| 2009 |
| 50 | EE | Qing Li,
An Liu,
Hai Liu,
Baoping Lin,
Liusheng Huang,
Naijie Gu:
Web services provision: solutions, challenges and opportunities (invited paper).
ICUIMC 2009: 80-87 |
| 49 | EE | Zhengyou Zhou,
Liusheng Huang,
Ye Yun:
Privacy Preserving Attribute Reduction Based on Rough Set.
WKDD 2009: 202-206 |
| 48 | EE | Youwen Zhu,
Liusheng Huang,
Wei Yang,
Dong Li,
Yonglong Luo,
Fan Dong:
Three New Approaches to Privacy-preserving Add to Multiply Protocol and its Application.
WKDD 2009: 554-558 |
| 47 | EE | Xinxin Zhao,
Liusheng Huang,
Lingjun Li,
Wei Yang,
Zhili Chen,
Zhenshan Yu:
Steganalysis on Character Substitution Using Support Vector Machine.
WKDD 2009: 84-88 |
| 2008 |
| 46 | EE | Qi Wang,
Yonglong Luo,
Liusheng Huang:
Privacy-preserving Protocols for Finding the Convex Hulls.
ARES 2008: 727-732 |
| 45 | EE | Shanliang Li,
Liusheng Huang,
Junmin Wu,
Hongli Xu,
Jichun Wang:
NBLS: Neighbor-information-based localization system for wireless sensor networks.
COMSWARE 2008: 91-94 |
| 44 | EE | Runhua Shi,
Liusheng Huang,
Yonglong Luo,
Zhong Hong:
A Threshold Multi-secret Sharing Scheme.
ICNSC 2008: 1705-1707 |
| 43 | EE | Fang Song,
Liusheng Huang,
Wei Yang,
Kan Yang:
Building QKD Networks Based On a Novel QKD Scheme.
ICNSC 2008: 596-601 |
| 42 | EE | Jun Wang,
Weijia Jia,
Liusheng Huang:
An efficient centralized scheduling algorithm for IEEE 802.16 multi-radio mesh networks.
ICUIMC 2008: 1-5 |
| 41 | EE | An Liu,
Qing Li,
Liusheng Huang,
Hai Liu:
Building Profit-Aware Service-Oriented Business Applications.
ICWS 2008: 489-496 |
| 40 | EE | Hongli Xu,
Liusheng Huang,
Wang Liu,
Ben Xu,
Mingjun Xiao:
Topology control for minimal path interference in wireless sensor networks.
ISCC 2008: 988-993 |
| 39 | EE | Zhili Chen,
Liusheng Huang,
Zhenshan Yu,
Wei Yang,
Lingjun Li,
Xueling Zheng,
Xinxin Zhao:
Linguistic Steganography Detection Using Statistical Characteristics of Correlations between Words.
Information Hiding 2008: 224-235 |
| 38 | EE | An Liu,
Qing Li,
Liusheng Huang,
Mingjun Xiao,
Hai Liu:
QoS-Aware Scheduling of Web Services.
WAIM 2008: 171-178 |
| 37 | EE | Runhua Shi,
Liusheng Huang,
Zhong Hong:
An Efficient (t, n)-Threshold Multi-Secret Sharing Scheme.
WKDD 2008: 580-583 |
| 36 | EE | Jichun Wang,
Liusheng Huang,
Xiang Li,
He Huang,
Jianbo Li:
A Collaborative Localization Scheme from Connectivity in Wireless Sensor Networks.
WWIC 2008: 213-223 |
| 35 | EE | Jun Wang,
Huan Li,
Weijia Jia,
Liusheng Huang,
Jingyuan Li:
Interface assignment and bandwidth allocation for multi-channel wireless mesh networks.
Computer Communications 31(17): 3995-4004 (2008) |
| 34 | EE | Jun Wang,
Peng Du,
Weijia Jia,
Liusheng Huang,
Huan Li:
Joint bandwidth allocation, element assignment and scheduling for wireless mesh networks with MIMO links.
Computer Communications 31(7): 1372-1384 (2008) |
| 2007 |
| 33 | EE | Wei Yang,
Liusheng Huang,
Yifei Yao,
Zhili Chen:
Quantum Oblivious Transfer Using Tripartite Entangled States.
FGCN (1) 2007: 464-468 |
| 32 | EE | Jingyuan Li,
Weijia Jia,
Liusheng Huang,
Mingjun Xiao,
Jun Wang:
An Efficient Source Peer Selection Algorithm in Hybrid P2P File Sharing Systems.
ICA3PP 2007: 380-390 |
| 31 | EE | Jianbo Li,
Liusheng Huang,
Mingjun Xiao,
Hongli Xu:
A hybrid range-free localization scheme in wireless sensor networks work in progress.
Infoscale 2007: 19 |
| 30 | EE | Hongli Xu,
Liusheng Huang,
Junmin Wu,
Yang Wang,
Ben Xu,
Jichun Wang,
Dashan Wang:
Wireless fire monitoring system for ancient buildings.
Infoscale 2007: 42 |
| 29 | EE | Weiwei Jing,
Liusheng Huang,
Yifei Yao,
Weijiang Xu:
Privacy-preserving statistical quantitative rules mining.
Infoscale 2007: 68 |
| 28 | EE | Yifei Yao,
Yonglong Luo,
Liusheng Huang,
Weiwei Jing,
Wei Yang,
Weijiang Xu:
Privacy-preserving technology and its applications in statistics measurements.
Infoscale 2007: 74 |
| 27 | EE | Ben Xu,
Liusheng Huang,
Hongli Xu,
Jichun Wang,
Yang Wang:
An Efficient Data Exchange Protocol Using Improved Star Trees in Wireless Sensor Networks.
MSN 2007: 153-164 |
| 26 | EE | Weijiang Xu,
Liusheng Huang,
Yonglong Luo,
Yifei Yao,
Weiwei Jing:
Privacy-Preserving DBSCAN Clustering Over Vertically Partitioned Data.
MUE 2007: 850-856 |
| 25 | EE | Hongli Xu,
Liusheng Huang,
Junmin Wu,
Yang Wang:
Coverage-preserving Data Gathering in Wireless Sensor Networks.
SNPD (2) 2007: 14-19 |
| 24 | EE | Ruanhua Shi,
Hong Zhong,
Liusheng Huang:
A (t, n)-threshold verified multi-secret sharing scheme based on ECDLP.
SNPD (2) 2007: 9-13 |
| 23 | EE | Liusheng Huang,
Hongli Xu,
Yingyu Wan,
Junmin Wu,
Hong Li:
An efficient synchronisation protocol for wireless sensor network.
IJSNet 2(1/2): 17-24 (2007) |
| 22 | EE | Yonglong Luo,
Liusheng Huang,
Hong Zhong:
Secure Two-Party Point-Circle Inclusion Problem.
J. Comput. Sci. Technol. 22(1): 88-91 (2007) |
| 2006 |
| 21 | EE | Weiwei Jing,
Liusheng Huang,
Yonglong Luo,
Weijiang Xu,
Yifei Yao:
An Algorithm for Privacy-Preserving Quantitative Association Rules Mining.
DASC 2006: 315-324 |
| 20 | | Wei Yang,
Liusheng Huang,
Yonglong Luo,
Mingjun Xiao:
Quantum Oblivious Transfer Based on POVM Measurements.
FCS 2006: 154-162 |
| 19 | EE | Mingjun Xiao,
Kai Han,
Liusheng Huang,
Jing-Yuan Li:
Privacy Preserving C4.5 Algorithm Over Horizontally Partitioned Data.
GCC 2006: 78-85 |
| 18 | EE | Wei Yang,
Liusheng Huang,
Mingjun Xiao,
Weiwei Jing:
Quantum ANDOS Protocol with Unconditional Security.
ICNC (2) 2006: 20-30 |
| 17 | EE | Hongli Xu,
Liusheng Huang,
Junmin Wu,
Yang Wang,
Jichun Wang,
Xu Wang:
Self-organization Data Gathering for Wireless Sensor Networks.
MSN 2006: 650-661 |
| 16 | EE | An Liu,
Liusheng Huang,
Qing Li:
QoS-Aware Web Services Composition Using Transactional Composition Operator.
WAIM 2006: 217-228 |
| 15 | EE | An Liu,
Liusheng Huang,
Qing Li,
Mingjun Xiao:
Fault-Tolerant Orchestration of Transactional Web Services.
WISE 2006: 90-101 |
| 14 | EE | Liusheng Huang,
Hongli Xu,
Yang Wang,
Junmin Wu,
Hong Li:
Coverage and Exposure Paths in Wireless Sensor Networks.
J. Comput. Sci. Technol. 21(4): 490-495 (2006) |
| 13 | EE | Keqiu Li,
Hong Shen,
Keishi Tajima,
Liusheng Huang:
An Effective Cache Replacement Algorithm in Transcoding-Enabled Proxies.
The Journal of Supercomputing 35(2): 165-184 (2006) |
| 2005 |
| 12 | EE | Hongli Xu,
Liusheng Huang,
Yingyu Wan,
Ben Xu:
Accurate Time Synchronization for Wireless Sensor Networks.
MSN 2005: 153-163 |
| 11 | EE | Mingjun Xiao,
Liusheng Huang,
Yonglong Luo,
Hong Shen:
Privacy Preserving ID3 Algorithm over Horizontally Partitioned Data.
PDCAT 2005: 239-243 |
| 10 | EE | Hongli Xu,
Liusheng Huang,
Yingyu Wan,
Kezhong Lu:
Localized Algorithm for Coverage in Wireless Sensor Networks.
PDCAT 2005: 750-754 |
| 9 | EE | Liusheng Huang,
Hong Zhong,
Hong Shen,
Yonglong Luo:
An Efficient Multiple-Precision Division Algorithm.
PDCAT 2005: 971-974 |
| 2004 |
| 8 | EE | Haitao Tian,
Liusheng Huang,
Zhi Zhou,
Yonglong Luo:
Arm up Administrators: Automated Vulnerability Management.
ISPAN 2004: 587-593 |
| 2003 |
| 7 | EE | Haitao Tian,
Liusheng Huang,
Zhi Zhou,
Hui Zhang:
Common Vulnerability Markup Language.
ACNS 2003: 228-240 |
| 6 | EE | Haitao Tian,
Liusheng Huang,
Jiulong Shan,
Guoliang Chen:
Automated Vulnerability Management through Web Services.
GCC (1) 2003: 1067-1070 |
| 2002 |
| 5 | | Xiaodong Gu,
Guoliang Chen,
Jun Gu,
Liusheng Huang,
Yunjae Jung:
Performance Analysis and Improvement for Some Linear On-Line Bin-Packing Algorithms.
J. Comb. Optim. 6(4): 455-471 (2002) |
| 4 | EE | Yinlong Xu,
Guoliang Chen,
Liusheng Huang,
Yingyu Wan:
Optimal Bandwidth Utilization of All-Optical Ring with a Converter of Degree 4.
J. Comput. Sci. Technol. 17(4): 411-419 (2002) |
| 2000 |
| 3 | EE | Liusheng Huang,
Huaping Chen,
Wang Xun,
Guoliang Chen:
A Fast Algorithm for Mining Association Rules.
J. Comput. Sci. Technol. 15(6): 619-624 (2000) |
| 1996 |
| 2 | | Liusheng Huang,
John Chung-Mong Lee,
Qing Li,
Wei Xiong:
Experimental Video Database Management System Based on Advanced Object-Oriented Techniques.
Storage and Retrieval for Image and Video Databases (SPIE) 1996: 158-169 |
| 1995 |
| 1 | EE | Qing Li,
Liusheng Huang:
A Dynamic Data Model for a Video Database Management System.
ACM Comput. Surv. 27(4): 602-606 (1995) |