Risk assessment of security systems based on entropy theory and the Neyman–Pearson criterion H Lv, C Yin, Z Cui, Q Zhan, H Zhou Reliability Engineering & System Safety 142, 68-77, 2015 | 17 | 2015 |
Efficient metadata management in cloud computing Y Wang, H Lv 2011 IEEE 3rd International Conference on Communication Software and …, 2011 | 13 | 2011 |
Deer survey from drone thermal imagery using enhanced faster R-CNN based on ResNets and FPN H Lyu, F Qiu, L An, D Stow, R Lewison, E Bohnett Ecological Informatics 79, 102383, 2024 | 10 | 2024 |
Efficient key management for IOT owner in the cloud Z Cui, H Lv, C Yin, G Gao, C Zhou 2015 IEEE fifth international conference on big data and cloud computing, 56-61, 2015 | 8 | 2015 |
Networked management system for outsourcing of motorcycle parts factory C YIN, H LV, F LIU, L LI Computer Integrated Manufacturing System 15 (02), 0, 2009 | 4 | 2009 |
A depth video coding in-loop median filter based on joint weighted sparse representation H Lü, C Yin, Z Cui, J Hu Wuhan University Journal of Natural Sciences 21 (4), 351-357, 2016 | 3 | 2016 |
CCRS: An Optimized Algorithm Based on CRS in Distributed Storage System C Yin, H Lv, Z Cui, T Li, S Yuan, H Zhou 2015 Ninth International Conference on Frontier of Computer Science and …, 2015 | 3 | 2015 |
The Comprehensive Assessment Method for Community Risk Based on AHP and Neural Network G Xi, H Ruimin, P Yongjun, B Hao, L Haitao 2010 Second International Conference on Networks Security, Wireless …, 2010 | 3 | 2010 |
P-Schedule: Erasure Coding Schedule Strategy in Big Data Storage System C Yin, H Lv, T Li, Y Liu, X Qu, S Yuan Algorithms and Architectures for Parallel Processing: 18th International …, 2018 | 1 | 2018 |
Lightweight data storage based on secret sharing for cloud data Y Xia, H Lv, C Yin, Z Cui, C Zhou 2015 Ninth International Conference on Frontier of Computer Science and …, 2015 | 1 | 2015 |
Risk evaluation for security network based on protection model and risk entropy H Lv, R Hu 2nd International Conference on Teaching and Computational Science, 146-149, 2014 | 1 | 2014 |
Protection Intensity Evaluation for a Security System Based on Entropy Theory H Lv, R Hu, J Chen, Z He, S Chen Entropy 15 (7), 2766-2787, 2013 | 1 | 2013 |
E-government Framework Design Based on Grid Technology T Lu, Q Lin, H Lv 2011 International Conference on Internet Computing and Information Services …, 2011 | 1 | 2011 |
Investment decision model of crime prevention system based on expected monetary values of the economic loss caused by risks H Lv, R Hu, B Huang, T Lu, J Dai 2011 3rd International Conference on Computer Research and Development 2 …, 2011 | 1 | 2011 |
Advancing Wild Deer Monitoring Through UAV Thermal Imaging and Modified Faster RCNN: A Case Study in Nepal’s Chitwan National Park H Lyu, F Qiu, L An, D Stow, R Lewision, E Bohnett Sensing and Imaging 25 (1), 50, 2024 | | 2024 |
A New Minimize Matrix Computation Coding Method for Distributed Storage Systems C Yin, H Lv, T Li, X Qu, J Wang, G Gao Mathematical Problems in Engineering 2019 (1), 4163780, 2019 | | 2019 |
ICRS: An Optimized Algorithm to Improve Performance in Distributed Storage System C Yin, H Lv, Z Cui, T Li, L Rao, Z Wang 2015 7th International Conference on Intelligent Human-Machine Systems and …, 2015 | | 2015 |
Vulnerability Evaluation of Security Network Based on Neyman-Pearson Criterion L Haitao, H Ruimin, C Jun 2015 AASRI International Conference on Circuits and Systems (CAS 2015), 279-282, 2015 | | 2015 |
OptRS: An Optimized Algorithm Based on CRS Codes in Big Data Storage Systems C Yin, J Wang, H Lv, Z Cui, L Cheng, Q Zhan, T Li Algorithms and Architectures for Parallel Processing: 15th International …, 2015 | | 2015 |
Protection Model of Security Systems Based on Neyman-Person Criterion H Lv, R Hu, J Chen, Z He Communications and Network 5 (03), 578, 2013 | | 2013 |