Kun Lin

Orcid: 0000-0003-4597-9702

According to our database1, Kun Lin authored at least 30 papers between 2007 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
A modified Holmquist‒Johnson‒Cook (HJC) constitutive model and its application to numerical simulations of explosions and impacts in rock materials.
Simul. Model. Pract. Theory, 2025

2024
Beyond Static Calibration: The Impact of User Preference Dynamics on Calibrated Recommendation.
Proceedings of the Adjunct Proceedings of the 32nd ACM Conference on User Modeling, 2024

3D Point Clouds Simplification Based on Low-dimensional Contour FeatureExtraction.
Proceedings of the 2024 2nd Asia Conference on Computer Vision, 2024

2023
Feature enhancement modules applied to a feature pyramid network for object detection.
Pattern Anal. Appl., May, 2023

A Case Against CXL Memory Pooling.
Proceedings of the 22nd ACM Workshop on Hot Topics in Networks, 2023

2022
A Deep Learning Method for Breast Cancer Classification in the Pathology Images.
IEEE J. Biomed. Health Informatics, 2022

Sequential Recommendation with Decomposed Item Feature Routing.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

Magnetic Properties-Based Range Image Descriptor.
Proceedings of the 15th International Symposium on Computational Intelligence and Design, 2022

2021
Secret Key Generation Based on 3D Spatial Angles for UAV Communications.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2021

ROLIG3A: Protecting Group Secret Key Generation Procedures against Malicious Attackers.
Proceedings of the 94th IEEE Vehicular Technology Conference, 2021

2020
Vulnerabilities of Physical Layer Secret Key Generation Against Environment Reconstruction Based Attacks.
IEEE Wirel. Commun. Lett., 2020

Signal Timing Optimization Model Based on Bus Priority.
Inf., 2020

A Three-Dimensional Geometry-based Stochastic Model for Air-to-Air UAV Channels.
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020

Calibration in Collaborative Filtering Recommender Systems: a User-Centered Analysis.
Proceedings of the HT '20: 31st ACM Conference on Hypertext and Social Media, 2020

2019
An Adaptive, Data-Driven Personalized Advisor for Increasing Physical Activity.
IEEE J. Biomed. Health Informatics, 2019

Crank up the Volume: Preference Bias Amplification in Collaborative Recommendation.
Proceedings of the Workshop on Recommendation in Multi-stakeholder Environments co-located with the 13th ACM Conference on Recommender Systems (RecSys 2019), 2019

2018
Probabilistically distorted risk-sensitive infinite-horizon dynamic programming.
Autom., 2018

WSMeter: A Performance Evaluation Methodology for Google's Production Warehouse-Scale Computers.
Proceedings of the Twenty-Third International Conference on Architectural Support for Programming Languages and Operating Systems, 2018

2017
Graphene-Ag Hybrids on Laser-Textured Si Surface for SERS Detection.
Sensors, 2017

cHRV Uncovering Daily Stress Dynamics Using Bio-Signal from Consumer Wearables.
Proceedings of the MEDINFO 2017: Precision Healthcare through Informatics, 2017

Improving predictive models with clustered sequences: An Application on Heart Failure Risk Prediction.
Proceedings of the Summit on Clinical Research Informatics, 2017

2016
Cumulative weighting optimization.
J. Glob. Optim., 2016

Research on user relationship networks of SNS based on the Forest Fire model.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

Accountable Care Organization Provider Network Design: A systematic data-driven approach.
Proceedings of the AMIA 2016, 2016

2014
An Improved Channel Estimation Method based on Jointly Preprocessing of Time-frequency Domain in TD-LTE System.
J. Networks, 2014

2013
Dynamic programming with non-convex risk-sensitive measures.
Proceedings of the American Control Conference, 2013

Analysis on Malicious Attack and Safety Protection on the Local Area Network of Computers.
Proceedings of the 2013 The Second International Conference on Innovative Computing and Cloud Computing, 2013

2010
Addressing Scalability in a Laboratory-Based Multihop Wireless Testbed.
Mob. Networks Appl., 2010

Application of Web Data Mining Based on the Neural Network Algorithms in E-Commerce.
Proceedings of the IEEE 7th International Conference on e-Business Engineering, 2010

2007
SecureGo: A Hardware-Software Co-Protection against Identity Theft in Online Transaction.
Proceedings of the 2007 ECSIS Symposium on Bio-inspired, 2007


  Loading...