Liang Hu

According to our database1, Liang Hu authored at least 96 papers between 2005 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Dynamic pricing with traffic engineering for adaptive video streaming over software-defined content delivery networking.
Multimedia Tools Appl., 2019

Framework for replica placement over cooperative edge networks.
J. Ambient Intelligence and Humanized Computing, 2019

2018
Feature selection considering the composition of feature relevancy.
Pattern Recognition Letters, 2018

Class-specific mutual information variation for feature selection.
Pattern Recognition, 2018

The maximum matching degree sifting algorithm for steganography pretreatment applied to IoT.
Multimedia Tools Appl., 2018

Q-FDBA: improving QoE fairness for video streaming.
Multimedia Tools Appl., 2018

Updated SSDP Scheme for DDoS Attack Defense.
TIIS, 2018

SRMCS: A semantic-aware recommendation framework for mobile crowd sensing.
Inf. Sci., 2018

A novel process-based association rule approach through maximal frequent itemsets for big data processing.
Future Generation Comp. Syst., 2018

Feature selection considering two types of feature relevancy and feature interdependency.
Expert Syst. Appl., 2018

Feature selection by integrating two groups of feature evaluation criteria.
Expert Syst. Appl., 2018

A Stochastic Adjustment Strategy for Coordination Process in Distributed Networks.
Computing and Informatics, 2018

Topology2Vec: Topology Representation Learning For Data Center Networking.
IEEE Access, 2018

Reward-Aided Sensing Task Execution in Mobile Crowdsensing Enabled by Energy Harvesting.
IEEE Access, 2018

2017
A semantics-based approach to multi-source heterogeneous information fusion in the internet of things.
Soft Comput., 2017

Role-based intelligent application state computing for OpenFlow distributed controllers in software-defined networking.
Soft Comput., 2017

A secure and effective scheme providing comprehensive forward security to LTE/SAE X2 handover key management.
TIIS, 2017

A heuristic placement selection approach of partitions of mobile applications in mobile cloud computing model based on community collaboration.
Cluster Computing, 2017

Explore virtual machine deployment to mobile cloud computing for multi-tenancy and energy conservation in wireless network.
Cluster Computing, 2017

Semantic Preference-Based Personalized Recommendation on Heterogeneous Information Network.
IEEE Access, 2017

2016
A Heuristic Clustering-Based Task Deployment Approach for Load Balancing Using Bayes Theorem in Cloud Environment.
IEEE Trans. Parallel Distrib. Syst., 2016

Computer forensic analysis model for the reconstruction of chain of evidence of volatile memory data.
Multimedia Tools Appl., 2016

The efficiency improved scheme for secure access control of digital video distribution.
Multimedia Tools Appl., 2016

A Stream Processing System for Multisource Heterogeneous Sensor Data.
J. Sensors, 2016

A novel trajectory similarity-based approach for location prediction.
IJDSN, 2016

2015
A Data Processing Middleware Based on SOA for the Internet of Things.
J. Sensors, 2015

The Research and Prospect of Secure Data Access Control in Cloud Storage Environment.
JCM, 2015

The Research and Outlook for Keyword-Based Searchable Encryption in Cloud Storage.
JCM, 2015

A fast approach for detection of erythemato-squamous diseases based on extreme learning machine with maximum relevance minimum redundancy feature selection.
Int. J. Systems Science, 2015

A Survey from the Perspective of Evolutionary Process in the Internet of Things.
IJDSN, 2015

Software Toolkits: Practical Aspects of the Internet of Things - A Survey.
IJDSN, 2015

Estimating online vacancies in real-time road traffic monitoring with traffic sensor data stream.
Ad Hoc Networks, 2015

PEMM: A Privacy-Aware Data Aggregation Solution for Mobile Sensing Networks.
Proceedings of the Computational Intelligence and Intelligent Systems, 2015

An improved intrusion detection framework based on Artificial Neural Networks.
Proceedings of the 11th International Conference on Natural Computation, 2015

False positive elimination in intrusion detection based on clustering.
Proceedings of the 12th International Conference on Fuzzy Systems and Knowledge Discovery, 2015

2014
Windows Volatile Memory Forensics Based on Correlation Analysis.
JNW, 2014

Research and Implementation of the Localization Algorithm Based on RSSI Technology.
JNW, 2014

Analysis and Improvement of a Robust User Authentication Framework for Ubiquitous Sensor Networks.
IJDSN, 2014

2013
Secure event signature protocol for peer-to-peer massive multiplayer online games using bilinear pairing.
Security and Communication Networks, 2013

An Intelligent Analysis Model for Multisource Volatile Memory.
JNW, 2013

An Intelligent Analysis Model for Multisource Volatile Memory.
JNW, 2013

Research on Human Sensory Architecture for Cyber Physical Systems.
JNW, 2013

Research on Human Sensory Architecture for Cyber Physical Systems.
JNW, 2013

Analyzing Malware Based on Volatile Memory.
JNW, 2013

Environment Observation System based on Semantics in the Internet of Things.
JNW, 2013

Intrusion Classifier based on Multiple Attribute Selection Algorithms.
JCP, 2013

A Survey on Key Management of Identity-based Schemes in Mobile Ad Hoc Networks.
JCM, 2013

A Survey on Green Computing Based on Cloud Environment.
Int. J. Online Eng., 2013

A network-aware virtual machine placement algorithm in mobile cloud computing environment.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference Workshops, 2013

A topology hidden anonymous multicast routing for ad hoc networks.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
Optimisation to the execution performance of grid job based on distributed file system.
IJPEDS, 2012

An Improved Dynamic Password based Group Key Agreement against Dictionary Attack.
JSW, 2012

The Design and Implementation of Composite Collaborative Filtering Algorithm for Personalized Recommendation.
JSW, 2012

Cryptanalysis of Three Event Signature Protocols for Peer-to-peer Massively Multiplayer Online Games.
JNW, 2012

A Survey on Data Migration Management in Cloud Environment.
JDIM, 2012

Cryptanalysis and Improvement of an ID-Based Threshold Signcryption Scheme.
JCP, 2012

Analysis and Enhancement of Three Identity-based Signcryption Protocols.
JCP, 2012

The Classic Security Application in M2M: the Authentication Scheme of Mobile Payment.
TIIS, 2012

Label-Guided Graph Exploration with Adjustable Ratio of Labels.
Int. J. Found. Comput. Sci., 2012

Multi-stage Attack Detection Algorithm Based on Hidden Markov Model.
Proceedings of the Web Information Systems and Mining - International Conference, 2012

Review of Cyber-Physical System Architecture.
Proceedings of the 15th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops, 2012

2011
Study on Visual Knowledge Structure Reasoning.
JSW, 2011

Enhancement of an Authenticated 3-round Identity-Based Group Key Agreement Protocol.
JNW, 2011

Cryptanalysis and Improvement of Selvi et al.'s Identity-Based Threshold Signcryption Scheme.
JNW, 2011

Weighted Automata for Full-Text Indexing.
Int. J. Found. Comput. Sci., 2011

A Classification of Cluster Validity Indexes Based on Membership Degree and Applications.
Proceedings of the Web Information Systems and Mining - International Conference, 2011

Design and Realization of the Cloud Data Backup System Based on HDFS.
Proceedings of the Emerging Research in Web Information Systems and Mining, 2011

Defense against DNS Man-In-The-Middle Spoofing.
Proceedings of the Web Information Systems and Mining - International Conference, 2011

2010
Improvement on Intrusion Detection Technology Based on Protocol Analysis and Pattern Matching.
JCIT, 2010

Pattern matching with wildcards using words of shorter length.
Inf. Process. Lett., 2010

A faster algorithm for matching a set of patterns with variable length don't cares.
Inf. Process. Lett., 2010

Support Vector Regression and Ant Colony Optimization for Grid Resources Prediction.
Proceedings of the Advances in Neural Networks, 2010

Genetic Algorithms with Improved Simulated Binary Crossover and Support Vector Regression for Grid Resources Prediction.
Proceedings of the Advances in Neural Networks, 2010

Improving the Defence against Web Server Fingerprinting by Eliminating Compliance Variation.
Proceedings of the Fifth International Conference on Frontier of Computer Science and Technology, 2010

Research on Performance Optimization for Grid Application Using Distributed File System.
Proceedings of the Fifth International Conference on Frontier of Computer Science and Technology, 2010

Registration and Private Key Distribution Protocol Based on IBE.
Proceedings of the Fifth International Conference on Frontier of Computer Science and Technology, 2010

2009
Grid Resource Prediction Based on Support Vector Regression and Genetic Algorithms.
Proceedings of the Fifth International Conference on Natural Computation, 2009

On the Structure of Consistent Partitions of Substring Set of a Word.
Proceedings of the Frontiers in Algorithmics, Third International Workshop, 2009

2008
Automata for Weak Factor Recognition.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

A Fast Resource Selection Approach for Grid Applications Based on Fuzzy Clustering Technology.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008

Using Density-Based Incremental Clustering for Anomaly Detection.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
Data Collection for Intrusion Detection System Based on Stratified Random Sampling.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2007

Applying Preference-Based Fuzzy Clustering Technology to Improve Grid Resources Selection Performance.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

A Reliable Data Management Method for Parallel File System.
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007

2006
Succinct Text Indexes on Large Alphabet.
Proceedings of the Theory and Applications of Models of Computation, 2006

UFCR: An Efficient I/O Method for Parallel File System.
Proceedings of the Seventh International Conference on Parallel and Distributed Computing, 2006

Comparison of Two Sampling-Based Data Collection Mechanisms for Intrusion Detection System.
Proceedings of the 2006 International Conference on Security & Management, 2006

SPS-VN: Research on the Security Policy System for Virtual Network.
Proceedings of the 2006 International Conference on Security & Management, 2006

Extended Resource Information Services Based-on Directory Service Technology.
Proceedings of the 10th International Conference on CSCW in Design, 2006

2005
GcpSensor: a CPU Performance Tool for Grid Environments.
Proceedings of the Fifth International Conference on Quality Software (QSIC 2005), 2005

A Grid CPU Availability Forecasting Tool for Windows.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2005

Integrating Local Job Scheduler - LSFTM with GfarmTM.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

RRBS: A Fault Tolerance Model for Cluster/Grid Parallel File System.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

GT-Based Performance Improving for Resource Management of Computational Grid.
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005

Implementing Data Aware Scheduling In Gfarm(R) Using LSF(TM) Scheduler plugin Mechanism.
Proceedings of The 2005 International Conference on Grid Computing and Applications, 2005

Weighted Directed Word Graph.
Proceedings of the Combinatorial Pattern Matching, 16th Annual Symposium, 2005


  Loading...