Hui Zhu

According to our database1, Hui Zhu authored at least 112 papers between 1998 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
τ-Safe (l,k)-Diversity Privacy Model for Sequential Publication With High Utility.
IEEE Access, 2019

2018
Task-Oriented Multilevel Cooperative Access Control Scheme for Environment with Virtualization and IoT.
Wireless Communications and Mobile Computing, 2018

Efficient and Privacy-Preserving Dynamic Spatial Query Scheme for Ride-Hailing Services.
IEEE Trans. Vehicular Technology, 2018

What is the value of an online retailer sharing demand forecast information?
Soft Comput., 2018

Efficient privacy-preserving online medical primary diagnosis scheme on naive bayesian classification.
Peer-to-Peer Networking and Applications, 2018

Energy-Efficient Routing Protocol for Wireless Sensor Networks Based on Improved Grey Wolf Optimizer.
TIIS, 2018

Efficient and Privacy-Preserving Proximity Detection Schemes for Social Applications.
IEEE Internet of Things Journal, 2018

Achieving Secure and Privacy-Preserving Incentive in Vehicular Cloud Advertisement Dissemination.
IEEE Access, 2018

Achieve Efficient and Privacy-Preserving Medical Primary Diagnosis Based on kNN.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Attacking Network Isolation in Software-Defined Networks: New Attacks and Countermeasures.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

A Novel Association Rule Prediction Algorithm for Classification and Regression.
Proceedings of the 57th IEEE Conference on Decision and Control, 2018

Predicting Re-loan Success based on Friendship Network Characteristics in the Online Micro-loan Marketplace.
Proceedings of the 24th Americas Conference on Information Systems, 2018

2017
Efficient and Privacy-Preserving Online Medical Prediagnosis Framework Using Nonlinear SVM.
IEEE J. Biomedical and Health Informatics, 2017

Privacy-friendly spatial crowdsourcing in vehicular networks.
J. Comm. Inform. Networks, 2017

An efficient Wikipedia semantic matching approach to text document classification.
Inf. Sci., 2017

Privacy preserving mechanisms for optimizing cross-organizational collaborative decisions based on the Karmarkar algorithm.
Inf. Syst., 2017

Efficient and Privacy-Preserving Polygons Spatial Query Framework for Location-Based Services.
IEEE Internet of Things Journal, 2017

Achieve Secure Handover Session Key Management via Mobile Relay in LTE-Advanced Networks.
IEEE Internet of Things Journal, 2017

Privacy calculus and its utility for personalization services in e-commerce: An analysis of consumer decision-making.
Information & Management, 2017

Achieve Efficient and Privacy-Preserving Proximity Detection Scheme for Social Applications.
Proceedings of the Security and Privacy in Communication Networks, 2017

Achieve efficient and privacy-preserving online fingerprint authentication over encrypted outsourced data.
Proceedings of the IEEE International Conference on Communications, 2017

2016
An Efficient Privacy-Preserving Location-Based Services Query Scheme in Outsourced Cloud.
IEEE Trans. Vehicular Technology, 2016

Web 2.0 and Communication Processes at Work: Evidence From China.
IEEE Trans. Prof. Communication, 2016

Secure and Privacy-Preserving Body Sensor Data Collection and Query Scheme.
Sensors, 2016

The Design and Characterization of a Flexible Tactile Sensing Array for Robot Skin.
Sensors, 2016

EPCS: an efficient and privacy-preserving classification service query framework for SVM.
Security and Communication Networks, 2016

Security and Privacy Challenges in Vehicular Cloud Computing.
Mobile Information Systems, 2016

LSOT: A Lightweight Self-Organized Trust Model in VANETs.
Mobile Information Systems, 2016

An analysis of dynamic game strategy of privacy protection in personalisation.
IJSTM, 2016

PTFA: a secure and privacy-preserving traffic flow analysis scheme for intelligent transportation system.
IJES, 2016

IETF IoT based wireless communication for latency-sensitive use cases in building automation.
Proceedings of the 25th IEEE International Symposium on Industrial Electronics, 2016

Scheduling Algorithm Design for Virtualized Hardware Accelerator in C-RAN.
Proceedings of the International Conference on Cloud Computing Research and Innovations, 2016

EPPD: Efficient and privacy-preserving proximity testing with differential privacy techniques.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

A flexible capacitive tactile sensor for robot skin.
Proceedings of the 2016 International Conference on Advanced Robotics and Mechatronics, 2016

A Secure and Privacy-Preserving Incentive Framework for Vehicular Cloud on the Road.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

PTVC: Achieving Privacy-Preserving Trust-Based Verifiable Vehicular Cloud Computing.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Investigating Decision Support aids in Online Marketplaces based on the Effort-accuracy Co-existence Framework.
Proceedings of the 24th European Conference on Information Systems, 2016

FPGA-Based Turbo Decoder Hardware Accelerator in Cloud Radio Access Network (C-RAN).
Proceedings of the Communications and Networking, 2016

FSSR: Fine-Grained EHRs Sharing via Similarity-Based Recommendation in Cloud-Assisted eHealthcare System.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Duth: a user-friendly dual-factor authentication for Android smartphone devices.
Security and Communication Networks, 2015

The effect of external stress on the properties of AlGaAs/GaAs single quantum well laser diodes.
Microelectronics Reliability, 2015

The effect of external stress on the electrical characteristics of AlGaN/GaN HEMTs.
Microelectronics Reliability, 2015

V-MGSM: A Multilevel and Grouping Security Virtualization Model for Mobile Internet Service.
Mobile Information Systems, 2015

Attribute Based Multisignature Scheme for Wireless Communications.
Mobile Information Systems, 2015

PAS: An Efficient Privacy-Preserving Multidimensional Aggregation Scheme for Smart Grid.
IJDSN, 2015

Information Diffusion Model Based on Privacy Setting in Online Social Networking Services.
Comput. J., 2015

Machine scheduling with deteriorating and resource-dependent maintenance activity.
Computers & Industrial Engineering, 2015

On the Benefits of Clustered Capillary Networks for Congestion Control in Machine Type Communications over LTE.
Proceedings of the 24th International Conference on Computer Communication and Networks, 2015

2014
A Bionic Camera-Based Polarization Navigation Sensor.
Sensors, 2014

Toward efficient and privacy-preserving computing in big data era.
IEEE Network, 2014

Uncertainty Community Detection in Social Networks.
JSW, 2014

Toward product control in ring-opening oligomerization of 9H-9-borafluorenes.
Journal of Computational Chemistry, 2014

Efficient attribute based sequential aggregate signature for wireless sensor networks.
IJSNet, 2014

Threshold attribute-based encryption with attribute hierarchy for lattices in the standard model.
IET Information Security, 2014

An Analysis of Dynamic Game Strategy of Privacy Protection in Personalization.
Proceedings of the Thirteenth Wuhan International Conference on E-Business, 2014

A camera-based real-time polarization sensor and its application to mobile robot navigation.
Proceedings of the 2014 IEEE International Conference on Robotics and Biomimetics, 2014

SPEMR: A new secure personal electronic medical record scheme with privilege separation.
Proceedings of the IEEE International Conference on Communications, 2014

MPPM: Malware propagation and prevention model in online SNS.
Proceedings of the IEEE International Conference on Communications, 2014

Key-Policy Weighted Attribute based Encryption for fine-grained access control.
Proceedings of the IEEE International Conference on Communications, 2014

2013
Two-dimensional transient simulations of the self-heating effects in GaN-based HEMTs.
Microelectronics Reliability, 2013

A full-pipelined 2-D IDCT/IDST VLSI architecture with adaptive block-size for HEVC standard.
IEICE Electronic Express, 2013

Efficient verifiable fuzzy keyword search over encrypted data in cloud computing.
Comput. Sci. Inf. Syst., 2013

PPAS: privacy protection authentication scheme for VANET.
Cluster Computing, 2013

An image-based three-camera real-time synchronous skylight polarization pattern measurement system.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2013

Lidar Scan matching EKF-SLAM using the differential model of vehicle motion.
Proceedings of the 2013 IEEE Intelligent Vehicles Symposium (IV), 2013

V-MLR: A Multilevel Security Model for Virtualization.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

RangeTree: A Feature Selection Algorithm for C4.5 Decision Tree.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Efficient Data Integrity Verification Using Attribute Based Multi-signature Scheme in Wireless Network.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

CSP-Based General Detection Model of Network Covert Storage Channels.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Provably Secure and Subliminal-Free Variant of Schnorr Signature.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Secure and Verifiable Outsourcing of Sequence Comparisons.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

2012
A New Trapdoor-indistinguishable Public Key Encryption with Keyword Search.
JoWUA, 2012

A New Efficient Verifiable Fuzzy Keyword Search Scheme.
JoWUA, 2012

A Verifiable Fuzzy Keyword Search Scheme Over Encrypted Data.
J. Internet Serv. Inf. Secur., 2012

Development of 'Intelligent Pioneer' unmanned vehicle.
Proceedings of the 2012 IEEE Intelligent Vehicles Symposium, 2012

A Lightweight Anonymous Authentication Scheme for VANET Based on Bilinear Pairing.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

2011
Vibrational spectral signatures of peptide secondary structures: N-methylation and side chain hydrogen bond in cyclosporin A.
Journal of Computational Chemistry, 2011

Using Self-Reconfiguration to Increase Manufacturing Yield of CNTFET-based Architectures.
Proceedings of the 2011 International Conference on Reconfigurable Computing and FPGAs, 2011

2010
Do anionic titanium dioxide nano-clusters reach bulk band gap? A density functional theory study.
Journal of Computational Chemistry, 2010

An SVM Based Automatic Segmentation Method for Brain Magnetic Resonance Image Series.
Proceedings of the Symposia and Workshops on Ubiquitous, 2010

A C_net-based Verification of Web Service Compositions.
Proceedings of the International Conference on Service Sciences, 2010

Stability evaluation of rockfall based on AHP-Fuzzy method.
Proceedings of the Seventh International Conference on Fuzzy Systems and Knowledge Discovery, 2010

A Stream Pattern Matching Method for Traffic Analysis.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

Pipeline Architecture of Particle Swarm Optimization.
Proceedings of the 9th IEEE/ACIS International Conference on Computer and Information Science, 2010

2009
Development of a VII-enabled prototype intersection collision warning system.
Proceedings of the 5th International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2009

Updating Technique for Particle Swarm Optimization in Nonlinear Dynamic Systems.
Proceedings of the ICAART 2009 - Proceedings of the International Conference on Agents and Artificial Intelligence, Porto, Portugal, January 19, 2009

An Improved Method to Reduce Over-Segmentation of Watershed Transformation and its Application in the Contour Extraction of Brain Image.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009

A Fast Morphological Reconstruction Algorithm for MRI Brain Image Simplification.
Proceedings of the High Performance Computing and Applications, 2009

An Efficient Fast Authentication Protocol.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Some Notes on Password Authenticated Key Exchange Based on RSA.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

2008
Global Convergence of a Special Case of the DAI-Yuan Family without Line Search.
APJOR, 2008

A Model of Image Feature Extraction Inspired by Ant Swarm System.
Proceedings of the Fourth International Conference on Natural Computation, 2008

Rough Formal Concept Analysis for Semi-Automatic Marine Ontology.
Proceedings of the Fourth International Conference on Natural Computation, 2008

The Scale-rate as the Measure of Local Complexity of Medical Images.
Proceedings of the 2008 International Conference on BioMedical Engineering and Informatics, 2008

2007
An Improved Particle Swarm Optimization for Indoor Positioning.
Proceedings of the MoMM'2007, 2007

Estimation of Coronary Arterial Wall Strain in Clinical Ivus Images.
Proceedings of the 2007 IEEE International Symposium on Biomedical Imaging: From Nano to Macro, 2007

Emergent Behavior of Ant Colony System in Digital Images for Acquiring Edge Information.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2007

2006
An MLP-orthogonal Gaussian mixture model hybrid model for Chinese bank check printed numeral recognition.
IJDAR, 2006

Reaction Paths and Elementary bifurcations Tracks: the Diabatic 1B2-State of ozone.
I. J. Bifurcation and Chaos, 2006

2005
Classifier geometrical characteristic comparison and its application in classifier selection.
Pattern Recognition Letters, 2005

2004
Density functional investigation of reaction of borohydride cation BH2+ with propylene.
Journal of Computational Chemistry, 2004

Training Multilayer Perceptron with Multiple Classifier Systems.
Proceedings of the Advances in Neural Networks, 2004

Comparing Decision Boundary Curvature.
Proceedings of the 17th International Conference on Pattern Recognition, 2004

2003
Density functional investigation on electron-transfer catalysis of cycloreversion of cyclobutane: Radical anion mechanism.
Journal of Computational Chemistry, 2003

2002
Theoretical study on the mechanism of the gas-phase reaction of diborane(3) anion with carbon disulfide.
Journal of Computational Chemistry, 2002

IVUS image segmentation based on contrast.
Proceedings of the Medical Imaging 2002: Image Processing, 2002

Tracking 3-D coronary artery motion with biplane angiography.
Proceedings of the 2002 IEEE International Symposium on Biomedical Imaging, 2002

2001
Tumor Boundary Extraction in Multislice MR Brain Images Using Region and Contour Deformation.
Proceedings of the Medical Imaging and Augmented Reality: First International Workshop, 2001

2000
A meta-Gaussian approach to learning non-Gaussian Bayesian network structure.
Proceedings of the IEEE International Conference on Systems, 2000

1999
Image Contrast Enhancement by Constrained Local Histogram Equalization.
Computer Vision and Image Understanding, 1999

1998
Adaptive thresholding by variational method.
IEEE Trans. Image Processing, 1998


  Loading...