Libin Wang

Orcid: 0000-0002-9514-0289

According to our database1, Libin Wang authored at least 59 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Double graphs regularized multi-view subspace clustering.
Int. J. Wavelets Multiresolution Inf. Process., January, 2024

StructuredMesh: 3-D Structured Optimization of Façade Components on Photogrammetric Mesh Models Using Binary Integer Programming.
IEEE Trans. Geosci. Remote. Sens., 2024

Semantic Image Translation for Repairing the Texture Defects of Building Models.
IEEE Trans. Geosci. Remote. Sens., 2024

2023
Study on the Nonlinear Stability and Parametric Analysis of a Tensile-Beam Cable Dome.
Symmetry, September, 2023

Attention reweighted sparse subspace clustering.
Pattern Recognit., July, 2023

Fast Finite-Time Control for Nonaffine Stochastic Nonlinear Systems Against Multiple Actuator Constraints via Output Feedback.
IEEE Trans. Cybern., May, 2023

Exact Boundary Controllability of Nodal Profile for Quasilinear Hyperbolic Systems and Its Asymptotic Stability.
SIAM J. Control. Optim., February, 2023

Research on Ground-Airborne Frequency-Domain Electromagnetic Rapid Imaging Method Based on Space Magnetic Gradient Anomaly.
IEEE Trans. Geosci. Remote. Sens., 2023

QHL: A Fast Algorithm for Exact Constrained Shortest Path Search on Road Networks.
Proc. ACM Manag. Data, 2023

StructuredMesh: 3D Structured Optimization of Façade Components on Photogrammetric Mesh Models using Binary Integer Programming.
CoRR, 2023

Semantic Image Translation for Repairing the Texture Defects of Building Models.
CoRR, 2023

A digital twin approach for tunnel construction safety early warning and management.
Comput. Ind., 2023

Efficient Public Transport Planning on Roads.
Proceedings of the 39th IEEE International Conference on Data Engineering, 2023

2022
Finite-Time Compensation Control for State-Variable-Unmeasurable Nonlinear Systems With Sensor and Actuator Faults.
IEEE Trans. Instrum. Meas., 2022

Fuzzy Finite-Time Command Filtering Output Feedback Control of Nonlinear Systems.
IEEE Trans. Fuzzy Syst., 2022

Double Graphs Regularized Multi-view Subspace Clustering.
CoRR, 2022

Global Weighted Tensor Nuclear Norm for Tensor Robust Principal Component Analysis.
CoRR, 2022

2021
Two-Sided Online Micro-Task Assignment in Spatial Crowdsourcing.
IEEE Trans. Knowl. Data Eng., 2021

Probabilistic Assessment Approach of the Aerostatic Instability of Long-Span Symmetry Cable-Stayed Bridges.
Symmetry, 2021

Support Vector Machine-Based Backprojection Algorithm for Detection of Gastric Cancer Lesions with Abdominal Endoscope Using Magnetic Resonance Imaging Images.
Sci. Program., 2021

Twisting sliding mode extremum seeking control without steady-state oscillation.
Int. J. Control, 2021

Optimized Power Control in Internet of Vehicles Based on Serial Interference Cancellation and User Matching.
IEEE Access, 2021

Observer-Based Fuzzy Adaptive Command Filtering Finite-Time Control of Stochastic Nonlinear Systems.
Proceedings of the 2021 International Conference on Security, 2021

2020
Cryptanalysis of certificateless authenticated key agreement protocols.
Int. J. Ad Hoc Ubiquitous Comput., 2020

Tightly-secure two-pass authenticated key exchange protocol using twin Diffie-Hellman problem.
IET Inf. Secur., 2020

Asymmetrical Vertical Federated Learning.
CoRR, 2020

Fast and Regularized Reconstruction of Building Façades from Street-View Images using Binary Integer Programming.
CoRR, 2020

2019
Authors' Reply to "Comment on 'On stability and application of extremum seeking control without steady-state oscillation' ".
Autom., 2019

Procrastination-Aware Scheduling: A Bipartite Graph Perspective.
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019

2018
Transcriptome profilling analysis characterized the gene expression patterns responded to combined drought and heat stresses in soybean.
Comput. Biol. Chem., 2018

Dynamic Pricing in Spatial Crowdsourcing: A Matching-Based Approach.
Proceedings of the 2018 International Conference on Management of Data, 2018

Research on Collaborative Filtering Recommendation of Learning Resource Based on Knowledge Association.
Proceedings of the Innovative Technologies and Learning - First International Conference, 2018

2017
Flexible Online Task Assignment in Real-Time Spatial Data.
Proc. VLDB Endow., 2017

A switching-based extremum seeking control scheme.
Int. J. Control, 2017

Trichromatic Online Matching in Real-Time Spatial Crowdsourcing.
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017

2016
Application of CCG Sensors to a High-Temperature Structure Subjected to Thermo-Mechanical Load.
Sensors, 2016

Aerodynamic Drag Analysis of 3-DOF Flex-Gimbal GyroWheel System in the Sense of Ground Test.
Sensors, 2016

Unified security model of authenticated key exchange with specific adversarial capabilities.
IET Inf. Secur., 2016

On stability and application of extremum seeking control without steady-state oscillation.
Autom., 2016

Online mobile Micro-Task Allocation in spatial crowdsourcing.
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016

2014
Ordinal Feature Selection for Iris and Palmprint Recognition.
IEEE Trans. Image Process., 2014

One-Round Deniable Key Exchange with Perfect Forward Security.
IACR Cryptol. ePrint Arch., 2014

A Brief Survey on Recent Progress in Iris Recognition.
Proceedings of the Biometric Recognition - 9th Chinese Conference, 2014

2013
Cryptanalysis of Reduced-Round DASH.
J. Comput. Sci. Technol., 2013

A feature-level solution to off-angle iris recognition.
Proceedings of the International Conference on Biometrics, 2013

Adaptive Feature Selection via Boosting-Like Sparsity Regularization.
Proceedings of the 2nd IAPR Asian Conference on Pattern Recognition, 2013

2012
One-round identity-based key exchange with Perfect Forward Security.
Inf. Process. Lett., 2012

Robust regularized feature selection for iris recognition via linear programming.
Proceedings of the 21st International Conference on Pattern Recognition, 2012

Improved Related-Key Differential Attacks on Reduced-Round LBlock.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

2011
TMQV: A Strongly eCK-secure Diffie-Hellman Protocol without Gap Assumption.
J. Internet Serv. Inf. Secur., 2011

Improved Related-Key Boomerang Distinguishing Attack of Threefish-256.
IACR Cryptol. ePrint Arch., 2011

Analysis and Improvement of an Authenticated Key Exchange Protocol.
Proceedings of the Information Security Practice and Experience, 2011

2010
Security Enhancement and Modular Treatment towards Authenticated Key Exchange.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

2006
Comments on a theorem on grid access control.
Future Gener. Comput. Syst., 2006

Comments on an access control model in semantic grid.
Future Gener. Comput. Syst., 2006

2005
A Hybrid Tabu Search Based Clustering Algorithm.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

A Tabu Search Based Method for Minimum Sum of Squares Clustering.
Proceedings of the Pattern Recognition and Data Mining, 2005

A Tabu Clustering Method with DHB Operation and Mergence and Partition Operation.
Proceedings of the Discovery Science, 8th International Conference, 2005

2003
A Typed Theory for Access Control and Information Flow Control in Mobile Systems.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003


  Loading...