Ning Ding

According to our database1, Ning Ding authored at least 90 papers between 2001 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
A pattern recognition modeling approach based on the intelligent ensemble classifier: Application to identification and appraisal of water-flooded layers.
J. Systems & Control Engineering, 2019

Research on the Quantitative Method of Cognitive Loading in a Virtual Reality System.
Information, 2019

DELTA: A DEep learning based Language Technology plAtform.
CoRR, 2019

Wireless Key Generation from Imperfect Channel State Information: Performance Analysis and Improvements.
CoRR, 2019

Design and Implementation of CCRobot-II: a Palm-based Cable Climbing Robot for Cable-stayed Bridge Inspection.
Proceedings of the International Conference on Robotics and Automation, 2019

Wireless Key Generation from Imperfect Channel State Information: Performance Analysis and Improvements.
Proceedings of the 17th IEEE International Conference on Communications Workshops, 2019

On Exactly Learning Disjunctions and DNFs Without Equivalence Queries.
Proceedings of the Computing and Combinatorics - 25th International Conference, 2019

Chinese Relation Extraction with Multi-Grained Information and External Linguistic Knowledge.
Proceedings of the 57th Conference of the Association for Computational Linguistics, 2019

2018
A Light-Weight Wheel-Based Cable Inspection Climbing Robot: From Simulation to Reality.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2018

A Biologically Inspired Cable Climbing Robot: CCRobot - Design and Implementation.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2018

Secure Scheme Against Compromised Hash in Proof-of-Work Blockchain.
Proceedings of the Network and System Security - 12th International Conference, 2018

Design of Ruminant Sound Detection for Dairy Cows Based on DWT-MFCC.
Proceedings of the 5th International Conference on Systems and Informatics, 2018

Construction of a bank customer data warehouse and an application of data mining.
Proceedings of the 10th International Conference on Machine Learning and Computing, 2018

2017
Learning AC0 Under k-Dependent Distributions.
Proceedings of the Theory and Applications of Models of Computation, 2017

A simple and parallel algorithm for robot position estimation by stereo visual-inertial sensor fusion.
Proceedings of the 2017 IEEE International Conference on Robotics and Biomimetics, 2017

The potential Li4Ti5O12 battery products applications for New Zealand electric buses.
Proceedings of the 24th International Conference on Mechatronics and Machine Vision in Practice, 2017

Agnostically Learning Boolean Functions with Finite Polynomial Representation.
Proceedings of the 28th International Symposium on Algorithms and Computation, 2017

Vulnerability Detection in IoT Firmware: A Survey.
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017

Visual servoing based pickup of stationary objects with a dynamically controlled manipulator.
Proceedings of the IEEE International Conference on Industrial Technology, 2017

GfxDoctor: A Holistic Graphics Energy Profiler for Mobile Devices.
Proceedings of the Twelfth European Conference on Computer Systems, 2017

A Modified Fuzzy Fingerprint Vault Based on Pair-Polar Minutiae Structures.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

PAC Learning Depth-3 $\textrm{AC}^0$ Circuits of Bounded Top Fanin.
Proceedings of the International Conference on Algorithmic Learning Theory, 2017

2016
Research data management in universities of central China: Practices at Wuhan University Library.
The Electronic Library, 2016

Identity-Based Encryption with Verifiable Outsourced Revocation.
Comput. J., 2016

New algorithms for verifiable outsourcing of bilinear pairings.
SCIENCE CHINA Information Sciences, 2016

An Ontology Pattern for Emergency Event Modeling.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016

Four-Round Zero-Knowledge Arguments of Knowledge with Strict Polynomial-Time Simulation from Differing-Input Obfuscation for Circuits.
Proceedings of the Computing and Combinatorics - 22nd International Conference, 2016

Verifiable Outsourcing Algorithms for Modular Exponentiations with Improved Checkability.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Online hierarchical scheduling on two machines with known total size of low-hierarchy jobs.
Int. J. Comput. Math., 2015

Using Epistemic Synchronization Index (ESI) to measure students' knowledge elaboration process in CSCL.
Computers & Education, 2015

Energy and Performance of Smartphone Radio Bundling in Outdoor Environments.
Proceedings of the 24th International Conference on World Wide Web, 2015

An Event Ontology Description Framework Based on SKOS.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

Some New Consequences of the Hypothesis That P Has Fixed Polynomial-Size Circuits.
Proceedings of the Theory and Applications of Models of Computation, 2015

Smartphone Energy Drain in the Wild: Analysis and Implications.
Proceedings of the 2015 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, 2015

Smartphone Background Activities in the Wild: Origin, Energy Drain, and Optimization.
Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, 2015

On Zero-Knowledge with Strict Polynomial-Time Simulation and Extraction from Differing-Input Obfuscation for Circuits.
Proceedings of the Information Theoretic Security - 8th International Conference, 2015

Heterogeneous Roadside Unit Placement in Eco-Sustainable Communication Networks for Intelligent Transportation.
Proceedings of the Ninth International Conference on Frontier of Computer Science and Technology, 2015

A 2-V 40-MS/s 14-bit pipelined ADC for CMOS image sensor.
Proceedings of the 2015 IEEE 11th International Conference on ASIC, 2015

Extraction of Event Elements Based on Event Ontology Reasoning.
Proceedings of the Intelligent Information and Database Systems - 7th Asian Conference, 2015

2014
Three-phase Magnitude-phase Detection Based on T/4 Time-lapse Elimination Method.
JSW, 2014

Cross-network externality analysis of the price structure on the credit card market in China.
IJSS, 2014

Online Minimum makespan Scheduling with a Buffer.
Int. J. Found. Comput. Sci., 2014

Obfuscation-Based Non-Black-Box Extraction and Constant-Round Zero-Knowledge Arguments of Knowledge.
Proceedings of the Information Security - 17th International Conference, 2014

Three-Round Public-Coin Bounded-Auxiliary-Input Zero-Knowledge Arguments of Knowledge.
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014

On Computing Optimal Strategies in Open List Proportional Representation: The Two Parties Case.
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014

2013
Leadership and spirituality in business and public administration: a cross-cultural empirical study comparing the USA and France.
IJSS, 2013

Vehicle Safety Enhancement System: Sensing and Communication.
IJDSN, 2013

Computing shortest homotopic cycles on polyhedral surfaces with hyperbolic uniformization metric.
Computer-Aided Design, 2013

Characterizing and modeling the impact of wireless signal strength on smartphone battery drain.
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2013

Medial axis construction and applications in 3D wireless sensor networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

A robot for classifying Chinese calligraphic types and styles.
Proceedings of the 2013 IEEE International Conference on Robotics and Automation, 2013

A finite element contour approach to affine invariant shape representation.
Proceedings of the IEEE International Conference on Image Processing, 2013

Emergency evacuation simulation in staircases considering evacuees' physical and psychological status.
Proceedings of the 2013 IEEE International Conference on Automation Science and Engineering, 2013

Voting with partial information: what questions to ask?
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2013

2012
The impact of higher interest spread on the performance of banks in China.
IJSS, 2012

DOA Estimation of Multiple Speech Sources from a Stereophonic Mixture in Underdetermined Case.
IEICE Transactions, 2012

The only constant is change: incorporating time-varying network reservations in data centers.
Proceedings of the ACM SIGCOMM 2012 Conference, 2012

Real-time monocular visual self-localization approach using natural circular landmarks for indoor navigation.
Proceedings of the 2012 IEEE International Conference on Robotics and Biomimetics, 2012

Realizing the full potential of PSM using proxying.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

The Application of Digital Elevation Model in the Coverage Network Planning Software.
Proceedings of the Advances on Digital Television and Wireless Multimedia Communications, 2012

Efficient Ciphertext-Policy Attribute Based Encryption with Hidden Policy.
Proceedings of the Internet and Distributed Computing Systems, 2012

On Constant-Round Precise Zero-Knowledge.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Phrase Search over Encrypted Data with Symmetric Encryption Scheme.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

Multiple sources' direction finding by using reliable component on phase difference manifold and kernel density estimator.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012

Online Minimum Makespan Scheduling with a Buffer.
Proceedings of the Frontiers in Algorithmics and Algorithmic Aspects in Information and Management, 2012

On Improving the Performance of Public Key Encryption with Keyword Search.
Proceedings of the 2012 International Conference on Cloud and Service Computing, 2012

2011
A Note on Obfuscation for Cryptographic Functionalities of Secret-Operation Then Public-Encryption.
Proceedings of the Theory and Applications of Models of Computation, 2011

Distributed algorithms for bottleneck identification and segmentation in 3D wireless sensor networks.
Proceedings of the 8th Annual IEEE Communications Society Conference on Sensor, 2011

Precise Time and Space Simulatable Zero-Knowledge.
Proceedings of the Provable Security - 5th International Conference, 2011

A General and Efficient Obfuscation for Programs with Tamper-Proof Hardware.
Proceedings of the Information Security Practice and Experience, 2011

DOA estimation in underdetermined stereophonic mixture by kernel density estimator.
Proceedings of the International Symposium on Intelligent Signal Processing and Communications Systems, 2011

A distributed triangulation algorithm for wireless sensor networks on 2D and 3D surface.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Speaker localization and speech separation using Phase Difference versus Frequency distribution.
Proceedings of the 19th European Signal Processing Conference, 2011

A Note on (Im)Possibilities of Obfuscating Programs of Zero-Knowledge Proofs of Knowledge.
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011

2010
Precise bounded-concurrent zero-knowledge proofs for NP.
SCIENCE CHINA Information Sciences, 2010

NetViewer: A Universal Visualization Tool for Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2010

Disguisable Symmetric Encryption Schemes for an Anti-forensics Purpose.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

On Obfuscating Programs with Tamper-proof Hardware.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

2009
Precise Bounded-Concurrent Zero-Knowledge in Almost Constant Rounds.
IACR Cryptology ePrint Archive, 2009

Precise Time and Space Simulatable Zero-Knowledge.
IACR Cryptology ePrint Archive, 2009

Computing Fenchel-Nielsen coordinates in Teichmuller shape Space.
Proceedings of the IEEE International Conference on Shape Modeling and Applications, 2009

Research of Campus Wireless Mobile Model.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

The Simulation of Heavy Metal (Cu) Contamination in Surface Soils.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

How gender composition influences individual knowledge elaboration in CSCL.
Proceedings of the 8th International Conference on Computer Supported Collaborative Learning, 2009

Non-malleable Statistically Hiding Commitment from Any One-Way Function.
Proceedings of the Advances in Cryptology, 2009

2008
Joint and individual knowledge elaboration in CSCL.
Proceedings of the Cre8ing a learning world: Proceedings of the 8th International Conference for the Learning Sciences, 2008

2007
Physhint: a qualitative study of student's knowledge elaboration in CSCL.
Proceedings of the 7th Iternational Conference on Computer Supported Collaborative Learning, 2007

A Discrete-Logarithm Based Non-interactive Non-malleable Commitment Scheme with an Online Knowledge Extractor.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

2005
Study on information sharing in supply chain.
Proceedings of the 7th International Conference on Electronic Commerce, 2005

2001
Enterprise Alliance and Virtue Enterprise: A Systematic Analysis and Theoretical Explanation.
Proceedings of the Human Society and the Internet, 2001


  Loading...