Yongfeng Huang

According to our database1, Yongfeng Huang authored at least 102 papers between 2000 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Twitter100k: A Real-World Dataset for Weakly Supervised Cross-Media Retrieval.
IEEE Trans. Multimedia, 2018

Domain attention model for multi-domain sentiment classification.
Knowl.-Based Syst., 2018

A hybrid unsupervised method for aspect term and opinion target extraction.
Knowl.-Based Syst., 2018

Enabling Efficient Verification of Dynamic Data Possession and Batch Updating in Cloud Storage.
TIIS, 2018

Detecting Bitrate Modulation-Based Covert Voice-Over-IP Communication.
IEEE Communications Letters, 2018

Optimization of CNN through Novel Training Strategy for Visual Classification Problems.
Entropy, 2018

Neural Chinese Word Segmentation with Dictionary Knowledge.
CoRR, 2018

Clinical Assistant Diagnosis for Electronic Medical Record Based on Convolutional Neural Network.
CoRR, 2018

Efficient Cross-User Deduplication of Encrypted Data Through Re-Encryption.
Proceedings of the 17th IEEE International Conference On Trust, 2018

THU_NGN at SemEval-2018 Task 2: Residual CNN-LSTM Network with Attention for English Emoji Prediction.
Proceedings of The 12th International Workshop on Semantic Evaluation, 2018

THU_NGN at SemEval-2018 Task 10: Capturing Discriminative Attributes with MLP-CNN model.
Proceedings of The 12th International Workshop on Semantic Evaluation, 2018

THU_NGN at SemEval-2018 Task 3: Tweet Irony Detection with Densely connected LSTM and Multi-task Learning.
Proceedings of The 12th International Workshop on Semantic Evaluation, 2018

THU_NGN at SemEval-2018 Task 1: Fine-grained Tweet Sentiment Intensity Analysis with Attention CNN-LSTM.
Proceedings of The 12th International Workshop on Semantic Evaluation, 2018

Neural Chinese Word Segmentation with Dictionary Knowledge.
Proceedings of the Natural Language Processing and Chinese Computing, 2018

Distant Supervision for Relation Extraction with Neural Instance Selector.
Proceedings of the Natural Language Processing and Chinese Computing, 2018

RITS: Real-Time Interactive Text Steganography Based on Automatic Dialogue Model.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Design and Implementation of Web System Based on Blockchain.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Focused Crawler Framework Based on Open Search Engine.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage.
IEEE Trans. Services Computing, 2017

Collaboratively Training Sentiment Classifiers for Multiple Domains.
IEEE Trans. Knowl. Data Eng., 2017

Distributed steganalysis of compressed speech.
Soft Comput., 2017

Enabling public auditability for operation behaviors in cloud storage.
Soft Comput., 2017

Steganalysis of adaptive multi-rate speech using statistical characteristics of pulse pairs.
Signal Processing, 2017

Detecting Steganography of Adaptive Multirate Speech with Unknown Embedding Rate.
Mobile Information Systems, 2017

Domain-specific sentiment classification via fusing sentiment knowledge from multiple sources.
Information Fusion, 2017

Image Captioning with Object Detection and Localization.
CoRR, 2017

Twitter100k: A Real-world Dataset for Weakly Supervised Cross-Media Retrieval.
CoRR, 2017

Critical journey evolving graphs.
Computer Communications, 2017

CSFL: A novel unsupervised convolution neural network approach for visual pattern classification.
AI Commun., 2017

A New Similarity Computation Method in Collaborative Filtering Based Recommendation System.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

Sentence-level Sentiment Classification with Weak Supervision.
Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2017

A Sudoku Matrix-Based Method of Pitch Period Steganography in Low-Rate Speech Coding.
Proceedings of the Security and Privacy in Communication Networks, 2017

THU_NGN at IJCNLP-2017 Task 2: Dimensional Sentiment Analysis for Chinese Phrases with Deep LSTM.
Proceedings of the IJCNLP 2017, Shared Tasks, Taipei, Taiwan, November 27, 2017

Text Steganography with High Embedding Rate: Using Recurrent Neural Networks to Generate Chinese Classic Poetry.
Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, 2017

Measuring Self-monitoring Using Facebook Online Data Based on Snyder's Psychological Theories.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

Image Captioning with Object Detection and Localization.
Proceedings of the Image and Graphics - 9th International Conference, 2017

Ensuring reliable logging for data accountability in untrusted cloud storage.
Proceedings of the IEEE International Conference on Communications, 2017

An Intelligent Field-Aware Factorization Machine Model.
Proceedings of the Database Systems for Advanced Applications, 2017

SigRA: A New Similarity Computation Method in Recommendation System.
Proceedings of the 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2017

Two-Phase Neural Network Model for Pollution Concentrations Forecasting.
Proceedings of the Fifth International Conference on Advanced Cloud and Big Data, 2017

Active Sentiment Domain Adaptation.
Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics, 2017

2016
Steganalysis of analysis-by-synthesis speech exploiting pulse-position distribution characteristics.
Security and Communication Networks, 2016

Universal steganography model for low bit-rate speech codec.
Security and Communication Networks, 2016

A multi-granularity fuzzy computing model for sentiment classification of Chinese reviews.
Journal of Intelligent and Fuzzy Systems, 2016

Text Steganography Based on Ci-poetry Generation Using Markov Chain Model.
TIIS, 2016

Microblog sentiment classification with heterogeneous sentiment knowledge.
Inf. Sci., 2016

Co-detecting social spammers and spam messages in microblogging via exploiting social contexts.
Neurocomputing, 2016

Structured microblog sentiment classification via social context regularization.
Neurocomputing, 2016

Towards building a high-quality microblog-specific Chinese sentiment lexicon.
Decision Support Systems, 2016

Combining Review Text Content and Reviewer-Item Rating Matrix to Predict Review Rating.
Comp. Int. and Neurosc., 2016

Fragile Watermarking Based Proofs of Retrievability for Archival Cloud Data.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Sentiment Domain Adaptation with Multi-Level Contextual Sentiment Knowledge.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016

An Algorithm Based on Game Theory for Detecting Overlapping Communities in Social Networks.
Proceedings of the International Conference on Advanced Cloud and Big Data, 2016

Sentiment Domain Adaptation with Multiple Sources.
Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics, 2016

Personalized Microblog Sentiment Classification via Multi-Task Learning.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

Reputation Audit in Multi-cloud Storage through Integrity Verification and Data Dynamics.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
Optimal matrix embedding for Voice-over-IP steganography.
Signal Processing, 2015

A High-Capacity Covering Code for Voice-Over-IP Steganography.
IJITWE, 2015

Improved adaptive partial-matching steganography for Voice over IP.
Computer Communications, 2015

A Fuzzy Computing Model for Identifying Polarity of Chinese Sentiment Words.
Comp. Int. and Neurosc., 2015

Collaborative Multi-domain Sentiment Classification.
Proceedings of the 2015 IEEE International Conference on Data Mining, 2015

Social Spammer and Spam Message Co-Detection in Microblogging with Social Context Regularization.
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015

A delay-based TCP for solving incast problem in data centers.
Proceedings of the IEEE China Summit and International Conference on Signal and Information Processing, 2015

Microblog Sentiment Classification with Contextual Knowledge Regularization.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

Steganalysis of Low Bit-Rate Speech Based on Statistic Characteristics of Pulse Positions.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

An Efficient VoIP Steganography Based on Random Binary Matrix.
Proceedings of the 10th International Conference on P2P, 2015

2014
Some Fundamental Results on Complex Network Problem for Large-Scale Wireless Sensor Networks.
Wireless Personal Communications, 2014

Connectivity, coverage and power consumption in large-scale wireless sensor networks.
Computer Networks, 2014

Designing a new TCP based on FAST TCP for datacenter.
Proceedings of the IEEE International Conference on Communications, 2014

Hmfs: Efficient Support of Small Files Processing over HDFS.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2014

An improved parallel association rules algorithm based on MapReduce framework for big data.
Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery, 2014

WADE: simplified GUI add-on development for third-party software.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

A detection method of subliminal channel based on VoIP communication.
Proceedings of the 1st international workshop on Information hiding and its criteria for evaluation, 2014

2013
An Information- Theoretical Model for Streaming Media Based Stegosystems.
Computing and Informatics, 2013

A centrality estimation method based on Hidden Markov Model in social Delay Tolerant Networks.
Proceedings of the 22nd Wireless and Optical Communication Conference, 2013

Medoop: A medical information platform based on Hadoop.
Proceedings of the IEEE 15th International Conference on e-Health Networking, 2013

Designing an effective vibration-based notification interface for mobile phones.
Proceedings of the Computer Supported Cooperative Work, 2013

Lead-lag analysis via sparse co-projection in correlated text streams.
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013

Review rating prediction based on the content and weighting strong social relation of reviewers.
Proceedings of the 2013 international workshop on Mining unstructured big data using natural language processing, 2013

A method to build subliminal channel in streaming media with multiple steganography methods.
Proceedings of the 2013 IEEE China Summit and International Conference on Signal and Information Processing, 2013

2012
Steganography Integration Into a Low-Bit Rate Speech Codec.
IEEE Trans. Information Forensics and Security, 2012

Short text classification based on strong feature thesaurus.
Journal of Zhejiang University - Science C, 2012

Network service registration based on role-goal-process-service meta-model in a P2P network.
IET Communications, 2012

A Novel Focused Crawler Based on Breadcrumb Navigation.
Proceedings of the Advances in Swarm Intelligence - Third International Conference, 2012

Algorithm of identifying opinion leaders in BBS.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

Event-based estimation of user experience for network video streaming.
Proceedings of the 14th Asia-Pacific Network Operations and Management Symposium, 2012

2011
Steganography in Inactive Frames of VoIP Streams Encoded by Source Codec.
IEEE Trans. Information Forensics and Security, 2011

Pulse position checking-based steganalysis of G.723.1 compressed speech in VoIP.
IJMIS, 2011

Steganalysis of compressed speech to detect covert voice over Internet protocol channels.
IET Information Security, 2011

An Approach of Covert Communication Based on the Adaptive Steganography Scheme on Voice over IP.
Proceedings of IEEE International Conference on Communications, 2011

2010
Reversible Data Hiding Using Histogram Shifting in Small Blocks.
Proceedings of IEEE International Conference on Communications, 2010

2009
Performance of Database Driven Network Applications from the User Perspective.
TIIS, 2009

An Adaptive Steganography Scheme for Voice Over IP.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2009), 2009

An M-Sequence Based Steganography Model for Voice over IP.
Proceedings of IEEE International Conference on Communications, 2009

2008
The Effect of Task Relevance on Electrophysiological Response to Emotional Stimuli.
Proceedings of the Advances in Neural Networks, 2008

A Detailed Study on the Modulation of Emotion Processing by Spatial Location.
Proceedings of the Advances in Neural Networks, 2008

Implementation of Covert Communication Based on Steganography.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Covert Channels Based on Jitter Field of the RTCP Header.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

A Covert Communication Model Based on Least Significant Bits Steganography in Voice over IP.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

An Approach to Information Hiding in Low Bit-Rate Speech Stream.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
A Peer-To-Peer Traffic Identification Method Using Machine Learning.
Proceedings of the International Conference on Networking, 2007

2000
Acoustic echo cancellation for digital wireless network.
Proceedings of the ISCA 15th International Conference Computers and Their Applications, 2000


  Loading...