Hua Shen

According to our database1, Hua Shen authored at least 60 papers between 1999 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
A cloud-aided privacy-preserving multi-dimensional data comparison protocol.
Inf. Sci., 2021

A rotated characteristic decomposition technique for high-order reconstructions in multi-dimensions.
CoRR, 2021

A class of high-order weighted compact central schemes for solving hyperbolic conservation laws.
CoRR, 2021

Explaining the Road Not Taken.
CoRR, 2021

An alternative reconstruction for WENO schemes with adaptive order.
CoRR, 2021

Efficient and Privacy-Preserving Massive Data Processing for Smart Grids.
IEEE Access, 2021

2020
Blockchain-based fair payment smart contract for public cloud storage auditing.
Inf. Sci., 2020

An efficient aggregation scheme resisting on malicious data mining attacks for smart grid.
Inf. Sci., 2020

A Lightweight Privacy-Preserving Fair Meeting Location Determination Scheme.
IEEE Internet Things J., 2020

How Useful Are the Machine-Generated Interpretations to General Users? A Human Evaluation on Guessing the Incorrectly Predicted Labels.
CoRR, 2020

Interpretable Deep Learning under Fire.
Proceedings of the 29th USENIX Security Symposium, 2020

An in Vitro Circulatory Device for Studying Blood Flow Electrical Impedance in Human Common Carotid Arteries.
Proceedings of the 16th IEEE International Conference on Control & Automation, 2020

A Tale of Evil Twins: Adversarial Inputs versus Poisoned Models.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Effects of the arterial radius and the center-line velocity on the conductivity and electrical impedance of pulsatile flow in the human common carotid artery.
Medical Biol. Eng. Comput., 2019

A rezoning-free CESE scheme for solving the compressible Euler equations on moving unstructured meshes.
J. Comput. Phys., 2019

Provably Secure Proactive Secret Sharing Without the Adjacent Assumption.
Proceedings of the Provable Security, 2019

A Fair (t, n)-Threshold Secret Sharing Scheme with Efficient Cheater Identifying.
Proceedings of the Trust Management XIII - 13th IFIP WG 11.11 International Conference, 2019

Research on Cotton Information Extraction Based on Sentinel-2 Time Series Analysis.
Proceedings of the 8th International Conference on Agro-Geoinformatics, 2019

2018
Extension of CE/SE method to non-equilibrium dissociating flows.
J. Comput. Phys., 2018

Positivity-preserving CE/SE schemes for solving the compressible Euler and Navier-Stokes equations on hybrid unstructured meshes.
Comput. Phys. Commun., 2018

Interpretable Deep Learning under Fire.
CoRR, 2018

Consecutive Leakage-Resilient and Updatable Lossy Trapdoor Functions and Application in Sensitive Big-Data Environments.
IEEE Access, 2018

A Characteristic-Mode-Based Polarization-Reconfigurable Antenna and its Array.
IEEE Access, 2018

A Quantitative Analysis Decision System Based on Deep Learning and NSGA-II for FX Portfolio Prediction.
Proceedings of the Recent Trends and Future Technology in Applied Intelligence, 2018

Cloud-Based Data-Sharing Scheme Using Verifiable and CCA-Secure Re-encryption from Indistinguishability Obfuscation.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2017
Efficient Privacy-Preserving Cube-Data Aggregation Scheme for Smart Grids.
IEEE Trans. Inf. Forensics Secur., 2017

Efficiently Obfuscating Anonymous Re-encryption Functionality with Average-Case Virtual Black-Box Security.
J. Inf. Sci. Eng., 2017

Maximum-principle-satisfying space-time conservation element and solution element scheme applied to compressible multifluids.
J. Comput. Phys., 2017

Privacy-preserving Outsourcing Schemes of Modular Exponentiations Using Single Untrusted Cloud Server.
KSII Trans. Internet Inf. Syst., 2017

Discovering social spammers from multiple views.
Neurocomputing, 2017

Dynamic probabilistic shaping modulation based on fixed-to-fixed symbols projection constant composition distribution matching.
Proceedings of the 2017 International Symposium on Intelligent Signal Processing and Communication Systems, 2017

A Novel Construction and Design of Network Learning Platform in Cloud Computing Environment.
Proceedings of the Advances in Internetworking, 2017

2016
Sea Surface Height and Significant Wave Height Calibration Methodology by a GNSS Buoy Campaign for HY-2A Altimeter.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2016

A characteristic space-time conservation element and solution element method for conservation laws II. Multidimensional extension.
J. Comput. Phys., 2016

A Time Series Forecasting Model Based on Deep Learning Integrated Algorithm with Stacked Autoencoders and SVR for FX Prediction.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2016, 2016

2015
基于Petri网的Web服务组合验证方法 (Verification Methods Based on Petri Networks for Web Services Composition).
计算机科学, 2015

基于服务组合模型结构特征的性能瓶颈定位方案 (Performance Bottlenecks Location Scheme Based on Structural Features of Service Composition Model).
计算机科学, 2015

A characteristic space-time conservation element and solution element method for conservation laws.
J. Comput. Phys., 2015

Robust high-order space-time conservative schemes for solving conservation laws on hybrid meshes.
J. Comput. Phys., 2015

A regional ionospheric TEC mapping technique over China and adjacent areas: GNSS data processing and DINEOF analysis.
Sci. China Inf. Sci., 2015

Differential Trust Propagation with Community Discovery for Link-Based Web Spam Demotion.
Proceedings of the Web-Age Information Management - 16th International Conference, 2015

Emergency Decision Support Architectures for Bus Hijacking Based on Massive Image Anomaly Detection in Social Networks.
Proceedings of the 2015 IEEE International Conference on Systems, 2015

A Semi-Supervised Framework for Social Spammer Detection.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2015

A demonstration experiment of an new-generation airborne altimeter in-situ absolute calibration suite.
Proceedings of the 2015 IEEE International Geoscience and Remote Sensing Symposium, 2015

Program Obfuscator for Privacy-Carrying Unidirectional One-hop Re-encryption.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
Topical Influential User Analysis with Relationship Strength Estimation in Twitter.
Proceedings of the 2014 IEEE International Conference on Data Mining Workshops, 2014

Acute impact of upper and lower limb resistance training on common carotid arterial stiffness and local hemodynamics.
Proceedings of the 11th IEEE International Conference on Control & Automation, 2014

2013
Modeling and analysis of electric field and electrostatic adhesion force generated by interdigital electrodes for wall climbing robots.
Proceedings of the 2013 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2013

Design of a double-tracked wall climbing robot based on electrostatic adhesion mechanism.
Proceedings of the 2013 IEEE Workshop on Advanced Robotics and its Social Impacts, 2013

2012
A local space-time conservation scheme and its application in shock wave propagation.
Appl. Math. Comput., 2012

Modeling of attraction force generated by interdigital electrodes for electroadhesive robots.
Proceedings of the IEEE 10th International Conference on Industrial Informatics, 2012

The mechanical design of snake-arm robot.
Proceedings of the IEEE 10th International Conference on Industrial Informatics, 2012

Improved method of computer keyboard driver based on embedded linux.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012

2009
Controlled sequential factorial design for simulation factor screening.
Eur. J. Oper. Res., 2009

Hallucinating Faces by Interpolation and Principal Component Analysis.
Proceedings of the 2009 Second International Symposium on Computational Intelligence and Design, 2009

2008
A Stochastic Performance Model Supporting Time and Non-time QoS Matrices for Web Service Composition.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

2006
A hybrid method for simulation factor screening.
Proceedings of the Winter Simulation Conference WSC 2006, 2006

2003
Generic sign board detection in images.
Proceedings of the 5th ACM SIGMM International Workshop on Multimedia Information Retrieval, 2003

Quadrilateral Signboard Detection and Text Extraction.
Proceedings of the International Conference on Imaging Science, Systems and Technology, 2003

1999
(Ba, Sr)TiO3 dielectrics for future stacked- capacitor DRAM.
IBM J. Res. Dev., 1999


  Loading...