Yao Liu

According to our database1, Yao Liu authored at least 121 papers between 2006 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Cooperative Routing Problem for Ground Vehicle and Unmanned Aerial Vehicle: The Application on Intelligence, Surveillance, and Reconnaissance Missions.
IEEE Access, 2019

Orthogonality-Sabotaging Attacks against OFDMA-based Wireless Networks.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

CFHider: Control Flow Obfuscation with Intel SGX.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Entrapment for Wireless Eavesdroppers.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Combining parametric and nonparametric models for off-policy evaluation.
Proceedings of the 36th International Conference on Machine Learning, 2019

2018
Spoofing attacks and countermeasures in fm indoor localization system.
World Wide Web, 2018

Resource allocation and dynamic power control for D2D communication underlaying uplink multi-cell networks.
Wireless Networks, 2018

Location Privacy Violation via GPS-Agnostic Smart Phone Car Tracking.
IEEE Trans. Vehicular Technology, 2018

Adaptive Human-Machine Interactive Behavior Analysis With Wrist-Worn Devices for Password Inference.
IEEE Trans. Neural Netw. Learning Syst., 2018

Multi-Task Vehicle Detection With Region-of-Interest Voting.
IEEE Trans. Image Processing, 2018

Secret Key Establishment via RSS Trajectory Matching Between Wearable Devices.
IEEE Trans. Information Forensics and Security, 2018

Evaluation system for the sustainable development of urban transportation and ecological environment based on SVM.
Journal of Intelligent and Fuzzy Systems, 2018

Implementation of Enterprise Imaging Strategy at a Chinese Tertiary Hospital.
J. Digital Imaging, 2018

A Novel behavioral scoring model for estimating probability of default over time in peer-to-peer lending.
Electronic Commerce Research and Applications, 2018

Using contextual features and multi-view ensemble learning in product defect identification from online discussion forums.
Decision Support Systems, 2018

Research on Mathematical Formula Knowledge Base for Formula Recognition.
Proceedings of the 2018 IEEE/WIC/ACM International Conference on Web Intelligence, 2018

Representation Balancing MDPs for Off-policy Policy Evaluation.
Proceedings of the Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, 2018

WiVo: Enhancing the Security of Voice Control System via Wireless Signal in IoT Environment.
Proceedings of the Nineteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2018

The Mathematical Modeling of the Two-Echelon Ground Vehicle and Its Mounted Unmanned Aerial Vehicle Cooperated Routing Problem.
Proceedings of the 2018 IEEE Intelligent Vehicles Symposium, 2018

Linked Document Classification by Network Representation Learning.
Proceedings of the Chinese Computational Linguistics and Natural Language Processing Based on Naturally Annotated Big Data, 2018

No Training Hurdles: Fast Training-Agnostic Attacks to Infer Your Typing.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

A Pulmonary Vascular Segmentation Algorithm of Chest CT Images Based on Fast Marching Method.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2018

A Scalable Heterogeneous Parallel SOM Based on MPI/CUDA.
Proceedings of The 10th Asian Conference on Machine Learning, 2018

2017
Land Surface Temperature Estimate From Chinese Gaofen-5 Satellite Data Using Split-Window Algorithm.
IEEE Trans. Geoscience and Remote Sensing, 2017

Energy-Efficient Multicast Transmission for Underlay Device-to-Device Communications: A Social-Aware Perspective.
Mobile Information Systems, 2017

A Relay-Aided Device-to-Device-Based Load Balancing Scheme for Multitier Heterogeneous Networks.
IEEE Internet of Things Journal, 2017

Cybersecurity for Cyber-Enabled Multimedia Applications.
IEEE MultiMedia, 2017

PDF Mirage: Content Masking Attack Against Information-Based Online Services.
Proceedings of the 26th USENIX Security Symposium, 2017

NodeLeaper: Lower Overhead Oblivious AVL Tree.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Optimizing TLB for Access Pattern Privacy Protection in Data Outsourcing.
Proceedings of the Security and Privacy in Communication Networks, 2017

Stateful Inter-Packet Signal Processing for Wireless Networking.
Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, 2017

Spatio-Temporal AutoEncoder for Video Anomaly Detection.
Proceedings of the 2017 ACM on Multimedia Conference, 2017

Spatiotemporal Multi-Task Network for Human Activity Understanding.
Proceedings of the on Thematic Workshops of ACM Multimedia 2017, Mountain View, CA, USA, October 23, 2017

On eavesdropping attacks and countermeasures for MU-MIMO systems.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

Electric grid power flow model camouflage against topology leaking attacks.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

A reflectance image simulation method for atmospheric absorption bands centered at 2.7 micron.
Proceedings of the 2017 IEEE International Geoscience and Remote Sensing Symposium, 2017

Emissivity image simulation for thermal infrared bands on Gaofen-5 using airborne hyperspectral data.
Proceedings of the 2017 IEEE International Geoscience and Remote Sensing Symposium, 2017

A distributed control scheme with cost optimization and capacity constraints.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017

Power factor consistency control for decentralized power sharing in islanded AC microgrids with cascaded inverters.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017

CovertMIMO: A covert uplink transmission scheme for MIMO systems.
Proceedings of the IEEE International Conference on Communications, 2017

A 2×14bit digital transmitter with memoryless current unit cells and integrated AM/PM calibration.
Proceedings of the 43rd IEEE European Solid State Circuits Conference, 2017

Manipulatable wireless key establishment.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
Top-of-Atmosphere Image Simulation in the 4.3-µm Mid-infrared Absorption Bands.
IEEE Trans. Geoscience and Remote Sensing, 2016

You Can Jam But You Cannot Hide: Defending Against Jamming Attacks for Geo-Location Database Driven Spectrum Sharing.
IEEE Journal on Selected Areas in Communications, 2016

Nonlinear Dimensionality Reduction by Local Orthogonality Preserving Alignment.
J. Comput. Sci. Technol., 2016

Tracking people in RGBD videos using deep learning and motion clues.
Neurocomputing, 2016

A Type of Energy Hole Avoiding Method Based on Synchronization of Nodes in Adjacent Annuluses for Sensor Network.
IJDSN, 2016

Cognitive Networking for Next-G Wireless Communications.
IJDSN, 2016

An Augmented Artificial Bee Colony with Hybrid Learning.
Proceedings of the Advances in Swarm Intelligence, 7th International Conference, 2016

Hierarchical Random Walk Inference in Knowledge Graphs.
Proceedings of the 39th International ACM SIGIR conference on Research and Development in Information Retrieval, 2016

SQLite Forensic Analysis Based on WAL.
Proceedings of the Security and Privacy in Communication Networks, 2016

A 74.6GHz-83.6GHz digitally controlled oscillator with 370kHz frequency resolution in 65nm CMOS.
Proceedings of the 2016 IEEE Radio and Wireless Symposium, 2016

A Radiation Hardening Algorithm on 2nd Order CDR.
Proceedings of the Computer Engineering and Technology - 20th CCF Conference, 2016

Spoofing Attacks against FM Indoor Localization.
Proceedings of the International Conference on Networking and Network Applications, 2016

A low-jitter self-biased phase-locked loop for SerDes.
Proceedings of the International SoC Design Conference, 2016

A Decision Procedure for a Fragment of Linear Time Mu-Calculus.
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016

Aggregation and scheduling methods of electric vehicle agents divided by regions.
Proceedings of the 3rd International Conference on Systems and Informatics, 2016

An Augmented Artificial Bee Colony with Hybrid Learning for Traveling Salesman Problem.
Proceedings of the Intelligent Computing Theories and Application, 2016

Randomized positioning DSSS for anti-jamming wireless communications.
Proceedings of the 2016 International Conference on Computing, 2016

Satisfiability of Linear Time Mu-Calculus on Finite Traces.
Proceedings of the Computing and Combinatorics - 22nd International Conference, 2016

Virtual Safe: Unauthorized movement detection for mobile devices.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

Vehicle Self-Surveillance: Sensor-Enabled Automatic Driver Recognition.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

The analysis of regularity and synchrony of Parkinsonian tremor using Approximate Entropy and Cross-Approximate Entropy.
Proceedings of the 9th International Congress on Image and Signal Processing, 2016

PAC Continuous State Online Multitask Reinforcement Learning with Identification.
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016

2015
Evaluating the single event sensitivity of dynamic comparator in 5 Gbps SerDes.
IEICE Electronic Express, 2015

A fast algebraic non-penetration filter for continuous collision detection.
Graphical Models, 2015

A spectral-correaltion-based emissivity image simulation method for the 2.7 micron absorption bands.
Proceedings of the 7th Workshop on Hyperspectral Image and Signal Processing: Evolution in Remote Sensing, 2015

Loop-Oriented Programming: A New Code Reuse Attack to Bypass Modern Defenses.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A New Approach to Embedding Semantic Link Network with Word2Vec Binary Code.
Proceedings of the 11th International Conference on Semantics, Knowledge and Grids, 2015

Hashing for Cross-Modal Similarity Retrieval.
Proceedings of the 11th International Conference on Semantics, Knowledge and Grids, 2015

ISboxing: An Instruction Substitution Based Data Sandboxing for x86 Untrusted Libraries.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

A High-PSRR CMOS Bandgap Reference Circuit.
Proceedings of the Computer Engineering and Technology - 19th CCF Conference, 2015

Agent-based Channel Selection scheme against location inference attack in cognitive radio networks.
Proceedings of the 34th IEEE Military Communications Conference, 2015

A Joint Asymmetric Graphics Rendering and Video Encoding Approach for Optimizing Cloud Mobile 3D Display Gaming User Experience.
Proceedings of the 2015 IEEE International Symposium on Multimedia, 2015

A single Op-Amp 0+2 sigma-delta modulator.
Proceedings of the 2015 IEEE International Symposium on Circuits and Systems, 2015

Study on the Model and Algorithm of Internet Trusted Identity Authentication System.
Proceedings of the 12th IEEE International Conference on e-Business Engineering, 2015

Fast Community Discovery and Its Evolution Tracking in Time-Evolving Social Networks.
Proceedings of the IEEE International Conference on Data Mining Workshop, 2015

A Privacy-Preserving Fuzzy Localization Scheme with CSI Fingerprint.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Building boundaries extaction from point clouds using dual-threshold Alpha Shapes.
Proceedings of the 23rd International Conference on Geoinformatics, 2015

A Simple Filtering Algorithm for Continuous Collision Detection Using Taylor Models.
Proceedings of the 14th International Conference on Computer-Aided Design and Computer Graphics, 2015

2014
Detection of Faults and Attacks Including False Data Injection Attack in Smart Grid Using Kalman Filter.
IEEE Trans. Control of Network Systems, 2014

Analysis of the Proportion of Surface Reflected Radiance in Mid-Infrared Absorption Bands.
IEEE J Sel. Topics in Appl. Earth Observ. and Remote Sensing, 2014

The polarization-enabled digital self-interference cancellation scheme for the full duplex communication.
Proceedings of the 2014 International Symposium on Wireless Personal Multimedia Communications, 2014

The projection-based self-interference cancellation scheme in the polarization domain.
Proceedings of the 2014 International Symposium on Wireless Personal Multimedia Communications, 2014

EqualVisor: Providing Memory Protection in an Untrusted Commodity Hypervisor.
Proceedings of the 13th IEEE International Conference on Trust, 2014

An Improved Recursive Algorithm for Parity Games.
Proceedings of the 2014 Theoretical Aspects of Software Engineering Conference, 2014

Where are you from?: confusing location distinction using virtual multipath camouflage.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014

Using Machine Language Model for Mimimorphic Malware Detection.
Proceedings of the Information Security - 17th International Conference, 2014

A 2+1 multi-bit incremental architecture using Smart-DEM algorithm.
Proceedings of the IEEE International Symposium on Circuits and Systemss, 2014

A fast land surface temperature retrieval method for modis images using band 22 and 23 data.
Proceedings of the 2014 IEEE Geoscience and Remote Sensing Symposium, 2014

Stiffness Modeling and Optimization Analysis of a Novel 6-DOF Collaborative Parallel Manipulator.
Proceedings of the Intelligent Robotics and Applications - 7th International Conference, 2014

Combating False Data Injection Attacks in Smart Grid using Kalman Filter.
Proceedings of the International Conference on Computing, Networking and Communications, 2014

A DSCP-Based Method of QoS Class Mapping between WLAN and EPS Network.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2014

2013
Community Detecting and Feature Analysis in Real Directed Weighted Social Networks.
JNW, 2013

Evaluating the managerial behavior of managing knowledge in Chinese SMEs.
Information Technology and Management, 2013

A non-monetary protocol for peer-to-peer content distribution in wireless broadcast networks with network coding.
Proceedings of the 11th International Symposium and Workshops on Modeling and Optimization in Mobile, 2013

Present-Future Form of Linear Time $$\mu $$ -Calculus.
Proceedings of the Structured Object-Oriented Formal Language and Method, 2013

High-order multi-bit incremental converter with Smart-DEM algorithm.
Proceedings of the 2013 IEEE International Symposium on Circuits and Systems (ISCAS2013), 2013

Location privacy in database-driven Cognitive Radio Networks: Attacks and countermeasures.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Research on Semantic Metadata Online Auxiliary Construction Platform and Key Technologies.
Proceedings of the Chinese Lexical Semantics - 14th Workshop, 2013

Study on Construction of Semantic Metadata Structure in Professional Fields.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

2012
Analysis of surface radiance composition for absorption bands in middle-infrared regions.
Proceedings of the 4th Workshop on Hyperspectral Image and Signal Processing, 2012

Simplified Swarm Optimization with Sorted Local Search for golf data classification.
Proceedings of the IEEE Congress on Evolutionary Computation, 2012

Location privacy leaking from spectrum utilization information in database-driven cognitive radio network.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
New Analysis and Design of a RF Rectifier for RFID and Implantable Devices.
Sensors, 2011

Towards efficient resource utilization in internet mobile streaming.
Proceedings of the 19th International Conference on Multimedia 2011, Scottsdale, AZ, USA, November 28, 2011

Digital assisted high-order multi-bit analog to digital ramp converters.
Proceedings of the 20th European Conference on Circuit Theory and Design, 2011

2010
iAVATAR: An Interactive Tool for Finding and Visualizing Visual-Representative Tags in Image Search.
PVLDB, 2010

New design of RF rectifier for passive UHF RFID transponders.
Microelectronics Journal, 2010

The Development of an NLP-Based Chinese Ontology Construction Platform.
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology - Workshops, Toronto, Canada, August 31, 2010

On Cognitive Network Channel Selection and the Impact on Transport Layer Performance.
Proceedings of the Global Communications Conference, 2010

2009
Document Clustering Description Extraction and Its Application.
Proceedings of the Computer Processing of Oriental Languages. Language Technology for the Knowledge-based Economy, 2009

Discriminatively Modeling Commonality of Term Types for Extracting Relation from Small Corpora.
Proceedings of the 2009 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2009

Development and Usage of Chinese Medicine Supporting System Based on Post-Controlled Machinery.
Proceedings of the 2009 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2009

Research on Automatic Chinese Multi-word Term Extraction Based on Integration of Web Information and Term Component.
Proceedings of the 2009 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2009

2008
Research on the Key Technology Based-NLP Of Chinese Medicine Pulse's Mathematical Quantifying.
Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2008

2007
An Exploratory Study of Web Services on the Internet.
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007

Composite Frequency-Offset Estimator for Wireless Communications.
Proceedings of IEEE International Conference on Communications, 2007

Email Community Detection Using Artificial Ant Colony Clustering.
Proceedings of the Advances in Web and Network Technologies, and Information Management, 2007

2006
An Adaptive Scoring Method for Block Importance Learning.
Proceedings of the 2006 IEEE / WIC / ACM International Conference on Web Intelligence (WI 2006), 2006


  Loading...