Hongyun Cai

Orcid: 0009-0000-1750-3040

Affiliations:
  • Yanshan University, School of Information Science and Engineering, Qinhuangdao, China
  • Hebei University, School of Cyber Security and Computer, Baoding, China


According to our database1, Hongyun Cai authored at least 14 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
STFM: a blockchain sharding algorithm based on trust field model for heterogeneous Internet of Things.
J. Supercomput., February, 2024

2023
A Cooperative PoW and Incentive Mechanism for Blockchain in Edge Computing.
IEEE Internet Things J., October, 2023

LightPoW: A trust based time-constrained PoW for blockchain in internet of things.
Comput. Networks, 2023

Personalized Privacy Risk Assessment Based on Deep Neural Network for Image Sharing on Social Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023

A Poisoning Attack Based on Variant Generative Adversarial Networks in Recommender Systems.
Proceedings of the Advanced Data Mining and Applications - 19th International Conference, 2023

2022
Friendship links-based privacy-preserving algorithm against inference attacks.
J. King Saud Univ. Comput. Inf. Sci., November, 2022

2021
BS-SC: An Unsupervised Approach for Detecting Shilling Profiles in Collaborative Recommender Systems.
IEEE Trans. Knowl. Data Eng., 2021

An Unsupervised Approach for Detecting Group Shilling Attacks in Recommender Systems Based on Topological Potential and Group Behaviour Features.
Secur. Commun. Networks, 2021

2020
An Algorithm Based on Influence to Predict Invisible Relationship.
Wirel. Commun. Mob. Comput., 2020

2019
Detecting shilling attacks in recommender systems based on analysis of user rating behavior.
Knowl. Based Syst., 2019

An Unsupervised Method for Detecting Shilling Attacks in Recommender Systems by Mining Item Relationship and Identifying Target Items.
Comput. J., 2019

Double Regularization Matrix Factorization Recommendation Algorithm.
IEEE Access, 2019

2011
A New Trust Evaluation Model Based on Cloud Theory in E-Commerce Environment.
Proceedings of the 2nd International Symposium on Intelligence Information Processing and Trusted Computing, 2011

2010
Study on the Recommendation Trust Model Based on Encouragement and Punishment.
Proceedings of the International Conference on E-Business and E-Government, 2010


  Loading...