Zhonghai Wu

Orcid: 0000-0003-1268-836X

According to our database1, Zhonghai Wu authored at least 173 papers between 1997 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Survey of Code Search Based on Deep Learning.
ACM Trans. Softw. Eng. Methodol., February, 2024

Large Language Model with Graph Convolution for Recommendation.
CoRR, 2024

TRLS: A Time Series Representation Learning Framework via Spectrogram for Medical Signal Processing.
CoRR, 2024

2023
Sequential ensemble learning for next item recommendation.
Knowl. Based Syst., October, 2023

Reconstructing the Geometry of the Yushu Fault in the Tibetan Plateau Using TLS, GPR and Trenching.
Remote. Sens., April, 2023

T-Counter: Trustworthy and Efficient CPU Resource Measurement Using SGX in the Cloud.
IEEE Trans. Dependable Secur. Comput., 2023

Bridging the Information Gap Between Domain-Specific Model and General LLM for Personalized Recommendation.
CoRR, 2023

A Survey of Deep Code Search.
CoRR, 2023

Building a Modal-balanced BlockChain with Semantic Reconstruction.
CoRR, 2023

UDA-DP: Unsupervised Domain Adaptation for Software Defect Prediction.
Proceedings of the IEEE International Conference on Software Analysis, 2023

SHISRCNet: Super-Resolution and Classification Network for Low-Resolution Breast Cancer Histopathology Image.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2023, 2023

How to Manage Change-Induced Incidents? Lessons from the Study of Incident Life Cycle.
Proceedings of the 34th IEEE International Symposium on Software Reliability Engineering, 2023

Identifying Root-Cause Changes for User-Reported Incidents in Online Service Systems.
Proceedings of the 34th IEEE International Symposium on Software Reliability Engineering, 2023

CL-BOSIC: A Distributed Agent-Oriented Scheme for Remote Data Integrity Check and Forensics in Public Cloud.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2023

Bilateral Sequential Hypergraph Convolution Network for Reciprocal Recommendation.
Proceedings of the IEEE International Conference on Data Mining, 2023

NCL: Textual Backdoor Defense Using Noise-Augmented Contrastive Learning.
Proceedings of the IEEE International Conference on Acoustics, 2023

A Role Engineering Approach Based on Spectral Clustering Analysis for Restful Permissions in Cloud.
Proceedings of the IEEE International Conference on Acoustics, 2023

Select, Extend, and Generate: Generative Knowledge Selection for Open-Domain Dialogue Response Generation.
Proceedings of the Database Systems for Advanced Applications, 2023

Sequential Hypergraph Convolution Network for Next Item Recommendation.
Proceedings of the Database Systems for Advanced Applications, 2023

A Privacy Preserving Computer-aided Medical Diagnosis Framework with Outsourced Model.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2023

2022
Integration of Terrestrial Laser Scanner (TLS) and Ground Penetrating Radar (GPR) to Characterize the Three-Dimensional (3D) Geometry of the Maoyaba Segment of the Litang Fault, Southeastern Tibetan Plateau.
Remote. Sens., December, 2022

Generating Rational Commonsense Knowledge-Aware Dialogue Responses With Channel-Aware Knowledge Fusing Network.
IEEE ACM Trans. Audio Speech Lang. Process., 2022

Iterative Compilation Optimization Based on Metric Learning and Collaborative Filtering.
ACM Trans. Archit. Code Optim., 2022

Generalized Ambiguity Decomposition for Ranking Ensemble Learning.
J. Mach. Learn. Res., 2022

Hierarchical and non-monotonic key-policy attribute-based encryption and its application.
Inf. Sci., 2022

Apple of Sodom: Hidden Backdoors in Superior Sentence Embeddings via Contrastive Learning.
CoRR, 2022

TC-SKNet with GridMask for Low-complexity Classification of Acoustic scene.
CoRR, 2022

Revisiting Graph based Social Recommendation: A Distillation Enhanced Social Graph Network.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

Improving the Applicability of Knowledge-Enhanced Dialogue Generation Systems by Using Heterogeneous Knowledge from Multiple Sources.
Proceedings of the WSDM '22: The Fifteenth ACM International Conference on Web Search and Data Mining, Virtual Event / Tempe, AZ, USA, February 21, 2022

Personalized User Profiles-based Insider Threat Detection for Distributed File System.
Proceedings of the IEEE International Conference on Trust, 2022

SemiGraphFL: Semi-supervised Graph Federated Learning for Graph Classification.
Proceedings of the Parallel Problem Solving from Nature - PPSN XVII, 2022

Revisiting Attention-Based Graph Neural Networks for Graph Classification.
Proceedings of the Parallel Problem Solving from Nature - PPSN XVII, 2022

ScriptChecker: To Tame Third-party Script Execution With Task Capabilities.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Augmenting Log-based Anomaly Detection Models to Reduce False Anomalies with Human Feedback.
Proceedings of the KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14, 2022

RuleCache: Accelerating Web Application Firewalls by On-line Learning Traffic Patterns.
Proceedings of the IEEE International Conference on Web Services, 2022

Cascade Vertical Federated Learning.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

Learnable Pixel Clustering Via Structure and Semantic Dual Constraints for Unsupervised Image Segmentation.
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022

Efficient Identity-Based Chameleon Hash for Mobile Devices.
Proceedings of the IEEE International Conference on Acoustics, 2022

Kallima: A Clean-Label Framework for Textual Backdoor Attacks.
Proceedings of the Computer Security - ESORICS 2022, 2022

Market-Aware Dynamic Person-Job Fit with Hierarchical Reinforcement Learning.
Proceedings of the Database Systems for Advanced Applications, 2022

M<sup>3</sup>-IB: A Memory-Augment Multi-modal Information Bottleneck Model for Next-Item Recommendation.
Proceedings of the Database Systems for Advanced Applications, 2022

Section-Aware Commonsense Knowledge-Grounded Dialogue Generation with Pre-trained Language Model.
Proceedings of the 29th International Conference on Computational Linguistics, 2022

Automated Extraction of ABAC Policies from Natural-Language Documents in Healthcare Systems.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2022

KSAM: Infusing Multi-Source Knowledge into Dialogue Generation via Knowledge Source Aware Multi-Head Decoding.
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2022, 2022

2021
ObliComm: Towards Building an Efficient Oblivious Communication System.
IEEE Trans. Dependable Secur. Comput., 2021

A Vertical Federated Learning Framework for Horizontally Partitioned Labels.
CoRR, 2021

Large Universe CCA2 CP-ABE With Equality and Validity Test in the Standard Model.
Comput. J., 2021

IFSpard: An Information Fusion-based Framework for Spam Review Detection.
Proceedings of the WWW '21: The Web Conference 2021, 2021

Modeling Multi-factor and Multi-faceted Preferences over Sequential Networks for Next Item Recommendation.
Proceedings of the Machine Learning and Knowledge Discovery in Databases. Research Track, 2021

Fusing Essential Knowledge for Text-Based Open-Domain Question Answering.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2021

Mining Configuration Items From System Logs through Distant Supervision.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Knowledge-Aware Dialogue Generation via Hierarchical Infobox Accessing and Infobox-Dialogue Interaction Graph Network.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021

Revisiting Graph Neural Networks for Node Classification in Heterogeneous Graphs.
Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, 2021

Distilling the Documents for Relation Extraction by Topic Segmentation.
Proceedings of the 16th International Conference on Document Analysis and Recognition, 2021

Multi Path Training Framework for Data-Driven Open-Domain Conversation System.
Proceedings of the IEEE International Conference on Acoustics, 2021

Temporal Link Prediction Via Reinforcement Learning.
Proceedings of the IEEE International Conference on Acoustics, 2021

More is Better: Enhancing Open-Domain Dialogue Generation via Multi-Source Heterogeneous Knowledge.
Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing, 2021

Beyond Matching: Modeling Two-Sided Multi-Behavioral Sequences for Dynamic Person-Job Fit.
Proceedings of the Database Systems for Advanced Applications, 2021

BadNL: Backdoor Attacks against NLP Models with Semantic-preserving Improvements.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

Relation-Aware Neighborhood Matching Model for Entity Alignment.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
TopicKA: Generating Commonsense Knowledge-Aware Dialogue Responses Towards the Recommended Topic Fact.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

Improving Knowledge-Aware Dialogue Response Generation by Using Human-Written Prototype Dialogues.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2020, 2020

Generalized Collaborative Personalized Ranking for Recommendation.
Proceedings of the Web and Big Data - 4th International Joint Conference, 2020

Diverse and Informative Dialogue Generation with Context-Specific Commonsense Knowledge Awareness.
Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, 2020

2019
AEM: Attentional Ensemble Model for personalized classifier weight learning.
Pattern Recognit., 2019

User preference modeling based on meta paths and diversity regularization in heterogeneous information networks.
Knowl. Based Syst., 2019

PML: An Interpreter-Based Access Control Policy Language for Web Services.
CoRR, 2019

Container-IMA: A privacy-preserving Integrity Measurement Architecture for Containers.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

BugIdentifier: An Approach to Identifying Bugs via Log Mining for Accelerating Bug Reporting Stage.
Proceedings of the 19th IEEE International Conference on Software Quality, 2019

Learning Continuous User and Item Representations for Neural Collaborative Filtering.
Proceedings of the Knowledge Science, Engineering and Management, 2019

PKULAE: A Learning Attitude Evaluation Method Based on Learning Behavior.
Proceedings of the Intelligent Tutoring Systems - 15th International Conference, 2019

Deep Learning Based Code Completion Models for Programming Codes.
Proceedings of the ISCSIC 2019: 3rd International Symposium on Computer Science and Intelligent Control, 2019

Unified Embedding Model over Heterogeneous Information Network for Personalized Recommendation.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

Autoencoder based API Recommendation System for Android Programming.
Proceedings of the 14th International Conference on Computer Science & Education, 2019

Representation Learning with Ordered Relation Paths for Knowledge Graph Completion.
Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing, 2019

ObliDC: An SGX-based Oblivious Distributed Computing Framework with Formal Proof.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
CPLR: Collaborative pairwise learning to rank for personalized recommendation.
Knowl. Based Syst., 2018

Analysis of Frequently Failing Tasks and Rescheduling Strategy in the Cloud System.
Int. J. Distributed Syst. Technol., 2018

An influence-based fast preceding questionnaire model for elderly assessments.
Intell. Data Anal., 2018

Recommendation in Heterogeneous Information Networks Based on Generalized Random Walk Model and Bayesian Personalized Ranking.
Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining, 2018

Reciprocal Ranking: A Hybrid Ranking Algorithm for Reciprocal Recommendation.
Proceedings of the PRICAI 2018: Trends in Artificial Intelligence, 2018

Online Personalized Next-Item Recommendation via Long Short Term Preference Learning.
Proceedings of the PRICAI 2018: Trends in Artificial Intelligence, 2018

Brief Announcement: Automatic Log Enhancement for Fault Diagnosis.
Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing, 2018

Memory Cache Attacks on Alluxio Impede High Performance Computing.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

Non-Authentication Based Checkpoint Fault-tolerant Vulnerability in Spark Streaming.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018

TProv: Towards a Trusted Provenance-Aware Service Based on Trusted Computing.
Proceedings of the Web Services - ICWS 2018, 2018

Hierarchical Hybrid Feature Model for Top-N Context-Aware Recommendation.
Proceedings of the IEEE International Conference on Data Mining, 2018

Towards Real-Time Privacy Preservation: A Streaming Location Anonymous Method Based on Distributed Framework.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Auto-Tuning Spark Configurations Based on Neural Network.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

DLCEncDec : A Fully Character-Level Encoder-Decoder Model for Neural Responding Conversation.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

HL-EncDec: A Hybrid-Level Encoder-Decoder for Neural Response Generation.
Proceedings of the 27th International Conference on Computational Linguistics, 2018

Synthetic Data Approach for Classification and Regression.
Proceedings of the 29th IEEE International Conference on Application-specific Systems, 2018

Collaborative Probability Metric Learning.
Proceedings of the Web and Big Data - Second International Joint Conference, 2018

2017
Feature Engineering for Credit Risk Evaluation in Online P2P Lending.
Int. J. Softw. Sci. Comput. Intell., 2017

Android Multi-Level System Permission Management Approach.
CoRR, 2017

A practical construction for large universe hierarchical attribute-based encryption.
Concurr. Comput. Pract. Exp., 2017

A Secure Virtual Machine Deployment Strategy to Reduce Co-residency in Cloud.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

D-FS: A Novel Integration Method of Discretization and Feature Selection.
Proceedings of the 14th International Symposium on Pervasive Systems, 2017

A joint Bloom Filter and cross-encoding for data verification and recovery in cloud.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

FMR-PDP: Flexible multiple-replica provable data possession in cloud storage.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

RestSep: Towards a Test-Oriented Privilege Partitioning Approach for RESTful APIs.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017

MCS: Memory Constraint Strategy for Unified Memory Manager in Spark.
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017

An Iterative Model for Predicting Film Attendance.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

Low Frequency Words Compression in Neural Conversation System.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

Statically Defend Network Consumption Against Acker Failure Vulnerability in Storm.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

Practical Large Universe Attribute-Set Based Encryption in the Standard Model.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

SeEagle: Semantic-Enhanced Anomaly Detection for Securing Eagle.
Proceedings of the Digital Forensics and Cyber Crime - 9th International Conference, 2017

Making least privilege the low-hanging fruit in clouds.
Proceedings of the IEEE International Conference on Communications, 2017

A Method of Constructing the Mapping Knowledge Domains in Chinese Based on the MOOCs.
Proceedings of the Database Systems for Advanced Applications, 2017

Predicting Misconfiguration-Induced Unsuccessful Executions of Jobs in Big Data System.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

Generalized Ambiguity Decompositions for Classification with Applications in Active Learning and Unsupervised Ensemble Pruning.
Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, 2017

2016
Improved Combination of Multiple Retrieval Systems Using a Dynamic Combinatorial Fusion Algorithm.
Proceedings of the 2016 IEEE/WIC/ACM International Conference on Web Intelligence, 2016

Evaluating Performance of Rescheduling Strategies in Cloud System.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

SeLance: Secure Load Balancing of Virtual Machines in Cloud.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Whispers between the Containers: High-Capacity Covert Channel Attacks in Docker.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Partial Attestation: Towards Cost-Effective and Privacy-Preserving Remote Attestations.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Time Series Based Killer Task Online Recognition Service: A Google Cluster Case Study.
Proceedings of the 2016 IEEE Symposium on Service-Oriented System Engineering, 2016

Hunting Killer Tasks for Cloud System through Machine Learning: A Google Cluster Case Study.
Proceedings of the 2016 IEEE International Conference on Software Quality, 2016

CUT: A Combined Approach for Tag Recommendation in Software Information Sites.
Proceedings of the Knowledge Science, Engineering and Management, 2016

RestPL: Towards a Request-Oriented Policy Language for Arbitrary RESTful APIs.
Proceedings of the IEEE International Conference on Web Services, 2016

SLA-DO: A SLA-Based Data Distribution Strategy on Multiple Cloud Storage Systems.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

SEYARN: Enhancing Security of YARN Clusters Based on Health Check Service.
Proceedings of the Information Systems Security and Privacy, 2016

DDHCS: Distributed Denial-of-service Threat to YARN Clusters based on Health Check Service.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

Whispers in the Cloud - A Covert Channel using the Result of Creating a Virtual Machine.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

Sift - An Efficient Method for Co-residency Detection on Amazon EC2.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

MultiPol: Towards a Multi-policy Authorization Framework for RESTful Interfaces in the Cloud.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

SECapacity: A Secure Capacity Scheduler in YARN.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

A Novel Bayesian Ensemble Pruning Method.
Proceedings of the IEEE International Conference on Data Mining Workshops, 2016

S-Storm: A Slot-Aware Scheduling Strategy for Even Scheduler in Storm.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

Hunting Killer Tasks for Cloud System through Behavior Pattern Learning.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2016

Can We Use Programmer's Knowledge? Fixing Parameter Configuration Errors in Hadoop through Analyzing Q&A Sites.
Proceedings of the 2016 IEEE International Congress on Big Data, San Francisco, CA, USA, June 27, 2016

A feature selection framework based on supervised data clustering.
Proceedings of the 15th IEEE International Conference on Cognitive Informatics & Cognitive Computing , 2016

OpenStack Security Modules: A Least-Invasive Access Control Framework for the Cloud.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

An Approach to Pinpointing Bug-Induced Failure in Logs of Open Cloud Platforms.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
Characterizing and Predicting Bug Assignment in OpenStack.
Proceedings of the 2015 Second International Conference on Trustworthy Systems and Their Applications, 2015

Ciphertext-Policy Attribute-Based Encryption with User and Authority Accountability.
Proceedings of the Security and Privacy in Communication Networks, 2015

POSTER: Ciphertext-Policy Attribute-Based Encryption Method with Secure Decryption Key Generation and Outsourcing Decryption of ABE Ciphertexts.
Proceedings of the Security and Privacy in Communication Networks, 2015

MB-DDIVR: A Map-Based Dynamic Data Integrity Verification and Recovery Scheme in Cloud Storage.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

Eavesdropper: A Framework for Detecting the Location of the Processed Result in Hadoop.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

Feature Selection Based on Data Clustering.
Proceedings of the Intelligent Computing Theories and Methodologies, 2015

Attribute-Based Encryption Without Key Escrow.
Proceedings of the Cloud Computing and Security - First International Conference, 2015

Probing the Scheduling Algorithms in the Cloud Based on OpenStack.
Proceedings of the Cloud Computing and Security - First International Conference, 2015

An Analysis on Availability Commitment and Penalty in Cloud SLA.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

User Rank: A User Influence-Based Data Distribution Optimization Method for Privacy Protection in Cloud Storage System.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

An information-theoretic feature selection method based on estimation of Markov blanket.
Proceedings of the 14th IEEE International Conference on Cognitive Informatics & Cognitive Computing, 2015

A Competitive Penalty Model for Availability Based Cloud SLA.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

2014
Dependability Analysis on Open Stack IaaS Cloud: Bug Anaysis and Fault Injection.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

2013
A skeleton pruning algorithm based on information fusion.
Pattern Recognit. Lett., 2013

Securing data services: a security architecture design for private storage cloud based on HDFS.
Int. J. Grid Util. Comput., 2013

Leveraging Genetic Algorithm to Compose Web Services in a Context-Aware Environment.
Proceedings of the IEEE International Conference on Systems, 2013

Combining multiple stress identification algorithms using combinatorial fusion.
Proceedings of the 25th International Conference on Software Engineering and Knowledge Engineering, 2013

Genetic Algorithm for Context-Aware Service Composition Based on Context Space Model.
Proceedings of the 2013 IEEE 20th International Conference on Web Services, Santa Clara, CA, USA, June 28, 2013

A Covert Channel Using Event Channel State on Xen Hypervisor.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

A Process Calculus for Context-Aware Systems.
Proceedings of the 2013 IEEE International Conference on Services Computing, Santa Clara, CA, USA, June 28, 2013

2012
On the generation and pruning of skeletons using generalized Voronoi diagrams.
Pattern Recognit. Lett., 2012

Combining Multiple Sensor Features for stress Detection using Combinatorial Fusion.
J. Interconnect. Networks, 2012

Collecting location-based voice messages on a TalkingBadge.
Proceedings of the Nordic Conference on Human-Computer Interaction, 2012

A New Parallel Processor Architecture for Genus 2 Hyperelliptic Curve Cryptosystems.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2012

Evaluating feature selection for stress identification.
Proceedings of the IEEE 13th International Conference on Information Reuse & Integration, 2012

SAPSC: Security Architecture of Private Storage Cloud Based on HDFS.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

Combination of Multiple Retrieval Systems Using Rank-Score Function and Cognitive Diversity.
Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications, 2012

Towards an Automata-Based Semantic Web Services Composition Method in Context-Aware Environment.
Proceedings of the 2012 IEEE Ninth International Conference on Services Computing, 2012

2011
A Context-Source Abstraction Layer for Context-aware Middleware.
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011

An Event Driven Model for Context-Aware Service.
Proceedings of the IEEE International Conference on Web Services, 2011

SecDM: Securing Data Migration between Cloud Storage Systems.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

Combining Multiple Retrieval Systems Using Combinatorial Fusion Analysis and Rank-Score Characteristic Function.
Proceedings of the 14th IEEE International Conference on Computational Science and Engineering, 2011

Poster: LBMS: load balancing based on multilateral security in cloud.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Towards Data Isolation & Collaboration in Storage Cloud.
Proceedings of the 2011 IEEE Asia-Pacific Services Computing Conference, 2011

2010
An Implementation of the SaaS Level-3 Maturity Model for an Educational Credit Bank Information System.
Proceedings of the International Conference on Service Sciences, 2010

A Uniform Device Information Access for Context-Aware Middleware.
Proceedings of the IEEE International Conference on Web Services, 2010

An Integrated Practice Lab Course for Service Engineering.
Proceedings of the International Conference on E-Business and E-Government, 2010

A Hybrid Movie Recommender Based on Ontology and Neural Networks.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010

1997
Study and Design of Scalable Memory-Shared Multiprocessing System.
Proceedings of the 1997 Advances in Parallel and Distributed Computing Conference (APDC '97), 1997


  Loading...