Hong Liu

Orcid: 0000-0003-3389-2765

Affiliations:
  • East China Normal University, School of Computer Science and Software Engineering, China
  • Run Technologies Company Ltd., Engineering Institute, Beijing, China
  • Beihang University, School of Electronic and Information Engineering, Beijing, China (PhD)


According to our database1, Hong Liu authored at least 52 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Hawk: Rapid Android Malware Detection Through Heterogeneous Graph Attention Networks.
IEEE Trans. Neural Networks Learn. Syst., April, 2024

FDAN: Fuzzy deep attention networks for driver behavior recognition.
J. Syst. Archit., February, 2024

Twin Scenarios Establishment for Autonomous Vehicle Digital Twin Empowered SOTIF Assessment.
IEEE Trans. Intell. Veh., January, 2024

2022
Hybrid and Hierarchical Aggregation-Verification Scheme for VANET.
IEEE Trans. Veh. Technol., 2022

Few-shot activity learning by dual Markov logic networks.
Knowl. Based Syst., 2022

Federated Markov Logic Network for indoor activity recognition in Internet of Things.
Knowl. Based Syst., 2022

A low-delay AVB flow scheduling method occupying the guard band in Time-Sensitive Networking.
J. Syst. Archit., 2022

2021
Blockchain and Federated Learning for Collaborative Intrusion Detection in Vehicular Edge Computing.
IEEE Trans. Veh. Technol., 2021

Guest Editorial Introduction of the Special Issue on Edge Intelligence for Internet of Vehicles.
IEEE Trans. Intell. Transp. Syst., 2021

Distributed Collaborative Anomaly Detection for Trusted Digital Twin Vehicular Edge Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

Attributes Based Bayesian Unknown Hazards Assessment for Digital Twin Empowered Autonomous Driving.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

2020
Blockchain Empowered Cooperative Authentication With Data Traceability in Vehicular Edge Computing.
IEEE Trans. Veh. Technol., 2020

Deep Reinforcement Learning for Social-Aware Edge Computing and Caching in Urban Informatics.
IEEE Trans. Ind. Informatics, 2020

Special Issue on Deep Reinforcement Learning for Emerging IoT Systems.
IEEE Internet Things J., 2020

2019
An Attribute Credential Based Public Key Scheme for Fog Computing in Digital Manufacturing.
IEEE Trans. Ind. Informatics, 2019

How to Govern the Non-Cooperative Amateur Drones?
IEEE Netw., 2019

Physical unclonable functions based secret keys scheme for securing big data infrastructure communication.
Inf. Sci., 2019

Cooperative Privacy Preservation for Wearable Devices in Hybrid Computing-Based Smart Health.
IEEE Internet Things J., 2019

A review of the smart world.
Future Gener. Comput. Syst., 2019

Zero-day Vulnerability Inspired Hazard Assessment for Autonomous Driving Vehicles.
Proceedings of the 19th IEEE International Conference on Communication Technology, 2019

Recurrent Neural Network Based Password Generation for Group Attribute Context-Ware Applications.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

Environment Aware Privacy-Preserving Authentication with Predictability for Medical Edge Computing.
Proceedings of the 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2019

Cooperative Privacy Preservation for Internet of Vehicles with Mobile Edge Computing.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

Blockchain Enabled Cooperative Authentication with Data Traceability in Vehicular Edge Computing.
Proceedings of the Computing, Communications and IoT Applications, ComComAp 2019, Shenzhen, 2019

2018
Blockchain-Enabled Security in Electric Vehicles Cloud and Edge Computing.
IEEE Netw., 2018

A survey of RDF management technologies and benchmark datasets.
J. Ambient Intell. Humaniz. Comput., 2018

Selective disclosure and yoking-proof based privacy-preserving authentication scheme for cloud assisted wearable devices.
Future Gener. Comput. Syst., 2018

2017
Cyberlogic Paves the Way From Cyber Philosophy to Cyber Science.
IEEE Internet Things J., 2017

2016
The yoking-proof-based authentication protocol for cloud-assisted wearable devices.
Pers. Ubiquitous Comput., 2016

Cybermatics: Cyber-physical-social-thinking hyperspace based science and technology.
Future Gener. Comput. Syst., 2016

Physical Unclonable Function Based Authentication Protocol for Unit IoT and Ubiquitous IoT.
Proceedings of the International Conference on Identification, 2016

Attention Inspired Resource Allocation for Heterogeneous Sensors in Internet of Things.
Proceedings of the Wisdom Web of Things, 2016

2015
Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things.
IEEE Trans. Parallel Distributed Syst., 2015

Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing.
IEEE Trans. Parallel Distributed Syst., 2015

Tree-Code modeling and addressing for non-ID physical objects in the Internet of Things.
Telecommun. Syst., 2015

Anonymous Credential-Based Access Control Scheme for Clouds.
IEEE Cloud Comput., 2015

Cyber-physical-social-thinking space based science and technology framework for the Internet of Things.
Sci. China Inf. Sci., 2015

From Internet to Smart World.
IEEE Access, 2015

Top Challenges for Smart Worlds: A Report on the Top10Cs Forum.
IEEE Access, 2015

Cybermatics: A Holistic Field for Systematic Study of Cyber-Enabled New Worlds.
IEEE Access, 2015

YPAP: The Yoking-Proofs Based Authentication Protocol for Wearable Devices in Wireless Communications.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

2014
Role-Dependent Privacy Preservation for Secure V2G Networks in the Smart Grid.
IEEE Trans. Inf. Forensics Secur., 2014

2013
Securing vehicle-to-grid communications in the smart grid.
IEEE Wirel. Commun., 2013

Battery Status-aware Authentication Scheme for V2G Networks in Smart Grid.
IEEE Trans. Smart Grid, 2013

Grouping-Proofs-Based Authentication Protocol for Distributed RFID Systems.
IEEE Trans. Parallel Distributed Syst., 2013

Human-Attention Inspired Resource Allocation for Heterogeneous Sensors in the Web of Things.
IEEE Intell. Syst., 2013

Cyberentity Security in the Internet of Things.
Computer, 2013

2012
Aggregated-Proofs Based Privacy-Preserving Authentication for V2G Networks in the Smart Grid.
IEEE Trans. Smart Grid, 2012

A Survey on Gas Sensing Technology.
Sensors, 2012

Directed Path Based Authentication Scheme for the Internet of Things.
J. Univers. Comput. Sci., 2012

A compact quad-band bandstop filter using dual-plane defected structures and open-loop resonators.
IEICE Electron. Express, 2012

Dual cryptography authentication protocol and its security analysis for radio frequency identification systems.
Concurr. Comput. Pract. Exp., 2012


  Loading...