Follow
Hejiao Huang
Hejiao Huang
哈尔滨工业大学深圳
Verified email at hitsz.edu.cn - Homepage
Title
Cited by
Cited by
Year
Cosine-transform-based chaotic system for image encryption
Z Hua, Y Zhou, H Huang
Information Sciences 480, 403-419, 2019
6962019
2D Logistic-Sine-coupling map for image encryption
Z Hua, F Jin, B Xu, H Huang
Signal Processing 149, 148-161, 2018
5412018
Cross-plane colour image encryption using a two-dimensional logistic tent modular map
Z Hua, Z Zhu, S Yi, Z Zhang, H Huang
Information Sciences 546, 1063-1083, 2021
2512021
Resource provision algorithms in cloud computing: A survey
J Zhang, H Huang, X Wang
Journal of network and computer applications 64, 23-42, 2016
2272016
Collaborative data downloading by using inter-satellite links in LEO satellite networks
X Jia, T Lv, F He, H Huang
IEEE Transactions on Wireless Communications 16 (3), 1523-1532, 2017
1802017
A novel text mining approach to financial time series forecasting
B Wang, H Huang, X Wang
Neurocomputing 83, 136-145, 2012
1622012
Image encryption using Josephus problem and filtering diffusion
Z Hua, B Xu, F Jin, H Huang
Ieee Access 7, 8660-8674, 2019
1572019
MedShare: A privacy-preserving medical data sharing system by using blockchain
M Wang, Y Guo, C Zhang, C Wang, H Huang, X Jia
IEEE Transactions on Services Computing 16 (1), 438-451, 2021
1042021
Minimizing energy cost by dynamic switching ON/OFF base stations in cellular networks
N Yu, Y Miao, L Mu, H Du, H Huang, X Jia
IEEE Transactions on Wireless Communications 15 (11), 7457-7469, 2016
862016
Design and verification of enhanced secure localization scheme in wireless sensor networks
D He, L Cui, H Huang, M Ma
IEEE transactions on Parallel and Distributed Systems 20 (7), 1050-1058, 2008
742008
Vision-based hand gesture recognition using combinational features
C Yu, X Wang, H Huang, J Shen, K Wu
2010 Sixth International Conference on Intelligent Information Hiding and …, 2010
722010
Structure and behavior preservation by Petri-net-based refinements in system design
H Huang, T Cheung, WM Mak
Theoretical Computer Science 328 (3), 245-269, 2004
682004
Power metering for virtual machine in cloud computing-challenges and opportunities
C Gu, H Huang, X Jia
IEEE Access 2, 1106-1116, 2014
572014
Greening cloud data centers in an economical way by energy trading with power grid
C Gu, L Fan, W Wu, H Huang, X Jia
Future Generation Computer Systems 78, 89-101, 2018
552018
Collaborative service placement for mobile edge computing applications
N Yu, Q Xie, Q Wang, H Du, H Huang, X Jia
2018 IEEE Global Communications Conference (GLOBECOM), 1-6, 2018
522018
Optimal RSUs deployment with delay bound along highways in VANET
C Liu, H Huang, H Du
Journal of Combinatorial Optimization 33, 1168-1182, 2017
512017
Formal specification and verification of modular security policy based on colored Petri nets
H Huang, H Kirchner
IEEE Transactions on Dependable and Secure Computing 8 (6), 852-865, 2010
512010
Context-aware embedding for targeted aspect-based sentiment analysis
B Liang, J Du, R Xu, B Li, H Huang
arXiv preprint arXiv:1906.06945, 2019
502019
Rumor restriction in online social networks
S Li, Y Zhu, D Li, D Kim, H Huang
2013 IEEE 32nd international performance computing and communications …, 2013
482013
Lifelong multi-agent path finding in a dynamic environment
Q Wan, C Gu, S Sun, M Chen, H Huang, X Jia
2018 15th International Conference on Control, Automation, Robotics and …, 2018
472018
The system can't perform the operation now. Try again later.
Articles 1–20