Huamin Feng

Orcid: 0000-0003-4893-7540

According to our database1, Huamin Feng authored at least 40 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Alleviating Structural Distribution Shift in Graph Anomaly Detection.
CoRR, 2024

2023
An orderly quantum multi-signature based on orthogonal product states for the multi-party transaction blockchain.
Quantum Inf. Process., November, 2023

PriRPT: Practical blockchain-based privacy-preserving reporting system with rewards.
J. Syst. Archit., October, 2023

SED-SGC: A scalable, efficient, and distributed secure group communication scheme based on superlattice PUF.
Comput. Networks, September, 2023

Rumor detection with self-supervised learning on texts and social graph.
Frontiers Comput. Sci., August, 2023

Non-transferable blockchain-based identity authentication.
Peer Peer Netw. Appl., May, 2023

Survey of Technology in Network Security Situation Awareness.
Sensors, March, 2023

Threshold Attribute-Based Credentials With Redactable Signature.
IEEE Trans. Serv. Comput., 2023

Lossless Reversible Data Hiding in Encrypted Image for Multiple Data Hiders Based on Pixel Value Order and Secret Sharing.
Sensors, 2023

A Secure Secret Key Agreement Scheme among Multiple Twinning Superlattice PUF Holders.
Sensors, 2023

Addressing Heterophily in Graph Anomaly Detection: A Perspective of Graph Spectrum.
Proceedings of the ACM Web Conference 2023, 2023

Alleviating Structural Distribution Shift in Graph Anomaly Detection.
Proceedings of the Sixteenth ACM International Conference on Web Search and Data Mining, 2023

2022
Poison Ink: Robust and Invisible Backdoor Attack.
IEEE Trans. Image Process., 2022

Quantum zero correlation linear cryptanalysis.
Quantum Inf. Process., 2022

Deep Model Intellectual Property Protection via Deep Watermarking.
IEEE Trans. Pattern Anal. Mach. Intell., 2022

Chaotic analysis and entropy estimation of the entropy source based on semiconductor superlattice chaos.
Microelectron. J., 2022

TIM: threat context-enhanced TTP intelligence mining on unstructured threat data.
Cybersecur., 2022

Spear Phishing Email Detection with Multiple Reputation Features and Sample Enhancement.
Proceedings of the Science of Cyber Security - 4th International Conference, 2022

TI-Prompt: Towards a Prompt Tuning Method for Few-shot Threat Intelligence Twitter Classification<sup>*</sup>.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

2021
Temporal ROI Align for Video Object Recognition.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Reversible Watermarking in Deep Convolutional Neural Networks for Integrity Authentication.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

2017
Side-Channel Attacks Based on Collaborative Learning.
Proceedings of the Data Science, 2017

2015
基于CPK的虚拟桌面系统认证方法研究 (Research on Virtual Desktop System Authentication Method Based on CPK).
计算机科学, 2015

2011
A Spam Filtering Method Based on Multi-modal Features Fusion.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2007
A Question Understanding Model Based on Knowledge Points for Chinese Question Answering Service in E-Learning.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

Towards Describing Multi-fractality of Traffic Using Local Hurst Function.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

Generating Traffic Time Series Based on Generalized Cauchy Process.
Proceedings of the Computational Science, 2007

A Novel Description of Multifractal Phenomenon of Network Traffic Based on Generalized Cauchy Process.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

2006
Web-Based Semantic Analysis of Chinese News Video.
Proceedings of the Advances in Multimedia Information Processing, 2006

Chaotically Masking Traffic Pattern to Prevent Traffic Pattern Analysis Attacks for Mission Critical Applications in Computer Communication Networks.
Proceedings of the Advances in Natural Computation, Second International Conference, 2006

2005
A new general framework for shot boundary detection and key-frame extraction.
Proceedings of the 7th ACM SIGMM International Workshop on Multimedia Information Retrieval, 2005

Shot Boundary Detection Based on SVM and TMRA.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
A Learning-based Approach for Annotating Large On-Line Image Collection.
Proceedings of the 10th International Multimedia Modeling Conference (MMM 2004), 2004

A bootstrapping framework for annotating and retrieving WWW images.
Proceedings of the 12th ACM International Conference on Multimedia, 2004

An Adaptive Image Content Representation and Segmentation Approach to Automatic Image Annotation.
Proceedings of the Image and Video Retrieval: Third International Conference, 2004

2003
A Two-Level Multi-Modal Approach for Story Segmentation of Large News Video Corpus.
Proceedings of the 2003 TREC Video Retrieval Evaluation, 2003

ATMRA: An Automatic Temporal Multi-resolution Analysis Framework for Shot Boundary Detection.
Proceedings of the 9th International Conference on Multi-Media Modeling, 2003

A bootstrapping approach to annotating large image collection.
Proceedings of the 5th ACM SIGMM International Workshop on Multimedia Information Retrieval, 2003

An unified framework for shot boundary detection via active learning.
Proceedings of the 2003 IEEE International Conference on Acoustics, 2003

2002
Temporal Multi-Resolution Framework for Shot Boundary Detection and Keyframe Extraction.
Proceedings of The Eleventh Text REtrieval Conference, 2002


  Loading...