Yaping Lin

According to our database1, Yaping Lin authored at least 87 papers between 2004 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Dynamic Texture Classification Using Unsupervised 3D Filter Learning and Local Binary Encoding.
IEEE Trans. Multimedia, 2019

Minority oversampling for imbalanced ordinal regression.
Knowl.-Based Syst., 2019

Quantitative similarity calculation method for trajectory-directed line using sketch retrieval.
J. Visual Communication and Image Representation, 2019

An interactive method for identifying the stay points of the trajectory of moving objects.
J. Visual Communication and Image Representation, 2019

Efficient decentralized multi-authority attribute based encryption for mobile cloud data storage.
J. Network and Computer Applications, 2019

A lightweight privacy and integrity preserving range query scheme for mobile cloud computing.
Computers & Security, 2019

A class imbalance-aware Relief algorithm for the classification of tumors using microarray gene expression data.
Computational Biology and Chemistry, 2019

FCMDAP: using miRNA family and cluster information to improve the prediction accuracy of disease related miRNAs.
BMC Systems Biology, 2019

ATMPA: attacking machine learning-based malware visualization detection methods via adversarial examples.
Proceedings of the International Symposium on Quality of Service, 2019

Dynamic Texture Recognition Using 3D Random Features.
Proceedings of the IEEE International Conference on Acoustics, 2019

2018
Dynamic Texture Recognition Using Volume Local Binary Count Patterns With an Application to 2D Face Spoofing Detection.
IEEE Trans. Multimedia, 2018

Catch You if You Misbehave: Ranked Keyword Search Results Verification in Cloud Computing.
IEEE Trans. Cloud Computing, 2018

Directional gradients integration image for illumination insensitive face representation.
Mach. Vis. Appl., 2018

Beware of What You Share: Inferring User Locations in Venmo.
IEEE Internet of Things Journal, 2018

Privacy-Preserving Search Over Encrypted Personal Health Record In Multi-Source Cloud.
IEEE Access, 2018

An Efficient Ranked Multi-Keyword Search for Multiple Data Owners Over Encrypted Cloud Data.
IEEE Access, 2018

A Secure and Efficient Privacy-Preserving Range Query Scheme in Location-Based Services.
IEEE Access, 2018

A Privacy-Preserving Principal Component Analysis Outsourcing Framework.
Proceedings of the 17th IEEE International Conference On Trust, 2018

2017
Synthetic minority oversampling technique for multiclass imbalance problems.
Pattern Recognition, 2017

Representation of algebraic domains by formal association rule systems.
Mathematical Structures in Computer Science, 2017

An Efficient and Packing-Resilient Two-Phase Android Cloned Application Detection Approach.
Mobile Information Systems, 2017

Time and Energy Optimization Algorithms for the Static Scheduling of Multiple Workflows in Heterogeneous Computing System.
J. Grid Comput., 2017

Anonymizing popularity in online social networks with full utility.
Future Generation Comp. Syst., 2017

Secure hitch in location based social networks.
Computer Communications, 2017

Verifiable social data outsourcing.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Dynamic texture recognition using multiscale PCA-learned filters.
Proceedings of the 2017 IEEE International Conference on Image Processing, 2017

2016
Privacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing.
IEEE Trans. Computers, 2016

Image decomposition-based structural similarity index for image quality assessment.
EURASIP J. Image and Video Processing, 2016

Detecting Attacks Smartly in Vehicle Cloud Computing.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

Preserving Location and Content Privacy for Secure Ranked Queries in Location Based Services.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

A secure hierarchical deduplication system in cloud storage.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016

2015
Reconfigurable Binding against FPGA Replay Attacks.
ACM Trans. Design Autom. Electr. Syst., 2015

A PUF-FSM Binding Scheme for FPGA IP Protection and Pay-Per-Device Licensing.
IEEE Trans. Information Forensics and Security, 2015

Cooperative Data Reduction in Wireless Sensor Network.
ACM Trans. Embedded Comput. Syst., 2015

A Wavelet-Based Image Preprocessing Method or Illumination Insensitive Face Recognition.
J. Inf. Sci. Eng., 2015

Face recognition using local gradient binary count pattern.
J. Electronic Imaging, 2015

Secure and Verifiable Multi-owner Ranked-Keyword Search in Cloud Computing.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Authenticating Top-k Results of Secure Multi-keyword Search in Cloud Computing.
Proceedings of the Security and Privacy in Communication Networks, 2015

Efficient and privacy-preserving search in multi-source personal health record clouds.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

KD-tree based clustering algorithm for fast face recognition on large-scale data.
Proceedings of the Seventh International Conference on Digital Image Processing, 2015

2014
Weighing Fusion Method for Truck Scales Based on Prior Knowledge and Neural Network Ensembles.
IEEE Trans. Instrumentation and Measurement, 2014

Privacy and integrity preserving skyline queries in tiered sensor networks.
Security and Communication Networks, 2014

Efficient distributed skyline computation using dependency-based data partitioning.
Journal of Systems and Software, 2014

Energy-efficient filtering for skyline queries in cluster-based sensor networks.
Computers & Electrical Engineering, 2014

Privacy-preserving Data Aggregation Scheme Based on the P-Function Set in Wireless Sensor Networks.
Ad Hoc & Sensor Wireless Networks, 2014

Secure and Efficient Video Surveillance in Cloud Computing.
Proceedings of the 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2014

Secure distributed keyword search in multiple clouds.
Proceedings of the IEEE 22nd International Symposium of Quality of Service, 2014

Improving the reliability of RO PUF using frequency offset.
Proceedings of the 2014 International Conference on Field-Programmable Technology, 2014

Secure Ranked Multi-keyword Search for Multiple Data Owners in Cloud Computing.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

2013
Skyline Monitoring in Wireless Sensor Networks.
IEICE Transactions, 2013

A comprehensive metering scheme for intellectual property protection during both after-sale and evaluation periods of IC design.
IEICE Electronic Express, 2013

Using a conceptual Bayesian network to investigate environmental management of vegetable production in the Lake Taihu region of China.
Environmental Modelling and Software, 2013

Secure and Verifiable Top-k Query in Two-Tiered Sensor Networks.
Proceedings of the Security and Privacy in Communication Networks, 2013

A digital watermarking approach to secure and precise range query processing in sensor networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

A Multi-dimensional Packet Classification Algorithm Based on Hierarchical All-Match B+ Tree.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

FPGA IP protection by binding Finite State Machine to Physical Unclonable Function.
Proceedings of the 23rd International Conference on Field programmable Logic and Applications, 2013

Binding Hardware IPs to Specific FPGA Device via Inter-twining the PUF Response with the FSM of Sequential Circuits.
Proceedings of the 21st IEEE Annual International Symposium on Field-Programmable Custom Computing Machines, 2013

Design and Implementation of a Delay-Based PUF for FPGA IP Protection.
Proceedings of the 2013 International Conference on Computer-Aided Design and Computer Graphics, 2013

2012
Towards Dynamic and Scalable High-Speed IP Address Lookup Based on B+ Tree.
IEICE Transactions, 2012

TimFastPlace: Critical-path based timing driven FastPlace.
IEICE Electronic Express, 2012

Efficient verification of IP watermarks in FPGA designs through lookup table content extracting.
IEICE Electronic Express, 2012

An algorithm for fatigue pattern detection based on parallel Gabor and 1-nearest neighbor.
Proceedings of the Fourth International Conference on Digital Image Processing, 2012

2010
A clique base node scheduling method for wireless sensor networks.
J. Network and Computer Applications, 2010

Privacy-preserving Data Aggregation Based on the P-function Set in Wireless Sensor Networks.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
A Survey on Position-Based Routing Algorithms in Wireless Sensor Networks.
Algorithms, 2009

2008
Ring-Based Optimal-Level Distributed Wavelet Transform with Arbitrary Filter Length for Wireless Sensor Networks.
EURASIP J. Adv. Sig. Proc., 2008

Analysis on Node's Pairwise Key Path Construction in Sensor Networks.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008

Ant-based query processing for replicated events in wireless sensor networks.
Proceedings of the IEEE Congress on Evolutionary Computation, 2008

2007
Key Distribution for Group-based Sensor Deployment Using a Novel Interconnection Graph.
Proceedings of the 2007 International Symposium on a World of Wireless, 2007

Voronoi Tessellation Based Rapid Coverage Decision Algorithm for Wireless Sensor Networks.
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007

A Novel Relative Space Based Gene Feature Extraction and Cancer Recognition.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2007

A Novel EPA-KNN Gene Classification Algorithm.
Proceedings of the Advances in Neural Networks, 2007

RAS: A Robust Authentication Scheme for Filtering False Data in Wireless Sensor Networks.
Proceedings of the 15th IEEE International Conference on Networks, 2007

Two Approaches on Pairwise Key Path Establishment for Sensor Networks.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

2006
Compressing Spatial and Temporal Correlated Data in Wireless Sensor Networks Based on Ring Topology.
Proceedings of the Advances in Web-Age Information Management, 2006

Research on Pairwise Key Establishment Model and Algorithm for Sensor Networks.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

A Further Approach on Hypercube-Based Pairwise Key Establishment in Sensor Networks.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

Wrapper Maintenance for Web-Data Extraction Based on Pages Features.
Proceedings of the Intelligent Information Processing and Web Mining, 2006

Using Most Similarity Tree Based Clustering to Select the Top Most Discriminating Genes for Cancer Detection.
Proceedings of the Artificial Intelligence and Soft Computing, 2006

Ring based wavelet transform with arbitrary supports in wireless sensor networks.
Proceedings of the 14th European Signal Processing Conference, 2006

A Key Distribution Scheme Based on Public Key Cryptography for Sensor Networks.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

Hierarchical Hypercube-Based Pairwise Key Establishment Schemes for Sensor Networks.
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006

2005
Removing Smoothing from Naive Bayes Text Classifier.
Proceedings of the Advances in Web-Age Information Management, 2005

Improved Bayesian Spam Filtering Based on Co-weighted Multi-area Information.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2005

Curve-Based Greedy Routing Algorithm for Sensor Networks.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

A Protocol for Designated Confirmer Signatures Based on RSA Cryptographic Algorithms.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2004
Hypertext Classification Algorithm Based on Co-weighting Multi-information.
Proceedings of the Advances in Web-Age Information Management: 5th International Conference, 2004


  Loading...