Lina Wang

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2024
Let Real Images be as a Judger, Spotting Fake Images Synthesized with Generative Models.
CoRR, 2024

Mechanism and Analytical Model for Switching Transient Process in SiC 3L-ANPC Converter.
IEEE Access, 2024

Chronic Poisoning: Backdoor Attack against Split Learning.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Collaborative Learning in General Graphs With Limited Memorization: Complexity, Learnability, and Reliability.
IEEE/ACM Trans. Netw., December, 2023

Pinning Stabilizer Design for Probabilistic Boolean Control Networks via Condensation Digraph.
IEEE Trans. Neural Networks Learn. Syst., December, 2023

How to backdoor split learning.
Neural Networks, November, 2023

Applications of Nanosatellites in Constellation: Overview and Feasibility Study for a Space Mission Based on Internet of Space Things Applications Used for AIS and Fire Detection.
Sensors, July, 2023

Study on optimization model control method of light and temperature coordination of greenhouse crops with benefit priority.
Comput. Electron. Agric., July, 2023

An ANN-based Intelligent Spectrum Sensing Algorithm for Space-based Satellite Networks.
KSII Trans. Internet Inf. Syst., March, 2023

Minimal key set of binary key-derivation tree in cloud storage.
Soft Comput., 2023

Solving the homogeneous BVP of second order linear FDEs with fuzzy parameters under granular differentiability concept.
J. Intell. Fuzzy Syst., 2023

hp-version C<sup>1</sup>-continuous Petrov-Galerkin method for nonlinear second-order initial value problems with application to wave equations.
CoRR, 2023

Feature Sniffer: A Stealthy Inference Attacks Framework on Split Learning.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2023, 2023

2022
Research on smooth path planning method based on improved ant colony algorithm optimized by Floyd algorithm.
Frontiers Neurorobotics, September, 2022

Stability of traveling wave fronts for a modified vector disease model.
Comput. Appl. Math., September, 2022

Edge-cloud-enabled matrix factorization for diversified APIs recommendation in mashup creation.
World Wide Web, 2022

LSH-aware multitype health data prediction with privacy preservation in edge environment.
World Wide Web, 2022

FUSION: Measuring Binary Function Similarity with Code-Specific Embedding and Order-Sensitive GNN.
Symmetry, 2022

Rotating object detection in remote-sensing environment.
Soft Comput., 2022

Minimal observability of Boolean control networks.
Syst. Control. Lett., 2022

Effects of Environmental Factors on the Changes in MODIS NPP along DEM in Global Terrestrial Ecosystems over the Last Two Decades.
Remote. Sens., 2022

Recognition algorithm for deep convective clouds based on FY4A.
Neural Comput. Appl., 2022

Exponential Convergence of hp-discontinuous Galerkin Method for Nonlinear Caputo Fractional Differential Equations.
J. Sci. Comput., 2022

Construction of a Multi-Dimensional Evaluation System of English Online Learning Teaching Quality Based on Blended Learning.
Int. J. Inf. Syst. Serv. Sect., 2022

Visualization and Analysis of Transport Accessibility Changes Based on Time Cartograms.
ISPRS Int. J. Geo Inf., 2022

An <i>a priori</i> error analysis of the <i>hp</i>-version of the <i>C</i><sup>0</sup>-continuous Petrov-Galerkin method for nonlinear second-order delay differential equations.
Int. J. Comput. Math., 2022

Collaborative Learning in General Graphs with Limited Memorization: Learnability, Complexity and Reliability.
CoRR, 2022

Multiple imputation method of missing credit risk assessment data based on generative adversarial networks.
Appl. Soft Comput., 2022

Research on Web Big Data Migration Algorithm based on Association Rule Mining Model.
Proceedings of the IPEC 2022: 3rd Asia-Pacific Conference on Image Processing, Electronics and Computers, Dalian, China, April 14, 2022

Stretchable, Conducting and Large-Range Monitoring PEDOT: PSS-PVA Hydrogel Strain Sensor.
Proceedings of the Intelligent Robotics and Applications - 15th International Conference, 2022

Simulation Study on Influencing Factors of Image Reconstruction Quality Based on UT System.
Proceedings of the IEEE International Instrumentation and Measurement Technology Conference, 2022

Online and Offline Analysis of Planck Constant Measurement.
Proceedings of CECNet 2022, 2022

2021
NAAM-MOEA/D-Based Multitarget Firepower Resource Allocation Optimization in Edge Computing.
Wirel. Commun. Mob. Comput., 2021

A Novel Method for the Image Quality Improvement of Ultrasonic Tomography.
IEEE Trans. Instrum. Meas., 2021

Diversified and Scalable Service Recommendation With Accuracy Guarantee.
IEEE Trans. Comput. Soc. Syst., 2021

A Novel Single-Feed Filtering Dielectric Resonator Antenna Using Slotline Stepped-Impedance Resonator.
IEEE Trans. Circuits Syst. II Express Briefs, 2021

Therapeutic Effect of Cervical Cerclage on Cervical Insufficiency during Pregnancy Analyzed by Magnetic Resonance Image under Neural Network Algorithm.
Sci. Program., 2021

Multiplexed Weak Waist-Enlarged Fiber Taper Curvature Sensor and Its Rapid Inline Fabrication.
Sensors, 2021

Detection of a Dust Storm in 2020 by a Multi-Observation Platform over the Northwest China.
Remote. Sens., 2021

Improving adversarial robustness of deep neural networks by using semantic information.
Knowl. Based Syst., 2021

Who talks to whom: an evaluation of a call log visualization.
J. Vis., 2021

Multi-Dimensional Sport Physique Evaluation and Ranking for Healthcare Based on TOPSIS.
J. Organ. End User Comput., 2021

An Integrated Artificial Neural Network-based Precipitation Revision Model.
KSII Trans. Internet Inf. Syst., 2021

Lightning location method based on improved fuzzy C-means clustering algorithm.
Int. J. Sens. Networks, 2021

Online optimal learning algorithm for Stackelberg games with partially unknown dynamics and constrained inputs.
Neurocomputing, 2021

Analyzing Adversarial Robustness of Deep Neural Networks in Pixel Space: a Semantic Perspective.
CoRR, 2021

ECO-DST: An Efficient Cross-lingual Dialogue State Tracking Framework.
Proceedings of the MLMI 2021: The 4th International Conference on Machine Learning and Machine Intelligence, Hangzhou, China, September 17, 2021

Fine-Grained Image Classification Based on Target Acquisition and Feature Fusion.
Proceedings of the Knowledge Science, Engineering and Management, 2021

Research on cross-section gas content evaluation based on ultrasonic tomography system.
Proceedings of the IEEE International Conference on Imaging Systems and Techniques, 2021

Boost Transformer with BERT and copying mechanism for ASR error correction.
Proceedings of the International Joint Conference on Neural Networks, 2021

Design of Capital Distribution and Settlement Platform of Citizen Card Among Cities Based on Unified Standard.
Proceedings of Sixth International Congress on Information and Communication Technology, 2021

Video-based Fire Smoke Detection Using Temporal-spatial Saliency Features.
Proceedings of the 12th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2021) / The 11th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2021), 2021

A Multi-Target Track Association Algorithm in Underwater Multi-Sensors Environments.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

Fast Anomaly Detection based on Data Stream in Network Intrusion Detection System.
Proceedings of the ACM TURC 2021: ACM Turing Award Celebration Conference - Hefei, China, 30 July 2021, 2021

2020
Deep Learning Hierarchical Representation From Heterogeneous Flow-Level Communication Data.
IEEE Trans. Inf. Forensics Secur., 2020

BeiDou Satellite Positioning Method Based on IoT and Edge Computing.
Sensors, 2020

A Robust Algorithm Based on Phase Congruency for Optical and SAR Image Registration in Suburban Areas.
Remote. Sens., 2020

Diversified service recommendation with high accuracy and efficiency.
Knowl. Based Syst., 2020

Smartphone application training program improves smartphone usage competency and quality of life among the elderly in an elder university in China: A randomized controlled trial.
Int. J. Medical Informatics, 2020

Comparative analysis on detection performance with ground-based microwave radiometer and radiosonde.
Int. J. Embed. Syst., 2020

Construction of greenhouse environment temperature adaptive model based on parameter identification.
Comput. Electron. Agric., 2020

CNSA: a data repository for archiving omics data.
Database J. Biol. Databases Curation, 2020

Compress Polyphone Pronunciation Prediction Model with Shared Labels.
Proceedings of the Chinese Computational Linguistics - 19th China National Conference, CCL 2020, Hainan, China, October 30, 2020

Teaching Methods of University Economic Management Course Based on Python.
Proceedings of the 2020 International Conference on Applications and Techniques in Cyber Intelligence, 2020

2019
Study on the interaction between the cover source mismatch and texture complexity in steganalysis.
Multim. Tools Appl., 2019

A procedural texture generation framework based on semantic descriptions.
Knowl. Based Syst., 2019

An h-p Version of the Discontinuous Galerkin Method for Volterra Integro-Differential Equations with Vanishing Delays.
J. Sci. Comput., 2019

Edge Computing-based Differential Positioning Method for BeiDou Navigation Satellite System.
KSII Trans. Internet Inf. Syst., 2019

Local outlier detection based on information entropy weighting.
Int. J. Sens. Networks, 2019

English Teaching Platform Based on Online Education Technology and Licensure and Master's Program Technology.
Int. J. Emerg. Technol. Learn., 2019

Exploring the intention-behavior gap in the technology acceptance model: A mixed-methods study in the context of foreign-language teaching in China.
Br. J. Educ. Technol., 2019

Proteomic analysis and prediction of amino acid variations that influence protein posttranslational modifications.
Briefings Bioinform., 2019

Feature Evaluation of Upper Limb Exercise Rehabilitation Interactive System Based on Kinect.
IEEE Access, 2019

Evaluation of a novel visualization for dynamic social networks.
Proceedings of the 12th International Symposium on Visual Information Communication and Interaction, 2019

NMF-Based Privacy-Preserving Collaborative Filtering on Cloud Computing.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019

Observed Phenomenon in Grouting Duct Detection Progress using Capacitive Sensing Technique.
Proceedings of the 2019 IEEE International Conference on Imaging Systems and Techniques, 2019

An Attention-Based Recommendation Algorithm.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019

Analysis of the Use of "MOOC + flipped classrooms" in the Practice of Design and Producing of Webpage.
Proceedings of the IEEE 2nd International Conference on Knowledge Innovation and Invention, 2019

A Hash Function based on Sponge Structure with Chaotic Map for Spinal Codes.
Proceedings of the 2019 International Conference on Computer, 2019

2018
A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network.
IEEE Trans. Dependable Secur. Comput., 2018

Fine-grained entity type classification with adaptive context.
Soft Comput., 2018

Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services.
IEEE Syst. J., 2018

A Simplified Hollow-Core Photonic Crystal Fiber SERS Probe with a Fully Filled Photoreduction Silver Nanoprism.
Sensors, 2018

How people share digital images in social networks: a questionnaire-based study of privacy decisions and access control.
Multim. Tools Appl., 2018

Computational Prediction and Analysis for Tyrosine Post-Translational Modifications via Elastic Net.
J. Chem. Inf. Model., 2018

Methods for System Selection Based on Sequential Mean-Variance Analysis.
INFORMS J. Comput., 2018

Perception-driven procedural texture generation from examples.
Neurocomputing, 2018

Automatic recognition of lactating sow postures from depth images by deep learning detector.
Comput. Electron. Agric., 2018

An adaptive fuzzy hierarchical control for maintaining solar greenhouse temperature.
Comput. Electron. Agric., 2018

ProAcePred: prokaryote lysine acetylation sites prediction based on elastic net feature optimization.
Bioinform., 2018

Deep Gabor Scattering Network for Image Classification.
Proceedings of the Pattern Recognition and Computer Vision - First Chinese Conference, 2018

Controlled Channel Attack Detection Based on Hardware Virtualization.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

A Partitioning Algorithm of Social Network Based on Dimensionality Reduction.
Proceedings of the Fuzzy Systems and Data Mining IV, 2018

2017
Computing Prediction and Functional Analysis of Prokaryotic Propionylation.
J. Chem. Inf. Model., November, 2017

Adaptive Steganalysis Based on Selection Region and Combined Convolutional Neural Networks.
Secur. Commun. Networks, 2017

Parallel task scheduling under multi-Clouds.
KSII Trans. Internet Inf. Syst., 2017

Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage.
Inf. Sci., 2017

A Procedural Texture Generation Framework Based on Semantic Descriptions.
CoRR, 2017

Privacy-preserving certificateless provable data possession scheme for big data storage on cloud.
Appl. Math. Comput., 2017

An h-p version of the continuous Petrov-Galerkin method for Volterra delay-integro-differential equations.
Adv. Comput. Math., 2017

An online optimal reference flux searching approach for direct torque control of interior permanent magnet synchronous machines.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017

Unwanted turn-on of SiC JFET bi-directional switches under influence of parasitic parameters.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017

A high-bandwidth PV source simulator using a sliding mode controlled interleaved buck converter.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017

An Empirical Case of Applying MFA on Company Level.
Proceedings of the Geo-Spatial Knowledge and Intelligence - 5th International Conference, 2017

Aspect Based Sentiment Analysis for Online Reviews.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

2016
cNV SRAM: CMOS Technology Compatible Non-Volatile SRAM Based Ultra-Low Leakage Energy Hybrid Memory System.
IEEE Trans. Computers, 2016

An Improved K-Nearest-Neighbor Indoor Localization Method Based on Spearman Distance.
IEEE Signal Process. Lett., 2016

A novel covert channel detection method in cloud based on XSRM and improved event association algorithm.
Secur. Commun. Networks, 2016

Lossless data hiding algorithm for encrypted images with high capacity.
Multim. Tools Appl., 2016

An adaptive algorithm for scheduling parallel jobs in meteorological Cloud.
Knowl. Based Syst., 2016

云环境下APT攻击的防御方法综述 (Review of Defense Methods Against Advanced Persistent Threat in Cloud Environment).
计算机科学, 2016

面向Android应用的细粒度位置隐私保护系统 (Fined-grained Location Privacy Protection System for Android Applications).
计算机科学, 2016

Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography.
IET Commun., 2016

An Overview on Data Representation Learning: From Traditional Feature Learning to Recent Deep Learning.
CoRR, 2016

On digital image trustworthiness.
Appl. Soft Comput., 2016

Ld-CNNs: A Deep Learning System for Structured Text Categorization Based on LDA in Content Security.
Proceedings of the Network and System Security - 10th International Conference, 2016

A Study of the Two-Way Effects of Cover Source Mismatch and Texture Complexity in Steganalysis.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Person re-identification based on deep spatio-temporal features and transfer learning.
Proceedings of the 2016 International Joint Conference on Neural Networks, 2016

Numerical simulation of surface dielectric barrier discharge.
Proceedings of the IEEE International Conference on Information and Automation, 2016

A Novel Time-Frequency Analysis in Nonstationary Signals Based Multiscale Radial Basis Functions and Forward Orthogonal Regression.
Proceedings of the Cognitive Systems and Signal Processing, 2016

Research on How to Use OUC Cloud Classroom to Assist Education Development in Tibet.
Proceedings of the Blended Learning: Aligning Theory with Practices, 2016

2015
Parallelization of a color-entropy preprocessed Chan-Vese model for face contour detection on multi-core CPU and GPU.
Parallel Comput., 2015

基于语义相似度的静态安全策略一致性检测 (Static Security Policy Consistency Detection Based on Semantic Similarity).
计算机科学, 2015

一种基于软集和多属性综合的软件漏洞发现方法 (Method for Software Vulnerability Discovery Based on Soft Set and Multi-attribute Comprehensiveness).
计算机科学, 2015

One Construction of Multireceiver Authentication Codes from Pseudo-Symplectic Geometry over Finite Fields.
Ars Comb., 2015

Dynamic 3D Reconstruction of Tongue Surface Based on Photometric Stereo Technique.
Proceedings of the Intelligent Robotics and Applications - 8th International Conference, 2015

Image Reconstruction Algorithm for Modified SART Based on PM Model.
Proceedings of the 11th International Conference on Computational Intelligence and Security, 2015

A new method based on hough transform for quick line and circle detection.
Proceedings of the 8th International Conference on Biomedical Engineering and Informatics, 2015

2014
An OpenCL micro-benchmark suite for GPUs and CPUs.
J. Supercomput., 2014

Performance Analysis and Improvement of LT Codes over AWGN Channels.
J. Comput., 2014

A simulation based system for manufacturing process optimisation.
Proceedings of the 2014 IEEE International Conference on Industrial Engineering and Engineering Management, 2014

The CT Image Reconstruction Algorithm Based on the Least Absolute Criterion by Alternating Direction Iterative.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

2013
polynomial selection for the number field sieve in geometric view.
IACR Cryptol. ePrint Arch., 2013

UCOR: An Unequally Clustering-Based Hierarchical Opportunistic Routing Protocol for WSNs.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2013

Finding Key Leakage in Hierarchical Distribution of Encrypted Data.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Research of Detection Method of Mine Motor Vehicle Pedestrian Based on Image Processing.
Proceedings of The Eighth International Conference on Bio-Inspired Computing: Theories and Applications, 2013

2012
Object Tracking With Particle Filtering in Fluorescence Microscopy Images: Application to the Motion of Neurofilaments in Axons.
IEEE Trans. Medical Imaging, 2012

Feature Weighting Fuzzy Clustering Integrating Rough Sets and Shadowed Sets.
Int. J. Pattern Recognit. Artif. Intell., 2012

Study on Network Vulnerability Identification and Equilibrated Network Immunization Strategy.
IEICE Trans. Inf. Syst., 2012

2011
Image authentication based on perceptual hash using Gabor filters.
Soft Comput., 2011

Preventing Secret Data Leakage from Foreign Mappings in Virtual Machines.
Proceedings of the Security and Privacy in Communication Networks, 2011

A UML approach for the design of reconfigurable manufacturing simulation models.
Proceedings of the 2011 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM), 2011

The Foundation of the Mathematical Model of Economic Impact and the Analysis of the Effect on the Economy of Shanghai World Expo.
Proceedings of the Information Computing and Applications, 2011

2010
Behavior-based Attestation of Policy Enforcement among Trusted Virtual Domains.
J. Networks, 2010

Using Game Theory to Reveal Vulnerability for Complex Networks.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
An Optimized Anonymous Attestation Protocol from Bilinear Pairing.
Proceedings of the International Conference on Scalable Computing and Communications / Eighth International Conference on Embedded Computing, 2009

Design of a Trust Model and Finding Key-Nodes in Rumor Spreading Based on Monte-Carlo Method.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Loss of Genetic Variation in Hatchery Produced Haliotis Asinina Using AFLP and Allozyme Markers.
Proceedings of the 2009 International Conference on Environmental Science and Information Application Technology, 2009

Empirical Research and Design of M-Learning System for College English.
Proceedings of the Learning by Playing. Game-based Education System Design and Development, 2009

A Direct Anonymous Attestation Protocol Based on Hierarchical Group Signature.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Analysis of ERP II Implementing Option Problem with Asymmetric Information.
Proceedings of the Business Intelligence: Artificial Intelligence in Business, 2009

2008
A Novel Alternative Weighted Fuzzy C-Means Algorithm and Cluster Validity Analysis.
Proceedings of the PACIIA 2008, 2008

Reconstruction of 3D Digital Image of Weeping for Sythia Pollen.
Proceedings of the Computer and Computing Technologies in Agriculture II, Volume 1, 2008

Analysis on the "Robust Yet Fragile" Nature of Internet: Load, Capacity and the Cascading Failure Avalanche Effect.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

A Scientific Theme Emergence Detection Approach Based on Citation Graph Analysis.
Proceedings of the 20th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2008), 2008

Research on Evaluation of Trust Model.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

Detecting the MB1 with Higher-Order Statistics.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2004
A Hybrid Machine Learning/Statistical Model of Grid Security.
Proceedings of the Grid and Cooperative Computing, 2004

2003
Computational Stability and Adaptive Strategies - An Experimental Study of ODE Software.
PhD thesis, 2003

A Research on Intrusion Detection Based on Unsupervised Clustering and Support Vector Machine.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

2000
A Virtual Private Network for Virtual Enterprise Information Systems.
Proceedings of the Web-Age Information Management, First International Conference, 2000


  Loading...