Le Su

According to our database1, Le Su authored at least 25 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Learning modality-invariant binary descriptor for crossing palmprint to palm-vein recognition.
Pattern Recognit. Lett., August, 2023

2022
Operon: An Encrypted Database for Ownership-Preserving Data Management.
Proc. VLDB Endow., 2022

HEDA: Multi-Attribute Unbounded Aggregation over Homomorphically Encrypted Database.
Proc. VLDB Endow., 2022

2021
Achieving Privacy-Preserving and Verifiable Data Sharing in Vehicular Fog With Blockchain.
IEEE Trans. Intell. Transp. Syst., 2021

The Next Decade of Telecommunications Artificial Intelligence.
CoRR, 2021

2020
Application Behaviors Driven Self-Organizing Network (SON) for 4G LTE Networks.
IEEE Trans. Netw. Sci. Eng., 2020

A Novel Anomaly Detection Framework for LTE/VoLTE/VoWiFi Performance at Device-model Level.
Proceedings of the 2020 Wireless Telecommunications Symposium, 2020

2019
P2P: From Packets to Pepole, Leverage Wireless Artifical Intelligence for Bridging Network Performance Healthiness to Quality of Experience (QoE) in 4G Networks.
Proceedings of the 2019 Wireless Telecommunications Symposium, 2019

A Machine Learning Assisted Method of Coverage and Capacity Optimization (CCO) in 4G LTE Self Organizing Networks (SON).
Proceedings of the 2019 Wireless Telecommunications Symposium, 2019

Securing Intelligent Transportation System: A Blockchain-Based Approach with Attack Mitigation.
Proceedings of the Smart Blockchain - Second International Conference, 2019

2018
Data-driven human model estimation for realtime motion capture.
J. Vis. Lang. Comput., 2018

Anomaly Detection and Attribution in Networks With Temporally Correlated Traffic.
IEEE/ACM Trans. Netw., 2018

Detecting traffic anomaly in wireless networks, an analytics methodology.
Proceedings of the 2018 Wireless Telecommunications Symposium, 2018

Cascaded 3D Full-Body Pose Regression from Single Depth Image at 100 FPS.
Proceedings of the 2018 IEEE Conference on Virtual Reality and 3D User Interfaces, 2018

Automated Botnet Traffic Detection via Machine Learning.
Proceedings of the TENCON 2018, 2018

BIFF: A Blockchain-based IoT Forensics Framework with Identity Privacy.
Proceedings of the TENCON 2018, 2018

Privacy preserving IP traceback.
Proceedings of the IEEE 4th International Conference on Identity, 2018

2017
Toward accurate real-time marker labeling for live optical motion capture.
Vis. Comput., 2017

REX: Resilient and efficient data structure for tracking network flows.
Comput. Networks, 2017

APP-SON: Application characteristics-driven SON to optimize 4G/5G network performance and quality of experience.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

2015
SLIC: Self-Learning Intelligent Classifier for network traffic.
Comput. Networks, 2015

2014
Spatial encryption supporting non-monotone access structure.
Des. Codes Cryptogr., 2014

2013
Revocable IBE Systems with Almost Constant-size Key Update.
IACR Cryptol. ePrint Arch., 2013

2012
Anonymous and Adaptively Secure Revocable IBE with Constant Size Public Parameters
CoRR, 2012

2010
Quantitative modeling and simulation of Anterior Chamber in OCT images.
Proceedings of the Fifth International Conference on Bio-Inspired Computing: Theories and Applications, 2010


  Loading...