Yongzhong Li

Orcid: 0000-0002-1847-6387

According to our database1, Yongzhong Li authored at least 26 papers between 2008 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
A New Transparent File Encryption Method Based on SM4 for Android Platform.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

Research on Personalized Tourism Recommendation Technology Based on Improved S-TrustSVD Model.
Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering, 2022

A Personalized Scenic Spot Recommendation Algorithm Based on Improved TrustSVD Model.
Proceedings of the Tenth International Conference on Advanced Cloud and Big Data, 2022

2021
Low latency group-sorted QR decomposition algorithm for larger-scale MIMO systems.
IET Commun., 2021

Area-Efficient Parallel Reconfigurable Stream Processor for Symmetric Cryptograph.
IEEE Access, 2021

Research on Multi-granularity Intrusion Detection Algorithm Based onSequential Three-Way Decision.
Proceedings of the EITCE 2021: 5th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, October 22, 2021

2020
Practical AMC model based on SAE with various optimisation methods under different noise environments.
IET Commun., 2020

Predicting Scattering From Complex Nano-Structures via Deep Learning.
IEEE Access, 2020

Efficient MIMO Preprocessor With Sorting-Relaxed QR Decomposition and Modified Greedy LLL Algorithm.
IEEE Access, 2020

Study of Transparent File Encryption Technology on Android Platform.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020

A Semi-supervised Intrusion Detection Algorithm Based on Auto-encoder.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020

An Intrusion Detection Approach Based on Autoencoder and Three-way Decisions.
Proceedings of the EITCE 2020: 4th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, 6 November, 2020, 2020

A New Intrusion Detection Algorithm Based on PSO and Kernel Extreme Learning Machine.
Proceedings of the EITCE 2020: 4th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, 6 November, 2020, 2020

Research on Intrusion Detection Algorithm Based on Deep Belief Networks and Three-way Decisions.
Proceedings of the EITCE 2020: 4th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, 6 November, 2020, 2020

2018
A New Approach for Supervised Dimensionality Reduction.
Int. J. Data Warehous. Min., 2018

An adaptive blind watermarking algorithm based on DCT and its application in multimedia data processing.
Proceedings of the 10th International Conference on Internet Multimedia Computing and Service, 2018

2017
Bayesian Game Based Pseudo Honeypot Model in Social Networks.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2015
Robust Prostate Segmentation Using Intrinsic Properties of TRUS Images.
IEEE Trans. Medical Imaging, 2015

基于多标记与半监督学习的入侵检测方法研究 (Intrusion Detection Method Based on Multi-label and Semi-supervised Learning).
计算机科学, 2015

基于云模型和半监督聚类的入侵检测算法 (Intrusion Detection Algorithm Based on Cluster and Cloud Model).
计算机科学, 2015

A New Parameterized Algorithm for Predicting the Secondary Structure of RNA Sequences Including Pseudoknots.
Comput. J., 2015

2013
TRUS image segmentation with non-parametric kernel density estimation shape prior.
Biomed. Signal Process. Control., 2013

2012
TRUS Image Segmentation Driven by Narrow Band Contrast Pattern Using Shape Space Embedded Level Sets.
Proceedings of the Intelligent Science and Intelligent Data Engineering, 2012

2010
A New Distributed Intrusion Detection Method Based on Immune Mobile Agent.
Proceedings of the Life System Modeling and Intelligent Computing, 2010

2009
Intrusion Detection Method Based on Fuzzy Hidden Markov Model.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009

2008
An Adaptive Blind Watermarking Algorithm Based on DCT and Modified Watson's Visual Model.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008


  Loading...