Zhen Han

According to our database1, Zhen Han authored at least 121 papers between 2005 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
S<sup>3</sup>D: Scalable Pedestrian Detection via Score Scale Surface Discrimination.
IEEE Trans. Circuits Syst. Video Technol., 2020

Sensing Users' Emotional Intelligence in Social Networks.
IEEE Trans. Comput. Soc. Syst., 2020

Ultra-dense GAN for satellite imagery super-resolution.
Neurocomputing, 2020

Video-Based Person Re-Identification With Unregulated Sequences.
Int. J. Digit. Crime Forensics, 2020

Graph Hawkes Network for Reasoning on Temporal Knowledge Graphs.
CoRR, 2020

Machine Learning Methods for Industrial Protocol Security Analysis: Issues, Taxonomy, and Directions.
IEEE Access, 2020

Numerical Evaluation of Job Finish Time Under MTD Environment.
IEEE Access, 2020

Analyzing Software Rejuvenation Techniques in a Virtualized System: Service Provider and User Views.
IEEE Access, 2020

Queue Length Estimation Based Defence Against Data Poisoning Attack for Traffic Signal Control.
Proceedings of the Intelligent Information Processing X, 2020

Image Super-Resolution Using Residual Global Context Network.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

Processing in Memory Assisted MEC 3C Resource Allocation for Computation Offloading.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

Unsupervised Image Super-Resolution with an Indirect Supervised Path.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

Learning with Temporal Knowledge Graphs.
Proceedings of the CIKM 2020 Workshops co-located with 29th ACM International Conference on Information and Knowledge Management (CIKM 2020), 2020

2019
Multi-Memory Convolutional Neural Network for Video Super-Resolution.
IEEE Trans. Image Process., 2019

Adversarial attack and defense in reinforcement learning-from AI security view.
Cybersecur., 2019

Unsupervised Image Super-Resolution with an Indirect Supervised Path.
CoRR, 2019

An improved method of k-induction combined with predicate abstraction and CEGAR for software model checking.
Clust. Comput., 2019

Finding Sands in the Eyes: Vulnerabilities Discovery in IoT With EUFuzzer on Human Machine Interface.
IEEE Access, 2019

Predicting Users' Emotional Intelligence with Social Networking Data.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019

Evaluating Performance of Active Containers on PaaS Fog under Batch Arrivals: A Modeling Approach.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

GAN-Based Multi-level Mapping Network for Satellite Imagery Super-Resolution.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2019

Rain Streak Removal via Multi-scale Mixture Exponential Power Model.
Proceedings of the IEEE International Conference on Acoustics, 2019

Research and Analysis of User Behavior Fingerprint on Security Situational Awareness Based on DNS Log.
Proceedings of the 6th International Conference on Behavioral, 2019

2018
Model-based sensitivity analysis of IaaS cloud availability.
Future Gener. Comput. Syst., 2018

Global Norm-Aware Pooling for Pose-Robust Face Recognition at Low False Positive Rate.
CoRR, 2018

Gradient Band-based Adversarial Training for Generalized Attack Immunity of A3C Path Finding.
CoRR, 2018

Survivability Modeling and Analysis of Cloud Service in Distributed Data Centers.
Comput. J., 2018

Adaptive Aggregation Network for Face Hallucination.
Proceedings of the Advances in Multimedia Information Processing - PCM 2018, 2018

A Novel Frontal Facial Synthesis Algorithm Based on Individual Residual Face.
Proceedings of the MultiMedia Modeling - 24th International Conference, 2018

Delay-Aware Secure Computation Offloading Mechanism in a Fog-Cloud Framework.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

A Noise Robust Face Hallucination Framework Via Cascaded Model of Deep Convolutional Networks and Manifold Learning.
Proceedings of the 2018 IEEE International Conference on Multimedia and Expo, 2018

Designing Mutual Authentication Protocols in Industrial Wireless Network.
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018

Dynamic Privacy Leakage Analysis of Android Third-Party Libraries.
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018

A PCA-Based Model to Predict Adversarial Examples on Q-Learning of Path Finding.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

MobileFaceNets: Efficient CNNs for Accurate Real-Time Face Verification on Mobile Devices.
Proceedings of the Biometric Recognition - 13th Chinese Conference, 2018

2017
HRM graph constrained dictionary learning for face image super-resolution.
Multim. Tools Appl., 2017

A novel face super resolution approach for noisy images using contour feature and standard deviation prior.
Multim. Tools Appl., 2017

Face super resolution based on parent patch prior for VLQ scenarios.
Multim. Tools Appl., 2017

Characterizing Android apps' behavior for effective detection of malapps at large scale.
Future Gener. Comput. Syst., 2017

PrivMin: Differentially Private MinHash for Jaccard Similarity Computation.
CoRR, 2017

Efficient mode decision for noisy video transcoding.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017

A joint learning based Face Super Resolution approach via contextual topological structure.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017

H.264 based screen content coding with HSV quantization.
Proceedings of the 10th International Congress on Image and Signal Processing, 2017

2016
Facial Image Hallucination Through Coupled-Layer Neighbor Embedding.
IEEE Trans. Circuits Syst. Video Technol., 2016

Heteroskedasticity tuned mixed-norm sparse regularization for face hallucination.
Multim. Tools Appl., 2016

Deterministic attribute-based encryption.
Int. J. High Perform. Comput. Netw., 2016

Two image encryption methods with hiding effect based on moiré pattern.
Int. J. High Perform. Comput. Netw., 2016

A semiparametric scale-mixture regression model and predictive recursion maximum likelihood.
Comput. Stat. Data Anal., 2016

Dynamic Stacked Generalization for Node Classification on Networks.
CoRR, 2016

Public verifiability for shared data in cloud storage with a defense against collusion attacks.
Sci. China Inf. Sci., 2016

A Stepwise Frontal Face Synthesis Approach for Large Pose Non-frontal Facial Image.
Proceedings of the Advances in Multimedia Information Processing - PCM 2016, 2016

Face Image Super-Resolution Through Improved Neighbor Embedding.
Proceedings of the MultiMedia Modeling - 22nd International Conference, 2016

Face Super Resolution for VLQ facial images via parent patch matching.
Proceedings of the 2016 International Joint Conference on Neural Networks, 2016

Fast video enhancement transcoding.
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016

2015
Face Hallucination via Trend-Constrained Regularization.
J. Signal Process. Syst., 2015

Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation.
Inf. Sci., 2015

OB-IMA: out-of-the-box integrity measurement approach for guest virtual machines.
Concurr. Comput. Pract. Exp., 2015

Privacy beyond sensitive values.
Sci. China Inf. Sci., 2015

Deep Feature Representation via Multiple Stack Auto-Encoders.
Proceedings of the Advances in Multimedia Information Processing - PCM 2015, 2015

Person Re-identification via Attribute Confidence and Saliency.
Proceedings of the Advances in Multimedia Information Processing - PCM 2015, 2015

Coupled Discriminant Multi-Manifold Analysis with Application to Low-Resolution Face Recognition.
Proceedings of the MultiMedia Modeling - 21st International Conference, 2015

2014
Low-Resolution and Low-Quality Face Super-Resolution in Monitoring Scene via Support-Driven Sparse Coding.
J. Signal Process. Syst., 2014

Noise Robust Face Hallucination via Locality-Constrained Representation.
IEEE Trans. Multim., 2014

Face Super-Resolution via Multilayer Locality-Constrained Iterative Neighbor Embedding and Intermediate Dictionary Learning.
IEEE Trans. Image Process., 2014

Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection.
IEEE Trans. Inf. Forensics Secur., 2014

Face image super-resolution through locality-induced support regression.
Signal Process., 2014

Efficient single image super-resolution via graph-constrained least squares regression.
Multim. Tools Appl., 2014

Noise robust face hallucination employing Gaussian-Laplacian mixture model.
Neurocomputing, 2014

On Application-Customized Common Platform for Wireless Vehicular Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

An Anonymous Remote Attestation Protocol to Prevent Masquerading Attack.
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014

Noise Face Image Hallucination via Data-Driven Local Eigentransformation.
Proceedings of the Advances in Multimedia Information Processing - PCM 2014, 2014

Efficient learning based face hallucination approach via facial standard deviation prior.
Proceedings of the IEEE International Symposium on Circuits and Systemss, 2014

A Privacy-Aware Access Model on Anonymized Data.
Proceedings of the Trusted Systems - 6th International Conference, 2014

Gabor-based patch covariance matrix for face sketch synthesis.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

2013
Face Image Superresolution via Locality Preserving Projection and Sparse Coding.
J. Softw., 2013

Two-step superresolution approach for surveillance face image through radial basis function-partial least squares regression and locality-induced sparse representation.
J. Electronic Imaging, 2013

From local representation to global face hallucination: A novel super-resolution method by nonnegative feature transformation.
Proceedings of the 2013 Visual Communications and Image Processing, 2013

Robust super-resolution for face images via principle component sparse representation and least squares regression.
Proceedings of the 2013 IEEE International Symposium on Circuits and Systems (ISCAS2013), 2013

Support-driven sparse coding for face hallucination.
Proceedings of the 2013 IEEE International Symposium on Circuits and Systems (ISCAS2013), 2013

Locality-constraint iterative neighbor embedding for face hallucination.
Proceedings of the 2013 IEEE International Conference on Multimedia and Expo, 2013

Coupled-layer neighbor embedding for surveillance face hallucination.
Proceedings of the IEEE International Conference on Image Processing, 2013

A joint learning based face hallucination approach for low quality face image.
Proceedings of the IEEE International Conference on Image Processing, 2013

Manifold regularized sparse support regression for single image super-resolution.
Proceedings of the IEEE International Conference on Acoustics, 2013

LBP-Guided Depth Image Filter.
Proceedings of the 2013 Data Compression Conference, 2013

2012
Trusted Inter-Domain Fast Authentication Protocol in Split Mechanism Network.
IEICE Trans. Inf. Syst., 2012

Just Noticeable Difference for 3D Images with Depth Saliency.
Proceedings of the Advances in Multimedia Information Processing - PCM 2012, 2012

Least Square Based View Synthesis Prediction for Multi-view Video Coding.
Proceedings of the Advances in Multimedia Information Processing - PCM 2012, 2012

Face image super-resolution via nearest feature line.
Proceedings of the 20th ACM Multimedia Conference, MM '12, Nara, Japan, October 29, 2012

Surveillance face hallucination via variable selection and manifold learning.
Proceedings of the 2012 IEEE International Symposium on Circuits and Systems, 2012

Face hallucination via K-selection mean constrained sparse representation.
Proceedings of the 21st International Conference on Pattern Recognition, 2012

Improvements of dynamic texture synthesis for video coding.
Proceedings of the 21st International Conference on Pattern Recognition, 2012

Multi-criteria sorting method based on AHP and variable precision rough set.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2012

Position-Patch Based Face Hallucination via Locality-Constrained Representation.
Proceedings of the 2012 IEEE International Conference on Multimedia and Expo, 2012

Efficient Single Image Super-Resolution via Graph Embedding.
Proceedings of the 2012 IEEE International Conference on Multimedia and Expo, 2012

Graph discriminant analysis on multi-manifold (GDAMM): A novel super-resolution method for face recognition.
Proceedings of the 19th IEEE International Conference on Image Processing, 2012

A super-resolution method for low-quality face image through RBF-PLS regression and neighbor embedding.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012

2011
Design and implementation of a portable TPM scheme for general-purpose trusted computing based on EFI.
Frontiers Comput. Sci. China, 2011

NCNA: Integrated platform for constructing, visualizing, analyzing and sharing human-mediated nitrogen biogeochemical networks.
Environ. Model. Softw., 2011

2010
The Formal Model of DBMS Enforcing Multiple Security Polices.
J. Softw., 2010

Full and partial deniability for authentication schemes.
Frontiers Comput. Sci. China, 2010

An IBE scheme using ECC combined public key.
Comput. Electr. Eng., 2010

Optimized Java Card transaction mechanism based on object locality.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Face hallucination with shape parameters projection constraint.
Proceedings of the 18th International Conference on Multimedia 2010, 2010

Global Face Super Resolution and Contour Region Constraints.
Proceedings of the Advances in Neural Networks, 2010

A face super-resolution approach using shape semantic mode regularization.
Proceedings of the International Conference on Image Processing, 2010

A portable TPM based on USB key.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
User Authentication with Provable Security against Online Dictionary Attacks.
J. Networks, 2009

Usage Control in Conditional Access System with malicious Set-top Box.
Proceedings of the 2009 International Conference on Security & Management, 2009

2008
Context Active RBAC and its Applications.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

A remote anonymous attestation protocol in trusted computing.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008

Analysis of Interrupt Coalescing Schemes for Receive-Livelock Problem in Gigabit Ethernet Network Hosts.
Proceedings of IEEE International Conference on Communications, 2008

2007
A Novel Intra/Inter Mode Decision Algorithm for H.264/AVC Based on Spatio-temporal Correlation.
Proceedings of the Advances in Multimedia Modeling, 2007

Crytanalysis and Improvement on Chang et al.'s Signature Scheme.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

2006
An Integrated Access Control Model of Distributed Database Systems.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

Software Complexity Based Remote Attestation.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

Fast Inter Mode Selection Algorithm in MPEG-2-to-AVS Transcoder.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

Binary Sequences with Three and Four Level Autocorrelation.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

2005
Proxy Cryptography for Secure Inter-domain Information Exchanges.
Proceedings of the 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2005), 2005

An Efficient and Divisible Payment Scheme for M-Commerce.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Research on Confidential Level Extended BLP Model.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Develop Secure Database System with Security Extended ER Model.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005


  Loading...