Haiping Huang
Orcid: 0000-0002-4392-3599
According to our database1,
Haiping Huang
authored at least 176 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
A secure and efficient electronic medical record data sharing scheme based on blockchain and proxy re-encryption.
J. Cloud Comput., December, 2024
An effective trajectory planning heuristics for UAV-assisted vessel monitoring system.
Peer Peer Netw. Appl., July, 2024
Decentralized Access Control for Privacy-Preserving Cloud-Based Personal Health Record With Verifiable Policy Update.
IEEE Internet Things J., May, 2024
A trustworthy and reliable multi-keyword search in blockchain-assisted cloud-edge storage.
Peer Peer Netw. Appl., March, 2024
Neural Comput. Appl., January, 2024
Privacy-Enhanced Frequent Sequence Mining and Retrieval for Personalized Behavior Prediction.
IEEE Trans. Inf. Forensics Secur., 2024
Inf. Process. Manag., 2024
Frontiers Comput. Neurosci., 2024
A multi-hierarchy particle swarm optimization-based algorithm for cloud workflow scheduling.
Future Gener. Comput. Syst., 2024
Bridging spherical mixture distributions and word semantic knowledge for Neural Topic Modeling.
Expert Syst. Appl., 2024
CoRR, 2024
An optimization-based equilibrium measure describes non-equilibrium steady state dynamics: application to edge of chaos.
CoRR, 2024
Effective anti-submarine decision support system based on heuristic rank-based Dijkstra and adaptive threshold partitioning mechanism.
Appl. Soft Comput., 2024
2023
IEEE Syst. J., December, 2023
An IoT and machine learning enhanced framework for real-time digital human modeling and motion simulation.
Comput. Commun., December, 2023
Blockchain-Enabled Fine-Grained Searchable Encryption With Cloud-Edge Computing for Electronic Health Records Sharing.
IEEE Internet Things J., October, 2023
J. Syst. Archit., March, 2023
Double Rainbows: A Promising Distributed Data Sharing in Augmented Intelligence of Things.
IEEE Trans. Ind. Informatics, 2023
J. Intell. Fuzzy Syst., 2023
CoRR, 2023
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
2022
An Immunity Passport Scheme Based on the Dual-Blockchain Architecture for International Travel.
Wirel. Commun. Mob. Comput., 2022
An Adaptive Secure Handover Authenticated Key Agreement for Multi-Server Architecture Communication Applications.
IEEE Trans. Veh. Technol., 2022
A Cross-Domain Authentication Scheme Based on Cooperative Blockchains Functioning With Revocation for Medical Consortiums.
IEEE Trans. Netw. Serv. Manag., 2022
IEEE Trans. Intell. Transp. Syst., 2022
IEEE Trans. Intell. Transp. Syst., 2022
IEEE Trans. Ind. Informatics, 2022
Differential privacy protection scheme based on community density aggregation and matrix perturbation.
Inf. Sci., 2022
IEEE Internet Things J., 2022
Int. J. Commun. Syst., 2022
Statistical mechanics of continual learning: variational principle and mean-field potential.
CoRR, 2022
Proceedings of the Computer Science and Education - 17th International Conference, 2022
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022
2021
Computer Vision-Assisted 3D Object Localization via COTS RFID Devices and a Monocular Camera.
IEEE Trans. Mob. Comput., 2021
An Efficient Signature Scheme Based on Mobile Edge Computing in the NDN-IoT Environment.
IEEE Trans. Comput. Soc. Syst., 2021
Secur. Commun. Networks, 2021
A Lightweight Three-Factor Authentication and Key Agreement Scheme for Multigateway WSNs in IoT.
Secur. Commun. Networks, 2021
Peer-to-Peer Netw. Appl., 2021
TA-BiLSTM: An Interpretable Topic-Aware Model for Misleading Information Detection in Mobile Social Networks.
Mob. Networks Appl., 2021
J. Syst. Archit., 2021
Blockchain-assisted handover authentication for intelligent telehealth in multi-server edge computing environment.
J. Syst. Archit., 2021
Blockchain-based eHealth system for auditable EHRs manipulation in cloud environments.
J. Parallel Distributed Comput., 2021
IET Commun., 2021
Proceedings of the 2021 IEEE International Conference on Systems, Man, and Cybernetics, 2021
A Simulated Annealing Genetic Algorithm for Logistics Distribution Problem in Community Scenario.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021
Proceedings of the 21st IEEE/ACM International Symposium on Cluster, 2021
2020
An Authentication Scheme Based on Novel Construction of Hash Chains for Smart Mobile Devices.
Wirel. Commun. Mob. Comput., 2020
Wirel. Commun. Mob. Comput., 2020
Trajectory Optimization for UAVs' Efficient Charging in Wireless Rechargeable Sensor Networks.
IEEE Trans. Veh. Technol., 2020
Load Balance and Trajectory Design in Multi-UAV Aided Large-Scale Wireless Rechargeable Networks.
IEEE Trans. Veh. Technol., 2020
IEEE Trans. Veh. Technol., 2020
IEEE Trans. Veh. Technol., 2020
IEEE Trans. Parallel Distributed Syst., 2020
IEEE Trans. Netw. Serv. Manag., 2020
An Improved Broadcast Authentication Protocol for Wireless Sensor Networks Based on the Self-Reinitializable Hash Chains.
Secur. Commun. Networks, 2020
J. Netw. Comput. Appl., 2020
J. Inf. Secur. Appl., 2020
Adaptive and Extensible Energy Supply Mechanism for UAVs-Aided Wireless-Powered Internet of Things.
IEEE Internet Things J., 2020
A Blockchain-Based Trust Management With Conditional Privacy-Preserving Announcement Scheme for VANETs.
IEEE Internet Things J., 2020
RF-IDH: An intelligent fall detection system for hemodialysis patients via COTS RFID.
Future Gener. Comput. Syst., 2020
Relationship between manifold smoothness and adversarial vulnerability in deep learning with local errors.
CoRR, 2020
CoRR, 2020
Comput. Secur., 2020
Generalized Intrusion Detection Mechanism for Empowered Intruders in Wireless Sensor Networks.
IEEE Access, 2020
IEEE Access, 2020
IEEE Access, 2020
A Privacy-Preserving Multi-Keyword Ranked Search Over Encrypted Data in Hybrid Clouds.
IEEE Access, 2020
Proceedings of the IEEE International Conference on Teaching, 2020
An Energy-aware Greedy Heuristic for Multi-objective Optimization in Fog-Cloud Computing System.
Proceedings of the 2020 IEEE International Conference on Systems, Man, and Cybernetics, 2020
RF-Mirror: Mitigating Mutual Coupling Interference in Two-Tag Array Labeled RFID Systems.
Proceedings of the 17th Annual IEEE International Conference on Sensing, 2020
Proceedings of the 15th International Conference on Computer Science & Education, 2020
Proceedings of the Blockchain and Trustworthy Systems - Second International Conference, 2020
Delay-sensitive Trajectory Designing for UAV-enabled Data Collection in Internet of Things.
Proceedings of the ACM TUR-C'20: ACM Turing Celebration Conference, 2020
2019
IEEE Trans. Veh. Technol., 2019
Catching Escapers: A Detection Method for Advanced Persistent Escapers in Industry Internet of Things Based on Identity-based Broadcast Encryption (IBBE).
ACM Trans. Embed. Comput. Syst., 2019
Improved LDA Dimension Reduction Based Behavior Learning with Commodity WiFi for Cyber-Physical Systems.
ACM Trans. Cyber Phys. Syst., 2019
An Enhanced Virtual Force Algorithm for Diverse <i>k</i>-Coverage Deployment of 3D Underwater Wireless Sensor Networks.
Sensors, 2019
Sensors, 2019
Secur. Commun. Networks, 2019
J. Netw. Comput. Appl., 2019
RF-Focus: Computer Vision-assisted Region-of-interest RFID Tag Recognition and Localization in Multipath-prevalent Environments.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019
How data, synapses and neurons interact with each other: a variational principle marrying gradient ascent and message passing.
CoRR, 2019
Statistical physics of unsupervised learning with prior knowledge in neural networks.
CoRR, 2019
CoRR, 2019
Data fusion-oriented cluster routing protocol for multimedia sensor networks based on the degree of image difference.
CCF Trans. Netw., 2019
Cryptanalysis and Improvement of an Anonymous Batch Verification Scheme for Mobile Healthcare Crowd Sensing.
IEEE Access, 2019
A Type of Energy-Balanced Tree Based Data Collection Strategy for Sensor Network With Mobile Sink.
IEEE Access, 2019
An Efficient and Dynamic Semantic-Aware Multikeyword Ranked Search Scheme Over Encrypted Cloud Data.
IEEE Access, 2019
Proceedings of the 20th International Conference on Parallel and Distributed Computing, 2019
Proceedings of the Parallel Architectures, Algorithms and Programming, 2019
Proceedings of the 14th International Conference on Computer Science & Education, 2019
Teaching Practice and Thinking of SPOC-Rain Classroom Based Flipped Classroom Model in the Network Technology and Application Course.
Proceedings of the 14th International Conference on Computer Science & Education, 2019
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019
Proceedings of the Seventh International Conference on Advanced Cloud and Big Data, 2019
2018
Intrusion Detection Based on k-Coverage in Mobile Sensor Networks With Empowered Intruders.
IEEE Trans. Veh. Technol., 2018
Int. J. Secur. Networks, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the TENCON 2018, 2018
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2018
Proceedings of the Services - SERVICES 2018, 2018
Proceedings of the 9th International Symposium on Parallel Architectures, 2018
RF-MVO: Simultaneous 3D Object Localization and Camera Trajectory Recovery Using RFID Devices and a 2D Monocular Camera.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018
Emotion recognition of human physiological signals based on recursive quantitative analysis.
Proceedings of the Tenth International Conference on Advanced Computational Intelligence, 2018
Proceedings of the Tenth International Conference on Advanced Computational Intelligence, 2018
2017
Private and Secured Medical Data Transmission and Analysis for Wireless Sensing Healthcare System.
IEEE Trans. Ind. Informatics, 2017
Node Scheduling Strategies for Achieving Full-View Area Coverage in Camera Sensor Networks.
Sensors, 2017
Efficient Location Privacy-Preserving <i>k</i>-Anonymity Method Based on the Credible Chain.
ISPRS Int. J. Geo Inf., 2017
Mean-field theory of input dimensionality reduction in unsupervised deep neural networks.
CoRR, 2017
Reinforced backpropagation improves test performance of deep networks: a toy-model study.
CoRR, 2017
Proceedings of the Parallel Architecture, Algorithm and Programming, 2017
Proceedings of the Wireless Sensor Networks, 2017
2016
An Improved <i>μ</i>TESLA Protocol Based on Queuing Theory and Benaloh-Leichter SSS in WSNs.
J. Sensors, 2016
Routing Algorithm and Traffic Light Control based on Vehicular Delay-Tolerant Networks.
J. Commun., 2016
Unsupervised feature learning from finite data by message passing: discontinuous versus continuous phase transition.
CoRR, 2016
Statistical mechanics of unsupervised feature learning in a restricted Boltzmann machine with binary synapses.
CoRR, 2016
Proceedings of the 8th International Conference on Wireless Communications & Signal Processing, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Research on practice and incentive mechanism of flipped classroom based on small private online course.
Proceedings of the 11th International Conference on Computer Science & Education, 2016
Proceedings of the International Conference on Computer, 2016
2015
基于节点间信任评估算法的无线传感器网络密钥管理方案 (Key Management Scheme of Wireless Sensor Network Based on Trust Evaluation Algorithm between Nodes).
计算机科学, 2015
Parking Query in Vehicular Delay-Tolerant Networks with Privacy Protection Based on Secure Multiparty Computation.
J. Sensors, 2015
KSII Trans. Internet Inf. Syst., 2015
Secure Two-Party Distance Computation Protocols with a Semihonest Third Party and Randomization for Privacy Protection in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015
Proceedings of the Seventh International Symposium on Parallel Architectures, 2015
A Secure Routing Mechanism against Wormhole Attack in IPv6-Based Wireless Sensor Networks.
Proceedings of the Seventh International Symposium on Parallel Architectures, 2015
2014
J. Commun., 2014
Redundancy Model and Boundary Effects Based Coverage-Enhancing Algorithm for 3D Underwater Sensor Networks.
Int. J. Distributed Sens. Networks, 2014
Int. J. Distributed Sens. Networks, 2014
Int. J. Commun. Syst., 2014
Code optimization, frozen glassy phase and improved decoding algorithms for low-density parity-check codes.
CoRR, 2014
A QoS-aware routing algorithm based on ant-cluster in wireless multimedia sensor networks.
Sci. China Inf. Sci., 2014
2013
A Type of Node Deployment Strategy Based on Variable Acceleration Motion for Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013
Weight-Based Clustering Decision Fusion Algorithm for Distributed Target Detection in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013
Int. J. Distributed Sens. Networks, 2013
2012
J. Networks, 2012
Novel Node Localization Algorithm Based on Nonlinear Weighting Least Square for Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2012
Int. J. Distributed Sens. Networks, 2012
Improved Virtual Potential Field Algorithm Based on Probability Model in Three-Dimensional Directional Sensor Networks.
Int. J. Distributed Sens. Networks, 2012
Probability Model Based Coverage-Enhancing Algorithm for WSNs of Nodes' Adjustable Movement Pattern.
Int. J. Distributed Sens. Networks, 2012
Proceedings of the Advances in Wireless Sensor Networks, 2012
A Novel Clustering Ant-Based QoS-aware Routing Algorithm in Large Scale Wireless Multimedia Sensor Networks.
Proceedings of the 2012 IEEE International Conference on Cluster Computing Workshops, 2012
2011
CoRR, 2011
Proceedings of the Web Information Systems and Mining - International Conference, 2011
2010
Wirel. Sens. Netw., 2010
Sensors, 2010
An energy-saving strategy based on sleep scheduling and block transmission for wireless multimedia sensor networks.
Int. J. Pervasive Comput. Commun., 2010
Proceedings of the IEEE/IFIP Network Operations and Management Symposium, 2010
2009
Wirel. Sens. Netw., 2009
2004
Multi-Mobile Agents' Separation Scheme in Java Card Application for Mobile Agent's Security.
Proceedings of the 2004 IEEE International Conference on Services Computing (SCC 2004), 2004