2025
Herb-Target Interaction Prediction by Multiinstance Learning.
IEEE Trans. Artif. Intell., May, 2025
Multi-task learning for joint prediction of breast cancer histological indicators in dynamic contrast-enhanced magnetic resonance imaging.
Comput. Methods Programs Biomed., 2025
2024
A Comprehensive Privacy-Preserving Federated Learning Scheme With Secure Authentication and Aggregation for Internet of Medical Things.
IEEE J. Biomed. Health Informatics, June, 2024
RPMDA: Robust and Privacy-Enhanced Multidimensional Data Aggregation Scheme for Fog-Assisted Smart Grids.
IEEE Internet Things J., May, 2024
A Repair-Efficient Piggybacking Design With Small Number of Substripes.
IEEE/ACM Trans. Netw., April, 2024
A novel multivariate time series forecasting dendritic neuron model for COVID-19 pandemic transmission tendency.
Neural Networks, 2024
MobileViT-FocR: MobileViT with Fixed-One-Centre Loss and Gradient Reversal for Generalised Fake Face Detection.
Proceedings of the MultiMedia Modeling - 30th International Conference, 2024
Automatic Meter Pointer Reading Based on Knowledge Distillation.
Proceedings of the Knowledge Science, Engineering and Management, 2024
BPVFL: A Bidirectional Privacy-Preserving Verifiable Federated Learning Framework with Homomorphic Encryption.
Proceedings of the 2024 IEEE Global Communications Conference, 2024
2023
Molecular-subtype guided automatic invasive breast cancer grading using dynamic contrast-enhanced MRI.
Comput. Methods Programs Biomed., December, 2023
SDSS: Secure Data Sharing Scheme for Edge Enabled IoV Networks.
IEEE Trans. Intell. Transp. Syst., November, 2023
Automatic Alberta Stroke Program Early Computed Tomographic Scoring in patients with acute ischemic stroke using diffusion-weighted imaging.
Medical Biol. Eng. Comput., August, 2023
Weakly Supervised Breast Lesion Detection in Dynamic Contrast-Enhanced MRI.
J. Digit. Imaging, August, 2023
CPAHP: Conditional Privacy-Preserving Authentication Scheme With Hierarchical Pseudonym for 5G-Enabled IoV.
IEEE Trans. Veh. Technol., July, 2023
Conditional Anonymous Remote Healthcare Data Sharing Over Blockchain.
IEEE J. Biomed. Health Informatics, May, 2023
Blockchain-Aided Privacy-Preserving Medical Data Sharing Scheme for E-Healthcare System.
IEEE Internet Things J., 2023
A Strong Privacy-Preserving and Efficient Fingerprint Authentication via Clustering.
Proceedings of the IEEE Global Communications Conference, 2023
Research on Natural Disasters Interdependent based on Apriori Algorithm.
Proceedings of the 6th International Conference on E-Business, 2023
2022
EMK-ABSE: Efficient Multikeyword Attribute-Based Searchable Encryption Scheme Through Cloud-Edge Coordination.
IEEE Internet Things J., 2022
Long short-term memory model - A deep learning approach for medical data with irregularity in cancer predication with tumor markers.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
Comput. Biol. Medicine, 2022
Service-aware and Interference Avoiding Multi-node Parallel Resource Scheduling Algorithm for Smart Grid Networks.
Proceedings of the 22nd IEEE International Conference on Communication Technology, 2022
Design of Aerobics Network Teaching System Based on Artificial Intelligence.
Proceedings of the e-Learning, e-Education, and Online Training, 2022
Design of Online Open Wushu Sanda Teaching Platform Based on Hybrid Reality Technology.
Proceedings of the e-Learning, e-Education, and Online Training, 2022
2021
A New Piggybacking Design With Low-Repair Bandwidth and Complexity.
IEEE Commun. Lett., 2021
Coded caching design for fog-aided networks.
Comput. Networks, 2021
BMDS: A Blockchain-based Medical Data Sharing Scheme with Attribute-Based Searchable Encryption.
Proceedings of the ICC 2021, 2021
Privacy-Preserving Data Sharing Scheme with FL via MPC in Financial Permissioned Blockchain.
Proceedings of the ICC 2021, 2021
Fog-Based Conditional Privacy-Preserving Data Batch Verification in Smart Grid.
Proceedings of the IEEE Global Communications Conference, 2021
2020
The tactics of ship collision avoidance based on Quantum-behaved Wolf Pack Algorithm.
Concurr. Comput. Pract. Exp., 2020
Distributed Storage Codes Based on Double- Layered Piggybacking Framework.
IEEE Access, 2020
A Blockchain-based Conditional Privacy-Preserving Traffic Data Sharing in Cloud.
Proceedings of the 2020 IEEE International Conference on Communications, 2020
A Physical Layer Security Scheme with Compressed Sensing in OFDM-based IoT Systems.
Proceedings of the 2020 IEEE International Conference on Communications, 2020
A Privacy-Preserving Medical Data Sharing Scheme Based on Consortium Blockchain.
Proceedings of the IEEE Global Communications Conference, 2020
Secure Fog-assisted Sharing for Multimedia Health Records in the Cloud.
Proceedings of the IEEE Global Communications Conference, 2020
2019
A Novel Secure Authentication Scheme for Heterogeneous Internet of Thing.
CoRR, 2019
Expected value model of bus gas station site layout problem with fuzzy demand in supplementary fuel using genetic algorithm.
Clust. Comput., 2019
Modeling, Analysis, and Control of an Integrated Hybrid Energy Storage System.
IEEE Access, 2019
Lightweight and Privacy-Preserving Medical Services Access for Healthcare Cloud.
IEEE Access, 2019
A Novel Secure Authentication Scheme for Heterogeneous Internet of Things.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
A Secure and Efficient Medical Data Sharing Protocol for Cloud-Assisted WBAN.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
A Novel Chaos-Based Physical Layer Security Transmission Scheme for Internet of Things.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
2018
Mutual Heterogeneous Signcryption Schemes for 5G Network Slicings.
IEEE Access, 2018
MDBV: Monitoring Data Batch Verification for Survivability of Internet of Vehicles.
IEEE Access, 2018
Prediction-Based Spectrum Access Optimization in Cognitive Radio Networks.
Proceedings of the 29th IEEE Annual International Symposium on Personal, 2018
Reliability-Based-Layered Belief Propagation for Iterative Decoding of LDPC Codes.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018
Piggybacking Belief Propagation Decoding for Rateless Codes Based on RA Structure.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2018
A Modified Unquantized Fano Sequential Decoding Algorithm for Rateless Spinal Codes.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2018
An Efficient Privacy-Preserving Incentive Scheme without TTP in Participatory Sensing Network.
Proceedings of the 2018 IEEE International Conference on Communications, 2018
An Efficient Anonymous Authentication Scheme for Internet of Vehicles.
Proceedings of the 2018 IEEE International Conference on Communications, 2018
vFAC: Fine-Grained Access Control with Versatility for Cloud Storage.
Proceedings of the IEEE Global Communications Conference, 2018
A Traceable Concurrent Data Anonymous Transmission Scheme for Heterogeneous VANETs.
Proceedings of the IEEE Global Communications Conference, 2018
Text Classification Methods Based on SVD and FCM.
Proceedings of the Web and Big Data, 2018
2017
VDAS: Verifiable data aggregation scheme for Internet of Things.
Proceedings of the IEEE International Conference on Communications, 2017
EPDA: Enhancing Privacy-Preserving Data Authentication for Mobile Crowd Sensing.
Proceedings of the 2017 IEEE Global Communications Conference, 2017
2016
1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks.
Sensors, 2016
Construction of QC-LDPC codes based on generalized RS codes with girth larger than 6.
Proceedings of the 2016 IEEE International Conference on Communication Systems, 2016
2015
Energy-efficient key agreement protocols for wireless body area networks.
Int. J. Embed. Syst., 2015
Efficient authenticated key exchange protocols for wireless body area networks.
EURASIP J. Wirel. Commun. Netw., 2015
Distributed SR-LDPC codes over multiple-access relay channel and its applications in cloud storage.
Concurr. Comput. Pract. Exp., 2015
2014
Explicit constructions for type-1 QC-LDPC codes with girth at least ten.
Proceedings of the 2014 IEEE Information Theory Workshop, 2014
Real-time pedestrian detectionl Using OpenCL.
Proceedings of the International Conference on Audio, 2014
2013
Iterative Decoding for the Davey-MacKay Construction over IDS-AWGN Channel.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
Several Explicit Constructions for (3, L) QC-LDPC Codes with Girth at Least Eight.
IEEE Commun. Lett., 2013
Construction of Girth-Eight QC-LDPC Codes from Greatest Common Divisor.
IEEE Commun. Lett., 2013
IntApop: A web service for predicting apoptotic protein interactions in humans.
Biosyst., 2013
Low outage probability throughput improvement for cooperative wireless networks by utilizing channel state information.
Proceedings of the International Symposium on Intelligent Signal Processing and Communication Systems, 2013
An Efficient and Lightweight Certificateless Authentication Protocol for Wireless Body Area Networks.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Distributed SR-LDPC Codes over Multiple-Access Relay Channel.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
An Ultrahigh Speed AES Processor Method Based on FPGA.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Coordinate relationship extraction on sentence level in Chinese corpus.
Proceedings of the Ninth International Conference on Natural Computation, 2013
2012
Linear Transmitter Precoding Design with Matching Weighted SLNR for Multiuser MIMO Downlink Systems.
IEICE Trans. Commun., 2012
Dynamic Bubble-Check Algorithm for Check Node Processing in <i>Q</i>-Ary LDPC Decoders.
IEICE Trans. Commun., 2012
Lowering Error Floors of Irregular LDPC Codes by Combining Construction and Decoding.
IEICE Trans. Commun., 2012
Design of Quasi-Cyclic Cycle LDPC Codes over GF(<i>q</i>).
IEICE Trans. Commun., 2012
A Simple but Effective Congestion Control Scheme for Safety-Related Events in VANET.
IEICE Trans. Inf. Syst., 2012
Global Communications Newsletter.
IEEE Commun. Mag., 2012
New quasi-cyclic LDPC codes with girth at least eight based on Sidon sequences.
Proceedings of the 7th International Symposium on Turbo Codes and Iterative Information Processing, 2012
An efficient certificateless remote anonymous authentication scheme for wireless body area networks.
Proceedings of IEEE International Conference on Communications, 2012
Structure Sparsity for Multi-camera Gait Recognition.
Proceedings of the Pattern Recognition - Chinese Conference, 2012
Certificateless Partially Blind Signature.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
2011
Nonbinary Quasi-Cyclic LDPC Cycle Codes with Low-Density Systematic Quasi-Cyclic Generator Matrices.
IEICE Trans. Commun., 2011
Parity-Check Matrix Extension to Lower the Error Floors of Irregular LDPC Codes.
IEICE Trans. Commun., 2011
On the Rateless Character of Irregular RA Codes.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011
2010
Simple capacity-achieving ensembles of rateless erasure-correcting codes.
IEEE Trans. Commun., 2010
A smart bushfire monitoring and detection system using GSM technology.
Int. J. Comput. Aided Eng. Technol., 2010
Fair exchange signature schemes.
Sci. China Inf. Sci., 2010
2009
Trace Representation of a New Class of Sextic Residue Sequences of Period <i>p</i>=3 ( mod 8).
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
A Construction of Binary Cyclotomic Sequences Using Extension Fields.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
2008
More Efficient VLR Group Signature Satisfying Exculpability.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
Cryptanalysis of an Identity Based Proxy Multi-Signature Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
On the Linear Complexity of Some Ternary Sequences with Ideal Autocorrelation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
Identity-Based Authenticated Key Agreement Protocols without Bilinear Pairings.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
Fair Exchange Signature Schemes.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
2007
Autocorrelation and Linear Complexity of the New Generalized Cyclotomic Sequences.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
Semi-Irregular LDPC Codes Used in MBC.
IEICE Trans. Commun., 2007
On the Randomness of Generalized Cyclotomic Sequences of Order Two and Length <i>pq</i>.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
Efficient ID-based Signature Without Trusted PKG.
IACR Cryptol. ePrint Arch., 2007
The security analyses of RosettaNet in Grid.
Comput. Stand. Interfaces, 2007
2006
Performance-Rate Functions for Dynamically Quantized Feedback Systems.
Proceedings of the 45th IEEE Conference on Decision and Control, 2006
2005
The Security Analyses of RosettaNet in Grid.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005
Fair e-payment protocols.
Proceedings of the Ninth International Conference on Computer Supported Cooperative Work in Design, 2005
2004
The Key-bits in Turbo Codes and Their Protections.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004
2002
Simple erasure correcting codes with capacity achieving performance.
Proceedings of the Global Telecommunications Conference, 2002
1987
Performance Results in Multiversion Timestamp Concurrency Control with Predeclared Writesets.
Proceedings of the Sixth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, 1987