
Zhen Han
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2020
- [j47]Jing Bai
, Xiaolin Chang
, Fumio Machida
, Kishor S. Trivedi
, Zhen Han
:
Analyzing Software Rejuvenation Techniques in a Virtualized System: Service Provider and User Views. IEEE Access 8: 6448-6459 (2020) - [j46]Zhi Chen
, Xiaolin Chang
, Zhen Han
, Yang Yang
:
Numerical Evaluation of Job Finish Time Under MTD Environment. IEEE Access 8: 11437-11446 (2020) - [j45]Jiaping Men
, Zhuo Lv, Xiaojun Zhou, Zhen Han
, Hequn Xian, Ya Nan Song
:
Machine Learning Methods for Industrial Protocol Security Analysis: Issues, Taxonomy, and Directions. IEEE Access 8: 83842-83857 (2020) - [j44]Wenjun Huang, Chao Liang, Chunxia Xiao, Zhen Han:
Video-Based Person Re-Identification With Unregulated Sequences. Int. J. Digit. Crime Forensics 12(2): 59-76 (2020) - [j43]Zhongyuan Wang, Kui Jiang
, Peng Yi, Zhen Han, Zheng He:
Ultra-dense GAN for satellite imagery super-resolution. Neurocomputing 398: 328-337 (2020) - [j42]Xiaofen Wang, Jun Chen, Kui Jiang
, Zhen Han, Weijian Ruan, Zhongyuan Wang, Chao Liang:
Single image de-raining via clique recursive feedback mechanism. Neurocomputing 417: 142-154 (2020) - [j41]Xiangyu Wei
, Guangquan Xu
, Hao Wang
, Yongzhong He, Zhen Han
, Wei Wang
:
Sensing Users' Emotional Intelligence in Social Networks. IEEE Trans. Comput. Soc. Syst. 7(1): 103-112 (2020) - [j40]Xiao Wang
, Chao Liang, Chen Chen
, Jun Chen, Zheng Wang, Zhen Han, Chunxia Xiao:
S3D: Scalable Pedestrian Detection via Score Scale Surface Discrimination. IEEE Trans. Circuits Syst. Video Technol. 30(10): 3332-3344 (2020) - [j39]Liang Chen
, Jinshan Pan
, Ruimin Hu
, Zhen Han, Chao Liang
, Yi Wu
:
Modeling and Optimizing of the Multi-Layer Nearest Neighbor Network for Face Image Super-Resolution. IEEE Trans. Circuits Syst. Video Technol. 30(12): 4513-4525 (2020) - [j38]Yike Li
, Yingxiao Xiang
, Endong Tong
, Wenjia Niu
, Bowei Jia
, Long Li
, Jiqiang Liu
, Zhen Han
:
An Empirical Study on GAN-Based Traffic Congestion Attack Analysis: A Visualized Method. Wirel. Commun. Mob. Comput. 2020: 8823300:1-8823300:14 (2020) - [c74]Zhen Han, Yunpu Ma, Yuyi Wang, Stephan Günnemann, Volker Tresp:
Graph Hawkes Neural Network for Forecasting on Temporal Knowledge Graphs. AKBC 2020 - [c73]Yunpu Ma, Zhen Han, Volker Tresp:
Learning with Temporal Knowledge Graphs. CIKM (Workshops) 2020 - [c72]Shuaijun Chen, Zhen Han, Enyan Dai, Xu Jia, Ziluan Liu, Xing Liu, Xueyi Zou, Chunjing Xu, Jianzhuang Liu, Qi Tian:
Unsupervised Image Super-Resolution with an Indirect Supervised Path. CVPR Workshops 2020: 1924-1933 - [c71]Zhen Han, Peng Chen, Yunpu Ma, Volker Tresp:
DyERNIE: Dynamic Evolution of Riemannian Manifold Embeddings for Temporal Knowledge Graph Completion. EMNLP (1) 2020: 7301-7316 - [c70]Yang Yang, Xiaolin Chang, Ziye Jia, Zhu Han, Zhen Han:
Processing in Memory Assisted MEC 3C Resource Allocation for Computation Offloading. ICA3PP (1) 2020: 695-709 - [c69]Kuangye Liu, Zhen Han, Junkui Chen, Chunlei Liu, Jun Chen, Zhongyuan Wang:
Image Super-Resolution Using Residual Global Context Network. ICASSP 2020: 2633-2637 - [c68]Zhen Han, Wei Wang, Mengze Yu, Huijin Fan:
Model Reference Adaptive Resilient Control of Uncertain Linear Systems with Intermittent DoS Attacks. IECON 2020: 3549-3555 - [c67]Xu Gao, Jiqiang Liu, Yike Li, Xiaojin Wang, Yingxiao Xiang, Endong Tong, Wenjia Niu, Zhen Han:
Queue Length Estimation Based Defence Against Data Poisoning Attack for Traffic Signal Control. Intelligent Information Processing 2020: 254-265 - [i9]Zhen Han, Yuyi Wang, Yunpu Ma, Stephan Günnemann, Volker Tresp:
Graph Hawkes Network for Reasoning on Temporal Knowledge Graphs. CoRR abs/2003.13432 (2020) - [i8]Zhen Han, Peng Chen, Yunpu Ma, Volker Tresp:
DyERNIE: Dynamic Evolution of Riemannian Manifold Embeddings for Temporal Knowledge Graph Completion. CoRR abs/2011.03984 (2020) - [i7]Zhen Han, Peng Chen, Yunpu Ma, Volker Tresp:
xERTE: Explainable Reasoning on Temporal Knowledge Graphs for Forecasting Future Links. CoRR abs/2012.15537 (2020)
2010 – 2019
- 2019
- [j37]Jiaping Men
, Guangquan Xu, Zhen Han, Zhonghao Sun, Xiaojun Zhou, Wenjuan Lian, Xiaochun Cheng
:
Finding Sands in the Eyes: Vulnerabilities Discovery in IoT With EUFuzzer on Human Machine Interface. IEEE Access 7: 103751-103759 (2019) - [j36]Shun Wang, Ye Du, Zhen Han:
An improved method of k-induction combined with predicate abstraction and CEGAR for software model checking. Clust. Comput. 22(Supplement): 6219-6229 (2019) - [j35]Tong Chen
, Jiqiang Liu, Yingxiao Xiang, Wenjia Niu, Endong Tong, Zhen Han:
Adversarial attack and defense in reinforcement learning-from AI security view. Cybersecur. 2(1): 11 (2019) - [j34]Zhongyuan Wang
, Peng Yi
, Kui Jiang
, Junjun Jiang
, Zhen Han, Tao Lu
, Jiayi Ma
:
Multi-Memory Convolutional Neural Network for Video Super-Resolution. IEEE Trans. Image Process. 28(5): 2530-2544 (2019) - [c66]Zhuosheng Jia, Zhen Han:
Research and Analysis of User Behavior Fingerprint on Security Situational Awareness Based on DNS Log. BESC 2019: 1-4 - [c65]Xiaofen Wang, Jun Chen, Zhen Han, Mingfu Xiong, Chao Liang, Qi Zheng, Zhongyuan Wang:
Rain Streak Removal via Multi-scale Mixture Exponential Power Model. ICASSP 2019: 1767-1771 - [c64]Kui Jiang
, Zhongyuan Wang, Peng Yi, Junjun Jiang
, Guangcheng Wang, Zhen Han, Tao Lu:
GAN-Based Multi-level Mapping Network for Satellite Imagery Super-Resolution. ICME 2019: 526-531 - [c63]Bo Liu, Xiaolin Chang, Yang Yang, Zhi Chen, Zhen Han:
Evaluating Performance of Active Containers on PaaS Fog under Batch Arrivals: A Modeling Approach. ISCC 2019: 1-6 - [c62]Xiangyu Wei, Jin Li, Zhen Han, Wei Wang:
Predicting Users' Emotional Intelligence with Social Networking Data. SocialSec 2019: 191-202 - [i6]Zhen Han, Enyan Dai, Xu Jia, Xiaoying Ren, Shuaijun Chen, Chunjing Xu, Jianzhuang Liu, Qi Tian:
Unsupervised Image Super-Resolution with an Indirect Supervised Path. CoRR abs/1910.02593 (2019) - 2018
- [j33]Zhi Chen, Xiaolin Chang, Zhen Han, Lin Li:
Survivability Modeling and Analysis of Cloud Service in Distributed Data Centers. Comput. J. 61(9): 1296-1305 (2018) - [j32]Bo Liu, Xiaolin Chang, Zhen Han, Kishor S. Trivedi, Ricardo J. Rodríguez:
Model-based sensitivity analysis of IaaS cloud availability. Future Gener. Comput. Syst. 83: 1-13 (2018) - [c61]Sheng Chen, Yang Liu, Xiang Gao, Zhen Han:
MobileFaceNets: Efficient CNNs for Accurate Real-Time Face Verification on Mobile Devices. CCBR 2018: 428-438 - [c60]Yingxiao Xiang, Wenjia Niu, Jiqiang Liu, Tong Chen, Zhen Han:
A PCA-Based Model to Predict Adversarial Examples on Q-Learning of Path Finding. DSC 2018: 773-780 - [c59]Jiaping Men, Wei Wang, Jiqiang Liu, Zhen Han:
Designing Mutual Authentication Protocols in Industrial Wireless Network. ICDIS 2018: 153-158 - [c58]Yongzhong He, Binghui Hu, Zhen Han:
Dynamic Privacy Leakage Analysis of Android Third-Party Libraries. ICDIS 2018: 275-280 - [c57]Han Liu, Zhen Han, Jin Guo, Xin Ding:
A Noise Robust Face Hallucination Framework Via Cascaded Model of Deep Convolutional Networks and Manifold Learning. ICME 2018: 1-6 - [c56]Yang Yang
, Xiaolin Chang, Zhen Han, Lin Li:
Delay-Aware Secure Computation Offloading Mechanism in a Fog-Cloud Framework. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 346-353 - [c55]Xin Ding, Ruimin Hu, Zhen Han, Zhongyuan Wang:
A Novel Frontal Facial Synthesis Algorithm Based on Individual Residual Face. MMM (2) 2018: 14-22 - [c54]Jin Guo, Jun Chen, Zhen Han, Han Liu, Zhongyuan Wang, Ruimin Hu:
Adaptive Aggregation Network for Face Hallucination. PCM (2) 2018: 190-199 - [i5]Sheng Chen, Yang Liu, Xiang Gao, Zhen Han:
MobileFaceNets: Efficient CNNs for Accurate Real-time Face Verification on Mobile Devices. CoRR abs/1804.07573 (2018) - [i4]Tong Chen, Wenjia Niu, Yingxiao Xiang, XiaoXuan Bai, Jiqiang Liu, Zhen Han, Gang Li:
Gradient Band-based Adversarial Training for Generalized Attack Immunity of A3C Path Finding. CoRR abs/1807.06752 (2018) - [i3]Sheng Chen, Jia Guo, Yang Liu, Xiang Gao, Zhen Han:
Global Norm-Aware Pooling for Pose-Robust Face Recognition at Low False Positive Rate. CoRR abs/1808.00435 (2018) - 2017
- [j31]Xing Wang, Wei Wang, Yongzhong He, Jiqiang Liu, Zhen Han, Xiangliang Zhang
:
Characterizing Android apps' behavior for effective detection of malapps at large scale. Future Gener. Comput. Syst. 75: 30-45 (2017) - [j30]Liang Chen, Ruimin Hu, Chao Liang, Qing Li, Zhen Han:
A novel face super resolution approach for noisy images using contour feature and standard deviation prior. Multim. Tools Appl. 76(2): 2467-2493 (2017) - [j29]Kebin Huang, Ruimin Hu, Junjun Jiang
, Zhen Han, Feng Wang:
HRM graph constrained dictionary learning for face image super-resolution. Multim. Tools Appl. 76(2): 3139-3162 (2017) - [j28]Liang Chen, Ruimin Hu, Zhen Han, Qing Li, Zheng Lu
:
Face super resolution based on parent patch prior for VLQ scenarios. Multim. Tools Appl. 76(7): 10231-10254 (2017) - [c53]Anna Zhang, Zhongyuan Wang, Zhen Han, Youming Fu, Zhen He:
H.264 based screen content coding with HSV quantization. CISP-BMEI 2017: 1-5 - [c52]Liang Chen, Ruimin Hu, Zhen Han, Zhongyuan Wang, Qing Li:
A joint learning based Face Super Resolution approach via contextual topological structure. ICASSP 2017: 1088-1092 - [c51]Anna Zhang, Zhen Han, Zhongyuan Wang:
Efficient mode decision for noisy video transcoding. ICASSP 2017: 1527-1531 - [i2]Ziqi Yan, Jiqiang Liu, Gang Li, Zhen Han, Shuo Qiu:
PrivMin: Differentially Private MinHash for Jaccard Similarity Computation. CoRR abs/1705.07258 (2017) - 2016
- [j27]Zhonghua Wang, Zhen Han, Jiqiang Liu:
Public verifiability for shared data in cloud storage with a defense against collusion attacks. Sci. China Inf. Sci. 59(3): 39101:1-39101:3 (2016) - [j26]Ryan Martin, Zhen Han:
A semiparametric scale-mixture regression model and predictive recursion maximum likelihood. Comput. Stat. Data Anal. 94: 75-85 (2016) - [j25]Qian Gao, Zhen Han, Yong-Zhong He, Daoshun Wang:
Two image encryption methods with hiding effect based on moiré pattern. Int. J. High Perform. Comput. Netw. 9(5/6): 382-393 (2016) - [j24]Yanfeng Shi, Jiqiang Liu, Zhen Han, Shuo Qiu:
Deterministic attribute-based encryption. Int. J. High Perform. Comput. Netw. 9(5/6): 443-450 (2016) - [j23]Zhongyuan Wang, Ruimin Hu, Junjun Jiang
, Zhen Han, Zhenfeng Shao:
Heteroskedasticity tuned mixed-norm sparse regularization for face hallucination. Multim. Tools Appl. 75(24): 17273-17301 (2016) - [j22]Junjun Jiang
, Ruimin Hu, Zhongyuan Wang, Zhen Han, Jiayi Ma
:
Facial Image Hallucination Through Coupled-Layer Neighbor Embedding. IEEE Trans. Circuits Syst. Video Technol. 26(9): 1674-1684 (2016) - [c50]Kefan Shen, Zhongyuan Wang, Zhen Han:
Fast video enhancement transcoding. ICIP 2016: 2177-2181 - [c49]Liang Chen, Ruimin Hu, Zhen Han, Zhongyuan Wang, Qing Li, Zheng Lu
:
Face Super Resolution for VLQ facial images via parent patch matching. IJCNN 2016: 2515-2521 - [c48]Kebin Huang, Ruimin Hu, Junjun Jiang
, Zhen Han, Feng Wang:
Face Image Super-Resolution Through Improved Neighbor Embedding. MMM (1) 2016: 409-420 - [c47]Xueli Wei, Ruimin Hu, Zhen Han, Liang Chen, Xin Ding:
A Stepwise Frontal Face Synthesis Approach for Large Pose Non-frontal Facial Image. PCM (2) 2016: 439-448 - [i1]Zhen Han, Alyson G. Wilson:
Dynamic Stacked Generalization for Node Classification on Networks. CoRR abs/1610.04804 (2016) - 2015
- [j21]Xuezhen Huang, Jiqiang Liu, Zhen Han, Jun Yang:
Privacy beyond sensitive values. Sci. China Inf. Sci. 58(7): 1-15 (2015) - [j20]Bin Xing, Zhen Han, Xiaolin Chang, Jiqiang Liu:
OB-IMA: out-of-the-box integrity measurement approach for guest virtual machines. Concurr. Comput. Pract. Exp. 27(5): 1092-1109 (2015) - [j19]Yanfeng Shi, Qingji Zheng, Jiqiang Liu, Zhen Han:
Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation. Inf. Sci. 295: 221-231 (2015) - [j18]Zhongyuan Wang, Zhen Han, Qijun Wang, Jinhui Hu:
Face Hallucination via Trend-Constrained Regularization. J. Signal Process. Syst. 79(1): 105-111 (2015) - [c46]Junjun Jiang, Ruimin Hu, Zhen Han, Liang Chen, Jun Chen:
Coupled Discriminant Multi-Manifold Analysis with Application to Low-Resolution Face Recognition. MMM (1) 2015: 37-48 - [c45]Mingfu Xiong, Jun Chen, Zheng Wang, Chao Liang, Qi Zheng, Zhen Han, Kaimin Sun:
Deep Feature Representation via Multiple Stack Auto-Encoders. PCM (1) 2015: 275-284 - [c44]Jun Liu, Chao Liang, Mang Ye, Zheng Wang, Yang Yang, Zhen Han, Kaimin Sun:
Person Re-identification via Attribute Confidence and Saliency. PCM (1) 2015: 591-600 - 2014
- [j17]Hongchao Wang
, Zhen Han, Dong Yang:
On Application-Customized Common Platform for Wireless Vehicular Sensor Networks. Int. J. Distributed Sens. Networks 10 (2014) - [j16]Zhongyuan Wang, Zhen Han, Ruimin Hu, Junjun Jiang
:
Noise robust face hallucination employing Gaussian-Laplacian mixture model. Neurocomputing 133: 153-160 (2014) - [j15]Junjun Jiang
, Ruimin Hu, Zhen Han, Tao Lu:
Efficient single image super-resolution via graph-constrained least squares regression. Multim. Tools Appl. 72(3): 2573-2596 (2014) - [j14]Junjun Jiang
, Ruimin Hu, Chao Liang, Zhen Han, Chunjie Zhang
:
Face image super-resolution through locality-induced support regression. Signal Process. 103: 168-183 (2014) - [j13]Wei Wang, Xing Wang, Dawei Feng, Jiqiang Liu, Zhen Han, Xiangliang Zhang
:
Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection. IEEE Trans. Inf. Forensics Secur. 9(11): 1869-1882 (2014) - [j12]Junjun Jiang
, Ruimin Hu, Zhongyuan Wang, Zhen Han:
Face Super-Resolution via Multilayer Locality-Constrained Iterative Neighbor Embedding and Intermediate Dictionary Learning. IEEE Trans. Image Process. 23(10): 4220-4231 (2014) - [j11]Junjun Jiang
, Ruimin Hu, Zhongyuan Wang, Zhen Han:
Noise Robust Face Hallucination via Locality-Constrained Representation. IEEE Trans. Multim. 16(5): 1268-1281 (2014) - [j10]Junjun Jiang
, Ruimin Hu, Zhen Han, Zhongyuan Wang:
Low-Resolution and Low-Quality Face Super-Resolution in Monitoring Scene via Support-Driven Sparse Coding. J. Signal Process. Syst. 75(3): 245-256 (2014) - [c43]Jian Guan, Ruimin Hu, Junjun Jiang
, Zhen Han:
Gabor-based patch covariance matrix for face sketch synthesis. ICIP 2014: 4642-4646 - [c42]Xuezhen Huang, Jiqiang Liu, Zhen Han:
A Privacy-Aware Access Model on Anonymized Data. INTRUST 2014: 201-212 - [c41]Liang Chen, Ruimin Hu, Junjun Jiang
, Zhen Han:
Efficient learning based face hallucination approach via facial standard deviation prior. ISCAS 2014: 2057-2060 - [c40]Xiaohui Dong, Ruimin Hu, Junjun Jiang, Zhen Han, Liang Chen, Ge Gao:
Noise Face Image Hallucination via Data-Driven Local Eigentransformation. PCM 2014: 183-192 - [c39]Anna Lan, Zhen Han, Dawei Zhang, Yichen Jiang, Tianhua Liu, Meihong Li:
An Anonymous Remote Attestation Protocol to Prevent Masquerading Attack. UIC/ATC/ScalCom 2014: 590-595 - 2013
- [j9]Junjun Jiang
, Ruimin Hu, Zhen Han, Zhongyuan Wang, Jun Chen:
Two-step superresolution approach for surveillance face image through radial basis function-partial least squares regression and locality-induced sparse representation. J. Electronic Imaging 22(4): 041120 (2013) - [j8]Kebin Huang, Ruimin Hu, Zhen Han, Tao Lu, Junjun Jiang
, Feng Wang:
Face Image Superresolution via Locality Preserving Projection and Sparse Coding. J. Softw. 8(8): 2039-2046 (2013) - [c38]Rui Zhong, Ruimin Hu, Zhongyuan Wang, Lu Liu, Zhen Han:
LBP-Guided Depth Image Filter. DCC 2013: 536 - [c37]Junjun Jiang
, Ruimin Hu, Zhongyuan Wang, Zhen Han, Shi Dong:
Manifold regularized sparse support regression for single image super-resolution. ICASSP 2013: 1429-1433 - [c36]Liang Chen, Ruimin Hu, Zhen Han, Yang Xia, Junjun Jiang
:
A joint learning based face hallucination approach for low quality face image. ICIP 2013: 972-975 - [c35]Junjun Jiang
, Ruimin Hu, Liang Chen, Zhen Han, Tao Lu, Jun Chen:
Coupled-layer neighbor embedding for surveillance face hallucination. ICIP 2013: 2802-2806 - [c34]Junjun Jiang
, Ruimin Hu, Zhen Han, Zhongyuan Wang, Tao Lu, Jun Chen:
Locality-constraint iterative neighbor embedding for face hallucination. ICME 2013: 1-6 - [c33]Tao Lu, Ruimin Hu, Zhen Han, Junjun Jiang
, Yang Xia:
Robust super-resolution for face images via principle component sparse representation and least squares regression. ISCAS 2013: 1199-1202 - [c32]Junjun Jiang
, Ruimin Hu, Zhongyuan Wang, Zixiang Xiong, Zhen Han:
Support-driven sparse coding for face hallucination. ISCAS 2013: 2980-2983 - [c31]Tao Lu, Ruimin Hu, Zhen Han, Junjun Jiang
, Yanduo Zhang:
From local representation to global face hallucination: A novel super-resolution method by nonnegative feature transformation. VCIP 2013: 1-6 - 2012
- [j7]Lijuan Zheng, Yingxin Hu, Zhen Han, Fei Ma:
Trusted Inter-Domain Fast Authentication Protocol in Split Mechanism Network. IEICE Trans. Inf. Syst. 95-D(11): 2728-2731 (2012) - [c30]Junjun Jiang
, Ruimin Hu, Zhen Han, Tao Lu, Kebin Huang:
A super-resolution method for low-quality face image through RBF-PLS regression and neighbor embedding. ICASSP 2012: 1253-1256 - [c29]Junjun Jiang
, Ruimin Hu, Zhen Han, Kebin Huang, Tao Lu:
Graph discriminant analysis on multi-manifold (GDAMM): A novel super-resolution method for face recognition. ICIP 2012: 1465-1468 - [c28]Junjun Jiang
, Ruimin Hu, Zhen Han, Tao Lu, Kebin Huang:
Position-Patch Based Face Hallucination via Locality-Constrained Representation. ICME 2012: 212-217 - [c27]Junjun Jiang
, Ruimin Hu, Zhen Han, Kebin Huang, Tao Lu:
Efficient Single Image Super-Resolution via Graph Embedding. ICME 2012: 610-615 - [c26]Yan Li, Zhen Han, Qiang He:
Multi-criteria sorting method based on AHP and variable precision rough set. ICMLC 2012: 261-266 - [c25]Kebin Huang, Ruimin Hu, Zhen Han, Tao Lu, Junjun Jiang, Feng Wang:
Face hallucination via K-selection mean constrained sparse representation. ICPR 2012: 882-885 - [c24]Zhiqiang Hou, Ruimin Hu, Zhongyuan Wang, Zhen Han:
Improvements of dynamic texture synthesis for video coding. ICPR 2012: 3148-3151 - [c23]Junjun Jiang
, Ruimin Hu, Zhen Han, Tao Lu, Kebin Huang:
Surveillance face hallucination via variable selection and manifold learning. ISCAS 2012: 2681-2684 - [c22]Zhen Han, Junjun Jiang
, Ruimin Hu, Tao Lu, Kebin Huang:
Face image super-resolution via nearest feature line. ACM Multimedia 2012: 769-772 - [c21]Jinhui Hu, Ruimin Hu, Zhongyuan Wang, Mang Duan, Rui Zhong, Zhen Han:
Least Square Based View Synthesis Prediction for Multi-view Video Coding. PCM 2012: 241-250 - [c20]Rui Zhong, Ruimin Hu, Yi Shi, Zhongyuan Wang, Zhen Han, Lu Liu, Jinhui Hu:
Just Noticeable Difference for 3D Images with Depth Saliency. PCM 2012: 414-423 - 2011
- [j6]Yong Min, Wei Gong, Xiaogang Jin, Jie Chang, Baojing Gu, Zhen Han, Ying Ge:
NCNA: Integrated platform for constructing, visualizing, analyzing and sharing human-mediated nitrogen biogeochemical networks. Environ. Model. Softw. 26(5): 678-679 (2011) - [j5]Lei Han, Jiqiang Liu, Zhen Han, Xueye Wei:
Design and implementation of a portable TPM scheme for general-purpose trusted computing based on EFI. Frontiers Comput. Sci. China 5(2): 169-180 (2011) - 2010
- [j4]Rui Zhang, Jiqiang Liu, Zhen Han, Lijuan Zheng:
An IBE scheme using ECC combined public key. Comput. Electr. Eng. 36(6): 1046-1054 (2010) - [j3]Jiqiang Liu, Xun Chen, Zhen Han:
Full and partial deniability for authentication schemes. Frontiers Comput. Sci. China 4(4): 516-521 (2010) - [j2]Yong-Zhong He, Zhen Han, Huirong Fu, Guangzhi Qu:
The Formal Model of DBMS Enforcing Multiple Security Polices. J. Softw. 5(5): 514-521 (2010) - [c19]Dawei Zhang, Zhen Han, Guangwen Yan:
A portable TPM based on USB key. CCS 2010: 750-752 - [c18]Chengdong Lan, Ruimin Hu, Zhen Han, Zhongyuan Wang:
A face super-resolution approach using shape semantic mode regularization. ICIP 2010: 2021-2024 - [c17]Chengdong Lan, Ruimin Hu, Tao Lu, Ding Luo, Zhen Han:
Global Face Super Resolution and Contour Region Constraints. ISNN (2) 2010: 120-127 - [c16]Chengdong Lan, Ruimin Hu, Kebin Huang, Zhen Han:
Face hallucination with shape parameters projection constraint. ACM Multimedia 2010: 883-886 - [c15]Dawei Zhang, Zhen Han, Wei Jin:
Optimized Java Card transaction mechanism based on object locality. SAC 2010: 550-551
2000 – 2009
- 2009
- [j1]Yong-Zhong He, Zhen Han:
User Authentication with Provable Security against Online Dictionary Attacks. J. Networks 4(3): 200-207 (2009) - [c14]Yong-Zhong He, Zhen Han, Huirong Fu:
Usage Control in Conditional Access System with malicious Set-top Box. Security and Management 2009: 201-205 - 2008
- [c13]Xiaolin Chang, Jogesh K. Muppala
, Zhen Han, Jiqiang Liu:
Analysis of Interrupt Coalescing Schemes for Receive-Livelock Problem in Gigabit Ethernet Network Hosts. ICC 2008: 1835-1839 - [c12]Jiqiang Liu, Jia Zhao, Zhen Han:
A remote anonymous attestation protocol in trusted computing. IPDPS 2008: 1-6 - [c11]Yong-Zhong He, Zhen Han, Ye Du:
Context Active RBAC and its Applications. ISECS 2008: 1041-1044 - 2007
- [c10]