Bo Qin
Orcid: 0000-0003-2875-4595
According to our database1,
Bo Qin
authored at least 226 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Sensors, October, 2024
An Identity-Based Strong Designated Verifier Dual-Signature Scheme With Constrained Delegatability.
IEEE Internet Things J., May, 2024
Industrial Wireless Internet Zero Trust Model: Zero Trust Meets Dynamic Federated Learning with Blockchain.
IEEE Wirel. Commun., April, 2024
Verifiable Federated Learning With Privacy-Preserving Data Aggregation for Consumer Electronics.
IEEE Trans. Consumer Electron., February, 2024
IEEE Trans. Smart Grid, January, 2024
IEEE Trans. Multim., 2024
Secret Multiple Leaders & Committee Election With Application to Sharding Blockchain.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
Digital twin-assisted dual transfer: A novel information-model adaptation method for rolling bearing fault diagnosis.
Inf. Fusion, 2024
Enhanced Extended State observer based output-feedback tracking control of wheeled Mobile robot with disturbance.
Int. J. Robotics Autom., 2024
JEP-KD: Joint-Embedding Predictive Architecture Based Knowledge Distillation for Visual Speech Recognition.
CoRR, 2024
Comput. Graph., 2024
Comput. Electr. Eng., 2024
Proceedings of the IEEE International Conference on Robotics and Automation, 2024
2023
A Novel Data Augmentation Method Based on CoralGAN for Prediction of Part Surface Roughness.
IEEE Trans. Neural Networks Learn. Syst., October, 2023
Inf. Sci., October, 2023
Sensors, February, 2023
IEEE Trans. Knowl. Data Eng., 2023
Enhanced Reduced-Order Extended State Observer for Motion Control of Differential Driven Mobile Robot.
IEEE Trans. Cybern., 2023
Slow-Varying Dynamics-Assisted Temporal Capsule Network for Machinery Remaining Useful Life Estimation.
IEEE Trans. Cybern., 2023
PeerJ Comput. Sci., 2023
PIRT: A Physics-Informed Red Tide Deep Learning Forecast Model Considering Causal-Inferred Predictors Selection.
IEEE Geosci. Remote. Sens. Lett., 2023
Weighted Joint Maximum Mean Discrepancy Enabled Multi-Source-Multi-Target Unsupervised Domain Adaptation Fault Diagnosis.
CoRR, 2023
Hard Sample Mining Enabled Contrastive Feature Learning for Wind Turbine Pitch System Fault Diagnosis.
CoRR, 2023
Proceedings of the Information and Communications Security - 25th International Conference, 2023
Proceedings of the Information and Communications Security - 25th International Conference, 2023
Proceedings of the 12th IEEE International Conference on Educational and Information Technology, 2023
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023
A Computational Framework for Effective Representation and Extraction of Knowledge Graph for Power Plant Maintenance and Overhaul.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2023
Understanding and Improving the Robustness of Terminology Constraints in Neural Machine Translation.
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2023
2022
Distributed Adaptive Control for Nonlinear Heterogeneous Multi-agent Systems with Different Dimensions and Time Delay.
Int. J. Comput. Commun. Control, July, 2022
A knowledge extraction framework for domain-specific application with simplified pre-trained language model and attention-based feature extractor.
Serv. Oriented Comput. Appl., 2022
Your Behaviors Reveal What You Need: A Practical Scheme Based on User Behaviors for Personalized Security Nudges.
Comput. Secur., 2022
Proceedings of the Seventh Conference on Machine Translation, 2022
Squeezing Network Performance for Secure and Efficient PoW with Better Difficulty Adjustment.
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the 18th International Conference on Mobility, Sensing and Networking, 2022
Proceedings of the 2022 5th International Conference on Education Technology Management, 2022
How to improve students' intrinsic motivation and 4C skills in the virtual e-learning community and evaluate its results.
Proceedings of the 14th International Conference on Education Technology and Computers, 2022
An Intelligent System for Semantic Information Extraction and Knowledge Graph Construction from Multi-Type Data Sources.
Proceedings of the IEEE International Conference on e-Business Engineering, 2022
Simultaneous Extraction of Entities and Relations Based on Pre-trained Language Model and Pre-defined Language Templates.
Proceedings of the IEEE International Conference on e-Business Engineering, 2022
Proceedings of the ICDLT 2022: 6th International Conference on Deep Learning Technologies, Xi'an, China, July 26, 2022
Proceedings of the ICDLT 2022: 6th International Conference on Deep Learning Technologies, Xi'an, China, July 26, 2022
Proceedings of the Algorithms and Architectures for Parallel Processing, 2022
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022
Handwritten Mathematical Expression Recognition via Attention Aggregation Based Bi-directional Mutual Learning.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022
2021
Wirel. Pers. Commun., 2021
A New Multitask Learning Method for Tool Wear Condition and Part Surface Quality Prediction.
IEEE Trans. Ind. Informatics, 2021
IEEE Trans. Inf. Forensics Secur., 2021
Fault Frequency Identification of Rolling Bearing Using Reinforced Ensemble Local Mean Decomposition.
J. Control. Sci. Eng., 2021
A Multi-Agent Reinforcement Learning Framework with Recurrent Communication Module for Traffic Light Control.
Proceedings of the 4th International Conference on Information Systems and Computer Aided Education, 2021
A Framework for Effective Knowledge Extraction from A Data Space Formed by Unstructured Technical Reports using Pre-trained Models.
Proceedings of the IEEE International Conference on e-Business Engineering, 2021
ET-SORT: A deep learning-based method for mesoscale eddies tracking in two-dimensional time-varying flow field.
Proceedings of the ICDLT 2021: 5th International Conference on Deep Learning Technologies, Qingdao, China, July 23, 2021
Proceedings of the ICDLT 2021: 5th International Conference on Deep Learning Technologies, Qingdao, China, July 23, 2021
2020
Functional Privacy-preserving Outsourcing Scheme with Computation Verifiability in Fog Computing.
KSII Trans. Internet Inf. Syst., 2020
Future Gener. Comput. Syst., 2020
Future Gener. Comput. Syst., 2020
Proceedings of the Information and Communications Security - 22nd International Conference, 2020
Proceedings of the 11th International Conference on Awareness Science and Technology, 2020
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020
2019
Privacy-Preserving Cloud-Based Road Condition Monitoring With Source Authentication in VANETs.
IEEE Trans. Inf. Forensics Secur., 2019
基于ST-CNN的交通标志实时检测识别算法 (Real-time Detection and Recognition Algorithm of Traffic Signs Based on ST-CNN).
计算机科学, 2019
计算机科学, 2019
Securing messaging services through efficient signcryption with designated equality test.
Inf. Sci., 2019
Future Gener. Comput. Syst., 2019
Comput. Secur., 2019
Comput. Commun., 2019
Proceedings of the Network and System Security - 13th International Conference, 2019
Proceedings of the Machine Learning and Intelligent Communications, 2019
Proceedings of the International Symposium on Quality of Service, 2019
Proceedings of the 2019 IEEE International Conference on Software Maintenance and Evolution, 2019
Proceedings of the Information and Communications Security - 21st International Conference, 2019
Learning-Based Anomaly Cause Tracing with Synthetic Analysis of Logs from Multiple Cloud Service Components.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
An Approach to Cloud Execution Failure Diagnosis Based on Exception Logs in OpenStack.
Proceedings of the 12th IEEE International Conference on Cloud Computing, 2019
2018
Peer-to-Peer Netw. Appl., 2018
基于时空关系模型的交通信号灯的实时检测与识别 (Real-time Detection and Recognition of Traffic Light Based on Time-Space Model).
计算机科学, 2018
Multiple Feature Vectors Based Fault Classification for WSN Integrated Bearing of Rolling Mill.
J. Control. Sci. Eng., 2018
J. Comput. Sci. Technol., 2018
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
IEEE Trans. Intell. Transp. Syst., 2017
IEEE Trans. Inf. Forensics Secur., 2017
Soft Comput., 2017
Int. J. Inf. Sec., 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the Information Security Practice and Experience, 2017
Proceedings of the Information Security Practice and Experience, 2017
Proceedings of the Information Security Practice and Experience, 2017
Proceedings of the Information Security Practice and Experience, 2017
Non-approximability and Polylogarithmic Approximations of the Single-Sink Unsplittable and Confluent Dynamic Flow Problems.
Proceedings of the 28th International Symposium on Algorithms and Computation, 2017
2016
Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response.
IEEE Trans. Computers, 2016
IEEE Trans. Computers, 2016
Soft Comput., 2016
Secur. Commun. Networks, 2016
Int. J. Sens. Networks, 2016
Int. J. Inf. Sec., 2016
Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing.
IACR Cryptol. ePrint Arch., 2016
Future Gener. Comput. Syst., 2016
Future Gener. Comput. Syst., 2016
Future Gener. Comput. Syst., 2016
Versatile lightweight key distribution for big data privacy in vehicular ad hoc networks.
Concurr. Comput. Pract. Exp., 2016
Efficient group key management for secure big data in predictable large-scale networks.
Concurr. Comput. Pract. Exp., 2016
Comput. Commun., 2016
Proceedings of the Third International Conference on Trustworthy Systems and their Applications, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Analysis of SIFT Method Based on Swarm Intelligent Algorithms for Copy-Move Forgery Detection.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016
Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science, 2016
Online/Offline Public-Index Predicate Encryption for Fine-Grained Mobile Access Control.
Proceedings of the Computer Security - ESORICS 2016, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Round-Efficient and Sender-Unrestricted Dynamic Group Key Agreement Protocol for Secure Group Communications.
IEEE Trans. Inf. Forensics Secur., 2015
TPP: Traceable Privacy-Preserving Communication and Precise Reward for Vehicle-to-Grid Networks in Smart Grids.
IEEE Trans. Inf. Forensics Secur., 2015
Theor. Comput. Sci., 2015
J. Cloud Comput., 2015
Int. J. Inf. Sec., 2015
On the Security of MTA-OTIBASs (Multiple-TA One-Time Identity-Based Aggregate Signatures).
CoRR, 2015
On the Security of Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response.
CoRR, 2015
Practical secure and privacy-preserving scheme for value-added applications in VANETs.
Comput. Commun., 2015
Sci. China Inf. Sci., 2015
Proceedings of the Information Security Practice and Experience, 2015
Expanding an Operating System's Working Space with a New Mode to Support Trust Measurement.
Proceedings of the Information Security Practice and Experience, 2015
Proceedings of the Information Security Practice and Experience, 2015
Thermal error prediction of numerical control machine based on improved particle swarm optimized back propagation neural network.
Proceedings of the 11th International Conference on Natural Computation, 2015
An efficient framework for online virtual network embedding in virtualized cloud data centers.
Proceedings of the 4th IEEE International Conference on Cloud Networking, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
Asymmetric Cross-cryptosystem Re-encryption Applicable to Efficient and Secure Mobile Access to Outsourced Data.
Proceedings of the 10th ACM Symposium on Information, 2015
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015
2014
FRR: Fair remote retrieval of outsourced private medical records in electronic health networks.
J. Biomed. Informatics, 2014
Signatures in hierarchical certificateless cryptography: Efficient constructions and provable security.
Inf. Sci., 2014
Inf. Sci., 2014
IET Inf. Secur., 2014
Proceedings of the Network and System Security - 8th International Conference, 2014
Proceedings of the Information Security Practice and Experience, 2014
Proceedings of the Information Security Practice and Experience, 2014
Proceedings of the IEEE Global Communications Conference, 2014
Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage.
Proceedings of the Computer Security - ESORICS 2014, 2014
Practical Direct Chosen Ciphertext Secure Key-Policy Attribute-Based Encryption with Public Ciphertext Test.
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014
Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014
2013
IEEE/ACM Trans. Netw., 2013
Secur. Commun. Networks, 2013
Corrigendum: "Provably-secure electronic cash based on certicateless partially-blind signatures".
Electron. Commer. Res. Appl., 2013
Clust. Comput., 2013
ChainDroid: Safe and Flexible Access to Protected Android Resources Based on Call Chain.
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key Agreement.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013
2012
Provably secure threshold public-key encryption with adaptive security and short ciphertexts.
Inf. Sci., 2012
Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme.
IET Inf. Secur., 2012
IET Inf. Secur., 2012
CistromeMap: a knowledgebase and web server for ChIP-Seq and DNase-Seq studies in mouse and human.
Bioinform., 2012
Analysis and Improvements of Two Identity Based Anonymous Signcryption Schemes for Multiple Receivers.
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
Proceedings of the Internet and Distributed Computing Systems, 2012
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012
2011
Solitonic Excitations and Interactions in the Three-Spine Alpha-Helical Protein with Inhomogeneity.
SIAM J. Appl. Math., 2011
Provably secure one-round identity-based authenticated asymmetric group key agreement protocol.
Inf. Sci., 2011
Electron. Commer. Res. Appl., 2011
Asymmetric group key agreement protocol for open networks and its application to broadcast encryption.
Comput. Networks, 2011
Proceedings of the Provable Security - 5th International Conference, 2011
Proceedings of the Information Security, 14th International Conference, 2011
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011
Proceedings of the Third International Conference on Communications and Mobile Computing, 2011
Proceedings of the Seventh International Conference on Natural Computation, 2011
Proceedings of the Information and Communications Security - 13th International Conference, 2011
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011
2010
A 52-mW 3.1-10.6-GHz Fully Integrated Correlator for IR-UWB Transceivers in 0.18 μm CMOS.
IEEE Trans. Ind. Electron., 2010
1.8 pJ/Pulse Programmable Gaussian Pulse Generator for Full-Band Noncarrier Impulse-UWB Transceivers in 90-nm CMOS.
IEEE Trans. Ind. Electron., 2010
IACR Cryptol. ePrint Arch., 2010
Comput. Networks, 2010
Proceedings of the IEEE 6th International Conference on Wireless and Mobile Computing, 2010
Proceedings of the Advances in Swarm Intelligence, First International Conference, 2010
Proceedings of the Advances in Swarm Intelligence, First International Conference, 2010
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010
Proceedings of the Information and Communications Security - 12th International Conference, 2010
Proceedings of IEEE International Conference on Communications, 2010
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
Proceedings of the Provable Security, Third International Conference, 2009
Proceedings of Machine Translation Summit XII: Papers, 2009
A Single-chip 33pJ/pulse 5th-derivative Gaussian based IR-UWB Transmitter in 0.13µm CMOS.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2009), 2009
Proceedings of the Second International Symposium on Intelligent Information Technology and Security Informatics, 2009
A Three-Phase Approach to Photometric Calibration for Multi-projector Display Using LCD Projectors.
Proceedings of the Computer Vision, 2009
Proceedings of the Applied Algebra, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
Proceedings of the Third ChinaGrid Annual Conference, ChinaGrid 2008, Dunhuang, Gansu, 2008
2007
A Varying Pulse Width Second Order Derivative Gaussian Pulse Generator for UWB Transceivers in CMOS.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2007), 2007
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007
Proceedings of the 10th International Conference on Computer-Aided Design and Computer Graphics, 2007
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007
Proceedings of the 4th International Conference on Computer Graphics, 2007
2006
Proceedings of the 2006 Joint Conference on Information Sciences, 2006
Zero-Knowledge Proof of Generalized Compact Knapsacks (or A Novel Identification/Signature Scheme).
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006
2005
J. Comput. Sci. Technol., 2005
Proceedings of the Information Security Practice and Experience, 2005
Proceedings of the Progress in Pattern Recognition, 2005
Proceedings of the 2005 International Conference on Computer Graphics, 2005
2004
Proceedings of the Advances in Neural Networks, 2004
Proceedings of the 3rd International Conference on Information Security, 2004
Proceedings of the 2004 IEEE International Geoscience and Remote Sensing Symposium, 2004
Simulated radiation characteristics of frozen soil surface at typical microwave bands.
Proceedings of the 2004 IEEE International Geoscience and Remote Sensing Symposium, 2004