Lina Wang

According to our database1, Lina Wang authored at least 98 papers between 2000 and 2018.

Collaborative distances :

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Fog Computing-Based Differential Positioning Method for BDS.
Wireless Communications and Mobile Computing, 2018

Niffler: A Context-Aware and User-Independent Side-Channel Attack System for Password Inference.
Wireless Communications and Mobile Computing, 2018

Dynamic Proofs of Retrievability for Coded Cloud Storage Systems.
IEEE Trans. Services Computing, 2018

A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network.
IEEE Trans. Dependable Sec. Comput., 2018

Fine-grained entity type classification with adaptive context.
Soft Comput., 2018

Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services.
IEEE Systems Journal, 2018

A Simplified Hollow-Core Photonic Crystal Fiber SERS Probe with a Fully Filled Photoreduction Silver Nanoprism.
Sensors, 2018

An AMR adaptive steganography algorithm based on minimizing distortion.
Multimedia Tools Appl., 2018

How people share digital images in social networks: a questionnaire-based study of privacy decisions and access control.
Multimedia Tools Appl., 2018

Perception-driven procedural texture generation from examples.
Neurocomputing, 2018

Automatic recognition of lactating sow postures from depth images by deep learning detector.
Computers and Electronics in Agriculture, 2018

2017
Batch Identification Game Model for Invalid Signatures in Wireless Mobile Networks.
IEEE Trans. Mob. Comput., 2017

AMR Steganalysis Based on Second-Order Difference of Pitch Delay.
IEEE Trans. Information Forensics and Security, 2017

Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices.
Soft Comput., 2017

Adaptive Steganalysis Based on Selection Region and Combined Convolutional Neural Networks.
Security and Communication Networks, 2017

deExploit: Identifying misuses of input data to diagnose memory-corruption exploits at the binary level.
Journal of Systems and Software, 2017

Parallel task scheduling under multi-Clouds.
TIIS, 2017

Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage.
Inf. Sci., 2017

High-resolution time-frequency representation of EEG data using multi-scale wavelets.
Int. J. Systems Science, 2017

Automatic Epileptic Seizure Detection in EEG Signals Using Multi-Domain Feature Extraction and Nonlinear Analysis.
Entropy, 2017

A Procedural Texture Generation Framework Based on Semantic Descriptions.
CoRR, 2017

Privacy-preserving certificateless provable data possession scheme for big data storage on cloud.
Applied Mathematics and Computation, 2017

An h-p version of the continuous Petrov-Galerkin method for Volterra delay-integro-differential equations.
Adv. Comput. Math., 2017

A Steganalysis Scheme for AAC Audio Based on MDCT Difference Between Intra and Inter Frame.
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017

Combined and Calibrated Features for Steganalysis of Motion Vector-Based Steganography in H.264/AVC.
Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, 2017

An Empirical Case of Applying MFA on Company Level.
Proceedings of the Geo-Spatial Knowledge and Intelligence - 5th International Conference, 2017

2016
cNV SRAM: CMOS Technology Compatible Non-Volatile SRAM Based Ultra-Low Leakage Energy Hybrid Memory System.
IEEE Trans. Computers, 2016

An Improved K-Nearest-Neighbor Indoor Localization Method Based on Spearman Distance.
IEEE Signal Process. Lett., 2016

A novel covert channel detection method in cloud based on XSRM and improved event association algorithm.
Security and Communication Networks, 2016

Message-locked proof of ownership and retrievability with remote repairing in cloud.
Security and Communication Networks, 2016

Lossless data hiding algorithm for encrypted images with high capacity.
Multimedia Tools Appl., 2016

Detection of double MP3 compression Based on Difference of Calibration Histogram.
Multimedia Tools Appl., 2016

An adaptive algorithm for scheduling parallel jobs in meteorological Cloud.
Knowl.-Based Syst., 2016

A multi-objective optimization model based on immune algorithm in wireless mesh networks.
Int. J. Communication Systems, 2016

Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography.
IET Communications, 2016

An Overview on Data Representation Learning: From Traditional Feature Learning to Recent Deep Learning.
CoRR, 2016

Distributed Greedy Coding-aware Deterministic Routing for multi-flow in wireless networks.
Computer Networks, 2016

On digital image trustworthiness.
Appl. Soft Comput., 2016

Ld-CNNs: A Deep Learning System for Structured Text Categorization Based on LDA in Content Security.
Proceedings of the Network and System Security - 10th International Conference, 2016

A Study of the Two-Way Effects of Cover Source Mismatch and Texture Complexity in Steganalysis.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Person re-identification based on deep spatio-temporal features and transfer learning.
Proceedings of the 2016 International Joint Conference on Neural Networks, 2016

A Novel Time-Frequency Analysis in Nonstationary Signals Based Multiscale Radial Basis Functions and Forward Orthogonal Regression.
Proceedings of the Cognitive Systems and Signal Processing, 2016

Research on How to Use OUC Cloud Classroom to Assist Education Development in Tibet.
Proceedings of the Blended Learning: Aligning Theory with Practices, 2016

Steganalysis of AAC using calibrated Markov model of adjacent codebook.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

2015
AMR Steganalysis Based on the Probability of Same Pulse Position.
IEEE Trans. Information Forensics and Security, 2015

Parallelization of a color-entropy preprocessed Chan-Vese model for face contour detection on multi-core CPU and GPU.
Parallel Computing, 2015

One Construction of Multireceiver Authentication Codes from Pseudo-Symplectic Geometry over Finite Fields.
Ars Comb., 2015

Dynamic 3D Reconstruction of Tongue Surface Based on Photometric Stereo Technique.
Proceedings of the Intelligent Robotics and Applications - 8th International Conference, 2015

Reversing and Identifying Overwritten Data Structures for Memory-Corruption Exploit Diagnosis.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

Regression Identification of Coincidental Correctness via Weighted Clustering.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

Image Reconstruction Algorithm for Modified SART Based on PM Model.
Proceedings of the 11th International Conference on Computational Intelligence and Security, 2015

A new method based on hough transform for quick line and circle detection.
Proceedings of the 8th International Conference on Biomedical Engineering and Informatics, 2015

2014
An OpenCL micro-benchmark suite for GPUs and CPUs.
The Journal of Supercomputing, 2014

Performance Analysis and Improvement of LT Codes over AWGN Channels.
JCP, 2014

vPatcher: VMI-Based Transparent Data Patching to Secure Software in the Cloud.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Video steganalysis based on subtractive probability of optimal matching feature.
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014

A simulation based system for manufacturing process optimisation.
Proceedings of the 2014 IEEE International Conference on Industrial Engineering and Engineering Management, 2014

The CT Image Reconstruction Algorithm Based on the Least Absolute Criterion by Alternating Direction Iterative.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

2013
A Fault Localization Framework to Alleviate the Impact of Execution Similarity.
International Journal of Software Engineering and Knowledge Engineering, 2013

polynomial selection for the number field sieve in geometric view.
IACR Cryptology ePrint Archive, 2013

UCOR: An Unequally Clustering-Based Hierarchical Opportunistic Routing Protocol for WSNs.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2013

A Robust Real-Time Tracking Method of Fast Video Object Based on Gaussian Kernel and Random Projection.
Proceedings of the Intelligence Science and Big Data Engineering, 2013

Finding Key Leakage in Hierarchical Distribution of Encrypted Data.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Research of Detection Method of Mine Motor Vehicle Pedestrian Based on Image Processing.
Proceedings of The Eighth International Conference on Bio-Inspired Computing: Theories and Applications, 2013

2012
Object Tracking With Particle Filtering in Fluorescence Microscopy Images: Application to the Motion of Neurofilaments in Axons.
IEEE Trans. Med. Imaging, 2012

Feature Weighting Fuzzy Clustering Integrating Rough Sets and Shadowed Sets.
IJPRAI, 2012

Study on Network Vulnerability Identification and Equilibrated Network Immunization Strategy.
IEICE Transactions, 2012

Learning Fine-Grained Structured Input for Memory Corruption Detection.
Proceedings of the Information Security - 15th International Conference, 2012

2011
Image authentication based on perceptual hash using Gabor filters.
Soft Comput., 2011

Context-Aware Fault Localization via Control Flow Analysis.
JSW, 2011

Improved Ordinary Measure and Image Entropy Theory based intelligent Copy Detection Method.
Int. J. Comput. Intell. Syst., 2011

The Design of a Wireless Sensor Network for Seismic-Observation-Environment Surveillance.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2011

Statistical Fault Localization via Semi-dynamic Program Slicing.
Proceedings of the IEEE 10th International Conference on Trust, 2011

PAFL: Fault Localization via Noise Reduction on Coverage Vector.
Proceedings of the 23rd International Conference on Software Engineering & Knowledge Engineering (SEKE'2011), 2011

Preventing Secret Data Leakage from Foreign Mappings in Virtual Machines.
Proceedings of the Security and Privacy in Communication Networks, 2011

A UML approach for the design of reconfigurable manufacturing simulation models.
Proceedings of the 2011 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM), 2011

The Foundation of the Mathematical Model of Economic Impact and the Analysis of the Effect on the Economy of Shanghai World Expo.
Proceedings of the Information Computing and Applications, 2011

2010
Behavior-based Attestation of Policy Enforcement among Trusted Virtual Domains.
JNW, 2010

Execution-Aware Fault Localization Based on the Control Flow Analysis.
Proceedings of the Information Computing and Applications - First International Conference, 2010

Using Game Theory to Reveal Vulnerability for Complex Networks.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
An Optimized Anonymous Attestation Protocol from Bilinear Pairing.
Proceedings of the International Conference on Scalable Computing and Communications / Eighth International Conference on Embedded Computing, 2009

Design of a Trust Model and Finding Key-Nodes in Rumor Spreading Based on Monte-Carlo Method.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Loss of Genetic Variation in Hatchery Produced Haliotis Asinina Using AFLP and Allozyme Markers.
Proceedings of the 2009 International Conference on Environmental Science and Information Application Technology, 2009

Empirical Research and Design of M-Learning System for College English.
Proceedings of the Learning by Playing. Game-based Education System Design and Development, 2009

A Direct Anonymous Attestation Protocol Based on Hierarchical Group Signature.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Analysis of ERP II Implementing Option Problem with Asymmetric Information.
Proceedings of the Business Intelligence: Artificial Intelligence in Business, 2009

2008
A Novel Alternative Weighted Fuzzy C-Means Algorithm and Cluster Validity Analysis.
Proceedings of the PACIIA 2008, 2008

Reconstruction of 3D Digital Image of Weeping for Sythia Pollen.
Proceedings of the Computer and Computing Technologies in Agriculture II, Volume 1, 2008

A Secure Network Admission and Routing Model Based on Trust Theory.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Analysis on the "Robust Yet Fragile" Nature of Internet: Load, Capacity and the Cascading Failure Avalanche Effect.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

A Scientific Theme Emergence Detection Approach Based on Citation Graph Analysis.
Proceedings of the 20th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2008), 2008

Research on Evaluation of Trust Model.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

Detecting the MB1 with Higher-Order Statistics.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

Study on the Internet Behavior's Activity Oriented to Network Survivability.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2004
A Hybrid Machine Learning/Statistical Model of Grid Security.
Proceedings of the Grid and Cooperative Computing, 2004

2003
Computational Stability and Adaptive Strategies - An Experimental Study of ODE Software.
PhD thesis, 2003

A Research on Intrusion Detection Based on Unsupervised Clustering and Support Vector Machine.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

2000
A Virtual Private Network for Virtual Enterprise Information Systems.
Proceedings of the Web-Age Information Management, First International Conference, 2000


  Loading...