Jinhui Liu

Orcid: 0000-0001-8032-5099

According to our database1, Jinhui Liu authored at least 68 papers between 1995 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Application of color doppler ultrasound and US shear wave elastography with connective tissue growth factor in the risk assessment of papillary thyroid carcinoma.
BMC Medical Imaging, December, 2024

Analysis and Improvement of a Conditional Privacy-Preserving Authentication Scheme With Double-Insurance in VANETs.
IEEE Trans. Veh. Technol., November, 2024

TKO-SLAM: Visual SLAM algorithm based on time-delay feature regression and keyframe pose optimization.
J. Field Robotics, September, 2024

Language Model Method for Collocation Rules of Parts of Speech in Machine Translation System.
ACM Trans. Asian Low Resour. Lang. Inf. Process., August, 2024

Hierarchical Reinforcement Learning from Demonstration via Reachability-Based Reward Shaping.
Neural Process. Lett., June, 2024

TBSCrowd: A Blockchain-Assisted Privacy-Preserving Mobile Crowdsourcing Scheme From Threshold Blind Signatures.
IEEE Internet Things J., June, 2024

Part-of-speech- and syntactic-aware graph convolutional network for aspect-level sentiment classification.
Multim. Tools Appl., March, 2024

Global semantic enhancement network for video captioning.
Pattern Recognit., January, 2024

Hierarchical reinforcement learning from imperfect demonstrations through reachable coverage-based subgoal filtering.
Knowl. Based Syst., 2024

Ethics-aware face recognition aided by synthetic face images.
Neurocomputing, 2024

L<i>π</i>CET: A Logic Security Analysis for Cryptographic Protocols Based on <i>π</i>-Calculus Extension Theory.
IET Inf. Secur., 2024

A new entropy source design based on NAND-XOR ring oscillators for resource-efficient and ultra-high throughput TRNG.
IEICE Electron. Express, 2024

iPMRSS: An Improved privacy-preserving medical record searching scheme for intelligent diagnosis in IoMT.
Expert Syst. Appl., 2024

Optimizing the Design of Combined Alkaline and Proton Exchange Membrane Electrolyzers to Fully Utilize Fluctuating Renewable Energy.
Proceedings of the 20th IEEE International Conference on Automation Science and Engineering, 2024

Integrating end-to-end prediction-with-optimization for distributed hydrogen energy system scheduling.
Proceedings of the 20th IEEE International Conference on Automation Science and Engineering, 2024

2023
ACKE: Asymmetric Computing Key Exchange Protocol for IoT Environments.
IEEE Internet Things J., October, 2023

A feature aggregation and feature fusion network for retinal vessel segmentation.
Biomed. Signal Process. Control., August, 2023

Optimal Planning of Internet Data Centers Decarbonized by Hydrogen-Water-Based Energy Systems.
IEEE Trans Autom. Sci. Eng., July, 2023

TETFN: A text enhanced transformer fusion network for multimodal sentiment analysis.
Pattern Recognit., April, 2023

A post quantum secure multi-party collaborative signature with deterability in the Industrial Internet of Things.
Future Gener. Comput. Syst., April, 2023

LpiCT: A logic security analysis framework for protocols.
CoRR, 2023

An Improved Visual SLAM Algorithm Based on Graph Neural Network.
IEEE Access, 2023

Characteristic-Model Based Discrete-Time Sliding Mode Control for Attitude Tracking of Quadrotor Under Unknown Dynamics and Input Saturation.
Proceedings of the 49th Annual Conference of the IEEE Industrial Electronics Society, 2023

A Logic Encryption-Enhanced PUF Architecture to Deceive Machine Learning-Based Modeling Attacks.
Proceedings of the 32nd IEEE Asian Test Symposium, 2023

2022
Design and dynamic analysis of jumping wheel-legged robot in complex terrain environment.
Frontiers Neurorobotics, September, 2022

Lattice-Based Self-Enhancement Authorized Accessible Privacy Authentication for Cyber-Physical Systems.
Secur. Commun. Networks, 2022

Performance-oriented cache management scheme based on a retention state for energy-harvesting nonvolatile processors.
Future Gener. Comput. Syst., 2022

Adaptive Neural Network Backstepping Control Method for Aerial Manipulator Based on Variable Inertia Parameter Modeling.
CoRR, 2022

Post quantum secure fair data trading with deterability based on machine learning.
Sci. China Inf. Sci., 2022

Identification of cuproptosis-related subtypes, establishment of a prognostic model and tumor immune landscape in endometrial carcinoma.
Comput. Biol. Medicine, 2022

A Secure and Large-Scale Multiparty Conditional Payment Scheme based on Blockchain.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022


2021
KVGCN: A KNN Searching and VLAD Combined Graph Convolutional Network for Point Cloud Segmentation.
Remote. Sens., 2021

A Generic Global-to-Local Quantitative Transformation Model (GGTLQTM) for Modeling Socioeconomic Indicators From DMSP-OLS Nighttime Light Imagery.
IEEE Geosci. Remote. Sens. Lett., 2021

Zero-shot Learning via the fusion of generation and embedding for image recognition.
Inf. Sci., 2021

Post-Quantum Secure Ring Signatures for Security and Privacy in the Cybertwin-Driven 6G.
IEEE Internet Things J., 2021

Cryptanalysis of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable Family.
Int. J. Found. Comput. Sci., 2021

L2-CVAEGAN: Feature Aligned Generative Networks for Zero-Shot Learning.
Proceedings of the Image and Graphics - 11th International Conference, 2021

Few-shot Weighted Style Matching for Glaucoma Detection.
Proceedings of the Artificial Intelligence - First CAAI International Conference, 2021

2020
Communication-Aware Task Scheduling for Energy-Harvesting Nonvolatile Processors.
IEEE Trans. Very Large Scale Integr. Syst., 2020

Improved Security of a Pairing-Free Certificateless Aggregate Signature in Healthcare Wireless Medical Sensor Networks.
IEEE Internet Things J., 2020

A PUF-based Scheme for Identify Trusted Mobile Phone Accessories.
Proceedings of the International Conference on Networking and Network Applications, 2020

Nonlinear Disturbance Observer Based Adaptive Backstepping Control for Trajectory Tracking of Aerial Parallel Manipulator.
Proceedings of the 46th Annual Conference of the IEEE Industrial Electronics Society, 2020

Leaping from 2D Detection to Efficient 6DoF Object Pose Estimation.
Proceedings of the Computer Vision - ECCV 2020 Workshops, 2020

Optimal Scheduling of Distributed Hydrogen-based Multi-Energy Systems for Building Energy Cost and Carbon Emission Reduction.
Proceedings of the 16th IEEE International Conference on Automation Science and Engineering, 2020

Intelligent Monitoring Technology of the Substation Based on the Micro System.
Proceedings of the International Conference on Artificial Intelligence and Computer Vision, 2020

2019
Parallel Runtime Verification Approach for Alternate Execution of Multiple Threads.
Proceedings of the Structured Object-Oriented Formal Language and Method, 2019

Lattice Based Verifiably Encrypted Double Authentication Preventing Signatures.
Proceedings of the Network and System Security - 13th International Conference, 2019

Research on the Implementation Plan of the Intelligent Substation Based on the Micro System.
Proceedings of the Advances in Natural Computation, Fuzzy Systems and Knowledge Discovery - Proceedings of the 15th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD 2019), Kunming, China, July 20-22, 2019, 2019

2018
Structural Key Recovery of Simple Matrix Encryption Scheme Family.
Comput. J., 2018

An Efficient Privacy Preserving Batch Authentication Scheme with Deterable Function for VANETs.
Proceedings of the Network and System Security - 12th International Conference, 2018

An Efficient Anonymous Authentication Scheme Based on Double Authentication Preventing Signature for Mobile Healthcare Crowd Sensing.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2016
Ts-RBAC: A RBAC model with transformation.
Comput. Secur., 2016

Cryptanalysis of an asymmetric cipher protocol using a matrix decomposition problem.
Sci. China Inf. Sci., 2016

Moving Object Detection with ViBe and Texture Feature.
Proceedings of the Advances in Multimedia Information Processing - PCM 2016, 2016

A Linear Algebra Attack on the Non-commuting Cryptography Class Based on Matrix Power Function.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

2015
Improved Biba model based on trusted computing.
Secur. Commun. Networks, 2015

A public key cryptosystem based on data complexity under quantum environment.
Sci. China Inf. Sci., 2015

2011
Evaluation Strategies for Top-k Queries over Memory-Resident Inverted Indexes.
Proc. VLDB Endow., 2011

2009
Research on Water Environmental Quality Assessment of Fu River with BP NN.
Proceedings of the 2009 International Conference on Environmental Science and Information Application Technology, 2009

2008
Trade-Off Driven Hybrid Wideband Source Localization Algorithm for Acoustic Sensors.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

2005
Intelligent Taxonomy Management Tools for Enterprise Content.
Proceedings of the 2005 IEEE / WIC / ACM International Conference on Web Intelligence (WI 2005), 2005

2002
Neural networks with enhanced outlier rejection ability for off-line handwritten word recognition.
Pattern Recognit., 2002

Thematic mapping - from unstructured documents to taxonomies.
Proceedings of the 2002 ACM CIKM International Conference on Information and Knowledge Management, 2002

2000
Image-based form document retrieval.
Pattern Recognit., 2000

Outlier Rejection with MLPs and Variants of RBF Networks.
Proceedings of the 15th International Conference on Pattern Recognition, 2000

1998
Evaluation and Application of Recognition Confidence in OCR.
Proceedings of the Computer Vision, 1998

1995
Description and recognition of form and automated form data entry.
Proceedings of the Third International Conference on Document Analysis and Recognition, 1995


  Loading...