Yali Liu

According to our database1, Yali Liu
  • authored at least 26 papers between 2004 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
The analysis on the acoustic parameters of distinctive features for Mandarin vowels.
Proceedings of the 10th International Congress on Image and Signal Processing, 2017

2016
The examination of the relationship between perception and production of Mandarin tone of Kazak students.
Proceedings of the 10th International Symposium on Chinese Spoken Language Processing, 2016

Sentiment Analysis of Chinese Micro-Blog Based on Classification and Rich Features.
Proceedings of the 13th Web Information Systems and Applications Conference, 2016

2015
A Smart Work Performance Measurement System for Police Officers.
IEEE Access, 2015

2014
Separating Mangrove Species and Conditions Using Laboratory Hyperspectral Data: A Case Study of a Degraded Mangrove Forest of the Mexican Pacific.
Remote Sensing, 2014

2013
Trends in modern information hiding: techniques, applications and detection.
Security and Communication Networks, 2013

2012
Strategies for Sensor Node Deployment Based on Spatial Correlation for Methane Sensor Network.
JNW, 2012

A novel handwritten signature verification method with surface desorption atmospheric pressure chemical ionization mass spectrometry imaging.
Proceedings of the 5th International Conference on BioMedical Engineering and Informatics, 2012

2011
Efficient parallel implementation of Ewald summation in molecular dynamics simulations on multi-core platforms.
Computer Physics Communications, 2011

Disambiguating HTTP: Classifying web Applications.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

QoS Monitoring and Troubleshooting of a Large Scale IPTV Deployment.
Proceedings of the 2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2011

IPTV System Design: An ISP's Perspective.
Proceedings of the 2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2011

2010
Video Streaming Forensic - Content Identification with Traffic Snooping.
Proceedings of the Information Security - 13th International Conference, 2010

Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic.
Proceedings of the Information Hiding - 12th International Conference, 2010

2009
A Fine Rate Control Algorithm With Adaptive Rounding Offsets (ARO).
IEEE Trans. Circuits Syst. Video Techn., 2009

Efficient Parallel Implementation of Molecular Dynamics with Embedded Atom Method on Multi-core Platforms.
Proceedings of the ICPPW 2009, 2009

SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

Hide and Seek in Time - Robust Covert Timing Channels.
Proceedings of the Computer Security, 2009

A Heuristic Rule of Partitioning Irregular Loop for Parallelizing Compilers.
Proceedings of the High Performance Computing and Applications, 2009

2008
A Novel Audio Steganalysis Based on High-Order Statistics of a Distortion Measure with Hausdorff Distance.
Proceedings of the Information Security, 11th International Conference, 2008

ID-Based Forward-Secure Signature Scheme from the Bilinear Pairings.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

A novel fine rate control algorithm with adaptive rounding offset.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2008), 2008

A new source model and accurate rate control algorithm with QP and rounding offset adaptation.
Proceedings of the International Conference on Image Processing, 2008

Wavelet-Based Traffic Analysis for Identifying Video Streams over Broadband Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

A Practical Electronic Voting Protocol Based upon Oblivious Signature Scheme.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2004
Heuristic Search Based Soft-Input Soft-Output Decoding of Arithmetic Codes.
Proceedings of the 2004 Data Compression Conference (DCC 2004), 2004


  Loading...