Haiping Huang

Orcid: 0000-0002-4392-3599

According to our database1, Haiping Huang authored at least 176 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A secure and efficient electronic medical record data sharing scheme based on blockchain and proxy re-encryption.
J. Cloud Comput., December, 2024

An effective trajectory planning heuristics for UAV-assisted vessel monitoring system.
Peer Peer Netw. Appl., July, 2024

Decentralized Access Control for Privacy-Preserving Cloud-Based Personal Health Record With Verifiable Policy Update.
IEEE Internet Things J., May, 2024

A trustworthy and reliable multi-keyword search in blockchain-assisted cloud-edge storage.
Peer Peer Netw. Appl., March, 2024

Variational Gaussian topic model with invertible neural projections.
Neural Comput. Appl., January, 2024

Privacy-Enhanced Frequent Sequence Mining and Retrieval for Personalized Behavior Prediction.
IEEE Trans. Inf. Forensics Secur., 2024

DCTM: Dual Contrastive Topic Model for identifiable topic extraction.
Inf. Process. Manag., 2024

Eight challenges in developing theory of intelligence.
Frontiers Comput. Neurosci., 2024

A multi-hierarchy particle swarm optimization-based algorithm for cloud workflow scheduling.
Future Gener. Comput. Syst., 2024

Bridging spherical mixture distributions and word semantic knowledge for Neural Topic Modeling.
Expert Syst. Appl., 2024

Spin glass model of in-context learning.
CoRR, 2024

Nonequilbrium physics of generative diffusion models.
CoRR, 2024

Fermi-Bose Machine.
CoRR, 2024

Enhanced Short Text Modeling: Leveraging Large Language Models for Topic Refinement.
CoRR, 2024

An optimization-based equilibrium measure describes non-equilibrium steady state dynamics: application to edge of chaos.
CoRR, 2024

Effective anti-submarine decision support system based on heuristic rank-based Dijkstra and adaptive threshold partitioning mechanism.
Appl. Soft Comput., 2024

2023
A Verifiable and Efficient Secure Sharing Scheme in Multiowner Multiuser Settings.
IEEE Syst. J., December, 2023

An IoT and machine learning enhanced framework for real-time digital human modeling and motion simulation.
Comput. Commun., December, 2023

Blockchain-Enabled Fine-Grained Searchable Encryption With Cloud-Edge Computing for Electronic Health Records Sharing.
IEEE Internet Things J., October, 2023

Edge-aided searchable data sharing scheme for IoV in the 5G environment.
J. Syst. Archit., March, 2023

Double Rainbows: A Promising Distributed Data Sharing in Augmented Intelligence of Things.
IEEE Trans. Ind. Informatics, 2023

Muti-channel graph attention networks for POI recommendation.
J. Intell. Fuzzy Syst., 2023

Spiking mode-based neural networks.
CoRR, 2023

Meta predictive learning model of languages in neural circuits.
CoRR, 2023

Introduction to dynamical mean-field theory of generic random neural networks.
CoRR, 2023

Latency-aware Partial Task Offloading in Collaborative Edge Computing.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

Energy-Constrained Task Scheduling in Heterogeneous Distributed Systems.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

2022
An Immunity Passport Scheme Based on the Dual-Blockchain Architecture for International Travel.
Wirel. Commun. Mob. Comput., 2022

An Adaptive Secure Handover Authenticated Key Agreement for Multi-Server Architecture Communication Applications.
IEEE Trans. Veh. Technol., 2022

A Cross-Domain Authentication Scheme Based on Cooperative Blockchains Functioning With Revocation for Medical Consortiums.
IEEE Trans. Netw. Serv. Manag., 2022

Stochastic Task Scheduling in UAV-Based Intelligent On-Demand Meal Delivery System.
IEEE Trans. Intell. Transp. Syst., 2022

A NSGA-II Algorithm for Task Scheduling in UAV-Enabled MEC System.
IEEE Trans. Intell. Transp. Syst., 2022

TRAC: Traceable and Revocable Access Control Scheme for mHealth in 5G-Enabled IIoT.
IEEE Trans. Ind. Informatics, 2022

Differential privacy protection scheme based on community density aggregation and matrix perturbation.
Inf. Sci., 2022

Secure, Efficient, and Weighted Access Control for Cloud-Assisted Industrial IoT.
IEEE Internet Things J., 2022

A weighted range-free localization algorithm for irregular multihop networks.
Int. J. Commun. Syst., 2022

Statistical mechanics of continual learning: variational principle and mean-field potential.
CoRR, 2022

Emergence of hierarchical modes from deep learning.
CoRR, 2022

Research on University Computer Education from the Perspective of Aesthetics.
Proceedings of the Computer Science and Education - 17th International Conference, 2022

Vehicular Computation Offloading in UAV-enabled MEC Systems.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

2021
Computer Vision-Assisted 3D Object Localization via COTS RFID Devices and a Monocular Camera.
IEEE Trans. Mob. Comput., 2021

An Efficient Signature Scheme Based on Mobile Edge Computing in the NDN-IoT Environment.
IEEE Trans. Comput. Soc. Syst., 2021

GT-Bidding: Group Trust Model of P2P Network Based on Bidding.
Secur. Commun. Networks, 2021

A Lightweight Three-Factor Authentication and Key Agreement Scheme for Multigateway WSNs in IoT.
Secur. Commun. Networks, 2021

Energy and delay-ware massive task scheduling in fog-cloud computing system.
Peer-to-Peer Netw. Appl., 2021

TA-BiLSTM: An Interpretable Topic-Aware Model for Misleading Information Detection in Mobile Social Networks.
Mob. Networks Appl., 2021

Computation-transferable authenticated key agreement protocol for smart healthcare.
J. Syst. Archit., 2021

Blockchain-assisted handover authentication for intelligent telehealth in multi-server edge computing environment.
J. Syst. Archit., 2021

Blockchain-based eHealth system for auditable EHRs manipulation in cloud environments.
J. Parallel Distributed Comput., 2021

An enhanced genetic algorithm for unmanned aerial vehicle logistics scheduling.
IET Commun., 2021

Ensemble perspective for understanding temporal credit assignment.
CoRR, 2021

Multi-objective optimization for fuzzy workflow scheduling.
Proceedings of the 2021 IEEE International Conference on Systems, Man, and Cybernetics, 2021

A Simulated Annealing Genetic Algorithm for Logistics Distribution Problem in Community Scenario.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

Ant Colony Optimization for UAV-based Intelligent Pesticide Irrigation System.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

ZSS Signature Based Data Integrity Verification for Mobile Edge Computing.
Proceedings of the 21st IEEE/ACM International Symposium on Cluster, 2021

2020
An Authentication Scheme Based on Novel Construction of Hash Chains for Smart Mobile Devices.
Wirel. Commun. Mob. Comput., 2020

Location Privacy-Preserving Method Based on Historical Proximity Location.
Wirel. Commun. Mob. Comput., 2020

Trajectory Optimization for UAVs' Efficient Charging in Wireless Rechargeable Sensor Networks.
IEEE Trans. Veh. Technol., 2020

Load Balance and Trajectory Design in Multi-UAV Aided Large-Scale Wireless Rechargeable Networks.
IEEE Trans. Veh. Technol., 2020

Multi-Variations Activity Based Gaits Recognition Using Commodity WiFi.
IEEE Trans. Veh. Technol., 2020

Tsarray: An Intelligent Access Control System Using Backscatter Communication.
IEEE Trans. Veh. Technol., 2020

Scheduling Periodical Multi-Stage Jobs With Fuzziness to Elastic Cloud Resources.
IEEE Trans. Parallel Distributed Syst., 2020

Privacy-Preserving Approach PBCN in Social Network With Differential Privacy.
IEEE Trans. Netw. Serv. Manag., 2020

An Improved Broadcast Authentication Protocol for Wireless Sensor Networks Based on the Self-Reinitializable Hash Chains.
Secur. Commun. Networks, 2020

Indoor static localization based on Fresnel zones model using COTS Wi-Fi.
J. Netw. Comput. Appl., 2020

Classification and recognition of encrypted EEG data based on neural network.
J. Inf. Secur. Appl., 2020

Adaptive and Extensible Energy Supply Mechanism for UAVs-Aided Wireless-Powered Internet of Things.
IEEE Internet Things J., 2020

A Blockchain-Based Trust Management With Conditional Privacy-Preserving Announcement Scheme for VANETs.
IEEE Internet Things J., 2020

RF-IDH: An intelligent fall detection system for hemodialysis patients via COTS RFID.
Future Gener. Comput. Syst., 2020

Data-driven effective model shows a liquid-like deep learning.
CoRR, 2020

Relationship between manifold smoothness and adversarial vulnerability in deep learning with local errors.
CoRR, 2020

Weakly-correlated synapses promote dimension reduction in deep neural networks.
CoRR, 2020

Classification and Recognition of Encrypted EEG Data Neural Network.
CoRR, 2020

Learning credit assignment.
CoRR, 2020

A blockchain-based scheme for privacy-preserving and secure sharing of medical data.
Comput. Secur., 2020

Generalized Intrusion Detection Mechanism for Empowered Intruders in Wireless Sensor Networks.
IEEE Access, 2020

HTAC: Fine-Grained Policy-Hiding and Traceable Access Control in mHealth.
IEEE Access, 2020

Multimodal Emotion Recognition Based on Ensemble Convolutional Neural Network.
IEEE Access, 2020

A Privacy-Preserving Multi-Keyword Ranked Search Over Encrypted Data in Hybrid Clouds.
IEEE Access, 2020

MOLEAS: a Multi-stage Online Learning Effectiveness Assessment Scheme in MOOC.
Proceedings of the IEEE International Conference on Teaching, 2020

An Energy-aware Greedy Heuristic for Multi-objective Optimization in Fog-Cloud Computing System.
Proceedings of the 2020 IEEE International Conference on Systems, Man, and Cybernetics, 2020

RF-Mirror: Mitigating Mutual Coupling Interference in Two-Tag Array Labeled RFID Systems.
Proceedings of the 17th Annual IEEE International Conference on Sensing, 2020

Energy-aware and Deadline-constrained Task Scheduling in Fog Computing Systems.
Proceedings of the 15th International Conference on Computer Science & Education, 2020

How Similar Are Smart Contracts on the Ethereum?
Proceedings of the Blockchain and Trustworthy Systems - Second International Conference, 2020

Delay-sensitive Trajectory Designing for UAV-enabled Data Collection in Internet of Things.
Proceedings of the ACM TUR-C'20: ACM Turing Celebration Conference, 2020

2019
Motion Path Reconstruction in Indoor Environment Using Commodity Wi-Fi.
IEEE Trans. Veh. Technol., 2019

Catching Escapers: A Detection Method for Advanced Persistent Escapers in Industry Internet of Things Based on Identity-based Broadcast Encryption (IBBE).
ACM Trans. Embed. Comput. Syst., 2019

Improved LDA Dimension Reduction Based Behavior Learning with Commodity WiFi for Cyber-Physical Systems.
ACM Trans. Cyber Phys. Syst., 2019

A Trajectory Privacy Preserving Scheme in the CANNQ Service for IoT.
Sensors, 2019

An Enhanced Virtual Force Algorithm for Diverse <i>k</i>-Coverage Deployment of 3D Underwater Wireless Sensor Networks.
Sensors, 2019

An EEG-Based Identity Authentication System with Audiovisual Paradigm in IoT.
Sensors, 2019

Privacy Protection of Social Networks Based on Classified Attribute Encryption.
Secur. Commun. Networks, 2019

Semantic-aware multi-keyword ranked search scheme over encrypted cloud data.
J. Netw. Comput. Appl., 2019

RF-Focus: Computer Vision-assisted Region-of-interest RFID Tag Recognition and Localization in Multipath-prevalent Environments.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019

How data, synapses and neurons interact with each other: a variational principle marrying gradient ascent and message passing.
CoRR, 2019

Statistical physics of unsupervised learning with prior knowledge in neural networks.
CoRR, 2019

A Type of Virtual Force based Energy-hole Mitigation Strategy for Sensor Networks.
CoRR, 2019

Minimal model of permutation symmetry in unsupervised learning.
CoRR, 2019

Data fusion-oriented cluster routing protocol for multimedia sensor networks based on the degree of image difference.
CCF Trans. Netw., 2019

Cryptanalysis and Improvement of an Anonymous Batch Verification Scheme for Mobile Healthcare Crowd Sensing.
IEEE Access, 2019

A Type of Energy-Balanced Tree Based Data Collection Strategy for Sensor Network With Mobile Sink.
IEEE Access, 2019

An Efficient and Dynamic Semantic-Aware Multikeyword Ranked Search Scheme Over Encrypted Cloud Data.
IEEE Access, 2019

Logistics Scheduling for UAV Based on Tabu Search Algorithm.
Proceedings of the 20th International Conference on Parallel and Distributed Computing, 2019

Multi-objective Scheduling of Logistics UAVs Based on Simulated Annealing.
Proceedings of the Parallel Architectures, Algorithms and Programming, 2019

A Simulated Annealing-based Heuristic for Logistics UAV Scheduling Problem.
Proceedings of the 14th International Conference on Computer Science & Education, 2019

Teaching Practice and Thinking of SPOC-Rain Classroom Based Flipped Classroom Model in the Network Technology and Application Course.
Proceedings of the 14th International Conference on Computer Science & Education, 2019

t/t-Diagnosability of BCube Network.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

t-Diagnosability and Conditional Diagnosability of BCube Networks.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

An Adaptive Heuristic for Scheduling Dynamic and Fuzzy Jobs on Elastic Clouds.
Proceedings of the Seventh International Conference on Advanced Cloud and Big Data, 2019

2018
social network simulation data set.
Dataset, December, 2018

Intrusion Detection Based on k-Coverage in Mobile Sensor Networks With Empowered Intruders.
IEEE Trans. Veh. Technol., 2018

An ID-based authentication scheme to achieve the security of smart card.
Int. J. Secur. Networks, 2018

Robust and Scalable Data Access Control in D2D Communications.
IEEE Access, 2018

Abnormal Item Detection Based on Time Window Merging for Recommender Systems.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Decoding ECoG Signal with Deep Learning Model Based on LSTM.
Proceedings of the TENCON 2018, 2018

Dynamic Idle Time Interval Scheduling for Hybrid Cloud Workflow Management System.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2018

A Trust-Based Prediction Approach for Recommendation System.
Proceedings of the Services - SERVICES 2018, 2018

Dynamic Multi-Server Searchable Encryption Scheme Based on Concept Hierarchy.
Proceedings of the 9th International Symposium on Parallel Architectures, 2018

RF-MVO: Simultaneous 3D Object Localization and Camera Trajectory Recovery Using RFID Devices and a 2D Monocular Camera.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

Emotion recognition of human physiological signals based on recursive quantitative analysis.
Proceedings of the Tenth International Conference on Advanced Computational Intelligence, 2018

Speech emotion features selection based on BBO-SVM.
Proceedings of the Tenth International Conference on Advanced Computational Intelligence, 2018

2017
Private and Secured Medical Data Transmission and Analysis for Wireless Sensing Healthcare System.
IEEE Trans. Ind. Informatics, 2017

Node Scheduling Strategies for Achieving Full-View Area Coverage in Camera Sensor Networks.
Sensors, 2017

Quality-Aware Incentive Mechanism for Mobile Crowd Sensing.
J. Sensors, 2017

Efficient Location Privacy-Preserving <i>k</i>-Anonymity Method Based on the Credible Chain.
ISPRS Int. J. Geo Inf., 2017

Mean-field theory of input dimensionality reduction in unsupervised deep neural networks.
CoRR, 2017

Reinforced backpropagation improves test performance of deep networks: a toy-model study.
CoRR, 2017

Redundancy in active paths of deep networks: a random active path model.
CoRR, 2017

The role of zero synapses in unsupervised feature learning.
CoRR, 2017

AGSA: Anti-similarity Group Shilling Attacks.
Proceedings of the Parallel Architecture, Algorithm and Programming, 2017

Energy-Efficient Routing Protocol Based on Probability in DTSN.
Proceedings of the Wireless Sensor Networks, 2017

2016
An Improved <i>μ</i>TESLA Protocol Based on Queuing Theory and Benaloh-Leichter SSS in WSNs.
J. Sensors, 2016

Routing Algorithm and Traffic Light Control based on Vehicular Delay-Tolerant Networks.
J. Commun., 2016

Unsupervised feature learning from finite data by message passing: discontinuous versus continuous phase transition.
CoRR, 2016

Statistical mechanics of unsupervised feature learning in a restricted Boltzmann machine with binary synapses.
CoRR, 2016

A data collection approach based on mobile sinks for heterogeneous sensor networks.
Proceedings of the 8th International Conference on Wireless Communications & Signal Processing, 2016

A Multi-keyword Multi-user Searchable Encryption Scheme Based on Cloud Storage.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Research on practice and incentive mechanism of flipped classroom based on small private online course.
Proceedings of the 11th International Conference on Computer Science & Education, 2016

A smart home control system based on indoor location and attitude estimation.
Proceedings of the International Conference on Computer, 2016

2015
基于节点间信任评估算法的无线传感器网络密钥管理方案 (Key Management Scheme of Wireless Sensor Network Based on Trust Evaluation Algorithm between Nodes).
计算机科学, 2015

Parking Query in Vehicular Delay-Tolerant Networks with Privacy Protection Based on Secure Multiparty Computation.
J. Sensors, 2015

Efficient Verifiable Top-k Queries in Two-tiered Wireless Sensor Networks.
KSII Trans. Internet Inf. Syst., 2015

Secure Two-Party Distance Computation Protocols with a Semihonest Third Party and Randomization for Privacy Protection in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

Advanced Mean Field Theory of Restricted Boltzmann Machine.
CoRR, 2015

A Medical Healthcare System for Privacy Protection Based on IoT.
Proceedings of the Seventh International Symposium on Parallel Architectures, 2015

A Secure Routing Mechanism against Wormhole Attack in IPv6-Based Wireless Sensor Networks.
Proceedings of the Seventh International Symposium on Parallel Architectures, 2015

2014
Improving Path-Coverage for Moving Targets in Wireless Multimedia Sensor Networks.
J. Commun., 2014

Redundancy Model and Boundary Effects Based Coverage-Enhancing Algorithm for 3D Underwater Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

An Exact Top-k Query Algorithm with Privacy Protection in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

An image information hiding algorithm based on grey system theory.
Int. J. Commun. Syst., 2014

Origin of the computational hardness for learning with binary synapses.
CoRR, 2014

Code optimization, frozen glassy phase and improved decoding algorithms for low-density parity-check codes.
CoRR, 2014

A QoS-aware routing algorithm based on ant-cluster in wireless multimedia sensor networks.
Sci. China Inf. Sci., 2014

2013
A Type of Node Deployment Strategy Based on Variable Acceleration Motion for Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

Weight-Based Clustering Decision Fusion Algorithm for Distributed Target Detection in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

Research on Migration Strategy of Mobile Agent in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

Entropy landscape of solutions in the binary perceptron problem
CoRR, 2013

2012
Secure Query in Wireless Sensor Network Using Underground Parties.
J. Networks, 2012

(t, n) Secret Sharing Scheme Based on Cylinder Model in Wireless Sensor Networks.
J. Networks, 2012

Novel Node Localization Algorithm Based on Nonlinear Weighting Least Square for Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2012

A Novel Coverage Enhancement Algorithm for Image Sensor Networks.
Int. J. Distributed Sens. Networks, 2012

Improved Virtual Potential Field Algorithm Based on Probability Model in Three-Dimensional Directional Sensor Networks.
Int. J. Distributed Sens. Networks, 2012

Probability Model Based Coverage-Enhancing Algorithm for WSNs of Nodes' Adjustable Movement Pattern.
Int. J. Distributed Sens. Networks, 2012

Mobile Agent Based Coding Aware Multipath Routing for Wireless Sensor Network.
Proceedings of the Advances in Wireless Sensor Networks, 2012

A Novel Clustering Ant-Based QoS-aware Routing Algorithm in Large Scale Wireless Multimedia Sensor Networks.
Proceedings of the 2012 IEEE International Conference on Cluster Computing Workshops, 2012

2011
Counting solutions from finite samplings
CoRR, 2011

Combined local search strategy for learning in networks of binary synapses
CoRR, 2011

An Anti-collusion Trust Model in P2P Networks.
Proceedings of the Web Information Systems and Mining - International Conference, 2011

2010
Agent-Oriented Architecture for Ubiquitous Computing in Smart Hyperspace.
Wirel. Sens. Netw., 2010

Coverage-Guaranteed Sensor Node Deployment Strategies for Wireless Sensor Networks.
Sensors, 2010

An energy-saving strategy based on sleep scheduling and block transmission for wireless multimedia sensor networks.
Int. J. Pervasive Comput. Commun., 2010

Learning by random walks in the weight space of the Ising perceptron
CoRR, 2010

TANSO: A componentized distributed service foundation in cloud environment.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium, 2010

2009
Voronoi-Based Coverage Optimization for Directional Sensor Networks.
Wirel. Sens. Netw., 2009

The cavity approach to the Sourlas code system
CoRR, 2009

2004
Multi-Mobile Agents' Separation Scheme in Java Card Application for Mobile Agent's Security.
Proceedings of the 2004 IEEE International Conference on Services Computing (SCC 2004), 2004


  Loading...