Hua Guo

According to our database1, Hua Guo authored at least 90 papers between 2002 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Downward cross-modal plasticity in single-sided deafness.
NeuroImage, 2019

Development of an Automatic Grinding System for Servo Valve Spool Throttling Edge.
Proceedings of the 16th International Conference on Ubiquitous Robots, 2019

Hierarchical Ontology Graph for Solving Semantic Issues in Decision Support Systems.
Proceedings of the 21st International Conference on Enterprise Information Systems, 2019

2018
A Secure Three-Factor Multiserver Authentication Protocol against the Honest-But-Curious Servers.
Wireless Communications and Mobile Computing, 2018

Dual-TRACER: High resolution fMRI with constrained evolution reconstruction.
NeuroImage, 2018

Relating Task Demand, Mental Effort and Task Difficulty with Physicians' Performance during Interactions with Electronic Health Records (EHRs).
Int. J. Hum. Comput. Interaction, 2018

Self-healing group key distribution protocol in wireless sensor networks for secure IoT communications.
Future Generation Comp. Syst., 2018

Multi-scale high order finite different reverse time migration imaging.
EURASIP J. Image and Video Processing, 2018

SGB-ELM: An Advanced Stochastic Gradient Boosting-Based Ensemble Scheme for Extreme Learning Machine.
Comp. Int. and Neurosc., 2018

Multi-Task Multi-View Learning Based on Cooperative Multi-Objective Optimization.
IEEE Access, 2018

Adaptive Backstepping Controller to Improve Handling Stability of Tractor-Aircraft System on Deck.
Proceedings of the 15th International Conference on Ubiquitous Robots, 2018

Development of a Performance Test Platform of Direct-Drive Servo Valve Linear Force Motor.
Proceedings of the 15th International Conference on Ubiquitous Robots, 2018

Super Slice Interpolation For Generating Thin-Slice Images From Multichannel Multislice MRI Data.
Proceedings of the 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2018

2017
Fauxvea: Crowdsourcing Gaze Location Estimates for Visualization Analysis Tasks.
IEEE Trans. Vis. Comput. Graph., 2017

Denoise diffusion-weighted images using higher-order singular value decomposition.
NeuroImage, 2017

Observer-Based Stabilization Control of Time-Delay T-S Fuzzy Systems via the Non-Uniform Delay Partitioning Approach.
Cognitive Computation, 2017

Real-time Task Scheduling for joint energy efficiency optimization in data centers.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

An Improved Authentication Scheme for the Integrated EPR Information System.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Visualizing Self-Tracked Mobile Sensor and Self-Reflection Data to Help Sleep Clinicians Infer Patterns.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

2016
On the Security of a Self-Healing Group Key Distribution Scheme.
Wireless Personal Communications, 2016

A Case Study Using Visualization Interaction Logs and Insight Metrics to Understand How Analysts Arrive at Insights.
IEEE Trans. Vis. Comput. Graph., 2016

Exponential Arithmetic Based Self-Healing Group Key Distribution Scheme with Backward Secrecy under the Resource-Constrained Wireless Networks.
Sensors, 2016

Improved multi-shot diffusion imaging using GRAPPA with a compact kernel.
NeuroImage, 2016

Development for arm reverse thrust characteristics test system of well radius measuring instrument.
Proceedings of the 13th International Conference on Ubiquitous Robots and Ambient Intelligence, 2016

2015
Representing Uncertainty in Graph Edges: An Evaluation of Paired Visual Variables.
IEEE Trans. Vis. Comput. Graph., 2015

A Note on an Improved Self-Healing Group Key Distribution Scheme.
Sensors, 2015

Self-feeding MUSE: A robust method for high resolution diffusion imaging using interleaved EPI.
NeuroImage, 2015

Transferable conditional e-cash with optimal anonymity in the standard model.
IET Information Security, 2015

Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme.
IACR Cryptology ePrint Archive, 2015

On the Security of a Self-healing Group Key Distribution Scheme.
IACR Cryptology ePrint Archive, 2015

Crowdsourcing from Scratch: A Pragmatic Experiment in Data Collection by Novice Requesters.
Proceedings of the Third AAAI Conference on Human Computation and Crowdsourcing, 2015

2014
Opportunistic Cooperative Reliable Transmission Protocol for Wireless Sensor Networks.
JNW, 2014

Weighted Semiparameter Model and Its Application.
J. Applied Mathematics, 2014

Fair Multiple-bank E-cash in the Standard Model.
IACR Cryptology ePrint Archive, 2014

Cloud manufacturing: a new manufacturing paradigm.
Enterprise IS, 2014

Affiliation-Hiding Authenticated Asymmetric Group Key Agreement Based on Short Signature.
Comput. J., 2014

Key-Exposure Protection in Public Auditing with User Revocation in Cloud Storage.
Proceedings of the Trusted Systems - 6th International Conference, 2014

An insight- and task-based methodology for evaluating spatiotemporal visual analytics.
Proceedings of the 2014 IEEE Conference on Visual Analytics Science and Technology, 2014

Experiments on a Parallel Nonlinear Jacobi-Davidson Algorithm.
Proceedings of the International Conference on Computational Science, 2014

Modeling and Mining Spatiotemporal Patterns of Infection Risk from Heterogeneous Data for Active Surveillance Planning.
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014

2013
New construction of affiliation-hiding authenticated group key agreement.
Security and Communication Networks, 2013

Efficient and dynamic key management for multiple identities in identity-based systems.
Inf. Sci., 2013

Performance of chemical shift-based water-fat separation with self-calibrated fat spectrum is sensitive to echo times.
I. J. Computational Biology and Drug Design, 2013

Optimally Anonymous and Transferable Conditional E-cash.
IACR Cryptology ePrint Archive, 2013

A large-scale nonlinear eigensolver for the analysis of dispersive nanostructures.
Computer Physics Communications, 2013

Cortical vessel imaging and visualization for image guided depth electrode insertion.
Comp. Med. Imag. and Graph., 2013

Ancestor Excludable Hierarchical ID-Based Encryption Revisited.
Proceedings of the Network and System Security - 7th International Conference, 2013

Iteratively refined nonlocal total variation regularization for Parallel variable density spiral imaging reconstruction.
Proceedings of the Ninth International Conference on Natural Computation, 2013

Efficient Divisible E-Cash in the Standard Model.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Nonlinear coil sensitivity estimation for parallel magnetic resonance imaging using data-adaptive steering kernel regression method.
Proceedings of the 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2013

Multiple-Bank E-Cash without Random Oracles.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

Toward a visual interface for brain connectivity analysis.
Proceedings of the 2013 ACM SIGCHI Conference on Human Factors in Computing Systems, 2013

2012
Different Strokes for Different Folks: Visual Presentation Design between Disciplines.
IEEE Trans. Vis. Comput. Graph., 2012

Modelling of combinable relationship-based composition service network and the theoretical proof of its scale-free characteristics.
Enterprise IS, 2012

Affiliation-Hiding Authenticated Asymmetric Group Key Agreement.
Comput. J., 2012

A provably secure authenticated key agreement protocol for wireless communications.
Computers & Electrical Engineering, 2012

Anonymous Transferable Conditional E-cash.
Proceedings of the Security and Privacy in Communication Networks, 2012

Incorporating GOMS analysis into the design of an EEG data visual analysis tool.
Proceedings of the 2012 IEEE Conference on Visual Analytics Science and Technology, 2012

2011
Authenticated key exchange protocol with selectable identities.
Wireless Communications and Mobile Computing, 2011

Inhibitor and Substrate Binding by Angiotensin-Converting Enzyme: Quantum Mechanical/Molecular Mechanical Molecular Dynamics Studies.
Journal of Chemical Information and Modeling, 2011

Provably secure identity-based authenticated key agreement protocols with malicious private key generators.
Inf. Sci., 2011

Characterizations of Bent and Almost Bent Function on \mathbbZp2.
Graphs and Combinatorics, 2011

Proof of a conjecture about rotation symmetric functions.
Discrete Mathematics, 2011

An efficient and non-interactive hierarchical key agreement protocol.
Computers & Security, 2011

An efficient dynamic authenticated key exchange protocol with selectable identities.
Computers & Mathematics with Applications, 2011

Composable correlation mining of cloud service in cloud manufacturing.
Proceedings of the 2011 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM), 2011

2010
Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security.
IJSN, 2010

Algorithms for Approximate Shortest Path Queries on Weighted Polyhedral Surfaces.
Discrete & Computational Geometry, 2010

2009
Microbubbles as a novel contrast agent for brain MRI.
NeuroImage, 2009

Novel and Efficient Identity-Based Authenticated Key Agreement Protocols from Weil Pairings.
Proceedings of the Ubiquitous Intelligence and Computing, 6th International Conference, 2009

Server-Controlled Identity-Based Authenticated Key Exchange.
Proceedings of the Provable Security, Third International Conference, 2009

An Efficient Certificateless Encryption Scheme in the Standard Model.
Proceedings of the Third International Conference on Network and System Security, 2009

2008
On the false-positive rate of Bloom filters.
Inf. Process. Lett., 2008

fficient and Provably Secure Generic Construction of Client-to-Client Password-Based Key Exchange Protocol.
Electr. Notes Theor. Comput. Sci., 2008

Cryptanalysis of simple three-party key exchange protocol.
Computers & Security, 2008

On perfect nonlinear functions (Pi).
Appl. Algebra Eng. Commun. Comput., 2008

Shortest Path Queries in Polygonal Domains.
Proceedings of the Algorithmic Aspects in Information and Management, 2008

2007
Shortest Path Queries Between Geometric Objects on Surfaces.
Proceedings of the Computational Science and Its Applications, 2007

2006
Correction for direction-dependent distortions in diffusion tensor imaging using matched magnetic field maps.
NeuroImage, 2006

Nonexistence of a Kind of Generalized Perfect Binary Array.
Proceedings of the Sequences and Their Applications, 2006

Approximate Shortest Path Queries on Weighted Polyhedral Surfaces.
Proceedings of the Mathematical Foundations of Computer Science 2006, 2006

Key Techniques of Software Sharing for on Demand Service-Oriented Computing.
Proceedings of the Advances in Grid and Pervasive Computing, 2006

Research on Software License Manager and Sharing System in Grid.
Proceedings of the Grid and Cooperative Computing Workshops, 2006

A Note of Perfect Nonlinear Functions.
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006

2005
Floating License Sharing System in Grid Environment.
Proceedings of the 2005 International Conference on Semantics, 2005

Construction of Overlay Network in P2P-based Resource Discovery Model in Grid Environment.
Proceedings of the 2005 International Conference on Semantics, 2005

The Campus Resource Management Based on Constellation Model in the ChinaGrid.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

A Constellation Resource Discovery Model Based on Scalable Multi-tape Universal Turing Machine.
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005

A Constellation Model for Grid Resource Management.
Proceedings of the Advanced Parallel Processing Technologies, 6th International Workshop, 2005

2002
Partitioning Planar Graphs with Costs and Weights.
Proceedings of the Algorithm Engineering and Experiments, 4th International Workshop, 2002


  Loading...