


default search action
Huiping Sun
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j5]Kang Liu, Yang Lu, Shiyi Tan, Wei Liang, Huiping Sun, Zhong Chen:
CFAuditChain: Audit BlockChain Based On Cuckoo Filter. Comput. J. 67(6): 2208-2218 (2024) - 2022
- [c33]Meilin Lv, Kangjian Wei, Henry Kao, Huiping Sun, Zhong Chen:
ESUM: an efficient UTXO schedule model. ICBC 2022: 1-3 - [c32]Shiyi Tan, Yang Lu, Kang Liu, Huiping Sun, Zhong Chen:
DPLogChain: A Dynamic Packaging LogChain based on Random Witness. ICC 2022: 19-24 - 2021
- [j4]Guodong Yu, Aijun Liu, Huiping Sun:
Risk-averse flexible policy on ambulance allocation in humanitarian operations under uncertainty. Int. J. Prod. Res. 59(9): 2588-2610 (2021) - [c31]Ye Zou, Huiping Sun, Zhong Chen:
Associated Lattice-BERT for Spoken Language Understanding. ICONIP (6) 2021: 579-586 - [c30]Yanan Liu, Huiping Sun, Xu Song, Zhong Chen:
OverlapShard: Overlap-based Sharding Mechanism. ISCC 2021: 1-7 - 2020
- [c29]Xian Chu, Huiping Sun, Zhong Chen:
PassPage: Graphical Password Authentication Scheme Based on Web Browsing Records. Financial Cryptography Workshops 2020: 166-176 - [c28]Canyang Shi, Huiping Sun:
HoneyHash: Honeyword Generation Based on Transformed Hashes. NordSec 2020: 161-173
2010 – 2019
- 2018
- [j3]Guodong Yu, Li Zhang, Huiping Sun:
A Method for Partner Selection of Supply Chain Using Interval-Valued Fuzzy Sets - Fuzzy Choquet Integral and Improved Dempster-Shafer Theory. Int. J. Inf. Technol. Decis. Mak. 17(6): 1777-1804 (2018) - 2015
- [c27]Yang Yang, Zhi Guan, Huiping Sun, Zhong Chen:
Accelerating RSA with Fine-Grained Parallelism Using GPU. ISPEC 2015: 454-468 - [c26]Fei Liu, Jing Wang, Hongtao Bai, Huiping Sun:
Access Control Model Based on Trust and Risk Evaluation in IDMaaS. ITNG 2015: 179-184 - [c25]Huiping Sun, Ke Wang, Xu Li, Nan Qin, Zhong Chen:
PassApp: My App is My Password! MobileHCI 2015: 306-315 - [c24]Zhengang Wu, Zhong Chen, Jiawei Zhu, Huiping Sun, Zhi Guan:
Location Semantics Protection Based on Bayesian Inference. WAIM 2015: 297-308 - 2014
- [c23]Zhengang Wu, Liangwen Yu, Jiawei Zhu, Huiping Sun, Zhi Guan, Zhong Chen:
Privacy Protection against Query Prediction in Location-Based Services. UIC/ATC/ScalCom 2014: 525-532 - [c22]Zhengang Wu, Liangwen Yu, Huiping Sun, Zhi Guan, Zhong Chen:
Cache-Aware Query Processing with User Privacy Protection in Location-Based Services. WAIM Workshops 2014: 247-258 - 2013
- [c21]Wei Xin, Zhi Guan, Tao Yang, Huiping Sun, Zhong Chen:
An Efficient Privacy-Preserving RFID Ownership Transfer Protocol. APWeb 2013: 538-549 - [c20]Wenya Feng, Yilin Guo, Okhee Kim, Yonggan Hou, Long Liu, Huiping Sun:
Color Transfer Based on Earth Mover's Distance and Color Categorization. CAIP (2) 2013: 394-401 - [c19]Liu Yang, Minghui Qiu, Swapna Gottipati, Feida Zhu
, Jing Jiang, Huiping Sun, Zhong Chen:
CQArank: jointly model topics and expertise in community question answering. CIKM 2013: 99-108 - [c18]Zhengang Wu, Liangwen Yu, Jiawei Zhu, Huiping Sun, Zhi Guan, Zhong Chen:
A Hybrid Approach for Privacy Preservation in Location Based Queries. WAIM Workshops 2013: 315-326 - [c17]Zhengang Wu, Liangwen Yu, Huiping Sun, Zhi Guan, Zhong Chen:
Authenticating Users of Recommender Systems Using Naive Bayes. WISE (1) 2013: 199-208 - 2012
- [c16]Yongming Jin, Wei Xin, Huiping Sun, Zhong Chen:
PUF-Based RFID Authentication Protocol against Secret Key Leakage. APWeb 2012: 318-329 - [c15]Wei Xin, Cong Tang, Tao Yang, Huiping Sun, Zhong Chen:
Towards privacy-preserving RFID-based location-based services. FSKD 2012: 2827-2831 - [c14]Jiawei Zhu, Zhi Guan, Yang Yang, Liangwen Yu, Huiping Sun, Zhong Chen:
Permission-Based Abnormal Application Detection for Android. ICICS 2012: 228-239 - [c13]Wei Xin, Huiping Sun, Tao Yang, Zhi Guan, Zhong Chen:
A Privacy-Preserving Path-Checking Solution for RFID-Based Supply Chains. ICICS 2012: 400-407 - [c12]Wei Xin, Huiping Sun, Zhao Wang, Zhi Guan, Zhong Chen:
A RFID Path-Checking Protocol Based on Ordered Multisignatures. RFIDSec Asia 2012: 33-44 - 2011
- [j2]Ennan Zhai, Huiping Sun, Sihan Qing, Zhong Chen:
Sorcery: Overcoming deceptive votes in P2P content sharing systems. Peer-to-Peer Netw. Appl. 4(2): 178-191 (2011) - [c11]Yongming Jin, Huiping Sun, Wei Xin, Song Luo, Zhong Chen:
Lightweight RFID Mutual Authentication Protocol against Feasible Problems. ICICS 2011: 69-77 - 2010
- [j1]Dihui Bao, Yelu Chen, Huiping Sun, Zhong Chen:
Supermarket Service Modeling and Evaluation. Int. J. Serv. Sci. Manag. Eng. Technol. 1(2): 33-50 (2010) - [c10]Huiping Sun, Junde Song, Zhong Chen:
Survey of Authentication in Mobile IPv6 Network. CCNC 2010: 1-4
2000 – 2009
- 2009
- [c9]Bo Liu, Ennan Zhai, Huiping Sun, Yelu Chen, Zhong Chen:
Filtering Spam in Social Tagging System with Dynamic Behavior Analysis. ASONAM 2009: 95-100 - [c8]Ennan Zhai, Huiping Sun, Sihan Qing, Zhong Chen:
SpamClean: Towards Spam-Free Tagging Systems. CSE (4) 2009: 429-435 - [c7]Ennan Zhai, Ruichuan Chen, Eng Keong Lua, Long Zhang, Huiping Sun, Zhuhua Cai, Sihan Qing, Zhong Chen:
SpamResist: Making Peer-to-Peer Tagging Systems Robust to Spam. GLOBECOM 2009: 1-6 - [c6]Yongming Jin, Huiping Sun, Zhong Chen:
Hash-Based Tag Ownership Transfer Protocol against Traceability. ICEBE 2009: 487-492 - [c5]Ennan Zhai, Ruichuan Chen, Zhuhua Cai, Long Zhang, Eng Keong Lua, Huiping Sun, Sihan Qing, Liyong Tang, Zhong Chen:
Sorcery: Could We Make P2P Content Sharing Systems Robust to Deceivers?. Peer-to-Peer Computing 2009: 11-20 - 2008
- [c4]Yongming Jin, Jinqiang Ren, Huiping Sun, Suming Li, Zhong Chen:
An Improved Scheme for Delegation Based on Usage Control. FGCN (1) 2008: 74-78 - [c3]Yan Li, Ming Zhao, Huiping Sun, Zhong Chen:
A Trust and Risk Framework to Enhance Reliable Interaction in E-Commerce. ICEBE 2008: 475-480 - [c2]Ming Zhao, Jinqiang Ren, Huiping Sun, Suming Li, Zhong Chen:
A Game Theoretic Approach Based Access Control Mechanism. ICYCS 2008: 1464-1469 - [c1]Zhi Guan, Huiping Sun, Zhong Chen, Xianghao Nan:
Efficient Identity-Based Key Issue with TPM. ICYCS 2008: 2354-2359
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint