Yanbing Liu

Orcid: 0000-0002-9653-073X

According to our database1, Yanbing Liu authored at least 173 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Deep spatio-temporal 3D dilated dense neural network for traffic flow prediction.
Expert Syst. Appl., March, 2024

Multilevel Laser-Induced Pain Measurement with Wasserstein Generative Adversarial Network - Gradient Penalty Model.
Int. J. Neural Syst., January, 2024

RDGCN: Reinforced Dependency Graph Convolutional Network for Aspect-based Sentiment Analysis.
Proceedings of the 17th ACM International Conference on Web Search and Data Mining, 2024

Demystifying Secondary Radio Access Failures in 5G.
Proceedings of the 25th International Workshop on Mobile Computing Systems and Applications, 2024

Poster: Uncovering Missed 5G Performance in the Sky.
Proceedings of the 25th International Workshop on Mobile Computing Systems and Applications, 2024

A New Method for Cigarette Sales Forecasting Using Empirical Mode Decomposition and Long Short-Term Memory Network.
Proceedings of the 2024 10th International Conference on Computing and Data Engineering, 2024

2023
Self-Supervised EEG Representation Learning with Contrastive Predictive Coding for Post-Stroke Patients.
Int. J. Neural Syst., December, 2023

Voluntary vaccination on hypergraph.
Commun. Nonlinear Sci. Numer. Simul., December, 2023

A malware propagation prediction model based on representation learning and graph convolutional networks.
Digit. Commun. Networks, October, 2023

A Three-Factor Based Trust Model for Anonymous Bacon Message in VANETs.
IEEE Trans. Veh. Technol., September, 2023

ST-3DGMR: Spatio-temporal 3D grouped multiscale ResNet network for region-based urban traffic flow prediction.
Inf. Sci., May, 2023

Dependent Misconfigurations in 5G/4.5G Radio Resource Control.
PACMNET, 2023

Robust Malicious Domain Detection Against Adversarial Attacks on Heterogeneous Graph.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2023

CA++: Enhancing Carrier Aggregation Beyond 5G.
Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, 2023

RegexClassifier: A GNN-Based Recognition Method for State-Explosive Regular Expressions.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

A Close Look at 5G in the Wild: Unrealized Potentials and Implications.
Proceedings of the IEEE INFOCOM 2023, 2023

EDDVPL: A Web Attribute Extraction Method with Prompt Learning.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

A Contrastive Self-distillation BERT with Kernel Alignment-Based Inference.
Proceedings of the Computational Science - ICCS 2023, 2023

Self-supervised Deep Heterogeneous Graph Neural Networks with Contrastive Learning.
Proceedings of the Computational Science - ICCS 2023, 2023

Mulan: A Multi-Level Alignment Model for Video Question Answering.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2023, 2023

MetaBERT: Collaborative Meta-Learning for Accelerating BERT Inference.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

Curvature-Driven Knowledge Graph Embedding for Link Prediction.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

Few-shot Malicious Domain Detection on Heterogeneous Graph with Meta-learning.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

2022
Spatial-temporal upsampling graph convolutional network for daily long-term traffic speed prediction.
J. King Saud Univ. Comput. Inf. Sci., November, 2022

A trust based adaptive privacy preserving authentication scheme for VANETs.
Veh. Commun., 2022

Recommendation Model Based on Dynamic Interest Group Identification and Data Compensation.
IEEE Trans. Netw. Serv. Manag., 2022

A Rumor & Anti-Rumor Propagation Model Based on Data Enhancement and Evolutionary Game.
IEEE Trans. Emerg. Top. Comput., 2022

Multimedia image and video retrieval based on an improved HMM.
Multim. Syst., 2022

Deep spatio-temporal 3D densenet with multiscale ConvLSTM-Resnet network for citywide traffic flow forecasting.
Knowl. Based Syst., 2022

Effects of network temporality on coevolution spread epidemics in higher-order network.
J. King Saud Univ. Comput. Inf. Sci., 2022

Dynamic graph computing: A method of finding companion vehicles from traffic streaming data.
Inf. Sci., 2022

Small perturbations are enough: Adversarial attacks on time series prediction.
Inf. Sci., 2022

Misaligned orientations of 4f optical neural network for image classification accuracy on various datasets.
CoRR, 2022

Generalized k-core percolation on higher-order dependent networks.
Appl. Math. Comput., 2022

Malicious Domain Detection with Heterogeneous Graph Propagation Network.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

EPGraph: An Efficient Graph Computing Model in Persistent Memory System.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2022

DOM2R-Graph: A Web Attribute Extraction Architecture with Relation-Aware Heterogeneous Graph Transformer.
Proceedings of the Neural Information Processing - 29th International Conference, 2022

Heterogeneous Graph Attention Network for Malicious Domain Detection.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2022, 2022

A Spatial-Statistics based Framework of Spatial Correlation Analysis of Retail Sales.
Proceedings of the International Conference on Computers, 2022

Research on Intelligent cigarette sales forecasting model based on big data technology.
Proceedings of the CAIBDA 2022, 2022

2021
RLINK: Deep reinforcement learning for user identity linkage.
World Wide Web, 2021

Towards link inference attack against network structure perturbation.
Knowl. Based Syst., 2021

Link prediction based on feature representation and fusion.
Inf. Sci., 2021

DeepEC: Adversarial attacks against graph structure prediction models.
Neurocomputing, 2021

Bayonet-corpus: a trajectory prediction method based on bayonet context and bidirectional GRU.
Digit. Commun. Networks, 2021

Knowledge-Based Diverse Feature Transformation for Few-Shot Relation Classification.
Proceedings of the Knowledge Science, Engineering and Management, 2021

D<sup>2</sup>Graph: An Efficient and Unified Out-of-Core Graph Computing Model.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Malicious Domain Detection on Imbalanced Data with Deep Reinforcement Learning.
Proceedings of the Neural Information Processing - 28th International Conference, 2021

An Aggregate Store Sales Forecasting Framework based on ConvLSTM.
Proceedings of the ICCDA 2021: The 5th International Conference on Compute and Data Analysis, 2021

Human-Like Storyteller: A Hierarchical Network with Gated Memory for Visual Storytelling.
Proceedings of the Computational Science - ICCS 2021, 2021

A LSTM-cBiGAN based hybrid sampling method for time series customer classification.
Proceedings of the DSIT 2021: 4th International Conference on Data Science and Information Technology, Shanghai, China, July 23, 2021

BV-CEI: A Compact Implementation of Interval Query Indexing Algorithm.
Proceedings of the 15th IEEE International Conference on Big Data Science and Engineering, 2021

Deep Differential Amplifier for Extractive Summarization.
Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, 2021

2020
Rumor Diffusion Model Based on Representation Learning and Anti-Rumor.
IEEE Trans. Netw. Serv. Manag., 2020

Edge Computing and Blockchain for Quick Fake News Detection in IoV.
Sensors, 2020

A verifiable (t, n) threshold quantum state sharing scheme on IBM quantum cloud platform.
Quantum Inf. Process., 2020

Learning cross-modal correlations by exploring inter-word semantics and stacked co-attention.
Pattern Recognit. Lett., 2020

A Community Detection Method Based on Local Optimization in Social Networks.
IEEE Netw., 2020

NetSRE: Link predictability measuring and regulating.
Knowl. Based Syst., 2020

Coal and rock interface identification based on wavelet packet decomposition and fuzzy neural network.
J. Intell. Fuzzy Syst., 2020

A mixed attributes oriented dynamic SOM fuzzy cluster algorithm for mobile user classification.
Inf. Sci., 2020

Internet of Things technology in mineral remote sensing monitoring.
Int. J. Circuit Theory Appl., 2020

Attack plan recognition using hidden Markov and probabilistic inference.
Comput. Secur., 2020

Multi-View Low-Rank Coding-Based Network Data De-Anonymization.
IEEE Access, 2020

High Quality Candidate Generation and Sequential Graph Attention Network for Entity Linking.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

A Hybrid Paper Recommendation Method by Using Heterogeneous Graph and Metadata.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Enhancing Pre-trained Language Representation for Multi-Task Learning of Scientific Summarization.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Enhancing Textual Representation for Abstractive Summarization: Leveraging Masked Decoder.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Data Augmentation for Insider Threat Detection with GAN.
Proceedings of the 32nd IEEE International Conference on Tools with Artificial Intelligence, 2020

Joint Entity Linking for Web Tables with Hybrid Semantic Matching.
Proceedings of the Computational Science - ICCS 2020, 2020

Univariate Forecasting of time series data Based on Seq2Seq Model.
Proceedings of the EITCE 2020: 4th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, 6 November, 2020, 2020

DistilSum: : Distilling the Knowledge for Extractive Summarization.
Proceedings of the CIKM '20: The 29th ACM International Conference on Information and Knowledge Management, 2020

Customer classification based on spatial transition probability and Deep Forest.
Proceedings of the ACAI 2020: 3rd International Conference on Algorithms, 2020

Type-Aware Anchor Link Prediction across Heterogeneous Networks Based on Graph Attention Network.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
BayesTrust and VehicleRank: Constructing an Implicit Web of Trust in VANET.
IEEE Trans. Veh. Technol., 2019

Improve MPTCP with SDN: From the perspective of resource pooling.
J. Netw. Comput. Appl., 2019

A Collaborative Filtering Recommendation Algorithm Based on User Confidence and Time Context.
J. Electr. Comput. Eng., 2019

RLINK: Deep Reinforcement Learning for User Identity Linkage.
CoRR, 2019

Social hotspot propagation dynamics model based on multidimensional attributes and evolutionary games.
Commun. Nonlinear Sci. Numer. Simul., 2019

A Verifiable $(t, n)$ Threshold Quantum State Sharing Against Denial Attack.
IEEE Access, 2019

Deep CNNs With Self-Attention for Speaker Identification.
IEEE Access, 2019

Joint Entity Linking with Deep Reinforcement Learning.
Proceedings of the World Wide Web Conference, 2019

UAFA: Unsupervised Attribute-Friendship Attention Framework for User Representation.
Proceedings of the Knowledge Science, Engineering and Management, 2019

Combining Deep Neural Network with SVM to Identify Used in IOT.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

PAAE: A Unified Framework for Predicting Anchor Links with Adversarial Embedding.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2019

2D-Convolution Based Feature Fusion for Cross-Modal Correlation Learning.
Proceedings of the Computational Science - ICCS 2019, 2019

LTE-based Wireless Channel Modeling on High-Speed Railway at 465MHz.
Proceedings of the 27th European Signal Processing Conference, 2019

Attention-Based LSTM for Insider Threat Detection.
Proceedings of the Applications and Techniques in Information Security, 2019

A Memory-Efficient Multiple String Matching Algorithm Based on Charset Transformation.
Proceedings of the Applications and Techniques in Information Security, 2019

2018
3-HBP: A Three-Level Hidden Bayesian Link Prediction Model in Social Networks.
IEEE Trans. Comput. Soc. Syst., 2018

High-dimensional quantum threshold anonymous identity authentication scheme.
Quantum Inf. Process., 2018

Decoupled TCP Extension for VLC Hybrid Network.
JOCN, 2018

SDN-Based Data Transfer Security for Internet of Things.
IEEE Internet Things J., 2018

C-RBFNN: A user retweet behavior prediction method for hotspot topics based on improved RBF neural network.
Neurocomputing, 2018

A Novel Approach for Linguistic Group Decision Making Based on Generalized Interval-Valued Intuitionistic Fuzzy Linguistic Induced Hybrid Operator and TOPSIS.
Int. J. Intell. Syst., 2018

Textual Relationship Modeling for Cross-Modal Information Retrieval.
CoRR, 2018

Who will retweet? A prediction method for social hotspots based on dynamic tensor decomposition.
Sci. China Inf. Sci., 2018

BESS: BDP Estimation Based Slow Start Algorithm for MPTCP in mmWave-LTE Networks.
Proceedings of the 88th IEEE Vehicular Technology Conference, 2018

Modeling Text with Graph Convolutional Network for Cross-Modal Information Retrieval.
Proceedings of the Advances in Multimedia Information Processing - PCM 2018, 2018

A Sequence Transformation Model for Chinese Named Entity Recognition.
Proceedings of the Knowledge Science, Engineering and Management, 2018

Fine-Grained Correlation Learning with Stacked Co-attention Networks for Cross-Modal Information Retrieval.
Proceedings of the Knowledge Science, Engineering and Management, 2018

Sequence Generative Adversarial Network for Long Text Summarization.
Proceedings of the IEEE 30th International Conference on Tools with Artificial Intelligence, 2018

Insider Threat Detection with Deep Neural Network.
Proceedings of the Computational Science - ICCS 2018, 2018

Adversarial Reinforcement Learning for Chinese Text Summarization.
Proceedings of the Computational Science - ICCS 2018, 2018

Column Concept Determination for Chinese Web Tables via Convolutional Neural Network.
Proceedings of the Computational Science - ICCS 2018, 2018

An Adversarial Training Framework for Relation Classification.
Proceedings of the Computational Science - ICCS 2018, 2018

A Data-Deduplication-Based Matching Mechanism for URL Filtering.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Attention-Based RNN Model for Joint Extraction of Intent and Word Slot Based on a Tagging Strategy.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2018, 2018

Reinforcement Learning for Joint Extraction of Entities and Relations.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2018, 2018

Hierarchical Attention Networks for User Profile Inference in Social Media Systems.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2018, 2018

GLDA-FP: Gaussian LDA Model for Forward Prediction.
Proceedings of the Big Data - BigData 2018, 2018

2017
A Survey for Mobility Big Data Analytics for Geolocation Prediction.
IEEE Wirel. Commun., 2017

Efficient Privacy-Preserving Dual Authentication and Key Agreement Scheme for Secure V2V Communications in an IoV Paradigm.
IEEE Trans. Intell. Transp. Syst., 2017

Consensus of delayed multi-agent dynamical systems with stochastic perturbation via impulsive approach.
Neural Comput. Appl., 2017

A user behavior influence model of social hotspot under implicit link.
Inf. Sci., 2017

Inferring User Profiles in Online Social Networks Based on Convolutional Neural Network.
Proceedings of the Knowledge Science, Engineering and Management, 2017

Inferring Social Network User's Interest Based on Convolutional Neural Network.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

A co-training method for identifying the same person across social networks.
Proceedings of the 2017 IEEE Global Conference on Signal and Information Processing, 2017

Multiple Pattern Graph Correlations for Efficient Graph Pattern Matching.
Proceedings of the 14th IEEE/ACS International Conference on Computer Systems and Applications, 2017

2016
A data privacy protective mechanism for wireless body area networks.
Wirel. Commun. Mob. Comput., 2016

Cryptanalysis and improvement of verifiable quantum (<i>k</i>, <i>n</i>) secret sharing.
Quantum Inf. Process., 2016

Second-order consensus in directed networks of identical nonlinear dynamics via impulsive control.
Neurocomputing, 2016

A parallel and distributed algorithm for role discovery in large-scale social networks.
Intell. Autom. Soft Comput., 2016

2015
Second-Order Global Consensus in Multiagent Networks With Random Directional Link Failure.
IEEE Trans. Neural Networks Learn. Syst., 2015

A parallel matching algorithm based on order relation for HLA data distribution management.
Int. J. Model. Simul. Sci. Comput., 2015

A behavioral anomaly detection strategy based on time series process portraits for desktop virtualization systems.
Clust. Comput., 2015

A dynamic influence model of social network hotspot based on grey system.
Sci. China Inf. Sci., 2015

VSEP: A Distributed Algorithm for Graph Edge Partitioning.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

An algorithm research of the rank of fuzzy circuits.
Proceedings of the 12th International Conference on Fuzzy Systems and Knowledge Discovery, 2015

2014
Swap-aware garbage collection algorithm for NAND flash-based consumer electronics.
IEEE Trans. Consumer Electron., 2014

A Secure Transmission Protocol for Wireless Body Sensor Networks.
J. Softw., 2014

A Novel Deployment Scheme for Green Internet of Things.
IEEE Internet Things J., 2014

Fast Overlapping and Hierarchical Community Detection via Local Dynamic Interaction.
CoRR, 2014

A Novel Admission Control Model in Cloud Computing.
CoRR, 2014

Accelerating DFA Construction by Parallelizing Subset Construction.
Proceedings of the Trustworthy Computing and Services - International Conference, 2014

Latent Factor SVM for Text Categorization.
Proceedings of the 2014 IEEE International Conference on Data Mining Workshops, 2014

A factor-searching-based multiple string matching algorithm for intrusion detection.
Proceedings of the IEEE International Conference on Communications, 2014

Designing of authentication protocol for multi-level security virtual desktops.
Proceedings of the IEEE 3rd International Conference on Cloud Computing and Intelligence Systems, 2014

Delta-K 2-tree for Compact Representation of Web Graphs.
Proceedings of the Web Technologies and Applications - 16th Asia-Pacific Web Conference, 2014

2013
A Metadata-driven Cloud Computing Application Virtualization Model.
J. Comput., 2013

A Secure Data Transmission Scheme for Body Sensor Network.
J. Commun., 2013

Modeling and Algorithms for QoS-Aware Service Composition in Virtualization-Based Cloud Computing.
IEICE Trans. Commun., 2013

Gemini: A green deployment scheme for Internet of things.
Proceedings of the 22nd Wireless and Optical Communication Conference, 2013

Multi-priority scheduling using network calculus: Model and analysis.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Constructing federate collaboration ontology by UML profiles.
Proceedings of the 2013 IEEE 17th International Conference on Computer Supported Cooperative Work in Design (CSCWD), 2013

2012
Garbage collection policy to improve durability for flash memory.
IEEE Trans. Consumer Electron., 2012

Speeding Up Double-Array Trie Construction for String Matching.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

Service provisioning in virtualization-based Cloud computing: Modeling and optimization.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

ClusterFA: a memory-efficient DFA structure for network intrusion detection.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

A worm counter-measurement strategy in P2P networks: Modeling and analysis.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

A lightweight and scalable key management scheme for heterogeneous sensor networks.
Proceedings of the 5th International Conference on BioMedical Engineering and Informatics, 2012

2011
Revisiting Multiple Pattern Matching Algorithms for Multi-Core Architecture.
J. Comput. Sci. Technol., 2011

A Game-Theoretic Approach for Distributed Power Control in Wireless Mesh Networks.
IEICE Trans. Commun., 2011

High-dimensional objective optimizer: An evolutionary algorithm and its nonlinear analysis.
Expert Syst. Appl., 2011

Accelerating DFA Construction by Hierarchical Merging.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2011

An efficient regular expressions compression algorithm from a new perspective.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

2010
MOEAQ: A QoS-Aware Multicast Routing algorithm for MANET.
Expert Syst. Appl., 2010

Compressing Regular Expressions' DFA Table by Matrix Decomposition.
Proceedings of the Implementation and Application of Automata, 2010

2009
A Novel Fast Multi-objective Evolutionary Algorithm for QoS Multicast Routing in MANET.
Int. J. Comput. Intell. Syst., 2009

Utilization-Based Modeling and Optimization for Cognitive Radio Networks.
IEICE Trans. Commun., 2009

A Table Compression Method for Extended Aho-Corasick Automaton.
Proceedings of the Implementation and Application of Automata, 2009

2008
Accelerating Multiple String Matching by Using Cache-Efficient Strategy.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

An MAODV-Based Energy Saving Multicast Routing Algorithm.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008

A Novel Genetic Algorithm and Its Application in TSP.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008

A Spatial Renewal Video Traffic Model Based on Buffering Metrics.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008

2007
The State of the Art in Grid Scheduling Systems.
Proceedings of the Third International Conference on Natural Computation, 2007

2006
Routing Attribute Data Mining Based on Rough Set Theory.
Int. J. Data Warehous. Min., 2006

A Novel Region-Based Multi-Path Routing Algorithm for Ad Hoc Networks.
Int. Trans. Syst. Sci. Appl., 2006

A Novel Optimal Control Algorithm of Access Channel in IEEE 80.e WLAN.
Int. Trans. Syst. Sci. Appl., 2006

Performance evaluation and modeling in Grid Resource Management.
Proceedings of the Grid and Cooperative Computing, 2006

Pattern Recurring in Three-Dimensional Graph Based on Data Mining.
Proceedings of the Advanced Data Mining and Applications, Second International Conference, 2006

2005
A Partition-Based Efficient Algorithm for Large Scale Multiple-Strings Matching.
Proceedings of the String Processing and Information Retrieval, 2005

Application of Rough Set for Routing Selection Based on OSPF Protocol.
Proceedings of the Rough Sets, 2005


  Loading...