Rong Cheng

Orcid: 0000-0003-0189-2330

According to our database1, Rong Cheng authored at least 42 papers between 2000 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Meta-adaptive-weighting-based bilateral multi-dimensional refined space feature attention network for imbalanced breast cancer histopathological image classification.
Comput. Biol. Medicine, September, 2023

An improved method for predicting truncated multiple recursive generators with unknown parameters.
Des. Codes Cryptogr., May, 2023

Rational Feedforward Tuning Using Variance-Optimal Instrumental Variables Method Based on Dual-Loop Iterative Learning Control.
IEEE Trans. Ind. Informatics, March, 2023

2022
On the Sum-of-Squares of Differential Distribution Table for (<i>n</i>, <i>n</i>)-Functions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., September, 2022

Dual-Loop Iterative Learning Control With Application to an Ultraprecision Wafer Stage.
IEEE Trans. Ind. Electron., 2022

Grating Interferometer with Redundant Design for Performing Wide-Range Displacement Measurements.
Sensors, 2022

A hyper-heuristic approach to the strategic planning of bike-sharing infrastructure.
Comput. Ind. Eng., 2022

LocRDF: An Ontology-Aware Key-Value Store for Massive RDF Data.
Proceedings of the Web Information Systems and Applications, 2022

2021
Security Enhanced RFID Authentication Protocols for Healthcare Environment.
Wirel. Pers. Commun., 2021

A Direction-of-Arrival Estimation Algorithm Based on Compressed Sensing and Density-Based Spatial Clustering and Its Application in Signal Processing of MEMS Vector Hydrophone.
Sensors, 2021

Impacts of store-brand introduction on a multiple-echelon supply chain.
Eur. J. Oper. Res., 2021

2020
Authorized Keyword Searches on Public Key Encrypted Data With Time Controlled Keyword Privacy.
IEEE Trans. Inf. Forensics Secur., 2020

Store-brand introduction and production arrangement in the presence of multiple retailers.
RAIRO Oper. Res., 2020

Quantum algorithm for solving hyperelliptic curve discrete logarithm problem.
Quantum Inf. Process., 2020

Energy-efficient renewable scheme for rechargeable sensor networks.
EURASIP J. Wirel. Commun. Netw., 2020

An Improved Harris's Hawks Optimization for SAR Target Recognition and Stock Market Index Prediction.
IEEE Access, 2020

2019
Efficient obfuscation for CNF circuits and applications in cloud computing.
Soft Comput., 2019

Does car sharing help reduce the total number of vehicles?
Soft Comput., 2019

Optimal pricing decision for supply chains with risk sensitivity and human estimation.
Int. J. Mach. Learn. Cybern., 2019

Improved fireworks algorithm with information exchange for function optimization.
Knowl. Based Syst., 2019

Selling or sharing: Business model selection problem for an automobile manufacturer with uncertain information.
J. Intell. Fuzzy Syst., 2019

A Renewable Charging Approach with Low Energy Consumption in Wireless Sensor Networks.
Proceedings of the 19th IEEE International Conference on Communication Technology, 2019

2018
How does store-brand introduction affect a supply chain with uncertain information?
J. Intell. Fuzzy Syst., 2018

Impacts of Power Structure on Supply Chain with a Store Brand.
Asia Pac. J. Oper. Res., 2018

2016
A position measurement method for 3-degree-of-freedom motion based on magnetic detection.
J. Syst. Control. Eng., 2016

2015
Lattice-based obfuscation for re-encryption functions.
Secur. Commun. Networks, 2015

Radial Wavelet Neural Network with a Novel Self-Creating Disk-Cell-Splitting Algorithm for License Plate Character Recognition.
Entropy, 2015

Obfuscation for multi-use re-encryption and its application in cloud computing.
Concurr. Comput. Pract. Exp., 2015

Initialization by a Novel Clustering for Wavelet Neural Network as Time Series Predictor.
Comput. Intell. Neurosci., 2015

Verifiable Searchable Symmetric Encryption from Indistinguishability Obfuscation.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Secure Hamming distance based record linkage with malicious adversaries.
Comput. Electr. Eng., 2014

A Full Privacy-Preserving Scheme for Location-Based Services.
Proceedings of the Information and Communication Technology, 2014

2013
Cryptoanalysis and improvement of smart prepayment meter protocol in standard Q/GDW 365.
Int. J. Grid Util. Comput., 2013

Secure Obfuscation of Conditional Re-encryption with Keyword Search.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

On Obfuscating Set-Membership Predicate Functions.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

2012
The solution sets for second order semilinear impulsive multivalued boundary value problems.
Comput. Math. Appl., 2012

2011
Secure Obfuscation of Encrypted Verifiable Encrypted Signatures.
Proceedings of the Provable Security - 5th International Conference, 2011

An efficient algorithm for Chinese license plate location.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

2010
Robustness of urban bus traffic networks: A 'load points' analysis.
Proceedings of the 2010 IEEE International Conference on Intelligent Systems and Knowledge Engineering, 2010

2001
The second generation CAI and Its research path.
Proceedings of the ISCA 16th International Conference Computers and Their Applications, 2001

2000
Estimation of the Mutation Rate During Error-prone Polymerase Chain Reaction.
J. Comput. Biol., 2000

An intelligent engineering network planner system.
Proceedings of the ISCA 15th International Conference Computers and Their Applications, 2000


  Loading...