Kai Fan
According to our database1,
Kai Fan
authored at least 116 papers
between 2004 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis OtherLinks
On csauthors.net:
Bibliography
2021
Cloud-based RFID mutual authentication scheme for efficient privacy preserving in IoV.
J. Frankl. Inst., 2021
2020
A Secure and Verifiable Data Sharing Scheme Based on Blockchain in Vehicular Social Networks.
IEEE Trans. Veh. Technol., 2020
A dynamic and verifiable multi-keyword ranked search scheme in the P2P networking environment.
Peer Peer Netw. Appl., 2020
A secure and efficient outsourced computation on data sharing scheme for privacy computing.
J. Parallel Distributed Comput., 2020
Inf. Sci., 2020
Computer Assisted Translation with Neural Quality Estimation and Automatic Post-Editing.
CoRR, 2020
A Practical Framework for Relation Extraction with Noisy Labels Based on Doubly Transitional Loss.
CoRR, 2020
Exact Solutions of Damped Improved Boussinesq Equations by Extended (G′/G)-Expansion Method.
Complex., 2020
Comput. Commun., 2020
The Effectiveness Assessment of Massage Therapy Using Entropy-Based EEG Features Among Lumbar Disc Herniation Patients Comparing With Healthy Controls.
IEEE Access, 2020
A Collaborative Auditing Blockchain for Trustworthy Data Integrity in Cloud Storage System.
IEEE Access, 2020
Neural Zero-Inflated Quality Estimation Model for Automatic Speech Recognition System.
Proceedings of the Interspeech 2020, 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020
Long-Short Term Masking Transformer: A Simple but Effective Baseline for Document-level Neural Machine Translation.
Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing, 2020
Computer Assisted Translation with Neural Quality Estimation and Auotmatic Post-Editing.
Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing: Findings, 2020
2019
Permutation Matrix Encryption Based Ultralightweight Secure RFID Scheme in Internet of Vehicles.
Sensors, 2019
Rev. d'Intelligence Artif., 2019
IEEE Netw., 2019
Future Gener. Comput. Syst., 2019
Future Gener. Comput. Syst., 2019
Neural Zero-Inflated Quality Estimation Model For Automatic Speech Recognition System.
CoRR, 2019
An Efficient Multi-Message and Multi-Receiver Signcryption Scheme for Heterogeneous Smart Mobile IoT.
IEEE Access, 2019
IEEE Access, 2019
Proceedings of the 20th IEEE/ACIS International Conference on Software Engineering, 2019
Proceedings of the IEEE International Conference on Multimedia and Expo, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019
Proceedings of the 57th Conference of the Association for Computational Linguistics, 2019
Improving Distantly Supervised Relation Extraction with Neural Noise Converter and Conditional Optimal Selector.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019
2018
IEEE Trans. Ind. Informatics, 2018
EARS-DM: Efficient Auto Correction Retrieval Scheme for Data Management in Edge Computing.
Sensors, 2018
Peer Peer Netw. Appl., 2018
Secure ultra-lightweight RFID mutual authentication protocol based on transparent computing for IoV.
Peer Peer Netw. Appl., 2018
Peer Peer Netw. Appl., 2018
Secure and Efficient Privacy-Preserving Ciphertext Retrieval in Connected Vehicular Cloud Computing.
IEEE Netw., 2018
J. Medical Syst., 2018
Cloud-based radio frequency identification authentication protocol with location privacy protection.
Int. J. Distributed Sens. Networks, 2018
Blockchain-based efficient privacy preserving and data sharing scheme of content-centric network in 5G.
IET Commun., 2018
Proceedings of the Third Conference on Machine Translation: Shared Task Papers, 2018
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
Proceedings of the IECON 2018, 2018
Proceedings of the 2018 IEEE International Conference on Edge Computing, 2018
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018
2017
Sensors, 2017
Secur. Commun. Networks, 2017
Pers. Ubiquitous Comput., 2017
Peer Peer Netw. Appl., 2017
ULMAP: Ultralightweight NFC Mutual Authentication Protocol with Pseudonyms in the Tag for IoT in 5G.
Mob. Inf. Syst., 2017
An Attack to an Anonymous Certificateless Group Key Agreement Scheme and Its Improvement.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Proceedings of the Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017, 2017
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017
Proceedings of the 34th International Conference on Machine Learning, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
Proceedings of the ACM Turing 50th Celebration Conference, 2017
2016
Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G.
Secur. Commun. Networks, 2016
A finite difference scheme for semilinear space-fractional diffusion equations with time delay.
Appl. Math. Comput., 2016
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016
Proceedings of the Advances in Neural Information Processing Systems 29: Annual Conference on Neural Information Processing Systems 2016, 2016
Proceedings of the IEEE 16th International Conference on Data Mining, 2016
Proceedings of the 2016 IEEE/CIC International Conference on Communications in China, 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016
A Unifying Variational Inference Framework for Hierarchical Graph-Coupled HMM with an Application to Influenza Infection.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016
2015
Int. J. Distributed Sens. Networks, 2015
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the Advances in Neural Information Processing Systems 28: Annual Conference on Neural Information Processing Systems 2015, 2015
Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2015
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
2014
Concurr. Comput. Pract. Exp., 2014
LRMAPC: A Lightweight RFID Mutual Authentication Protocol with Cache in the Reader for IoT.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014
2013
Int. J. Wirel. Mob. Comput., 2013
Proceedings of the Advances in Neural Information Processing Systems 26: 27th Annual Conference on Neural Information Processing Systems 2013. Proceedings of a meeting held December 5-8, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
2012
Proceedings of the Intelligent Science and Intelligent Data Engineering, 2012
ESLRAS: A Lightweight RFID Authentication Scheme with High Efficiency and Strong Security for Internet of Things.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
Proceedings of the 2012 1st IEEE International Conference on Communications in China (ICCC), 2012
Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics, Proceedings of the Conference, July 8-14, 2012, Jeju Island, Korea, 2012
2011
Digital calibration technique for A 14-bit 125-MS/s pipelined ADC using PN dithering.
Proceedings of the International Symposium on Intelligent Signal Processing and Communications Systems, 2011
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011
2010
Efficient ID-based registration protocol featured with user anonymity in mobile IP networks.
IEEE Trans. Wirel. Commun., 2010
Integration of fuzzy AHP and FPP with TOPSIS methodology for aeroengine health assessment.
Expert Syst. Appl., 2010
2009
A comparative study of the canonical genetic algorithm and a real-valued quantum-inspired evolutionary algorithm.
Int. J. Intell. Comput. Cybern., 2009
Proceedings of IEEE International Conference on Communications, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
Calibration of the VGSSDOption Pricing Model using a Quantum-inspired Evolutionary Algorithm.
Proceedings of the Quantum Inspired Intelligent Systems, 2008
Non-linear Principal Component Analysis of the Implied Volatility Smile using a Quantum-inspired Evolutionary Algorithm.
Proceedings of the Natural Computing in Computational Finance, 2008
A full vectorial generalized discontinuous Galerkin beam propagation method (GDG-BPM) for nonsmooth electromagnetic fields in waveguides.
J. Comput. Phys., 2008
A generalized discontinuous Galerkin (GDG) method for Schrödinger equations with nonsmooth solutions.
J. Comput. Phys., 2008
Proceedings of the Applications of Evolutionary Computing, 2008
Benchmarking the performance of the real-valued Quantum-inspired Evolutionary Algorithm.
Proceedings of the IEEE Congress on Evolutionary Computation, 2008
2007
IET Inf. Secur., 2007
Option pricing model calibration using a real-valued quantum-inspired evolutionary algorithm.
Proceedings of the Genetic and Evolutionary Computation Conference, 2007
Quantum-Inspired Evolutionary Algorithms for Calibration of the <i>VG</i> Option Pricing Model.
Proceedings of the Applications of Evolutinary Computing, 2007
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
Proceedings of the Computational Intelligence and Security, International Conference, 2007
2006
An Traceable Electronic Cash Model Based on Group Signature.
Proceedings of the 2006 International Conference on E-Learning, 2006
2004
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004