Kui Ren, Ph.D.
Affiliations: | 2006 | Columbia University, New York, NY |
Area:
Mathematics, Optics PhysicsGoogle:
"Kui Ren"Parents
Sign in to add mentorAndreas H. Hielscher | grad student | 2001-2005 | Columbia (E-Tree) | |
Guillaume Bal | grad student | 2006 | Columbia | |
(Inverse problems in transport and diffusion theory with applications in optical tomography.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Ren K, Vallélian S. (2020) Characterizing Impacts of Model Uncertainties in Quantitative Photoacoustics Siam/Asa Journal On Uncertainty Quantification. 8: 636-667 |
Ma Z, Yang Y, Liu X, et al. (2020) EmIr-Auth: Eye Movement and Iris-Based Portable Remote Authentication for Smart Grid Ieee Transactions On Industrial Informatics. 16: 6597-6606 |
He A, Bu K, Li Y, et al. (2020) Atomos: Constant-Size Path Validation Proof Ieee Transactions On Information Forensics and Security. 15: 3832-3847 |
Zhang F, Dong X, Yang B, et al. (2020) A Systematic Evaluation of Wavelet-Based Attack Framework on Random Delay Countermeasures Ieee Transactions On Information Forensics and Security. 15: 1407-1422 |
Zhou J, Cao Z, Qin Z, et al. (2020) LPPA: Lightweight Privacy-Preserving Authentication From Efficient Multi-Key Secure Outsourced Computation for Location-Based Services in VANETs Ieee Transactions On Information Forensics and Security. 15: 420-434 |
Yuan D, Li Q, Li G, et al. (2020) PriRadar: A Privacy-Preserving Framework for Spatial Crowdsourcing Ieee Transactions On Information Forensics and Security. 15: 299-314 |
Zhang Y, Yu J, Hao R, et al. (2020) Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data Ieee Transactions On Dependable and Secure Computing. 17: 608-619 |
Mohaisen A, Gu Z, Ren K, et al. (2020) Look-Aside at Your Own Risk: Privacy Implications of DNSSEC Look-Aside Validation Ieee Transactions On Dependable and Secure Computing. 17: 745-759 |
Ren K, Zheng T, Qin Z, et al. (2020) Adversarial Attacks and Defenses in Deep Learning Engineering. 6: 346-360 |
Ma L, Bu K, Wu N, et al. (2020) Atlas: A First Step Toward Multipath Validation Computer Networks. 173: 107224 |