Mingsheng Hu

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
SStore: An Efficient and Secure Provable Data Auditing Platform for Cloud.
IEEE Trans. Inf. Forensics Secur., 2024

2023
The Hybrid Trip Destination Prediction Model of Vehicles Based on Autoencoder and High-Order Interaction Features.
IEEE Trans. Intell. Transp. Syst., August, 2023

sChain: An Efficient and Secure Solution for Improving Blockchain Storage.
IEEE Trans. Inf. Forensics Secur., 2023

Enabling Integrity and Compliance Auditing in Blockchain-Based GDPR-Compliant Data Management.
IEEE Internet Things J., 2023

2022
The Hybrid Similar Neighborhood Robust Factorization Machine Model for Can Bus Intrusion Detection in the In-Vehicle Network.
IEEE Trans. Intell. Transp. Syst., 2022

Anonymous Traceability protocol based on Group Signature for Blockchain.
Future Gener. Comput. Syst., 2022

2021
A Deep Learning-Based Trust Assessment Method for Cloud Users.
Secur. Commun. Networks, 2021

Machine Learning Empowered Trust Evaluation Method for IoT Devices.
IEEE Access, 2021

2020
Keyword Searchable Encryption Scheme based on Blockchain in Cloud Environment.
Proceedings of the 3rd International Conference on Smart BlockChain, 2020

2019
A New Signcryption Scheme without Hash or Redundant functions.
Proceedings of the 6th International Conference on Behavioral, 2019

2016
A new data hiding method for H.264 based on secret sharing.
Neurocomputing, 2016

A reversible data hiding method for H.264 with Shamir's (t, n)-threshold secret sharing.
Neurocomputing, 2016

2015
A robust reversible data hiding scheme for H.264 without distortion drift.
Neurocomputing, 2015

A new robust data hiding method for H.264/AVC without intra-frame distortion drift.
Neurocomputing, 2015

Establishment of the Optimized Production Performance Detection Model with the Combination of GA and BPN.
Intell. Autom. Soft Comput., 2015

2014
A Robust Reversible Data Hiding Scheme for H.264 Based on Secret Sharing.
Proceedings of the Intelligent Computing Theory - 10th International Conference, 2014

Complex Network Construction Method of Disaster Regional Association Based on Optimized Compressive Sensing.
Proceedings of the Intelligent Computing Methodologies - 10th International Conference, 2014

Community Detection Method of Complex Network Based on ACO Pheromone of TSP.
Proceedings of the Intelligent Computing Methodologies - 10th International Conference, 2014

Dynamical Distribution of Capacities Strategy for Suppressing Cascading Failure in Power Grid.
Proceedings of the Intelligent Computing Methodologies - 10th International Conference, 2014

Cascading Failures in Power Grid under Three Node Attack Strategies.
Proceedings of the Intelligent Computing Methodologies - 10th International Conference, 2014

2009
Web Text Categorization for Enterprise Decision Support Based on SVMs - An Application of GBODSS.
Proceedings of the Advances in Neural Networks, 2009


  Loading...