Kai Fan

According to our database1, Kai Fan authored at least 116 papers between 2004 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Cloud-based RFID mutual authentication scheme for efficient privacy preserving in IoV.
J. Frankl. Inst., 2021

2020
A Secure and Verifiable Data Sharing Scheme Based on Blockchain in Vehicular Social Networks.
IEEE Trans. Veh. Technol., 2020

A dynamic and verifiable multi-keyword ranked search scheme in the P2P networking environment.
Peer Peer Netw. Appl., 2020

A secure and efficient outsourced computation on data sharing scheme for privacy computing.
J. Parallel Distributed Comput., 2020

Cloud-based lightweight secure RFID mutual authentication protocol in IoT.
Inf. Sci., 2020

Computer Assisted Translation with Neural Quality Estimation and Automatic Post-Editing.
CoRR, 2020

A Practical Framework for Relation Extraction with Noisy Labels Based on Doubly Transitional Loss.
CoRR, 2020

Exact Solutions of Damped Improved Boussinesq Equations by Extended (G′/G)-Expansion Method.
Complex., 2020

Privacy-preserving searchable encryption in the intelligent edge computing.
Comput. Commun., 2020

The Effectiveness Assessment of Massage Therapy Using Entropy-Based EEG Features Among Lumbar Disc Herniation Patients Comparing With Healthy Controls.
IEEE Access, 2020

A Collaborative Auditing Blockchain for Trustworthy Data Integrity in Cloud Storage System.
IEEE Access, 2020

Neural Zero-Inflated Quality Estimation Model for Automatic Speech Recognition System.
Proceedings of the Interspeech 2020, 2020

A Weight-based k-prototypes Algorithm for Anomaly Detection in Smart Grid.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

An Ensemble Learning Approach to Detect Malwares Based on Static Information.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

Long-Short Term Masking Transformer: A Simple but Effective Baseline for Document-level Neural Machine Translation.
Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing, 2020

Computer Assisted Translation with Neural Quality Estimation and Auotmatic Post-Editing.
Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing: Findings, 2020

2019
Permutation Matrix Encryption Based Ultralightweight Secure RFID Scheme in Internet of Vehicles.
Sensors, 2019

Classification of Imbalanced Dataset Based on Random Walk Model.
Rev. d'Intelligence Artif., 2019

A Lightweight Authentication Scheme for Cloud-Based RFID Healthcare Systems.
IEEE Netw., 2019

Blockchain-Based Secure Time Protection Scheme in IoT.
IEEE Internet Things J., 2019

Efficient and privacy preserving access control scheme for fog-enabled IoT.
Future Gener. Comput. Syst., 2019

A blockchain-based clock synchronization Scheme in IoT.
Future Gener. Comput. Syst., 2019

Neural Zero-Inflated Quality Estimation Model For Automatic Speech Recognition System.
CoRR, 2019

An Efficient Multi-Message and Multi-Receiver Signcryption Scheme for Heterogeneous Smart Mobile IoT.
IEEE Access, 2019

A Novel Attribute-Based Access Control Scheme Using Blockchain for IoT.
IEEE Access, 2019

GPU Acceleration of Ciphertext-Policy Attribute-Based Encryption.
Proceedings of the 20th IEEE/ACIS International Conference on Software Engineering, 2019

InverseNet: Solving Inverse Problems of Multimedia Data with Splitting Networks.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2019

A Secure Cross-Domain Access Control Scheme in Social Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Unsupervised Multi-Modal Neural Machine Translation.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019

Lattice Transformer for Speech Translation.
Proceedings of the 57th Conference of the Association for Computational Linguistics, 2019

Improving Distantly Supervised Relation Extraction with Neural Noise Converter and Conditional Optimal Selector.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

"Bilingual Expert" Can Find Translation Errors.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
Lightweight RFID Protocol for Medical Privacy Protection in IoT.
IEEE Trans. Ind. Informatics, 2018

EARS-DM: Efficient Auto Correction Retrieval Scheme for Data Management in Edge Computing.
Sensors, 2018

Secure, efficient and revocable data sharing scheme for vehicular fogs.
Peer Peer Netw. Appl., 2018

Secure ultra-lightweight RFID mutual authentication protocol based on transparent computing for IoV.
Peer Peer Netw. Appl., 2018

Secure and private key management scheme in big data networking.
Peer Peer Netw. Appl., 2018

Secure and Efficient Privacy-Preserving Ciphertext Retrieval in Connected Vehicular Cloud Computing.
IEEE Netw., 2018

MedBlock: Efficient and Secure Medical Data Sharing Via Blockchain.
J. Medical Syst., 2018

Cloud-based radio frequency identification authentication protocol with location privacy protection.
Int. J. Distributed Sens. Networks, 2018

Blockchain-based efficient privacy preserving and data sharing scheme of content-centric network in 5G.
IET Commun., 2018

"Bilingual Expert" Can Find Translation Errors.
CoRR, 2018

Alibaba Submission for WMT18 Quality Estimation Task.
Proceedings of the Third Conference on Machine Translation: Shared Task Papers, 2018

Secure Time Synchronization Scheme in IoT Based on Blockchain.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Non-Smooth Control of PMSM Position Servo System Based on Model Compensation.
Proceedings of the IECON 2018, 2018

Cross-Domain Based Data Sharing Scheme in Cooperative Edge Computing.
Proceedings of the 2018 IEEE International Conference on Edge Computing, 2018

Zero-Shot Learning via Class-Conditioned Deep Generative Models.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
Deep Generative Models and Biological Applications.
PhD thesis, 2017

A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing.
Sensors, 2017

NFC Secure Payment and Verification Scheme with CS E-Ticket.
Secur. Commun. Networks, 2017

Proxy-assisted access control scheme of cloud data for smart cities.
Pers. Ubiquitous Comput., 2017

An ultra-lightweight RFID authentication scheme for mobile commerce.
Peer Peer Netw. Appl., 2017

ULMAP: Ultralightweight NFC Mutual Authentication Protocol with Pseudonyms in the Tag for IoT in 5G.
Mob. Inf. Syst., 2017

InverseNet: Solving Inverse Problems with Splitting Networks.
CoRR, 2017

An Attack to an Anonymous Certificateless Group Key Agreement Scheme and Its Improvement.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

An inner-loop free solution to inverse problems using deep neural networks.
Proceedings of the Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017, 2017

Failure Resilient Routing via IoT Networks.
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017

Adversarial Feature Matching for Text Generation.
Proceedings of the 34th International Conference on Machine Learning, 2017

Multi-Keyword Fuzzy and Sortable Ciphertext Retrieval Scheme for Big Data.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Cloud-Based Lightweight RFID Mutual Authentication Protocol.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

U2F based secure mutual authentication protocol for mobile payment.
Proceedings of the ACM Turing 50th Celebration Conference, 2017

2016
Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G.
Secur. Commun. Networks, 2016

Differentially Private Data Releasing for Smooth Queries.
J. Mach. Learn. Res., 2016

A Secure RFID Application Revocation Scheme for IoT.
IEICE Trans. Inf. Syst., 2016

Boosting Variational Inference.
CoRR, 2016

A finite difference scheme for semilinear space-fractional diffusion equations with time delay.
Appl. Math. Comput., 2016

NFC Secure Payment and Verification Scheme for Mobile Payment.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

Towards Unifying Hamiltonian Monte Carlo and Slice Sampling.
Proceedings of the Advances in Neural Information Processing Systems 29: Annual Conference on Neural Information Processing Systems 2016, 2016

Triply Stochastic Variational Inference for Non-linear Beta Process Factor Analysis.
Proceedings of the IEEE 16th International Conference on Data Mining, 2016

Privacy protection based access control scheme in cloud-based services.
Proceedings of the 2016 IEEE/CIC International Conference on Communications in China, 2016

Cloud-Based Lightweight RFID Healthcare Privacy Protection Protocol.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

High-Order Stochastic Gradient Thermostats for Bayesian Learning of Deep Models.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

A Unifying Variational Inference Framework for Hierarchical Graph-Coupled HMM with an Application to Influenza Infection.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

2015
Adaptive Sensing Private Property Protection Protocol Based on Cloud.
Int. J. Distributed Sens. Networks, 2015

ULRAS: Ultra-Lightweight RFID Authentication Scheme for Mobile Device.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

RFID Secure Application Revocation for IoT in 5G.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Fast Second Order Stochastic Backpropagation for Variational Inference.
Proceedings of the Advances in Neural Information Processing Systems 28: Annual Conference on Neural Information Processing Systems 2015, 2015

Hierarchical Graph-Coupled HMMs for Heterogeneous Personalized Health Data.
Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2015

Ciphertext Retrieval in Super-Peer P2P Network.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Secure and Efficient Personal Health Record Scheme Using Attribute-Based Encryption.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
Learning a generative classifier from label proportions.
Neurocomputing, 2014

RSEL: revocable secure efficient lightweight RFID authentication scheme.
Concurr. Comput. Pract. Exp., 2014

LRMAPC: A Lightweight RFID Mutual Authentication Protocol with Cache in the Reader for IoT.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014

2013
Design of satellite TV antenna control system for car carrying.
Int. J. Wirel. Mob. Comput., 2013

Efficient Algorithm for Privately Releasing Smooth Queries.
Proceedings of the Advances in Neural Information Processing Systems 26: 27th Annual Conference on Neural Information Processing Systems 2013. Proceedings of a meeting held December 5-8, 2013

An Adaptive Feedback Load Balancing Algorithm in HDFS.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

2012
Fairness electronic payment protocol.
Int. J. Grid Util. Comput., 2012

A new proxy blind signature scheme.
Int. J. Grid Util. Comput., 2012

Estimation Based on RBM from Label Proportions in Large Group Case.
Proceedings of the Intelligent Science and Intelligent Data Engineering, 2012

ESLRAS: A Lightweight RFID Authentication Scheme with High Efficiency and Strong Security for Internet of Things.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Smart-blocking file storage method in cloud computing.
Proceedings of the 2012 1st IEEE International Conference on Communications in China (ICCC), 2012

A Novel Burst-based Text Representation Model for Scalable Event Detection.
Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics, Proceedings of the Conference, July 8-14, 2012, Jeju Island, Korea, 2012

2011
Digital calibration technique for A 14-bit 125-MS/s pipelined ADC using PN dithering.
Proceedings of the International Symposium on Intelligent Signal Processing and Communications Systems, 2011

Fast Parallel Computation of Tate Pairing.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

Abuse-freeness Electronic Payment Protocol.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

Forward Secure Proxy Blind Signature Scheme.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

2010
Efficient ID-based registration protocol featured with user anonymity in mobile IP networks.
IEEE Trans. Wirel. Commun., 2010

Integration of fuzzy AHP and FPP with TOPSIS methodology for aeroengine health assessment.
Expert Syst. Appl., 2010

2009
A comparative study of the canonical genetic algorithm and a real-valued quantum-inspired evolutionary algorithm.
Int. J. Intell. Comput. Cybern., 2009

A Load-Balanced Route Selection for Network Coding in Wireless Mesh Networks.
Proceedings of IEEE International Conference on Communications, 2009

A New Abuse-Free Fair Electronic Payment Protocol.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Security Analysis of the Kerberos Protocol Using BAN Logic.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Calibration of the VGSSDOption Pricing Model using a Quantum-inspired Evolutionary Algorithm.
Proceedings of the Quantum Inspired Intelligent Systems, 2008

Non-linear Principal Component Analysis of the Implied Volatility Smile using a Quantum-inspired Evolutionary Algorithm.
Proceedings of the Natural Computing in Computational Finance, 2008

A full vectorial generalized discontinuous Galerkin beam propagation method (GDG-BPM) for nonsmooth electromagnetic fields in waveguides.
J. Comput. Phys., 2008

A generalized discontinuous Galerkin (GDG) method for Schrödinger equations with nonsmooth solutions.
J. Comput. Phys., 2008

Quantum-Inspired Evolutionary Algorithms for Financial Data Analysis.
Proceedings of the Applications of Evolutionary Computing, 2008

Benchmarking the performance of the real-valued Quantum-inspired Evolutionary Algorithm.
Proceedings of the IEEE Congress on Evolutionary Computation, 2008

2007
Watermarking protocol of secure verification.
J. Electronic Imaging, 2007

Mobile ip registration in certificateless public key infrastructure.
IET Inf. Secur., 2007

Option pricing model calibration using a real-valued quantum-inspired evolutionary algorithm.
Proceedings of the Genetic and Evolutionary Computation Conference, 2007

Quantum-Inspired Evolutionary Algorithms for Calibration of the <i>VG</i> Option Pricing Model.
Proceedings of the Applications of Evolutinary Computing, 2007

A Watermarking Scheme in the Encrypted Domain for Watermarking Protocol.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

Adaptive Encrypted Information Hiding Scheme for Images.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

2006
An Traceable Electronic Cash Model Based on Group Signature.
Proceedings of the 2006 International Conference on E-Learning, 2006

2004
A Secure Steganography Scheme Based on (N, t) Threshold.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004


  Loading...