast agent for brain MRI.
NeuroImage, 2009

Novel and Efficient Identity-Based Authenticated Key Agreement Protocols from Weil Pairings.
Proceedings of the Ubiquitous Intelligence and Computing, 6th International Conference, 2009

Server-Controlled Identity-Based Authenticated Key Exchange.
Proceedings of the Provable Security, Third International Conference, 2009

An Efficient Certificateless Encryption Scheme in the Standard Model.
Proceedings of the Third International Conference on Network and System Security, 2009

2008
On the false-positive rate of Bloom filters.
Inf. Process. Lett., 2008

fficient and Provably Secure Generic Construction of Client-to-Client Password-Based Key Exchange Protocol.
Proceedings of the First International Conference on Foundations of Informatics, 2008

Cryptanalysis of simple three-party key exchange protocol.
Comput. Secur., 2008

On perfect nonlinear functions (Pi).
Appl. Algebra Eng. Commun. Comput., 2008

Shortest Path Queries in Polygonal Domains.
Proceedings of the Algorithmic Aspects in Information and Management, 2008

2007
Shortest Path Queries Between Geometric Objects on Surfaces.
Proceedings of the Computational Science and Its Applications, 2007

2006
Correction for direction-dependent distortions in diffusion tensor imaging using matched magnetic field maps.
NeuroImage, 2006

Partitioning planar graphs with costs and weights.
ACM J. Exp. Algorithmics, 2006

Nonexistence of a Kind of Generalized Perfect Binary Array.
Proceedings of the Sequences and Their Applications, 2006

Approximate Shortest Path Queries on Weighted Polyhedral Surfaces.
Proceedings of the Mathematical Foundations of Computer Science 2006, 2006

Key Techniques of Software Sharing for on Demand Service-Oriented Computing.
Proceedings of the Advances in Grid and Pervasive Computing, 2006

Research on Software License Manager and Sharing System in Grid.
Proceedings of the Grid and Cooperative Computing Workshops, 2006

A Note of Perfect Nonlinear Functions.
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006

2005
Floating License Sharing System in Grid Environment.
Proceedings of the 2005 International Conference on Semantics, 2005

Construction of Overlay Network in P2P-based Resource Discovery Model in Grid Environment.
Proceedings of the 2005 International Conference on Semantics, 2005

The Campus Resource Management Based on Constellation Model in the ChinaGrid.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

A Constellation Resource Discovery Model Based on Scalable Multi-tape Universal Turing Machine.
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005

A Constellation Model for Grid Resource Management.
Proceedings of the Advanced Parallel Processing Technologies, 6th International Workshop, 2005


  Loading...