Yin Hu

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2022
Adaptive Neural Network-Based Tracking Control of Underactuated Offshore Ship-to-Ship Crane Systems Subject to Unknown Wave Motions Disturbances.
IEEE Trans. Syst. Man Cybern. Syst., 2022

2021
Two-Dimensional DOA Estimation of MIMO Radar Coherent Source Based on Toeplitz Matrix Set Reconstruction.
Secur. Commun. Networks, 2021

2017
The TripleSat constellation: a new geospatial data service model.
Geo spatial Inf. Sci., 2017

2016
Homomorphic AES evaluation using the modified LTV scheme.
Des. Codes Cryptogr., 2016

2015
Exploring the Feasibility of Fully Homomorphic Encryption.
IEEE Trans. Computers, 2015

物联网RFID中间件技术及其在电力通信标识管理中的应用研究 (Internet of Things RFID Middleware Technology and its Applicated Research in Electric Power Communication Identity Management).
计算机科学, 2015

基于ZigBee无线传感器网络的通信标识管理终端通信研究 (Communication Research of Communication Identity Management Terminal Based on ZigBee Wireless Sensor Networks).
计算机科学, 2015

2014
Homomorphic AES Evaluation using NTRU.
IACR Cryptol. ePrint Arch., 2014

Piecing the puzzle together: a revisit to transcript reconstruction problem in RNA-seq.
BMC Bioinform., 2014

2013
A Robust Method for Transcript Quantification with RNA-Seq Data.
J. Comput. Biol., 2013

2012
Accelerating fully homomorphic encryption using GPU.
Proceedings of the IEEE Conference on High Performance Extreme Computing, 2012

2011
FDM: a graph-based statistical method to detect differential transcription using RNA-seq data.
Bioinform., 2011

An Improved Bayesian Algorithm for Filtering Spam E-Mail.
Proceedings of the 2nd International Symposium on Intelligence Information Processing and Trusted Computing, 2011

Research and Implementation of Packet Classification Based on NDIS Intermediate Layer under Windows Platform.
Proceedings of the 2nd International Symposium on Intelligence Information Processing and Trusted Computing, 2011

2010
A probabilistic framework for aligning paired-end RNA-seq data.
Bioinform., 2010

An Improved Memory Integrity Protection Scheme.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010

2009
Unsupervised learning of high-order structural semantics from images.
Proceedings of the IEEE 12th International Conference on Computer Vision, ICCV 2009, Kyoto, Japan, September 27, 2009

2008
A fast real-time memory authentication protocol.
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, 2008

2002
Spatial averaging and ordering in matched element arrays.
Proceedings of the IEEE 2002 Custom Integrated Circuits Conference, 2002


  Loading...