Yaping Lin

Orcid: 0000-0002-9052-9789

According to our database1, Yaping Lin authored at least 116 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A novel dual cloud server privacy-preserving scheme in spatial crowdsourcing.
Comput. Secur., March, 2024

2023
Compressed Sensing-Based Privacy Preserving in Labeled Dynamic Social Networks.
IEEE Syst. J., June, 2023

Efficient Privacy-Preserving Geographic Keyword Boolean Range Query Over Encrypted Spatial Data.
IEEE Syst. J., March, 2023

ELGONBP: A grouped neighboring intensity difference encoding for texture classification.
Multim. Tools Appl., March, 2023

2022
Differential Privacy-Based Location Protection in Spatial Crowdsourcing.
IEEE Trans. Serv. Comput., 2022

Secure and Verifiable Keyword Search in Multiple Clouds.
IEEE Syst. J., 2022

2021
Inference Attack-Resistant E-Healthcare Cloud System with Fine-Grained Access Control.
IEEE Trans. Serv. Comput., 2021

Differential Privacy-Based Genetic Matching in Personalized Medicine.
IEEE Trans. Emerg. Top. Comput., 2021

LDP-Based Social Content Protection for Trending Topic Recommendation.
IEEE Internet Things J., 2021

An accurate and efficient two-phase scheme for detecting Android cloned applications.
Concurr. Comput. Pract. Exp., 2021

Multi-community Opportunistic Routing Algorithm Based on Machine Learning In the Internet of Vehicles.
Proceedings of the 8th IEEE International Conference on Cyber Security and Cloud Computing, 2021

2020
Using Training Samples Retrieved from a Topographic Map and Unsupervised Segmentation for the Classification of Airborne Laser Scanning Data.
Remote. Sens., 2020

Improving interpolation-based oversampling for imbalanced data learning.
Knowl. Based Syst., 2020

HIBoost: A hubness-aware ensemble learning algorithm for high-dimensional imbalanced data classification.
J. Intell. Fuzzy Syst., 2020

LGENet: Local and Global Encoder Network for Semantic Segmentation of Airborne Laser Scanning Point Clouds.
CoRR, 2020

Oversampling for Imbalanced Time Series Data.
CoRR, 2020

A novel method for malware detection on ML-based visualization technique.
Comput. Secur., 2020

A Secure and Efficient Task Matching Scheme for Spatial Crowdsourcing.
IEEE Access, 2020

2019
Dynamic Texture Classification Using Unsupervised 3D Filter Learning and Local Binary Encoding.
IEEE Trans. Multim., 2019

Offline privacy preserving proxy re-encryption in mobile cloud computing.
Pervasive Mob. Comput., 2019

Minority oversampling for imbalanced ordinal regression.
Knowl. Based Syst., 2019

Quantitative similarity calculation method for trajectory-directed line using sketch retrieval.
J. Vis. Commun. Image Represent., 2019

An interactive method for identifying the stay points of the trajectory of moving objects.
J. Vis. Commun. Image Represent., 2019

AdaBoostRS: 高维不平衡数据学习的集成整合 (AdaBoostRS: Integration of High-dimensional Unbalanced Data Learning).
计算机科学, 2019

Differential privacy-based trajectory community recommendation in social network.
J. Parallel Distributed Comput., 2019

Efficient decentralized multi-authority attribute based encryption for mobile cloud data storage.
J. Netw. Comput. Appl., 2019

A lightweight privacy and integrity preserving range query scheme for mobile cloud computing.
Comput. Secur., 2019

A class imbalance-aware Relief algorithm for the classification of tumors using microarray gene expression data.
Comput. Biol. Chem., 2019

FCMDAP: using miRNA family and cluster information to improve the prediction accuracy of disease related miRNAs.
BMC Syst. Biol., 2019

ATMPA: attacking machine learning-based malware visualization detection methods via adversarial examples.
Proceedings of the International Symposium on Quality of Service, 2019

Dynamic Texture Recognition Using 3D Random Features.
Proceedings of the IEEE International Conference on Acoustics, 2019

2018
Dynamic Texture Recognition Using Volume Local Binary Count Patterns With an Application to 2D Face Spoofing Detection.
IEEE Trans. Multim., 2018

Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing.
IEEE Trans. Cloud Comput., 2018

Directional gradients integration image for illumination insensitive face representation.
Mach. Vis. Appl., 2018

Beware of What You Share: Inferring User Locations in Venmo.
IEEE Internet Things J., 2018

Privacy-Preserving Search Over Encrypted Personal Health Record In Multi-Source Cloud.
IEEE Access, 2018

An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over Encrypted Cloud Data.
IEEE Access, 2018

A Secure and Efficient Privacy-Preserving Range Query Scheme in Location-Based Services.
IEEE Access, 2018

A Privacy-Preserving Principal Component Analysis Outsourcing Framework.
Proceedings of the 17th IEEE International Conference On Trust, 2018

2017
Synthetic minority oversampling technique for multiclass imbalance problems.
Pattern Recognit., 2017

Representation of algebraic domains by formal association rule systems.
Math. Struct. Comput. Sci., 2017

An Efficient and Packing-Resilient Two-Phase Android Cloned Application Detection Approach.
Mob. Inf. Syst., 2017

Time and Energy Optimization Algorithms for the Static Scheduling of Multiple Workflows in Heterogeneous Computing System.
J. Grid Comput., 2017

Anonymizing popularity in online social networks with full utility.
Future Gener. Comput. Syst., 2017

Secure hitch in location based social networks.
Comput. Commun., 2017

Verifiable social data outsourcing.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Dynamic texture recognition using multiscale PCA-learned filters.
Proceedings of the 2017 IEEE International Conference on Image Processing, 2017

2016
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing.
IEEE Trans. Computers, 2016

Image decomposition-based structural similarity index for image quality assessment.
EURASIP J. Image Video Process., 2016

Detecting Attacks Smartly in Vehicle Cloud Computing.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

Preserving Location and Content Privacy for Secure Ranked Queries in Location Based Services.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

A secure hierarchical deduplication system in cloud storage.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016

2015
Reconfigurable Binding against FPGA Replay Attacks.
ACM Trans. Design Autom. Electr. Syst., 2015

A PUF-FSM Binding Scheme for FPGA IP Protection and Pay-Per-Device Licensing.
IEEE Trans. Inf. Forensics Secur., 2015

Cooperative Data Reduction in Wireless Sensor Network.
ACM Trans. Embed. Comput. Syst., 2015

Full-Duplex MAC Protocol Based on Adaptive Contention Window for Visible Light Communication.
JOCN, 2015

A Wavelet-Based Image Preprocessing Method or Illumination Insensitive Face Recognition.
J. Inf. Sci. Eng., 2015

Face recognition using local gradient binary count pattern.
J. Electronic Imaging, 2015

Secure and Verifiable Multi-owner Ranked-Keyword Search in Cloud Computing.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Authenticating Top-k Results of Secure Multi-keyword Search in Cloud Computing.
Proceedings of the Security and Privacy in Communication Networks, 2015

Efficient and privacy-preserving search in multi-source personal health record clouds.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

KD-tree based clustering algorithm for fast face recognition on large-scale data.
Proceedings of the Seventh International Conference on Digital Image Processing, 2015

2014
Weighing Fusion Method for Truck Scales Based on Prior Knowledge and Neural Network Ensembles.
IEEE Trans. Instrum. Meas., 2014

Privacy and integrity preserving skyline queries in tiered sensor networks.
Secur. Commun. Networks, 2014

Efficient distributed skyline computation using dependency-based data partitioning.
J. Syst. Softw., 2014

Energy-efficient filtering for skyline queries in cluster-based sensor networks.
Comput. Electr. Eng., 2014

Privacy-preserving Data Aggregation Scheme Based on the P-Function Set in Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2014

Secure and Efficient Video Surveillance in Cloud Computing.
Proceedings of the 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2014

Secure distributed keyword search in multiple clouds.
Proceedings of the IEEE 22nd International Symposium of Quality of Service, 2014

Improving the reliability of RO PUF using frequency offset.
Proceedings of the 2014 International Conference on Field-Programmable Technology, 2014

Secure Ranked Multi-keyword Search for Multiple Data Owners in Cloud Computing.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

2013
Skyline Monitoring in Wireless Sensor Networks.
IEICE Trans. Commun., 2013

A comprehensive metering scheme for intellectual property protection during both after-sale and evaluation periods of IC design.
IEICE Electron. Express, 2013

Using a conceptual Bayesian network to investigate environmental management of vegetable production in the Lake Taihu region of China.
Environ. Model. Softw., 2013

Secure and Verifiable Top-k Query in Two-Tiered Sensor Networks.
Proceedings of the Security and Privacy in Communication Networks, 2013

A digital watermarking approach to secure and precise range query processing in sensor networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

A Multi-dimensional Packet Classification Algorithm Based on Hierarchical All-Match B+ Tree.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

FPGA IP protection by binding Finite State Machine to Physical Unclonable Function.
Proceedings of the 23rd International Conference on Field programmable Logic and Applications, 2013

Binding Hardware IPs to Specific FPGA Device via Inter-twining the PUF Response with the FSM of Sequential Circuits.
Proceedings of the 21st IEEE Annual International Symposium on Field-Programmable Custom Computing Machines, 2013

Design and Implementation of a Delay-Based PUF for FPGA IP Protection.
Proceedings of the 2013 International Conference on Computer-Aided Design and Computer Graphics, 2013

2012
Organisation and management of shared documents in super-peer networks based semantic hierarchical cluster trees.
Peer-to-Peer Netw. Appl., 2012

Towards Dynamic and Scalable High-Speed IP Address Lookup Based on B+ Tree.
IEICE Trans. Inf. Syst., 2012

TimFastPlace: Critical-path based timing driven FastPlace.
IEICE Electron. Express, 2012

Efficient verification of IP watermarks in FPGA designs through lookup table content extracting.
IEICE Electron. Express, 2012

An algorithm for fatigue pattern detection based on parallel Gabor and 1-nearest neighbor.
Proceedings of the Fourth International Conference on Digital Image Processing, 2012

2011
Energy-aware interleaving for robust image transmission over visual sensor networks.
IET Wirel. Sens. Syst., 2011

2010
Turing Patterns and Wavefronts for Reaction-Diffusion Systems in an Infinite Channel.
SIAM J. Appl. Math., 2010

A clique base node scheduling method for wireless sensor networks.
J. Netw. Comput. Appl., 2010

Privacy-preserving Data Aggregation Based on the P-function Set in Wireless Sensor Networks.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Ant-Based Reliable Multi-Constrained Anycast Routing for Sensor Networks.
Int. J. Distributed Sens. Networks, 2009

Ant-Based Delay-Sensitive Query Processing for Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2009

A Survey on Position-Based Routing Algorithms in Wireless Sensor Networks.
Algorithms, 2009

2008
Ring-Based Optimal-Level Distributed Wavelet Transform with Arbitrary Filter Length for Wireless Sensor Networks.
EURASIP J. Adv. Signal Process., 2008

A Distributed Lightweight Group Rekeying Scheme with Speedy Node Revocation for Wireless Sensor Networks.
Proceedings of the MSN 2008, 2008

Analysis on Node's Pairwise Key Path Construction in Sensor Networks.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008

Ant-based query processing for replicated events in wireless sensor networks.
Proceedings of the IEEE Congress on Evolutionary Computation, 2008

2007
Key Distribution for Group-based Sensor Deployment Using a Novel Interconnection Graph.
Proceedings of the 2007 International Symposium on a World of Wireless, 2007

Voronoi Tessellation Based Rapid Coverage Decision Algorithm for Wireless Sensor Networks.
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007

A Novel Relative Space Based Gene Feature Extraction and Cancer Recognition.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2007

A Novel EPA-KNN Gene Classification Algorithm.
Proceedings of the Advances in Neural Networks, 2007

RAS: A Robust Authentication Scheme for Filtering False Data in Wireless Sensor Networks.
Proceedings of the 15th IEEE International Conference on Networks, 2007

Two Approaches on Pairwise Key Path Establishment for Sensor Networks.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

2006
Compressing Spatial and Temporal Correlated Data in Wireless Sensor Networks Based on Ring Topology.
Proceedings of the Advances in Web-Age Information Management, 2006

Research on Pairwise Key Establishment Model and Algorithm for Sensor Networks.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

A Further Approach on Hypercube-Based Pairwise Key Establishment in Sensor Networks.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

Wrapper Maintenance for Web-Data Extraction Based on Pages Features.
Proceedings of the Intelligent Information Processing and Web Mining, 2006

Using Most Similarity Tree Based Clustering to Select the Top Most Discriminating Genes for Cancer Detection.
Proceedings of the Artificial Intelligence and Soft Computing, 2006

Ring based wavelet transform with arbitrary supports in wireless sensor networks.
Proceedings of the 14th European Signal Processing Conference, 2006

A Key Distribution Scheme Based on Public Key Cryptography for Sensor Networks.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

Hierarchical Hypercube-Based Pairwise Key Establishment Schemes for Sensor Networks.
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006

2005
Removing Smoothing from Naive Bayes Text Classifier.
Proceedings of the Advances in Web-Age Information Management, 2005

Improved Bayesian Spam Filtering Based on Co-weighted Multi-area Information.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2005

Curve-Based Greedy Routing Algorithm for Sensor Networks.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

A Protocol for Designated Confirmer Signatures Based on RSA Cryptographic Algorithms.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2004
Hypertext Classification Algorithm Based on Co-weighting Multi-information.
Proceedings of the Advances in Web-Age Information Management: 5th International Conference, 2004

2003
Reinforcement learning based on local state feature learning and policy adjustment.
Inf. Sci., 2003


  Loading...