Huiping Sun

According to our database1, Huiping Sun authored at least 38 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
CFAuditChain: Audit BlockChain Based On Cuckoo Filter.
Comput. J., 2024

2022
DPLogChain: A Dynamic Packaging LogChain based on Random Witness.
Proceedings of the IEEE International Conference on Communications, 2022

ESUM: an efficient UTXO schedule model.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2022

2021
Risk-averse flexible policy on ambulance allocation in humanitarian operations under uncertainty.
Int. J. Prod. Res., 2021

OverlapShard: Overlap-based Sharding Mechanism.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

Associated Lattice-BERT for Spoken Language Understanding.
Proceedings of the Neural Information Processing - 28th International Conference, 2021

2020
HoneyHash: Honeyword Generation Based on Transformed Hashes.
Proceedings of the Secure IT Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, 2020

PassPage: Graphical Password Authentication Scheme Based on Web Browsing Records.
Proceedings of the Financial Cryptography and Data Security, 2020

2018
A Method for Partner Selection of Supply Chain Using Interval-Valued Fuzzy Sets - Fuzzy Choquet Integral and Improved Dempster-Shafer Theory.
Int. J. Inf. Technol. Decis. Mak., 2018

2015
Location Semantics Protection Based on Bayesian Inference.
Proceedings of the Web-Age Information Management - 16th International Conference, 2015

PassApp: My App is My Password!
Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2015

Access Control Model Based on Trust and Risk Evaluation in IDMaaS.
Proceedings of the 12th International Conference on Information Technology, 2015

Accelerating RSA with Fine-Grained Parallelism Using GPU.
Proceedings of the Information Security Practice and Experience, 2015

2014
Cache-Aware Query Processing with User Privacy Protection in Location-Based Services.
Proceedings of the Web-Age Information Management, 2014

Privacy Protection against Query Prediction in Location-Based Services.
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014

2013
Authenticating Users of Recommender Systems Using Naive Bayes.
Proceedings of the Web Information Systems Engineering - WISE 2013, 2013

A Hybrid Approach for Privacy Preservation in Location Based Queries.
Proceedings of the Web-Age Information Management, 2013

CQArank: jointly model topics and expertise in community question answering.
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013

Color Transfer Based on Earth Mover's Distance and Color Categorization.
Proceedings of the Computer Analysis of Images and Patterns, 2013

An Efficient Privacy-Preserving RFID Ownership Transfer Protocol.
Proceedings of the Web Technologies and Applications - 15th Asia-Pacific Web Conference, 2013

2012
A RFID Path-Checking Protocol Based on Ordered Multisignatures.
Proceedings of the Radio Frequency Identification System Security, 2012

Permission-Based Abnormal Application Detection for Android.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

A Privacy-Preserving Path-Checking Solution for RFID-Based Supply Chains.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Towards privacy-preserving RFID-based location-based services.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012

PUF-Based RFID Authentication Protocol against Secret Key Leakage.
Proceedings of the Web Technologies and Applications - 14th Asia-Pacific Web Conference, 2012

2011
Sorcery: Overcoming deceptive votes in P2P content sharing systems.
Peer-to-Peer Netw. Appl., 2011

Lightweight RFID Mutual Authentication Protocol against Feasible Problems.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

2010
Supermarket Service Modeling and Evaluation.
Int. J. Serv. Sci. Manag. Eng. Technol., 2010

Survey of Authentication in Mobile IPv6 Network.
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010

2009
Sorcery: Could We Make P2P Content Sharing Systems Robust to Deceivers?.
Proceedings of the Proceedings P2P 2009, 2009

Hash-Based Tag Ownership Transfer Protocol against Traceability.
Proceedings of the 2009 IEEE International Conference on e-Business Engineering, 2009

SpamResist: Making Peer-to-Peer Tagging Systems Robust to Spam.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

SpamClean: Towards Spam-Free Tagging Systems.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Filtering Spam in Social Tagging System with Dynamic Behavior Analysis.
Proceedings of the 2009 International Conference on Advances in Social Network Analysis and Mining, 2009

2008
A Game Theoretic Approach Based Access Control Mechanism.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Efficient Identity-Based Key Issue with TPM.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

A Trust and Risk Framework to Enhance Reliable Interaction in E-Commerce.
Proceedings of the 2008 IEEE International Conference on e-Business Engineering, 2008

An Improved Scheme for Delegation Based on Usage Control.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008


  Loading...