Jianhua Li

According to our database1, Jianhua Li authored at least 311 papers between 2000 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Design of Wireless Network on Chip with Priority-Based MAC.
Journal of Circuits, Systems, and Computers, 2019

CDLB: a cross-domain load balancing mechanism for software defined networks in cloud data centre.
IJCSE, 2019

A novel differential fault analysis using two-byte fault model on AES Key schedule.
IET Circuits, Devices & Systems, 2019

Fog-Computing-Enabled Cognitive Network Function Virtualization for an Information-Centric Future Internet.
IEEE Communications Magazine, 2019

Reuse locality aware cache partitioning for last-level cache.
Computers & Electrical Engineering, 2019

Edge-MapReduce-Based Intelligent Information-Centric IoV: Cognitive Route Planning.
IEEE Access, 2019

Fog-Enabled Vehicle as a Service for Computing Geographical Migration in Smart Cities.
IEEE Access, 2019

Vehicle-to-Cloudlet: Game-Based Computation Demand Response for Mobile Edge Computing through Vehicles.
Proceedings of the 89th IEEE Vehicular Technology Conference, 2019

Edge Learning based Green Content Distribution for Information-Centric Internet of Things.
Proceedings of the 42nd International Conference on Telecommunications and Signal Processing, 2019

Emergent LBS: If GNSS Fails, How Can 5G-enabled Vehicles Get Locations Using Fogs?
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

Smart NCAP supporting Low-Rate DDoS Detection for IEEE 21451-1-5 Internet of Things.
Proceedings of the IEEE International Conference on Industrial Cyber Physical Systems, 2019

SCTD: Smart Reasoning Based Content Threat Defense in Semantics Knowledge Enhanced ICN.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Security Function Virtualization Based Moving Target Defense of SDN-Enabled Smart Grid.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

NSTN: Name-Based Smart Tracking for Network Status in Information-Centric Internet of Things.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
Distributed Data Privacy Preservation in IoT Applications.
IEEE Wireless Commun., 2018

Big Data Analysis-Based Secure Cluster Management for Optimized Control Plane in Software-Defined Networks.
IEEE Trans. Network and Service Management, 2018

Service Popularity-Based Smart Resources Partitioning for Fog Computing-Enabled Industrial Internet of Things.
IEEE Trans. Industrial Informatics, 2018

Big Data Analysis-Based Security Situational Awareness for Smart Grid.
IEEE Trans. Big Data, 2018

Predicting human gaze with multi-level information.
Signal Processing, 2018

Design and Fabrication of a Miniaturized GMI Magnetic Sensor Based on Amorphous Wire by MEMS Technology.
Sensors, 2018

Asynchronous Group Authentication Based on Geometric Approach.
Security and Communication Networks, 2018

Failure mode analysis of MEMS suspended inductors under mechanical shock.
Microelectronics Reliability, 2018

Topology generation and performance enhancement based on channel assignment optimization for hybrid wireless NoC with large system size.
Microprocessors and Microsystems - Embedded Hardware Design, 2018

Design of Low-Power WiNoC with Congestion-Aware Wireless Node.
Journal of Circuits, Systems, and Computers, 2018

An Irregular Topology Generation Using Power-Interference Co-Optimization for Hybrid Application-Specific Wireless NoC.
Journal of Circuits, Systems, and Computers, 2018

Check in or Not? A Stochastic Game for Privacy Preserving in Point-of-Interest Recommendation System.
IEEE Internet of Things Journal, 2018

Virtual Fog: A Virtualization Enabled Fog Computing Framework for Internet of Things.
IEEE Internet of Things Journal, 2018

Detecting Domain-Flux Malware Using DNS Failure Traffic.
International Journal of Software Engineering and Knowledge Engineering, 2018

Software-defined dynamic QoS provisioning for smart metering in energy Internet using fog computing and network calculus.
IET Cyper-Phys. Syst.: Theory & Appl., 2018

Fog-enabled Edge Learning for Cognitive Content-Centric Networking in 5G.
CoRR, 2018

GelSlim: A High-Resolution, Compact, Robust, and Calibrated Tactile-sensing Finger.
CoRR, 2018

Slip Detection with Combined Tactile and Visual Information.
CoRR, 2018

Agile convolutional neural network for pulmonary nodule classification using CT images.
Int. J. Comput. Assist. Radiol. Surg., 2018

QoS-Predicted Energy Efficient Routing for Information-Centric Smart Grid: A Network Calculus Approach.
IEEE Access, 2018

Energy-Efficient Location Privacy Preserving in Vehicular Networks Using Social Intimate Fogs.
IEEE Access, 2018

SLA-Aware Fine-Grained QoS Provisioning for Multi-Tenant Software-Defined Networks.
IEEE Access, 2018

Fog Computing-Enabled Secure Demand Response for Internet of Energy Against Collusion Attacks Using Consensus and ACE.
IEEE Access, 2018

A Novel Airbnb Matching Scheme in Shared Economy Using Confidence and Prediction Uncertainty Analysis.
IEEE Access, 2018

End-to-end pixelwise surface normal estimation with convolutional neural networks and shape reconstruction using GelSight sensor.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2018

NVLH: Crash-Consistent Linear Hashing for Non-Volatile Memory.
Proceedings of the IEEE 7th Non-Volatile Memory Systems and Applications Symposium, 2018

Reputation-based Distributed Knowledge Sharing System in Blockchain.
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018

GelSlim: A High-Resolution, Compact, Robust, and Calibrated Tactile-sensing Finger.
Proceedings of the 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2018

Efficient Secure Access to IEEE 21451 Based Wireless IIoT Using Optimized TEDS and MIB.
Proceedings of the IECON 2018, 2018

Slip Detection with Combined Tactile and Visual Information.
Proceedings of the 2018 IEEE International Conference on Robotics and Automation, 2018

A Hierarchical Access Control Encryption Scheme Based on Partially Ordered Set.
Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, 2018

K-Loop Free Assignment in Conference Review Systems.
Proceedings of the 2018 International Conference on Computing, 2018

MapReduce Enabling Content Analysis Architecture for Information-Centric Networks Using CNN.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Resource-Efficient Secure Data Sharing for Information Centric E-Health System Using Fog Computing.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Sema-ICN: Toward Semantic Information-Centric Networking Supporting Smart Anomalous Access Detection.
Proceedings of the IEEE Global Communications Conference, 2018

Vehicle Mobility-Based Geographical Migration of Fog Resource for Satellite-Enabled Smart Cities.
Proceedings of the IEEE Global Communications Conference, 2018

On-Demand Fog Caching Service for ICN Using Synthetical Popularity, Cost, and Importance Status.
Proceedings of the IEEE Global Communications Conference, 2018

Privacy-Preserving and Unforgeable Searchable Encrypted Audit Logs for Cloud Storage.
Proceedings of the 5th IEEE International Conference on Cyber Security and Cloud Computing, 2018

An Effective Verifiable Database Protocol in Severe Untrusted Environment.
Proceedings of the 5th IEEE International Conference on Cyber Security and Cloud Computing, 2018

Deep Reinforcement Learning based Smart Mitigation of DDoS Flooding in Software-Defined Networks.
Proceedings of the 23rd IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2018

2017
Dynamic Privacy Pricing: A Multi-Armed Bandit Approach With Time-Variant Rewards.
IEEE Trans. Information Forensics and Security, 2017

Thread Criticality Assisted Replication and Migration for Chip Multiprocessor Caches.
IEEE Trans. Computers, 2017

Crowd Sensing-Enabling Security Service Recommendation for Social Fog Computing Systems.
Sensors, 2017

An Untraceable ECC-Based Remote User Authentication Scheme.
TIIS, 2017

A Secure Mechanism for Big Data Collection in Large Scale Internet of Vehicle.
IEEE Internet of Things Journal, 2017

Revealing the Gap Between Skills of Students and the Evolving Skills Required by the Industry of Information and Communication Technology.
International Journal of Software Engineering and Knowledge Engineering, 2017

A lightweight authentication scheme based on self-updating strategy for space information network.
Int. J. Satellite Communications Networking, 2017

A novel parallel framework for pursuit learning schemes.
Neurocomputing, 2017

Detecting malware based on expired command-and-control traffic.
IJDSN, 2017

Deep Learning-Based Food Calorie Estimation Method in Dietary Assessment.
CoRR, 2017

Computer vision-based food calorie estimation: dataset, method, and experiment.
CoRR, 2017

Transient Dynamics Simulation of Airflow in a CT-Scanned Human Airway Tree: More or Fewer Terminal Bronchi?
Comp. Math. Methods in Medicine, 2017

Overlapping Community Detection Based on Structural Centrality in Complex Networks.
IEEE Access, 2017

Proposed Matching Scheme with Confidence and Prediction Uncertainty in Shared Economy.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

A Novel Image Classification Method with CNN-XGBoost Model.
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017

Latency estimation for fog-based internet of things.
Proceedings of the 27th International Telecommunication Networks and Applications Conference, 2017

SDN Based Content-Centric QoS-Guaranteed for Wireless Multimedia Sensor Networks.
Proceedings of the Industrial Networks and Intelligent Systems, 2017

Fog computing based content-aware taxonomy for caching optimization in information-centric networks.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Error distribution modeling of embedded sensors on smartphones by using laser ranger.
Proceedings of the 2017 IEEE International Conference on Multimedia & Expo Workshops, 2017

Towards QoE named content-centric wireless multimedia sensor networks with mobile sinks.
Proceedings of the IEEE International Conference on Communications, 2017

CC-fog: Toward content-centric fog networks for E-health.
Proceedings of the 19th IEEE International Conference on e-Health Networking, 2017

Privacy Preserving Distributed Classification: A Satisfaction Equilibrium Approach.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Software-Defined Efficient Service Reconstruction in Fog Using Content Awareness and Weighted Graph.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

SD-OPTS: Software-Defined On-Path Time Synchronization for Information-Centric Smart Grid.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Learning Automata Based Approach for Influence Maximization Problem on Social Networks.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

Security Analysis of Simple Network Management Protocol Based IEEE P21451 Internet of Things.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

Molecular Docking Simulation Based on CPU-GPU Heterogeneous Computing.
Proceedings of the Advanced Parallel Processing Technologies, 2017

2016
A multi-stage attack mitigation mechanism for software-defined home networks.
IEEE Trans. Consumer Electronics, 2016

Estimator Goore Game based quality of service control with incomplete information for wireless sensor networks.
Signal Processing, 2016

A Safety Resource Allocation Mechanism against Connection Fault for Vehicular Cloud Computing.
Mobile Information Systems, 2016

Strongly secure identity-based authenticated key agreement protocols without bilinear pairings.
Inf. Sci., 2016

Saliency detection via extreme learning machine.
Neurocomputing, 2016

Uncovering fuzzy communities in networks with structural similarity.
Neurocomputing, 2016

Multi-feature tracking via adaptive weights.
Neurocomputing, 2016

Low-delay parallel Chien search architecture for RS decoder.
IEICE Electronic Express, 2016

Terrain mapping under extreme light conditions with direct stereo matching method through aggregating matching costs by weight.
Advanced Robotics, 2016

Security-Aware Distributed Service Composition for Wireless Sensor Networks Based Smart Metering in Smart Grid Using Software Defined Networks.
Proceedings of the Wireless Internet - 9th International Conference, 2016

Improving Energy Efficiency in Industrial Wireless Sensor Networks Using SDN and NFV.
Proceedings of the IEEE 83rd Vehicular Technology Conference, 2016

How to Defend against Sophisticated Intrusions in Home Networks Using SDN and NFV.
Proceedings of the IEEE 83rd Vehicular Technology Conference, 2016

Thread Progress Aware Block Migration for Dynamic NUCA.
Proceedings of the 24th Euromicro International Conference on Parallel, 2016

Analysis and design of an authentication protocol for space information network.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Two Approaches on Accelerating Bayesian Two Action Learning Automata.
Proceedings of the Intelligent Computing Methodologies - 12th International Conference, 2016

An anonymous distributed key management system based on CL-PKC for space information network.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Deep Packet Inspection Based Application-Aware Traffic Control for Software Defined Networks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

A Name-Based Secure Communication Mechanism for Smart Grid Employing Wireless Networks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Survey on Domain Name System Security.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

GEV Regression with Convex Loss Applied to Imbalanced Binary Classification.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

Automatic Threshold Calculation Based Label Propagation Algorithm for Overlapping Community.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

A Lightweight Authentication and Key Agreement Scheme for Mobile Satellite Communication Systems.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

State Recovering Attack Against Quavium.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

2015
Periodic K-Times Anonymous Authentication With Efficient Revocation of Violator's Credential.
IEEE Trans. Information Forensics and Security, 2015

Passive Image-Splicing Detection by a 2-D Noncausal Markov Model.
IEEE Trans. Circuits Syst. Video Techn., 2015

Compiler-Assisted Refresh Minimization for Volatile STT-RAM Cache.
IEEE Trans. Computers, 2015

A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks.
Sensors, 2015

High-performance adaptive hybrid wireless NoC architecture based on improved congestion measurement.
IEICE Electronic Express, 2015

Survey on cyberspace security.
SCIENCE CHINA Information Sciences, 2015

In-field self-calibration of robotic manipulator using stereo camera: application to Humanitarian Demining Robot.
Advanced Robotics, 2015

A novel estimator based learning automata algorithm.
Appl. Intell., 2015

Matrix Based Community Evolution Events Detection in Online Social Networks.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom 2015, 2015

Context-Aware Traffic Forwarding Service for Applications in SDN.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom 2015, 2015

Toward Vulnerability Assessment for 5G Mobile Communication Networks.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom 2015, 2015

Overlapping Community Detection Using NVPA.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom 2015, 2015

EHOPES: Data-centered Fog platform for smart living.
Proceedings of the International Telecommunication Networks and Applications Conference, 2015

A Security Mechanism for Demand Response Using RBAC and Pub/sub.
Proceedings of the Twelfth IEEE International Symposium on Autonomous Decentralized Systems, 2015

Chance Discovery Based Security Service Selection for Social P2P Based Sensor Networks.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

A Defense Mechanism for Distributed Denial of Service Attack in Software-Defined Networks.
Proceedings of the Ninth International Conference on Frontier of Computer Science and Technology, 2015

Hand-Eye calibration using stereo camera through pure rotations -fitting circular arc in 3D space with joint angle constraint-.
Proceedings of the IEEE International Conference on Advanced Intelligent Mechatronics, 2015

2014
A Unified Write Buffer Cache Management Scheme for Flash Memory.
IEEE Trans. VLSI Syst., 2014

Compiler-Assisted STT-RAM-Based Hybrid Cache for Energy Efficient Embedded Systems.
IEEE Trans. VLSI Syst., 2014

WCET-Aware Re-Scheduling Register Allocation for Real-Time Embedded Systems With Clustered VLIW Architecture.
IEEE Trans. VLSI Syst., 2014

Thread Progress Aware Coherence Adaption for Hybrid Cache Coherence Protocols.
IEEE Trans. Parallel Distrib. Syst., 2014

Dual partitioning multicasting for high-performance on-chip networks.
J. Parallel Distrib. Comput., 2014

Improving Delay Performance for Time-Critical Communications in VANET.
J. Mobile Multimedia, 2014

A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network.
J. Electrical and Computer Engineering, 2014

Provably secure E-cash system with practical and efficient complete tracing.
Int. J. Inf. Sec., 2014

Analysis and Extension of Safety Mechanisms for Standardized Control Networks in Smart Grid.
IJDSN, 2014

A Fine-Grained Cross-Domain Access Control Mechanism for Social Internet of Things.
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014

A Distributed Local Margin Learning based scheme for high-dimensional feature processing in image tampering detection.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2014

A 3-hop message relay algorithm for connected dominating sets in wireless ad-hoc sensor networks.
Proceedings of the 2014 IEEE/CIC International Conference on Communications in China, 2014

A denial of service attack in advanced metering infrastructure network.
Proceedings of the IEEE International Conference on Communications, 2014

A detecting community method in complex networks with fuzzy clustering.
Proceedings of the International Conference on Data Science and Advanced Analytics, 2014

An Asynchronous Distributed Algorithm for Constructing a Connected Dominating Set Optimized by Minimum-Weight Spanning Tree.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

Multi-instance Learning Using Information Entropy Theory for Image Retrieval.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

Remote Sensing Image Classification Based on Hybrid Entropy and L1 Norm.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

Multiple evidence fusion based information diffusion model for social network.
Proceedings of the 9th International Conference on Communications and Networking in China, 2014

Abnormal crowd behavior detection using interest points.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2014

An modularity-based overlapping community structure detecting algorithm.
Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2014

2013
Task Allocation on Nonvolatile-Memory-Based Hybrid Main Memory.
IEEE Trans. VLSI Syst., 2013

Cooperating Virtual Memory and Write Buffer Management for Flash-Based Storage Systems.
IEEE Trans. VLSI Syst., 2013

Low-energy volatile STT-RAM cache design using cache-coherence-enabled adaptive refresh.
ACM Trans. Design Autom. Electr. Syst., 2013

Colour image encryption based on advanced encryption standard algorithm with two-dimensional chaotic map.
IET Information Security, 2013

Escrowable identity-based authenticated key agreement protocol with strong security.
Computers & Mathematics with Applications, 2013

Strongly secure identity-based authenticated key agreement protocols in the escrow mode.
SCIENCE CHINA Information Sciences, 2013

A Distributed Scheme for Image Splicing Detection.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

Image splicing detection based on noncausal Markov model.
Proceedings of the IEEE International Conference on Image Processing, 2013

Cache coherence enabled adaptive refresh for volatile STT-RAM.
Proceedings of the Design, Automation and Test in Europe, 2013

Integrated Network Service to Enhance Multicast Communication.
Proceedings of the IEEE 11th International Conference on Dependable, 2013

A New Scheme for Indirect Trust Calculation to Resist Bigmouth Attack in Wireless Ad Hoc Network.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

Chinese SNS blog classification using semantic similarity.
Proceedings of the Fifth International Conference on Computational Aspects of Social Networks, 2013

Implementing quasi-parallel breadth-first search in MapReduce for large-scale social network mining.
Proceedings of the Fifth International Conference on Computational Aspects of Social Networks, 2013

A complex network-based approach to estimating the number of people in video surveillance.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2013

Compiler-assisted refresh minimization for volatile STT-RAM cache.
Proceedings of the 18th Asia and South Pacific Design Automation Conference, 2013

2012
Hybrid nonvolatile disk cache for energy-efficient and high-performance systems.
ACM Trans. Design Autom. Electr. Syst., 2012

Quavium - A New Stream Cipher Inspired by Trivium.
JCP, 2012

A New Ultralightweight RFID Authentication Protocol with Permutation.
IEEE Communications Letters, 2012

Optimal chroma-like channel design for passive color image splicing detection.
EURASIP J. Adv. Sig. Proc., 2012

An Image Super-Resolution Scheme Based on Compressive Sensing with PCA Sparse Representation.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012

Countering Universal Image Tampering Detection with Histogram Restoration.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012

Code Motion for Migration Minimization in STT-RAM Based Hybrid Cache.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2012

MAC: migration-aware compilation for STT-RAM based hybrid cache in embedded systems.
Proceedings of the International Symposium on Low Power Electronics and Design, 2012

Green firewall: An energy-efficient intrusion prevention mechanism in wireless sensor network.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

OMIM data - standardized input and pair-wise comparison.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012

TEACA: Thread ProgrEss Aware Coherence Adaption for hybrid coherence protocols.
Proceedings of the IEEE 10th Symposium on Embedded Systems for Real-time Multimedia, 2012

Constructing the On/Off Covert Channel on Xen.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

Hierarchical activeness state evaluation model for BBS network community.
Proceedings of the 7th International Conference on Communications and Networking in China, 2012

Efficient Stereo Matching by Local Linear Filtering and Improved Dynamic Programming.
Proceedings of the Pattern Recognition - Chinese Conference, 2012

A complex network-based approach for interest point detection in images.
Proceedings of the IEEE international Symposium on Broadband Multimedia Systems and Broadcasting, 2012

Network Vulnerability Analysis Using Text Mining.
Proceedings of the Intelligent Information and Database Systems - 4th Asian Conference, 2012

Perceptual Compressive Sensing Scheme Based on Human Vision System.
Proceedings of the 2012 IEEE/ACIS 11th International Conference on Computer and Information Science, Shanghai, China, May 30, 2012

2011
Quantitative Similarity Evaluation of Internet Social Network Entities Based on Supernetwork.
Journal Comp. Netw. and Communic., 2011

Genetic Network Programming-Sarsa with Subroutines for Trading Rules on Stock Markets.
JACIII, 2011

Speedup of bit-parallel Karatsuba multiplier in GF(2m) generated by trinomials.
Inf. Process. Lett., 2011

Gossip-based scalable directed diffusion for wireless sensor networks.
Int. J. Communication Systems, 2011

An alternative class of irreducible polynomials for optimal extension fields.
Des. Codes Cryptogr., 2011

An Anti-attack Model Based on Complex Network Theory in P2P networks
CoRR, 2011

Evaluating the transmission rate of covert timing channels in a network.
Computer Networks, 2011

Strongly secure identity-based authenticated key agreement protocols.
Computers & Electrical Engineering, 2011

STT-RAM based energy-efficiency hybrid cache for CMPs.
Proceedings of the IEEE/IFIP 19th International Conference on VLSI and System-on-Chip, 2011

Semantic Web Service Automatic Composition Based on Service Parameter Relationship Graph.
Proceedings of the IEEE 10th International Conference on Trust, 2011

A Web Services Composition Model and Its Verification Algorithm Based on Interface Automata.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Optimal task allocation on non-volatile memory based hybrid main memory.
Proceedings of the Research in Applied Computation Symposium, 2011

A Comprehensive Study on Third Order Statistical Features for Image Splicing Detection.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011

New Feature Presentation of Transition Probability Matrix for Image Tampering Detection.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011

An efficient angle-based shape matching approach towards object recognition.
Proceedings of the 2011 IEEE International Conference on Multimedia and Expo, 2011

Exploiting set-level write non-uniformity for energy-efficient NVM-based hybrid cache.
Proceedings of the 9th IEEE Symposium on Embedded Systems for Real-Time Multimedia, 2011

ExLRU: a unified write buffer cache management for flash memory.
Proceedings of the 11th International Conference on Embedded Software, 2011

2010
Anonymity Enhancement on Robust and Efficient Password-Authenticated Key Agreement Using Smart Cards.
IEEE Trans. Industrial Electronics, 2010

Time-domain sending rate and response function of eXplicit Control Protocol.
Telecommunication Systems, 2010

An extension of TYT inversion algorithm in polynomial basis.
Inf. Process. Lett., 2010

Enhancing DDoS Flood Attack Detection via Intelligent Fuzzy Logic.
Informatica (Slovenia), 2010

Delegatability of an Identity Based Strong Designated Verifier Signature Scheme.
Informatica, Lith. Acad. Sci., 2010

A Better Improvement on the Integrated Diffie-Hellman-DSA Key Agreement Protocol.
I. J. Network Security, 2010

Fast file dissemination in peer-to-peer networks with upstream bandwidth constraint.
Future Generation Comp. Syst., 2010

Implementing a passive network covert timing channel.
Computers & Security, 2010

GNP-Sarsa with subroutines for trading rules on stock markets.
Proceedings of the IEEE International Conference on Systems, 2010

Detecting Digital Image Splicing in Chroma Spaces.
Proceedings of the Digital Watermarking - 9th International Workshop, 2010

LADPM: Latency-Aware Dual-Partition Multicast Routing for Mesh-Based Network-on-Chips.
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010

Human-Oriented Image Retrieval of Optimized Multi-feature via Genetic Algorithm.
Proceedings of the Information Computing and Applications - First International Conference, 2010

Fast Forth Power and Its Application in Inversion Computation for a Special Class of Trinomials.
Proceedings of the Computational Science and Its Applications, 2010

An Anonymity Scheme Based on Pseudonym in P2P Networks.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

An Improved Artificial Potential Field Algorithm for Virtual Human Path Planning.
Proceedings of the Entertainment for Education. Digital Techniques and Systems, 2010

An Approach to Privacy-Preserving Alert Correlation and Analysis.
Proceedings of the 5th IEEE Asia-Pacific Services Computing Conference, 2010

2009
Remarks on Zhang-Kim's Key Authentication Scheme.
I. J. Network Security, 2009

Toward optimizing cauchy matrix for cauchy reed-solomon code.
IEEE Communications Letters, 2009

On the Design of Trivium.
IACR Cryptology ePrint Archive, 2009

A study of on/off timing channel based on packet delay distribution.
Computers & Security, 2009

Democratic group signatures with collective traceability.
Computers & Electrical Engineering, 2009

Real-Time and Self-adaptive Method for Abnormal Traffic Detection Based on Self-similarity.
Proceedings of the Web Information Systems and Mining, International Conference, 2009

AE-BP: Adaptive Erasure Belief Propagation Decoding Algorithm of LDPC Codes.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

Outage Behavior of Multi-Antenna Multi-Relay Non-Regenerative Cooperative Networks.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

Extended PEG Algorithm for High Rate LDPC Codes.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009

A LoSS Based On-line Detection of Abnormal Traffic Using Dynamic Detection Threshold.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

Performance Analysis of Authentication Method for Proxy Mobile IP Protocol.
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009

TLC: An Informatics Approach to Enable Patients to Initiate Tailored Lifestyle Conversations with Providers at the Point of Care.
Proceedings of the AMIA 2009, 2009

Developing a Web Platform for Health Promotion and Wellness Driven by and for the Harlem Community.
Proceedings of the AMIA 2009, 2009

2008
Constructing Efficient Certificateless Public Key Encryption with Pairing.
I. J. Network Security, 2008

Formal Protocol Design of ESIKE Based on Authentication Tests.
I. J. Network Security, 2008

Peer-to-Peer Based Fast File Dissemination in UMTS Networks.
IEICE Transactions, 2008

Democratic Group Signatures with Threshold Traceability.
IACR Cryptology ePrint Archive, 2008

Identity-Based Directed Signature Scheme from Bilinear Pairings.
IACR Cryptology ePrint Archive, 2008

Building network attack graph for alert causal correlation.
Computers & Security, 2008

The optimization scheme for EOD robot based on supervising control architecture.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2008

A Group Key Management Scheme with Revocation and Loss-tolerance Capability for Wireless Sensor Networks.
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008

A Novel Original Streaming Video Wavelet Domain Watermarking Algorithm in Copyright Protection.
Proceedings of the Advances in Multimedia Information Processing, 2008

A Novel Real-Time MPEG-2 Video Watermarking Scheme in Copyright Protection.
Proceedings of the Digital Watermarking, 7th International Workshop, 2008

An Undergraduate Parallel and Distributed Computing Course in Multi-Core Era.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Design and Analysis of an XCP-TCP Gateway.
Proceedings of the 2008 International Conference on Information Networking, 2008

Adaptive workflow based on SOA and its application in Tourism Information Change Management.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

A Novel Clone Selection Algorithm with Reconfigurable Search Space Ability and Its Application.
Proceedings of the Fourth International Conference on Natural Computation, 2008

Group-Based Trust Model in P2P System Based on Trusted Computing.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

A New Blind Steganalysis Method for JPEG Images.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
Net Cluster: A Net-Reduction-Based Clustering Preprocessing Algorithm for Partitioning and Placement.
IEEE Trans. on CAD of Integrated Circuits and Systems, 2007

Group-oriented encryption secure against collude attack.
IACR Cryptology ePrint Archive, 2007

Group-based Proxy Re-encryption scheme.
IACR Cryptology ePrint Archive, 2007

Scalable Storage Scheme from Forward Key Rotation.
IACR Cryptology ePrint Archive, 2007

Provable password-based tripartite key agreement protocol.
IACR Cryptology ePrint Archive, 2007

Improvement on a Digital Signature Scheme without using One-way Hash and Message Redundancy.
IACR Cryptology ePrint Archive, 2007

Solid-based CAPP for surface micromachined MEMS devices.
Computer-Aided Design, 2007

ACKDs: An Authenticated Combinatorial Key Distribution Scheme for Wireless Sensor Networks.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Information Grid Instant Service and its application in tourism.
Proceedings of the IEEE International Conference on Systems, 2007

Combating P2P File Pollution with Co-alerting.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007

An Adaptive Collaborative Filtering Algorithm for Online Reputation Systems.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007

A Discussion on Personalized Trust Management for Flat P2P Communities.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007

The Necessity of Combining ELN and SACK to Improve TCP Performance over Heterogeneous Networks.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007

Method on Network Information System Security Assessment Based on Rough Set.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007

An Adaptive Privacy Preserving Data Mining Model under Distributed Environment.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007

Modes of Real-Time Content Transformation for Web Intermediaries in Active Network.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007

The Application of Wavelet & DCSK Watermarking in Multimedia Security.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007

An Efficient Video Watermarking Scheme with Luminance Differential DC Coefficient Modification.
Proceedings of the Advances in Multimedia Information Processing, 2007

Medication Reconciliation Using Natural Language Processing and Controlled Terminologies.
Proceedings of the MEDINFO 2007 - Proceedings of the 12th World Congress on Health (Medical) Informatics, 2007

An effective clustering algorithm for mixed-size placement.
Proceedings of the 2007 International Symposium on Physical Design, 2007

Two Clustering Preprocessing Techniques for Large-Scale Circuits.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2007), 2007

Point Stabilization of Wheeled Mobile Robots Based on Artificial Potential Field and Genetic Algorithm.
Proceedings of the Third International Conference on Natural Computation, 2007

A Novel Verifier-Based Authenticated Key Agreement Protocol.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Contemporary Intelligent Computing Techniques, 2007

Chameleon-Based Deniable Authenticated Key Agreement Protocol Secure Against Forgery.
Proceedings of the Online Communities and Social Computing, 2007

A Weighted Consensus Function Based on Information-Theoretic Principles to Combine Soft Clusterings.
Proceedings of the 2007 IEEE International Conference on Granular Computing, 2007

Linkable Ring Signatures from Linear Feedback Shift Register.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

The Multi-view Information Bottleneck Clustering.
Proceedings of the Advances in Databases: Concepts, 2007

Auditing Dynamic Links to Online Information Resources.
Proceedings of the AMIA 2007, 2007

Digital Partnerships for Health: Steps to develop a community-specific health portal aimed at promoting health and well-being.
Proceedings of the AMIA 2007, 2007

Redesign of the Columbia University Infobutton Manager.
Proceedings of the AMIA 2007, 2007

A General Attribute based RBAC Model for Web Service.
Proceedings of the 2007 IEEE International Conference on Services Computing (SCC 2007), 2007

2006
A connectivity based clustering algorithm with application to VLSI circuit partitioning.
IEEE Trans. on Circuits and Systems, 2006

A New Construction of Time Capsule Signature.
IACR Cryptology ePrint Archive, 2006

Chameleon-Based Deniable Authenticated Key Agreement Protocol.
IACR Cryptology ePrint Archive, 2006

Lower Bounds on the Algebraic Immunity of Boolean Functions
CoRR, 2006

Vectorial Resilient $PC(l)$ of Order $k$ Boolean Functions from AG-Codes
CoRR, 2006

A Structural Study and Hyperedge Clustering Technique for Large Scale Circuits.
Proceedings of the IEEE Workshop on Signal Processing Systems, 2006

An Extended Role-Based Access Control for Web Services.
Proceedings of the SECRYPT 2006, 2006

Cryptanalysis and improvement on Yang-Shieh authentication schemes.
Proceedings of the 2006 International Conference on Privacy, 2006

Net cluster: a net-reduction based clustering preprocessing algorithm.
Proceedings of the 2006 International Symposium on Physical Design, 2006

Efficient ID-based Proxy Chameleon Signature from Bilinear Pairings.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

Knowledge base based Analysis of Security Situational Awareness.
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006

Adaptable Designated Group Signature.
Proceedings of the Intelligent Computing, 2006

Semantic Grid Security Solutions Based on Knowledge Base.
Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW 2006), 2006

2005
A simple protocol for deniable authentication based on ElGamal cryptography.
Networks, 2005

Provable Efficient Certificateless Public Key Encryption.
IACR Cryptology ePrint Archive, 2005

An improvement on efficient anonymous auction protocols.
Computers & Security, 2005

Modes of Real-Time Content Transformation for Web Intermediaries in Active Network.
Proceedings of the IEEE 7th Workshop on Multimedia Signal Processing, 2005

A Multivalue Eigenvalue Based Circuit Partitioning Technique.
Proceedings of the 5th IEEE International Workshop on System-on-Chip for Real-Time Applications (IWSOC 2005), 2005

A Structure Based Clustering Algorithm with Applications to VLSI Physical Design.
Proceedings of the 5th IEEE International Workshop on System-on-Chip for Real-Time Applications (IWSOC 2005), 2005

ID-Based One Round Authenticated Group Key Agreement Protocol with Bilinear Pairings.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

The Application of Collaborative Filtering for Trust Management in P2P Communities.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

Using Double-Layer One-Class Classification for Anti-jamming Information Filtering.
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005

Recurrent Networks for Integrated Navigation.
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005

Enforce Mandatory Access Control Policy on XML Documents.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

Constructing Fair-Exchange P2P File Market.
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005

Methodology of Quantitative Risk Assessment for Information System Security.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

Semantic knowledge in word completion.
Proceedings of the ACM SIGACCESS Conference on Computers and Accessibility, 2005

An Efficient Topic-Specific Web Text Filtering Framework.
Proceedings of the Web Technologies Research and Development - APWeb 2005, 7th Asia-Pacific Web Conference, Shanghai, China, March 29, 2005

Analysis of Polarity Information in Medical Text.
Proceedings of the AMIA 2005, 2005

Topic-Specific Text Filtering Based on Multiple Reducts.
Proceedings of the Autonomous Intelligent Systems: Agents and Data Mining, 2005

2004
Security improvement on a timestamp-based password authentication scheme.
IEEE Trans. Consumer Electronics, 2004

Further analysis of password authentication schemes based on authentication tests.
Computers & Security, 2004

Cryptanalysis on a Blind Signature Scheme Based on ElGamal Signature.
Proceedings of the 4th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2004), 2004

Practical Considerations for Exploiting the World Wide Web to Create Infobuttons.
Proceedings of the MEDINFO 2004, 2004

Anonymous Micropayments Authentication(AMA) in Mobile Data Network.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

New Feature Selection and Weighting Methods Based on Category Information.
Proceedings of the Digital Libraries: International Collaboration and Cross-Fertilization, 2004

An Efficient Key Management for Large Dynamic Groups.
Proceedings of the 2nd Annual Conference on Communication Networks and Services Research (CNSR 2004), 2004

Evaluation Incompleteness of Knowledge in Data Mining.
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004

2003
Use of Online Resources While Using a Clinical Information System.
Proceedings of the AMIA 2003, 2003

Sharing Infobuttons to Resolve Clinicians' Information Needs.
Proceedings of the AMIA 2003, 2003

2002
Combining Trigram and Automatic Weight Distribution in Chinese Spelling Error Correction.
J. Comput. Sci. Technol., 2002

Theoretical, empirical and practical approaches to resolving the unmet information needs of clinical information system users.
Proceedings of the AMIA 2002, 2002

2001
MI-HEART: a Comprehensive Management System to Deliver, Monitor and Measure Efficacy of Individualized Web-based Education.
Proceedings of the AMIA 2001, 2001

Harnessing Web Information Technologies for Secure, Adaptive and Individualized Health Communications.
Proceedings of the AMIA 2001, 2001

2000
An evaluation of patient access to their electronic medical records via the World Wide Web.
Proceedings of the AMIA 2000, 2000


  Loading...