Lun Li

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.


CruParamer: Learning on Parameter-Augmented API Sequences for Malware Detection.
IEEE Trans. Inf. Forensics Secur., 2022

Database Resources of the National Genomics Data Center, China National Center for Bioinformation in 2022.
, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
Nucleic Acids Res., 2022

2D Sin-Cos-Henon Map for Color Image Encryption with High Security.
J. Appl. Math., 2022

A High-Security Privacy Image Encryption Algorithm Based on Chaos and Double Encryption Strategy.
J. Appl. Math., 2022

Understanding the effects of self-peer-platform incentives on users' physical activity in mobile fitness apps: the role of gender.
Inf. Technol. People, 2022

Approximation of Images via Generalized Higher Order Singular Value Decomposition over Finite-dimensional Commutative Semisimple Algebra.
CoRR, 2022

Black box attack and network intrusion detection using machine learning for malicious traffic.
Comput. Secur., 2022

An empirical study of vulnerability discovery methods over the past ten years.
Comput. Secur., 2022

Novel One-Dimensional Chaotic System and Its Application in Image Encryption.
Complex., 2022

Collaborative filtering algorithm with social information and dynamic time windows.
Appl. Intell., 2022

A Novel Deep Learning based CSI Feedback Approach for Massive MIMO Systems.
Proceedings of the 2022 International Wireless Communications and Mobile Computing, 2022

Resource Allocation for D2D Communication Underlaying Cellular Network.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

Bit2CV: A Novel Bitcoin Anti-Fraud Deposit Scheme for Connected Vehicles.
IEEE Trans. Intell. Transp. Syst., 2021

Research on Path Planning Algorithm for Crowd Evacuation.
Symmetry, 2021

Artificial fly visual joint perception neural network inspired by multiple-regional collision detection.
Neural Networks, 2021

A bibliometric analysis of global research output on network meta-analysis.
BMC Medical Informatics Decis. Mak., 2021

Blind Detection Design for AF Two-Way Relaying Over Frequency Selective Channels.
Int. J. Wirel. Inf. Networks, 2021

Gradient-based fly immune visual recurrent neural network solving large-scale global optimization.
Neurocomputing, 2021

Research on partitioning algorithm based on RDF graph.
Concurr. Comput. Pract. Exp., 2021

VDSimilar: Vulnerability detection based on code similarity of vulnerabilities and patches.
Comput. Secur., 2021

A novel constrained reconstruction model towards high-resolution subtomogram averaging.
Bioinform., 2021

EmuIoTNet: An Emulated IoT Network for Dynamic Analysis.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

Global convergence of the EM algorithm for ARX models with uncertain communication channels.
Syst. Control. Lett., 2020

Unidimensional continuous-variable quantum key distribution with noisy source.
Quantum Inf. Process., 2020

Toward conditionally anonymous Bitcoin transactions: A lightweight-script approach.
Inf. Sci., 2020

Predicting protein functions by using non-negative matrix factorisation with multi-networks co-regularisation.
Int. J. Data Min. Bioinform., 2020

Compressed sensing improved iterative reconstruction-reprojection algorithm for electron tomography.
BMC Bioinform., 2020

Improved Social Force Model Based on Emotional Contagion and Evacuation Assistant.
IEEE Access, 2020

A Collaborative Filtering Algorithm Based on the User Characteristics and Time Windows.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

CHEAPS2AGA: Bounding Space Usage in Variance-Reduced Stochastic Gradient Descent over Streaming Data and Its Asynchronous Parallel Variants.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

A Data-Driven Approach for GPS Trajectory Data Cleaning.
Proceedings of the Database Systems for Advanced Applications, 2020

AuTom-dualx: a toolkit for fully automatic fiducial marker-based alignment of dual-axis tilt series with simultaneous reconstruction.
Bioinform., 2019

Bitcoin Options Pricing Using LSTM-Based Prediction Model and Blockchain Statistics.
Proceedings of the IEEE International Conference on Blockchain, 2019

Predicting protein functions through non-negative matrix factorization regularized by protein-protein interaction network and gene functional information.
Proceedings of the 2019 IEEE International Conference on Bioinformatics and Biomedicine, 2019

Effect of Doctor's Reputation on Patient Appointment in Online Health Communities.
Proceedings of the 6th International Conference on Behavioral, 2019

Fault Characteristics Analysis and Line Protection Design Within a Large-Scale Photovoltaic Power Plant.
IEEE Trans. Smart Grid, 2018

SnapFiner: A Page-Aware Snapshot System for Virtual Machines.
IEEE Trans. Parallel Distributed Syst., 2018

CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles.
IEEE Trans. Intell. Transp. Syst., 2018

ICON-MIC: Implementing a CPU/MIC Collaboration Parallel Framework for ICON on Tianhe-2 Supercomputer.
J. Comput. Biol., 2018

Off-line Fault Location for VSC-DC Distribution Network.
Proceedings of the 2018 International Conference on Control, 2018

Modeling for Traffic Replay in Virtual Network.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

A High Precision Recommendation Algorithm Based on Combination Features.
Proceedings of the Database Systems for Advanced Applications, 2018

Proceedings of the 5th IEEE International Conference on Cloud Computing and Intelligence Systems, 2018

面向时间感知的微博传播模型研究 (Research on Temporal Perception-oriented Microblog Propagation Model).
计算机科学, 2017

Accelerating Electron Tomography Reconstruction Algorithm ICON Using the Intel Xeon Phi Coprocessor on Tianhe-2 Supercomputer.
Proceedings of the Bioinformatics Research and Applications - 13th International Symposium, 2017

A Fully Automatic Geometric Parameters Determining Method for Electron Tomography.
Proceedings of the Bioinformatics Research and Applications - 13th International Symposium, 2017

Visualization of association rules based on a gray correlation analysis model.
Proceedings of the 13th International Conference on Natural Computation, 2017

A Low-Cost Low-Power Ring Oscillator-Based Truly Random Number Generator for Encryption on Smart Cards.
IEEE Trans. Circuits Syst. II Express Briefs, 2016

本体语义相似度自适应综合加权算法研究 (Adaptive Ontology Semantic Similarity Comprehensive Weighted Algorithm).
计算机科学, 2016

Functional similarities between microRNAs inferred from biomedical texts.
Int. J. Data Min. Bioinform., 2016

Secure spectrum-efficient frequency hopping for return link of protected tactical satellite communications.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

DMNS: A Framework to Dynamically Monitor Simulated Network.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

A Fuzzy MEBN Ontology Language Based on OWL2.
Proceedings of the Fuzzy Systems and Data Mining II, 2016

An SDKEY Data Protection and Sharing Scheme with Attribute-Based Encryption for Smartphone.
Proceedings of the 4th International Conference on Enterprise Systems, 2016

基于关键词的RDF数据图查询模型研究 (Research of Keyword Search Model over RDF Data Graph).
计算机科学, 2015

CNC double spiral tool-path generation based on parametric surface mapping.
Comput. Aided Des., 2015

Traffic Replay in Virtual Network Based on IP-Mapping.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Lightweight Virtual Machine Checkpoint and Rollback for Long-running Applications.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Energy-efficient and area-efficient switching scheme for SAR ADCs.
Proceedings of the 2015 IEEE 11th International Conference on ASIC, 2015

Blind Transmission and Detection Designs With Unique Identification and Full Diversity for Noncoherent Two-Way Relay Networks.
IEEE Trans. Veh. Technol., 2014

Establishing Reliable miRNA-Cancer Association Network Based on Text-Mining Method.
Comput. Math. Methods Medicine, 2014

A low power injection-locked divider for body sensor network.
Proceedings of the 2014 International Symposium on Integrated Circuits (ISIC), 2014

A SDKEY-Based Secure Storage and Transmission Approach for Android Phone.
Proceedings of the 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2014

BigData Oriented Open Scalable Relational Data Model.
Proceedings of the 2014 IEEE International Congress on Big Data, Anchorage, AK, USA, June 27, 2014

Generation method for five-axis NC spiral tool path based on parametric surface mapping.
J. Syst. Sci. Complex., 2013

Indoor Multi-wall Path Loss Model at 1.93 GHz.
Proceedings of the 32th IEEE Military Communications Conference, 2013

Blind Detection with Unique Identification in Two-Way Relay Channel.
IEEE Trans. Wirel. Commun., 2012

Measurement of Sea Surface Wind Direction Using Bistatic High-Frequency Radar.
IEEE Trans. Geosci. Remote. Sens., 2012

Array calibration for mutual coupling errors of high-frequency surface wave radar.
IEICE Electron. Express, 2012

Array calibration method for gain-phase errors based on asynchronous interstation direct wave interference.
IEICE Electron. Express, 2012

Ocean gravity wave phase velocity detection by HFSWR.
IEICE Electron. Express, 2012

A novel memory compression technique for embedded system.
Proceedings of the 2012 Second International Conference on Digital Information and Communication Technology and it's Applications (DICTAP), 2012

Identification of true EST alignments for recognising transcribed regions.
Int. J. Data Min. Bioinform., 2011

Indentifying Disease Genes Using Disease-Specific Amino Acid Usage.
Proceedings of the Bio-Inspired Computing and Applications, 2011

Resource Description and Discovery of Campus Grid.
Proceedings of the Applied Informatics and Communication - International Conference, 2011

Cooperative Distributed MISO Wireless Relay Networks Under Jamming Environments with Power Constraints.
Proceedings of the Third International Conference on Computational Intelligence, 2011

Digital System Verification: A Combined Formal Methods and Simulation Framework
Synthesis Lectures on Digital Circuits and Systems, Morgan & Claypool Publishers, 2010

A novel serial crime prediction model based on Bayesian learning theory.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010

Exact Path Delay Fault Coverage Calculation of Partitioned Circuits.
IEEE Trans. Computers, 2009

A Discrete Logarithm Number System for Integer Arithmetic Modulo 2<sup>k</sup>: Algorithms and Lookup Structures.
IEEE Trans. Computers, 2009

Geometric algorithm for point projection and inversion onto Bézier surfaces.
Frontiers Comput. Sci. China, 2009

Effect of Different Textured Surfaces on Lubricating Characteristics of Area Contact Friction Pairs.
Proceedings of the 6th CIRP-Sponsored International Conference on Digital Enterprise Technology, 2009

Virtual Prototype of the Tunnel Boring Machine and Movement Simulation in DIVISION MOCKUP2000i2.
Proceedings of the 6th CIRP-Sponsored International Conference on Digital Enterprise Technology, 2009

Equivalence and existence of weak Pareto optima for multiobjective optimization problems with cone constraints.
Appl. Math. Lett., 2008

Accurate and Efficient Algorithm for the Closest Point on a Parametric Curve.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

Research on a New Kind of Adaptive Parallel Scan Method in Laser Metal Deposition Shaping.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

Design and Model Analysis of the E-Commerce Development Platform for 3-Tiered Web Applications.
Proceedings of the ALPIT 2008, 2008

Automatic High Level Assertion Generation and Synthesis for Embedded System Design.
Proceedings of the Forum on specification and Design Languages, 2007

A Quantum CAD Accelerator Based on Grover's Algorithm for Finding the Minimum Fixed Polarity Reed-Muller Form.
Proceedings of the 36th IEEE International Symposium on Multiple-Valued Logic (ISMVL 2006), 2006

Discovering Dependencies for Network Management.
Proceedings of the 5th ACM Workshop on Hot Topics in Networks, 2006

A digit serial algorithm for the integer power operation.
Proceedings of the 16th ACM Great Lakes Symposium on VLSI 2006, Philadelphia, PA, USA, April 30, 2006

Performance Evaluation of a Novel Direct Table Lookup Method and Architecture with Application to 16-bit Integer Functions.
Proceedings of the 2006 IEEE International Conference on Application-Specific Systems, 2006

Hardware Implementation of an Additive Bit-Serial Algorithm for the Discrete Logarithm Modulo 2<sup>k</sup>.
Proceedings of the 2005 IEEE Computer Society Annual Symposium on VLSI (ISVLSI 2005), 2005

A Genetic Approach for Conjunction Scheduling in Symbolic Equivalence Checking.
Proceedings of the 2004 IEEE Computer Society Annual Symposium on VLSI (ISVLSI 2004), 2004

Performance enhancement in phased logic circuits using automatic slack-matching buffer insertion.
Proceedings of the 14th ACM Great Lakes Symposium on VLSI 2004, 2004

Extensions of jump Markov system estimation techniques.
Proceedings of the American Control Conference, 2002