Kexin Hu

Orcid: 0000-0002-5272-6124

According to our database1, Kexin Hu authored at least 18 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Quantum secret sharing scheme based on prime dimensional locally distinguishable states.
Quantum Inf. Process., September, 2024

A Review of Multimaterial Additively Manufactured Electronics and 4-D Printing/Origami Shape-Memory Devices: Design, Fabrication, and Implementation.
Proc. IEEE, August, 2024

Preliminary Technical Validation of LittleBeats™: A Multimodal Sensing Platform to Capture Cardiac Physiology, Motion, and Vocalizations.
Sensors, February, 2024

Liveness Attacks On HotStuff: The Vulnerability Of Timer Doubling Mechanism.
Comput. J., 2024

2023
An optimisation for a two-round good-case latency protocol.
IET Inf. Secur., July, 2023

2022
Interaction Mechanism and Loss Analysis of Mixing between Film Cooling Jet and Passage Vortex.
Entropy, 2022

Novel Approaches of Abdominal Computed Tomography Image Super Resolution based on Deep Residual Learning.
Proceedings of the 4th International Conference on Video, Signal and Image Processing, 2022

Leopard: Towards High Throughput-Preserving BFT for Large-scale Systems.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

2021
Formative Assessment as an Online Instruction Intervention: Student Engagement, Outcomes, and Perceptions.
Int. J. Distance Educ. Technol., 2021

Don't Count on One to Carry the Ball: Scaling BFT without Sacrifing Efficiency.
CoRR, 2021

2020
Corrigendum to "Breaking the binding: Attacks on the Merkle approach to prove liabilities and its applications" [Computers & Security, Volume 87, 2019, 101585].
Comput. Secur., 2020

2019
Breaking the binding: Attacks on the Merkle approach to prove liabilities and its applications.
Comput. Secur., 2019

Research on Node Location Technology Based on Improved Particle Swarm Optimization.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019

2018
Fast Lottery-Based Micropayments for Decentralized Currencies.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2014
Erratum to: Color face image decomposition under complex lighting conditions.
Vis. Comput., 2014

Color face image decomposition under complex lighting conditions.
Vis. Comput., 2014

2013
A Novel 3 Dimensional Chaotic System and Design of Pseudorandom Number Generator.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

Study on Pseudorandomness of Some Pseudorandom Number Generators with Application.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013


  Loading...