Cosine-transform-based chaotic system for image encryption Z Hua, Y Zhou, H Huang Information Sciences 480, 403-419, 2019 | 696 | 2019 |
2D Logistic-Sine-coupling map for image encryption Z Hua, F Jin, B Xu, H Huang Signal Processing 149, 148-161, 2018 | 541 | 2018 |
Cross-plane colour image encryption using a two-dimensional logistic tent modular map Z Hua, Z Zhu, S Yi, Z Zhang, H Huang Information Sciences 546, 1063-1083, 2021 | 251 | 2021 |
Resource provision algorithms in cloud computing: A survey J Zhang, H Huang, X Wang Journal of network and computer applications 64, 23-42, 2016 | 227 | 2016 |
Collaborative data downloading by using inter-satellite links in LEO satellite networks X Jia, T Lv, F He, H Huang IEEE Transactions on Wireless Communications 16 (3), 1523-1532, 2017 | 180 | 2017 |
A novel text mining approach to financial time series forecasting B Wang, H Huang, X Wang Neurocomputing 83, 136-145, 2012 | 162 | 2012 |
Image encryption using Josephus problem and filtering diffusion Z Hua, B Xu, F Jin, H Huang Ieee Access 7, 8660-8674, 2019 | 157 | 2019 |
MedShare: A privacy-preserving medical data sharing system by using blockchain M Wang, Y Guo, C Zhang, C Wang, H Huang, X Jia IEEE Transactions on Services Computing 16 (1), 438-451, 2021 | 104 | 2021 |
Minimizing energy cost by dynamic switching ON/OFF base stations in cellular networks N Yu, Y Miao, L Mu, H Du, H Huang, X Jia IEEE Transactions on Wireless Communications 15 (11), 7457-7469, 2016 | 86 | 2016 |
Design and verification of enhanced secure localization scheme in wireless sensor networks D He, L Cui, H Huang, M Ma IEEE transactions on Parallel and Distributed Systems 20 (7), 1050-1058, 2008 | 74 | 2008 |
Vision-based hand gesture recognition using combinational features C Yu, X Wang, H Huang, J Shen, K Wu 2010 Sixth International Conference on Intelligent Information Hiding and …, 2010 | 72 | 2010 |
Structure and behavior preservation by Petri-net-based refinements in system design H Huang, T Cheung, WM Mak Theoretical Computer Science 328 (3), 245-269, 2004 | 68 | 2004 |
Power metering for virtual machine in cloud computing-challenges and opportunities C Gu, H Huang, X Jia IEEE Access 2, 1106-1116, 2014 | 57 | 2014 |
Greening cloud data centers in an economical way by energy trading with power grid C Gu, L Fan, W Wu, H Huang, X Jia Future Generation Computer Systems 78, 89-101, 2018 | 55 | 2018 |
Collaborative service placement for mobile edge computing applications N Yu, Q Xie, Q Wang, H Du, H Huang, X Jia 2018 IEEE Global Communications Conference (GLOBECOM), 1-6, 2018 | 52 | 2018 |
Optimal RSUs deployment with delay bound along highways in VANET C Liu, H Huang, H Du Journal of Combinatorial Optimization 33, 1168-1182, 2017 | 51 | 2017 |
Formal specification and verification of modular security policy based on colored Petri nets H Huang, H Kirchner IEEE Transactions on Dependable and Secure Computing 8 (6), 852-865, 2010 | 51 | 2010 |
Context-aware embedding for targeted aspect-based sentiment analysis B Liang, J Du, R Xu, B Li, H Huang arXiv preprint arXiv:1906.06945, 2019 | 50 | 2019 |
Rumor restriction in online social networks S Li, Y Zhu, D Li, D Kim, H Huang 2013 IEEE 32nd international performance computing and communications …, 2013 | 48 | 2013 |
Lifelong multi-agent path finding in a dynamic environment Q Wan, C Gu, S Sun, M Chen, H Huang, X Jia 2018 15th International Conference on Control, Automation, Robotics and …, 2018 | 47 | 2018 |