关注
HAITAO LYU
HAITAO LYU
其他姓名Haitao Lv
在 utdallas.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Risk assessment of security systems based on entropy theory and the Neyman–Pearson criterion
H Lv, C Yin, Z Cui, Q Zhan, H Zhou
Reliability Engineering & System Safety 142, 68-77, 2015
172015
Efficient metadata management in cloud computing
Y Wang, H Lv
2011 IEEE 3rd International Conference on Communication Software and …, 2011
132011
Deer survey from drone thermal imagery using enhanced faster R-CNN based on ResNets and FPN
H Lyu, F Qiu, L An, D Stow, R Lewison, E Bohnett
Ecological Informatics 79, 102383, 2024
102024
Efficient key management for IOT owner in the cloud
Z Cui, H Lv, C Yin, G Gao, C Zhou
2015 IEEE fifth international conference on big data and cloud computing, 56-61, 2015
82015
Networked management system for outsourcing of motorcycle parts factory
C YIN, H LV, F LIU, L LI
Computer Integrated Manufacturing System 15 (02), 0, 2009
42009
A depth video coding in-loop median filter based on joint weighted sparse representation
H Lü, C Yin, Z Cui, J Hu
Wuhan University Journal of Natural Sciences 21 (4), 351-357, 2016
32016
CCRS: An Optimized Algorithm Based on CRS in Distributed Storage System
C Yin, H Lv, Z Cui, T Li, S Yuan, H Zhou
2015 Ninth International Conference on Frontier of Computer Science and …, 2015
32015
The Comprehensive Assessment Method for Community Risk Based on AHP and Neural Network
G Xi, H Ruimin, P Yongjun, B Hao, L Haitao
2010 Second International Conference on Networks Security, Wireless …, 2010
32010
P-Schedule: Erasure Coding Schedule Strategy in Big Data Storage System
C Yin, H Lv, T Li, Y Liu, X Qu, S Yuan
Algorithms and Architectures for Parallel Processing: 18th International …, 2018
12018
Lightweight data storage based on secret sharing for cloud data
Y Xia, H Lv, C Yin, Z Cui, C Zhou
2015 Ninth International Conference on Frontier of Computer Science and …, 2015
12015
Risk evaluation for security network based on protection model and risk entropy
H Lv, R Hu
2nd International Conference on Teaching and Computational Science, 146-149, 2014
12014
Protection Intensity Evaluation for a Security System Based on Entropy Theory
H Lv, R Hu, J Chen, Z He, S Chen
Entropy 15 (7), 2766-2787, 2013
12013
E-government Framework Design Based on Grid Technology
T Lu, Q Lin, H Lv
2011 International Conference on Internet Computing and Information Services …, 2011
12011
Investment decision model of crime prevention system based on expected monetary values of the economic loss caused by risks
H Lv, R Hu, B Huang, T Lu, J Dai
2011 3rd International Conference on Computer Research and Development 2 …, 2011
12011
Advancing Wild Deer Monitoring Through UAV Thermal Imaging and Modified Faster RCNN: A Case Study in Nepal’s Chitwan National Park
H Lyu, F Qiu, L An, D Stow, R Lewision, E Bohnett
Sensing and Imaging 25 (1), 50, 2024
2024
A New Minimize Matrix Computation Coding Method for Distributed Storage Systems
C Yin, H Lv, T Li, X Qu, J Wang, G Gao
Mathematical Problems in Engineering 2019 (1), 4163780, 2019
2019
ICRS: An Optimized Algorithm to Improve Performance in Distributed Storage System
C Yin, H Lv, Z Cui, T Li, L Rao, Z Wang
2015 7th International Conference on Intelligent Human-Machine Systems and …, 2015
2015
Vulnerability Evaluation of Security Network Based on Neyman-Pearson Criterion
L Haitao, H Ruimin, C Jun
2015 AASRI International Conference on Circuits and Systems (CAS 2015), 279-282, 2015
2015
OptRS: An Optimized Algorithm Based on CRS Codes in Big Data Storage Systems
C Yin, J Wang, H Lv, Z Cui, L Cheng, Q Zhan, T Li
Algorithms and Architectures for Parallel Processing: 15th International …, 2015
2015
Protection Model of Security Systems Based on Neyman-Person Criterion
H Lv, R Hu, J Chen, Z He
Communications and Network 5 (03), 578, 2013
2013
系统目前无法执行此操作,请稍后再试。
文章 1–20