Lin Mei

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
Management of power equipment inspection informationization through intelligent unmanned aerial vehicles.
Artif. Life Robotics, November, 2024

Ranked searchable encryption based on differential privacy and blockchain.
Wirel. Networks, August, 2024

Conjunctive searchable encryption with efficient authorization for group sharing.
Wirel. Networks, July, 2024

Key-aggregate based access control encryption for flexible cloud data sharing.
Comput. Stand. Interfaces, March, 2024

Practical Multi-Source Multi-Client Searchable Encryption With Forward Privacy: Refined Security Notion and New Constructions.
IEEE Trans. Dependable Secur. Comput., 2024

DMM: Disparity-guided Multispectral Mamba for Oriented Object Detection in Remote Sensing.
CoRR, 2024

AFSC: An Improved Spectral Clustering Based on Adaptive Neighbor and Fuzzy Affiliation.
IEEE Access, 2024

Domain Adaptation for Chinese Offensive Language Detection.
Proceedings of the Natural Language Processing and Chinese Computing, 2024

2023
Multiclass Weighted Least Squares Twin Bounded Support Vector Machine for Intelligent Water Leakage Diagnosis.
IEEE Trans. Instrum. Meas., 2023

Long-term Effects of Temperature Variations on Economic Growth: A Machine Learning Approach.
CoRR, 2023

Multi-dimensional Connection Remote Training Farmer College Students.
Proceedings of the 2023 8th International Conference on Distance Education and Learning, 2023

Long Range Imaging Using Multispectral Fusion of RGB and NIR Images.
Proceedings of the IEEE International Conference on Acoustics, 2023

Construction of Power-related Safety Fault Section of Distribution Network Combining Internet of Things and Image Recognition Algorithm.
Proceedings of the International Conference on Big Data Mining and Information Processing, 2023

2022
Hardening secure search in encrypted database: a KGA-resistance conjunctive searchable encryption scheme from lattice.
Soft Comput., 2022

Intermodal hub-and-spoke logistic network design with differentiated services: The case of China Railway Express.
Inf. Sci., 2022

Leak Identification Based on CS-ResNet Under Different Leakage Apertures for Water-Supply Pipeline.
IEEE Access, 2022

Low Light Image Enhancement by Multispectral Fusion and Convolutional Neural Networks.
Proceedings of the 26th International Conference on Pattern Recognition, 2022

2021
Privacy-Preserving Ranked Searchable Encryption Based on Differential Privacy.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2021

Puncturable Search: Enabling Authorized Search in Cross-data Federation.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2021

On the Exploration and Practice of Rural Revitalization and Talent Training Based on Distance Education: Taking the Open University's Project "One College Student for One Village Programme" as an Example.
Proceedings of the ICDEL 2021: The 6th International Conference on Distance Education and Learning, Shanghai, China, May 21, 2021

2020
A Distributed Density-based Outlier Detection Algorithm on Big Data.
Int. J. Netw. Secur., 2020

Attacking the Niederreiter-type cryptosystem based on rank metric.
Int. J. Embed. Syst., 2020

Adversarial Mobility Learning for Human Trajectory Classification.
IEEE Access, 2020

Deep Fusion of RGB and NIR Paired Images Using Convolutional Neural Networks.
Proceedings of the 25th International Conference on Pattern Recognition, 2020

Forward Secure Conjunctive-Keyword Searchable Symmetric Encryption Using Shamir Threshold Secret Sharing Scheme.
Proceedings of the Applications and Techniques in Information Security, 2020

2019
When is the best time to use rubrics in flipped learning? A study on students' learning achievement, metacognitive awareness, and cognitive load.
Interact. Learn. Environ., 2019

Forward Private Searchable Encryption with Conjunctive Keywords Query.
Proceedings of the Science of Cyber Security - Second International Conference, 2019

Towards Realizing Authorized Encrypted Search with Designed Access Policy.
Proceedings of the Science of Cyber Security - Second International Conference, 2019

2018
A Pests Image Classification Method Based on Improved Wolf Pack Algorithm to Optimize Bayesian Network Structure Learning.
Proceedings of the Bio-inspired Computing: Theories and Applications, 2018

2013
Design and Development of Intelligent Monitoring System for Plastic Tea Greenhouse.
Proceedings of the Computer and Computing Technologies in Agriculture VII, 2013

2012
Cognitive Context Elicitation and Modeling.
PhD thesis, 2012

A Greenhouse Control with Sectional-Control Strategy Based on MPT Intelligent Algorithm.
Proceedings of the Computer and Computing Technologies in Agriculture VI, 2012

2010
Ontology mapping based on structures and instances.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010

2009
4D motion modeling of the coronary arteries from CT images for robotic assisted minimally invasive surgery.
Proceedings of the Medical Imaging 2009: Image Processing, 2009

2008
Sample Sufficiency and Number of Modes to Retain in Statistical Shape Modelling.
Proceedings of the Medical Image Computing and Computer-Assisted Intervention, 2008

Sample Sufficiency and PCA Dimension for Statistical Shape Models.
Proceedings of the Computer Vision, 2008

Statistical shape modelling: How many modes should be retained?
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2008

2004
Simulation on pattern design in group calisthenics.
Proceedings of the Proceedings VRCAI 2004, 2004


  Loading...