Yeping He
According to our database1,
Yeping He
authored at least 41 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024
Proceedings of the IEEE International Conference on Acoustics, 2024
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
2017
A secure and rapid response architecture for virtual machine migration from an untrusted hypervisor to a trusted one.
Frontiers Comput. Sci., 2017
Extending Differential Privacy for Treating Dependent Records via Information Theory.
CoRR, 2017
2016
Inherit Differential Privacy in Distributed Setting: Multiparty Randomized Function Computation.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
2014
J. Softw., 2014
IACR Cryptol. ePrint Arch., 2014
2013
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013
2012
Proceedings of the Information Security and Privacy Research, 2012
Proceedings of the 23rd IEEE International Symposium on Software Reliability Engineering Workshops, 2012
Proceedings of the Information Security Practice and Experience, 2012
Building Large Scale Text Corpus for Tibetan Natural Language Processing by Extracting Text from Web Pages.
Proceedings of the 10th Workshop on Asian Language Resources, 2012
Proceedings of the Seventh International Conference on Availability, 2012
2011
Proceedings of the Fifth International Conference on Secure Software Integration and Reliability Improvement, 2011
Proceedings of the 25th Pacific Asia Conference on Language, Information and Computation, 2011
Compression Methods by Code Mapping and Code Dividing for Chinese Dictionary Stored in a Double-Array Trie.
Proceedings of the Fifth International Joint Conference on Natural Language Processing, 2011
2010
Proceedings of the Trusted Systems - Second International Conference, 2010
Tibetan Number Identification Based on Classification of Number Components in Tibetan Word Segmentation.
Proceedings of the COLING 2010, 2010
2009
Trust-Based Constraint-Secure Interoperation for Dynamic Mediator-Free Collaboration.
J. Comput., 2009
Proceedings of the Advances in Information Security and Assurance, 2009
Proceedings of the Information Security Practice and Experience, 2009
2008
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008, 2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
2007
Sci. China Ser. F Inf. Sci., 2007
Proceedings of the Grid and Cooperative Computing, 2007
Proceedings of the Grid and Cooperative Computing, 2007
2006
Sci. China Ser. F Inf. Sci., 2006
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006
An Enhanced N-Way Exchange-Based Incentive Scheme for P2P File Sharing (Short Paper).
Proceedings of the Information and Communications Security, 8th International Conference, 2006
A Verifiable Formal Specification for RBAC Model with Constraints of Separation of Duty.
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006
2005
Sci. China Ser. F Inf. Sci., 2005
Proceedings of the Computer Network Security, 2005
2001
Proceedings of the Information and Communications Security, Third International Conference, 2001