Ping Lin

According to our database1, Ping Lin authored at least 76 papers between 1991 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Dynamical Behavior of Nonautonomous Stochastic Reaction-Diffusion Neural-Network Models.
IEEE Trans. Neural Netw. Learning Syst., 2019

Stability of stochastic impulsive reaction-diffusion neural networks with S-type distributed delays and its application to image encryption.
Neural Networks, 2019

Lattice Boltzmann method for general convection-diffusion equations: MRT model and boundary schemes.
J. Comput. Physics, 2019

An expanded mixed finite element method for two-dimensional Sobolev equations.
J. Computational Applied Mathematics, 2019

Improvement of numerical simulation for GMAW based on a new model with thermocapillary effect.
J. Computational Applied Mathematics, 2019

A highly-accurate finite element method with exponentially compressed meshes for the solution of the Dirichlet problem of the generalized Helmholtz equation with corner singularities.
J. Computational Applied Mathematics, 2019

Interbeam Interference Constrained Resource Allocation for Shared Spectrum Multibeam Satellite Communication Systems.
IEEE Internet of Things Journal, 2019

2018
A Posteriori Error Estimation and Adaptive Algorithm for Atomistic/Continuum Coupling in Two Dimensions.
SIAM J. Scientific Computing, 2018

A stochastic model for thermal transport of nanofluid in porous media: Derivation and applications.
Computers & Mathematics with Applications, 2018

In silico polypharmacology of natural products.
Briefings in Bioinformatics, 2018

An immune based dynamic risk control system.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2018

An Immunity-Based Security Threat Detection System for Cyberspace Digital Virtual Assets.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

A real value negative selection algorithm based on antibody evolution for anomaly detection.
Proceedings of the Tenth International Conference on Advanced Computational Intelligence, 2018

2017
A numerical study for multiple solutions of a singular boundary value problem arising from laminar flow in a porous pipe with moving wall.
J. Computational Applied Mathematics, 2017

Ensemble-empirical-mode-decomposition based micro-Doppler signal separation and classification.
IJCAT, 2017

Implementing discrete element method for large-scale simulation of particles on multiple GPUs.
Computers & Chemical Engineering, 2017

Evaluation and improvement of the regulatory inference for large co-expression networks with limited sample size.
BMC Systems Biology, 2017

Double-Spending Detection for Fast Bitcoin Payment Based on Artificial Immune.
Proceedings of the Theoretical Computer Science - 35th National Conference, 2017

Determination of the Varieties of Rice Kernels Based on Machine Vision and Deep Learning Technology.
Proceedings of the 10th International Symposium on Computational Intelligence and Design, 2017

Quickly and Non-destructively Estimating Tensile Strength Factors of EVAC-Based Materials on the Fields.
Proceedings of the 10th International Symposium on Computational Intelligence and Design, 2017

Convolutional Neural Networks for Comprehending Geographical Features of International Important Ramsar Wetland Ecological Habitat Scenes in China.
Proceedings of the 10th International Symposium on Computational Intelligence and Design, 2017

2016
Extendability and Optimal Control After Quenching for Some Ordinary Differential Equations.
J. Optimization Theory and Applications, 2016

Readability of compensation discussion and analysis: the impact of the Plain English initiative.
IJSS, 2016

FPODG: a flexible and private proximity testing based on 'one degree' grid.
IJSNet, 2016

Registering Retinal Vessel Images from Local to Global via Multiscale and Multicycle Features.
Proceedings of the 2016 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2016

2015
A new method for perceiving origins of international important Ramsar wetland ecological habitat scenes in China.
Computers and Electronics in Agriculture, 2015

Web-Based Geodetic Data Processing System.
Proceedings of the Fuzzy System and Data Mining, 2015

2014
A numerical method for the quasi-incompressible Cahn-Hilliard-Navier-Stokes equations for variable density flows with a discrete energy law.
J. Comput. Physics, 2014

Exploring risk containment among Big 4 firms through credit derivatives.
IJSS, 2014

Frequency acquisition synchronization for multiple antenna systems.
Int. J. Communication Systems, 2014

Continuous finite element schemes for a phase field model in two-layer fluid Bénard-Marangoni convection computations.
Computer Physics Communications, 2014

High order variable mesh off-step discretization for the solution of 1-D non-linear hyperbolic equation.
Applied Mathematics and Computation, 2014

2013
A Priori and A Posteriori W1, INFINITY Error Analysis of a QC Method for Complex Lattices.
SIAM J. Numerical Analysis, 2013

Retinal vessel segmentation using multiwavelet kernels and multiscale hierarchical decomposition.
Pattern Recognition, 2013

A Multiscale Moving Boundary Model Arising in Cancer Invasion.
Multiscale Modeling & Simulation, 2013

2012
A Low-Power Low-Cost Design of Primary Synchronization Signal Detection.
IEEE Trans. VLSI Syst., 2012

Numerical Methods for Multilattices.
Multiscale Modeling & Simulation, 2012

Single Sign-On for multiple unified communications applications.
Proceedings of the 2012 World Congress on Internet Security, 2012

State-Space Model and Kalman Filter Gain Identification by a Superspace Method.
Proceedings of the Modeling, Simulation and Optimization of Complex Processes, 2012

2011
Blowup Time Optimal Control for Ordinary Differential Equations.
SIAM J. Control and Optimization, 2011

Energy law preserving C0 finite element schemes for phase field models in two-phase flow computations.
J. Comput. Physics, 2011

A Construction and Accomplishment of ERP System for Coal Enterprises.
Proceedings of the Frontiers in Computer Education [International Conference on Frontiers in Computer Education, 2011

2010
Coherent and noncoherent detection of secondary synchronization signal.
IEEE Trans. Consumer Electronics, 2010

Multi-credit Evaluation of Construction-agency Based on Gray Model.
Proceedings of the International Conference on E-Business and E-Government, 2010

A High Linearity 6th-order active R-MOSFET-C band-pass filter for power-line communication.
Proceedings of the IEEE Asia Pacific Conference on Circuits and Systems, 2010

2009
An Asymptotic Fitting Finite Element Method with Exponential Mesh Refinement for Accurate Computation of Corner Eddies in Viscous Flows.
SIAM J. Scientific Computing, 2009

Detecting earnings management based on the quality of total accruals.
IJSS, 2009

2008
Numerical simulation of 3D bubbles rising in viscous liquids using a front tracking method.
J. Comput. Physics, 2008

A fast finite difference method for biharmonic equations on irregular domains and its application to an incompressible Stokes flow.
Adv. Comput. Math., 2008

A Particle Swarm Approach for IEEE 802.16m System Scheduling.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
A Primal-Dual Active-Set Method for Non-Negativity Constrained Total Variation Deblurring Problems.
IEEE Trans. Image Processing, 2007

Convergence Analysis of a Quasi-Continuum Approximation for a Two-Dimensional Material Without Defects.
SIAM J. Numerical Analysis, 2007

Moisture Transport and Diffusive Instability During Bread Baking.
SIAM Journal of Applied Mathematics, 2007

An adaptive homotopy multi-grid method for molecule orientations of high dimensional liquid crystals.
J. Comput. Physics, 2007

An energy law preserving C0 finite element scheme for simulating the kinematic effects in liquid crystal dynamics.
J. Comput. Physics, 2007

Image Segmentation Using Some Piecewise Constant Level Set Methods with MBO Type of Projection.
International Journal of Computer Vision, 2007

Enabling access-privacy for random walk based data analysis applications.
Data Knowl. Eng., 2007

Orchestration in Web Services and Real-Time Communications.
IEEE Communications Magazine, 2007

2006
MIKEY-RSA-R: An Additional Mode of Key Distribution in Multimedia Internet KEYing (MIKEY).
RFC, November, 2006

Simulations of singularity dynamics in liquid crystal flows: A C0 finite element approach.
J. Comput. Physics, 2006

Performance assessment of functional managers in the high-technology sector.
IJSS, 2006

Access-Private Outsourcing of Markov Chain and RandomWalk based Data Analysis Applications.
Proceedings of the 22nd International Conference on Data Engineering Workshops, 2006

2005
Hiding Tree Structured Data and Queries from Untrusted Data Stores.
Information Systems Security, 2005

2004
Hiding Traversal of Tree Structured Data from Untrusted Data Stores.
Proceedings of the Security In Information Systems, 2004

Secure and Privacy Preserving Outsourcing of Tree Structured Data.
Proceedings of the Secure Data Management, VLDB 2004 Workshop, 2004

2003
The Numerical Solution of a Challenging Class of Turning Point Problems.
SIAM J. Scientific Computing, 2003

Theoretical and numerical analysis for the quasi-continuum approximation of a material particle model.
Math. Comput., 2003

Hiding Data and Code Security for Application Hosting Infrastructure.
Proceedings of the Intelligence and Security Informatics, First NSF/NIJ Symposium, 2003

Hiding Traversal of Tree Structured Data from Untrusted Data Stores.
Proceedings of the Intelligence and Security Informatics, First NSF/NIJ Symposium, 2003

2002
A Predicted Sequential Regularization Method for Index-2 Hessenberg DAEs.
SIAM J. Numerical Analysis, 2002

1999
Sequential Regularization Methods for Simulating Mechanical Systems with Many Closed Loops.
SIAM J. Scientific Computing, 1999

1998
An Iterative Perturbation Method for the Pressure Equation in the Simulation of Miscible Displacement in Porous Media.
SIAM J. Scientific Computing, 1998

1997
Sequential Regularization Methods for Nonlinear Higher-Index DAEs.
SIAM J. Scientific Computing, 1997

1993
The Encapsulated Security Services Interface (ESSI).
Proceedings of the Computer Security, 1993

Integration of DCE and Local Registries: Design Approaches.
Proceedings of the CCS '93, 1993

1991
A numerical method for quasilinear singular perturbation problems with turning points.
Computing, 1991


  Loading...