Liu-sheng Huang
#156,632
Most Influential Person Now
Liu-sheng Huang's AcademicInfluence.com Rankings
Liu-sheng Huangcomputer-science Degrees
Computer Science
#8659
World Rank
#9104
Historical Rank
Database
#5654
World Rank
#5868
Historical Rank

Download Badge
Computer Science
Liu-sheng Huang's Degrees
- PhD Computer Science National Taiwan University
- Masters Computer Science National Taiwan University
- Bachelors Computer Science National Taiwan University
Similar Degrees You Can Earn
Why Is Liu-sheng Huang Influential?
(Suggest an Edit or Addition)Liu-sheng Huang's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- WiFinger: talk to your smart devices with finger-grained gesture (2016) (227)
- Community-Aware Opportunistic Routing in Mobile Social Networks (2014) (220)
- Towards End-to-End License Plate Detection and Recognition: A Large Dataset and Baseline (2018) (153)
- FACTS: A Framework for Fault-Tolerant Composition of Transactional Web Services (2010) (149)
- Homing spread: Community home-based multi-copy routing in mobile social networks (2013) (145)
- Multi-task assignment for crowdsensing in mobile social networks (2015) (141)
- Online Task Assignment for Crowdsensing in Predictable Mobile Social Networks (2017) (112)
- Quantum Teleportation via GHZ-like State (2009) (109)
- Accurate Time Synchronization for Wireless Sensor Networks (2005) (106)
- Quantum group blind signature scheme without entanglement (2011) (98)
- Performance Analysis of Wireless Sensor Networks With Mobile Sinks (2012) (94)
- Incremental Deployment and Throughput Maximization Routing for a Hybrid SDN (2017) (82)
- Multi-party quantum state sharing of an arbitrary two-qubit state with Bell states (2011) (79)
- Centralized Scheduling and Channel Assignment in Multi-Channel Single-Transceiver WiMax Mesh Network (2007) (78)
- Truthful Incentive Mechanism for Nondeterministic Crowdsensing with Vehicles (2018) (75)
- Enabling efficient access control with dynamic policy updating for big data in the cloud (2014) (71)
- Mutual Information Optimally Local Private Discrete Distribution Estimation (2016) (69)
- TOUR: Time-sensitive Opportunistic Utility-based Routing in delay tolerant networks (2013) (67)
- Privacy Preserving ID3 Algorithm over Horizontally Partitioned Data (2006) (66)
- Passive interference measurement in Wireless Sensor Networks (2010) (61)
- Accuracy-Aware Interference Modeling and Measurement in Wireless Sensor Networks (2011) (61)
- Towards Preserving Worker Location Privacy in Spatial Crowdsourcing (2014) (54)
- AN IMPROVED AES S-BOX AND ITS PERFORMANCE ANALYSIS (2011) (53)
- Segment as Points for Efficient Online Multi-Object Tracking and Segmentation (2020) (52)
- PPS: Privacy-Preserving Strategyproof Social-Efficient Spectrum Auction Mechanisms (2013) (51)
- Bandwidth-Power Aware Cooperative Multipath Routing for Wireless Multimedia Sensor Networks (2012) (51)
- Toward Urban Electric Taxi Systems in Smart Cities: The Battery Swapping Challenge (2018) (47)
- Asymmetric multi-party quantum state sharing of an arbitrary m-qubit state (2011) (46)
- An Adaptive Collision-Free MAC protocol based on TDMA for Inter-Vehicular communication (2012) (46)
- Cryptanalysis of a certificateless signature scheme without pairings (2013) (43)
- True-MCSA: A Framework for Truthful Double Multi-Channel Spectrum Auctions (2012) (42)
- A new scheme for covert communication via 3G encoded speech (2012) (42)
- Energy-efficient cooperative data aggregation for wireless sensor networks (2010) (42)
- ZoomNet: Part-Aware Adaptive Zooming Neural Network for 3D Object Detection (2020) (41)
- Home-Based Zero-Knowledge Multi-Copy Routing in Mobile Social Networks (2015) (41)
- Quantum secret sharing between multiparty and multiparty with Bell states and Bell measurements (2010) (40)
- Traffic clustering and online traffic prediction in vehicle networks: A social influence perspective (2012) (40)
- Local Differential Private Data Aggregation for Discrete Distribution Estimation (2019) (40)
- Near optimal scheduling of data aggregation in wireless sensor networks (2013) (39)
- Topology and Link quality-aware Geographical opportunistic routing in wireless ad-hoc networks (2013) (37)
- Secret sharing based on quantum Fourier transform (2013) (37)
- PS-TRUST: Provably secure solution for truthful double spectrum auctions (2013) (36)
- Load-balancing routing in software defined networks with multiple controllers (2018) (36)
- Joint Route Selection and Update Scheduling for Low-Latency Update in SDNs (2017) (36)
- Wireless Sensor Networks for Intensive Irrigated Agriculture (2007) (36)
- WiStep: Device-free Step Counting with WiFi Signals (2018) (35)
- Opportunistic Mobile Data Offloading with Deadline Constraints (2017) (35)
- Truthful Auction Mechanisms with Performance Guarantee in Secondary Spectrum Markets (2015) (34)
- Secure Two-Party Point-Circle Inclusion Problem (2007) (33)
- On the Throughput Capacity of Wireless Sensor Networks With Mobile Relays (2012) (33)
- Minimizing Flow Statistics Collection Cost Using Wildcard-Based Requests in SDNs (2017) (33)
- Real-time update with joint optimization of route selection and update scheduling for SDNs (2016) (32)
- Linguistic Steganography Detection Using Statistical Characteristics of Correlations between Words (2008) (32)
- Joint Virtual MIMO and Data Gathering for Wireless Sensor Networks (2015) (31)
- Privacy Preserving C4.5 Algorithm Over Horizontally Partitioned Data (2005) (31)
- Private FL-GAN: Differential Privacy Synthetic Data Generation Based on Federated Learning (2020) (30)
- Mutual privacy-preserving regression modeling in participatory sensing (2013) (30)
- Steganalysis against substitution-based linguistic steganography based on context clusters (2011) (30)
- Cryptanalysis and melioration of secure quantum sealed-bid auction with post-confirmation (2012) (29)
- QoS-Aware Web Services Composition Using Transactional Composition Operator (2006) (29)
- FedSA: A Semi-Asynchronous Federated Learning Mechanism in Heterogeneous Edge Computing (2021) (29)
- A Statistical Attack on a Kind of Word-Shift Text-Steganography (2008) (29)
- Offloading Tasks With Dependency and Service Caching in Mobile Edge Computing (2021) (28)
- A mechanism for reducing flow tables in software defined network (2015) (28)
- Joint bandwidth allocation, element assignment and scheduling for wireless mesh networks with MIMO links (2008) (28)
- Joint relay assignment and power allocation for cooperative communications (2010) (28)
- PrivSet: Set-Valued Data Analyses with Locale Differential Privacy (2018) (27)
- Deadline-sensitive User Recruitment for mobile crowdsensing with probabilistic collaboration (2016) (27)
- Minimizing Controller Response Time Through Flow Redirecting in SDNs (2018) (26)
- CountMax: A Lightweight and Cooperative Sketch Measurement for Software-Defined Networks (2018) (26)
- Steganalysis of Compressed Speech Based on Markov and Entropy (2013) (26)
- Data-driven traffic flow analysis for vehicular communications (2014) (26)
- Private Weighted Histogram Aggregation in Crowdsourcing (2016) (26)
- Achieving High Scalability Through Hybrid Switching in Software-Defined Networking (2018) (26)
- Price-based resource allocation for revenue maximization with cooperative communication (2017) (26)
- Local private ordinal data distribution estimation (2017) (25)
- Coalitional Game for Community-Based Autonomous Web Services Cooperation (2013) (25)
- A fast algorithm for mining association rules (2000) (25)
- Three New Approaches to Privacy-preserving Add to Multiply Protocol and its Application (2009) (25)
- STBS: A Statistical Algorithm for Steganalysis of Translation-Based Steganography (2010) (24)
- A combinatorial double auction mechanism for cloud resource group-buying (2014) (24)
- Offloading Dependent Tasks in Mobile Edge Computing with Service Caching (2020) (24)
- R-MAC: Risk-Aware Dynamic MAC Protocol for Vehicular Cooperative Collision Avoidance System (2013) (24)
- A Utility-Optimized Framework for Personalized Private Histogram Estimation (2019) (24)
- Efficient Symmetric Five-Party Quantum State Sharing of an Arbitrary m-Qubit State (2011) (24)
- Achieving Energy Efficiency and Reliability for Data Dissemination in Duty-Cycled WSNs (2015) (24)
- Web services provision: solutions, challenges and opportunities (invited paper) (2009) (23)
- A Statistical Algorithm for Linguistic Steganography Detection Based on Distribution of Words (2008) (23)
- Linguistic Steganography Detection Based on Perplexity (2008) (23)
- Protecting Location Privacy in Spatial Crowdsourcing (2015) (23)
- Experimental video database management system based on advanced object-oriented techniques (1996) (22)
- A Novel Real-Time Coal Miner Localization and Tracking System Based on Self-Organized Sensor Networks (2010) (21)
- Efficient Identity-Based Signature from Lattices (2014) (21)
- Efficient multi-party quantum state sharing of an arbitrary two-qubit state (2010) (20)
- Spectrum combinatorial double auction for cognitive radio network with ubiquitous network resource providers (2015) (20)
- Relay Node Placement for Maximizing Network Lifetime in Wireless Sensor Networks (2008) (19)
- Bayesian Co-Clustering Truth Discovery for Mobile Crowd Sensing Systems (2020) (19)
- Partial flow statistics collection for load-balanced routing in software defined networks (2017) (19)
- Asymmetric five-party quantum state sharing of an arbitrary m-qubit state (2010) (19)
- An efficient centralized scheduling algorithm for IEEE 802.16 multi-radio mesh networks (2008) (19)
- Blind Linguistic Steganalysis against Translation Based Steganography (2010) (19)
- Control Link Load Balancing and Low Delay Route Deployment for Software Defined Networks (2017) (19)
- Joint Optimization of Flow Table and Group Table for Default Paths in SDNs (2018) (19)
- ITSEC: An information-theoretically secure framework for truthful spectrum auctions (2015) (18)
- FTRS: A mechanism for reducing flow table entries in software defined networks (2017) (18)
- Topology control for delay-constraint data collection in wireless sensor networks (2009) (18)
- Privacy-preserving LOF outlier detection (2015) (18)
- A New Hierarchical Identity-based Signature Scheme From Lattices In The Standard Model (2012) (18)
- Detection of substitution-based linguistic steganography by relative frequency analysis (2011) (18)
- DPDT: A Differentially Private Crowd-Sensed Data Trading Mechanism (2020) (17)
- An Algorithm for Privacy-Preserving Quantitative Association Rules Mining (2006) (17)
- Truthful Multi-unit Double Auction for Spectrum Allocation in Wireless Communications (2012) (17)
- Efficient hierarchical identity-based signatures from lattices (2013) (16)
- Cluster-based load balancing multi-path routing protocol in wireless sensor networks (2008) (16)
- Optimizing virtual machine placement in distributed clouds with M/M/1 servers (2017) (16)
- A (t, n) Secret Sharing Scheme for Image Encryption (2008) (16)
- Privacy-Preserving User Recruitment Protocol for Mobile Crowdsensing (2020) (15)
- Truthful incentive mechanism for vehicle-based nondeterministic crowdsensing (2016) (15)
- Steganalysis of Synonym-Substitution Based Natural Language Watermarking (2009) (15)
- Energy-efficient reliable data dissemination in duty-cycled wireless sensor networks (2013) (15)
- Adaptive Batch Size for Federated Learning in Resource-Constrained Edge Computing (2021) (15)
- Personalized Privacy-Preserving Data Aggregation for Histogram Estimation (2014) (15)
- A novel text steganography by context-based equivalent substitution (2013) (15)
- Optimal relay assignment for fairness in wireless cooperative networks (2012) (15)
- Certificateless and certificate-based signatures from lattices (2015) (14)
- Distributed compressed sensing in wireless local area networks (2014) (14)
- Privacy-preserving Protocols for Finding the Convex Hulls (2008) (14)
- Time-Sensitive Utility-Based Single-Copy Routing in Low-Duty-Cycle Wireless Sensor Networks (2015) (13)
- Auction-based resource allocation for cooperative cognitive radio networks (2017) (13)
- Lightweight Flow Distribution for Collaborative Traffic Measurement in Software Defined Networks (2019) (13)
- An Effective Cache Replacement Algorithm in Transcoding-Enabled Proxies (2006) (13)
- Deadline-Sensitive Mobile Data Offloading via Opportunistic Communications (2016) (13)
- Revealing the Reciprocal Relations between Self-Supervised Stereo and Monocular Depth Estimation (2021) (13)
- On the effect of flow table size and controller capacity on SDN network throughput (2017) (13)
- Deadline-Sensitive User Recruitment for Probabilistically Collaborative Mobile Crowdsensing (2016) (13)
- Controlled quantum perfect teleportation of multiple arbitrary multi-qubit states (2011) (12)
- Privacy-Preserving Naive Bayes Classification (2015) (12)
- Steganalysis on Character Substitution Using Support Vector Machine (2009) (12)
- Shapley Value Based Impression Propagation for Reputation Management in Web Service Composition (2012) (12)
- On-road ads delivery scheduling and bandwidth allocation in vehicular CPS (2013) (12)
- Incremental Server Deployment for Scalable NFV-enabled Networks (2020) (12)
- Queueing analysis for preemptive transmission in underlay CRNs (2015) (12)
- Energy-efficient data gathering in large wireless sensor networks (2005) (12)
- On the throughput-delay trade-off in large-scale MANETs with a generalized i.i.d. mobility model (2013) (11)
- Planning Battery Swapping Stations for Urban Electrical Taxis (2015) (11)
- Coverage and Exposure Paths in Wireless Sensor Networks (2006) (11)
- Arm up administrators: automated vulnerability management (2004) (11)
- An Incremental BP Neural Network Based Spurious Message Filter for VANET (2012) (11)
- Truthful Auction for Resource Allocation in Cooperative Cognitive Radio Networks (2015) (11)
- Joint deployment and routing in hybrid SDNs (2017) (11)
- A dynamic data model for a video database management system (1995) (11)
- SOS: Real-time and accurate physical assault detection using smartphone (2017) (11)
- Breaking A Proxy Signature Scheme From Lattices (2012) (11)
- NBLS: Neighbor-information-based localization system for wireless sensor networks (2008) (11)
- A (t, n)-Threshold Verified Multi-secret Sharing Scheme Based on ECDLP (2007) (11)
- Attention-Based Gait Recognition and Walking Direction Estimation in Wi-Fi Networks (2022) (10)
- A novel comprehensive steganalysis of transmission control protocol/Internet protocol covert channels based on protocol behaviors and support vector machine (2015) (10)
- Achieving Fine-Grained Flow Management Through Hybrid Rule Placement in SDNs (2021) (10)
- Incorporating Latent Meanings of Morphological Compositions to Enhance Word Embeddings (2018) (10)
- Joint Virtual Switch Deployment and Routing for Load Balancing in SDNs (2018) (10)
- Detection of Synonym-Substitution Modified Articles Using Context Information (2008) (10)
- Revenue Maximization for Dynamic Expansion of Geo-Distributed Cloud Data Centers (2020) (10)
- Distributed Compressed Sensing in Vehicular Ad-hoc Network (2015) (10)
- Identity-based Signatures from Lattices: Simpler, Faster, Shorter (2016) (10)
- Privacy Preserving Attribute Reduction Based on Rough Set (2009) (10)
- Chaac: Real-Time and Fine-Grained Rain Detection and Measurement Using Smartphones (2019) (10)
- An Efficient Implementation of File Sharing Systems on the Basis of WiMAX and Wi-Fi (2006) (10)
- A Stable Joint Routing and Spectrum Scheduling Scheme for Cognitive Radio Ad Hoc Networks (2011) (10)
- Topology Control with vMIMO Communication in Wireless Sensor Networks (2013) (10)
- Fault-Tolerant Orchestration of Transactional Web Services (2006) (10)
- Community-home-based Multi-copy Routing in Mobile Social Networks (2014) (10)
- On Privacy-Preserving Cloud Auction (2016) (10)
- Cryptanalysis and improvement of the novel semi-quantum secret sharing scheme using entangled states (2019) (10)
- Concealed in web surfing: Behavior-based covert channels in HTTP (2018) (9)
- Cooperative relay assignment for static energy-constrained networks (2012) (9)
- Shared Relay Assignment (SRA) for Many-to-One Traffic in Cooperative Networks (2016) (9)
- Differentially Private Greedy Decision Forest (2019) (9)
- Common Vulnerability Markup Language (2003) (9)
- A protocol for the secure two-party quantum scalar product (2012) (9)
- Delay-aware reliable broadcast scheme based on power control for VANETs (2014) (9)
- Integrating Coflow and Circuit Scheduling for Optical Networks (2019) (9)
- A Reputation-Based Revising Scheme for Localization in Wireless Sensor Networks (2010) (9)
- QoS-Aware Scheduling of Web Services (2008) (9)
- Deploying default paths by joint optimization of flow table and group table in SDNs (2017) (9)
- Relation of PPAtMP and scalar product protocol and their applications (2010) (9)
- Privacy-Preserving Collaborative Web Services QoS Prediction via Yao's Garbled Circuits and Homomorphic Encryption (2016) (9)
- A robust and efficient method for license plate recognition (2018) (9)
- Throughput capacity of mobility-assisted data collection in Wireless Sensor Networks (2009) (9)
- SAFE-ME: Scalable and Flexible Middlebox Policy Enforcement with Software Defined Networking (2019) (8)
- Primary Secrecy Is Achievable: Optimal Secrecy Rate in Overlay CRNs with an Energy Harvesting Secondary Transmitter (2015) (8)
- A decision-tree-based on-line flow table compressing method in Software Defined Networks (2016) (8)
- iProtect: Detecting Physical Assault Using Smartphone (2015) (8)
- Deadline-sensitive opportunistic utility-based routing in cyclic mobile social networks (2015) (8)
- Segment as Points for Efficient and Effective Online Multi-Object Tracking and Segmentation (2021) (8)
- STBC: A Novel Blockchain-Based Spectrum Trading Solution (2021) (8)
- Achieving Secure and Dynamic Range Queries Over Encrypted Cloud Data (2022) (8)
- Anycast Routing in Probabilistically Contacted Delay Tolerant Networks (2010) (8)
- Towards secure spectrum auction: both bids and bidder locations matter: poster (2016) (8)
- Constraints-Aware Scheduling for Transactional Services Composition (2009) (8)
- Geospatial Streams Publish with Differential Privacy (2016) (8)
- Privacy Preserving Quantum Anonymous Transmission via Entanglement Relay (2016) (8)
- Privacy preserving big histogram aggregation for spatial crowdsensing (2015) (8)
- Energy-efficient tree-based cooperative data aggregation for wireless sensor networks (2013) (8)
- Rule Anomalies Detecting and Resolving for Software Defined Networks (2014) (8)
- Integrated Traffic-Driving-Networking Simulator: A Unique R&D Tool for Connected Vehicles (2012) (8)
- Hiding Information by Context-Based Synonym Substitution (2009) (8)
- A Threshold Multi-secret Sharing Scheme (2008) (8)
- A Survey of Web Services Provision (2010) (8)
- A General Fine-Grained Truth Discovery Approach for Crowdsourced Data Aggregation (2017) (8)
- Public Curb Parking Demand Estimation With POI Distribution (2021) (8)
- Attention-based Walking Gait and Direction Recognition in Wi-Fi Networks (2018) (8)
- Energy Efficient Topology Control Algorithms for Variant Rate Mobile Sensor Networks (2008) (8)
- Reliable relay node placement in wireless sensor network (2008) (8)
- An efficient synchronisation protocol for wireless sensor network (2007) (8)
- Efficient and proactive V2V information diffusion using Named Data Networking (2016) (8)
- SPRITE: a novel strategy-proof multi-unit double auction scheme for spectrum allocation in ubiquitous communications (2014) (8)
- Recognizing the Operating Hand and the Hand-Changing Process for User Interface Adjustment on Smartphones (2016) (7)
- Wireless fire monitoring system for ancient buildings (2007) (7)
- Privacy Preserving Density-Based Outlier Detection (2010) (7)
- PointTrack++ for Effective Online Multi-Object Tracking and Segmentation (2020) (7)
- Quality-aware online task assignment mechanisms using latent topic model (2020) (7)
- Efficient Privacy-Preserving Aggregation for Mobile Crowdsensing (2015) (7)
- A general model for trust and reputation systems (2010) (7)
- A novel anonymous authentication scheme without cryptography (2014) (7)
- Continuous Copy-Paste for One-stage Multi-object Tracking and Segmentation (2021) (7)
- Best Bang for the Buck: Cost-Effective Seed Selection for Online Social Networks (2020) (7)
- ORAS: Opportunistic routing with asynchronous sleep in Wireless Sensor Networks (2010) (7)
- Optimal channel allocation for multi-PU and multi-SU pairs in underlay cognitive radio networks (2018) (7)
- Privacy Preserving Outlier Detection over Vertically Partitioned Data (2009) (7)
- Federated synthetic data generation with differential privacy (2021) (7)
- Hybrid covert channel in LTE-A: Modeling and analysis (2018) (7)
- Concealed in the Internet: A Novel Covert Channel with Normal Traffic Imitating (2016) (7)
- Business Models for Insurance of Business Web Services (2011) (6)
- One-Pass Key Establishment Protocol for Wireless Roaming with User Anonymity (2014) (6)
- Efficient Secure Primitive for Privacy Preserving Distributed Computations (2012) (6)
- iWalk: Let Your Smartphone Remember You (2017) (6)
- Achieving Energy Efficiency Through Dynamic Computing Offloading in Mobile Edge-Clouds (2018) (6)
- A Realistic and Optimized V2V Communication System for Taxicabs (2016) (6)
- An incentive energy-efficient routing for data gathering in wireless cooperative networks (2013) (6)
- The Development of a Smart Taxicab Scheduling System: A Multi-source Data Fusion Perspective (2016) (6)
- A One-Pass Key Establishment Protocol for Anonymous Wireless Roaming with PFS (2011) (6)
- Detection of word shift steganography in PDF document (2008) (6)
- Localized Algorithm for Coverage in Wireless Sensor Networks (2005) (6)
- Fairness-aware shared relay assignment for cooperative communications (2014) (6)
- Fast Recovery for Single Link Failure with Segment Routing in SDNs (2019) (6)
- Set-valued data publication with local privacy (2020) (6)
- A Fine-grained Hop-count Based Localization Algorithm for Wireless Sensor Networks (2013) (6)
- Reputation-Driven Recommendation of Services with Uncertain QoS (2010) (6)
- An Efficient (t, n)-Threshold Multi-Secret Sharing Scheme (2008) (6)
- Cooperative relay assignment in wireless networks (2011) (6)
- A Classifier Method for Detection of Covert Channels over LTE (2017) (6)
- Performance Analysis and Improvement for Some Linear On-Line Bin-Packing Algorithms (2002) (6)
- Maximum-lifetime data aggregation for wireless sensor networks with cooperative communication (2016) (5)
- More than Word Frequencies: Authorship Attribution via Natural Frequency Zoned Word Distribution Analysis (2012) (5)
- Efficient Lattice-Based Ring Signature Scheme: Efficient Lattice-Based Ring Signature Scheme (2012) (5)
- Queuing-theoretical multi-user dynamic spectrum allocation & sharing mechanism in multi-channel cognitive radio networks (2014) (5)
- TransNet: Training Privacy-Preserving Neural Network over Transformed Layer (2020) (5)
- Temporal-Spatial Aggregated Urban Air Quality Inference with Heterogeneous Big Data (2016) (5)
- Handoff optimization and load balancing in wireless LANs using association control (2015) (5)
- A Storage Node Placement Algorithm in Wireless Sensor Networks (2009) (5)
- STRUCTURE: A Strategyproof Double Auction for Heterogeneous Secondary Spectrum Markets (2015) (5)
- Maximal Lifetime Scheduling for Cooperative Communications in Wireless Networks (2010) (5)
- WiStep (2018) (5)
- LinL: Lost in n-best List (2011) (5)
- Shared relay assignment (SRA) for many-to-one traffic in cooperative wireless transmissions (2014) (5)
- Quality Driven Web Services Replication Using Directed Acyclic Graph Coding (2011) (5)
- Lattice-based message recovery signature schemes (2013) (5)
- TRQED: Secure and Fast Tree-Based Private Range Queries over Encrypted Cloud (2018) (5)
- Leapfrog: Optimal Opportunistic Routing in Probabilistically Contacted Delay Tolerant Networks (2009) (5)
- Mask4D: 4D Convolution Network for Light Field Occlusion Removal (2021) (5)
- Replica placement in content delivery networks with stochastic demands and M/M/1 servers (2014) (5)
- Optimal Channel Assignment Schemes in Underlay CRNs with Multi-PU and Multi-SU Transmission Pairs (2015) (5)
- High-throughput anycast routing and congestion-free reconfiguration for SDNs (2016) (5)
- A Tracking Range Based Ant-Colony Routing Protocol for Mobile Wireless (2008) (5)
- PrivAG: Analyzing Attributed Graph Data with Local Differential Privacy (2020) (5)
- A novel clustering algorithm by using mobile gateways in densely deployed sensor networks (2008) (5)
- Accelerating Decentralized Federated Learning in Heterogeneous Edge Computing (2022) (5)
- Social Welfare Maximization Auction for Secondary Spectrum Markets: A Long-Term Perspective (2016) (5)
- Topology control for minimal path interference in wireless sensor networks (2008) (4)
- DopGest: Dual-Frequency Based Ultrasonic Gesture Recognition (2018) (4)
- Practical quantum Byzantine protocol via nearly optimal entanglement resources (2019) (4)
- Time-Sensitive Utility-Based Routing in Duty-Cycle Wireless Sensor Networks with Unreliable Links (2012) (4)
- Segment routing in hybrid software-defined networking (2017) (4)
- Approaching reliable realtime communications? A novel system design and implementation for roadway safety oriented vehicular communications (2013) (4)
- Dynamic Trust Evaluation Model Under Distributed Computing Environment: Dynamic Trust Evaluation Model Under Distributed Computing Environment (2011) (4)
- Guardian Angel: A Smartphone Based Personal Security System for Emergency Alerting (2015) (4)
- Supervised learning framework for covert channel detection in LTE-A (2018) (4)
- Tefnut: An Accurate Smartphone Based Rain Detection System in Vehicles (2016) (4)
- Interface assignment and bandwidth allocation for multi-channel wireless mesh networks (2008) (4)
- A Trustworthiness Evaluation Method for Wireless Sensor Nodes Based on D-S Evidence Theory (2013) (4)
- Automated Vulnerability Management through Web Services (2003) (4)
- Achieving fully privacy-preserving private range queries over outsourced cloud data (2017) (4)
- Cryptanalysis and improvement of the novel semi-quantum secret sharing scheme based on Bell states (2018) (4)
- Swarm intelligence: Coverage and connectivity control for mobile sensors (2008) (4)
- Self-organization Data Gathering for Wireless Sensor Networks (2006) (4)
- Building Profit-Aware Service-Oriented Business Applications (2008) (4)
- Joint relay assignment and rate–power allocation for multiple paths in cooperative networks (2016) (4)
- ABPNet: Adaptive Background Modeling for Generalized Few Shot Segmentation (2021) (4)
- A Secure and Robust Covert Channel Based on Secret Sharing Scheme (2016) (4)
- Processing Mutliple Requests to Construct Skyline Composite Services (2014) (4)
- Optimizing Compressive Sensing in the Internet of Things (2012) (4)
- Aggregating Votes with Local Differential Privacy: Usefulness, Soundness vs. Indistinguishability (2019) (4)
- Privacy-preserving Text Information Hiding Detecting Algorithm: Privacy-preserving Text Information Hiding Detecting Algorithm (2011) (4)
- Differentially Private Frequent Itemset Mining from Smart Devices in Local Setting (2017) (4)
- A novel distributed covert channel in HTTP (2014) (4)
- Privacy preserving computation of trust-value in wireless sensor networks (2011) (4)
- A privacy preserving scheme for change increment of electricity big data base on symmetric cryptography (2014) (4)
- Privacy-preserving collision detection of two circles (2007) (4)
- Interference-Aware Relay Assignment for Cooperative Networks (2010) (4)
- Emerging Applications for Cyber Transportation Systems (2014) (3)
- LiHB: Lost in HTTP Behaviors - A Behavior-Based Covert Channel in HTTP (2015) (3)
- INFLUENCE OF ENTANGLEMENT IN QUANTUM PARRONDO GAME (2008) (3)
- DNN Inference Acceleration with Partitioning and Early Exiting in Edge Computing (2021) (3)
- Shape Prior Guided Attack: Sparser Perturbations on 3D Point Clouds (2022) (3)
- A Detection-Resistant Covert Timing Channel Based on Geometric Huffman Coding (2018) (3)
- Delay-constraint topology control in wireless sensor networks format (2008) (3)
- Zeta: A Scalable and Robust East-West Communication Framework in Large-Scale Clouds (2022) (3)
- Secure double spectrum auctions (2015) (3)
- Privacy-Preserving DBSCAN Clustering Over Vertically Partitioned Data (2007) (3)
- One-pass key establishment for anonymous wireless roaming (2010) (3)
- Security of a Biometric Identity-based Encryption Scheme (2011) (3)
- AggNet for Self-supervised Monocular Depth Estimation: Go An Aggressive Step Furthe (2021) (3)
- Joint Job Offloading and Resource Allocation for Distributed Deep Learning in Edge Computing (2019) (3)
- Joint Service Placement and Request Scheduling for Multi-SP Mobile Edge Computing Network (2020) (3)
- Local maximum lifetime algorithms for strong k-barrier coverage with cooridnated sensors (2011) (3)
- Collaborative Thompson Sampling (2018) (3)
- Compressive Sensing based on local regional data in Wireless Sensor Networks (2012) (3)
- Joint power allocation and relay assignment for max-min fairness in cooperative networks (2010) (3)
- On the Performance of TDD and LDD Based Clone Attack Detection in Mobile Ad Hoc Networks (2012) (3)
- Energy-Efficient Cooperative Communications with Shared Relay in Wireless Networks (2017) (3)
- A Light-weight Approach to Obtaining NF State Information in SDN+NFV Networks (2018) (3)
- Fast and Accurate Traffic Measurement With Hierarchical Filtering (2020) (3)
- A Practical Solution for Privacy-Preserving Approximate Convex Hulls Problem (2009) (3)
- Spanner-Aware Relay Node Placement in Wireless Ad Hoc Sensor Networks (2009) (3)
- Truthful Auction Mechanism for Heterogeneous Spectrum Allocation in Wireless Networks (2012) (3)
- The optical properties of Ce-doped SnS quantum dots with fast nanosecond lifetime (2019) (3)
- Near-Optimal Truthful Auction Mechanisms in Secondary Spectrum Markets (2013) (3)
- Automatic Recognition for Arbitrarily Tilted License Plate (2018) (3)
- A Collaborative Localization Scheme from Connectivity in Wireless Sensor Networks (2008) (3)
- Load-Balancing Software-Defined Networking Through Hybrid Routing (2017) (3)
- Hamburger attack: A collusion attack against privacy-preserving data aggregation schemes (2015) (3)
- Consistent Message Ordering in Wireless Sensor and Actor Networks (2009) (3)
- A heuristic algorithm for data storage position in wireless sensor networks (2010) (3)
- Privacy-Preserving Practical Convex Hulls Protocol (2008) (3)
- Energy-aware virtual multi-input-multi-output-based routing for wireless ad hoc networks (2016) (2)
- Practical indoor tracking using Wireless Sensor Networks (2009) (2)
- Practical certificateless short signature scheme (2014) (2)
- Task Offloading in Edge-Clouds with Budget Constraint (2018) (2)
- HiFi: Hybrid Rule Placement for Fine-Grained Flow Management in SDNs (2020) (2)
- Capacity of distributed content delivery in large-scale wireless ad hoc networks (2012) (2)
- 2012 IEEE 19th International Conference on Web Services, Honolulu, HI, USA, June 24-29, 2012 (2012) (2)
- Achieving personalized and privacy-preserving range queries over outsourced cloud data (2017) (2)
- A Fine-Grained Localization Algorithm in Wireless Sensor Networks (2009) (2)
- TOR-ME: Reducing Controller Response Time Based on Rings in Software Defined Networks (2019) (2)
- Fast fourier transform based ip traffic classification system for SIPTO at H(e)NB (2012) (2)
- Security Analysis of a fuzzy Identity-Based Encryption Scheme (2014) (2)
- WiCare: A Synthesized Healthcare Service System Based on WiFi Signals (2016) (2)
- How Do Metro Station Crowd Flows Influence the Taxi Demand Based on Deep Spatial-Temporal Network? (2018) (2)
- Minimizing transmission time in 802.16-based multi-channel mesh networks (2009) (2)
- Pointer Networks for Arbitrary-Shaped Text Spotting (2021) (2)
- Cryptanalysis and improvement of a certificateless multi-proxy signature scheme (2014) (2)
- Approaching the Optimal Schedule for Data Aggregation in Wireless Sensor Networks (2010) (2)
- Privacy-Preserving Approximate Convex Hulls Protocol (2009) (2)
- An Efficient Multi-secret Sharing Scheme with the Quasi-threshold Multipartite Access Structure (2009) (2)
- A Range-Free Localization Algorithm in Concave Areas (2008) (2)
- Quantum Oblivious Transfer Using Tripartite Entangled States (2007) (2)
- Achieving primary secrecy in energy harvesting CRNs using stackelberg game (2015) (2)
- Selectable sensing period optimisation for energy-constrained cognitive radio networks (2015) (2)
- Cost-Effective Seed Selection in Online Social Networks (2017) (2)
- Flow-Based Transmission Scheduling in Constrained Delay Tolerant Networks (2012) (2)
- A Practical Three-Dimensional Privacy-Preserving Approximate Convex Hulls Protocol (2008) (2)
- Private Range Queries on Outsourced Databases (2015) (2)
- Hybrid routing by joint optimization of per-flow routing and tag-based routing in software-defined networks (2018) (2)
- Quantum state sharing against the controller’s cheating (2013) (2)
- Utility optimization scheduling for multi-point video surveillance in ubiquitous network (2013) (2)
- Efficient protocols for point-convex hull inclusion decision problems (2010) (2)
- Estimating Clustering Coefficient of Multiplex Graphs with Local Differential Privacy (2021) (2)
- Providing reliable and real-time delivery in the presence of body shadowing in breadcrumb systems (2014) (2)
- Privacy-preserving technology and its applications in statistics measurements (2007) (2)
- iRun: A Smartphone-Based System to Alert Runners to Warm Up Before Running (2016) (2)
- Privacy Preserving Aggregate Query of OLAP for Accurate Answers (2010) (2)
- Cryptanalysis and improvement of the novel quantum scheme for secure two-party distance computation (2018) (2)
- TransNet (2020) (2)
- Cooperative optimal pricing for stochastic access control in overlaid radio access networks (2015) (2)
- Personalized Classifier Ensemble Pruning Framework for Mobile Crowdsourcing (2017) (2)
- Spectrum Allocation Mechanisms in Wireless Networks with Performance Guarantee (2015) (2)
- A novel covert channel in LTE-A system (2016) (1)
- Detect Malicious Attacks from Entire TCP Communication Process (2017) (1)
- Contextual Combinatorial Cascading Thompson Sampling (2019) (1)
- Real-Time and Consistent Route Update Based on Segment Routing for NFV-enabled Networks (2021) (1)
- Urban Traffic Condition Estimation: Let WiFi Do It (2016) (1)
- Self-accelerated Thompson sampling with near-optimal regret upper bound (2020) (1)
- Classification Learning from Private Data in Heterogeneous Settings (2018) (1)
- Multidimensional Data Reduction Based on Compressed Sensing for Sensor Network (2012) (1)
- COUSTIC: Combinatorial Double Auction for Crowd Sensing Task Assignment in Device-to-Device Clouds (2018) (1)
- i-Shield: A System to Protect the Security of Your Smartphone (2016) (1)
- Recognizing the Operating Hand from Touchscreen Traces on Smartphones (2015) (1)
- A Novel Web Tunnel Detection Method Based on Protocol Behaviors (2013) (1)
- Shared relay assignment in cooperative communications for bandwidth maximization (2017) (1)
- Against Backdoor Attacks In Federated Learning With Differential Privacy (2022) (1)
- Optimal bandwidth utilization of all-optical ring with a converter of degree 4 (2008) (1)
- Two Novel and Secure Quantum ANDOS Schemes (2013) (1)
- AFall: Wi-Fi-based Device-free Fall Detection System using Spatial Angle of Arrival (2022) (1)
- Smart Device Fingerprinting Based on Webpage Loading (2018) (1)
- MDANet: Multi-Modal Deep Aggregation Network for Depth Completion (2021) (1)
- An Energy-Efficient k-connected Scheme for Wireless Sensor Networks (2011) (1)
- A scale‐independent way for differential estimation in dynamic radio frequency identification systems (2016) (1)
- A Double Auction Mechanism for Heterogeneous Multi-unit Spectrum Trading (2016) (1)
- SAFE-ME: Scalable and Flexible Policy Enforcement in Middlebox Networks (2022) (1)
- GDS: General Distributed Strategy for Functional Dependency Discovery Algorithms (2020) (1)
- Minimizing response latency via efficient virtual machine placement in cloud systems (2015) (1)
- Online Routing and Scheduling in Bandwidth-Limited Delay Tolerant Networks (2013) (1)
- Online Scheduling Strategy to Minimize Penalty of Tardiness for Real-Time Tasks in Mobile Edge Computing Systems (2019) (1)
- Improvement of a Lattice-based Signature Scheme (2014) (1)
- (Invited) popularity-based content replication scheme for wireless mesh network (2015) (1)
- Anomalous Trajectory Detection Between Regions of Interest Based on ANPR System (2018) (1)
- Secret sharing based on quantum Fourier transform (2013) (1)
- Quantum User Authentication with Nonentanglement-Based QKD Protocol (2007) (1)
- Degree-bounded minimum spanning tree for unit disk graph (2012) (1)
- Insurance-Based Business Web Services Composition (2010) (1)
- Energy-Efficient Location-Independent k -connected Scheme in Wireless Sensor Networks (2008) (1)
- Privacy-Preserving OLAP for Accurate Answer (2012) (1)
- Performance Guaranteed Single Link Failure Recovery in SDN Overlay Networks (2020) (1)
- Joint channel and sink assignment for data collection in cognitive wireless sensor networks (2017) (1)
- Adversarial Attacks on Object Detectors with Limited Perturbations (2021) (1)
- An energy-efficient opportunistic relay assignment in wireless cooperative networks (2013) (1)
- Enhancing Federated Learning with In-Cloud Unlabeled Data (2022) (1)
- SmartMonitoring: Reckoning Traffic Statuses of Road System in Real-Time Based on Scarce Road Surveillance Cameras (2017) (1)
- DYPSOKM: A Dynamic Union Of PSO And K-Means, A Better Cluster (2017) (1)
- Insecurity of a Certificate-free Ad Hoc Anonymous Authentication (2016) (1)
- AutoProfile: An Intelligent Profile Switching System for Smartphones (2023) (1)
- An Efficient Multiple-Precision Division Algorithm (2005) (1)
- DCNet: Dense Correspondence Neural Network for 6DoF Object Pose Estimation in Occluded Scenes (2020) (1)
- An improved entropy-based approach to steganalysis of compressed speech (2019) (1)
- An incentive energy-efficient routing for data gathering in wireless cooperative networks (2011) (1)
- Multimedia object placement for hybrid transparent data replication (2005) (1)
- A Hybrid Range-Free Localization Scheme in Wireless Sensor Networks (2007) (1)
- Selected Papers from ‘ ‘ The 6 th China Conference of Wireless Sensor Networks (2013) (0)
- Joint Switch Upgrade and VNF Placement for NFV-Based SDNs (2020) (0)
- Flow-Based Transmission Scheduling in Delay Tolerant Networks with bandwidth constraint (2010) (0)
- Design and implementation of a testbed for WSNs monitoring aquatic environment (2013) (0)
- A self-adaptive reconfiguration scheme for throughput maximization in municipal WMNs (2015) (0)
- VK-Net: Category-Level Point Cloud Registration with Unsupervised Rotation Invariant Keypoints (2021) (0)
- FAST: truthful auction with access flexibility for cooperative communications (2017) (0)
- Corrections to "Control Link Load Balancing and Low Delay Route Deployment for Software Defined Networks" (2018) (0)
- SOS: Real-time and accurate physical assault detection using smartphone (2016) (0)
- Selected Papers from “The 6th China Conference of Wireless Sensor Networks” (2013) (0)
- Secure certificate-free ring signature without bilinear pairing (2015) (0)
- Joint relay assignment and rate–power allocation for multiple paths in cooperative networks (2015) (0)
- Truthful Relay Assignment for Cooperative Communication in Wireless Networks with Selfish Source-Destination Pairs (2012) (0)
- Price-based resource allocation for revenue maximization with cooperative communication (2016) (0)
- Joint Server Selection and SFC Routing for Anycast in NFV-enabled SDNs (2020) (0)
- Queuing-Theoretical Multi-user Spectrum Sensing and Access in Multi-channel Cognitive Radio Networks (2015) (0)
- Shared relay assignment in cooperative communications for bandwidth maximization (2016) (0)
- RoNS: Robust network function services in clouds (2022) (0)
- Private FLI: Anti-Gradient Leakage Recovery Data Privacy Architecture (2021) (0)
- Collaborative Contextual Combinatorial Cascading Thompson Sampling (2019) (0)
- F3SNet: A Four-Step Strategy for QIM Steganalysis of Compressed Speech Based on Hierarchical Attention Network (2021) (0)
- Unconditionally secure all-or-nothing disclosure of secrets based on POVM measurements (2006) (0)
- A novel system design and implementation for realtime sensing and warning of roadway hazards round-the-clock (2012) (0)
- Unambiguous Measurements Based Quantum Cryptography (2007) (0)
- On the security of an enhanced signature scheme (2014) (0)
- V2X and Vision Fusion Based Undulating Road Recognition and Intelligent Vehicle Control (2022) (0)
- Building QKD Networks Based On a Novel QKD Scheme (2008) (0)
- AIS: An Inaudible Guider in Your Smartphone (2017) (0)
- A Utility-Optimized Framework for Personalized Private Histogram Estimation (Extended Abstract) (2019) (0)
- Multi-axis projection based giant component formation in random unit-disk graphs (2011) (0)
- Simulation and Verification for Ion Channel Noises in Neuronal Cells (2019) (0)
- A Truthful and Capacity-Aware Routing Protocol for Wireless Cooperative Networks (2013) (0)
- Towards Secure Spectrum Auction: Both Bids and Bidder Locations Matter (Extended abstract) (2016) (0)
- Private Frequent Itemset Mining in the Local Setting (2021) (0)
- An Efficient Data Exchange Protocol Using Improved Star Trees in Wireless Sensor Networks (2007) (0)
- Cooperative Relay Assignment in Wireless Networks (Invited Paper) (2011) (0)
- Cryptanalysis and improvement of the novel quantum scheme for secure two-party distance computation (2018) (0)
- Privacy-preserving statistical quantitative rules mining (2007) (0)
- A Maximal Independent Set Based Giant Component Formation in Random Unit-Disk Graphs (2011) (0)
- Location-Independent Topology Control and Implementation for Wireless Sensor Networks (2009) (0)
- An Entropy-based Method for Detection of Covert Channels over LTE (2018) (0)
- AtHom: Two Divergent Attentions Stimulated By Homomorphic Training in Text-to-Image Synthesis (2022) (0)
- On the security of an enhanced short signature scheme (2012) (0)
- DCNet (2020) (0)
- PrivGMM: Probability Density Estimation with Local Differential Privacy (2020) (0)
- Centralized spectrum leasing via cooperative SU assignment in cognitive radio networks (2018) (0)
- Level control maintenance of temporal consistency in wireless sensor networks (2009) (0)
- Cooperative topology control for low interference in wireless ad hoc networks (2017) (0)
- Study on Multi-Vehicle Scheduling Problem (2021) (0)
- An Efficient Source Peer Selection Algorithm in Hybrid P2P File Sharing Systems (2007) (0)
- On the Security of A Privacy-Preserving Product Calculation Scheme (2015) (0)
- Collaborative Thompson Sampling (2020) (0)
- Cooperative optimal pricing for stochastic access control in heterogeneous wireless networks (2011) (0)
- A solution of splittable large flow scheduling based on MCMF in software defined network (2015) (0)
- Privacy-preserving LOF outlier detection (2013) (0)
- A hybrid range-free localization scheme in wireless sensor networks work in progress (2007) (0)
- COUSTIC: Combinatorial Double auction for Task Assignment in Device-to-Device Clouds (2018) (0)
- CAE: Collusion Attack Emulator for Privacy-Preserving Data Aggregation Schemes (2016) (0)
- Security Evaluation of Multi-dimensional Steganography Model Based on VoIP (2020) (0)
- Product Calculation Scheme (2015) (0)
- Cooperative optimal pricing for stochastic access control in overlaid radio access networks (2015) (0)
- Achieving Handoff Optimization and Throughput Efficiency in Vehicular Networks (2013) (0)
- Steganography in HTML Based on Substitution of Script Codes (2013) (0)
- On Privacy-Preserving Cloud Auction Conference (2016) (0)
- GAN Generate Adversarial Examples to Fool Deep Networks (2019) (0)
- Design and Implementation of a Real-Time Distributed Precise Point Positioning Platform (2021) (0)
- Quantum Oblivious Transfer Based on POVM Measurements (2006) (0)
- Joint relay assignment and bandwidth allocation for all-to-one communication in cooperative networks (2015) (0)
- Cryptanalysis of a lattice-based proxy signature scheme (2011) (0)
- A dynamic flow model for constrained Delay Tolerant Networks (2011) (0)
- INFEASIBILITY OF QUANTUM CRYPTOGRAPHY WITHOUT EAVESDROPPING CHECK (2011) (0)
- Efficient Wireless Broadcasting Using Onion Decoding (2010) (0)
- Quantum ANDOS Protocol with Unconditional Security (2006) (0)
- SPRITE: a novel strategy-proof multi-unit double auction scheme for spectrum allocation in ubiquitous communications (2013) (0)
- On the Security of an identity-based short signature scheme (2012) (0)
- Link Us if You Can: Enabling Unlinkable Communication on the Internet (2018) (0)
- Exploiting Cantor Expansion for Covert Channels over LTE-Advanced (2017) (0)
- Locally Differentially Private Heterogeneous Graph Aggregation with Utility Optimization (2023) (0)
- A Hybrid Covert Channel Over LTE-A System (2017) (0)
- Privacy-Preserving Mining of Association Rules for Smart Grid (2014) (0)
- Sprite: a Novel Strategy‐proof Multi‐unit Double Auction Framework for Spectrum Allocation in Wireless Communications (0)
- Spatial Sketch Configuration for Traffic Measurement in Software Defined Networks (2021) (0)
- A Real Time Wireless Interactive Multimedia System (2016) (0)
- A wifi-based low-cost mobile video surveillance system for dynamic police force deployment and real-time guard for public security (2010) (0)
- Cluster-based location report for person tracking in wireless sensor networks (2008) (0)
- Nearly Optimal Probabilistic Coverage for Roadside Advertisement Dissemination in Urban VANETs (2015) (0)
- Research on Informatization Forecasting Particulate Matter Using Spatio-Temporal Data (2021) (0)
- Quality-Aware Online Task Assignment Using Latent Topic Model (2018) (0)
- A Robust Relay Selection Scheme for Cooperative Communication Network (2012) (0)
- Quantum–classical hybrid quantum superdense coding (2013) (0)
- Hybrid Teleportation between Qutrit and Qubit (2015) (0)
- A Transmit Antenna Selection for MIMO Wireless Ad-Hoc Networks in Lossy Environment (2009) (0)
- How Bob in Quantum Private Query Protocol Gets the Element? (2019) (0)
- A novel structural mass based dissimilarity measure (2016) (0)
- Joint Backup Controller Placement and Routing for Low Invasive Flow Statistics Collection in SDNs (2023) (0)
- Coverage-preserving Data Gathering in Wireless Sensor Networks (2007) (0)
- Enhancing Federated Learning With Server-Side Unlabeled Data by Adaptive Client and Data Selection (2023) (0)
- An improved entropy-based approach to steganalysis of compressed speech (2018) (0)
- Author ' s personal copy Interface assignment and bandwidth allocation for multi-channel wireless mesh networks (2008) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Liu-sheng Huang?
Liu-sheng Huang is affiliated with the following schools: