Chunyong Yin

Orcid: 0000-0001-5764-2432

According to our database1, Chunyong Yin authored at least 47 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Defending Against Data Poisoning Attack in Federated Learning With Non-IID Data.
IEEE Trans. Comput. Soc. Syst., April, 2024

Semi-supervised log anomaly detection based on bidirectional temporal convolution network.
Comput. Secur., 2024

2023
Fast privacy-preserving utility mining algorithm based on utility-list dictionary.
Appl. Intell., December, 2023

Clustering-based Active Learning Classification towards Data Stream.
ACM Trans. Intell. Syst. Technol., April, 2023

Multimodal Sentiment Recognition With Multi-Task Learning.
IEEE Trans. Emerg. Top. Comput. Intell., February, 2023

Hybrid Representation and Decision Fusion towards Visual-textual Sentiment.
ACM Trans. Intell. Syst. Technol., 2023

2022
Anomaly Detection Based on Convolutional Recurrent Autoencoder for IoT Time Series.
IEEE Trans. Syst. Man Cybern. Syst., 2022

Cross-Modal Sentiment Sensing with Visual-Augmented Representation and Diverse Decision Fusion.
Sensors, 2022

2021
Improved Fake Reviews Detection Model Based on Vertical Ensemble Tri-Training and Active Learning.
ACM Trans. Intell. Syst. Technol., 2021

2020
Improved collaborative filtering recommendation algorithm based on differential privacy protection.
J. Supercomput., 2020

A distributed sensing data anomaly detection scheme.
Comput. Secur., 2020

2019
Improved deep packet inspection in data stream detection.
J. Supercomput., 2019

An improved method in deep packet inspection based on regular expression.
J. Supercomput., 2019

Local privacy protection classification based on human-centric computing.
Hum. centric Comput. Inf. Sci., 2019

Mobile marketing recommendation method based on user location feedback.
Hum. centric Comput. Inf. Sci., 2019

Location recommendation privacy protection method based on location sensitivity division.
EURASIP J. Wirel. Commun. Netw., 2019

Anomaly detection model based on data stream clustering.
Clust. Comput., 2019

Strategies for data stream mining method applied in anomaly detection.
Clust. Comput., 2019

2018
Location Privacy Protection Based on Differential Privacy Strategy for Big Data in Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2018

Improved clustering algorithm based on high-speed network data stream.
Soft Comput., 2018

Location Privacy Protection Research Based on Querying Anonymous Region Construction for Smart Campus.
Mob. Inf. Syst., 2018

Network Data Stream Classification by Deep Packet Inspection and Machine Learning.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2018

Improved Collaborative Filtering Recommendation Algorithm Based on Differential Privacy Protection.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2018

Improved Personalized Recommendation Method Based on Preference-Aware and Time Factor.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2018

2017
Parallel implementing improved k-means applied for image retrieval and anomaly detection.
Multim. Tools Appl., 2017

Maximum entropy model for mobile text classification in cloud computing using improved information gain algorithm.
Multim. Tools Appl., 2017

Towards accurate intrusion detection based on improved clonal selection algorithm.
Multim. Tools Appl., 2017

Mobile Anomaly Detection Based on Improved Self-Organizing Maps.
Mob. Inf. Syst., 2017

Location Privacy Protection Based on Improved K-Value Method in Augmented Reality on Mobile Devices.
Mob. Inf. Syst., 2017

An improved recommendation algorithm for big data cloud service based on the trust in sociology.
Neurocomputing, 2017

An improved anonymity model for big data security based on clustering algorithm.
Concurr. Comput. Pract. Exp., 2017

Improved Data Stream Clustering Algorithm for Anomaly Detection.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2017

Application of an Improved Data Stream Clustering Algorithm in Intrusion Detection System.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2017

Short Text Classification Technology Based on KNN+Hierarchy SVM.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2017

Chinese Anaphora Resolution Based on Adaptive Forest.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

An Improved Trust Model Based on Time Effect.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

Recognizing the Adhesion Hollow Characters Based on the Closed Cutting Algorithm.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

Text Classification Algorithm Based on SLAS-C.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

Data Stream Clustering Algorithm Based on Bucket Density for Intrusion Detection.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

Distributed Approach for the Security of P2P Wireless Network.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

Aspect Based Sentiment Analysis for Online Reviews.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017

2016
An improved Hoeffding-ID data-stream classification algorithm.
J. Supercomput., 2016

A Feature Selection Method for Improved Clonal Algorithm Towards Intrusion Detection.
Int. J. Pattern Recognit. Artif. Intell., 2016

2009
A Method of Automatic Key Generation Based on Handwriting.
Proceedings of the 10th ACIS International Conference on Software Engineering, 2009

A Modified Query Algorithm for Private Data Security Facing E-commerce.
Proceedings of the 2009 Pacific-Asia Conference on Circuits, Communications and Systems, 2009

A Model of Information Security Based on Office Automation.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

2007
A Modified Model for Private Data Security Facing E-commerce.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007


  Loading...