Yu Qin

According to our database1, Yu Qin authored at least 51 papers between 2004 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
What You Say and How You Say It Matters: Predicting Stock Volatility Using Verbal and Vocal Cues.
Proceedings of the 57th Conference of the Association for Computational Linguistics, 2019

2018
A Panel Data Model-Based Multi-Factor Predictive Model of Highway Electromechanical Equipment Faults.
IEEE Trans. Intelligent Transportation Systems, 2018

Using mobile phones to enhance computing platform trust.
Telecommunication Systems, 2018

Estimation of Grassland Canopy Height and Aboveground Biomass at the Quadrat Scale Using Unmanned Aerial Vehicle.
Remote Sensing, 2018

Formal analysis of HMAC authorisation in the TPM2.0 specification.
IET Information Security, 2018

AAoT: Lightweight attestation and authentication of low-resource things in IoT and CPS.
Computer Networks, 2018

Defect characterization of amorphous silicon thin film solar cell based on low frequency noise.
SCIENCE CHINA Information Sciences, 2018

2017
Combining paper cooperative network and topic model for expert topic analysis and extraction.
Neurocomputing, 2017

Formal Analysis of a TTP-Free Blacklistable Anonymous Credentials System (Full Version).
IACR Cryptology ePrint Archive, 2017

Detecting micro-blog user interest communities through the integration of explicit user relationship and implicit topic relations.
SCIENCE CHINA Information Sciences, 2017

An Efficient Trustzone-Based In-application Isolation Schema for Mobile Authenticators.
Proceedings of the Security and Privacy in Communication Networks, 2017

Formal Analysis of a TTP-Free Blacklistable Anonymous Credentials System.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

Machine Learning Methods for Driving Risk Prediction.
Proceedings of the 3rd ACM SIGSPATIAL Workshop on Emergency Management using, Redondo Beach, CA, USA, November 07, 2017

TICS: Trusted Industry Control System Based on Hardware Security Module.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Secure Code Updates for Smart Embedded Devices Based on PUFs.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017

2016
AEP-M: Practical Anonymous E-Payment for Mobile Devices using ARM TrustZone and Divisible E-Cash (Full Version).
IACR Cryptology ePrint Archive, 2016

Extraction of Expert Relations Integrated with Expert Topic and Associated Relationship Features.
Proceedings of the Social Media Processing - 5th National Conference, 2016

Computational Soundness Results for Stateful Applied π Calculus.
Proceedings of the Principles of Security and Trust - 5th International Conference, 2016

AEP-M: Practical Anonymous E-Payment for Mobile Devices Using ARM TrustZone and Divisible E-Cash.
Proceedings of the Information Security - 19th International Conference, 2016

Automated Security Proof of Cryptographic Support Commands in TPM 2.0.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

2015
Security analysis of SM2 key exchange protocol in TPM2.0.
Security and Communication Networks, 2015

TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems.
IACR Cryptology ePrint Archive, 2015

TrustTokenF: A Generic Security Framework for Mobile Two-Factor Authentication Using TrustZone.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

DAA-TZ: An Efficient DAA Scheme for Mobile Devices Using ARM TrustZone.
Proceedings of the Trust and Trustworthy Computing - 8th International Conference, 2015

Approaches to Detect Micro-Blog User Interest Communities Through the Integration of Explicit User Relationship and Implicit Topic Relations.
Proceedings of the Social Media Processing - 4th National Conference, 2015

TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

Formal Analysis of Enhanced Authorization in the TPM 2.0.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Providing Root of Trust for ARM TrustZone using SRAM PUFs.
IACR Cryptology ePrint Archive, 2014

Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model (full version).
IACR Cryptology ePrint Archive, 2014

A Lightweight Anonymous Mobile Shopping Scheme Based on DAA for Trusted Mobile Platform.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Improving the Security of the HMQV Protocol Using Tamper-Proof Hardware.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Direct Anonymous Attestation in practice: Implementation and efficient revocation.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

Universally Composable Secure TNC Protocol Based on IF-T Binding to TLS.
Proceedings of the Network and System Security - 8th International Conference, 2014

Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model.
Proceedings of the Information Security Practice and Experience, 2014

Providing Root of Trust for ARM TrustZone using On-Chip SRAM.
Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, 2014

ExBLACR: Extending BLACR System.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
Dynamic Modeling and Computer Simulation for Autonomous Underwater Vehicles with Fins.
JCP, 2013

Type-Based Analysis of Protected Storage in the TPM (full version).
IACR Cryptology ePrint Archive, 2013

TEEM: A User-Oriented Trusted Mobile Device for Multi-platform Security Applications.
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013

Mobile Trusted Agent (MTA): Build User-Based Trust for General-Purpose Computer Platform.
Proceedings of the Network and System Security - 7th International Conference, 2013

Type-Based Analysis of Protected Storage in the TPM.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

2012
TSD: A Flexible Root of Trust for the Cloud.
Proceedings of the 11th IEEE International Conference on Trust, 2012

2011
SD-GIS-based temporal-spatial simulation of water quality in sudden water pollution accidents.
Computers & Geosciences, 2011

A Property-Based Attestation Scheme with the Variable Privacy.
Proceedings of the IEEE 10th International Conference on Trust, 2011

A DRTM-Based Method for Trusted Network Connection.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Design and Analysis on Direct Anonymous Attestation for Security Chip.
Proceedings of the 2nd International Symposium on Intelligence Information Processing and Trusted Computing, 2011

DAA Protocol Analysis and Verification.
Proceedings of the Trusted Systems - Third International Conference, 2011

Obtaining the Integrity of Your Virtual Machine in the Cloud.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

2010
A property-based attestation protocol for TCM.
SCIENCE CHINA Information Sciences, 2010

2009
An Anonymous Property-Based Attestation Protocol from Bilinear Maps.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2004
Estimation of the change of soil moisture in vegetated surface with multi-temporal AirSAR data.
Proceedings of the 2004 IEEE International Geoscience and Remote Sensing Symposium, 2004


  Loading...