Jianhong Lin

According to our database1, Jianhong Lin authored at least 22 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Practical and Robust Federated Learning With Highly Scalable Regression Training.
IEEE Trans. Neural Networks Learn. Syst., October, 2024

PPMM-DA: Privacy-Preserving Multidimensional and Multisubset Data Aggregation With Differential Privacy for Fog-Based Smart Grids.
IEEE Internet Things J., February, 2024

Quantum Mixed-State Self-Attention Network.
CoRR, 2024

An Improved Algorithm to Identify More Arbitrage Opportunities on Decentralized Exchanges.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2024

2023
Uncertainty-inspired Open Set Learning for Retinal Anomaly Identification.
CoRR, 2023

2022
Centralisation in Financial, Socio-Economic and Ecological Complex Networks.
PhD thesis, 2022

Anomaly Identification Model for Telecom Users Based on Machine Learning Model Fusion.
J. Comput. Inf. Technol., 2022

A CCA secure public key encryption scheme based on finite groups of Lie type.
Sci. China Inf. Sci., 2022

Enhanced 4A Identity Authentication Center Based on Super SIM Technology.
Proceedings of the Smart Computing and Communication - 7th International Conference, 2022

2021
Smart and Practical Privacy-Preserving Data Aggregation for Fog-Based Smart Grids.
IEEE Trans. Inf. Forensics Secur., 2021

2020
Location Privacy-Preserving Distance Computation for Spatial Crowdsourcing.
IEEE Internet Things J., 2020

Lightning Network: a second path towards centralisation of the Bitcoin economy.
CoRR, 2020

Predicting Excavation-Induced Tunnel Response by Process-Based Modelling.
Complex., 2020

A New Face Detection Framework Based on Adaptive Cascaded Network.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020

WebSmell: An Efficient Malicious HTTP Traffic Detection Framework Using Data Augmentation.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020

2019
A Certificateless Verifiable Strong Designated Verifier Signature Scheme.
IEEE Access, 2019

A Secure Trust-Based Key Distribution With Self-Healing for Internet of Things.
IEEE Access, 2019

A New Secure Encryption Scheme Based on Group Factorization Problem.
IEEE Access, 2019

2018
Nestedness Maximization in Complex Networks through the Fitness-Complexity Algorithm.
Entropy, 2018

2015
Empirical Analysis of the Online Rating Systems.
CoRR, 2015

Locating influential nodes via dynamics-sensitive centrality.
CoRR, 2015

2014
A general method for identifying node spreading influence via the adjacent matrix and spreading rate.
CoRR, 2014


  Loading...