罗伟其

发布者:2023-11-17发布者:53

Information SciencesIEEE Transactions on Neural Networks and Learning SystemsIEEE Transactions on Vehicular TechnologyIEEE Network等国际学术刊物发表了一批学术论文。5年来的部分论文列表如下:

[1]DeepChain: Auditable and Privacy-Preserving Deep Learning with Blockchain-Based Incentive. IEEE Transactions on Dependable and Secure Computing, 18(5): 2438-2455 (2021)

[2]Evolutionary Deep Belief Network for Cyber-Attack Detection in Industrial Automation and Control System. IEEE Transactions on Industrial Informatics 17(11): 7618-7627 (2021)

[3]Multi-View Gait Image Generation for Cross-View Gait Recognition.  IEEE Transactions on Image Processing, vol. 30, pp 3041-3055 (2021)

[4]Long Optimal and Small-Defect LRC Codes With Unbounded Minimum Distances. IEEE Transactions on Information Theory 67(5): 2786-2792 (2021)

[5]Orthogonal Least Squares Detector for Generalized Spatial Modulation. IEEE Transactions on Wireless Communications 20(8): 5071-5082 (2021)

[6]Effects of Different Proximity-Based Feedback on Virtual Hand Pointing in Virtual Reality. CGI 2021: 608-620

[7]Incorporating Global Context into Multi-task Learning for Session-Based Recommendation. KSEM 2021: 627-638

[8]Sample Balancing for Deep Learning-Based Visual Recognition. IEEE Transactions on Neural Networks and Learning Systems 31(10): 3962-3976 (2020)

[9]Peripheral-free Device Pairing by Randomly Switching Power. CoRR abs/2002.11288 (2020)

[10]DAMIA: Leveraging Domain Adaptation as a Defense against Membership Inference Attacks. CoRR abs/2005.08016 (2020)

[11]A hybrid universal blind quantum computation. Information Sciences 498: 135-143 (2019)

[12]Novel Properties of Successive Minima and Their Applications to 5G Tactile Internet. IEEE Transactions on Industrial Informatics 15(5): 3068-3076 (2019)

[13]BENBI: Scalable and Dynamic Access Control on the Northbound Interface of SDN-Based VANET. IEEE Transactions on Vehicular Technology, 68(1): 822-831 (2019)

[14]Onionchain: Towards Balancing Privacy and Traceability of Blockchain-Based Applications. CoRR abs/1909.03367 (2019)

[15]Long Optimal or Small-Defect LRC Codes with Unbounded Minimum Distances. CoRR abs/1910.07267 (2019)

[16]Fully distributed certificateless threshold signature without random oracles. Science China Information Sciences, 61(9): 098101:1-098101:3 (2018)

[17]REMT: A Real-Time End-to-End Media Data Transmission Mechanism in UAV-Aided Networks.IEEE Network, 32(5): 118-123 (2018)

[18]Single-server blind quantum computation with quantum circuit model. Quantum Information Processing 17(6): 134 (2018)

[19]Multiple-Task Learning and Knowledge Transfer Using Generative Adversarial Capsule Nets. Australasian Conference on Artificial Intelligence 2018: 669-680

[20]  Machine Learning-Based Malicious Application Detection of Android. IEEE Access 5: 25591-25601 (2017)

[21]Indistinguishability of pure orthogonal product states by LOCC. Quantum Information Processing, 16(7): 168 (2017)

[22]Strongly Unforgeable Certificateless Signature Resisting Attacks from Malicious-But-Passive KGC. Security and Communication Networks, 2017: 5704865:1-5704865:8 (2017)