Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    You Need to Look Globally: Discovering Representative Topology Structures to Enhance Graph Neural Network

    Graph Neural Networks (GNNs) have shown great ability in modeling graph-structured data. However, most current models aggregate information from the local neighborhoods of a node. They may fail to explicitly e...

    Huaisheng Zhu, **anfeng Tang, Tian**ang Zhao in Advances in Knowledge Discovery and Data M… (2023)

  2. Article

    Open Access

    Top k Optimal Sequenced Route Query with POI Preferences

    The optimal sequenced route (OSR) query, as a popular problem in route planning for smart cities, searches for a minimum-distance route passing through several POIs in a specific order from a starting position...

    Huaijie Zhu, Wenbin Li, Wei Liu, Jian Yin, Jianliang Xu in Data Science and Engineering (2022)

  3. Article

    Open Access

    Querying Optimal Routes for Group Meetup

    Motivated by location-based social networks which allow people to access location-based services as a group, we study a novel variant of optimal sequenced route (OSR) queries, optimal sequenced route for group me...

    Bo Chen, Huaijie Zhu, Wei Liu, Jian Yin, Wang-Chien Lee in Data Science and Engineering (2021)

  4. No Access

    Chapter and Conference Paper

    The Design of Inspection Robot Navigation Systems Based on Distributed Vision

    This paper focuses on inspection robot navigation systems based on distributed vision in order to solve the navigation problem for indoor inspection robots in an unknown environment. Firstly, the robot platfor...

    Lei Wang, Hua Zhu, Peng Li, Change Chen in Intelligent Robotics and Applications (2019)

  5. No Access

    Chapter and Conference Paper

    IMU-Aided Ultra-wideband Based Localization for Coal Mine Robots

    Robotic mining equipment is playing an increasingly important role in coal mine operations. Due to the complexity of underground occlusion environment, the localization methods available are limited, which res...

    Meng-gang Li, Hua Zhu, Shao-ze You, Lei Wang in Intelligent Robotics and Applications (2019)

  6. No Access

    Chapter and Conference Paper

    Long-Term Real-Time Correlation Filter Tracker for Mobile Robot

    Computer vision has received a significant attention in recent years, which is one of the important parts for robots to apperceive external environment. Discriminative Correlation Filter (DCF) based trackers g...

    Shaoze You, Hua Zhu, Menggang Li, Lei Wang in Intelligent Robotics and Applications (2019)

  7. No Access

    Chapter and Conference Paper

    Further Evidence for Role of Promoter Polymorphisms in TNF Gene in Alzheimer’s Disease

    Tumor necrosis factor (TNF) expression level is associated with regulating effects on Alzheimer’s disease (AD) development. And several TNF SNPs have been reported to associate with AD, however, it is unclear whe...

    Yannan Bin, Ling Shu, Qizhi Zhu in Intelligent Computing Theories and Applica… (2018)

  8. No Access

    Chapter and Conference Paper

    A Novel Approach Based on Bi-Random Walk to Predict Microbe-Disease Associations

    An increasing number of clinical observations have confirmed that the microbes inhabiting in human body have critical impacts on the progression of human disease, which provides promising insights into underst...

    **anjun Shen, Huan Zhu, **ngpeng Jiang, **aohua Hu in Intelligent Computing Methodologies (2018)

  9. No Access

    Chapter and Conference Paper

    Distributed Multi-user, Multi-key Searchable Encryptions Resilient Fault Tolerance

    In this paper, a construction of distributed multi-user, multi-key searchable encryptions is proposed and analyzed. Our scheme leverages a combination of the Shamir’s threshold secret key sharing, the Pohlig-H...

    Huafei Zhu in Trusted Systems (2016)

  10. No Access

    Chapter and Conference Paper

    Universally Composable Oblivious Database in the Presence of Malicious Adversaries

    The core technique for constructing oblivious database is to get efficient implementations of oblivious transfer. This paper studies universally composable 1-out-of-n oblivious transfer (OT

    Huafei Zhu in Trusted Systems (2016)

  11. No Access

    Chapter and Conference Paper

    The Chained Mesh-Under Routing (C-MUR) for Improving IPv6 Packet Arrival Rate over Wireless Sensor Networks

    The 6LoWPAN protocol is used in delivering IPv6 packet over IEEE 802.15.4 based wireless sensor networks (WSNs). In 6LoWPAN, adaptation layer is introduced in the protocol stack so that routing can be performe...

    Yi-Hua Zhu, Gan Chen, Kaikai Chi, Yanjun Li in Advances in Wireless Sensor Networks (2013)

  12. No Access

    Chapter and Conference Paper

    Maximizing the Lifetime of Unreliable Sensor Networks with Delay Constraint via Genetic Algorithm

    Energy saving is a key issue for prolonging the runtime of Wireless Sensor Network (WSN). In real-time applications of WSN, it is required to deliver data to the sink within a delay constraint. It is significa...

    Yueyun Shen, Yanjun Li, Yi-Hua Zhu in Advances in Wireless Sensor Networks (2013)

  13. Chapter and Conference Paper

    Sustainable Pseudo-random Number Generator

    Barak and Halevi (BH) have proposed an efficient architecture for robust pseudorandom generators that ensure resilience in the presence of attackers with partial knowledge or partial controls of the generators...

    Huafei Zhu, Wee-Siong Ng, See-Kiong Ng in Security and Privacy Protection in Informa… (2013)

  14. No Access

    Chapter and Conference Paper

    Similarity Measurement and Feature Selection Using Genetic Algorithm

    This paper proposes a novel approach to search for the optimal combination of a measure function and feature weights using an evolutionary algorithm. Different combinations of measure function and feature weig...

    Shangfei Wang, Shan He, Hua Zhu in Advances in Neural Networks – ISNN 2012 (2012)

  15. No Access

    Chapter and Conference Paper

    Adaptive and Composable Non-interactive String-Commitment Protocols

    In this paper, a non-interactive string-commitment protocol in the common reference string model is presented and analyzed. We show that the proposed (length-flexible) commitment protocol realizes the universa...

    Huafei Zhu, Tadashi Araragi, Takashi Nishide in e-Business and Telecommunications (2012)

  16. No Access

    Chapter and Conference Paper

    Universally Composable Non-committing Encryptions in the Presence of Adaptive Adversaries

    Designing non-committing encryptions tolerating adaptive adversaries is a challenging task. In this paper, a simple implementation of non-committing encryptions is presented and analyzed in the strongest secur...

    Huafei Zhu, Tadashi Araragi, Takashi Nishide in e-Business and Telecommunications (2012)

  17. No Access

    Chapter and Conference Paper

    Error-free, Multi-bit Non-committing Encryption with Constant Round Complexity

    This paper studies error-free, multi-bit non-committing encryptions in the universally composable (UC) framework with constant round complexity. Previous efficient protocols such as the Beaver’s protocol and t...

    Huafei Zhu, Feng Bao in Information Security and Cryptology (2011)

  18. No Access

    Chapter and Conference Paper

    Adaptive and Composable Non-committing Encryptions

    In this paper, a new non-committing encryption protocol without failure during the course of a channel setup procedure is constructed and analyzed in the universally composable (UC) framework. We show that the...

    Huafei Zhu, Tadashi Araragi, Takashi Nishide in Information Security and Privacy (2010)

  19. No Access

    Chapter and Conference Paper

    Constructing Universally Composable Oblivious Transfers from Double Trap-Door Encryptions

    In this paper, a new implementation of universally composable, 1-out-of-2 oblivious transfer in the presence of static adversaries is presented and analyzed. Our scheme is constructed from the state-of-the-art...

    Huafei Zhu, Feng Bao in Progress in Cryptology – AFRICACRYPT 2009 (2009)

  20. No Access

    Chapter and Conference Paper

    Black-Box Constructions for Fully-Simulatable Oblivious Transfer Protocols

    This paper studies constructions of \(k \choose 1\) - oblivious transfer protocols in a black-box way. The security of

    Huafei Zhu in Cryptology and Network Security (2008)

previous disabled Page of 2