default search action
Huamin Feng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j22]Chunyan Ma, Zhengwei Jiang, Kai Zhang, Zhiting Ling, Jun Jiang, Yizhe You, Peian Yang, Huamin Feng:
TIMFuser: A multi-granular fusion framework for cyber threat intelligence. Comput. Secur. 148: 104141 (2025) - 2024
- [j21]Rui Shi, Yang Yang, Yingjiu Li, Huamin Feng, HweeHwa Pang, Robert H. Deng:
AnoPas: Practical anonymous transit pass from group signatures with time-bound keys. J. Syst. Archit. 153: 103184 (2024) - [j20]Xiaolin Li, Jianguo Xie, Liwei Xu, Han Wu, Rui Shi, Huamin Feng:
Key space estimation and security analysis of superlattice physical unclonable function. Microelectron. J. 151: 106320 (2024) - [j19]Jie Zhang, Dongdong Chen, Jing Liao, Zehua Ma, Han Fang, Weiming Zhang, Huamin Feng, Gang Hua, Nenghai Yu:
Robust Model Watermarking for Image Processing Networks via Structure Consistency. IEEE Trans. Pattern Anal. Mach. Intell. 46(10): 6985-6992 (2024) - [j18]Ang Liu, Xiu-bo Chen, Gang Xu, Zhuo Wang, Ying Sun, Yonghao Wang, Huamin Feng:
QBIoV: a secure data sharing scheme for the Internet of vehicles based on quantum-enabled blockchain. Quantum Inf. Process. 23(6): 225 (2024) - [j17]Rui Shi, Yang Yang, Yingjiu Li, Huamin Feng, Guozhen Shi, HweeHwa Pang, Robert H. Deng:
Double Issuer-Hiding Attribute-Based Credentials From Tag-Based Aggregatable Mercurial Signatures. IEEE Trans. Dependable Secur. Comput. 21(4): 2585-2602 (2024) - [j16]Yuan Gao, Jinghan Li, Xiang Wang, Xiangnan He, Huamin Feng, Yongdong Zhang:
Revisiting Attack-Caused Structural Distribution Shift in Graph Anomaly Detection. IEEE Trans. Knowl. Data Eng. 36(9): 4849-4861 (2024) - [c28]Yizhe You, Zhengwei Jiang, Kai Zhang, Huamin Feng, Jun Jiang, Peian Yang:
TiGNet: Joint entity and relation triplets extraction for APT campaign threat intelligence. CSCWD 2024: 1687-1694 - [c27]Yuan Gao, Junfeng Fang, Yongduo Sui, Yangyang Li, Xiang Wang, Huamin Feng, Yongdong Zhang:
Graph Anomaly Detection with Bi-level Optimization. WWW 2024: 4383-4394 - [i5]Yuan Gao, Xiang Wang, Xiangnan He, Zhenguang Liu, Huamin Feng, Yongdong Zhang:
Alleviating Structural Distribution Shift in Graph Anomaly Detection. CoRR abs/2401.14155 (2024) - 2023
- [j15]Jing Liu, Jianguo Xie, Biao Liu, Liwei Xu, Xiaoming Chen, Huamin Feng:
SED-SGC: A scalable, efficient, and distributed secure group communication scheme based on superlattice PUF. Comput. Networks 233: 109898 (2023) - [j14]Yuan Gao, Xiang Wang, Xiangnan He, Huamin Feng, Yong-Dong Zhang:
Rumor detection with self-supervised learning on texts and social graph. Frontiers Comput. Sci. 17(4): 174611 (2023) - [j13]Rui Shi, Yang Yang, Huamin Feng, Feng Yuan, Huiqin Xie, Jianyi Zhang:
PriRPT: Practical blockchain-based privacy-preserving reporting system with rewards. J. Syst. Archit. 143: 102985 (2023) - [j12]Yuxia Fu, Jun Shao, Qingjia Huang, Qihang Zhou, Huamin Feng, Xiaoqi Jia, Ruiyi Wang, Wenzhi Feng:
Non-transferable blockchain-based identity authentication. Peer Peer Netw. Appl. 16(3): 1354-1364 (2023) - [j11]Ang Liu, Xiu-bo Chen, Zhuo Wang, Ying Chen, Xiaohong Qin, Huamin Feng:
An orderly quantum multi-signature based on orthogonal product states for the multi-party transaction blockchain. Quantum Inf. Process. 22(11): 417 (2023) - [j10]Junwei Zhang, Huamin Feng, Biao Liu, Dongmei Zhao:
Survey of Technology in Network Security Situation Awareness. Sensors 23(5): 2608 (2023) - [j9]Jing Liu, Jianguo Xie, Junwei Zhang, Biao Liu, Xiaoming Chen, Huamin Feng:
A Secure Secret Key Agreement Scheme among Multiple Twinning Superlattice PUF Holders. Sensors 23(10): 4704 (2023) - [j8]Haoyang Yu, Junwei Zhang, Zixiao Xiang, Biao Liu, Huamin Feng:
Lossless Reversible Data Hiding in Encrypted Image for Multiple Data Hiders Based on Pixel Value Order and Secret Sharing. Sensors 23(10): 4865 (2023) - [j7]Rui Shi, Huamin Feng, Yang Yang, Feng Yuan, Yingjiu Li, HweeHwa Pang, Robert H. Deng:
Threshold Attribute-Based Credentials With Redactable Signature. IEEE Trans. Serv. Comput. 16(5): 3751-3765 (2023) - [c26]Chunyan Ma, Jun Jiang, Kai Zhang, Zhengwei Jiang, Peian Yang, Xuren Wang, Huamin Feng:
FineCTI: A Framework for Mining Fine-grained Cyber Threat Information from Twitter Using NER Model. TrustCom 2023: 531-538 - [c25]Tian Tian, Yiru Gong, Bo Jiang, Junrong Liu, Huamin Feng, Zhigang Lu:
Insider Threat Detection Based On Heterogeneous Graph Neural Network. TrustCom 2023: 628-635 - [c24]Yuan Gao, Xiang Wang, Xiangnan He, Zhenguang Liu, Huamin Feng, Yongdong Zhang:
Alleviating Structural Distribution Shift in Graph Anomaly Detection. WSDM 2023: 357-365 - [c23]Yuan Gao, Xiang Wang, Xiangnan He, Zhenguang Liu, Huamin Feng, Yongdong Zhang:
Addressing Heterophily in Graph Anomaly Detection: A Perspective of Graph Spectrum. WWW 2023: 1528-1538 - 2022
- [j6]Yizhe You, Jun Jiang, Zhengwei Jiang, Peian Yang, Baoxu Liu, Huamin Feng, Xuren Wang, Ning Li:
TIM: threat context-enhanced TTP intelligence mining on unstructured threat data. Cybersecur. 5(1): 3 (2022) - [j5]Liwei Xu, Han Wu, Jianguo Xie, Jing Liu, Qiong Yuan, Shengwei Xu, Xiaoming Chen, Shoushan Luo, Huamin Feng:
Chaotic analysis and entropy estimation of the entropy source based on semiconductor superlattice chaos. Microelectron. J. 129: 105556 (2022) - [j4]Jie Zhang, Dongdong Chen, Jing Liao, Weiming Zhang, Huamin Feng, Gang Hua, Nenghai Yu:
Deep Model Intellectual Property Protection via Deep Watermarking. IEEE Trans. Pattern Anal. Mach. Intell. 44(8): 4005-4020 (2022) - [j3]Rui Shi, Huiqin Xie, Huamin Feng, Feng Yuan, Biao Liu:
Quantum zero correlation linear cryptanalysis. Quantum Inf. Process. 21(8): 293 (2022) - [j2]Jie Zhang, Dongdong Chen, Qidong Huang, Jing Liao, Weiming Zhang, Huamin Feng, Gang Hua, Nenghai Yu:
Poison Ink: Robust and Invisible Backdoor Attack. IEEE Trans. Image Process. 31: 5691-5705 (2022) - [c22]Yizhe You, Zhengwei Jiang, Kai Zhang, Jun Jiang, Xuren Wang, Zheyu Zhang, Shirui Wang, Huamin Feng:
TI-Prompt: Towards a Prompt Tuning Method for Few-shot Threat Intelligence Twitter Classification*. COMPSAC 2022: 272-279 - [c21]Zhiting Ling, Huamin Feng, Xiong Ding, Xuren Wang, Chang Gao, Peian Yang:
Spear Phishing Email Detection with Multiple Reputation Features and Sample Enhancement. SciSec 2022: 522-538 - [i4]Yuan Gao, Xiang Wang, Xiangnan He, Huamin Feng, Yongdong Zhang:
Rumor Detection with Self-supervised Learning on Texts and Social Graph. CoRR abs/2204.08838 (2022) - 2021
- [c20]Tao Gong, Kai Chen, Xinjiang Wang, Qi Chu, Feng Zhu, Dahua Lin, Nenghai Yu, Huamin Feng:
Temporal ROI Align for Video Object Recognition. AAAI 2021: 1442-1450 - [i3]Jie Zhang, Dongdong Chen, Jing Liao, Weiming Zhang, Huamin Feng, Gang Hua, Nenghai Yu:
Deep Model Intellectual Property Protection via Deep Watermarking. CoRR abs/2103.04980 (2021) - [i2]Xiquan Guan, Huamin Feng, Weiming Zhang, Hang Zhou, Jie Zhang, Nenghai Yu:
Reversible Watermarking in Deep Convolutional Neural Networks for Integrity Authentication. CoRR abs/2104.04268 (2021) - [i1]Tao Gong, Kai Chen, Xinjiang Wang, Qi Chu, Feng Zhu, Dahua Lin, Nenghai Yu, Huamin Feng:
Temporal RoI Align for Video Object Recognition. CoRR abs/2109.03495 (2021) - 2020
- [c19]Xiquan Guan, Huamin Feng, Weiming Zhang, Hang Zhou, Jie Zhang, Nenghai Yu:
Reversible Watermarking in Deep Convolutional Neural Networks for Integrity Authentication. ACM Multimedia 2020: 2273-2280
2010 – 2019
- 2017
- [c18]Biao Liu, Zhao Ding, Yang Pan, Jiali Li, Huamin Feng:
Side-Channel Attacks Based on Collaborative Learning. ICPCSEE (1) 2017: 549-557 - 2015
- [j1]Lei Ju, Yaping Chi, Qiaoyu Liu, Huamin Feng:
基于CPK的虚拟桌面系统认证方法研究 (Research on Virtual Desktop System Authentication Method Based on CPK). 计算机科学 42(Z6): 399-401 (2015) - 2011
- [c17]Huamin Feng, Xinghua Yang, Biao Liu, Chao Jiang:
A Spam Filtering Method Based on Multi-modal Features Fusion. CIS 2011: 421-426
2000 – 2009
- 2007
- [c16]Ming Li, S. C. Lim, Huamin Feng:
A Novel Description of Multifractal Phenomenon of Network Traffic Based on Generalized Cauchy Process. International Conference on Computational Science (3) 2007: 1-9 - [c15]Ming Li, S. C. Lim, Huamin Feng:
Generating Traffic Time Series Based on Generalized Cauchy Process. International Conference on Computational Science (1) 2007: 374-381 - [c14]Zheng-Hong Wu, Ming Li, Huamin Feng:
A Question Understanding Model Based on Knowledge Points for Chinese Question Answering Service in E-Learning. International Conference on Computational Science (3) 2007: 493-500 - [c13]Ming Li, S. C. Lim, Bai-Jiong Hu, Huamin Feng:
Towards Describing Multi-fractality of Traffic Using Local Hurst Function. International Conference on Computational Science (2) 2007: 1012-1020 - 2006
- [c12]Ming Li, Huamin Feng:
Chaotically Masking Traffic Pattern to Prevent Traffic Pattern Analysis Attacks for Mission Critical Applications in Computer Communication Networks. ICNC (2) 2006: 448-451 - [c11]Huamin Feng, Zongqiang Pang, Kun Qiu, Guosen Song:
Web-Based Semantic Analysis of Chinese News Video. PCM 2006: 502-509 - 2005
- [c10]Wei Fang, Sen Liu, Huamin Feng, Yong Fang:
Shot Boundary Detection Based on SVM and TMRA. CIS (1) 2005: 1015-1020 - [c9]Huamin Feng, Wei Fang, Sen Liu, Yong Fang:
A new general framework for shot boundary detection and key-frame extraction. Multimedia Information Retrieval 2005: 121-126 - 2004
- [c8]Rui Shi, HuaMin Feng, Tat-Seng Chua, Chin-Hui Lee:
An Adaptive Image Content Representation and Segmentation Approach to Automatic Image Annotation. CIVR 2004: 545-554 - [c7]HuaMin Feng, Rui Shi, Tat-Seng Chua:
A bootstrapping framework for annotating and retrieving WWW images. ACM Multimedia 2004: 960-967 - [c6]HuaMin Feng, Tat-Seng Chua:
A Learning-based Approach for Annotating Large On-Line Image Collection. MMM 2004: 249- - 2003
- [c5]Tat-Seng Chua, HuaMin Feng, A. Chandrashekhara:
An unified framework for shot boundary detection via active learning. ICASSP (2) 2003: 845-848 - [c4]HuaMin Feng, Tat-Seng Chua:
A bootstrapping approach to annotating large image collection. Multimedia Information Retrieval 2003: 55-62 - [c3]HuaMin Feng, A. Chandrashekhara, Tat-Seng Chua:
ATMRA: An Automatic Temporal Multi-resolution Analysis Framework for Shot Boundary Detection. MMM 2003: 224- - [c2]Lekha Chaisorn, Tat-Seng Chua, Chun-Keat Koh, Yunlong Zhao, Huaxin Xu, Huamin Feng, Qi Tian:
A Two-Level Multi-Modal Approach for Story Segmentation of Large News Video Corpus. TRECVID 2003 - 2002
- [c1]A. Chandrashekhara, HuaMin Feng, Tat-Seng Chua:
Temporal Multi-Resolution Framework for Shot Boundary Detection and Keyframe Extraction. TREC 2002
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-16 22:25 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint