Xiaohui Liang

Orcid: 0000-0001-6351-2538

According to our database1, Xiaohui Liang authored at least 218 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
MAGR: Manifold-Aligned Graph Regularization for Continual Action Quality Assessment.
CoRR, 2024

HyperSDFusion: Bridging Hierarchical Structures in Language and Geometry for Enhanced 3D Text2Shape Generation.
CoRR, 2024

Towards Cross-Modal Point Cloud Retrieval for Indoor Scenes.
Proceedings of the MultiMedia Modeling - 30th International Conference, 2024

2023
Hierarchical Graph Convolutional Networks for Action Quality Assessment.
IEEE Trans. Circuits Syst. Video Technol., December, 2023

Part-Aware Point Cloud Completion through Multi-Modal Part Segmentation.
Entropy, December, 2023

A Differential Diffusion Theory for Participating Media.
Comput. Graph. Forum, October, 2023

Physics-Based Differentiable Rendering for Efficient and Plausible Fluid Modeling from Monocular Video.
Entropy, September, 2023

IAACS: Image Aesthetic Assessment Through Color Composition And Space Formation.
Virtual Real. Intell. Hardw., February, 2023

A Video-Based Augmented Reality System for Human-in-the-Loop Muscle Strength Assessment of Juvenile Dermatomyositis.
IEEE Trans. Vis. Comput. Graph., 2023

Adaptive NN control of integrated guidance and control systems based on disturbance observer.
J. Frankl. Inst., 2023

Evaluating Picture Description Speech for Dementia Detection using Image-text Alignment.
CoRR, 2023

Global Physical Prior Based Fluid Reconstruction for VR/AR.
Proceedings of the IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops, 2023

VPASS: Voice Privacy Assistant System for Monitoring In-home Voice Commands.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

A Mixed Reality Training System for Hand-Object Interaction in Simulated Microgravity Environments.
Proceedings of the IEEE International Symposium on Mixed and Augmented Reality, 2023

PhyVR: Physics-based Multi-material and Free-hand Interaction in VR.
Proceedings of the IEEE International Symposium on Mixed and Augmented Reality, 2023

PointHGN: Point Heterogeneous Graph Neural Network for Point Cloud Learning.
Proceedings of the IEEE International Conference on Multimedia and Expo Workshops, 2023

Fg-T2M: Fine-Grained Text-Driven Human Motion Generation via Diffusion Model.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Dynamic Hyperbolic Attention Network for Fine Hand-object Reconstruction.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Exploiting Relevance of Speech to Sleepiness Detection via Attention Mechanism.
Proceedings of the IEEE International Conference on Communications, 2023

Early Detection of Cognitive Decline Using Voice Assistant Commands.
Proceedings of the IEEE International Conference on Acoustics, 2023

2022
Evaluating voice-assistant commands for dementia detection.
Comput. Speech Lang., 2022

3D Reconstruction of Multiple Objects by mmWave Radar on UAV.
CoRR, 2022

Aesthetic Enhancement via Color Area and Location Awareness.
Proceedings of the 30th Pacific Conference on Computer Graphics and Applications, 2022

Domain-aware Intermediate Pretraining for Dementia Detection with Limited Data.
Proceedings of the Interspeech 2022, 2022

Towards Interpretability of Speech Pause in Dementia Detection Using Adversarial Learning.
Proceedings of the IEEE International Conference on Acoustics, 2022

Speech Tasks Relevant to Sleepiness Determined With Deep Transfer Learning.
Proceedings of the IEEE International Conference on Acoustics, 2022

Voice-Assisted Food Recall Using Voice Assistants.
Proceedings of the HCI International 2022 - Late Breaking Papers: HCI for Health, Well-being, Universal Access and Healthy Aging, 2022

2021
Cumulus cloud modeling from images based on VAE-GAN.
Virtual Real. Intell. Hardw., 2021

Exploiting peer-to-peer communications for query privacy preservation in voice assistant systems.
Peer-to-Peer Netw. Appl., 2021

Fine-grained depression analysis based on Chinese micro-blog reviews.
Inf. Process. Manag., 2021

Exploring Deep Transfer Learning Techniques for Alzheimer's Dementia Detection.
Frontiers Comput. Sci., 2021

Facial reshaping operator for controllable face beautification.
Expert Syst. Appl., 2021

Enriching contextualized language model from knowledge graph for biomedical information extraction.
Briefings Bioinform., 2021

Beamforming in Multi-User MISO Cellular Networks with Deep Reinforcement Learning.
Proceedings of the 93rd IEEE Vehicular Technology Conference, 2021

Joint User Scheduling and Transmit Precoder Selection Based on DDPG for Uplink Multi-User MIMO Systems.
Proceedings of the 94th IEEE Vehicular Technology Conference, 2021

Stable Hand Pose Estimation under Tremor via Graph Neural Network.
Proceedings of the IEEE Virtual Reality and 3D User Interfaces, 2021

STGAE: Spatial-Temporal Graph Auto-Encoder for Hand Motion Denoising.
Proceedings of the IEEE International Symposium on Mixed and Augmented Reality, 2021

WavBERT: Exploiting Semantic and Non-Semantic Speech Using Wav2vec and BERT for Dementia Detection.
Proceedings of the Interspeech 2021, 22nd Annual Conference of the International Speech Communication Association, Brno, Czechia, 30 August, 2021

Exploiting Physical Presence Sensing to Secure Voice Assistant Systems.
Proceedings of the ICC 2021, 2021

2020
A Unified Deep Metric Representation for Mesh Saliency Detection and Non-Rigid Shape Matching.
IEEE Trans. Multim., 2020

Revealing Your Mobile Password via WiFi Signals: Attacks and Countermeasures.
IEEE Trans. Mob. Comput., 2020

Securely Connecting Wearables to Ambient Displays with User Intent.
IEEE Trans. Dependable Secur. Comput., 2020

Variable-Structure Near-Space Vehicles with Time-Varying State Constraints Attitude Control Based on Switched Nonlinear System.
Sensors, 2020

CTS-LSTM: LSTM-based neural networks for correlatedtime series prediction.
Knowl. Based Syst., 2020

Target-driven cloud evolution using position-based fluids.
Comput. Animat. Virtual Worlds, 2020

Sparse metric-based mesh saliency.
Neurocomputing, 2020

Cumuliform cloud formation control using parameter-predicting convolutional neural network.
Graph. Model., 2020

Exploiting Fully Convolutional Network and Visualization Techniques on Spontaneous Speech for Dementia Detection.
CoRR, 2020

Self-Healing Control for Large Launch Vehicle Based on Extended State Observer and Adaptive Dynamic Programming.
IEEE Access, 2020

LIDAUS: Localization of IoT Device via Anchor UAV SLAM.
Proceedings of the 39th IEEE International Performance Computing and Communications Conference, 2020

Small Components Parsing VIA Multi-Feature Fusion Network.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2020

Perceptual Quality Assessment On DIBR Synthesized Videos With Composite Distortions.
Proceedings of the IEEE International Conference on Image Processing, 2020

Exploiting Privacy-preserving Voice Query in Healthcare-based Voice Assistant System.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

2019
Privacy-Preserving Task Scheduling for Time-Sharing Services of Autonomous Vehicles.
IEEE Trans. Veh. Technol., 2019

A hybrid neural network model for predicting kidney disease in hypertension patients based on electronic health records.
BMC Medical Informatics Decis. Mak., 2019

Energy Theft Detection With Energy Privacy Preservation in the Smart Grid.
IEEE Internet Things J., 2019

No-reference synthetic image quality assessment with convolutional neural network and local image saliency.
Comput. Vis. Media, 2019

Multi-Scale Dual-Branch Fully Convolutional Network for Hand Parsing.
CoRR, 2019

Deep Blind Synthesized Image Quality Assessment with Contextual Multi-Level Feature Pooling.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

FARES: Fast and Accurate Recognition of Exact Scenes on Mobile Devices.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

SmartEye: Mobile Device Proximity Monitoring via Wireless Signal Analysis.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

Lifecycle Prediction of Second Use Electric Vehicle Batteries Based on ARIMA Model.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019

Observer-based Sliding Mode Fault-Tolerant Control for Spacecraft Attitude System with Actuator Faults.
Proceedings of the CAA Symposium on Fault Detection, 2019

2018
Exploiting Social Network to Enhance Human-to-Human Infection Analysis without Privacy Leakage.
IEEE Trans. Dependable Secur. Comput., 2018

Privacy Leakage of Location Sharing in Mobile Social Networks: Attacks and Defense.
IEEE Trans. Dependable Secur. Comput., 2018

DOOBNet: Deep Object Occlusion Boundary Detection from an Image.
CoRR, 2018

Hybrid constraint optimization for 3D subcutaneous vein reconstruction by near-infrared images.
Comput. Methods Programs Biomed., 2018

Scalable Remote Rendering Using Synthesized Image Quality Assessment.
IEEE Access, 2018

Modeling Detailed Cloud Scene from Multi-source Images.
Proceedings of the 26th Pacific Conference on Computer Graphics and Applications, 2018

Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

WiVo: Enhancing the Security of Voice Control System via Wireless Signal in IoT Environment.
Proceedings of the Nineteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2018

Single Depth Map Super-resolution with Local Self-similarity.
Proceedings of the 2nd International Conference on Video and Image Processing, 2018

Sketch-based Cloud Model Retrieval for Cumulus Cloud Scene Construction.
Proceedings of the 2nd International Conference on Digital Signal Processing, 2018

EPIC: Efficient Privacy-Preserving Contact Tracing for Infection Detection.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Efficient and Privacy-Preserving Roadmap Data Update for Autonomous Vehicles.
Proceedings of the IEEE Global Communications Conference, 2018

WiLock: Exploiting Wireless Signals for Device-Free Continuous Authentication.
Proceedings of the IEEE Global Communications Conference, 2018

DOOBNet: Deep Object Occlusion Boundary Detection from an Image.
Proceedings of the Computer Vision - ACCV 2018, 2018

A Deep Blind Image Quality Assessment with Visual Importance Based Patch Score.
Proceedings of the Computer Vision - ACCV 2018, 2018

2017
Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation.
IEEE Trans. Inf. Forensics Secur., 2017

Privacy-Preserving Ride Sharing Scheme for Autonomous Vehicles in Big Data Era.
IEEE Internet Things J., 2017

SPFM: Scalable and Privacy-Preserving Friend Matching in Mobile Cloud.
IEEE Internet Things J., 2017

Security and Privacy in Smart City Applications: Challenges and Solutions.
IEEE Commun. Mag., 2017

Modeling Cumulus Cloud Scenes from High-resolution Satellite Images.
Comput. Graph. Forum, 2017

Privacy-Preserving Time-Sharing Services for Autonomous Vehicles.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

SPICE: Secure Proximity-based Infrastructure for Close Encounters.
Proceedings of the First ACM Workshop on Mobile Crowdsensing Systems and Applications, 2017

A Robust Image Reflection Separation Method Based on Sift-Edge Flow.
Proceedings of the Advances in Multimedia Information Processing - PCM 2017, 2017

AuthoRing: Wearable User-presence Authentication.
Proceedings of the 2017 Workshop on Wearable Systems and Applications, 2017

LightTouch: Securely connecting wearables to ambient displays with user intent.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Estimating Cumulus Cloud Shape from a Single Image.
Proceedings of the Advances in Image and Graphics Technologies - 12th Chinese conference, 2017

Re-DPoctor: Real-Time Health Data Releasing with W-Day Differential Privacy.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Efficient and Privacy-Preserving Voice-Based Search over mHealth Data.
Proceedings of the Second IEEE/ACM International Conference on Connected Health: Applications, 2017

2016
Visual saliency guided textured model simplification.
Vis. Comput., 2016

Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data.
IEEE Trans. Dependable Secur. Comput., 2016

Privacy-Enhanced and Multifunctional Health Data Aggregation under Differential Privacy Guarantees.
Sensors, 2016

A Layered Approach for Robust Spatial Virtual Human Pose Reconstruction Using a Still Image.
Sensors, 2016

CIT: A credit-based incentive tariff scheme with fraud-traceability for smart grid.
Secur. Commun. Networks, 2016

Derivation of 3D cloud animation from geostationary satellite images.
Multim. Tools Appl., 2016

Cryptographic Public Verification of Data Integrity for Cloud Storage Systems.
IEEE Cloud Comput., 2016

Demo: Wanda, Securely Introducing Mobile Devices.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

Wanda: Securely introducing mobile devices.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

A strong bilayer appearance model for human pose estimation from a high freedom still image.
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016

Towards efficient and privacy-preserving location-based comment sharing.
Proceedings of the 2016 IEEE/CIC International Conference on Communications in China, 2016

Towards Efficient Privacy-Preserving Truth Discovery in Crowd Sensing Systems.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Privacy-Preserving mHealth Data Release with Pattern Consistency.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

A Cluster Sampling Method for Image Matting via Sparse Coding.
Proceedings of the Computer Vision - ECCV 2016, 2016

When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Security and privacy for mobile healthcare networks: from a quality of protection perspective.
IEEE Wirel. Commun., 2015

PIF: A Personalized Fine-Grained Spam Filtering Scheme With Privacy Preservation in Mobile Social Networks.
IEEE Trans. Comput. Soc. Syst., 2015

CHEMDNER system with mixed conditional random fields and multi-scale word clustering.
J. Cheminformatics, 2015

Exploiting mobile social behaviors for Sybil detection.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

2014
Querying over Encrypted Data in Smart Grids
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-06355-3, 2014

Security and privacy in mobile social networks: challenges and solutions.
IEEE Wirel. Commun., 2014

Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks.
IEEE Trans. Parallel Distributed Syst., 2014

EPPDR: An Efficient Privacy-Preserving Demand Response Scheme with Adaptive Key Evolution in Smart Grid.
IEEE Trans. Parallel Distributed Syst., 2014

Exploiting Geo-Distributed Clouds for a E-Health Monitoring System With Minimum Service Delay and Privacy Preservation.
IEEE J. Biomed. Health Informatics, 2014

SESA: an efficient searchable encryption scheme for auction in emerging smart grid marketing.
Secur. Commun. Networks, 2014

ASEHM: a new transmission control mechanism for remote rendering system.
Multim. Tools Appl., 2014

RCare: Extending Secure Health Care to Rural Area Using VANETs.
Mob. Networks Appl., 2014

Flexible editing of human motion by three-way decomposition.
Comput. Animat. Virtual Worlds, 2014

Automatic sub-category partitioning and parts localization for learning a robust object model.
Image Vis. Comput., 2014

PHDA: A priority based health data aggregation with privacy preservation for cloud assisted WBANs.
Inf. Sci., 2014

Sybil Attacks and Their Defenses in the Internet of Things.
IEEE Internet Things J., 2014

CPAL: A Conditional Privacy-Preserving Authentication With Access Linkability for Roaming Service.
IEEE Internet Things J., 2014

RSEL: revocable secure efficient lightweight RFID authentication scheme.
Concurr. Comput. Pract. Exp., 2014

Exploiting multimedia services in mobile social networks from security and privacy perspectives.
IEEE Commun. Mag., 2014

Recursive Templates Segmentation and Exemplars Matching for Human Parsing.
Comput. J., 2014

Modelling Cumulus Cloud Shape from a Single Image.
Comput. Graph. Forum, 2014

Saliency-driven Depth Compression for 3D Image Warping.
Proceedings of the 22nd Pacific Conference on Computer Graphics and Applications, 2014

Poster: Balancing disclosure and utility of personal information.
Proceedings of the 12th Annual International Conference on Mobile Systems, 2014

2013
Security and Privacy in Mobile Social Networks.
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-8857-6, 2013

UDP: Usage-Based Dynamic Pricing With Privacy Preservation for Smart Grid.
IEEE Trans. Smart Grid, 2013

PaRQ: A Privacy-Preserving Range Query Scheme Over Encrypted Metering Data for Smart Grid.
IEEE Trans. Emerg. Top. Comput., 2013

Fully Anonymous Profile Matching in Mobile Social Networks.
IEEE J. Sel. Areas Commun., 2013

Modeling Large Scale Clouds from Satellite Images.
Proceedings of the 21st Pacific Conference on Computer Graphics and Applications, 2013

Unsupervised image segmentation using global spatial constraint and multi-scale representation on multiple segmentation proposals.
Proceedings of the IEEE International Conference on Image Processing, 2013

Triangular Mesh Based Stroke Segmentation for Chinese Calligraphy.
Proceedings of the 12th International Conference on Document Analysis and Recognition, 2013

SAFE: A social based updatable filtering protocol with privacy-preserving in mobile social networks.
Proceedings of IEEE International Conference on Communications, 2013

ECQ: An Efficient Conjunctive Query scheme over encrypted multidimensional data in smart grid.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

RECCE: A reliable and efficient cloud cooperation scheme in E-healthcare.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
Enabling pervasive healthcare through continuous remote health monitoring.
IEEE Wirel. Commun., 2012

Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs.
IEEE Trans. Veh. Technol., 2012

Morality-Driven Data Forwarding With Privacy Preservation in Mobile Social Networks.
IEEE Trans. Veh. Technol., 2012

BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2012

EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications.
IEEE Trans. Parallel Distributed Syst., 2012

A Dynamic Privacy-Preserving Key Management Scheme for Location-Based Services in VANETs.
IEEE Trans. Intell. Transp. Syst., 2012

A Novel Skeletonization and Animation Approach for Point Models.
Trans. Edutainment, 2012

Feature lines extraction for remote rendering on point model.
Comput. Vis. Sci., 2012

HealthShare: Achieving secure and privacy-preserving health information sharing through health social networks.
Comput. Commun., 2012

Securing smart grid: cyber attacks, countermeasures, and challenges.
IEEE Commun. Mag., 2012

Statistical Structure Modeling and Optimal Combined Strategy Based Chinese Components Recognition.
Proceedings of the Eighth International Conference on Signal Image Technology and Internet Based Systems, 2012

Stroke-Based Chinese Character Completion.
Proceedings of the Eighth International Conference on Signal Image Technology and Internet Based Systems, 2012

PReFilter: An efficient privacy-preserving Relay Filtering scheme for delay tolerant networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Exploiting prediction to enable Secure and Reliable routing in Wireless Body Area Networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

ESLRAS: A Lightweight RFID Authentication Scheme with High Efficiency and Strong Security for Internet of Things.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

SEER: A Secure and Efficient Service Review System for Service-Oriented Mobile Social Networks.
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012

Enabling pervasive healthcare with privacy preservation in smart community.
Proceedings of IEEE International Conference on Communications, 2012

VSLP: Voronoi-socialspot-aided packet forwarding protocol with receiver Location Privacy in MSNs.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

EDR: An efficient demand response scheme for achieving forward secrecy in smart grid.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
An efficient and provably secure public key encryption scheme based on coding theory.
Secur. Commun. Networks, 2011

A Secure Handshake Scheme with Symptoms-Matching for mHealthcare Social Network.
Mob. Networks Appl., 2011

Light Space Cascaded Shadow Maps Algorithm for Real Time Rendering.
J. Comput. Sci. Technol., 2011

PEC: A privacy-preserving emergency call scheme for mobile healthcare social networks.
J. Commun. Networks, 2011

ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing.
Int. J. Secur. Networks, 2011

GRS: The green, reliability, and security of emerging machine to machine communications.
IEEE Commun. Mag., 2011

Smart community: an internet of things application.
IEEE Commun. Mag., 2011

Secure and quality of service assurance scheduling scheme for WBAN with application to eHealth.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011

I-BRIEF: A Fast Feature Point Descriptor with More Robust Features.
Proceedings of the Seventh International Conference on Signal-Image Technology and Internet-Based Systems, 2011

Flexible editing of style, identity and content of human motion.
Proceedings of the Symposium on Interactive 3D Graphics and Games, 2011

Toward Reliable Actor Services in Wireless Sensor and Actor Networks.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

An Adaptive Splitting and Transmission Control Method for Rendering Point Model on Mobile Devices.
Proceedings of the 2011 IEEE International Symposium on Multimedia, 2011

STAP: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Integrating Boundary Cue with Superpixel for Image Segmentation.
Proceedings of the Sixth International Conference on Image and Graphics, 2011

Anonymity Analysis on Social Spot Based Pseudonym Changing for Location Privacy in VANETs.
Proceedings of IEEE International Conference on Communications, 2011

Fine-Grained Identification with Real-Time Fairness in Mobile Social Networks.
Proceedings of IEEE International Conference on Communications, 2011

Side Channel Monitoring: Packet Drop Attack Detection in Wireless Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2011

An Efficient and Secure User Revocation Scheme in Mobile Social Networks.
Proceedings of the Global Communications Conference, 2011

Coordinate-Free Distributed Algorithm for Boundary Detection in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2011

EPF: An Event-Aided Packet Forwarding Protocol for Privacy-Preserving Mobile Healthcare Social Networks.
Proceedings of the Global Communications Conference, 2011

2010
Proxy re-encryption with keyword search.
Inf. Sci., 2010

Secure threshold multi authority attribute based encryption without a central authority.
Inf. Sci., 2010

PPC: Privacy-Preserving Chatting in Vehicular Peer-to-Peer Networks.
Proceedings of the 72nd IEEE Vehicular Technology Conference, 2010

The augmented reality research progress in collaboration environment of CAR-CA.
Proceedings of the 9th International Conference on Virtual Reality Continuum and its Applications in Industry, 2010

An adaptive splitting and transmission control method for rendering point model on mobile devices.
Proceedings of the 2010 Symposium on Interactive 3D Graphics, 2010

FLIP: An Efficient Privacy-Preserving Protocol for Finding Like-Minded Vehicles on the Road.
Proceedings of the Global Communications Conference, 2010

Sacrificing the Plum Tree for the Peach Tree: A Socialspot Tactic for Protecting Receiver-Location Privacy in VANET.
Proceedings of the Global Communications Conference, 2010

Message Authentication with Non-Transferability for Location Privacy in Mobile Ad hoc Networks.
Proceedings of the Global Communications Conference, 2010

Secure provenance: the essential of bread and butter of data forensics in cloud computing.
Proceedings of the 5th ACM Symposium on Information, 2010

Secure handshake with symptoms-matching: the essential to the success of mhealthcare social network.
Proceedings of the 5th International ICST Conference on Body Area Networks, 2010

How to Construct Interval Encryption from Binary Tree Encryption.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

Real-Time Camera Tracking Using a Global Localization Scheme.
Proceedings of the Computer Vision - ACCV 2010 Workshops, 2010

2009
A point-based rendering approach for real-time interaction on mobile devices.
Sci. China Ser. F Inf. Sci., 2009

Light Space Cascaded Shadow Maps for Large Scale Dynamic Environments.
Proceedings of the Motion in Games, Second International Workshop, 2009

An Improved Cloud Rendering Method.
Proceedings of the Fifth International Conference on Image and Graphics, 2009

A novel simplification algorithm based on MLS and Splats for point models.
Proceedings of the 2009 Computer Graphics International Conference, 2009

Provably secure and efficient bounded ciphertext policy attribute based encryption.
Proceedings of the 2009 ACM Symposium on Information, 2009

Attribute based proxy re-encryption with delegating capabilities.
Proceedings of the 2009 ACM Symposium on Information, 2009

Multi-attributes controlled point-based rendering architecture for mobile devices.
Proceedings of the 11th International Conference on Computer-Aided Design and Computer Graphics, 2009

2008
New (t, n) threshold directed signature scheme with provable security.
Inf. Sci., 2008

A Simple User Authentication Scheme for Grid Computing.
Int. J. Netw. Secur., 2008

A simple deniable authentication protocol based on the Diffie-Hellman algorithm.
Int. J. Comput. Math., 2008

Efficient and secure protocol in fair document exchange.
Comput. Stand. Interfaces, 2008

A Level of Detail Selection Method for Multi-Type Objects Based on The Span of Level Changed.
Proceedings of the 2008 IEEE Conference on Robotics, Automation and Mechatronics, 2008

GPU-Based Feature-Preserving Distance Field Computation.
Proceedings of the International Conference on Cyberworlds 2008, 2008

A collaborative virtual assembly system based on mobile devices.
Proceedings of the 13th Asia-Pacific Computer Systems Architecture Conference, 2008

2007
Proxy Re-Signature Schemes without Random Oracles.
IACR Cryptol. ePrint Arch., 2007

Short Group Signature without Random Oracles.
IACR Cryptol. ePrint Arch., 2007

GPU-Based Real-Time Deformation with Normal Reconstruction.
Proceedings of the Technologies for E-Learning and Digital Entertainment, 2007

A multiresolution object space point-based rendering approach for mobile devices.
Proceedings of the 5th International Conference on Computer Graphics, 2007

2006
Constructing 3D Surface from Planar Contours with Grid Adjustment Analysis.
Proceedings of the Interactive Technologies and Sociotechnical Systems, 2006

Adaptive Mechanisms of Organizational Structures in Multi-agent Systems.
Proceedings of the Agent Computing and Multi-Agent Systems, 2006

A Graph Transformation System Model of Dynamic Reorganization in Multi-agent Systems.
Proceedings of the Intelligent Data Engineering and Automated Learning, 2006

SIVP: A Toolkit for Integrating Visualization into Virtual Environment.
Proceedings of the 16th International Conference on Artificial Reality and Telexistence, 2006

A Point-Based Rendering Approach for Mobile Devices.
Proceedings of the 16th International Conference on Artificial Reality and Telexistence, 2006

A Graph Based Simulation of Reorganization in Multi-agent Systems.
Proceedings of the 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2006

Real-time deformation using modal analysis on graphics hardware.
Proceedings of the 4th International Conference on Computer Graphics and Interactive Techniques in Australasia and Southeast Asia 2006, Kuala Lumpur, Malaysia, November 29, 2006

Commitment and Obligation Based on Utility in Agent Organization.
Proceedings of the Firth IEEE International Conference on Cognitive Informatics, 2006

2005
A Toolkit for Automatically Modeling and Simulating 3D Multi-articulation Entity in Distributed Virtual Environment.
Proceedings of the Computational Science and Its Applications, 2005

2003
Collaboration Based on Hierachical Relationship.
Proceedings of the 2003 IEEE/WIC International Conference on Intelligent Agent Technology (IAT 2003), 2003


  Loading...