Libin Wang

According to our database1, Libin Wang authored at least 33 papers between 2003 and 2019.

Collaborative distances:



In proceedings 
PhD thesis 




Authors' Reply to "Comment on 'On stability and application of extremum seeking control without steady-state oscillation' ".
Automatica, 2019

Transcriptome profilling analysis characterized the gene expression patterns responded to combined drought and heat stresses in soybean.
Computational Biology and Chemistry, 2018

Dynamic Pricing in Spatial Crowdsourcing: A Matching-Based Approach.
Proceedings of the 2018 International Conference on Management of Data, 2018

Research on Collaborative Filtering Recommendation of Learning Resource Based on Knowledge Association.
Proceedings of the Innovative Technologies and Learning - First International Conference, 2018

Flexible Online Task Assignment in Real-Time Spatial Data.
PVLDB, 2017

A switching-based extremum seeking control scheme.
Int. J. Control, 2017

Trichromatic Online Matching in Real-Time Spatial Crowdsourcing.
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017

Application of CCG Sensors to a High-Temperature Structure Subjected to Thermo-Mechanical Load.
Sensors, 2016

Aerodynamic Drag Analysis of 3-DOF Flex-Gimbal GyroWheel System in the Sense of Ground Test.
Sensors, 2016

Unified security model of authenticated key exchange with specific adversarial capabilities.
IET Information Security, 2016

On stability and application of extremum seeking control without steady-state oscillation.
Automatica, 2016

Online mobile Micro-Task Allocation in spatial crowdsourcing.
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016

Ordinal Feature Selection for Iris and Palmprint Recognition.
IEEE Trans. Image Processing, 2014

One-Round Deniable Key Exchange with Perfect Forward Security.
IACR Cryptology ePrint Archive, 2014

A Brief Survey on Recent Progress in Iris Recognition.
Proceedings of the Biometric Recognition - 9th Chinese Conference, 2014

Cryptanalysis of Reduced-Round DASH.
J. Comput. Sci. Technol., 2013

A Unified Security Model of Authenticated Key Exchange with Specific Adversarial Capabilities.
IACR Cryptology ePrint Archive, 2013

A feature-level solution to off-angle iris recognition.
Proceedings of the International Conference on Biometrics, 2013

Adaptive Feature Selection via Boosting-Like Sparsity Regularization.
Proceedings of the 2nd IAPR Asian Conference on Pattern Recognition, 2013

One-round identity-based key exchange with Perfect Forward Security.
Inf. Process. Lett., 2012

Robust regularized feature selection for iris recognition via linear programming.
Proceedings of the 21st International Conference on Pattern Recognition, 2012

Improved Related-Key Differential Attacks on Reduced-Round LBlock.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

TMQV: A Strongly eCK-secure Diffie-Hellman Protocol without Gap Assumption.
J. Internet Serv. Inf. Secur., 2011

Improved Related-Key Boomerang Distinguishing Attack of Threefish-256.
IACR Cryptology ePrint Archive, 2011

TMQV: A Strongly eCK-Secure Diffie-Hellman Protocol without Gap Assumption.
Proceedings of the Provable Security - 5th International Conference, 2011

Analysis and Improvement of an Authenticated Key Exchange Protocol.
Proceedings of the Information Security Practice and Experience, 2011

Security Enhancement and Modular Treatment towards Authenticated Key Exchange.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

Comments on a theorem on grid access control.
Future Generation Comp. Syst., 2006

Comments on an access control model in semantic grid.
Future Generation Comp. Syst., 2006

A Hybrid Tabu Search Based Clustering Algorithm.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

A Tabu Search Based Method for Minimum Sum of Squares Clustering.
Proceedings of the Pattern Recognition and Data Mining, 2005

A Tabu Clustering Method with DHB Operation and Mergence and Partition Operation.
Proceedings of the Discovery Science, 8th International Conference, 2005

A Typed Theory for Access Control and Information Flow Control in Mobile Systems.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003