default search action
Bin Lian
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Zhongcheng Wei, Yunping Zhang, Bin Lian, Yongjian Fan, Jijun Zhao:
Joint data augmentation and knowledge distillation for few-shot continual relation extraction. Appl. Intell. 54(4): 3516-3528 (2024) - [j21]Haohui Zhang, Yuwei Wang, Bin Lian, Yiran Wang, Xingyi Li, Tao Wang, Xuequn Shang, Hui Yang, Ahmad Aziz, Jialu Hu:
Scbean: a python library for single-cell multi-omics data analysis. Bioinform. 40(2) (2024) - [j20]Zhongcheng Wei, Wei Chen, Weitao Tao, Shuli Ning, Bin Lian, Xiang Sun, Jijun Zhao:
CATFSID: A few-shot human identification system based on cross-domain adversarial training. Comput. Commun. 224: 275-284 (2024) - [j19]Bin Lian, Jialin Cui, Hongyuan Chen, Xianghong Zhao, Fuqun Wang, Kefei Chen, Maode Ma:
Trusted Location Sharing on Enhanced Privacy-Protection IoT Without Trusted Center. IEEE Internet Things J. 11(7): 12331-12345 (2024) - [j18]Xianghong Zhao, Longhua Ma, Weiming Cai, Bin Lian, Jialin Cui, Lingjian Ye:
Cross-Subject Brain-Computer Interfaces with Joint Distribution Alignment. J. Circuits Syst. Comput. 33(12): 2450205:1-2450205:18 (2024) - [j17]Zhongcheng Wei, Wei Chen, Yunping Zhang, Bin Lian, Jijun Zhao:
CIU-L: A class-incremental learning and machine unlearning passive sensing system for human identification. Pervasive Mob. Comput. 103: 101947 (2024) - [j16]Zhihua Li, Shuli Ning, Bin Lian, Chao Wang, Zhongcheng Wei:
WiCAR: A class-incremental system for WiFi activity recognition. Pervasive Mob. Comput. 103: 101963 (2024) - [j15]Xu Yan, Bin Lian, Yunhao Yang, Xiaotie Wang, Jialin Cui, Xianghong Zhao, Fuqun Wang, Kefei Chen:
A Ciphertext Reduction Scheme for Garbling an S-Box in an AES Circuit with Minimal Online Time. Symmetry 16(6): 664 (2024) - 2023
- [j14]Xiaodan Jin, Fuqun Wang, Renjun Zhang, Bin Lian, Kefei Chen:
Leveled Fully Homomorphic Signcryption From Lattices. IEEE Access 11: 35232-35242 (2023) - [j13]Yuwei Wang, Bin Lian, Haohui Zhang, Yuanke Zhong, Jie He, Fashuai Wu, Knut Reinert, Xuequn Shang, Hui Yang, Jialu Hu:
A multi-view latent variable model reveals cellular heterogeneity in complex tissues for paired multimodal single-cell data. Bioinform. 39(1) (2023) - [j12]Long Sheng, Yue Chen, Shuli Ning, Shengpeng Wang, Bin Lian, Zhongcheng Wei:
DA-HAR: Dual adversarial network for environment-independent WiFi human activity recognition. Pervasive Mob. Comput. 96: 101850 (2023) - 2022
- [j11]Shuang Hu, Renjun Zhang, Fuqun Wang, Kefei Chen, Bin Lian, Gongliang Chen:
A sanitizable signcryption scheme with public verifiability via chameleon hash function. J. Inf. Secur. Appl. 71: 103371 (2022) - [j10]Jiyang Chen, Bin Lian, Yongjie Li, Jialin Cui, Ping Yu, Zhenyu Shu, Jili Tao:
Double-Blind Compact E-cash from Bilinear Map. KSII Trans. Internet Inf. Syst. 16(4): 1266-1285 (2022) - [j9]Bin Lian, Zhongcheng Wei, Xiang Sun, Zhihua Li, Jijun Zhao:
A Review on Rainfall Measurement Based on Commercial Microwave Links in Wireless Cellular Networks. Sensors 22(12): 4395 (2022) - [j8]Ruoyu Wu, Ming Xu, Yingqing Yang, Guanzhong Tian, Ping Yu, Yangfan Zhao, Bin Lian, Longhua Ma:
Efficient High-Radix GF(p) Montgomery Modular Multiplication Via Deep Use Of Multipliers. IEEE Trans. Circuits Syst. II Express Briefs 69(12): 5099-5103 (2022) - 2021
- [j7]Bin Lian, Gongliang Chen, Jialin Cui, Maode Ma:
Compact E-Cash with Efficient Coin-Tracing. IEEE Trans. Dependable Secur. Comput. 18(1): 220-234 (2021) - 2020
- [j6]Bin Lian, Gongliang Chen, Lang Wang, Jialin Cui, Ping Yu, Dake He:
A practical solution to clone problem in anonymous information system. Inf. Sci. 516: 158-191 (2020)
2010 – 2019
- 2019
- [j5]Bin Lian, Gongliang Chen, Jialin Cui, Dake He:
Compact E-Cash with Practical and Complete Tracing. KSII Trans. Internet Inf. Syst. 13(7): 3733-3755 (2019) - 2015
- [j4]Pei Xu, Bin Lian, Kun Shao, Jun Chen, Ning An:
面向决策的信任融合模型研究 (Research on Fusion Trust Model for Decision-making). 计算机科学 42(12): 157-161 (2015) - [j3]Bin Lian, Gongliang Chen, Maode Ma, Jianhua Li:
Periodic K-Times Anonymous Authentication With Efficient Revocation of Violator's Credential. IEEE Trans. Inf. Forensics Secur. 10(3): 543-557 (2015) - 2014
- [j2]Bin Lian, Gongliang Chen, Jianhua Li:
Provably secure E-cash system with practical and efficient complete tracing. Int. J. Inf. Sec. 13(3): 271-289 (2014) - [j1]Zhihua Li, Bin Lian, Zhongcheng Wei, Liang Xue, Jijun Zhao:
The Effect of MAC Parameters on Energy Efficiency and Delay in Wireless Sensor Networks. J. Networks 9(4): 889-895 (2014) - [c1]Yan Yang, Bin Lian, Chen Chen, Pu Li:
DBSCAN Clustering Algorithm Applied to Identify Suspicious Financial Transactions. CyberC 2014: 60-65
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint