2009 | ||
---|---|---|
50 | EE | Qing Li, An Liu, Hai Liu, Baoping Lin, Liusheng Huang, Naijie Gu: Web services provision: solutions, challenges and opportunities (invited paper). ICUIMC 2009: 80-87 |
49 | EE | Zhengyou Zhou, Liusheng Huang, Ye Yun: Privacy Preserving Attribute Reduction Based on Rough Set. WKDD 2009: 202-206 |
48 | EE | Youwen Zhu, Liusheng Huang, Wei Yang, Dong Li, Yonglong Luo, Fan Dong: Three New Approaches to Privacy-preserving Add to Multiply Protocol and its Application. WKDD 2009: 554-558 |
47 | EE | Xinxin Zhao, Liusheng Huang, Lingjun Li, Wei Yang, Zhili Chen, Zhenshan Yu: Steganalysis on Character Substitution Using Support Vector Machine. WKDD 2009: 84-88 |
2008 | ||
46 | EE | Qi Wang, Yonglong Luo, Liusheng Huang: Privacy-preserving Protocols for Finding the Convex Hulls. ARES 2008: 727-732 |
45 | EE | Shanliang Li, Liusheng Huang, Junmin Wu, Hongli Xu, Jichun Wang: NBLS: Neighbor-information-based localization system for wireless sensor networks. COMSWARE 2008: 91-94 |
44 | EE | Runhua Shi, Liusheng Huang, Yonglong Luo, Zhong Hong: A Threshold Multi-secret Sharing Scheme. ICNSC 2008: 1705-1707 |
43 | EE | Fang Song, Liusheng Huang, Wei Yang, Kan Yang: Building QKD Networks Based On a Novel QKD Scheme. ICNSC 2008: 596-601 |
42 | EE | Jun Wang, Weijia Jia, Liusheng Huang: An efficient centralized scheduling algorithm for IEEE 802.16 multi-radio mesh networks. ICUIMC 2008: 1-5 |
41 | EE | An Liu, Qing Li, Liusheng Huang, Hai Liu: Building Profit-Aware Service-Oriented Business Applications. ICWS 2008: 489-496 |
40 | EE | Hongli Xu, Liusheng Huang, Wang Liu, Ben Xu, Mingjun Xiao: Topology control for minimal path interference in wireless sensor networks. ISCC 2008: 988-993 |
39 | EE | Zhili Chen, Liusheng Huang, Zhenshan Yu, Wei Yang, Lingjun Li, Xueling Zheng, Xinxin Zhao: Linguistic Steganography Detection Using Statistical Characteristics of Correlations between Words. Information Hiding 2008: 224-235 |
38 | EE | An Liu, Qing Li, Liusheng Huang, Mingjun Xiao, Hai Liu: QoS-Aware Scheduling of Web Services. WAIM 2008: 171-178 |
37 | EE | Runhua Shi, Liusheng Huang, Zhong Hong: An Efficient (t, n)-Threshold Multi-Secret Sharing Scheme. WKDD 2008: 580-583 |
36 | EE | Jichun Wang, Liusheng Huang, Xiang Li, He Huang, Jianbo Li: A Collaborative Localization Scheme from Connectivity in Wireless Sensor Networks. WWIC 2008: 213-223 |
35 | EE | Jun Wang, Huan Li, Weijia Jia, Liusheng Huang, Jingyuan Li: Interface assignment and bandwidth allocation for multi-channel wireless mesh networks. Computer Communications 31(17): 3995-4004 (2008) |
34 | EE | Jun Wang, Peng Du, Weijia Jia, Liusheng Huang, Huan Li: Joint bandwidth allocation, element assignment and scheduling for wireless mesh networks with MIMO links. Computer Communications 31(7): 1372-1384 (2008) |
2007 | ||
33 | EE | Wei Yang, Liusheng Huang, Yifei Yao, Zhili Chen: Quantum Oblivious Transfer Using Tripartite Entangled States. FGCN (1) 2007: 464-468 |
32 | EE | Jingyuan Li, Weijia Jia, Liusheng Huang, Mingjun Xiao, Jun Wang: An Efficient Source Peer Selection Algorithm in Hybrid P2P File Sharing Systems. ICA3PP 2007: 380-390 |
31 | EE | Jianbo Li, Liusheng Huang, Mingjun Xiao, Hongli Xu: A hybrid range-free localization scheme in wireless sensor networks work in progress. Infoscale 2007: 19 |
30 | EE | Hongli Xu, Liusheng Huang, Junmin Wu, Yang Wang, Ben Xu, Jichun Wang, Dashan Wang: Wireless fire monitoring system for ancient buildings. Infoscale 2007: 42 |
29 | EE | Weiwei Jing, Liusheng Huang, Yifei Yao, Weijiang Xu: Privacy-preserving statistical quantitative rules mining. Infoscale 2007: 68 |
28 | EE | Yifei Yao, Yonglong Luo, Liusheng Huang, Weiwei Jing, Wei Yang, Weijiang Xu: Privacy-preserving technology and its applications in statistics measurements. Infoscale 2007: 74 |
27 | EE | Ben Xu, Liusheng Huang, Hongli Xu, Jichun Wang, Yang Wang: An Efficient Data Exchange Protocol Using Improved Star Trees in Wireless Sensor Networks. MSN 2007: 153-164 |
26 | EE | Weijiang Xu, Liusheng Huang, Yonglong Luo, Yifei Yao, Weiwei Jing: Privacy-Preserving DBSCAN Clustering Over Vertically Partitioned Data. MUE 2007: 850-856 |
25 | EE | Hongli Xu, Liusheng Huang, Junmin Wu, Yang Wang: Coverage-preserving Data Gathering in Wireless Sensor Networks. SNPD (2) 2007: 14-19 |
24 | EE | Ruanhua Shi, Hong Zhong, Liusheng Huang: A (t, n)-threshold verified multi-secret sharing scheme based on ECDLP. SNPD (2) 2007: 9-13 |
23 | EE | Liusheng Huang, Hongli Xu, Yingyu Wan, Junmin Wu, Hong Li: An efficient synchronisation protocol for wireless sensor network. IJSNet 2(1/2): 17-24 (2007) |
22 | EE | Yonglong Luo, Liusheng Huang, Hong Zhong: Secure Two-Party Point-Circle Inclusion Problem. J. Comput. Sci. Technol. 22(1): 88-91 (2007) |
2006 | ||
21 | EE | Weiwei Jing, Liusheng Huang, Yonglong Luo, Weijiang Xu, Yifei Yao: An Algorithm for Privacy-Preserving Quantitative Association Rules Mining. DASC 2006: 315-324 |
20 | Wei Yang, Liusheng Huang, Yonglong Luo, Mingjun Xiao: Quantum Oblivious Transfer Based on POVM Measurements. FCS 2006: 154-162 | |
19 | EE | Mingjun Xiao, Kai Han, Liusheng Huang, Jing-Yuan Li: Privacy Preserving C4.5 Algorithm Over Horizontally Partitioned Data. GCC 2006: 78-85 |
18 | EE | Wei Yang, Liusheng Huang, Mingjun Xiao, Weiwei Jing: Quantum ANDOS Protocol with Unconditional Security. ICNC (2) 2006: 20-30 |
17 | EE | Hongli Xu, Liusheng Huang, Junmin Wu, Yang Wang, Jichun Wang, Xu Wang: Self-organization Data Gathering for Wireless Sensor Networks. MSN 2006: 650-661 |
16 | EE | An Liu, Liusheng Huang, Qing Li: QoS-Aware Web Services Composition Using Transactional Composition Operator. WAIM 2006: 217-228 |
15 | EE | An Liu, Liusheng Huang, Qing Li, Mingjun Xiao: Fault-Tolerant Orchestration of Transactional Web Services. WISE 2006: 90-101 |
14 | EE | Liusheng Huang, Hongli Xu, Yang Wang, Junmin Wu, Hong Li: Coverage and Exposure Paths in Wireless Sensor Networks. J. Comput. Sci. Technol. 21(4): 490-495 (2006) |
13 | EE | Keqiu Li, Hong Shen, Keishi Tajima, Liusheng Huang: An Effective Cache Replacement Algorithm in Transcoding-Enabled Proxies. The Journal of Supercomputing 35(2): 165-184 (2006) |
2005 | ||
12 | EE | Hongli Xu, Liusheng Huang, Yingyu Wan, Ben Xu: Accurate Time Synchronization for Wireless Sensor Networks. MSN 2005: 153-163 |
11 | EE | Mingjun Xiao, Liusheng Huang, Yonglong Luo, Hong Shen: Privacy Preserving ID3 Algorithm over Horizontally Partitioned Data. PDCAT 2005: 239-243 |
10 | EE | Hongli Xu, Liusheng Huang, Yingyu Wan, Kezhong Lu: Localized Algorithm for Coverage in Wireless Sensor Networks. PDCAT 2005: 750-754 |
9 | EE | Liusheng Huang, Hong Zhong, Hong Shen, Yonglong Luo: An Efficient Multiple-Precision Division Algorithm. PDCAT 2005: 971-974 |
2004 | ||
8 | EE | Haitao Tian, Liusheng Huang, Zhi Zhou, Yonglong Luo: Arm up Administrators: Automated Vulnerability Management. ISPAN 2004: 587-593 |
2003 | ||
7 | EE | Haitao Tian, Liusheng Huang, Zhi Zhou, Hui Zhang: Common Vulnerability Markup Language. ACNS 2003: 228-240 |
6 | EE | Haitao Tian, Liusheng Huang, Jiulong Shan, Guoliang Chen: Automated Vulnerability Management through Web Services. GCC (1) 2003: 1067-1070 |
2002 | ||
5 | Xiaodong Gu, Guoliang Chen, Jun Gu, Liusheng Huang, Yunjae Jung: Performance Analysis and Improvement for Some Linear On-Line Bin-Packing Algorithms. J. Comb. Optim. 6(4): 455-471 (2002) | |
4 | EE | Yinlong Xu, Guoliang Chen, Liusheng Huang, Yingyu Wan: Optimal Bandwidth Utilization of All-Optical Ring with a Converter of Degree 4. J. Comput. Sci. Technol. 17(4): 411-419 (2002) |
2000 | ||
3 | EE | Liusheng Huang, Huaping Chen, Wang Xun, Guoliang Chen: A Fast Algorithm for Mining Association Rules. J. Comput. Sci. Technol. 15(6): 619-624 (2000) |
1996 | ||
2 | Liusheng Huang, John Chung-Mong Lee, Qing Li, Wei Xiong: Experimental Video Database Management System Based on Advanced Object-Oriented Techniques. Storage and Retrieval for Image and Video Databases (SPIE) 1996: 158-169 | |
1995 | ||
1 | EE | Qing Li, Liusheng Huang: A Dynamic Data Model for a Video Database Management System. ACM Comput. Surv. 27(4): 602-606 (1995) |