2025
An efficient data sharing and public auditing scheme for digital content via consortium chain.
Computing, April, 2025
Integrated design optimization for internal, external pipeline networks and equipment in gas storage injection and production system.
Comput. Ind. Eng., 2025
2024
Multi-replicas integrity checking scheme with supporting probability audit for cloud-based IoT.
PeerJ Comput. Sci., 2024
A robust coverless image-synthesized video steganography based on asymmetric structure.
J. Vis. Commun. Image Represent., 2024
Profit Maximization In Arbitrage Loops.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, ICDCS 2024, 2024
2023
Research on real-time prediction of completion time based on AE-CNN-LSTM.
Comput. Ind. Eng., November, 2023
A multi-agent double Deep-Q-network based on state machine and event stream for flexible job shop scheduling problem.
Adv. Eng. Informatics, October, 2023
Bert-CK: A study of user profile classification based on Bert and CK-means+ fusion.
J. Intell. Fuzzy Syst., 2023
Research on dual-channel user portrait construction method based on DPCNN-BiGRU and attention mechanism.
J. Intell. Fuzzy Syst., 2023
A New Scheme to Implement the Reconfigurable Optical Logic Gate in Millimeter Wave Over Fiber System.
IEEE Access, 2023
2022
Dynamic Group Signature Scheme on Lattice with Verifier-local Revocation.
IACR Cryptol. ePrint Arch., 2022
A Privacy Set Intersection Algorithm Based on Batch Blind Signatures on Lattice∗.
Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering, 2022
2021
An augmented reality-based multimedia environment for experimental education.
Multim. Tools Appl., 2021
Real-time Face Mask Detection in Video Data.
CoRR, 2021
2020
Lane Boundary Geometry Extraction from Satellite Imagery.
CoRR, 2020
2018
A Homomorphic Masking Defense Scheme Based on RSA Cryptography Algorithm.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
A high-Capacity Watermarking Algorithm Using two Bins Histogram Modification.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
2017
ArbiText: Arbitrary-Oriented Text Detection in Unconstrained Scene.
CoRR, 2017
A Wearable Assistive Technology for the Visually Impaired with Door Knob Detection and Real-Time Feedback for Hand-to-Handle Manipulation.
Proceedings of the 2017 IEEE International Conference on Computer Vision Workshops, 2017
Lane boundary extraction from satellite imagery.
Proceedings of the 1st ACM SIGSPATIAL Workshop on High-Precision Maps and Intelligent Applications for Autonomous Vehicles, 2017
Accurate vehicle self-localization in high definition map dataset.
Proceedings of the 1st ACM SIGSPATIAL Workshop on High-Precision Maps and Intelligent Applications for Autonomous Vehicles, 2017
2016
Efficient FPGA implementation of modular multiplication based on Montgomery algorithm.
Microprocess. Microsystems, 2016
2014
A Provable Secure Mutual RFID Authentication Protocol Based on Error-Correct Code.
Proceedings of the 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2014
2013
A Homomorphic ElGamal Variant Based on BGN's Method.
Proceedings of the 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2013
2011
Design of U Disk Remote Monitoring System in Trusted Computing Environment.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011
2007
An Attack on Libert et al.' s ID-based Undeniable Signature Scheme.
Int. J. Netw. Secur., 2007
2005
Automated Variable Weighting in k-Means Type Clustering.
IEEE Trans. Pattern Anal. Mach. Intell., 2005
2003
The Unlinkability of Randomization-Enhanced Chaum's Blind Signature Scheme.
Proceedings of the 17th International Parallel and Distributed Processing Symposium (IPDPS 2003), 2003
2000
Security of Tseng-Jan's group signature schemes.
Inf. Process. Lett., 2000