


default search action
Haining Luo
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j6]Haining Luo
, Yiannis Demiris
:
TSL: Tracking Deformable Linear Objects for Bimanual Shoe Lacing. IEEE Robotics Autom. Lett. 10(8): 8212-8219 (2025)
[c8]Haining Luo, Rodrigo Chacón-Quesada, Fernando Estévez Casado, Nico Lingg, Yiannis Demiris:
Interface Matters: Comparing First and Third-Person Perspective Interfaces for Bi-Manual Robot Behavioural Cloning. ICRA 2025: 7385-7391- 2024
[j5]Haining Luo
, Yiannis Demiris
:
Benchmarking and Simulating Bimanual Robot Shoe Lacing. IEEE Robotics Autom. Lett. 9(10): 8202-8209 (2024)
[j4]Fei Tang
, Xujun Zhou
, Haining Luo, Guowei Ling
, Jinyong Shan
, Yunpeng Xiao
:
Efficient Privacy-Preserving Multi-Dimensional Range Query for Cloud-Assisted Ehealth Systems. IEEE Trans. Serv. Comput. 17(5): 2365-2377 (2024)
[c7]Zhaojun Yu, Haining Luo, Tingting Su, Yan Ke, Yangjie Zhong, Haofeng Li:
High-Capacity Reversible Data Hiding Algorithm for Medical Images. ICCVIT 2024: 1-6- 2023
[j3]Haining Luo
, Yongsheng Qian
, Junwei Zeng, Xuting Wei, Futao Zhang, Zhaopeng Wu, Haijun Li:
The Impact of Connected and Autonomous Vehicle Platoon's Length on Expressway Traffic Flow Characteristics Based on Symmetry Lane Changing Rules. Symmetry 15(12): 2164 (2023)
[c6]Haining Luo
, Yiannis Demiris
:
Bi-Manual Robot Shoe Lacing. IROS 2023: 8772-8775- 2021
[c5]Shaowei Pan
, Mingzhu Kang, Zhi Guo, Haining Luo:
Research on Interlayer Recognition Based on Intelligent Optimization Algorithms and Convolutional Neural Networks. ATIS 2021: 13-20- 2020
[j2]Haining Luo:
An Emergency Management System for Government Data Security Based on Artificial Intelligence. Ingénierie des Systèmes d Inf. 25(2): 207-213 (2020)
[c4]Zechen Zheng
, Shaowei Pan, Haining Luo, Zhi Guo:
Porosity prediction based on GS+GA-XGBoost. ISPA/BDCloud/SocialCom/SustainCom 2020: 1014-1020
2010 – 2019
- 2018
[c3]Yanjing Hu, Xu An Wang
, Haining Luo, Shuaishuai Zhu:
Mining and Utilizing Network Protocol's Stealth Attack Behaviors. 3PGCIC 2018: 212-222- 2017
[c2]Yiqun Liu, Jianqi Zhang, Zhen Zhang, Haining Luo, Xiaorui Wang:
A Three-Dimensional Digital Watermarking Technique Based on Integral Image Cryptosystem and Discrete Fresnel Diffraction. EIDWT 2017: 532-540- 2015
[j1]Haining Luo, Xu An Wang
:
New signature schemes in the standard model based on publicly verifiable CCA-secure public key encryption. Int. J. Inf. Commun. Technol. 7(2/3): 235-246 (2015)- 2013
[c1]Wei Wang, Dongyan Zhao, Haining Luo, Xin Wang:
Mining User Interests in Web Logs of an Online News Service Based on Memory Model. NAS 2013: 151-155
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-10-22 04:00 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







