Baohua Huang

Orcid: 0000-0002-4672-1191

According to our database1, Baohua Huang authored at least 46 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Conjugate gradient-type method for the tensor linear system via the T-product and its application in the calculation of Moore-Penrose inverse.
Appl. Math. Comput., 2024

2023
A smoothing Newton method based on the modulus equation for a class of weakly nonlinear complementarity problems.
Comput. Optim. Appl., September, 2023

On the minimum-norm least squares solution of the complex generalized coupled sylvester matrix equations.
J. Frankl. Inst., March, 2023

Structure preserving subspace methods for the general coupled discrete-time periodic matrix equation and its application in antilinear periodic system.
Int. J. Comput. Math., February, 2023

2022
The RapidIO Routing Strategy Based on the Double-Antibody Group Multi-Objective Artificial Immunity Algorithm.
Sensors, 2022

On the relaxed gradient-based iterative methods for the generalized coupled Sylvester-transpose matrix equations.
J. Frankl. Inst., 2022

A modified SOR-like method for absolute value equations associated with second order cones.
J. Comput. Appl. Math., 2022

A verifiable ranked ciphertext retrieval scheme based on bilinear mapping.
Concurr. Comput. Pract. Exp., 2022

2021
Numerical subspace algorithms for solving the tensor equations involving Einstein product.
Numer. Linear Algebra Appl., 2021

Numerical study on Moore-Penrose inverse of tensors via Einstein product.
Numer. Algorithms, 2021

2020
A homomorphic range searching scheme for sensitive data in internet of things.
Int. J. Embed. Syst., 2020

Some accelerated iterative algorithms for solving nonsymmetric algebraic Riccati equations arising in transport theory.
Int. J. Comput. Math., 2020

Global least squares methods based on tensor form to solve a class of generalized Sylvester tensor equations.
Appl. Math. Comput., 2020

Optimal Foraging Algorithm Based on Differential Evolution.
IEEE Access, 2020

2019
A Center-Based Secure and Stable Clustering Algorithm for VANETs on Highways.
Wirel. Commun. Mob. Comput., 2019

Krylov subspace methods to solve a class of tensor equations via the Einstein product.
Numer. Linear Algebra Appl., 2019

Finite iterative algorithm for the symmetric periodic least squares solutions of a class of periodic Sylvester matrix equations.
Numer. Algorithms, 2019

基于N-Gram的SQL注入检测研究 (Study on SQL Injection Detection Based on N-Gram).
计算机科学, 2019

The least squares solution of a class of generalized Sylvester-transpose matrix equations with the norm inequality constraint.
J. Glob. Optim., 2019

Iterative criteria for identifying strong H-tensors.
J. Comput. Appl. Math., 2019

A Shamanskii-like self-adaptive Levenberg-Marquardt method for nonlinear equations.
Comput. Math. Appl., 2019

Convergent conditions of the generalized Newton method for absolute value equation over second order cones.
Appl. Math. Lett., 2019

A Range Search Scheme Based on Encrypted Index Hiding Order and Access Patterns.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019

2018
Some iterative methods for the largest positive definite solution to a class of nonlinear matrix equation.
Numer. Algorithms, 2018

An iterative algorithm for the least Frobenius norm Hermitian and generalized skew Hamiltonian solutions of the generalized coupled Sylvester-conjugate matrix equations.
Numer. Algorithms, 2018

The relaxed gradient-based iterative algorithms for a class of generalized coupled Sylvester-conjugate matrix equations.
J. Frankl. Inst., 2018

Improving security and stability of ad hoc on-demand distance vector with fuzzy neural network in vehicular ad hoc network.
Int. J. Distributed Sens. Networks, 2018

Enhancing negative messages broadcasting with Meet-Table and TTL in VANET.
EURASIP J. Wirel. Commun. Netw., 2018

Gradient-based iterative algorithms for generalized coupled Sylvester-conjugate matrix equations.
Comput. Math. Appl., 2018

An iterative algorithm for the least Frobenius norm least squares solution of a class of generalized coupled Sylvester-transpose linear matrix equations.
Appl. Math. Comput., 2018

Improving Security and Stability of AODV with Fuzzy Neural Network in VANET.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

A Secure AODV Protocol Improvement Scheme Based on Fuzzy Neural Network.
Proceedings of the Security and Privacy in Communication Networks, 2018

A Homomorphic Searching Scheme For Sensitive Data In NoSQL Database.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Stable Clustering for VANETs on Highways.
Proceedings of the 2018 IEEE/ACM Symposium on Edge Computing, 2018

2017
Symmetric least squares solution of a class of Sylvester matrix equations via MINIRES algorithm.
J. Frankl. Inst., 2017

On the least squares generalized Hamiltonian solution of generalized coupled Sylvester-conjugate matrix equations.
Comput. Math. Appl., 2017

Distributing Negative Messages in VANET Based on Meet-Table and Cloud Computing.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

PaJDBC: A Transparent Privacy-Aware Database Accessing Middleware for Java.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Enhancing Negative Messages Broadcasting with Meet-Table and TTL in VANET.
Proceedings of the 2017 International Conference on Identification, 2017

Meet-fog for accurate distribution of negative messages in VANET.
Proceedings of the Workshop on Smart Internet of Things, SmartIoT@SEC 2017, 2017

Online learner emotional analysis based on big dataset of online learning forum.
Proceedings of the 10th International Congress on Image and Signal Processing, 2017

2016
云存储平台下基于属性的数据库访问控制策略 (Database Access Control Policy Based on Attribute in Cloud Storage Platform).
计算机科学, 2016

Optimizing Propagation Network of Certificate Revocation in VANET with Meet-Table.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

A transparent framework based on accessing bridge and mobile app for protecting database privacy with PKI.
Proceedings of the 2nd ACM Workshop on Privacy-Aware Mobile Computing, 2016

2015
One transmission scheme based on variable MSK modulator for wireless physical layer security.
Proceedings of the International Conference on Wireless Communications & Signal Processing, 2015

2005
Dynamic Role and Context-Based Access Control for Grid Applications.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005


  Loading...