


default search action
Heng He
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c22]Heng He, Sen Yang, Xiaohu Zhou, Jia Wang:
SMWT: A Universal and Lightweight SDN-Based Meter Table Watermarking Traceback Scheme. APNOMS 2023: 71-76 - 2022
- [j16]Lei Nie
, Bo Liu, Peng Li
, Heng He, Libing Wu:
An improved multi-attribute decision-making based network selection algorithm for heterogeneous vehicular network. Frontiers Comput. Sci. 16(3): 163503 (2022) - [c21]Heng He, Zhezhe Peng, Xiaohu Zhou, Jia Wang:
LFOD: A Lightweight Flow Table Optimization Scheme in SDN Based on Flow Length Distribution in the Internet. APNOMS 2022: 1-6 - [c20]Heng He, Jiaqi Liu, Jinguang Gu, Feng Gao:
An Efficient Multi-Keyword Search Scheme over Encrypted Data in Multi-Cloud Environment. SmartCloud 2022: 59-67 - 2021
- [j15]Heng He
, Renju Chen, Chengyu Liu
, Ke Feng, Xiaohu Zhou
:
An Efficient Ciphertext Retrieval Scheme Based on Homomorphic Encryption for Multiple Data Owners in Hybrid Cloud. IEEE Access 9: 168547-168557 (2021) - [j14]Pengyu Yan
, Xiaoqiang Cai, Debing Ni, Feng Chu
, Heng He:
Two-stage matching-and-scheduling algorithm for real-time private parking-sharing programs. Comput. Oper. Res. 125: 105083 (2021) - [j13]Rui Qiao
, Ke Feng, Heng He, Xiaolei Zhong:
Graph Pattern Matching: Capturing Bisimilar Subgraph. Int. J. Pattern Recognit. Artif. Intell. 35(3): 2150011:1-2150011:18 (2021) - [j12]Shun Liu, Lin Cao, Heng He, Tao Yang, De-sheng Zhou:
An improved interwell connectivity model to obtain interwell connectivity information by using complex well data. Simul. 97(2) (2021) - [c19]Heng He, Chengyu Liu, Xiaohu Zhou, Ke Feng:
FMSM: A Fuzzy Multi-keyword Search Scheme for Encrypted Cloud Data based on Multi-chain Network. ICPP Workshops 2021: 36:1-36:8 - 2020
- [j11]Heng He, Liang-han Zheng, Peng Li
, Li Deng, Li Huang, Xiang Chen:
An efficient attribute-based hierarchical data access control scheme in cloud computing. Hum. centric Comput. Inf. Sci. 10: 49 (2020)
2010 – 2019
- 2019
- [j10]Heng He, Ji Zhang
, Peng Li
, Yu Jin, Tao Zhang:
A lightweight secure conjunctive keyword search scheme in hybrid cloud. Future Gener. Comput. Syst. 93: 727-736 (2019) - [c18]Peng Jiang, Peng Li
, Tao Zhang, Weiyi Huang, Heng He, Lei Nie, Qin Liu
:
Budget Constraint Roadside Units Placement for Traffic Flows Monitoring System with Reliability in Vehicular Networks. HPCC/SmartCity/DSS 2019: 421-428 - [c17]Kui Zhang, Xiaohu Zhou, Heng He, Yonghao Wang, Weihao Wang, Huajian Li:
A Smart Roll Wear Check Scheme for Ensuring the Rolling Quality of Steel Plates. SmartCom 2019: 11-21 - 2018
- [j9]Yu Jin, Chao Cai, Heng He, Peng Li:
BTDA: 基于半可信第三方的动态云数据更新审计方案 (BTDA: Dynamic Cloud Data Updating Audit Scheme Based on Semi-trusted Third Party). 计算机科学 45(3): 144-150 (2018) - [j8]Ruixuan Li
, Chenglin Shen, Heng He, Xiwu Gu, Zhiyong Xu, Cheng-Zhong Xu
:
A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing. IEEE Trans. Cloud Comput. 6(2): 344-357 (2018) - [c16]Changjia Yang, Peng Li
, Tao Zhang, Yu Jin, Heng He, Lei Nie, Qin Liu
:
Mobile Data Sharing with Multiple User Collaboration in Mobile Crowdsensing (Short Paper). CollaborateCom 2018: 356-365 - [c15]Weiyi Huang, Peng Li
, Tao Zhang, Yu Jin, Heng He, Lei Nie, Qin Liu
:
Exploiting Sociality for Collaborative Message Dissemination in VANETs. CollaborateCom 2018: 366-385 - [c14]Li Deng, Yu-Lin Ren, Fei Xu, Heng He, Chao Li:
Resource Utilization Analysis of Alibaba Cloud. ICIC (1) 2018: 183-194 - [c13]Xinhua Dong, Heng He, Chao Li, Yongchuan Liu, Houbo Xiong:
Scene-Based Big Data Quality Management Framework. ICPCSEE (1) 2018: 122-139 - [c12]Peng Jiang, Peng Li
, Tao Zhang, Zhong Enfang, Yu Jin, Heng He, Qin Liu
:
Roadside Units Placement for Traffic Flows Coverage Requirement in Vehicular Networks. SmartCloud 2018: 145-152 - 2017
- [j7]Heng He, Ji Zhang, Jinguang Gu, Yan Hu, Fangfang Xu:
A fine-grained and lightweight data access control scheme for WSN-integrated cloud computing. Clust. Comput. 20(2): 1457-1472 (2017) - [j6]Xinhua Dong, Ruixuan Li
, Heng He, Xiwu Gu, Mudar Sarem, Meikang Qiu, Keqin Li:
EDS: An Efficient Data Selection policy for search engine storage architectures. Future Gener. Comput. Syst. 74: 220-231 (2017) - [j5]Heng He, Wei Xia, Ji Zhang, Yu Jin, Peng Li:
一种云环境中密文数据的模糊多关键词检索方案 (Fuzzy Multi-keyword Retrieval Scheme over Encrypted Data in Cloud Computing). 计算机科学 44(5): 146-152 (2017) - [c11]Peizhao Yu, Lei Xu, Jinguang Gu, Heng He:
A New Sleep Mechanism Based on SDN Framework. BigData Congress 2017: 565-568 - 2015
- [c10]Yu Jin, Chuan Tian, Heng He, Fan Wang:
A Secure and Lightweight Data Access Control Scheme for Mobile Cloud Computing. BDCloud 2015: 172-179 - [c9]Xinhua Dong, Ruixuan Li, Heng He, Xiwu Gu, Mudar Sarem, Meikang Qiu, Keqin Li:
An Efficient Data Selection Policy for Search Engine Cache Management. HPCC/CSS/ICESS 2015: 122-127 - [c8]Yu Jin, Yadan Wang, Wei Xia, Li Deng, Heng He:
A Data Hiding Scheme Based on Lagrange Interpolation Algorithm and Multi-clouds. PAAP 2015: 210-216 - 2014
- [j4]Guoqiang Gao, Ruixuan Li, Heng He, Zhiyong Xu:
Distributed caching in unstructured peer-to-peer file sharing networks. Comput. Electr. Eng. 40(2): 688-703 (2014) - [j3]Rui Qiao, Yajun Feng, Xiaolei Zhong, Qiaojia Liu, Heng He:
Fuzzy Logic Model of Surprise. J. Comput. 9(11): 2761-2770 (2014) - [j2]Heng He, Ruixuan Li, Zhiyong Xu, Weijun Xiao:
An efficient ECC-based mechanism for securing network coding-based P2P content distribution. Peer-to-Peer Netw. Appl. 7(4): 572-589 (2014) - [j1]Heng He, Ruixuan Li, Xinhua Dong, Zhao Zhang:
Secure, Efficient and Fine-Grained Data Access Control Mechanism for P2P Storage Cloud. IEEE Trans. Cloud Comput. 2(4): 471-484 (2014) - [c7]Rui Qiao, Heng He, Jinguang Gu, Maofu Liu, Yajun Feng, Xiaolei Zhong:
An emotion understanding system. ICSAI 2014: 264-270 - 2013
- [c6]Rui Qiao, Xiuqin Zhong, Shihan Yang
, Heng He:
Surprise Simulation Using Fuzzy Logic. ICIC (2) 2013: 110-119 - 2012
- [c5]Ruixuan Li, Chengzhou Li, Weijun Xiao, Hai Jin, Heng He, Xiwu Gu, Kunmei Wen, Zhiyong Xu:
An Efficient SSD-based Hybrid Storage Architecture for Large-Scale Search Engines. ICPP 2012: 450-459 - 2011
- [c4]Ding Liu, Ruixuan Li, Xiwu Gu, Kunmei Wen, Heng He, Guoqiang Gao:
Fast Snippet Generation Based on CPU-GPU Hybrid System. ICPADS 2011: 252-259 - [c3]Heng He, Ruixuan Li, Guoqiang Gao, Zhiyong Xu, Weijun Xiao:
An Integrated System Solution for Secure P2P Content Distribution Based on Network Coding. NAS 2011: 191-196
2000 – 2009
- 2008
- [c2]Heng He, Li Chen, Pingpeng Yuan, Xin Xu, Xiaofeng Wang:
A Security Architecture for Grid-Based Distributed Simulation Platform. PACIIA (1) 2008: 207-212 - 2007
- [c1]Song Wu, Li Qi, Hai Jin, Heng He:
Research on Architecture of Grid-Based Simulation Platform. FCST 2007: 21-28
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:16 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint