default search action
Hong Lei
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j36]Jun Li, Xinman Luo, Hong Lei, Jieren Cheng:
TEEm: Supporting Large Memory for Trusted Applications in ARM TrustZone. IEEE Access 12: 108584-108596 (2024) - [j35]Yongxin Zhang, Hong Lei, Bin Wang, Qinghao Wang, Ning Lu, Wenbo Shi, Bangdao Chen, Qiuling Yue:
Traceable ring signature schemes based on SM2 digital signature algorithm and its applications in the data sharing scheme. Frontiers Comput. Sci. 18(2): 182815 (2024) - [j34]Hong Lei, Chiwei Chen, Yunfeng Lu, Lu-Sheng Pao:
The Influence of Department Stores' Price Promotion Strategy Toward Consumers' Repurchase Intentions: A Moderation Model of Perceived Risks. Int. J. Asian Bus. Inf. Manag. 15: 1-24 (2024) - [j33]Yongxin Zhang, Jiacheng Yang, Hong Lei, Zijian Bao, Ning Lu, Wenbo Shi, Bangdao Chen:
PACTA: An IoT Data Privacy Regulation Compliance Scheme Using TEE and Blockchain. IEEE Internet Things J. 11(5): 8882-8893 (2024) - [j32]Haoyu Gao, Leixiao Li, Hong Lei, Ning Tian, Hao Lin, Jianxiong Wan:
One IOTA of Countless Legions: A Next-Generation Botnet Premises Design Substrated on Blockchain and Internet of Things. IEEE Internet Things J. 11(5): 9107-9126 (2024) - [j31]Yongxin Zhang, Jiacheng Yang, Hong Lei, Zijian Bao, Ning Lu, Wenbo Shi, Bangdao Chen:
Verifiable Random Function Schemes Based on SM2 Digital Signature Algorithm and its Applications for Committee Elections. IEEE Open J. Comput. Soc. 5: 480-490 (2024) - [j30]Qiuling Yue, Chen Zhong, Hong Lei:
Quantum sealed-bid auction protocol with post-confirmation based on blind signature. Quantum Inf. Process. 23(3): 70 (2024) - [j29]Qian Ren, Yue Li, Yingjun Wu, Yuchen Wu, Hong Lei, Lei Wang, Bangdao Chen:
DeCloak: Enable Secure and Cheap Multi-Party Transactions on Legacy Blockchains by a Minimally Trusted TEE Network. IEEE Trans. Inf. Forensics Secur. 19: 88-103 (2024) - [j28]Aixian Deng, Qian Ren, Yingjun Wu, Hong Lei, Bangdao Chen:
Proof of Finalization: A Self-Fulfilling Function of Blockchain. IEEE Trans. Inf. Forensics Secur. 19: 8052-8065 (2024) - 2023
- [j27]Yongxin Zhang, Zijian Bao, Qinghao Wang, Ning Lu, Wenbo Shi, Bangdao Chen, Hong Lei:
OWL: A data sharing scheme with controllable anonymity and integrity for group users. Comput. Commun. 209: 455-468 (2023) - [j26]Hong Lei, Wei Jiang, Jinyu Zhan, Shen You, Lingxin Jin, Xiaona Xie, Zhengwei Chang:
Iterative Training Attack: A Black-Box Adversarial Attack via Perturbation Generative Network. J. Circuits Syst. Comput. 32(18): 2350314:1-2350314:20 (2023) - [j25]Xiang Cheng, Hong Lei:
Semantic Segmentation of Remote Sensing Imagery Based on Multiscale Deformable CNN and DenseCRF. Remote. Sens. 15(5): 1229 (2023) - [j24]Wei Jiang, Shen You, Jinyu Zhan, Xupeng Wang, Hong Lei, Deepak Adhikari:
Query-Efficient Generation of Adversarial Examples for Defensive DNNs via Multiobjective Optimization. IEEE Trans. Evol. Comput. 27(4): 832-847 (2023) - [j23]Ya Huang, Li Jiang, Ge Gao, Hong Lei, Peng Wu, Jie Zhang:
An Improved Calculation Method of Coil Offset on the Large-Caliber Magnetic Field Immunity Testing System for ITER. IEEE Trans. Ind. Electron. 70(9): 8688-8697 (2023) - [c26]Zixuan Liu, Yirui Bai, Tiankai Xu, Haoyu Gao, Hong Lei:
SrNFT: Simple Restricted Non-Fungible Token Framework for Transactions With Risk Detection. Blockchain 2023: 159-165 - [c25]Yirui Bai, Zixuan Liu, Xuefeng Liu, Xiang Lu, Hong Lei:
A cross-chain identity authentication scheme based on DID. Blockchain 2023: 172-179 - [c24]Changqing Gao, Yang Zhang, Hong Lei, Xi Kang, Peng Xu, Bing Li:
Enveloping grasp planning of a three-fingered deployable metamorphic robotic grasper. CBS 2023: 80-85 - 2022
- [j22]Hong Lei, Yue Xiao, Yanchun Liang, Dalin Li, Heow Pueh Lee:
DLD: An Optimized Chinese Speech Recognition Model Based on Deep Learning. Complex. 2022: 6927400:1-6927400:8 (2022) - [j21]Hongfang Shi, Wenying Zhang, Zimin Zhang, Dewen Ding, Huimin Liu, Hong Lei:
Understanding digit-only financial account passwords: ID card, structure, and security. Int. J. Intell. Syst. 37(11): 8635-8652 (2022) - [j20]John P. Crimaldi, Hong Lei, Andreas Schaefer, Michael Schmuker, Brian H. Smith, Aaron C. True, Justus Valentijn Verhagen, Jonathan D. Victor:
Active sensing in a dynamic olfactory world. J. Comput. Neurosci. 50(1): 1-6 (2022) - [j19]John P. Crimaldi, Hong Lei, Andreas Schaefer, Michael Schmuker, Brian H. Smith, Aaron C. True, Justus Valentijn Verhagen, Jonathan D. Victor:
Correction to: Active sensing in a dynamic olfactory world. J. Comput. Neurosci. 50(1): 7 (2022) - [j18]Ya Huang, Li Jiang, Hong Lei, Ge Gao, Xi Deng, Jie Zhang, Peng Wu:
Optimal coil configuration analysis for the high-uniformity and large-caliber magnetic field immunity testing system. J. Ind. Inf. Integr. 30: 100384 (2022) - [j17]Yuanyuan Yao, Hong Lei, Wenjing He:
Wideband DOA Estimation Based on Deep Residual Learning With Lyapunov Stability Analysis. IEEE Geosci. Remote. Sens. Lett. 19: 1-5 (2022) - [j16]Xiang Cheng, Hong Lei:
Remote Sensing Scene Image Classification Based on mmsCNN-HMM with Stacking Ensemble Model. Remote. Sens. 14(17): 4423 (2022) - [j15]Devdutta S. Warhadpande, Jiayan Huo, William A. Libling, Carol Stuehm, Bijan Najafi, Scott Sherman, Hong Lei, Janet Meiling Roveda, Phillip H. Kuo:
Pilot Study for Correlation of Heart Rate Variability and Dopamine Transporter Brain Imaging in Patients with Parkinsonian Syndrome. Sensors 22(13): 5055 (2022) - [j14]Qinghao Wang, Yongxin Zhang, Zijian Bao, Wenbo Shi, Hong Lei, Han Liu, Bangdao Chen:
SorTEE: Service-Oriented Routing for Payment Channel Networks With Scalability and Privacy Protection. IEEE Trans. Netw. Serv. Manag. 19(4): 3764-3780 (2022) - [c23]Qian Ren, Yingjun Wu, Han Liu, Yue Li, Anne Victor, Hong Lei, Lei Wang, Bangdao Chen:
Cloak: Transitioning States on Legacy Blockchains Using Secure and Publicly Verifiable Off-Chain Multi-Party Computation. ACSAC 2022: 117-131 - [c22]Pengxu Shen, Suozai Li, Ming Huang, Haoyu Gao, Leixiao Li, Jun Li, Hong Lei:
A Survey on Safety Regulation Technology of Blockchain Application and Blockchain Ecology. Blockchain 2022: 494-499 - [c21]Yirui Bai, Hong Lei, Suozai Li, Haoyu Gao, Jun Li, Leixiao Li:
Decentralized and Self-Sovereign Identity in the Era of Blockchain: A Survey. Blockchain 2022: 500-507 - [c20]Yongxin Zhang, Qinghao Wang, Ning Lu, Wenbo Shi, Hong Lei:
Traceable Ring Signature Schemes Based on SM2 Digital Signature Algorithm and Its Applications in the Evidence-Storage System. BlockSys 2022: 122-133 - [i7]Qian Ren, Yingjun Wu, Yue Li, Han Liu, Hong Lei, Lei Wang, Bangdao Chen:
TENET: Towards Self-sovereign and Fair Multi-party Computation Ecology Empowered by Decentralized TEE Network. CoRR abs/2202.10206 (2022) - 2021
- [j13]Juan Li, Yuan-Hua Yang, Hong Lei, Gai-Ge Wang:
Solving Logistics Distribution Center Location with Improved Cuckoo Search Algorithm. Int. J. Comput. Intell. Syst. 14(1): 676-692 (2021) - [j12]Qunli Yao, Xian Hu, Hong Lei:
Multiscale Convolutional Neural Networks for Geospatial Object Detection in VHR Satellite Images. IEEE Geosci. Remote. Sens. Lett. 18(1): 23-27 (2021) - [c19]Chen Bian, Wei Jiang, Jinyu Zhan, Ziwei Song, Xiangyu Wen, Hong Lei:
A physically realizable backdoor attack on 3D point cloud deep learning: work-in-progress. CODES+ISSS 2021: 27-28 - [c18]Qian Ren, Han Liu, Yue Li, Hong Lei:
Demo: Cloak: A Framework For Development of Confidential Blockchain Smart Contracts. ICDCS 2021: 1102-1105 - [c17]Bin Wang, Han Liu, Chao Liu, Zhiqiang Yang, Qian Ren, Huixuan Zheng, Hong Lei:
BLOCKEYE: Hunting for DeFi Attacks on Blockchain. ICSE (Companion Volume) 2021: 17-20 - [i6]Bin Wang, Han Liu, Chao Liu, Zhiqiang Yang, Qian Ren, Huixuan Zheng, Hong Lei:
BLOCKEYE: Hunting For DeFi Attacks on Blockchain. CoRR abs/2103.02873 (2021) - [i5]Qian Ren, Han Liu, Yue Li, Hong Lei:
CLOAK: A Framework For Development of Confidential Blockchain Smart Contracts. CoRR abs/2106.13460 (2021) - [i4]Qian Ren, Han Liu, Yue Li, Hong Lei, Lei Wang, Bangdao Chen:
CLOAK: Towards Practical Development and Deployment of Confidential Smart Contracts. CoRR abs/2106.13926 (2021) - 2020
- [j11]Zijian Bao, Qinghao Wang, Wenbo Shi, Lei Wang, Hong Lei, Bangdao Chen:
When Blockchain Meets SGX: An Overview, Challenges, and Open Issues. IEEE Access 8: 170404-170420 (2020) - [j10]Yuanyuan Yao, Hong Lei, Wenjing He:
A-CRNN-Based Method for Coherent DOA Estimation with Unknown Source Number. Sensors 20(8): 2296 (2020) - [j9]Huan Zhang, Hong Lei:
The Failure Case of Phase Transition for Penalized Problems in Corrupted Sensing. IEEE Signal Process. Lett. 27: 555-559 (2020) - [c16]Hong Lei, Zijian Bao, Qinghao Wang, Yongxin Zhang, Wenbo Shi:
SDABS: A Secure Cloud Data Auditing Scheme Based on Blockchain and SGX. BlockSys 2020: 269-281 - [c15]Hong Lei, Qinghao Wang, Wenbo Shi, Zijian Bao:
A Survey on the Application of SGX in Blockchain Area. BlockSys 2020: 633-647 - [c14]Hong Lei, Yun Yan, Zijian Bao, Qinghao Wang, Yongxin Zhang, Wenbo Shi:
SDSBT: A Secure Multi-party Data Sharing Platform Based on Blockchain and TEE. CSS 2020: 184-196 - [c13]Guoning Lu, Dong Xu, Ning Wang, Xiao Zhang, Degen Zhen, Hong Lei, Yunlong Bai, Dehui Kong, Hang Ruan, Zhifeng Chi, Xiankui Xiong, Ke Xu:
A Design of 16TOPS Efficient GEMM Module in Deep Learning Accelerator. ICTA 2020: 59-60
2010 – 2019
- 2019
- [j8]Huan Zhang, Yulong Liu, Hong Lei:
Localization From Incomplete Euclidean Distance Matrix: Performance Analysis for the SVD-MDS Approach. IEEE Trans. Signal Process. 67(8): 2196-2209 (2019) - [c12]Qunli Yao, Xian Hu, Hong Lei:
Geospatial Object Detection In Remote Sensing Images Based On Multi-Scale Convolutional Neural Networks. IGARSS 2019: 1450-1453 - 2018
- [i3]Huan Zhang, Yulong Liu, Hong Lei:
Phase Transition of Convex Programs for Linear Inverse Problems with Multiple Prior Constraints. CoRR abs/1801.00965 (2018) - [i2]Huan Zhang, Yulong Liu, Hong Lei:
Localization from Incomplete Euclidean Distance Matrix: Performance Analysis for the SVD-MDS Approach. CoRR abs/1811.12803 (2018) - 2017
- [c11]Huan Zhang, Yulong Liu, Hong Lei:
On the phase transition of corrupted sensing. ISIT 2017: 521-525 - [i1]Huan Zhang, Yulong Liu, Hong Lei:
On the Phase Transition of Corrupted Sensing. CoRR abs/1705.07539 (2017) - 2016
- [c10]Ali Ahrari, Hong Lei, Montassar Aidi Sharif, Kalyanmoy Deb, Xiaobo Tan:
Optimum Design of Artificial Lateral Line Systems for Object Tracking under Uncertain Conditions. GECCO (Companion) 2016: 123-124 - 2015
- [j7]WenSen Feng, Hong Lei, Hong Qiao:
Synthetic aperture radar image despeckling via total generalised variation approach. IET Image Process. 9(3): 236-248 (2015) - [j6]Zhiguang Zhang, Hong Lei, Zhifeng Lv:
Vehicle Layover Removal in Circular SAR Images via ROSL. IEEE Geosci. Remote. Sens. Lett. 12(12): 2413-2417 (2015) - [c9]Ali Ahrari, Hong Lei, Montassar Aidi Sharif, Kalyanmoy Deb, Xiaobo Tan:
Design optimization of artificial lateral line system under uncertain conditions. CEC 2015: 1807-1814 - 2014
- [j5]WenSen Feng, Hong Lei:
Single-image super-resolution with total generalised variation and Shearlet regularisations. IET Image Process. 8(12): 833-845 (2014) - [j4]WenSen Feng, Hong Lei:
SAR Image Despeckling Using Data-Driven Tight Frame. IEEE Geosci. Remote. Sens. Lett. 11(9): 1455-1459 (2014) - [j3]WenSen Feng, Hong Lei, Yang Gao:
Speckle Reduction via Higher Order Total Variation Approach. IEEE Trans. Image Process. 23(4): 1831-1843 (2014) - 2012
- [c8]Yulong Liu, Shidong Li, Tiebin Mi, Hong Lei, Weidong Yu:
Performance analysis of ℓ1-synthesis with coherent frames. ISIT 2012: 2042-2046 - 2011
- [c7]Qixiao Xia, Ziping Liu, Hong Lei, Jianhui Zhang:
Theoretical analysis and experimental varification on valve-less piezoelectric pump with zigzag chamber bottom. EMEIT 2011: 4459-4462 - [c6]Qixiao Xia, Jianhui Zhang, Hong Lei, Aijun Yang:
Simulation and Experimental on Valve-less Piezoelectric Pump with Hackle Chamber. ICDMA 2011: 1090-1093 - 2010
- [j2]Xin Li, Haiming Qi, Bin Hua, Hong Lei, Weidong Yu:
A study of spaceborne SAR raw data compression error based on a statistical model of quantization interval transfer probability. Sci. China Inf. Sci. 53(11): 2352-2362 (2010)
2000 – 2009
- 2009
- [j1]Tianjie Cao, Elisa Bertino, Hong Lei:
Security Analysis of the SASI Protocol. IEEE Trans. Dependable Secur. Comput. 6(1): 73-77 (2009) - [c5]Ruliang Wang, Hong Lei, Jin Wang:
A Method of Robust Stabilization for the Delay Neural Networks with Nonlinear Perturbations. WGEC 2009: 502-505 - 2008
- [c4]Hong Lei, Da Xingya, Shen Huairong:
Aircraft Wing-Tip Corona Magnitude Model and Computer Simulation in Atmospheric Electric Field. CSSE (4) 2008: 934-938 - [c3]Hong Lei, Zhenzhong Wei, Guangjun Zhang:
A Simple Global Calibration Method Based on 1D Target for Multi-binocular Vision Sensor. ISCSCT (2) 2008: 290-294 - 2007
- [c2]Hong Lei, Tianjie Cao:
Cryptanalysis of SPA Protocol. SITIS 2007: 1049-1052 - 2001
- [c1]Hong Lei, António Moreira:
Teaching English Modal Verbs with Cognitive Flexibility Hypertext. WebNet 2001: 546-548
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint