Libin Wang

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2025
Some bivariate options pricing in a regime-switching stochastic volatility jump-diffusion model with stochastic intensity, stochastic interest and dependent jump.
Math. Comput. Simul., 2025

Semantic segmentation-based conservation tillage corn straw return cover type recognition.
Comput. Electron. Agric., 2025

2024
TIHN: Tensor Improved Huber Norm for low-rank tensor recovery.
Int. J. Wavelets Multiresolution Inf. Process., September, 2024

Double graphs regularized multi-view subspace clustering.
Int. J. Wavelets Multiresolution Inf. Process., January, 2024

Exact boundary controllability of nodal profile for the system of one-dimensional adiabatic flow.
Syst. Control. Lett., 2024

2023
Study on the Nonlinear Stability and Parametric Analysis of a Tensile-Beam Cable Dome.
Symmetry, September, 2023

Attention reweighted sparse subspace clustering.
Pattern Recognit., July, 2023

Exact Boundary Controllability of Nodal Profile for Quasilinear Hyperbolic Systems and Its Asymptotic Stability.
SIAM J. Control. Optim., February, 2023

Research on Ground-Airborne Frequency-Domain Electromagnetic Rapid Imaging Method Based on Space Magnetic Gradient Anomaly.
IEEE Trans. Geosci. Remote. Sens., 2023

A digital twin approach for tunnel construction safety early warning and management.
Comput. Ind., 2023

2022
Double Graphs Regularized Multi-view Subspace Clustering.
CoRR, 2022

Global Weighted Tensor Nuclear Norm for Tensor Robust Principal Component Analysis.
CoRR, 2022

2021
Probabilistic Assessment Approach of the Aerostatic Instability of Long-Span Symmetry Cable-Stayed Bridges.
Symmetry, 2021

Optimized Power Control in Internet of Vehicles Based on Serial Interference Cancellation and User Matching.
IEEE Access, 2021

2020
Cryptanalysis of certificateless authenticated key agreement protocols.
Int. J. Ad Hoc Ubiquitous Comput., 2020

Tightly-secure two-pass authenticated key exchange protocol using twin Diffie-Hellman problem.
IET Inf. Secur., 2020

Asymmetrical Vertical Federated Learning.
CoRR, 2020

2018
Transcriptome profilling analysis characterized the gene expression patterns responded to combined drought and heat stresses in soybean.
Comput. Biol. Chem., 2018

Research on Collaborative Filtering Recommendation of Learning Resource Based on Knowledge Association.
Proceedings of the Innovative Technologies and Learning - First International Conference, 2018

2016
Application of CCG Sensors to a High-Temperature Structure Subjected to Thermo-Mechanical Load.
Sensors, 2016

Aerodynamic Drag Analysis of 3-DOF Flex-Gimbal GyroWheel System in the Sense of Ground Test.
Sensors, 2016

Unified security model of authenticated key exchange with specific adversarial capabilities.
IET Inf. Secur., 2016

2014
Ordinal Feature Selection for Iris and Palmprint Recognition.
IEEE Trans. Image Process., 2014

One-Round Deniable Key Exchange with Perfect Forward Security.
IACR Cryptol. ePrint Arch., 2014

A Brief Survey on Recent Progress in Iris Recognition.
Proceedings of the Biometric Recognition - 9th Chinese Conference, 2014

2013
Cryptanalysis of Reduced-Round DASH.
J. Comput. Sci. Technol., 2013

A feature-level solution to off-angle iris recognition.
Proceedings of the International Conference on Biometrics, 2013

Adaptive Feature Selection via Boosting-Like Sparsity Regularization.
Proceedings of the 2nd IAPR Asian Conference on Pattern Recognition, 2013

2012
One-round identity-based key exchange with Perfect Forward Security.
Inf. Process. Lett., 2012

Robust regularized feature selection for iris recognition via linear programming.
Proceedings of the 21st International Conference on Pattern Recognition, 2012

Improved Related-Key Differential Attacks on Reduced-Round LBlock.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

2011
TMQV: A Strongly eCK-secure Diffie-Hellman Protocol without Gap Assumption.
J. Internet Serv. Inf. Secur., 2011

Improved Related-Key Boomerang Distinguishing Attack of Threefish-256.
IACR Cryptol. ePrint Arch., 2011

Analysis and Improvement of an Authenticated Key Exchange Protocol.
Proceedings of the Information Security Practice and Experience, 2011

2010
Security Enhancement and Modular Treatment towards Authenticated Key Exchange.
Proceedings of the Information and Communications Security - 12th International Conference, 2010


  Loading...