2013
32Taming the complexity of coordinated place and route. Jin Hu, Myung-Chul Kim, Igor L. Markov. DAC 2013, 150. Web SearchBibTeXDownload
2012
31Sensitivity-guided metaheuristics for accurate discrete gate sizing. Jin Hu, Andrew B. Kahng, Seokhyeong Kang, Myung-Chul Kim, Igor L. Markov. ICCAD 2012, 233-239. Web SearchBibTeXDownload
30Progress and challenges in VLSI placement research. Igor L. Markov, Jin Hu, Myung-Chul Kim. ICCAD 2012, 275-282. Web SearchBibTeXDownload
29Simulation Study of an FES-Involved Control Strategy for Lower Limb Rehabilitation Robot. Yixiong Chen, Jin Hu, Feng Zhang, Zeng-Guang Hou. ICIRA (2) 2012, 85-95. Web SearchBibTeXDownload
28Global Stability of Complex-Valued Recurrent Neural Networks With Time-Delays. Jin Hu, Jun Wang. IEEE Trans. Neural Netw. Learning Syst. (23): 853-865 (2012). Web SearchBibTeXDownload
27A Reliable Routing Architecture and Algorithm for NoCs. Andrew DeOrio, David Fick, Valeria Bertacco, Dennis Sylvester, David Blaauw, Jin Hu, Gregory K. Chen. IEEE Trans. on CAD of Integrated Circuits and Systems (31): 726-739 (2012). Web SearchBibTeXDownload
26An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security. Debiao He, Jianhua Chen, Jin Hu. Information Fusion (13): 223-230 (2012). Web SearchBibTeXDownload
25A pairing-free certificateless authenticated key agreement protocol. Debiao He, Jianhua Chen, Jin Hu. Int. J. Communication Systems (25): 221-230 (2012). Web SearchBibTeXDownload
2011
24An ID-based proxy signature schemes without bilinear pairings. Debiao He, Jianhua Chen, Jin Hu. Annales des Télécommunications (66): 657-662 (2011). Web SearchBibTeXDownload
23Controlling Communication Field of Complex Networks by Transformation Method. Xiangyang Lu, Jin Hu, Ran Tao, Yue Wang. CoRR (abs/1111.7226) (2011). Web SearchBibTeXDownload
22An efficient certificateless two-party authenticated key agreement scheme from pairings. Debiao He, Jin Hu. IACR Cryptology ePrint Archive (2011): 112 (2011). Web SearchBibTeXDownload
21Identity-based Digital Signature Scheme Without Bilinear Pairings. Debiao He, Jianhua Chen, Jin Hu. IACR Cryptology ePrint Archive (2011): 79 (2011). Web SearchBibTeXDownload
20A SimPLR method for routability-driven placement. Myung-Chul Kim, Jin Hu, Dongjin Lee, Igor L. Markov. ICCAD 2011, 67-73. Web SearchBibTeXDownload
19Stability analysis of neural networks with time delays via energy functions approach. Wenli Zhu, Jin Hu, Jie Zhang. ICNC 2011, 232-236. Web SearchBibTeXDownload
18Weaknesses of a Remote User Password Authentication Scheme Using Smart Card. Debiao He, Jianhua Chen, Jin Hu. I. J. Network Security (13): 58-60 (2011). Web SearchBibTeXDownload
2010
17Weakness Analysis and Improvement of a Gateway-Oriented Password-Based Authenticated Key Exchange Protocol. Debiao He, Jianhua Chen, Jin Hu. CoRR (abs/1001.2945) (2010). Web SearchBibTeXDownload
16Differentiated Pricing Scheme for Flow Control in Multiuser Access Networks. Jin Hu, Jiaolong Wei, Fuyuan Peng, Cai Liu, Ya Luo. GLOBECOM 2010, 1-6. Web SearchBibTeXDownload
15Cryptanalysis of a DoS-resistant ID-based password authentication. Debiao He, Jianhua Chen, Jin Hu. IACR Cryptology ePrint Archive (2010): 181 (2010). Web SearchBibTeXDownload
14Weaknesses of a dynamic ID-based remote user authentication scheme. Debiao He, Jianhua Chen, Jin Hu. IACR Cryptology ePrint Archive (2010): 314 (2010). Web SearchBibTeXDownload
13A Random Number Generator Based on Isogenies Operations. Debiao He, Jianhua Chen, Jin Hu. IACR Cryptology ePrint Archive (2010): 94 (2010). Web SearchBibTeXDownload
12On security of a remote user authentication scheme without using smart cards. Debiao He, Jianhua Chen, Jin Hu. IACR Cryptology ePrint Archive (2010): 306 (2010). Web SearchBibTeXDownload
11Identity-based Digital Signature Scheme Without Bilinear Pairings. Debiao He, Jianhua Chen, Jin Hu. IACR Cryptology ePrint Archive (2010): 620 (2010). Web SearchBibTeXDownload
10An enhanced ID-based remote mutual authentication with key agreement protocol for mobile devices on elliptic curve cryptosystem. Debiao He, Jianhua Chen, Jin Hu. IACR Cryptology ePrint Archive (2010): 48 (2010). Web SearchBibTeXDownload
9Cryptanalysis of an Exquisite Mutual Authentication Scheme with Key Agreement Using Smart Card. Debiao He, Jianhua Chen, Jin Hu. IACR Cryptology ePrint Archive (2010): 291 (2010). Web SearchBibTeXDownload
8Weakness of two ID-based remote mutual authentication with key agreement protocols for mobile devices. Debiao He, Jianhua Chen, Jin Hu. IACR Cryptology ePrint Archive (2010): 606 (2010). Web SearchBibTeXDownload
7Global uniform asymptotic stability of memristor-based recurrent neural networks with time delays. Jin Hu, Jun Wang. IJCNN 2010, 1-8. Web SearchBibTeXDownload
6Cryptanalysis of a Simple Three-party Key Exchange Protocol. Debiao He, Jianhua Chen, Jin Hu. Informatica (Slovenia) (34): 337-339 (2010). Web SearchBibTeXDownload
5Completing high-quality global routes. Jin Hu, Jarrod A. Roy, Igor L. Markov. ISPD 2010, 35-41. Web SearchBibTeXDownload
2009
4Robust Control for a Class of Nonlinear Uncertain Chaotic Systems with Time-Delay by LMI Approach. Wenli Zhu, Hongwei Cui, Shumin Bai, Jin Hu. CSIE (2) 2009, 616-620. Web SearchBibTeXDownload
3Vicis: a reliable network for unreliable silicon. David Fick, Andrew DeOrio, Jin Hu, Valeria Bertacco, David Blaauw, Dennis Sylvester. DAC 2009, 812-817. Web SearchBibTeXDownload
2008
2Sidewinder: a scalable ILP-based router. Jin Hu, Jarrod A. Roy, Igor L. Markov. SLIP 2008, 73-80. Web SearchBibTeXDownload
2004
1Gorder: An Efficient Method for KNN Join Processing. Chenyi Xia, Hongjun Lu, Beng Chin Ooi, Jin Hu. VLDB 2004, 756-767. Cited by 32Web SearchBibTeXDownload
from DBLP and Google Scholar
Developed by the Database Group at the University of Wisconsin and Yahoo! Research