Hui Lin

Orcid: 0000-0003-1716-1399

Affiliations:
  • Fujian Normal University, College of Mathematics and Informatics, China
  • Xidian University, College of Computer Science, China (PhD 2013)


According to our database1, Hui Lin authored at least 72 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Fed-PEMC: A Privacy-Enhanced Federated Deep Learning Algorithm for Consumer Electronics in Mobile Edge Computing.
IEEE Trans. Consumer Electron., February, 2024

A dynamic state sharding blockchain architecture for scalable and secure crowdsourcing systems.
J. Netw. Comput. Appl., February, 2024

A multi-modal spatial-temporal model for accurate motion forecasting with visual fusion.
Inf. Fusion, February, 2024

Fed-MPS: Federated learning with local differential privacy using model parameter selection for resource-constrained CPS.
J. Syst. Archit., 2024

Reliable trajectory prediction in scene fusion based on spatio-temporal Structure Causal Model.
Inf. Fusion, 2024

A crowdsourcing logistics solution based on digital twin and four-party evolutionary game.
Eng. Appl. Artif. Intell., 2024

2023
Federated Learning-Empowered Disease Diagnosis Mechanism in the Internet of Medical Things: From the Privacy-Preservation Perspective.
IEEE Trans. Ind. Informatics, July, 2023

Communication-Efficient Personalized Federated Meta-Learning in Edge Networks.
IEEE Trans. Netw. Serv. Manag., June, 2023

AI-Empowered Trajectory Anomaly Detection for Intelligent Transportation Systems: A Hierarchical Federated Learning Approach.
IEEE Trans. Intell. Transp. Syst., April, 2023

A Privacy-Enhanced Multiarea Task Allocation Strategy for Healthcare 4.0.
IEEE Trans. Ind. Informatics, March, 2023

Heterogeneous Blockchain and AI-Driven Hierarchical Trust Evaluation for 5G-Enabled Intelligent Transportation Systems.
IEEE Trans. Intell. Transp. Syst., February, 2023

Intelligent Anomaly Detection of Trajectories for IoT Empowered Maritime Transportation Systems.
IEEE Trans. Intell. Transp. Syst., February, 2023

D2MIF: A Malicious Model Detection Mechanism for Federated-Learning-Empowered Artificial Intelligence of Things.
IEEE Internet Things J., February, 2023

Privacy-Aware Access Control in IoT-Enabled Healthcare: A Federated Deep Learning Approach.
IEEE Internet Things J., February, 2023

Spatiotemporal Prediction Based Intelligent Task Allocation for Secure Spatial Crowdsourcing in Industrial IoT.
IEEE Trans. Netw. Sci. Eng., 2023

Big Data Assisted Object Detection with Privacy Protection.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

IHFBF: A High-Performance Blockchain Framework for Improving Hyperledger Fabric Permissioned Chain.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

A Graph Generation Network with Privacy Preserving Capabilities.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023

Efficient and Reliable Federated Recommendation System in Temporal Scenarios.
Proceedings of the Green, Pervasive, and Cloud Computing - 18th International Conference, 2023

Empowering Intelligent Home Safety: Indoor Family Fall Detection with YOLOv5.
Proceedings of the IEEE Intl Conf on Dependable, 2023

A Novel Fast Video Fragment Matching Algorithm for Copyright Protection.
Proceedings of the IEEE Intl Conf on Dependable, 2023

2022
An Energy-efficient And Trustworthy Unsupervised Anomaly Detection Framework (EATU) for IIoT.
ACM Trans. Sens. Networks, November, 2022

QoS and Privacy-Aware Routing for 5G-Enabled Industrial Internet of Things: A Federated Reinforcement Learning Approach.
IEEE Trans. Ind. Informatics, 2022

Byzantine-Robust and Efficient Federated Learning for the Internet of Things.
IEEE Internet Things Mag., 2022

A Secure Data Aggregation Strategy in Edge Computing and Blockchain-Empowered Internet of Things.
IEEE Internet Things J., 2022

Toward Accurate Anomaly Detection in Industrial Internet of Things Using Hierarchical Federated Learning.
IEEE Internet Things J., 2022

Data fusion and transfer learning empowered granular trust evaluation for Internet of Things.
Inf. Fusion, 2022

An intelligent and privacy-enhanced data sharing strategy for blockchain-empowered Internet of Things.
Digit. Commun. Networks, 2022

Blockchain-empowered secure federated learning system: Architecture and applications.
Comput. Commun., 2022

2021
Intelligent Drone-Assisted Fault Diagnosis for B5G-Enabled Space-Air-Ground-Space Networks.
IEEE Trans. Netw. Sci. Eng., 2021

Blockchain and Deep Reinforcement Learning Empowered Spatial Crowdsourcing in Software-Defined Internet of Vehicles.
IEEE Trans. Intell. Transp. Syst., 2021

Enabling Secure Authentication in Industrial IoT With Transfer Learning Empowered Blockchain.
IEEE Trans. Ind. Informatics, 2021

Toward Secure Data Fusion in Industrial IoT Using Transfer Learning.
IEEE Trans. Ind. Informatics, 2021

A Blockchain-Based Secure Data Aggregation Strategy Using Sixth Generation Enabled Network-in-Box for Industrial Applications.
IEEE Trans. Ind. Informatics, 2021

PPCS: An Intelligent Privacy-Preserving Mobile-Edge Crowdsensing Strategy for Industrial IoT.
IEEE Internet Things J., 2021

Privacy-Enhanced Data Fusion for COVID-19 Applications in Intelligent Internet of Medical Things.
IEEE Internet Things J., 2021

An Intelligent UAV based Data Aggregation Algorithm for 5G-enabled Internet of Things.
Comput. Networks, 2021

Federated deep reinforcement learning based secure data sharing for Internet of Things.
Comput. Networks, 2021

A Privacy-Enhanced Mobile Crowdsensing Strategy for Blockchain Empowered Internet of Medical Things.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Blockchain-based Access Control Model to Preserve Privacy for Students' Credit Information.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

A Novel Cross-domain Access Control Protocol in Mobile Edge Computing.
Proceedings of the IEEE Global Communications Conference, 2021

2020
Secure limitation analysis of public-key cryptography for smart card settings.
World Wide Web, 2020

Deep-Reinforcement-Learning-Based QoS-Aware Secure Routing for SDN-IoT.
IEEE Internet Things J., 2020

A new data clustering strategy for enhancing mutual privacy in healthcare IoT systems.
Future Gener. Comput. Syst., 2020

Learning-Based IoT Data Aggregation for Disaster Scenarios.
IEEE Access, 2020

A Data Security Enhanced Access Control Mechanism in Mobile Edge Computing.
IEEE Access, 2020

An intelligent UAV based data aggregation strategy for IoT after disaster scenarios.
Proceedings of the DroneCom '20: Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond, 2020

A cross-blockchain based distributed crowdsouring system for Internet of Things.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020

Multi-layer Access Control Mechanism based on Blockchain for Mobile Edge Computing.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020

2019
An SDNFV-Based DDoS Defense Technology for Smart Cities.
IEEE Access, 2019

Towards Attack and Defense Views of Rational Delegation of Computation.
IEEE Access, 2019

2018
DTCS: An Integrated Strategy for Enhancing Data Trustworthiness in Mobile Crowdsourcing.
IEEE Internet Things J., 2018

DTRM: A new reputation mechanism to enhance data trustworthiness for high-performance cloud computing.
Future Gener. Comput. Syst., 2018

2017
Toward better data veracity in mobile cloud computing: A context-aware and incentive-based reputation mechanism.
Inf. Sci., 2017

A trustworthy and energy-aware routing protocol in software-defined wireless mesh networks.
Comput. Electr. Eng., 2017

A Secure Collaborative Spectrum Sensing Strategy in Cyber-Physical Systems.
IEEE Access, 2017

A Data Trustworthiness Enhanced Reputation Mechanism for Mobile Crowd Sensing.
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017

2016
A Secure Collaborative Spectrum Sensing Strategy in Cyber-Physical Systems.
Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2016

2015
Secure Cooperative Spectrum Sensing and Allocation in Distributed Cognitive Radio Networks.
Int. J. Distributed Sens. Networks, 2015

A reliable recommendation and privacy-preserving based cross-layer reputation mechanism for mobile cloud computing.
Future Gener. Comput. Syst., 2015

CRM: A New Dynamic Cross-Layer Reputation Computation Model in Wireless Networks.
Comput. J., 2015

A trustworthy access control model for mobile cloud computing based on reputation and mechanism design.
Ad Hoc Networks, 2015

An AGV Mechanism Based Secure Routing Protocol for Internet of Things.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

A Context Aware Reputation Mechanism for Enhancing Big Data Veracity in Mobile Cloud Computing.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

A Secure Cooperative Spectrum Sensing Strategy for Distributed Cognitive Radio Networks.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
A Role Based Privacy-Aware Secure Routing Protocol for Wireless Mesh Networks.
Wirel. Pers. Commun., 2014

A CDS-Based Network Coding Scheme in Wireless Sensor Converge-Cast Networks.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

Energy-Aware Secure Routing for Hybrid Wireless Mesh Networks.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

2013
A Dynamic and Multi-layer Reputation Computation Model for Multi-hop Wireless Networks.
Proceedings of the Network and System Security - 7th International Conference, 2013

2012
PA-SHWMP: a privacy-aware secure hybrid wireless mesh protocol for IEEE 802.11s wireless mesh networks.
EURASIP J. Wirel. Commun. Netw., 2012

Role Based Privacy-Aware Secure Routing in WMNs.
Proceedings of the 11th IEEE International Conference on Trust, 2012

2008
A New Security Mechanism Based on SIP in Wireless LAN-3G Integration.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008


  Loading...