Jing Hu

According to our database1, Jing Hu authored at least 15 papers between 2013 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2020
A Secure Random Key Distribution Scheme Against Node Replication Attacks in Industrial Wireless Sensor Systems.
IEEE Trans. Ind. Informatics, 2020

Better Together: Shading Cues and Multi-View Stereo for Reconstruction Depth Optimization.
IEEE Access, 2020

2019
Dynamic hand gesture recognition using motion pattern and shape descriptors.
Multim. Tools Appl., 2019

An Efficient Mutual Authentication Framework with Conditional Privacy Protection in VANET.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2019

2018
Emotion Recognition Based on Multichannel Physiological Signals with Comprehensive Nonlinear Processing.
Sensors, 2018

2017
Fusing shape and spatio-temporal features for depth-based dynamic hand gesture recognition.
Multim. Tools Appl., 2017

2015
Dynamic Trust Evaluation of Wireless Sensor Networks Based on Multi-factor.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

POSTER: API-Level Multi-policy Access Control Enforcement for Android Middleware.
Proceedings of the Security and Privacy in Communication Networks, 2015

2014
Formal Modeling and Analysis of Fairness Characterization of E-Commerce Protocols.
J. Appl. Math., 2014

Formal Analysis of Fairness for Optimistic Multiparty Contract Signing Protocol.
J. Appl. Math., 2014

A Three-Dimensional Model for Software Security Evaluation.
Proceedings of the 2014 Theoretical Aspects of Software Engineering Conference, 2014

OOPN-SRAM: A Novel Method for Software Risk Assessment.
Proceedings of the 2014 19th International Conference on Engineering of Complex Computer Systems, 2014

An Extended UML Method for the Verification of Security Protocols.
Proceedings of the 2014 19th International Conference on Engineering of Complex Computer Systems, 2014

2013
Detection Method of the Second-Order SQL Injection in Web Applications.
Proceedings of the Structured Object-Oriented Formal Language and Method, 2013

Architecture Security Evaluation Method Based on Security of the Components.
Proceedings of the 20th Asia-Pacific Software Engineering Conference, 2013


  Loading...