default search action
Bo Mi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j28]Darong Huang, Yuhong Na, Yang Liu, Zhenyuan Zhang, Bo Mi:
Overview of Cooperative Fault-Tolerant Control Driven by the Full Information Chain of Intelligent Connected Vehicle Platoons Under the Zero-Trust Framework: Opportunities and Challenges. IEEE Intell. Transp. Syst. Mag. 16(1): 22-39 (2024) - [j27]Bo Mi, Jinfu Zhou, Darong Huang, Yuan Weng:
Privacy-Preserving Data Processing Method for IoV Based on Homomorphic Conjugacy Search Problem. IEEE Trans. Intell. Transp. Syst. 25(7): 7374-7387 (2024) - 2023
- [j26]Darong Huang, Zhenyuan Zhang, Xin Fang, Min He, Huizhen Lai, Bo Mi:
STIF: A Spatial-Temporal Integrated Framework for End-to-End Micro-UAV Trajectory Tracking and Prediction With 4-D MIMO Radar. IEEE Internet Things J. 10(21): 18821-18836 (2023) - [j25]Zhenyuan Zhang, Xiaojie Wang, Darong Huang, Xin Fang, Mu Zhou, Bo Mi:
iDT: An Integration of Detection and Tracking Toward Low-Observable Multipedestrian for Urban Autonomous Driving. IEEE Trans. Ind. Informatics 19(9): 9887-9897 (2023) - [j24]Darong Huang, Jinfu Zhou, Bo Mi, Fengtian Kuang, Yang Liu:
Key-Based Data Deduplication via Homomorphic NTRU for Internet of Vehicles. IEEE Trans. Veh. Technol. 72(1): 239-252 (2023) - 2022
- [j23]Darong Huang, Xingxing Hua, Bo Mi, Yang Liu, Zhenyuan Zhang:
Incipient fault diagnosis on active disturbance rejection control. Sci. China Inf. Sci. 65(9): 1-2 (2022) - [j22]Bing Xu, Darong Huang, Bo Mi:
Research on the application of mobile payment security system based on the Internet of Things. Concurr. Comput. Pract. Exp. 34(9) (2022) - [j21]Darong Huang, Shaoqian Li, Zhenyuan Zhang, Yang Liu, Bo Mi:
Design and Analysis of Longitudinal Controller for the Platoon With Time-Varying Delay. IEEE Trans. Intell. Transp. Syst. 23(12): 23628-23639 (2022) - 2021
- [j20]Bo Mi, Yuan Weng, Darong Huang, Yang Liu, Yuqing Gan:
A Novel PoW Scheme Implemented by Probabilistic Signature for Blockchain. Comput. Syst. Sci. Eng. 39(2): 265-274 (2021) - [j19]Zhenping Deng, Darong Huang, Jinyu Liu, Bo Mi, Yang Liu:
An Assessment Method for Traffic State Vulnerability Based on a Cloud Model for Urban Road Network Traffic Systems. IEEE Trans. Intell. Transp. Syst. 22(11): 7155-7168 (2021) - [c11]Yuan Weng, Bo Mi, Darong Huang, Yang Liu, Zhenyuan Zhang, Jinfu Zhou:
Privacy-Preserving Neural Network Based on Multi-key NTRU Cryptosystem. CAA SAFEPROCESS 2021: 1-6 - [c10]Guomei Xiao, Bo Mi, Darong Huang, Yang Liu, Yang Li, Yuan Weng:
Anonymous Voting System Against Byzantine Attacks. CAA SAFEPROCESS 2021: 1-6 - [c9]Jinfu Zhou, Bo Mi, Darong Huang, Yang Liu, Yang Li, Yuan Weng:
Privacy-preserving Machine Learning Based on Homomorphic Conjugate Search Problem. CAA SAFEPROCESS 2021: 1-6 - [c8]Yongxing Zou, Bo Mi, Darong Huang, Yang Liu, Yang Li, Yuan Weng:
Dynamic and Efficient Access Control Based On Function Encryption. CAA SAFEPROCESS 2021: 1-6 - 2020
- [j18]Bo Mi, Yang Li, Darong Huang, Tiancheng Wei, Qianqian Zou:
Secure Data De-Duplication Based on Threshold Blind Signature and Bloom Filter in Internet of Things. IEEE Access 8: 167113-167122 (2020) - [j17]Bing Xu, Darong Huang, Bo Mi:
Smart city-based e-commerce security technology with improvement of SET network protocol. Comput. Commun. 154: 66-74 (2020) - [j16]Bing Xu, Darong Huang, Bo Mi:
Research on e-commerce transaction payment system basedf on C4.5 decision tree data mining algorithm. Comput. Syst. Sci. Eng. 35(2) (2020) - [j15]Bo Mi, Yanyong Xiang:
Analysis of the Limit Support Pressure of a Shallow Shield Tunnel in Sandy Soil Considering the Influence of Seepage. Symmetry 12(6): 1023 (2020) - [c7]Fengtian Kuang, Bo Mi, Darong Huang:
A Secure Neural Network Prediction Model with Multiple Data Providers. ML4CS (1) 2020: 272-286
2010 – 2019
- 2019
- [j14]Lanyan Ke, Darong Huang, Ling Zhao, Bo Mi, Ding Jing, Mengting Lin:
Diagnosis Approach for Incipient Faults of Rolling Bearings Under Sectional Jumping Speed. IEEE Access 7: 61473-61483 (2019) - [j13]Bo Mi, Darong Huang, Shaohua Wan, Yu Hu, Kim-Kwang Raymond Choo:
A post-quantum light weight 1-out-n oblivious transfer protocol. Comput. Electr. Eng. 75: 90-100 (2019) - [j12]Darong Huang, Lanyan Ke, Bo Mi, Guosheng Wei, Jian Wang, Shaohua Wan:
A Cooperative Denoising Algorithm with Interactive Dynamic Adjustment Function for Security of Stacker in Industrial Internet of Things. Secur. Commun. Networks 2019: 4049765:1-4049765:16 (2019) - [j11]Bo Bi, Darong Huang, Bo Mi, Zhenping Deng, Hongyang Pan:
Efficient LBS Security-Preserving Based on NTRU Oblivious Transfer. Wirel. Pers. Commun. 108(4): 2663-2674 (2019) - [c6]Xu Zhang, Darong Huang, Ling Zhao, Bo Mi, Yang Liu:
An Improved LSSVM Fault Diagnosis Classification Method Based on Cross Genetic Particle Swarm. CAA SAFEPROCESS 2019: 165-169 - [c5]Ping Long, Bo Mi, Darong Huang, Hongyang Pan:
Cryptanalysis on a (k, n)-Threshold Multiplicative Secret Sharing Scheme. CAA SAFEPROCESS 2019: 202-207 - [c4]Bo Mi, Darong Huang, Jianqiu Cao, Ping Long, Hongyang Pan:
Multiplicative Linear Secret Sharing Without Interaction. ICAIS (3) 2019: 178-187 - [c3]Bo Mi, Hongyang Pan, Darong Huang, Tiancheng Wei, Xingfeng Wang:
A Secure Data Aggregation Protocol in VANETs Based on Multi-key FHE. ICAIS (4) 2019: 178-190 - 2018
- [j10]Darong Huang, Lanyan Ke, Bo Mi, Ling Zhao, Guoxi Sun:
A New Incipient Fault Diagnosis Method Combining Improved RLS and LMD Algorithm for Rolling Bearings With Strong Background Noise. IEEE Access 6: 26001-26010 (2018) - [j9]Bo Mi, Darong Huang, Shaohua Wan, Libo Mi, Jianqiu Cao:
Oblivious Transfer Based on NTRUEncrypt. IEEE Access 6: 35283-35291 (2018) - [j8]Darong Huang, Zhenping Deng, Shaohua Wan, Bo Mi, Yang Liu:
Identification and Prediction of Urban Traffic Congestion via Cyber-Physical Link Optimization. IEEE Access 6: 63268-63278 (2018) - [j7]Aixing Li, Zhou Fang, Bo Mi:
An Improved Defogging Algorithm Based on Dark Color Theory Combined with Self-Adaptive Threshold Mechanism. J. Control. Sci. Eng. 2018: 3975373:1-3975373:10 (2018) - [j6]Darong Huang, Zhenping Deng, Bo Mi:
A New Synergistic Forecasting Method for Short-Term Traffic Flow with Event-Triggered Strong Fluctuation. J. Control. Sci. Eng. 2018: 4570493:1-4570493:8 (2018) - [j5]Darong Huang, Lanyan Ke, Xiaoyan Chu, Ling Zhao, Bo Mi:
Fault diagnosis for the motor drive system of urban transit based on improved Hidden Markov Model. Microelectron. Reliab. 82: 179-189 (2018) - [j4]Bo Mi, Darong Huang, Shaohua Wan:
NTRU Implementation of Efficient Privacy-Preserving Location-Based Querying in VANET. Wirel. Commun. Mob. Comput. 2018: 7823979:1-7823979:11 (2018) - 2017
- [j3]Bo Mi, Dongyan Liu:
A fuzzy neural approach for vehicle guidance in real-time. Intell. Autom. Soft Comput. 23(1): 13-19 (2017) - 2016
- [j2]Bo Mi, Dongyan Liu:
Topology-Hiding Broadcast Based on NTRUEncrypt. KSII Trans. Internet Inf. Syst. 10(1): 431-443 (2016) - 2011
- [c2]Bo Mi, Jianqiu Cao:
A novel key establishment scheme for wireless sensor networks based on complex network synchronization. ICITST 2011: 137-141
2000 – 2009
- 2008
- [j1]Bo Mi, Xiaofeng Liao, Chuandong Li:
Identification and Realization of Linearly Separable Boolean Functions via Cellular Neural Networks. Int. J. Bifurc. Chaos 18(11): 3299-3308 (2008) - 2006
- [c1]Bo Mi, Pengcheng Wei, Yong Chen:
A Region-Based Image Enhancement Algorithm with the Grossberg Network. ISNN (2) 2006: 545-550
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-23 18:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint