Yonglong Luo

Orcid: 0000-0003-4987-0376

According to our database1, Yonglong Luo authored at least 106 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Using outlier elimination to assess learning-based correspondence matching methods.
Inf. Sci., February, 2024

Kernelized Deep Learning for Matrix Factorization Recommendation System Using Explicit and Implicit Information.
IEEE Trans. Neural Networks Learn. Syst., January, 2024

Camera Topology Graph Guided Vehicle Re-Identification.
IEEE Trans. Multim., 2024

2023
A Trust Model Based on Characteristic Factors and SLAs for Cloud Environments.
IEEE Trans. Netw. Serv. Manag., December, 2023

Recommendation based on attributes and social relationships.
Expert Syst. Appl., December, 2023

Improved path planning algorithm for mobile robots.
Soft Comput., October, 2023

JointContrast: Skeleton-Based Interaction Recognition with New Representation and Contrastive Learning.
Algorithms, April, 2023

Consensus Adversarial Defense Method Based on Augmented Examples.
IEEE Trans. Ind. Informatics, 2023

A Matrix Factorization Recommendation System-Based Local Differential Privacy for Protecting Users' Sensitive Data.
IEEE Trans. Comput. Soc. Syst., 2023

A matrix factorization recommendation model for tourism points of interest based on interest shift and differential privacy.
J. Intell. Fuzzy Syst., 2023

Privacy-Preserving Method for Trajectory Data Publication Based on Local Preferential Anonymity.
Inf., 2023

Collaborative filtering recommendations based on multi-factor random walks.
Eng. Appl. Artif. Intell., 2023

Channel Spatio-Temporal Convolutional Network for Trajectory Prediction.
Proceedings of the Ubiquitous Security, 2023

2022
High-Frequency Trajectory Map Matching Algorithm Based on Road Network Topology.
IEEE Trans. Intell. Transp. Syst., 2022

Density-Peak-Based Overlapping Community Detection Algorithm.
IEEE Trans. Comput. Soc. Syst., 2022

Access Control Method for EV Charging Stations Based on State Aggregation and Q-Learning.
J. Syst. Sci. Complex., 2022

Clustering Methods Based on Stay Points and Grid Density for Hotspot Detection.
ISPRS Int. J. Geo Inf., 2022

A k-nearest neighbor query method based on trust and location privacy protection.
Concurr. Comput. Pract. Exp., 2022

JointContrast: Skeleton-Based Mutual Action Recognition with Contrastive Learning.
Proceedings of the PRICAI 2022: Trends in Artificial Intelligence, 2022

Skeleton-Based Mutual Action Recognition Using Interactive Skeleton Graph and Joint Attention.
Proceedings of the Database and Expert Systems Applications, 2022

2021
A Secure Truth Discovery for Data Aggregation in Mobile Crowd Sensing.
Secur. Commun. Networks, 2021

Retracing extended sudoku matrix for high-capacity image steganography.
Multim. Tools Appl., 2021

A Novel Travel Group Recommendation Model Based on User Trust and Social Influence.
Mob. Inf. Syst., 2021

A novel deep recommend model based on rating matrix and item attributes.
J. Intell. Inf. Syst., 2021

Map-matching approach based on link factor and hidden Markov model.
J. Intell. Fuzzy Syst., 2021

Persistent transportation traffic volume estimation with differential privacy.
J. Ambient Intell. Humaniz. Comput., 2021

Secure grid-based density peaks clustering on hybrid cloud for industrial IoT.
Int. J. Netw. Manag., 2021

Personalized trajectory privacy-preserving method based on sensitive attribute generalization and location perturbation.
Intell. Data Anal., 2021

Using information entropy and a multi-layer neural network with trajectory data to identify transportation modes.
Int. J. Geogr. Inf. Sci., 2021

A trust management model based on mutual trust and a reward-with-punishment mechanism for cloud environments.
Concurr. Comput. Pract. Exp., 2021

Short Text Clustering Using Joint Optimization of Feature Representations and Cluster Assignments.
Proceedings of the PRICAI 2021: Trends in Artificial Intelligence, 2021

An Effective Algorithm for Classification of Text with Weak Sequential Relationships.
Proceedings of the Database and Expert Systems Applications, 2021

2020
A Framework of Abnormal Behavior Detection and Classification Based on Big Trajectory Data for Mobile Networks.
Secur. Commun. Networks, 2020

A Privacy-Preserving Trajectory Publication Method Based on Secure Start-Points and End-Points.
Mob. Inf. Syst., 2020

A novel privacy-preserving matrix factorization recommendation system based on random perturbation.
J. Intell. Fuzzy Syst., 2020

Fingerprint enhancement using multi-scale classification dictionaries with reduced dimensionality.
IET Biom., 2020

A privacy-preserving density peak clustering algorithm in cloud computing.
Concurr. Comput. Pract. Exp., 2020

LBBESA: An efficient software-defined networking load-balancing scheme based on elevator scheduling algorithm.
Concurr. Comput. Pract. Exp., 2020

Towards Efficient, Credible and Privacy-Preserving Service QoS Prediction in Unreliable Mobile Edge Environments.
Proceedings of the International Symposium on Reliable Distributed Systems, 2020

Efficient and Privacy-Preserving Federated QoS Prediction for Cloud Services.
Proceedings of the 2020 IEEE International Conference on Web Services, 2020

Effective Tuple-based Anonymization for Massive Streaming Categorical Data.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

2019
Reversible data hiding based on reducing invalid shifting of pixels in histogram shifting.
Signal Process., 2019

基于SVD填充的混合推荐算法 (Hybrid Recommendation Algorithm Based on SVD Filling).
计算机科学, 2019

Collaborative filtering recommendation based on trust and emotion.
J. Intell. Inf. Syst., 2019

Road Congestion Detection Based on Trajectory Stay-Place Clustering.
ISPRS Int. J. Geo Inf., 2019

Geo-Tagged Photo Metadata Processing Method for Beijing Inbound Tourism Flow.
ISPRS Int. J. Geo Inf., 2019

Hierarchical interpolation point anonymity for trajectory privacy protection.
Intell. Data Anal., 2019

Subspace k-anonymity algorithm for location-privacy preservation based on locality-sensitive hashing.
Intell. Data Anal., 2019

TPPG: Privacy-preserving trajectory data publication based on 3D-Grid partition.
Intell. Data Anal., 2019

DDoS detection and defense mechanism based on cognitive-inspired computing in SDN.
Future Gener. Comput. Syst., 2019

Combining density peaks clustering and gravitational search method to enhance data clustering.
Eng. Appl. Artif. Intell., 2019

One-to-many image encryption with privacy-preserving homomorphic outsourced decryption based on compressed sensing.
Digit. Signal Process., 2019

Trajectory similarity clustering based on multi-feature distance measurement.
Appl. Intell., 2019

Differential Privacy-Preserving Density Peaks Clustering Based on Shared Near Neighbors Similarity.
IEEE Access, 2019

SLIND<sup>+</sup>: Stable LINk Detection.
Proceedings of the Web Information Systems Engineering, 2019

Persistent Transportation Traffic Volume Estimation with Differential Privacy.
Proceedings of the 2019 IEEE SmartWorld, 2019

2018
A novel social network hybrid recommender system based on hypergraph topologic structure.
World Wide Web, 2018

An infrastructure framework for privacy protection of community medical internet of things - Transmission protection, storage protection and access control.
World Wide Web, 2018

Privacy-Preserving and Energy-Efficient Continuous Data Aggregation Algorithm in Wireless Sensor Networks.
Wirel. Pers. Commun., 2018

A tourism destination recommender system using users' sentiment and temporal dynamics.
J. Intell. Inf. Syst., 2018

Probabilistic optimal projection partition KD-Tree k-anonymity for data publishing privacy protection.
Intell. Data Anal., 2018

Trajectory outlier detection approach based on common slices sub-sequence.
Appl. Intell., 2018

A Game Based Consolidation Method of Virtual Machines in Cloud Data Centers With Energy and Load Constraints.
IEEE Access, 2018

PosAla: A Smartphone-Based Posture Alarm System Design for Smartphone Users.
Proceedings of the 14th International Conference on Mobile Ad-Hoc and Sensor Networks, 2018

How Do Metro Station Crowd Flows Influence the Taxi Demand Based on Deep Spatial-Temporal Network?
Proceedings of the 14th International Conference on Mobile Ad-Hoc and Sensor Networks, 2018

A Novel Differential Privacy Recommendation Method Based on a Distributed Framework.
Proceedings of the 2018 IEEE International Conference on Data Mining Workshops, 2018

A Recommender System with Advanced Time Series Medical Data Analysis for Diabetes Patients in a Telehealth Environment.
Proceedings of the Database and Expert Systems Applications, 2018

SLIND: Identifying Stable Links in Online Social Networks.
Proceedings of the Database Systems for Advanced Applications, 2018

2017
On Efficient and Robust Anonymization for Privacy Protection on Massive Streaming Categorical Information.
IEEE Trans. Dependable Secur. Comput., 2017

Multi-scale Application of Camera Calibration in Tourism Service Platforms.
J. Inf. Hiding Multim. Signal Process., 2017

A Method for Service Evaluation Based on Fuzzy Theory for Cloud Computing.
KSII Trans. Internet Inf. Syst., 2017

Coupling a Fast Fourier Transformation With a Machine Learning Ensemble Model to Support Recommendations for Heart Disease Patients in a Telehealth Environment.
IEEE Access, 2017

An Efficient and Secure Itinerary-Based Data Aggregation Algorithm for WSNs.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

A Fast Fourier Transform-Coupled Machine Learning-Based Ensemble Model for Disease Risk Prediction Using a Real-Life Dataset.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2017

Profit maximization resource allocation in cloud computing with performance guarantee.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

Indoor object recognition using pre-trained convolutional neural network.
Proceedings of the 23rd International Conference on Automation and Computing, 2017

2016
An intelligent recommender system based on predictive analysis in telehealthcare environment.
Web Intell., 2016

Orthogonal design for scale invariant feature transform optimization.
J. Electronic Imaging, 2016

Tourism Destination Recommender System for the Cold Start Problem.
KSII Trans. Internet Inf. Syst., 2016

Neighborhood relevant outlier detection approach based on information entropy.
Intell. Data Anal., 2016

Outlier-eliminated k-means clustering algorithm based on differential privacy preservation.
Appl. Intell., 2016

GO-PEAS: A Scalable Yet Accurate Grid-Based Outlier Detection Method Using Novel Pruning Searching Techniques.
Proceedings of the Artificial Life and Computational Intelligence, 2016

2015
Detecting anomalies from big network traffic data using an adaptive detection approach.
Inf. Sci., 2015

2014
Fingerprint ridge orientation field reconstruction using the best quadratic approximation by orthogonal polynomials in two discrete variables.
Pattern Recognit., 2014

Voronoi Diagram Generation Algorithm based on Delaunay Triangulation.
J. Softw., 2014

A Novel Artificial Immune Algorithm for Spatial Clustering with Obstacle Constraint and Its Applications.
Comput. Intell. Neurosci., 2014

2013
Assessment of P2P Trust Model Based on Fuzzy Comprehensive Evaluation.
J. Softw., 2013

A Recommendation Trust Method Based on Fuzzy Clustering in P2P Networks.
J. Softw., 2013

An efficient and robust privacy protection technique for massive streaming choice-based information.
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013

2011
A Protocol of Privacy-Preserving Closest Pair in Two Dimensional Space.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

A Novel Fuzzy Logic Based Bit Freezing Technique to Improve Gene Specific Co-regulation Discovery from Gene Expression Databases.
Proceedings of the Thirty-Fourth Australasian Computer Science Conference, 2011

2010
Research on the Problem of Privacy-Preserving Closest Pair.
J. Comput., 2010

Privacy-Preserving Protocols for String Matching.
Proceedings of the Fourth International Conference on Network and System Security, 2010

2009
Three New Approaches to Privacy-preserving Add to Multiply Protocol and its Application.
Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, 2009

2008
A Threshold Multi-secret Sharing Scheme.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

Privacy-Preserving Practical Convex Hulls Protocol.
Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology, 2008

A Practical Three-Dimensional Privacy-Preserving Approximate Convex Hulls Protocol.
Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology, 2008

Privacy-preserving Protocols for Finding the Convex Hulls.
Proceedings of the The Third International Conference on Availability, 2008

2007
Secure Two-Party Point-Circle Inclusion Problem.
J. Comput. Sci. Technol., 2007

Privacy-Preserving DBSCAN Clustering Over Vertically Partitioned Data.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Privacy-preserving technology and its applications in statistics measurements.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007

2006
Quantum Oblivious Transfer Based on POVM Measurements.
Proceedings of the 2006 International Conference on Foundations of Computer Science, 2006

An Algorithm for Privacy-Preserving Quantitative Association Rules Mining.
Proceedings of the Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September, 2006

2005
Privacy Preserving ID3 Algorithm over Horizontally Partitioned Data.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

An Efficient Multiple-Precision Division Algorithm.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

2004
Arm up Administrators: Automated Vulnerability Management.
Proceedings of the 7th International Symposium on Parallel Architectures, 2004


  Loading...