Huang Zhang

Orcid: 0009-0004-4587-8287

According to our database1, Huang Zhang authored at least 34 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Enhancement, integration, expansion: Activating representation of detailed features for occluded person re-identification.
Neural Networks, January, 2024

PCTN: Point cloud data transformation network.
Displays, January, 2024

PointGT: A Method for Point-Cloud Classification and Segmentation Based on Local Geometric Transformation.
IEEE Trans. Multim., 2024

Deformation depth decoupling network for point cloud domain adaptation.
Neural Networks, 2024

SAPCNet: symmetry-aware point cloud completion network.
J. Electronic Imaging, 2024

Self-Bilinear Map from One Way Encoding System and i𝒪.
Inf., 2024

Occluded person re-identification with deep learning: A survey and perspectives.
Expert Syst. Appl., 2024

Scenario-Aware Machine Learning Pipeline for Battery Lifetime Prediction.
Proceedings of the European Control Conference, 2024

2023
Beyond model splitting: Preventing label inference attacks in vertical federated learning with dispersed training.
World Wide Web (WWW), September, 2023

Deep learning-based 3D point cloud classification: A systematic survey and outlook.
Displays, September, 2023

Battery Capacity Knee Identification Using Unsupervised Time Series Segmentation.
CoRR, 2023

Longitudinal Control of Vehicle Platoon Based on Sliding Mode Algorithm.
Proceedings of the 2023 3rd International Conference on Robotics and Control Engineering, 2023

Leverage Generative Adversarial Network for Enhancing Fairness and Utility.
Proceedings of the International Conference on Networking and Network Applications, 2023

Online Privacy Preservation for Camera-Incremental Person Re-Identification.
Proceedings of the ECAI 2023 - 26th European Conference on Artificial Intelligence, September 30 - October 4, 2023, Kraków, Poland, 2023

2022
Enterprise Financial Risk Early Warning Using BP Neural Network Under Internet of Things and Rough Set Theory.
J. Interconnect. Networks, 2022

Interpretable Battery Cycle Life Range Prediction Using Early Degradation Data at Cell Level.
CoRR, 2022

2021
Identity Based Linkable Ring Signature with Logarithmic Size.
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021

2020
Implementing confidential transactions with lattice techniques.
IET Inf. Secur., 2020

Multi-Physical Coupling Field Study of 500 kV GIL: Simulation, Characteristics, and Analysis.
IEEE Access, 2020

2019
Efficient obfuscation for CNF circuits and applications in cloud computing.
Soft Comput., 2019

A rejection sampling algorithm for off-centered discrete Gaussian distributions over the integers.
Sci. China Inf. Sci., 2019

An Efficient Signature Scheme From Supersingular Elliptic Curve Isogenies.
IEEE Access, 2019

Visual Symbol Attention and Cross-Cultural Communication - A Case Study of Catering Commercial Graphic Advertising.
Proceedings of the Cross-Cultural Design. Methods, Tools and User Experience, 2019

Research on Visual Management of State Key Laboratory Environment.
Proceedings of the HCI in Business, Government and Organizations. Information Systems and Analytics, 2019

2017
Anonymous Post-Quantum Cryptocash.
IACR Cryptol. ePrint Arch., 2017

A data center model for testing control and optimization algorithms.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017

Implementing Indistinguishability Obfuscation Using GGH15.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

2016
Infrared Image Recognition of Bushing Type Cable Terminal Based on Radon and Fourier-Mellin Transform and BP Neural Network.
Proceedings of the Fuzzy Systems and Data Mining II, 2016

2015
Self-bilinear Map from One Way Encoding System and Indistinguishability Obfuscation.
IACR Cryptol. ePrint Arch., 2015

On the Resistance of Prime-variable Rotation Symmetric Boolean Functions against Fast Algebraic Attacks.
IACR Cryptol. ePrint Arch., 2015

On the (Fast) Algebraic Immunity of Boolean Power Functions.
IACR Cryptol. ePrint Arch., 2015

2014
Identity Based Threshold Ring Signature from Lattices.
Proceedings of the Network and System Security - 8th International Conference, 2014

2013
Spotted tongue recognition via cascade filtering.
Proceedings of the 6th International Conference on Biomedical Engineering and Informatics, 2013

2012
Geometrically Invariant Image Blind Watermarking Based on Speeded-Up Robust Features and DCT Transform.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012


  Loading...