Li Lin

According to our database1, Li Lin authored at least 146 papers between 1991 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Rapid Flood Progress Monitoring in Cropland with NASA SMAP.
Remote Sensing, 2019

Improvement and Validation of NASA/MODIS NRT Global Flood Mapping.
Remote Sensing, 2019

SFAD: Toward effective anomaly detection based on session feature similarity.
Knowl.-Based Syst., 2019

Exploring cloud-based Web Processing Service: A case study on the implementation of CMAQ as a Service.
Environmental Modelling and Software, 2019

Echo: An Edge-Centric Code Offloading System With Quality of Service Guarantee.
IEEE Access, 2019

2018
Achieving Incentive, Security, and Scalable Privacy Protection in Mobile Crowdsensing Services.
Wireless Communications and Mobile Computing, 2018

Building neural network language model with POS-based negative sampling and stochastic conjugate gradient descent.
Soft Comput., 2018

Estimation of Leaf Nitrogen Content in Wheat Using New Hyperspectral Indices and a Random Forest Regression Algorithm.
Remote Sensing, 2018

Fine-Grained Scheduling in Cloud Gaming on Heterogeneous CPU-GPU Clusters.
IEEE Network, 2018

The Development of an Intelligent Monitoring System for Agricultural Inputs Basing on DBN-SOFTMAX.
J. Sensors, 2018

Estimating the causal effects of chronic disease combinations on 30-day hospital readmissions based on observational Medicaid data.
JAMIA, 2018

Affective Image Classification Based on User Eye Movement and EEG Experience Information.
Interacting with Computers, 2018

Remaining useful life estimation of engineered systems using vanilla LSTM neural networks.
Neurocomputing, 2018

Time Synchronization Algorithm for Wireless Sensor Networks Based on Frequency Offset Estimation.
iJOE, 2018

A Detection and Defense Technology for Information-stealing and Deceitful Trojan Viruses Based on Behavioral Features.
I. J. Network Security, 2018

CyberConnector: a service-oriented system for automatically tailoring multisource Earth observation data to feed Earth science models.
Earth Science Informatics, 2018

Improved meet-in-the-middle attacks on reduced-round Kalyna-128/256 and Kalyna-256/512.
Des. Codes Cryptography, 2018

PriGuarder: A Privacy-Aware Access Control Approach Based on Attribute Fuzzy Grouping in Cloud Environments.
IEEE Access, 2018

Buffer-Aware Data Migration Scheme for Hybrid Storage Systems.
IEEE Access, 2018

Whether Android Applications Broadcast Your Private information: A Naive Bayesian-based Analysis Approach (S).
Proceedings of the 30th International Conference on Software Engineering and Knowledge Engineering, 2018

Domain Adaptation in Steganalysis for the Spatial Domain.
Proceedings of the Media Watermarking, Security, and Forensics 2018, Burlingame, CA, USA, 28 January 2018, 2018

DVDI: A New Remotely Sensed Index for Measuring Vegetation Damage Caused by Natural Disasters.
Proceedings of the 2018 IEEE International Geoscience and Remote Sensing Symposium, 2018

Forensic Analysis of Android Steganography Apps.
Proceedings of the Advances in Digital Forensics XIV, 2018

RLRecommender: A Representation-Learning-Based Recommendation Method for Business Process Modeling.
Proceedings of the Service-Oriented Computing - 16th International Conference, 2018

The Impact of Exposure Settings in Digital Image Forensics.
Proceedings of the 2018 IEEE International Conference on Image Processing, 2018

2017
GeoFairy: Towards a one-stop and location based Service for Geospatial Information Retrieval.
Computers, Environment and Urban Systems, 2017

Meet-in-the-Middle Attacks on Reduced-Round Midori64.
IACR Trans. Symmetric Cryptol., 2017

Joint Hierarchical Category Structure Learning and Large-Scale Image Classification.
IEEE Trans. Image Processing, 2017

Fuzzy clustering algorithms for identification of Exocarpium Citrus Grandis through chromatography.
Soft Comput., 2017

An Optimal Page-Level Power Management Strategy in PCM-DRAM Hybrid Memory.
International Journal of Parallel Programming, 2017

ShareRender: Bypassing GPU Virtualization to Enable Fine-grained Resource Sharing for Cloud Gaming.
Proceedings of the 2017 ACM on Multimedia Conference, 2017

Improved Automatic Search Tool for Related-Key Differential Characteristics on Byte-Oriented Block Ciphers.
Proceedings of the Information Security - 20th International Conference, 2017

5.10 A 1A LDO regulator driven by a 0.0013mm2 Class-D controller.
Proceedings of the 2017 IEEE International Solid-State Circuits Conference, 2017

13.7 A 0.23mm2 digital power amplifier with hybrid time/amplitude control achieving 22.5dBm at 28% PAE for 802.11g.
Proceedings of the 2017 IEEE International Solid-State Circuits Conference, 2017

Moving Objects Detection in Video Sequences Captured by a PTZ Camera.
Proceedings of the Image and Graphics - 9th International Conference, 2017

Workload-Aware Page-Level Flash Translation Layer for NAND Flash-Based Storage Systems.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

Scene Text Detection with Text Statistical Characteristics and Deep Neural Network.
Proceedings of the Computer Vision - Second CCF Chinese Conference, 2017

2016
LiveRender: A Cloud Gaming System Based on Compressed Graphics Streaming.
IEEE/ACM Trans. Netw., 2016

A Phase Behavior Aware Dynamic Cache Partitioning Scheme for CMPs.
International Journal of Parallel Programming, 2016

TVGuarder: A Trace-Enable Virtualization Protection Framework against Insider Threats for IaaS Environments.
IJGHPC, 2016

PQsel: combining privacy with quality of service in cloud service selection.
IJBDI, 2016

Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE (Full Version).
IACR Cryptology ePrint Archive, 2016

Improved Meet-in-the-Middle Attacks on Reduced-Round Kalyna-128/256 and Kalyna-256/512.
IACR Cryptology ePrint Archive, 2016

Packet: a privacy-aware access control policy composition method for services composition in cloud environments.
Frontiers Comput. Sci., 2016

Internet Addiction Among College Students in China: Prevalence and Psychosocial Correlates.
Cyberpsy., Behavior, and Soc. Networking, 2016

Hierarchical Traffic Sign Recognition.
Proceedings of the Advances in Multimedia Information Processing - PCM 2016, 2016

9.4 A 2×2 WLAN and Bluetooth combo SoC in 28nm CMOS with on-chip WLAN digital power amplifier, integrated 2G/BT SP3T switch and BT pulling cancelation.
Proceedings of the 2016 IEEE International Solid-State Circuits Conference, 2016

9.6 A 2.7-to-4.3GHz, 0.16psrms-jitter, -246.8dB-FOM, digital fractional-N sampling PLL in 28nm CMOS.
Proceedings of the 2016 IEEE International Solid-State Circuits Conference, 2016

RFE-SVM for discrimination of Pericarpium Citri Reticulatae through chromatography.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2016

Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE.
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016

Saphena: An Approach for Analyzing Similarity of Heterogeneous Policies in Cloud Environment.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

A Cluster-Based Intrusion Detection Framework for Monitoring the Traffic of Cloud Environments.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

2015
Meet-in-the-Middle Attacks on Reduced-Round Midori-64.
IACR Cryptology ePrint Archive, 2015

Improved Meet-in-the-Middle Distinguisher on Feistel Schemes.
IACR Cryptology ePrint Archive, 2015

SoTree: An Automated Phylogeny Assembly Tool for Ecologists from Big Tree.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom 2015, 2015

Improved Meet-in-the-Middle Distinguisher on Feistel Schemes.
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015

Text Localization with Hierarchical Multiple Feature Learning.
Proceedings of the Advances in Multimedia Information Processing - PCM 2015, 2015

Session 9 overview: High-performance wireless: Wireless subcommittee.
Proceedings of the 2015 IEEE International Solid-State Circuits Conference, 2015

9.4 A 28nm CMOS digital fractional-N PLL with -245.5dB FOM and a frequency tripler for 802.11abgn/ac radio.
Proceedings of the 2015 IEEE International Solid-State Circuits Conference, 2015

RbacIP: A RBAC-Based Method for Intercepting and Processing Malicious Applications in Android Platform.
Proceedings of the Trusted Systems - 7th International Conference, 2015

Accelerating Crowdsourcing Based Indoor Localization Using CSI.
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015

Binary image segmentation based on optimized parallel K-means.
Proceedings of the Seventh International Conference on Digital Image Processing, 2015

Mapping the topic evolution using citation-topic model and social network analysis.
Proceedings of the 12th International Conference on Fuzzy Systems and Knowledge Discovery, 2015

The Designing and Construction of Domain-oriented Vietnamese-English-Chinese FrameNet.
Proceedings of the Chinese Computational Linguistics and Natural Language Processing Based on Naturally Annotated Big Data, 2015

Cost-Effective Hybrid Replacement Strategy for SSD in Web Cache.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
Meta-analytic comparison on the influencing factors of knowledge transfer in different cultural contexts.
J. Knowledge Management, 2014

Bilinear Grid Search Strategy Based Support Vector Machines Learning Method.
Informatica (Slovenia), 2014

The rise and growth of entrepreneurial companies in China: case study of two ventures (1994-2010).
IJSTM, 2014

A 7 bit 1 GS/s pipelined folding and interpolating ADC with coarse-stage-free joint encoding.
IEICE Electronic Express, 2014

An adaptive switching scheme for iterative computing in the cloud.
Frontiers Comput. Sci., 2014

Following the trail: understanding information flow in the emergency department.
Cognition, Technology & Work, 2014

Research on Operating Mechanism of Collaborative Commerce Based on Business Intelligence System - - An Analysis of the Application of Business Intelligence in Retail Enterprises.
Proceedings of the Thirteenth Wuhan International Conference on E-Business, 2014

Identifying Gender of Microblog Users Based on Message Mining.
Proceedings of the Web-Age Information Management - 15th International Conference, 2014

Probabilistic ensemble learning for vietnamese word segmentation.
Proceedings of the 37th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2014

Modeling and simulation of EAST flexible in-vessel inspection robot based on absolute nodal coordinate formulation.
Proceedings of the 2014 IEEE International Conference on Robotics and Biomimetics, 2014

A swarm framework for teaching elementary addition operations.
Proceedings of the 2014 IEEE International Conference on Robotics and Biomimetics, 2014

Using Mobile Cloud Computing for Real-Time Online Applications.
Proceedings of the 2nd IEEE International Conference on Mobile Cloud Computing, 2014

LiveRender: A Cloud Gaming System Based on Compressed Graphics Streaming.
Proceedings of the ACM International Conference on Multimedia, MM '14, Orlando, FL, USA, November 03, 2014

Bringing mobile online games to clouds.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

A privacy-aware cloud service selection method toward data life-cycle.
Proceedings of the 20th IEEE International Conference on Parallel and Distributed Systems, 2014

Structure Context Clues for Chinese Text Detection.
Proceedings of the International Conference on Internet Multimedia Computing and Service, 2014

2013
Effectiveness Assessment on Urban Planning Analyzed in Virtual Reality Environments.
JSW, 2013

Design and Verification of On-Line Monitoring & Controlling System of Tensioner.
iJOE, 2013

Traffic Sign Detection Based on Camera Imaging Apriority.
Proceedings of the Advances in Multimedia Information Processing - PCM 2013, 2013

Image Super-Resolution Based on Data-Driven Gaussian Process Regression.
Proceedings of the Intelligence Science and Big Data Engineering, 2013

General Model of the Single-Key Meet-in-the-Middle Distinguisher on the Word-Oriented Block Cipher.
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013

A study on the relationship between rural-urban income gap and human capital investment disparity in China: A case study on Yunnan province.
Proceedings of the 2013 IEEE International Conference on Granular Computing, 2013

Deriving mutual modes from HPLC fingerprints of traditional Chinese medicine with non-negative matrix factorization.
Proceedings of the 2013 IEEE International Conference on Bioinformatics and Biomedicine, 2013

Low cost illumination invariant face recognition by down-up sampling self quotient image.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2013

2012
A model for the adoption of ICT by health workers in Africa.
I. J. Medical Informatics, 2012

Simulation-based Selectee Lane queueing design for passenger checkpoint screening.
European Journal of Operational Research, 2012

Feature selection for cost-sensitive learning using RBFNN.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2012

Automatic identification peaks in chromatographic fingerprints based on fuzzy matching.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012

2011
Team Formation in Concurrent Engineering Using Group Technology (GT) Concepts.
Concurrent Engineering: R&A, 2011

Battle damage level prediction on Fuzzy theory and Bayesian method.
Proceedings of the IEEE 5th International Conference on Robotics, 2011

Intelligent book positioning for library using RFID and book spine matching.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2011

3D Goods allocation in warehouse with L-GEM based 3-D RFID positioning.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2011

Analysis on the Failure of Distribution Network Loop.
Proceedings of the Frontiers in Computer Education [International Conference on Frontiers in Computer Education, 2011

Multi-source data management on internet of city tunnels.
Proceedings of the 2011 International Conference on Innovative Computing and Cloud Computing, 2011

2010
Comparative Analysis of HTTP Anomaly Detection Algorithms: DFA vs N-Grams.
Proceedings of the Fourth International Conference on Network and System Security, 2010

A Research of P2P IPTV Node Measurement Based on Packets Analysis.
Proceedings of the Information and Automation - International Symposium, 2010

LIFE3: A Predictive Costing Tool For Digital Collections.
Proceedings of the 7th International Conference on Digital Preservation, 2010

2009
QGrid: An Adaptive Trust Aware Resource Management Framework.
IEEE Systems Journal, 2009

A negotiation-based trust establishment service for CROWN grid.
IJAACS, 2009

Passenger grouping with risk levels in an airport security system.
European Journal of Operational Research, 2009

Learning to Extract Web News Title in Template Independent Way.
Proceedings of the Rough Sets and Knowledge Technology, 4th International Conference, 2009

A fully integrated 2×2 MIMO dual-band dual- mode direct-conversion CMOS transceiver for WiMAX/WLAN applications.
Proceedings of the IEEE International Solid-State Circuits Conference, 2009

Synchronization Motion Control for Electro-hydraulic System of Tensioner for Pipelaying Vessel.
Proceedings of the Fifth International Conference on Natural Computation, 2009

2008
Mining in-depth patterns in stock market.
IJISTA, 2008

LUBRES: An expert system development and implementation for real-time fault diagnosis of a lubricating oil refining process.
Expert Syst. Appl., 2008

A Multi-agents Contractual Approach to Incentive Provision in Non-cooperative Networks.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008, 2008

Ensuring the Consistent Concurrent Execution of Service Composition under Relaxed Isolation.
Proceedings of the 2008 IEEE International Conference on e-Business Engineering, 2008

The Conflict-Measurement Index System Study among Project Managers in Multi-project Environment.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

A Concurrency Control Mechanism for Composite Service Supporting User-Defined Relaxed Atomicity.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

2007
Server Adaptation in an Airport Security System Queue.
OR Insight, 2007

Balancing Trust and Incentive in Peer-to-Peer Collaborative System.
I. J. Network Security, 2007

Simulation of passenger check-in at a medium-sized US airport.
Proceedings of the Winter Simulation Conference, WSC 2007, 2007

ECTracker - An Efficient Algorithm for Haplotype Analysis and Classification.
Proceedings of the MEDINFO 2007 - Proceedings of the 12th World Congress on Health (Medical) Informatics, 2007

Face Image Retrieval Method Based on Improved IGA and SVM.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, 2007

An Efficient System for EJB Mobilization.
Proceedings of the ICEIS 2007, 2007

Sustaining Incentive in Grid Resource Allocation: A Reinforcement Learning Approach.
Proceedings of the Seventh IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2007), 2007

2006
Passenger grouping under constant threat probability in an airport security system.
European Journal of Operational Research, 2006

Study on State Feedback Fuzzy-predictive Control System of T-S Fuzzy Model.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

A Framework to Provide Trust and Incentive in CROWN Grid for Dynamic Resource Management.
Proceedings of the 15th International Conference On Computer Communications and Networks, 2006

2005
Implementation of knowledge maintenance modules in an expert system for fault diagnosis of chemical process operation.
Expert Syst. Appl., 2005

For effective facilities planning: layout optimization then simulation, or vice versa?
Proceedings of the 37th Winter Simulation Conference, Orlando, FL, USA, December 4-7, 2005, 2005

Genetic Algorithms for Robust Optimization in Financial Applications.
Proceedings of the IASTED International Conference on Computational Intelligence, 2005

The Visualization of Large Database in Stock Market.
Proceedings of the IASTED International Conference on Databases and Applications, 2005

LinkageTracker: A Discriminative Pattern Tracking Approach to Linkage Disequilibrium Mapping.
Proceedings of the Database Systems for Advanced Applications, 2005

Mining Domain-Driven Correlations in Stock Markets.
Proceedings of the AI 2005: Advances in Artificial Intelligence, 2005

The Fish-eye Visualization of Foreign Currency Exchange Data Streams.
Proceedings of the Asia-Pacific Symposium on Information Visualisation, 2005

2004
Modeling team member characteristics for the formation of a multifunctional team in concurrent engineering.
IEEE Trans. Engineering Management, 2004

Multicasting And Broadcasting In Undirected Wdm Networks And Qos Extentions Of Multicasting.
Int. J. Found. Comput. Sci., 2004

Research of inarticulate micro-manipulator robot driven by magnetic levitation force.
Proceedings of the IEEE International Conference on Systems, 2004

Magnetic levitation micro-manipulator robot and its fuzzy cerebella model articulation controller system.
Proceedings of the 8th International Conference on Control, 2004

Agent Services-Based Infrastructure for Online Assessment of Trading Strategies.
Proceedings of the 2004 IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT 2004), 2004

2003
Intelligent remote monitoring and diagnosis of manufacturing processes using an integrated approach of neural networks and rough sets.
J. Intelligent Manufacturing, 2003

The computation of hitting sets: Review and new algorithms.
Inf. Process. Lett., 2003

A structured approach to measuring functional dependency and sequencing of coupled tasks in engineering design.
Computers & Industrial Engineering, 2003

2002
A Project Task Coordination Model for Team Organization in Concurrent Engineering.
Concurrent Engineering: R&A, 2002

Mining of Correlated Rules in Genome Sequences.
Proceedings of the AMIA 2002, 2002

2000
Concurrent design of machined products: a multivariate decision approach.
IEEE Trans. Systems, Man, and Cybernetics, Part C, 2000

1999
An object-oriented FMS real-time and feedback control model.
Int. J. Computer Integrated Manufacturing, 1999

1998
Recent developments in high integration multi-standard CMOS transceivers for personal communication systems.
Proceedings of the 1998 International Symposium on Low Power Electronics and Design, 1998

1995
Effective job shop scheduling through active chain manipulation.
Computers & OR, 1995

1991
Dear Mr. Belpedio.
Simulation, 1991


  Loading...