According to our database1, Libin Wang authored at least 33 papers between 2003 and 2019.
Legend:Book In proceedings Article PhD thesis Other
Authors' Reply to "Comment on 'On stability and application of extremum seeking control without steady-state oscillation' ".
Transcriptome profilling analysis characterized the gene expression patterns responded to combined drought and heat stresses in soybean.
Computational Biology and Chemistry, 2018
Dynamic Pricing in Spatial Crowdsourcing: A Matching-Based Approach.
Proceedings of the 2018 International Conference on Management of Data, 2018
Research on Collaborative Filtering Recommendation of Learning Resource Based on Knowledge Association.
Proceedings of the Innovative Technologies and Learning - First International Conference, 2018
Flexible Online Task Assignment in Real-Time Spatial Data.
A switching-based extremum seeking control scheme.
Int. J. Control, 2017
Trichromatic Online Matching in Real-Time Spatial Crowdsourcing.
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017
Application of CCG Sensors to a High-Temperature Structure Subjected to Thermo-Mechanical Load.
Aerodynamic Drag Analysis of 3-DOF Flex-Gimbal GyroWheel System in the Sense of Ground Test.
Unified security model of authenticated key exchange with specific adversarial capabilities.
IET Information Security, 2016
On stability and application of extremum seeking control without steady-state oscillation.
Online mobile Micro-Task Allocation in spatial crowdsourcing.
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016
Ordinal Feature Selection for Iris and Palmprint Recognition.
IEEE Trans. Image Processing, 2014
One-Round Deniable Key Exchange with Perfect Forward Security.
IACR Cryptology ePrint Archive, 2014
A Brief Survey on Recent Progress in Iris Recognition.
Proceedings of the Biometric Recognition - 9th Chinese Conference, 2014
Cryptanalysis of Reduced-Round DASH.
J. Comput. Sci. Technol., 2013
A Unified Security Model of Authenticated Key Exchange with Specific Adversarial Capabilities.
IACR Cryptology ePrint Archive, 2013
A feature-level solution to off-angle iris recognition.
Proceedings of the International Conference on Biometrics, 2013
Adaptive Feature Selection via Boosting-Like Sparsity Regularization.
Proceedings of the 2nd IAPR Asian Conference on Pattern Recognition, 2013
One-round identity-based key exchange with Perfect Forward Security.
Inf. Process. Lett., 2012
Robust regularized feature selection for iris recognition via linear programming.
Proceedings of the 21st International Conference on Pattern Recognition, 2012
Improved Related-Key Differential Attacks on Reduced-Round LBlock.
Proceedings of the Information and Communications Security - 14th International Conference, 2012
TMQV: A Strongly eCK-secure Diffie-Hellman Protocol without Gap Assumption.
J. Internet Serv. Inf. Secur., 2011
Improved Related-Key Boomerang Distinguishing Attack of Threefish-256.
IACR Cryptology ePrint Archive, 2011
TMQV: A Strongly eCK-Secure Diffie-Hellman Protocol without Gap Assumption.
Proceedings of the Provable Security - 5th International Conference, 2011
Analysis and Improvement of an Authenticated Key Exchange Protocol.
Proceedings of the Information Security Practice and Experience, 2011
Security Enhancement and Modular Treatment towards Authenticated Key Exchange.
Proceedings of the Information and Communications Security - 12th International Conference, 2010
Comments on a theorem on grid access control.
Future Generation Comp. Syst., 2006
Comments on an access control model in semantic grid.
Future Generation Comp. Syst., 2006
A Hybrid Tabu Search Based Clustering Algorithm.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005
A Tabu Search Based Method for Minimum Sum of Squares Clustering.
Proceedings of the Pattern Recognition and Data Mining, 2005
A Tabu Clustering Method with DHB Operation and Mergence and Partition Operation.
Proceedings of the Discovery Science, 8th International Conference, 2005
A Typed Theory for Access Control and Information Flow Control in Mobile Systems.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003