Jinhui Liu

Orcid: 0000-0001-8032-5099

According to our database1, Jinhui Liu authored at least 56 papers between 1995 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Part-of-speech- and syntactic-aware graph convolutional network for aspect-level sentiment classification.
Multim. Tools Appl., March, 2024

Global semantic enhancement network for video captioning.
Pattern Recognit., January, 2024

2023
ACKE: Asymmetric Computing Key Exchange Protocol for IoT Environments.
IEEE Internet Things J., October, 2023

A Publicly Verifiable E-Voting System Based on Biometrics.
Cryptogr., September, 2023

A feature aggregation and feature fusion network for retinal vessel segmentation.
Biomed. Signal Process. Control., August, 2023

Optimal Planning of Internet Data Centers Decarbonized by Hydrogen-Water-Based Energy Systems.
IEEE Trans Autom. Sci. Eng., July, 2023

TETFN: A text enhanced transformer fusion network for multimodal sentiment analysis.
Pattern Recognit., April, 2023

A post quantum secure multi-party collaborative signature with deterability in the Industrial Internet of Things.
Future Gener. Comput. Syst., April, 2023

LpiCT: A logic security analysis framework for protocols.
CoRR, 2023

An Improved Visual SLAM Algorithm Based on Graph Neural Network.
IEEE Access, 2023

Characteristic-Model Based Discrete-Time Sliding Mode Control for Attitude Tracking of Quadrotor Under Unknown Dynamics and Input Saturation.
Proceedings of the 49th Annual Conference of the IEEE Industrial Electronics Society, 2023

A Logic Encryption-Enhanced PUF Architecture to Deceive Machine Learning-Based Modeling Attacks.
Proceedings of the 32nd IEEE Asian Test Symposium, 2023

2022
Design and dynamic analysis of jumping wheel-legged robot in complex terrain environment.
Frontiers Neurorobotics, September, 2022

Lattice-Based Self-Enhancement Authorized Accessible Privacy Authentication for Cyber-Physical Systems.
Secur. Commun. Networks, 2022

Performance-oriented cache management scheme based on a retention state for energy-harvesting nonvolatile processors.
Future Gener. Comput. Syst., 2022

Adaptive Neural Network Backstepping Control Method for Aerial Manipulator Based on Variable Inertia Parameter Modeling.
CoRR, 2022

Post quantum secure fair data trading with deterability based on machine learning.
Sci. China Inf. Sci., 2022

Identification of cuproptosis-related subtypes, establishment of a prognostic model and tumor immune landscape in endometrial carcinoma.
Comput. Biol. Medicine, 2022

A Secure and Large-Scale Multiparty Conditional Payment Scheme based on Blockchain.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022


2021
KVGCN: A KNN Searching and VLAD Combined Graph Convolutional Network for Point Cloud Segmentation.
Remote. Sens., 2021

A Generic Global-to-Local Quantitative Transformation Model (GGTLQTM) for Modeling Socioeconomic Indicators From DMSP-OLS Nighttime Light Imagery.
IEEE Geosci. Remote. Sens. Lett., 2021

Zero-shot Learning via the fusion of generation and embedding for image recognition.
Inf. Sci., 2021

Post-Quantum Secure Ring Signatures for Security and Privacy in the Cybertwin-Driven 6G.
IEEE Internet Things J., 2021

Cryptanalysis of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable Family.
Int. J. Found. Comput. Sci., 2021

L2-CVAEGAN: Feature Aligned Generative Networks for Zero-Shot Learning.
Proceedings of the Image and Graphics - 11th International Conference, 2021

Few-shot Weighted Style Matching for Glaucoma Detection.
Proceedings of the Artificial Intelligence - First CAAI International Conference, 2021

2020
Communication-Aware Task Scheduling for Energy-Harvesting Nonvolatile Processors.
IEEE Trans. Very Large Scale Integr. Syst., 2020

Improved Security of a Pairing-Free Certificateless Aggregate Signature in Healthcare Wireless Medical Sensor Networks.
IEEE Internet Things J., 2020

A PUF-based Scheme for Identify Trusted Mobile Phone Accessories.
Proceedings of the International Conference on Networking and Network Applications, 2020

Nonlinear Disturbance Observer Based Adaptive Backstepping Control for Trajectory Tracking of Aerial Parallel Manipulator.
Proceedings of the 46th Annual Conference of the IEEE Industrial Electronics Society, 2020

Leaping from 2D Detection to Efficient 6DoF Object Pose Estimation.
Proceedings of the Computer Vision - ECCV 2020 Workshops, 2020

Optimal Scheduling of Distributed Hydrogen-based Multi-Energy Systems for Building Energy Cost and Carbon Emission Reduction.
Proceedings of the 16th IEEE International Conference on Automation Science and Engineering, 2020

Intelligent Monitoring Technology of the Substation Based on the Micro System.
Proceedings of the International Conference on Artificial Intelligence and Computer Vision, 2020

2019
Parallel Runtime Verification Approach for Alternate Execution of Multiple Threads.
Proceedings of the Structured Object-Oriented Formal Language and Method, 2019

Lattice Based Verifiably Encrypted Double Authentication Preventing Signatures.
Proceedings of the Network and System Security - 13th International Conference, 2019

Research on the Implementation Plan of the Intelligent Substation Based on the Micro System.
Proceedings of the Advances in Natural Computation, Fuzzy Systems and Knowledge Discovery - Proceedings of the 15th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD 2019), Kunming, China, July 20-22, 2019, 2019

2018
Structural Key Recovery of Simple Matrix Encryption Scheme Family.
Comput. J., 2018

An Efficient Privacy Preserving Batch Authentication Scheme with Deterable Function for VANETs.
Proceedings of the Network and System Security - 12th International Conference, 2018

An Efficient Anonymous Authentication Scheme Based on Double Authentication Preventing Signature for Mobile Healthcare Crowd Sensing.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2016
Ts-RBAC: A RBAC model with transformation.
Comput. Secur., 2016

Cryptanalysis of an asymmetric cipher protocol using a matrix decomposition problem.
Sci. China Inf. Sci., 2016

Moving Object Detection with ViBe and Texture Feature.
Proceedings of the Advances in Multimedia Information Processing - PCM 2016, 2016

A Linear Algebra Attack on the Non-commuting Cryptography Class Based on Matrix Power Function.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

2015
Improved Biba model based on trusted computing.
Secur. Commun. Networks, 2015

A public key cryptosystem based on data complexity under quantum environment.
Sci. China Inf. Sci., 2015

2011
Evaluation Strategies for Top-k Queries over Memory-Resident Inverted Indexes.
Proc. VLDB Endow., 2011

2009
Research on Water Environmental Quality Assessment of Fu River with BP NN.
Proceedings of the 2009 International Conference on Environmental Science and Information Application Technology, 2009

2008
Trade-Off Driven Hybrid Wideband Source Localization Algorithm for Acoustic Sensors.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

2005
Intelligent Taxonomy Management Tools for Enterprise Content.
Proceedings of the 2005 IEEE / WIC / ACM International Conference on Web Intelligence (WI 2005), 2005

2002
Neural networks with enhanced outlier rejection ability for off-line handwritten word recognition.
Pattern Recognit., 2002

Thematic mapping - from unstructured documents to taxonomies.
Proceedings of the 2002 ACM CIKM International Conference on Information and Knowledge Management, 2002

2000
Image-based form document retrieval.
Pattern Recognit., 2000

Outlier Rejection with MLPs and Variants of RBF Networks.
Proceedings of the 15th International Conference on Pattern Recognition, 2000

1998
Evaluation and Application of Recognition Confidence in OCR.
Proceedings of the Computer Vision, 1998

1995
Description and recognition of form and automated form data entry.
Proceedings of the Third International Conference on Document Analysis and Recognition, 1995


  Loading...