Yun Liu

Orcid: 0000-0002-2861-0316

Affiliations:
  • Beijing Jiaotong University, Beijing Municipal Commission of Education, China
  • Beijing Jiaotong University, School of Electronic and Information Engineering, China


According to our database1, Yun Liu authored at least 104 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Joint Task Offloading and Resource Allocation for Fog-Based Intelligent Transportation Systems: A UAV-Enabled Multi-Hop Collaboration Paradigm.
IEEE Trans. Intell. Transp. Syst., November, 2023

Predict, pretrained, select and answer: Interpretable and scalable complex question answering over knowledge bases.
Knowl. Based Syst., October, 2023

ReLMKG: reasoning with pre-trained language models and knowledge graphs for complex question answering.
Appl. Intell., May, 2023

Joint Task Offloading and Resource Allocation: A Historical Cumulative Contribution Based Collaborative Fog Computing Model.
IEEE Trans. Veh. Technol., February, 2023

2022
Coarse-grained decomposition and fine-grained interaction for multi-hop question answering.
J. Intell. Inf. Syst., 2022

SEGCN-DCR: A syntax-enhanced event detection framework with decoupled classification rebalance.
Neurocomputing, 2022

Research on driving behaviour assessment based on evidence theory in 5G-VANET.
IET Commun., 2022

2021
Cross-domain sentiment classification based on key pivot and non-pivot extraction.
Knowl. Based Syst., 2021

CGSPN : cascading gated self-attention and phrase-attention network for sentence modeling.
J. Intell. Inf. Syst., 2021

Dual-Channel Reasoning Model for Complex Question Answering.
Complex., 2021

Sparse auto-encoder combined with kernel for network attack detection.
Comput. Commun., 2021

A Byzantine Fault-Tolerant Raft Algorithm Combined with Schnorr Signature.
Proceedings of the 15th International Conference on Ubiquitous Information Management and Communication, 2021

Chinese Triple Extraction Based on BERT Model.
Proceedings of the 15th International Conference on Ubiquitous Information Management and Communication, 2021

2020
No-reference stereoscopic images quality assessment method based on monocular superpixel visual features and binocular visual features<sup>☆</sup>.
J. Vis. Commun. Image Represent., 2020

Information cascades prediction with attention neural network.
Hum. centric Comput. Inf. Sci., 2020

A Smart Privacy-Preserving Learning Method by Fake Gradients to Protect Users Items in Recommender Systems.
Complex., 2020

UCAA: User-Centric User Association and Resource Allocation in Fog Computing Networks.
IEEE Access, 2020

Ciphertext-Policy Hierarchical Attribute-Based Encryption Against Key-Delegation Abuse for IoT-Connected Healthcare System.
IEEE Access, 2020

2019
Fused matrix factorization with multi-tag, social and geographical influences for POI recommendation.
World Wide Web, 2019

Joint radio resource allocation in fog radio access network for healthcare.
Peer-to-Peer Netw. Appl., 2019

TruGRC: Trust-Aware Group Recommendation with Virtual Coordinators.
Future Gener. Comput. Syst., 2019

2018
A novel parallel community detection scheme based on label propagation.
World Wide Web, 2018

Secure Data Storage and Searching for Industrial IoT by Integrating Fog Computing and Cloud Computing.
IEEE Trans. Ind. Informatics, 2018

Classification of Incomplete Data Based on Evidence Theory and an Extreme Learning Machine in Wireless Sensor Networks.
Sensors, 2018

BPRH: Bayesian personalized ranking for heterogeneous implicit feedback.
Inf. Sci., 2018

An Integrated Data Combination Method in Wireless Sensor Networks.
Int. J. Interdiscip. Telecommun. Netw., 2018

Collaborative Fusion for Distributed Target Classification Using Evidence Theory in IOT Environment.
IEEE Access, 2018

Field-Aware Matrix Factorization for Recommender Systems.
IEEE Access, 2018

Overlapping Community Detection Using Non-Negative Matrix Factorization With Orthogonal and Sparseness Constraints.
IEEE Access, 2018

Efficient ID-based Message Authentication with Enhanced Privacy in Wireless Ad-hoc Networks.
Proceedings of the 2018 International Conference on Computing, 2018

Threshold Proxy Re-encryption and Its Application in Blockchain.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

A Content Based Interest Mining Approach to Weibo Users.
Proceedings of the 5th International Conference on Behavioral, 2018

A Lightweight Filter-Based Target Tracking Model in Wireless Sensor Network.
Proceedings of the Ad Hoc Networks - 10th EAI International Conference, 2018

2017
Performance Optimization of Network Coding Based Communication and Reliable Storage in Internet of Things.
CoRR, 2017

Modeling and predicting opinion formation with trust propagation in online social networks.
Commun. Nonlinear Sci. Numer. Simul., 2017

System-Level Energy Balance for Maximizing Network Lifetime in WSNs.
IEEE Access, 2017

A Weighted Evidence Combination Approach for Target Identification in Wireless Sensor Networks.
IEEE Access, 2017

Mixed Similarity Diffusion for Recommendation on Bipartite Networks.
IEEE Access, 2017

Towards Green IoT Networking: Performance Optimization of Network Coding Based Communication and Reliable Storage.
IEEE Access, 2017

Modified Similarity Algorithm for Collaborative Filtering.
Proceedings of the Knowledge Management in Organizations - 12th International Conference, 2017

Leveraging adaptive peeking window to improve self-exciting point process model for popularity prediction.
Proceedings of the 2017 International Conference on Behavioral, 2017

2016
Improved trust management based on the strength of ties for secure data aggregation in wireless sensor networks.
Telecommun. Syst., 2016

k-Nearest neighbors tracking in wireless sensor networks with coverage holes.
Pers. Ubiquitous Comput., 2016

A weighted adaptation method on learning user preference profile.
Knowl. Based Syst., 2016

A Dynamic Model of Reposting Information Propagation Based on Empirical Analysis and Markov Process.
J. Univers. Comput. Sci., 2016

Recommendation using DMF-based fine tuning method.
J. Intell. Inf. Syst., 2016

Cooperative detection and protection for Interest flooding attacks in named data networking.
Int. J. Commun. Syst., 2016

Influence Model of User Behavior Characteristics on Information Dissemination.
Int. J. Comput. Commun. Control, 2016

Green alarm systems driven by emergencies in industrial wireless sensor networks.
IEEE Commun. Mag., 2016

TBPR: Trinity Preference based Bayesian Personalized Ranking for Multivariate Implicit Feedback.
Proceedings of the 2016 Conference on User Modeling Adaptation and Personalization, 2016

MDBSCAN: Multi-level Density Based Spatial Clustering of Applications with Noise.
Proceedings of the The 11th International Knowledge Management in Organizations Conference on The changing face of Knowledge Management Impacting Society, 2016

A multi-label community discovery algorithm based on the community kernel.
Proceedings of the The 11th International Knowledge Management in Organizations Conference on The changing face of Knowledge Management Impacting Society, 2016

Study on dual K-means algorithm in collaborative filtering system based on web log.
Proceedings of the The 11th International Knowledge Management in Organizations Conference on The changing face of Knowledge Management Impacting Society, 2016

POI recommendation with geographical and multi-tag influences.
Proceedings of the 2016 International Conference on Behavioral, 2016

Parallelizing label propagation for overlapping community detection.
Proceedings of the 2016 International Conference on Behavioral, 2016

2015
ICA: An Incremental Clustering Algorithm Based on OPTICS.
Wirel. Pers. Commun., 2015

Cognitive radio spectrum sensing framework based on multi-agent arc hitecture for 5G networks.
IEEE Wirel. Commun., 2015

Random and Directed Walk-Based Top- Queries in Wireless Sensor Networks.
Sensors, 2015

Double Cluster Heads Model for Secure and Accurate Data Fusion in Wireless Sensor Networks.
Sensors, 2015

Energy-Efficient Data Fusion Technique and Applications in Wireless Sensor Networks.
J. Sensors, 2015

The Routing Algorithm Based on Fuzzy Logic Applied to the Individual Physiological Monitoring Wearable Wireless Sensor Network.
J. Electr. Comput. Eng., 2015

Empirical Analysis of Relationship-based User Reposting Behavior on Microblog Network.
Int. J. Interdiscip. Telecommun. Netw., 2015

Data Processing Techniques in Wireless Multimedia Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

SRDA: Smart Reputation-Based Data Aggregation Protocol for Wireless Sensor Network.
Int. J. Distributed Sens. Networks, 2015

GABs: A Game-Based Secure and Energy Efficient Data Aggregation for Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

The Research on Path-Based DoS Attack Detection Algorithm in Wireless Sensor Networks.
Proceedings of the Knowledge Management in Organizations - 10th International Conference, 2015

2014
Automatic Crack Detection and Classification Method for Subway Tunnel Safety Monitoring.
Sensors, 2014

An Integrated Model for Robust Multisensor Data Fusion.
Sensors, 2014

TDAL: Thoroughly Data Aggregation of Low Energy Devices in Secure Heterogeneous Wireless Sensor Networks.
J. Sensors, 2014

A Data-aggregation Scheme for WSN based on Optimal Weight Allocation.
J. Networks, 2014

Low energy WSN data aggregation algorithm based on improved aggregation tree model.
Int. J. Sens. Networks, 2014

Generalized Secret Sharing with Linear Hierarchical Secrets.
Int. J. Netw. Secur., 2014

A Weighted Method to Update Network User Preference Profile Dynamically.
Int. J. Interdiscip. Telecommun. Netw., 2014

The Analysis for the Influence of Individual Node Base on the Network Community.
Int. J. Interdiscip. Telecommun. Netw., 2014

Data Fusion in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

The design of dynamic access control for hierarchical sensor networks with key-lock-pair mechanism.
Int. J. Ad Hoc Ubiquitous Comput., 2014

A New Method of Subway Tunnel Crack Image Compression Based on ROI and Motion Estimation.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

An Improved Collaborative Filtering Recommendation Algorithm for Microblog Based on Community Detection.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

An Algorithm to Detect the Crack in the Tunnel Based on the Image Processing.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

User Posting Behavior Analysis and Modeling in Microblog.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Research on Topic Detection Strategy Based on Extension of Comments and HowNet Lexeme.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

A Forecasting System of Micro-blog Public Opinion Based on Artificial Neural Network.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

2013
Authenticated RFID security mechanism based on chaotic maps.
Secur. Commun. Networks, 2013

The Novel Authentication Scheme Based on Theory of Quadratic Residues for Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

Improved Reliable Trust-Based and Energy-Efficient Data Aggregation for Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

ESMART: Energy-Efficient Slice-Mix-Aggregate for Wireless Sensor Network.
Int. J. Distributed Sens. Networks, 2013

High energy-efficient and privacy-preserving secure data aggregation for wireless sensor networks.
Int. J. Commun. Syst., 2013

A fault-tolerant group key agreement protocol exploiting dynamic setting.
Int. J. Commun. Syst., 2013

Competition of Dynamic Self-Confidence and Inhomogeneous Individual Influence in Voter Models.
Entropy, 2013

Empirical Analysis and Evolution Modeling of Network Topological Structure in Microblog.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

A New Algorithm for Personalized Recommendations in Community Networks.
Proceedings of the Advanced Technologies, Embedded and Multimedia for Human-centric Computing, 2013

Improved Multi-dimensional Top-k Query Processing Based on Data Prediction in Wireless Sensor Networks.
Proceedings of the Advanced Technologies, Embedded and Multimedia for Human-centric Computing, 2013

Empirical Analysis of User Life Span in Microblog.
Proceedings of the Advanced Technologies, Embedded and Multimedia for Human-centric Computing, 2013

Research on Micro-Blog Information Perception and Mining Platform.
Proceedings of the Advanced Technologies, Embedded and Multimedia for Human-centric Computing, 2013

A Novel Clustering Based Collaborative Filtering Recommendation System Algorithm.
Proceedings of the Advanced Technologies, Embedded and Multimedia for Human-centric Computing, 2013

IT Architecture of Multiple Heterogeneous Data.
Proceedings of the Advanced Technologies, Embedded and Multimedia for Human-centric Computing, 2013

Hybrid Data Fusion Method Using Bayesian Estimation and Fuzzy Cluster Analysis for WSN.
Proceedings of the Advanced Technologies, Embedded and Multimedia for Human-centric Computing, 2013

A LDoS Detection Method Based on Packet Arrival Time.
Proceedings of the Advanced Technologies, Embedded and Multimedia for Human-centric Computing, 2013

Design and Implementation of a LBS General Website Content Extract System for Android.
Proceedings of the Advanced Technologies, Embedded and Multimedia for Human-centric Computing, 2013

The Design of an Information Monitoring Platform Based on a WSN for a Metro Station.
Proceedings of the Advanced Technologies, Embedded and Multimedia for Human-centric Computing, 2013

2011
Statistically Modeling the Effectiveness of Disaster Information in Social Media.
Proceedings of the IEEE Global Humanitarian Technology Conference, 2011

2010
Guest Editorial.
J. Comput., 2010

2006
An Energy-Efficient Redundant Nodes Tree Mechanism for Wireless Sensor Networks.
Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29, 2006

A Pattern matching based Network Intrusion Detection System.
Proceedings of the Ninth International Conference on Control, 2006


  Loading...