Hong Lei

Orcid: 0000-0002-6564-1568

According to our database1, Hong Lei authored at least 67 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Traceable ring signature schemes based on SM2 digital signature algorithm and its applications in the data sharing scheme.
Frontiers Comput. Sci., April, 2024

Quantum sealed-bid auction protocol with post-confirmation based on blind signature.
Quantum Inf. Process., March, 2024

DeCloak: Enable Secure and Cheap Multi-Party Transactions on Legacy Blockchains by a Minimally Trusted TEE Network.
IEEE Trans. Inf. Forensics Secur., 2024

Proof of Finalization: A Self-Fulfilling Function of Blockchain.
IEEE Trans. Inf. Forensics Secur., 2024

Verifiable Random Function Schemes Based on SM2 Digital Signature Algorithm and its Applications for Committee Elections.
IEEE Open J. Comput. Soc., 2024

PACTA: An IoT Data Privacy Regulation Compliance Scheme Using TEE and Blockchain.
IEEE Internet Things J., 2024

One IOTA of Countless Legions: A Next-Generation Botnet Premises Design Substrated on Blockchain and Internet of Things.
IEEE Internet Things J., 2024

The Influence of Department Stores' Price Promotion Strategy Toward Consumers' Repurchase Intentions: A Moderation Model of Perceived Risks.
Int. J. Asian Bus. Inf. Manag., 2024

TEEm: Supporting Large Memory for Trusted Applications in ARM TrustZone.
IEEE Access, 2024

Exploring Designer-Generative AI Collaborative Personas: A Case Study on ChatGPT.
Proceedings of the 17th International Symposium on Visual Information Communication and Interaction, 2024

2023
Iterative Training Attack: A Black-Box Adversarial Attack via Perturbation Generative Network.
J. Circuits Syst. Comput., December, 2023

An Improved Calculation Method of Coil Offset on the Large-Caliber Magnetic Field Immunity Testing System for ITER.
IEEE Trans. Ind. Electron., September, 2023

OWL: A data sharing scheme with controllable anonymity and integrity for group users.
Comput. Commun., September, 2023

Semantic Segmentation of Remote Sensing Imagery Based on Multiscale Deformable CNN and DenseCRF.
Remote. Sens., March, 2023

Query-Efficient Generation of Adversarial Examples for Defensive DNNs via Multiobjective Optimization.
IEEE Trans. Evol. Comput., 2023

Enveloping grasp planning of a three-fingered deployable metamorphic robotic grasper.
Proceedings of the IEEE International Conference on Cyborg and Bionic Systems, 2023

SrNFT: Simple Restricted Non-Fungible Token Framework for Transactions With Risk Detection.
Proceedings of the IEEE International Conference on Blockchain, 2023

A cross-chain identity authentication scheme based on DID.
Proceedings of the IEEE International Conference on Blockchain, 2023

2022
SorTEE: Service-Oriented Routing for Payment Channel Networks With Scalability and Privacy Protection.
IEEE Trans. Netw. Serv. Manag., December, 2022

Pilot Study for Correlation of Heart Rate Variability and Dopamine Transporter Brain Imaging in Patients with Parkinsonian Syndrome.
Sensors, 2022

Remote Sensing Scene Image Classification Based on mmsCNN-HMM with Stacking Ensemble Model.
Remote. Sens., 2022

Wideband DOA Estimation Based on Deep Residual Learning With Lyapunov Stability Analysis.
IEEE Geosci. Remote. Sens. Lett., 2022

Optimal coil configuration analysis for the high-uniformity and large-caliber magnetic field immunity testing system.
J. Ind. Inf. Integr., 2022

Correction to: Active sensing in a dynamic olfactory world.
J. Comput. Neurosci., 2022

Active sensing in a dynamic olfactory world.
J. Comput. Neurosci., 2022

Understanding digit-only financial account passwords: ID card, structure, and security.
Int. J. Intell. Syst., 2022

TENET: Towards Self-sovereign and Fair Multi-party Computation Ecology Empowered by Decentralized TEE Network.
CoRR, 2022

DLD: An Optimized Chinese Speech Recognition Model Based on Deep Learning.
Complex., 2022

Traceable Ring Signature Schemes Based on SM2 Digital Signature Algorithm and Its Applications in the Evidence-Storage System.
Proceedings of the Blockchain and Trustworthy Systems - 4th International Conference, 2022

A Survey on Safety Regulation Technology of Blockchain Application and Blockchain Ecology.
Proceedings of the IEEE International Conference on Blockchain, 2022

Decentralized and Self-Sovereign Identity in the Era of Blockchain: A Survey.
Proceedings of the IEEE International Conference on Blockchain, 2022

Cloak: Transitioning States on Legacy Blockchains Using Secure and Publicly Verifiable Off-Chain Multi-Party Computation.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Multiscale Convolutional Neural Networks for Geospatial Object Detection in VHR Satellite Images.
IEEE Geosci. Remote. Sens. Lett., 2021

Solving Logistics Distribution Center Location with Improved Cuckoo Search Algorithm.
Int. J. Comput. Intell. Syst., 2021

CLOAK: Towards Practical Development and Deployment of Confidential Smart Contracts.
CoRR, 2021

CLOAK: A Framework For Development of Confidential Blockchain Smart Contracts.
CoRR, 2021

BLOCKEYE: Hunting for DeFi Attacks on Blockchain.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering: Companion Proceedings, 2021

Demo: Cloak: A Framework For Development of Confidential Blockchain Smart Contracts.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

A physically realizable backdoor attack on 3D point cloud deep learning: work-in-progress.
Proceedings of the CODES/ISSS 2021, 2021

2020
The Failure Case of Phase Transition for Penalized Problems in Corrupted Sensing.
IEEE Signal Process. Lett., 2020

A-CRNN-Based Method for Coherent DOA Estimation with Unknown Source Number.
Sensors, 2020

When Blockchain Meets SGX: An Overview, Challenges, and Open Issues.
IEEE Access, 2020

A Design of 16TOPS Efficient GEMM Module in Deep Learning Accelerator.
Proceedings of the 2020 IEEE International Conference on Integrated Circuits, 2020

SDSBT: A Secure Multi-party Data Sharing Platform Based on Blockchain and TEE.
Proceedings of the Cyberspace Safety and Security - 12th International Symposium, 2020

A Survey on the Application of SGX in Blockchain Area.
Proceedings of the Blockchain and Trustworthy Systems - Second International Conference, 2020

SDABS: A Secure Cloud Data Auditing Scheme Based on Blockchain and SGX.
Proceedings of the Blockchain and Trustworthy Systems - Second International Conference, 2020

2019
Localization From Incomplete Euclidean Distance Matrix: Performance Analysis for the SVD-MDS Approach.
IEEE Trans. Signal Process., 2019

Geospatial Object Detection In Remote Sensing Images Based On Multi-Scale Convolutional Neural Networks.
Proceedings of the 2019 IEEE International Geoscience and Remote Sensing Symposium, 2019

2018
Phase Transition of Convex Programs for Linear Inverse Problems with Multiple Prior Constraints.
CoRR, 2018

2017
On the phase transition of corrupted sensing.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

2016
Optimum Design of Artificial Lateral Line Systems for Object Tracking under Uncertain Conditions.
Proceedings of the Genetic and Evolutionary Computation Conference, 2016

2015
Vehicle Layover Removal in Circular SAR Images via ROSL.
IEEE Geosci. Remote. Sens. Lett., 2015

Synthetic aperture radar image despeckling via total generalised variation approach.
IET Image Process., 2015

Design optimization of artificial lateral line system under uncertain conditions.
Proceedings of the IEEE Congress on Evolutionary Computation, 2015

2014
Speckle Reduction via Higher Order Total Variation Approach.
IEEE Trans. Image Process., 2014

SAR Image Despeckling Using Data-Driven Tight Frame.
IEEE Geosci. Remote. Sens. Lett., 2014

Single-image super-resolution with total generalised variation and Shearlet regularisations.
IET Image Process., 2014

2012
Performance analysis of ℓ1-synthesis with coherent frames.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

2011
Simulation and Experimental on Valve-less Piezoelectric Pump with Hackle Chamber.
Proceedings of the Second International Conference on Digital Manufacturing and Automation, 2011

Theoretical analysis and experimental varification on valve-less piezoelectric pump with zigzag chamber bottom.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

2010
A study of spaceborne SAR raw data compression error based on a statistical model of quantization interval transfer probability.
Sci. China Inf. Sci., 2010

2009
Security Analysis of the SASI Protocol.
IEEE Trans. Dependable Secur. Comput., 2009

A Method of Robust Stabilization for the Delay Neural Networks with Nonlinear Perturbations.
Proceedings of the 2009 Third International Conference on Genetic and Evolutionary Computing, 2009

2008
A Simple Global Calibration Method Based on 1D Target for Multi-binocular Vision Sensor.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008

Aircraft Wing-Tip Corona Magnitude Model and Computer Simulation in Atmospheric Electric Field.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
Cryptanalysis of SPA Protocol.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007

2001
Teaching English Modal Verbs with Cognitive Flexibility Hypertext.
Proceedings of WebNet 2001, 2001


  Loading...