default search action
Kun Lin
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j11]Yazhen Sun, Longyan Wang, Jinchang Wang, Changgen Tan, Youlin Ye, Kun Lin:
A modified Holmquist‒Johnson‒Cook (HJC) constitutive model and its application to numerical simulations of explosions and impacts in rock materials. Simul. Model. Pract. Theory 138: 103038 (2025) - 2024
- [c19]Taifeng Li, Kun Lin, Bo Chen, Qiang Dong:
3D Point Clouds Simplification Based on Low-dimensional Contour FeatureExtraction. CVIPPR 2024: 1 - [c18]Kun Lin, Masoud Mansoury, Farzad Eskandanian, Milad Sabouri, Bamshad Mobasher:
Beyond Static Calibration: The Impact of User Preference Dynamics on Calibrated Recommendation. UMAP (Adjunct Publication) 2024 - [i2]Kun Lin, Masoud Mansoury, Farzad Eskandanian, Milad Sabouri, Bamshad Mobasher:
Beyond Static Calibration: The Impact of User Preference Dynamics on Calibrated Recommendation. CoRR abs/2405.10232 (2024) - 2023
- [j10]Min Liu, Kun Lin, Wujie Huo, Lanlan Hu, Zhizi He:
Feature enhancement modules applied to a feature pyramid network for object detection. Pattern Anal. Appl. 26(2): 617-629 (2023) - [c17]Philip Levis, Kun Lin, Amy Tai:
A Case Against CXL Memory Pooling. HotNets 2023: 18-24 - 2022
- [j9]Min Liu, Lanlan Hu, Ying Tang, Chu Wang, Yu He, Chunyan Zeng, Kun Lin, Zhizi He, Wujie Huo:
A Deep Learning Method for Breast Cancer Classification in the Pathology Images. IEEE J. Biomed. Health Informatics 26(10): 5025-5032 (2022) - [c16]Taifeng Li, Bo Chen, Feifei Zhang, Kun Lin, Qiang Dong:
Magnetic Properties-Based Range Image Descriptor. ISCID 2022: 286-289 - [c15]Kun Lin, Zhenlei Wang, Shiqi Shen, Zhipeng Wang, Bo Chen, Xu Chen:
Sequential Recommendation with Decomposed Item Feature Routing. WWW 2022: 2288-2297 - 2021
- [c14]Mengyi Zhang, Yan Zhang, Zijie Ji, Kun Lin, Zunwen He:
ROLIG3A: Protecting Group Secret Key Generation Procedures against Malicious Attackers. VTC Fall 2021: 1-5 - [c13]Kun Lin, Zijie Ji, Yan Zhang, Gaojie Chen, Phee Lep Yeoh, Zunwen He:
Secret Key Generation Based on 3D Spatial Angles for UAV Communications. WCNC 2021: 1-6 - 2020
- [j8]Xu Sun, Kun Lin, Pengpeng Jiao, Huapu Lu:
Signal Timing Optimization Model Based on Bus Priority. Inf. 11(6): 325 (2020) - [j7]Zijie Ji, Yan Zhang, Zunwen He, Kun Lin, Bin Li, Phee Lep Yeoh, Hao Yin:
Vulnerabilities of Physical Layer Secret Key Generation Against Environment Reconstruction Based Attacks. IEEE Wirel. Commun. Lett. 9(5): 693-697 (2020) - [c12]Kun Lin, Nasim Sonboli, Bamshad Mobasher, Robin Burke:
Calibration in Collaborative Filtering Recommender Systems: a User-Centered Analysis. HT 2020: 197-206 - [c11]Yan Zhang, Yuxuan Zhou, Zijie Ji, Kun Lin, Zunwen He:
A Three-Dimensional Geometry-based Stochastic Model for Air-to-Air UAV Channels. VTC Fall 2020: 1-5
2010 – 2019
- 2019
- [j6]Zhiguo Li, Subhro Das, James V. Codella, Tian Hao, Kun Lin, Chandramouli Maduri, Ching-Hua Chen:
An Adaptive, Data-Driven Personalized Advisor for Increasing Physical Activity. IEEE J. Biomed. Health Informatics 23(3): 999-1010 (2019) - [c10]Kun Lin, Nasim Sonboli, Bamshad Mobasher, Robin Burke:
Crank up the Volume: Preference Bias Amplification in Collaborative Recommendation. RMSE@RecSys 2019 - [i1]Kun Lin, Nasim Sonboli, Bamshad Mobasher, Robin Burke:
Crank up the volume: preference bias amplification in collaborative recommendation. CoRR abs/1909.06362 (2019) - 2018
- [j5]Kun Lin, Cheng Jie, Steven I. Marcus:
Probabilistically distorted risk-sensitive infinite-horizon dynamic programming. Autom. 97: 1-6 (2018) - [c9]Jaewon Lee, Changkyu Kim, Kun Lin, Liqun Cheng, Rama Govindaraju, Jangwoo Kim:
WSMeter: A Performance Evaluation Methodology for Google's Production Warehouse-Scale Computers. ASPLOS 2018: 549-563 - 2017
- [j4]Chentao Zhang, Kun Lin, Yuanqing Huang, Jianhuan Zhang:
Graphene-Ag Hybrids on Laser-Textured Si Surface for SERS Detection. Sensors 17(7): 1462 (2017) - [c8]Kun Lin, Ping Zhang, Gigi Y. Yuen-Reed, Ying Li, Jianying Hu:
Improving predictive models with clustered sequences: An Application on Heart Failure Risk Prediction. CRI 2017 - [c7]Tian Hao, Henry Chang, Marion J. Ball, Kun Lin, Xinxin Zhu:
cHRV Uncovering Daily Stress Dynamics Using Bio-Signal from Consumer Wearables. MedInfo 2017: 98-102 - 2016
- [j3]Kun Lin, Steven I. Marcus:
Cumulative weighting optimization. J. Glob. Optim. 65(3): 487-512 (2016) - [c6]Yuchen Zheng, Kun Lin, Kathryn Howard, Thomas M. White, Jeremy Pickreign, Gigi Y. Yuen-Reed:
Accountable Care Organization Provider Network Design: A systematic data-driven approach. AMIA 2016 - [c5]Liping Chen, Kun Lin, Junping Du, Kun Li:
Research on user relationship networks of SNS based on the Forest Fire model. CCIS 2016: 165-170 - 2014
- [j2]Jianning Yang, Kun Lin, Xie Zhao:
An Improved Channel Estimation Method based on Jointly Preprocessing of Time-frequency Domain in TD-LTE System. J. Networks 9(4): 1047-1054 (2014) - 2013
- [c4]Jianning Yang, Kun Lin:
Analysis on Malicious Attack and Safety Protection on the Local Area Network of Computers. ICCC 2013: 258 - [c3]Kun Lin, Steven I. Marcus:
Dynamic programming with non-convex risk-sensitive measures. ACC 2013: 6778-6783 - 2010
- [j1]Brenton D. Walker, Jessica Seastrom, Ginnah Lee, Kun Lin:
Addressing Scalability in a Laboratory-Based Multihop Wireless Testbed. Mob. Networks Appl. 15(3): 435-445 (2010) - [c2]Kun Lin:
Application of Web Data Mining Based on the Neural Network Algorithms in E-Commerce. ICEBE 2010: 509-512
2000 – 2009
- 2007
- [c1]Kun Lin, Lin Yuan, Gang Qu:
SecureGo: A Hardware-Software Co-Protection against Identity Theft in Online Transaction. BLISS 2007: 59-64
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:09 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint