Hongyun Xu

Orcid: 0000-0003-4470-9954

According to our database1, Hongyun Xu authored at least 27 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A revolutionary approach to use convolutional spiking neural networks for robust intrusion detection.
Clust. Comput., December, 2024

2023
A Trajectory K-Anonymity Model Based on Point Density and Partition.
CoRR, 2023

SVMDformer: A Semi-Supervised Vehicular Misbehavior Detection Framework Based on Transformer in IoV.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

2022
Spatial-Temporal Attentive LSTM for Vehicle-Trajectory Prediction.
ISPRS Int. J. Geo Inf., 2022

GTMS: A Gated Linear Unit Based Trust Management System for Internet of Vehicles Using Blockchain Technology.
Proceedings of the IEEE International Conference on Trust, 2022

2021
Semantic and Trade-Off Aware Location Privacy Protection in Road Networks Via Improved Multi-Objective Particle Swarm Optimization.
IEEE Access, 2021

2020
Hackem-LIBS: An Heterogeneous Stacking Ensemble Model for Laser-Induced Breakdown Spectroscopy Elemental Quantitative Analysis.
IEEE Access, 2020

Semantic Location Privacy Protection Algorithm Based on Edge Cluster Graph.
Proceedings of the 19th IEEE International Conference on Trust, 2020

2019
School-Enterprise Cooperation on Python Data Analysis Teaching.
Proceedings of the 14th International Conference on Computer Science & Education, 2019

Variable Neighborhood Search for Aircraft Scheduling in Multi-Runway Terminal Area.
Proceedings of the 3rd International Conference on Computer Science and Application Engineering, 2019

2018
Location-Semantic Aware Privacy Protection Algorithms for Location-Based Services.
Proceedings of the 2018 IEEE SmartWorld, 2018

2017
Personalized Semantic Location Privacy Preservation Algorithm Based on Query Processing Cost Optimization.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

2016
An Efficient Approach for Stimulating Cooperation among Nodes in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2016

An Authentication Data Structure of Provable Data Possession with Dynamic Data Operation in Cloud Computing.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

Study on Personalized Location Privacy Protection Algorithms for Continuous Queries in LBS.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

A WebGIS application: Tuna fishing ground forecasting information service system for the open South China Sea.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

Reform on college fundamentals of computer course based on mobile computing.
Proceedings of the 11th International Conference on Computer Science & Education, 2016

Similarities and Differences of Oceanic Primary Productivity Product Estimated by Three Models Based on MODIS for the Open South China Sea.
Proceedings of the Geo-Spatial Knowledge and Intelligence, 2016

Estimation of Fishing Vessel Numbers Close to the Terminator in the Pacific Northwest Using OLS/DMSP Data.
Proceedings of the Geo-Spatial Knowledge and Intelligence, 2016

2015
Evolutionary Game-Based Trust Strategy Adjustment among Nodes in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

Study on Personalized Location Privacy Preservation Algorithms Based on Road Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
Iterated Local Search for single-machine scheduling with sequence-dependent setup times to minimize total weighted tardiness.
J. Sched., 2014

A study of hybrid evolutionary algorithms for single machine scheduling problem with sequence-dependent setup times.
Comput. Oper. Res., 2014

2013
BDI Goal Recognition for Agent Program Learning.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Automatic BDI Plan Recognition from Process Execution Logs and Effect Logs.
Proceedings of the Engineering Multi-Agent Systems - First International Workshop, 2013

2011
Signaling game based strategy of intrusion detection in wireless sensor networks.
Comput. Math. Appl., 2011

2005
SAS: A Scalar Anonymous Communication System.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005


  Loading...