Lingling Xu

According to our database1, Lingling Xu authored at least 59 papers between 2007 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Dynamic Threshold of Carbon Phenology in Two Cold Temperate Grasslands in China.
Remote. Sens., 2021

The Gauss-Seidel method for generalized Nash equilibrium problems of polynomials.
Comput. Optim. Appl., 2021

2020
Authorized Keyword Searches on Public Key Encrypted Data With Time Controlled Keyword Privacy.
IEEE Trans. Inf. Forensics Secur., 2020

Reversible contrast enhancement for medical images with background segmentation.
IET Image Process., 2020

Intelligent Building System for 3D Construction of Complex Brick Models.
IEEE Access, 2020

2019
Tc-PEDCKS: Towards time controlled public key encryption with delegatable conjunctive keyword search for Internet of Things.
J. Netw. Comput. Appl., 2019

Multi-feature local sparse representation for infrared pedestrian tracking.
KSII Trans. Internet Inf. Syst., 2019

Re-curation and rational enrichment of knowledge graphs in Biological Expression Language.
Database J. Biol. Databases Curation, 2019

High-Capacity Reversible Data Hiding in Encrypted Images by Bit Plane Partition and MSB Prediction.
IEEE Access, 2019

2017
Understanding Content Voting Based on Social Foraging Theory.
IEEE Trans. Engineering Management, 2017

Design and theoretical analysis of virtual machine placement algorithm based on peak workload characteristics.
Soft Comput., 2017

A novel hybrid method for robust infrared target detection.
KSII Trans. Internet Inf. Syst., 2017

Two-Factor Data Access Control With Efficient Revocation for Multi-Authority Cloud Storage Systems.
IEEE Access, 2017

2016
Achieving Simple, Secure and Efficient Hierarchical Access Control in Cloud Computing.
IEEE Trans. Computers, 2016

Solutions to the anti-piracy problem in oblivious transfer.
J. Comput. Syst. Sci., 2016

Anonymous authentication for circuits from correlation-relaxed two-to-one recoding.
J. Ambient Intell. Humaniz. Comput., 2016

A fine-grained attribute-based authentication for sensitive data stored in cloud computing.
Int. J. Grid Util. Comput., 2016

2015
Coarser-Grained Multi-user Searchable Encryption in Hybrid Cloud.
Trans. Comput. Collect. Intell., 2015

Bidirectional Analysis Method of Static XSS Defect Detection Technique Based On Database Query Language.
Trans. Comput. Collect. Intell., 2015

Analyses of several recently proposed group key management schemes.
Secur. Commun. Networks, 2015

Quantum private comparison with a malicious third party.
Quantum Inf. Process., 2015

Server-Aided Verification Signature with Privacy for Mobile Computing.
Mob. Inf. Syst., 2015

An Improved Cloud Data Sharing Scheme with Hierarchical Attribute Structure.
J. Univers. Comput. Sci., 2015

A Backward Unlinkable Secret Handshake Scheme with Revocation Support in the Standard Model.
Inf., 2015

Modeling and optimization control of a demand-driven, conveyor-serviced production station.
Eur. J. Oper. Res., 2015

Understanding the continuance use of social network sites: a computer self-efficacy perspective.
Behav. Inf. Technol., 2015

Secure Image Deduplication in Cloud Storage.
Proceedings of the Information and Communication Technology, 2015

2014
Provably Secure Group Key Management Approach Based upon Hyper-Sphere.
IEEE Trans. Parallel Distributed Syst., 2014

Verifiable computation with access control in cloud computing.
J. Supercomput., 2014

Timed-release oblivious transfer.
Secur. Commun. Networks, 2014

Yet another attack on the chinese remainder theorem-based hierarchical access control scheme.
Secur. Commun. Networks, 2014

A proximal parallel splitting method for minimizing sum of convex functions with linear constraints.
J. Comput. Appl. Math., 2014

Towards provably secure proxy signature scheme based on Isomorphisms of Polynomials.
Future Gener. Comput. Syst., 2014

2013
A Parallel Splitting Method for Separable Convex Programs.
J. Optim. Theory Appl., 2013

An improved first-order primal-dual algorithm with a new correction step.
J. Glob. Optim., 2013

MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature.
IACR Cryptol. ePrint Arch., 2013

Attacks and Comments on Several Recently Proposed Key Management Schemes.
IACR Cryptol. ePrint Arch., 2013

A new partial splitting augmented Lagrangian method for minimizing the sum of three convex functions.
Appl. Math. Comput., 2013

A joint energy-saving mechanism for M2M communications in LTE-based system.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

An Optimized Random Access Algorithm for MTC Users over Wireless Networks.
Proceedings of the 77th IEEE Vehicular Technology Conference, 2013

Authentication and Key Agreement Based on Hyper-sphere Using Smart Cards.
Proceedings of the Network and System Security - 7th International Conference, 2013

Server-Aided Verification Signatures with Privacy.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

IBUOV, A Provably Secure Identity-Based UOV Signature Scheme.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

An efficient downlink packet scheduling algorithm for real time traffics in LTE systems.
Proceedings of the 10th IEEE Consumer Communications and Networking Conference, 2013

2012
A Tale of Four Functions in a Multifunctional Device: Extending Implementation Intention Theory.
IEEE Trans. Prof. Commun., 2012

The Moderating Effects of Utilitarian and Hedonic Values on Information Technology Continuance.
ACM Trans. Comput. Hum. Interact., 2012

An improved two-step method for solving generalized Nash equilibrium problems.
Eur. J. Oper. Res., 2012

Secret handshakes from ID-based message recovery signatures: A new generic approach.
Comput. Electr. Eng., 2012

A Novel Power Ramping Scheme of M2M for WCDMA Random Access Channel.
Proceedings of the 76th IEEE Vehicular Technology Conference, 2012

Proxy Signature Scheme Based on Isomorphisms of Polynomials.
Proceedings of the Network and System Security - 6th International Conference, 2012

2011
Oblivious transfer with timed-release receiver's privacy.
J. Syst. Softw., 2011

2010
Oblivious Transfer with Complex Attribute-Based Access Control.
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010

2009
A geometric non-linear interpolatory subdivision scheme via approximation scheme.
Proceedings of the 11th International Conference on Computer-Aided Design and Computer Graphics, 2009

2008
New ID-Based Signatures without Trusted PKG.
Proceedings of the International Workshop on Knowledge Discovery and Data Mining, 2008

Toward Understanding the Capability Cycle of Software Process Improvement: A Case Study of a Software Service Company.
Proceedings of the Information Technology in the Service Economy: Challenges and Possibilities for the 21st Century, 2008

Understanding Users' Continuance of Facebook: The Role of General and Specific Computer Self-Efficacy.
Proceedings of the International Conference on Information Systems, 2008

The Improvement of C-V Level Set Method for Image Segmentation.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

The Effect of Background Music-Induced Arousal on Online Consumer Search Behavior: Evaluating Search Performance and Experience.
Proceedings of the Learning from the past & charting the future of the discipline. 14th Americas Conference on Information Systems, 2008

2007
Emotional Expression Online: the Impact of Task, Relationship and Personality Perception on Emoticon Usage in Instant Messenger.
Proceedings of the Pacific Asia Conference on Information Systems, 2007


  Loading...