Huamin Feng
Orcid: 0000-0003-4893-7540
According to our database1,
Huamin Feng
authored at least 53 papers
between 2002 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Comput. Secur., 2025
2024
IEEE Trans. Pattern Anal. Mach. Intell., October, 2024
IEEE Trans. Knowl. Data Eng., September, 2024
SecureFIA: Secure Federated Image Authentication Intelligent System for Smart Cities.
IEEE Trans. Consumer Electron., August, 2024
QBIoV: a secure data sharing scheme for the Internet of vehicles based on quantum-enabled blockchain.
Quantum Inf. Process., June, 2024
Double Issuer-Hiding Attribute-Based Credentials From Tag-Based Aggregatable Mercurial Signatures.
IEEE Trans. Dependable Secur. Comput., 2024
Key space estimation and security analysis of superlattice physical unclonable function.
Microelectron. J., 2024
J. Syst. Archit., 2024
Proceedings of the ACM on Web Conference 2024, 2024
TiGNet: Joint entity and relation triplets extraction for APT campaign threat intelligence.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
2023
An orderly quantum multi-signature based on orthogonal product states for the multi-party transaction blockchain.
Quantum Inf. Process., November, 2023
J. Syst. Archit., October, 2023
SED-SGC: A scalable, efficient, and distributed secure group communication scheme based on superlattice PUF.
Comput. Networks, September, 2023
Frontiers Comput. Sci., August, 2023
Peer Peer Netw. Appl., May, 2023
IEEE Trans. Serv. Comput., 2023
Lossless Reversible Data Hiding in Encrypted Image for Multiple Data Hiders Based on Pixel Value Order and Secret Sharing.
Sensors, 2023
A Secure Secret Key Agreement Scheme among Multiple Twinning Superlattice PUF Holders.
Sensors, 2023
Proceedings of the ACM Web Conference 2023, 2023
Proceedings of the Sixteenth ACM International Conference on Web Search and Data Mining, 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
FineCTI: A Framework for Mining Fine-grained Cyber Threat Information from Twitter Using NER Model.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
2022
IEEE Trans. Pattern Anal. Mach. Intell., 2022
Chaotic analysis and entropy estimation of the entropy source based on semiconductor superlattice chaos.
Microelectron. J., 2022
Cybersecur., 2022
Spear Phishing Email Detection with Multiple Reputation Features and Sample Enhancement.
Proceedings of the Science of Cyber Security - 4th International Conference, 2022
TI-Prompt: Towards a Prompt Tuning Method for Few-shot Threat Intelligence Twitter Classification<sup>*</sup>.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022
2021
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021
2020
Reversible Watermarking in Deep Convolutional Neural Networks for Integrity Authentication.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020
2017
Proceedings of the Data Science, 2017
2015
基于CPK的虚拟桌面系统认证方法研究 (Research on Virtual Desktop System Authentication Method Based on CPK).
计算机科学, 2015
2011
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
2007
A Question Understanding Model Based on Knowledge Points for Chinese Question Answering Service in E-Learning.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007
Proceedings of the Computational Science, 2007
A Novel Description of Multifractal Phenomenon of Network Traffic Based on Generalized Cauchy Process.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007
2006
Proceedings of the Advances in Multimedia Information Processing, 2006
Chaotically Masking Traffic Pattern to Prevent Traffic Pattern Analysis Attacks for Mission Critical Applications in Computer Communication Networks.
Proceedings of the Advances in Natural Computation, Second International Conference, 2006
2005
Proceedings of the 7th ACM SIGMM International Workshop on Multimedia Information Retrieval, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
2004
Proceedings of the 10th International Multimedia Modeling Conference (MMM 2004), 2004
Proceedings of the 12th ACM International Conference on Multimedia, 2004
An Adaptive Image Content Representation and Segmentation Approach to Automatic Image Annotation.
Proceedings of the Image and Video Retrieval: Third International Conference, 2004
2003
Proceedings of the 2003 TREC Video Retrieval Evaluation, 2003
ATMRA: An Automatic Temporal Multi-resolution Analysis Framework for Shot Boundary Detection.
Proceedings of the 9th International Conference on Multi-Media Modeling, 2003
Proceedings of the 5th ACM SIGMM International Workshop on Multimedia Information Retrieval, 2003
Proceedings of the 2003 IEEE International Conference on Acoustics, 2003
2002
Temporal Multi-Resolution Framework for Shot Boundary Detection and Keyframe Extraction.
Proceedings of The Eleventh Text REtrieval Conference, 2002