Yuhong Liu

Orcid: 0000-0002-3717-427X

According to our database1, Yuhong Liu authored at least 131 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Graph Neural Networks for Quality of Service Improvement in Interference-Limited Ultra-Reliable and Low-Latency Communications.
IEEE Trans. Veh. Technol., March, 2024

Lightweight hybrid model based on MobileNet-v2 and Vision Transformer for human-robot interaction.
Eng. Appl. Artif. Intell., January, 2024

Hyperspectral Image Classification Based on Atrous Convolution Channel Attention-Aided Dense Convolutional Neural Network.
IEEE Geosci. Remote. Sens. Lett., 2024

Batch-oriented Element-wise Approximate Activation for Privacy-Preserving Neural Networks.
CoRR, 2024

Hybrid-Task Meta-Learning: A Graph Neural Network Approach for Scalable and Transferable Bandwidth Allocation.
CoRR, 2024

2023
RGB-D indoor semantic segmentation network based on wavelet transform.
Evol. Syst., December, 2023

Global Trends and Future Directions in Agricultural Remote Sensing for Wheat Scab Detection: Insights from a Bibliometric Analysis.
Remote. Sens., July, 2023

Cross-supervision-based equilibrated fusion mechanism of local and global attention for semantic segmentation.
Appl. Intell., May, 2023

FSMFA: Efficient firmware-secure multi-factor authentication protocol for IoT devices.
Internet Things, April, 2023

FCKDNet: A Feature Condensation Knowledge Distillation Network for Semantic Segmentation.
Entropy, January, 2023

Development of an FBG-Based Wearable Sensor for Simultaneous Respiration and Heartbeat Measurement.
IEEE Trans. Instrum. Meas., 2023

An Interpretive Adversarial Attack Method: Attacking Softmax Gradient Layer-Wise Relevance Propagation Based on Cosine Similarity Constraint and TS-Invariant.
Neural Process. Lett., 2023

A Two-stage Personalized Virtual Try-on Framework with Shape Control and Texture Guidance.
CoRR, 2023

TencentLLMEval: A Hierarchical Evaluation of Real-World Capabilities for Human-Aligned LLMs.
CoRR, 2023

VDKMS: Vehicular Decentralized Key Management System for Cellular Vehicular-to-Everything Networks, A Blockchain-Based Approach.
CoRR, 2023

Proxy Re-encryption based Fair Trade Protocol for Digital Goods Transactions via Smart Contracts.
CoRR, 2023

Achieving Maximum Efficiency in Schnorr-based Multi-signature and Applications in Blockchain.
CoRR, 2023

A Secure and Cost-Efficient Blockchain Facilitated IoT Software Update Framework.
IEEE Access, 2023

AMICA: Alleviating Misinformation for Chinese Americans.
Proceedings of the 46th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2023

Graph Neural Network-Based Bandwidth Allocation for Secure Wireless Communications.
Proceedings of the IEEE International Conference on Communications, 2023

VDKMS: Vehicular Decentralized Key Management System for Cellular Vehicular-to-Everything Networks, A Blockchain-Based Approach.
Proceedings of the IEEE Global Communications Conference, 2023

A Blockchain-based Co-Simulation Platform for Transparent and Fair Energy Trading and Management.
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2023

Group-Oriented Multi-Signature supporting Monotonic Endorse Policies in Hyperledger Fabric.
Proceedings of the IEEE International Conference on Blockchain, 2023

iBCTrans: A Practical Blockchain-Based Framework for Cellular Vehicular-To-Everything Networks.
Proceedings of the IEEE International Conference on Blockchain, 2023

2022
Multi-View High Precise 3D Human Body Reconstruction Method for Virtual Fitting.
Int. J. Pattern Recognit. Artif. Intell., December, 2022

Editorial: Special Issue "Edge and Fog Computing for Internet of Things Systems".
Sensors, 2022

Author Correction: Development and clinical deployment of a smartphone-based visual field deep learning system for glaucoma detection.
npj Digit. Medicine, 2022

Heterogeneous information network embedding for user behavior analysis on social media.
Neural Comput. Appl., 2022

A novel transfer learning for recognition of overlapping nano object.
Neural Comput. Appl., 2022

A dual-factor access authentication scheme for IoT terminal in 5G environments with network slice selection.
J. Inf. Secur. Appl., 2022

Residential House Occupancy Detection: Trust-Based Scheme Using Economic and Privacy-Aware Sensors.
IEEE Internet Things J., 2022

Lightweight single image deraining algorithm incorporating visual saliency.
IET Image Process., 2022

Pedestrian Detection with Multi-View Convolution Fusion Algorithm.
Entropy, 2022

Interference-Limited Ultra-Reliable and Low-Latency Communications: Graph Neural Networks or Stochastic Geometry?
CoRR, 2022

Secure IoT Routing: Selective Forwarding Attacks and Trust-based Defenses in RPL Network.
CoRR, 2022

Instant on-demand charging strategy with multiple chargers in wireless rechargeable sensor networks.
Ad Hoc Networks, 2022

Defending Against Co-Residence Attack in Energy-Efficient Cloud: An Optimization Based Real-Time Secure VM Allocation Strategy.
IEEE Access, 2022

Trust-Based Communities for Smart Grid Security and Privacy.
Proceedings of the Wireless Internet - 15th EAI International Conference, 2022

PEMT-CoSim: A Co-Simulation Platform for Packetized Energy Management and Trading in Distributed Energy Systems.
Proceedings of the IEEE International Conference on Communications, 2022

Leveraging Frame Aggregation in Wi-Fi IoT Networks for Low-Rate DDoS Attack Detection.
Proceedings of the Network and System Security - 16th International Conference, 2022

MentalNet: Heterogeneous Graph Representation for Early Depression Detection.
Proceedings of the IEEE International Conference on Data Mining, 2022

Graph Neural Networks for Timely Updates of Short Packets in Interference-Limited Networks.
Proceedings of the 56th Asilomar Conference on Signals, Systems, and Computers, ACSSC 2022, Pacific Grove, CA, USA, October 31, 2022

2021
Secure and Efficient Multi-Signature Schemes for Fabric: An Enterprise Blockchain Platform.
IEEE Trans. Inf. Forensics Secur., 2021

A Framework for Managing Device Association and Offloading the Transport Layer's Security Overhead of WiFi Device to Access Points.
Sensors, 2021

A Quantitative Study of DDoS and E-DDoS Attacks on WiFi Smart Home Devices.
IEEE Internet Things J., 2021

The Impact of DoS Attacks onResource-constrained IoT Devices: A Study on the Mirai Attack.
CoRR, 2021

Heterogeneous Graph Network Embedding for Sentiment Analysis on Social Media.
Cogn. Comput., 2021

DIMNet: Dense implicit function network for 3D human body reconstruction.
Comput. Graph., 2021

Sales mode selection of fresh food supply chain based on blockchain technology under different channel competition.
Comput. Ind. Eng., 2021

A New Topology Control Algorithm in Software Defined Wireless Rechargeable Sensor Networks.
IEEE Access, 2021

An Efficient SDN Architecture for Smart Home Security Accelerated by FPGA.
Proceedings of the 27th IEEE International Symposium on Local and Metropolitan Area Networks, 2021

Understanding COVID-19 Public Sentiment Towards Public Health Policies Using Social Media Data.
Proceedings of the IEEE Global Humanitarian Technology Conference, 2021

Is Social Diversity Related to Misinformation Resistance? An Empirical Study on Social Communities.
Proceedings of the IEEE Global Humanitarian Technology Conference, 2021

Securing Smart Homes via Software-Defined Networking and Low-Cost Traffic Classification.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

Analysis of blizzard process based on big data numerical simulation.
Proceedings of the AIAM 2021: 3rd International Conference on Artificial Intelligence and Advanced Manufacture, Manchester, United Kingdom, October 23, 2021

2020
Development and clinical deployment of a smartphone-based visual field deep learning system for glaucoma detection.
npj Digit. Medicine, 2020

Stock closing price prediction based on sentiment analysis and LSTM.
Neural Comput. Appl., 2020

Sentiment analysis via semi-supervised learning: a model based on dynamic threshold and multi-classifiers.
Neural Comput. Appl., 2020

基于卷积神经网络的压缩感知重构算法优化 (Optimization of Compressed Sensing Reconstruction Algorithms Based on Convolutional Neural Network).
计算机科学, 2020

Output feedback control for semi-Markovian jump systems with time-varying delay.
J. Control. Decis., 2020

Gene Expression Profiling of Type 2 Diabetes Mellitus by Bioinformatics Analysis.
Comput. Math. Methods Medicine, 2020

A Real-Time and Adaptive-Learning Malware Detection Method Based on API-Pair Graph.
IEEE Access, 2020

Adaptive Lead Weighted ResNet Trained With Different Duration Signals for Classifying 12-lead ECGs.
Proceedings of the Computing in Cardiology, 2020

SMART: Emerging Activity Recognition with Limited Data for Multi-modal Wearable Sensing.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

2019
Retrieving Hidden Friends: A Collusion Privacy Attack Against Online Friend Search Engine.
IEEE Trans. Inf. Forensics Secur., 2019

Influence of Managers' Subjective Judgments on Project Abandonment Decision Making.
Int. J. Inf. Technol. Decis. Mak., 2019

Compressed Sensing Image Reconstruction Based on Convolutional Neural Network.
Int. J. Comput. Intell. Syst., 2019

GraphSE<sup>2</sup>: An Encrypted Graph Database for Privacy-Preserving Social Search.
CoRR, 2019

Thinkey: A Scalable Blockchain Architecture.
CoRR, 2019

Multi-Robot Cooperative Task Allocation With Definite Path-Conflict-Free Handling.
IEEE Access, 2019

An Extensive Game-Based Resource Allocation for Securing D2D Underlay Communications.
IEEE Access, 2019

Sparse General Non-Negative Matrix Factorization Based on Left Semi-Tensor Product.
IEEE Access, 2019

Blockchain Based Owner-Controlled Secure Software Updates for Resource-Constrained IoT.
Proceedings of the Network and System Security - 13th International Conference, 2019

A Comprehensive Empirical Analysis of TLS Handshake and Record Layer on IoT Platforms.
Proceedings of the 22nd International ACM Conference on Modeling, 2019

Analysis of the duration and energy consumption of AES algorithms on a contiki-based IoT device.
Proceedings of the MobiQuitous 2019, 2019

A Linear Model for YUV 4: 2: 0 Chroma Intra Prediction.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2019

LSTM for Mobility Based Content Popularity Prediction in Wireless Caching Networks.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019

Multi-Tenant Base Stations: Algorithms and a Prototype.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Multi-keyword Ranked Searchable Encryption Supporting CP-ABE Test.
Proceedings of the Computing, Communications and IoT Applications, ComComAp 2019, Shenzhen, 2019

GraphSE²: An Encrypted Graph Database for Privacy-Preserving Social Search.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

Modeling the Views of WeChat Articles by Branching Processes.
Proceedings of the 2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2019

Edge Mining on IoT Devices Using Anomaly Detection.
Proceedings of the 2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2019

2018
A Novel Digital Watermarking Based on General Non-Negative Matrix Factorization.
IEEE Trans. Multim., 2018

A security evaluation framework for cloud security auditing.
J. Supercomput., 2018

Robust mode-dependent control for discrete-time singular Markovian jump systems with time-varying delay.
J. Control. Decis., 2018

A dynamic trust based two-layer neighbor selection scheme towards online recommender systems.
Neurocomputing, 2018

Incremental general non-negative matrix factorization without dimension matching constraints.
Neurocomputing, 2018

Criteria to evaluate the fidelity of image enhancement by MSRCR.
IET Image Process., 2018

Minimizing Required User Effort for Cold-Start Recommendation by Identifying the Most Important Latent Factors.
IEEE Access, 2018

FriPEL: Friendship Privacy Educational Labware.
Proceedings of the 2018 International Symposium on Security and Privacy in Social Networks and Big Data, 2018

An evaluation method of image scrambling degree based on pixel distribution.
Proceedings of the 2018 International Symposium on Security and Privacy in Social Networks and Big Data, 2018

Energy Modeling of Cluster System.
Proceedings of the 2018 IEEE International Workshop on Signal Processing Systems, 2018

Energy and Processing Demand Analysis of TLS Protocol in Internet of Things Applications.
Proceedings of the 2018 IEEE International Workshop on Signal Processing Systems, 2018

Machine Deserves Better Logging: A Log Enhancement Approach for Automatic Fault Diagnosis.
Proceedings of the 2018 IEEE International Symposium on Software Reliability Engineering Workshops, 2018

Single Frame Super Resolution with Convolutional Neural Network for Remote Sensing Imagery.
Proceedings of the 2018 IEEE International Geoscience and Remote Sensing Symposium, 2018

An optimized VM Allocation Strategy to Make a Secure and Energy-Efficient Cloud Against Co-residence Attack.
Proceedings of the 2018 International Conference on Computing, 2018

Analyzing the Resource Utilization of AES Encryption on IoT Devices.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

A Root-based Defense Mechanism Against RPL Blackhole Attacks in Internet of Things Networks.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

2017
Efficiently Promoting Product Online Outcome: An Iterative Rating Attack Utilizing Product and Market Property.
IEEE Trans. Inf. Forensics Secur., 2017

Structural and Functional Abnormalities in Children with Attention-Deficit/Hyperactivity Disorder: A Focus on Subgenual Anterior Cingulate Cortex.
Brain Connect., 2017

A novel iterative online rating attack based on market self-exciting property.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017

Selecting influential and trustworthy neighbors for collaborative filtering recommender systems.
Proceedings of the IEEE 7th Annual Computing and Communication Workshop and Conference, 2017

Personalized preference elicitation in recommender systems using matrix factorization.
Proceedings of the 51st Asilomar Conference on Signals, Systems, and Computers, 2017

2016
A Web Application For Studying Collusion Attacks Through Friend Search Engine.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Can You Really Make Profit from Online Rating Manipulations?: An Empirical Study.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Message from the HCSC Organizing Committee.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

An Advanced Collusion Attack against User Friendship Privacy in OSNs.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

2015
A Survey of Security and Privacy Challenges in Cloud Computing: Solutions and Future Directions.
J. Comput. Sci. Eng., 2015

Online Product Rating Manipulation and Market Performance.
Computer, 2015

2014
Securing Digital Reputation in Online Social Media [Applications Corner].
IEEE Signal Process. Mag., 2014

A centralized trust model approach for cloud computing.
Proceedings of the 23rd Wireless and Optical Communication Conference, 2014

2013
Securing Online Reputation Systems Through Trust Modeling and Temporal Analysis.
IEEE Trans. Inf. Forensics Secur., 2013

Can reputation manipulation boost app sales in Android market?
Proceedings of the IEEE International Conference on Acoustics, 2013

2012
On Design and Implementation of Neural-Machine Interface for Artificial Legs.
IEEE Trans. Ind. Informatics, 2012

Security of Online Reputation Systems: The evolution of attacks and defenses.
IEEE Signal Process. Mag., 2012

Case learning for CBR-based collision avoidance systems.
Appl. Intell., 2012

2011
Defending Multiple-User-Multiple-Target Attacks in Online Reputation Systems.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Trust sensor interface for improving reliability of EMG-based user intent recognition.
Proceedings of the 33rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2011

2010
Anomaly Detection in Feedback-based Reputation Systems through Temporal and Correlation Analysis.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Research on the mobile robot's odor source localization by biomimetics.
Proceedings of the 2010 IEEE International Conference on Robotics and Biomimetics, 2010

Integrating neuromuscular and cyber systems for neural control of artificial legs.
Proceedings of the ACM/IEEE 1st International Conference on Cyber-Physical Systems, 2010

2009
Case Learning in CBR-Based Agent Systems for Ship Collision Avoidance.
Proceedings of the Principles of Practice in Multi-Agent Systems, 2009

2008
Application of the synergetic algorithm on the classification of lymph tissue cells.
Comput. Biol. Medicine, 2008

Multi-agent Planning for Ship Collision Avoidance.
Proceedings of the 2008 IEEE Conference on Robotics, Automation and Mechatronics, 2008

A CBR-Based Approach for Ship Collision Avoidance.
Proceedings of the New Frontiers in Applied Artificial Intelligence, 2008

Detection of collusion behaviors in online reputation systems.
Proceedings of the 42nd Asilomar Conference on Signals, Systems and Computers, 2008

2007
P. Renard, H. Demougeot-Renard, R. Froidevaux, Editors, , Geostatistics for Environmental Applications, Proceedings of the Fifth European Conference on Geostatistics for Environmental Applications (2006) Springer, New York (480pp., US$169, Hardbound, ISBN: 3-540-26533-3).
Comput. Geosci., 2007

A Multiagent-Based Simulation System for Ship Collision Avoidance.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, 2007

2006
Using the Snesim program for multiple-point statistical simulation.
Comput. Geosci., 2006

2005
Scalable supernode selection in peer-to-peer overlay networks.
Proceedings of the Second International Workshop on Hot Topics in Peer-to-Peer Systems, 2005

2004
Cluster Computing on the Fly: P2P Scheduling of Idle Cycles in the Internet.
Proceedings of the Peer-to-Peer Systems III, Third International Workshop, 2004


  Loading...