Huang Lin

According to our database1, Huang Lin authored at least 32 papers between 1988 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Faceless: A Cross-Platform Private Payment scheme for Human-Readable Identifiers.
Proceedings of the 19th Annual International Conference on Privacy, Security & Trust, 2022

Indoor Robot Localization Based on Visual Perception and on Particle Filter Algorithm of Increasing Priority Particles.
Proceedings of the 7th International Conference on Cyber Security and Information Engineering, 2022

Joint Estimation of SOC and SOH for Lithium Batteries based on DEKF.
Proceedings of the 7th International Conference on Cyber Security and Information Engineering, 2022

Research on Adaptive Control Strategy of Microgrid Inverter based on Virtual Synchronous Generator.
Proceedings of the 7th International Conference on Cyber Security and Information Engineering, 2022

A Deep Reinforcement Learning Approach for Collaborative Mobile Edge Computing.
Proceedings of the IEEE International Conference on Communications, 2022

Simulation of NR-V2X in a 5G Environment using OMNeT++.
Proceedings of the 2022 IEEE Future Networks World Forum, 2022

Building 5G Fingerprint Datasets for Accurate Indoor Positioning.
Proceedings of the 2022 IEEE Future Networks World Forum, 2022

2021
Efficient Range Proofs with Transparent Setup from Bounded Integer Commitments.
IACR Cryptol. ePrint Arch., 2021

2020
A Sub-linear Lattice-Based Submatrix Commitment Scheme.
Proceedings of the Information Security and Cryptology - ICISC 2020, 2020

2018
Towards Practical Lattice-Based One-Time Linkable Ring Signatures.
IACR Cryptol. ePrint Arch., 2018

2017
SQC: secure quality control for meta-analysis of genome-wide association studies.
Bioinform., 2017

Spatial and temporal variations of habitat in typical nature reserves, china.
Proceedings of the 2017 IEEE International Geoscience and Remote Sensing Symposium, 2017

FairTest: Discovering Unwarranted Associations in Data-Driven Applications.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

2016
Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge.
IACR Cryptol. ePrint Arch., 2016

2015
Discovering Unwarranted Associations in Data-Driven Applications with the FairTest Testing Toolkit.
CoRR, 2015

2013
Privacy-Aware Profiling and Statistical Data Extraction for Smart Sustainable Energy Systems.
IEEE Trans. Smart Grid, 2013

CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring.
IEEE Trans. Inf. Forensics Secur., 2013

2011
Efficient trust based information sharing schemes over distributed collaborative networks.
Proceedings of the MILCOM 2011, 2011

How to design space efficient revocable IBE from non-monotonic ABE.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Proxy re-encryption with keyword search.
Inf. Sci., 2010

Secure threshold multi authority attribute based encryption without a central authority.
Inf. Sci., 2010

On the security of metering scheme.
Comput. Math. Appl., 2010

Associated-Conflict Analysis Using Covering Based on Granular Computing.
Proceedings of the Life System Modeling and Intelligent Computing, 2010

Hybrid feature selection algorithm based on dynamic weighted ant colony algorithm.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010

The Classification Study of Texture Image Based on the Rough Set Theory.
Proceedings of the 2010 IEEE International Conference on Granular Computing, 2010

Research on Monitoring System of Aquiculture with Multi-environmental Factors.
Proceedings of the 2010 Asia-Pacific Conference on Wearable Computing Systems, 2010

How to Construct Interval Encryption from Binary Tree Encryption.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2009
Provably secure and efficient bounded ciphertext policy attribute based encryption.
Proceedings of the 2009 ACM Symposium on Information, 2009

Attribute based proxy re-encryption with delegating capabilities.
Proceedings of the 2009 ACM Symposium on Information, 2009

2008
Machine Recognition for Broad-Leaved Trees Based on Synthetic Features of Leaves Using Probabilistic Neural Network.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
Short Group Signature without Random Oracles.
IACR Cryptol. ePrint Arch., 2007

1988
Root locations of an entire polytope of polynomials: It suffices to check the edges.
Math. Control. Signals Syst., 1988


  Loading...