Yali Liu

According to our database1, Yali Liu authored at least 54 papers between 2004 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


On csauthors.net:


Status of the research in fitness apps: A bibliometric analysis.
Telematics Informatics, 2021

Optimal Staffing for Online-to-Offline On-Demand Delivery Systems: In-House or Crowd-Sourcing Drivers?
Asia Pac. J. Oper. Res., 2021

A Novel Approach to Accumulate Superparamagnetic Particles in Aqueous Environment Using Time-Varying Magnetic Field.
IEEE Trans. Biomed. Eng., 2020

Continuous Estimation of Knee Joint Angle Based on Surface Electromyography Using a Long Short-Term Memory Neural Network and Time-Advanced Feature.
Sensors, 2020

Three-dimensional campus 360-degree video encoding VR technology based on OpenGL.
Multim. Tools Appl., 2020

Information Matters: an Empirical Study of the Efficiency of On-Demand Services.
Inf. Syst. Frontiers, 2020

TBPA: TESLA-based privacy-preserving authentication scheme for vehicular ad hoc networks.
Int. J. Embed. Syst., 2020

Effects of Joint Assistance on the Muscle Metabolism and Strength in Different States Based on Simulation.
IEEE Access, 2020

Small-Dimension Feature Matrix Construction Method for Decoding Repetitive Finger Movements From Electroencephalogram Signals.
IEEE Access, 2020

Dynamic Aggregation and Analysis Method of Demand Response Resources of VPP Based on Market Mechanism.
Proceedings of the ICITEE2020: The 3rd International Conference on Information Technologies and Electrical Engineering, 2020

Construction of Chinese Interlanguage Corpus in the Era of Big Data.
Proceedings of the Cyber Security Intelligence and Analytics, 2020

An End-to-End Deep Neural Network for Truth Discovery.
Proceedings of the Web Information Systems and Applications, 2020

Double verification protocol via secret sharing for low-cost RFID tags.
Future Gener. Comput. Syst., 2019

A New Pairing-Free Certificateless Signature Scheme for Internet of Things.
Proceedings of the Science of Cyber Security - Second International Conference, 2019

A Message-Oriented Message Dissemination and Authentication Scheme for Vehicular Ad Hoc Networks.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019

An Anonymous Conditional Privacy-Preserving Authentication Scheme for VANETs.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

Design of the Clutched Variable Parallel Elastic Actuator (CVPEA) for Lower Limb Exoskeletons.
Proceedings of the 41st Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2019

How Height and Weight of Patients with Spinal Cord Injury Affect the Spring Locations of Unpowered Energy-stored Exoskeleton.
Proceedings of the 41st Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2019

Analysis of the Guiding Effect of Movie and TV Tourism Memes Based on Big Data.
Proceedings of the Cyber Security Intelligence and Analytics, 2019

A Method for Duplicate Record Detection Using Deep Learning.
Proceedings of the Web Information Systems and Applications, 2019

Portfolio selection of the defined contribution pension fund with uncertain return and salary: A multi-period mean-variance model.
J. Intell. Fuzzy Syst., 2018

Comparison of Two Swarm Intelligence Algorithms: From the Viewpoint of Learning.
Proceedings of the Intelligent Computing Methodologies - 14th International Conference, 2018

Linear Tail-Biting Trellis and Its Sectionalization.
J. Inf. Sci. Eng., 2017

The analysis on the acoustic parameters of distinctive features for Mandarin vowels.
Proceedings of the 10th International Congress on Image and Signal Processing, 2017

The examination of the relationship between perception and production of Mandarin tone of Kazak students.
Proceedings of the 10th International Symposium on Chinese Spoken Language Processing, 2016

All-in-focus image reconstruction with depth sensing.
Proceedings of the 9th International Congress on Image and Signal Processing, 2016

Sentiment Analysis of Chinese Micro-Blog Based on Classification and Rich Features.
Proceedings of the 13th Web Information Systems and Applications Conference, 2016

基于数字签名的轻量级RFID认证协议 (Lightweight RFID Authentication Protocol Based on Digital Signature).
计算机科学, 2015

A Smart Work Performance Measurement System for Police Officers.
IEEE Access, 2015

Offline determinations of parameter values in genetic algorithm.
Proceedings of the 11th International Conference on Natural Computation, 2015

Separating Mangrove Species and Conditions Using Laboratory Hyperspectral Data: A Case Study of a Degraded Mangrove Forest of the Mexican Pacific.
Remote. Sens., 2014

Trends in modern information hiding: techniques, applications and detection.
Secur. Commun. Networks, 2013

A Lightweight RFID Authentication Protocol based on Elliptic Curve Cryptography.
J. Comput., 2013

Strategies for Sensor Node Deployment Based on Spatial Correlation for Methane Sensor Network.
J. Networks, 2012

A Forward-secure Grouping-proof Protocol for Multiple RFID Tags.
Int. J. Comput. Intell. Syst., 2012

A novel handwritten signature verification method with surface desorption atmospheric pressure chemical ionization mass spectrometry imaging.
Proceedings of the 5th International Conference on BioMedical Engineering and Informatics, 2012

Efficient parallel implementation of Ewald summation in molecular dynamics simulations on multi-core platforms.
Comput. Phys. Commun., 2011

Disambiguating HTTP: Classifying web Applications.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

QoS Monitoring and Troubleshooting of a Large Scale IPTV Deployment.
Proceedings of the 2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2011

IPTV System Design: An ISP's Perspective.
Proceedings of the 2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2011

Video Streaming Forensic - Content Identification with Traffic Snooping.
Proceedings of the Information Security - 13th International Conference, 2010

Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic.
Proceedings of the Information Hiding - 12th International Conference, 2010

A Fine Rate Control Algorithm With Adaptive Rounding Offsets (ARO).
IEEE Trans. Circuits Syst. Video Technol., 2009

Efficient Parallel Implementation of Molecular Dynamics with Embedded Atom Method on Multi-core Platforms.
Proceedings of the ICPPW 2009, 2009

SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

Hide and Seek in Time - Robust Covert Timing Channels.
Proceedings of the Computer Security, 2009

A Heuristic Rule of Partitioning Irregular Loop for Parallelizing Compilers.
Proceedings of the High Performance Computing and Applications, 2009

A Novel Audio Steganalysis Based on High-Order Statistics of a Distortion Measure with Hausdorff Distance.
Proceedings of the Information Security, 11th International Conference, 2008

ID-Based Forward-Secure Signature Scheme from the Bilinear Pairings.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

A novel fine rate control algorithm with adaptive rounding offset.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2008), 2008

A new source model and accurate rate control algorithm with QP and rounding offset adaptation.
Proceedings of the International Conference on Image Processing, 2008

Wavelet-Based Traffic Analysis for Identifying Video Streams over Broadband Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

A Practical Electronic Voting Protocol Based upon Oblivious Signature Scheme.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

Heuristic Search Based Soft-Input Soft-Output Decoding of Arithmetic Codes.
Proceedings of the 2004 Data Compression Conference (DCC 2004), 2004