Hua Shen

Orcid: 0000-0002-4928-525X

According to our database1, Hua Shen authored at least 99 papers between 1999 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
L-Net: A lightweight convolutional neural network for devices with low computing power.
Inf. Sci., March, 2024

Traceable and Privacy-Preserving Authentication Scheme for Energy Trading in V2G Networks.
IEEE Internet Things J., February, 2024

APLDP: Adaptive personalized local differential privacy data collection in mobile crowdsensing.
Comput. Secur., January, 2024

A Design Space for Intelligent and Interactive Writing Assistants.
CoRR, 2024

2023
A Privacy-Preserving Trajectory Publishing Method Based on Multi-Dimensional Sub-Trajectory Similarities.
Sensors, December, 2023

Data release for machine learning via correlated differential privacy.
Inf. Process. Manag., May, 2023

Data-Matching-Based Privacy-Preserving Statistics and Its Applications in Digital Publishing Industry.
IEEE Trans. Serv. Comput., 2023

A Privacy-Preserving and Verifiable Statistical Analysis Scheme for an E-Commerce Platform.
IEEE Trans. Inf. Forensics Secur., 2023

Geranos: a Novel Tilted-Rotors Aerial Robot for the Transportation of Poles.
CoRR, 2023

An efficient class of increasingly high-order ENO schemes with multi-resolution.
CoRR, 2023

HypoCompass: Large-Language-Model-based Tutor for Hypothesis Construction in Debugging for Novices.
CoRR, 2023

Gentopia: A Collaborative Platform for Tool-Augmented LLMs.
CoRR, 2023

Understanding Individual and Team-based Human Factors in Detecting Deepfake Texts.
CoRR, 2023

Parachute: Evaluating Interactive Human-LM Co-writing Systems.
CoRR, 2023

SpeechPrompt v2: Prompt Tuning for Speech Classification Tasks.
CoRR, 2023

Multi-Keywords Searchable Attribute-Based Encryption With Verification and Attribute Revocation Over Cloud Data.
IEEE Access, 2023

Enhancing Diagnosis Prediction in Healthcare With Knowledge-Based Recurrent Neural Networks.
IEEE Access, 2023

A Privacy-Preserving Takeaway Delivery Service Scheme.
Proceedings of the Provable and Practical Security, 2023

An Efficient Keyword-Based Ciphertext Retrieval Scheme.
Proceedings of the Provable and Practical Security, 2023

ScatterShot: Interactive In-context Example Curation for Text Transformation.
Proceedings of the 28th International Conference on Intelligent User Interfaces, 2023

Gentopia.AI: A Collaborative Platform for Tool-Augmented LLMs.
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023

MultiTurnCleanup: A Benchmark for Multi-Turn Spoken Conversational Transcript Cleanup.
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023

ConvXAI : Delivering Heterogeneous AI Explanations via Conversations to Support Human-AI Scientific Writing.
Proceedings of the Computer Supported Cooperative Work and Social Computing, 2023

2022
A Distributed and Privacy-Preserving Random Forest Evaluation Scheme with Fine Grained Access Control.
Symmetry, 2022

Comparative Study of the Es Layer between the Plateau and Plain Regions in China.
Remote. Sens., 2022

Winter Wheat SPAD Value Inversion Based on Multiple Pretreatment Methods.
Remote. Sens., 2022

A class of high-order weighted compact central schemes for solving hyperbolic conservation laws.
J. Comput. Phys., 2022

Too Slow to Be Useful? On Incorporating Humans in the Loop of Smart Speakers.
CoRR, 2022

Social Spammer Detection via Convex Nonnegative Matrix Factorization.
IEEE Access, 2022

Identify, Guess and Reconstruct: Three Principles for Cloud Removal Task.
Proceedings of the IEEE International Conference on Visual Communications and Image Processing, 2022

Improving Fairness in Speaker Verification via Group-Adapted Fusion Network.
Proceedings of the IEEE International Conference on Acoustics, 2022

A Universal Lightweight Privacy-Preserving Multifunctional Data Handling Scheme.
Proceedings of the Frontiers in Cyber Security - 5th International Conference, 2022

A Multi-task Mobile Crowdsensing Scheme with Conditional Privacy Preserving for Vehicle Networks.
Proceedings of the Emerging Information Security and Applications, 2022

Are Shortest Rationales the Best Explanations for Human Understanding?
Proceedings of the 60th Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers), 2022

2021
A Rotated Characteristic Decomposition Technique for High-Order Reconstructions in Multi-dimensions.
J. Sci. Comput., 2021

A cloud-aided privacy-preserving multi-dimensional data comparison protocol.
Inf. Sci., 2021

A class of ENO schemes with adaptive order for solving hyperbolic conservation laws.
CoRR, 2021

A class of high-order weighted compact central schemes for solving hyperbolic conservation laws.
CoRR, 2021

Explaining the Road Not Taken.
CoRR, 2021

An alternative reconstruction for WENO schemes with adaptive order.
CoRR, 2021

Efficient and Privacy-Preserving Massive Data Processing for Smart Grids.
IEEE Access, 2021

A Federated Learning Assisted Conditional Privacy Preserving Scheme for Vehicle Networks.
Proceedings of the Cyberspace Safety and Security - 13th International Symposium, 2021

Are Learners Satisfied with Their MOOC Experiences? Assessing and Improving Online Learners' Interactions.
Proceedings of the AsianCHI '21: 5th Asian CHI Symposium, 2021

2020
Blockchain-based fair payment smart contract for public cloud storage auditing.
Inf. Sci., 2020

An efficient aggregation scheme resisting on malicious data mining attacks for smart grid.
Inf. Sci., 2020

A Lightweight Privacy-Preserving Fair Meeting Location Determination Scheme.
IEEE Internet Things J., 2020

Interpretable Deep Learning under Fire.
Proceedings of the 29th USENIX Security Symposium, 2020

An in Vitro Circulatory Device for Studying Blood Flow Electrical Impedance in Human Common Carotid Arteries.
Proceedings of the 16th IEEE International Conference on Control & Automation, 2020

How Useful Are the Machine-Generated Interpretations to General Users? A Human Evaluation on Guessing the Incorrectly Predicted Labels.
Proceedings of the Eighth AAAI Conference on Human Computation and Crowdsourcing, 2020

A Tale of Evil Twins: Adversarial Inputs versus Poisoned Models.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Effects of the arterial radius and the center-line velocity on the conductivity and electrical impedance of pulsatile flow in the human common carotid artery.
Medical Biol. Eng. Comput., 2019

A rezoning-free CESE scheme for solving the compressible Euler equations on moving unstructured meshes.
J. Comput. Phys., 2019

Provably Secure Proactive Secret Sharing Without the Adjacent Assumption.
Proceedings of the Provable Security, 2019

A Fair (t, n)-Threshold Secret Sharing Scheme with Efficient Cheater Identifying.
Proceedings of the Trust Management XIII - 13th IFIP WG 11.11 International Conference, 2019

Research on Cotton Information Extraction Based on Sentinel-2 Time Series Analysis.
Proceedings of the 8th International Conference on Agro-Geoinformatics, 2019

2018
Extension of CE/SE method to non-equilibrium dissociating flows.
J. Comput. Phys., 2018

Positivity-preserving CE/SE schemes for solving the compressible Euler and Navier-Stokes equations on hybrid unstructured meshes.
Comput. Phys. Commun., 2018

Interpretable Deep Learning under Fire.
CoRR, 2018

Consecutive Leakage-Resilient and Updatable Lossy Trapdoor Functions and Application in Sensitive Big-Data Environments.
IEEE Access, 2018

A Characteristic-Mode-Based Polarization-Reconfigurable Antenna and its Array.
IEEE Access, 2018

A Quantitative Analysis Decision System Based on Deep Learning and NSGA-II for FX Portfolio Prediction.
Proceedings of the Recent Trends and Future Technology in Applied Intelligence, 2018

Cloud-Based Data-Sharing Scheme Using Verifiable and CCA-Secure Re-encryption from Indistinguishability Obfuscation.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2017
Efficient Privacy-Preserving Cube-Data Aggregation Scheme for Smart Grids.
IEEE Trans. Inf. Forensics Secur., 2017

Efficiently Obfuscating Anonymous Re-encryption Functionality with Average-Case Virtual Black-Box Security.
J. Inf. Sci. Eng., 2017

Maximum-principle-satisfying space-time conservation element and solution element scheme applied to compressible multifluids.
J. Comput. Phys., 2017

Privacy-preserving Outsourcing Schemes of Modular Exponentiations Using Single Untrusted Cloud Server.
KSII Trans. Internet Inf. Syst., 2017

Discovering social spammers from multiple views.
Neurocomputing, 2017

Dynamic probabilistic shaping modulation based on fixed-to-fixed symbols projection constant composition distribution matching.
Proceedings of the 2017 International Symposium on Intelligent Signal Processing and Communication Systems, 2017

A Novel Construction and Design of Network Learning Platform in Cloud Computing Environment.
Proceedings of the Advances in Internetworking, 2017

2016
Sea Surface Height and Significant Wave Height Calibration Methodology by a GNSS Buoy Campaign for HY-2A Altimeter.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2016

A characteristic space-time conservation element and solution element method for conservation laws II. Multidimensional extension.
J. Comput. Phys., 2016

Trajectory Prediction Based on Improved Sliding Window Polynomial Fitting Prediction Method.
Proceedings of the 9th International Symposium on Computational Intelligence and Design, 2016

Research on Real-Time Flight Path Planning of UAV Based on Grey Prediction.
Proceedings of the 9th International Symposium on Computational Intelligence and Design, 2016

A Time Series Forecasting Model Based on Deep Learning Integrated Algorithm with Stacked Autoencoders and SVR for FX Prediction.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2016, 2016

2015
基于Petri网的Web服务组合验证方法 (Verification Methods Based on Petri Networks for Web Services Composition).
计算机科学, 2015

基于服务组合模型结构特征的性能瓶颈定位方案 (Performance Bottlenecks Location Scheme Based on Structural Features of Service Composition Model).
计算机科学, 2015

A characteristic space-time conservation element and solution element method for conservation laws.
J. Comput. Phys., 2015

Robust high-order space-time conservative schemes for solving conservation laws on hybrid meshes.
J. Comput. Phys., 2015

A regional ionospheric TEC mapping technique over China and adjacent areas: GNSS data processing and DINEOF analysis.
Sci. China Inf. Sci., 2015

Differential Trust Propagation with Community Discovery for Link-Based Web Spam Demotion.
Proceedings of the Web-Age Information Management - 16th International Conference, 2015

Emergency Decision Support Architectures for Bus Hijacking Based on Massive Image Anomaly Detection in Social Networks.
Proceedings of the 2015 IEEE International Conference on Systems, 2015

A Semi-Supervised Framework for Social Spammer Detection.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2015

A demonstration experiment of an new-generation airborne altimeter in-situ absolute calibration suite.
Proceedings of the 2015 IEEE International Geoscience and Remote Sensing Symposium, 2015

Program Obfuscator for Privacy-Carrying Unidirectional One-hop Re-encryption.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
Topical Influential User Analysis with Relationship Strength Estimation in Twitter.
Proceedings of the 2014 IEEE International Conference on Data Mining Workshops, 2014

Acute impact of upper and lower limb resistance training on common carotid arterial stiffness and local hemodynamics.
Proceedings of the 11th IEEE International Conference on Control & Automation, 2014

2013
Modeling and analysis of electric field and electrostatic adhesion force generated by interdigital electrodes for wall climbing robots.
Proceedings of the 2013 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2013

Design of a double-tracked wall climbing robot based on electrostatic adhesion mechanism.
Proceedings of the 2013 IEEE Workshop on Advanced Robotics and its Social Impacts, 2013

2012
A local space-time conservation scheme and its application in shock wave propagation.
Appl. Math. Comput., 2012

Modeling of attraction force generated by interdigital electrodes for electroadhesive robots.
Proceedings of the IEEE 10th International Conference on Industrial Informatics, 2012

The mechanical design of snake-arm robot.
Proceedings of the IEEE 10th International Conference on Industrial Informatics, 2012

Improved method of computer keyboard driver based on embedded linux.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012

2009
Controlled sequential factorial design for simulation factor screening.
Eur. J. Oper. Res., 2009

Hallucinating Faces by Interpolation and Principal Component Analysis.
Proceedings of the 2009 Second International Symposium on Computational Intelligence and Design, 2009

2008
A Stochastic Performance Model Supporting Time and Non-time QoS Matrices for Web Service Composition.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

2006
A hybrid method for simulation factor screening.
Proceedings of the Winter Simulation Conference WSC 2006, 2006

2003
Generic sign board detection in images.
Proceedings of the 5th ACM SIGMM International Workshop on Multimedia Information Retrieval, 2003

Quadrilateral Signboard Detection and Text Extraction.
Proceedings of the International Conference on Imaging Science, Systems and Technology, 2003

1999
(Ba, Sr)TiO3 dielectrics for future stacked- capacitor DRAM.
IBM J. Res. Dev., 1999


  Loading...