Liang Hu

Orcid: 0000-0002-6077-1873

Affiliations:
  • Jilin University, College of Computer Science and Technology, Changchun, China (PhD 1999)


According to our database1, Liang Hu authored at least 171 papers between 2005 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Federated edge learning for medical image augmentation.
Appl. Intell., January, 2025

Embedded feature fusion for multi-view multi-label feature selection.
Pattern Recognit., 2025

Enhanced multi-label feature selection considering label-specific relevant information.
Expert Syst. Appl., 2025

2024
CCDF-TAP: A Context-Aware Conflict Detection Framework for IoT Trigger-Action Programming With Graph Neural Network.
IEEE Internet Things J., October, 2024

Threat Detection in Trigger-Action Programming Rules of Smart Home With Heterogeneous Information Network Model.
IEEE Internet Things J., May, 2024

Enhancing Locally Adaptive Smoothing of Graph Neural Networks Via Laplacian Node Disagreement.
IEEE Trans. Knowl. Data Eng., March, 2024

Multi-label feature selection with high-sparse personalized and low-redundancy shared common features.
Inf. Process. Manag., March, 2024

Feature relevance and redundancy coefficients for multi-view multi-label feature selection.
Inf. Sci., January, 2024

A data fusion framework based on heterogeneous information network embedding for trigger-action programming in IoT.
Expert Syst. Appl., January, 2024

C³DA: A Universal Domain Adaptation Method for Scene Classification From Remote Sensing Imagery.
IEEE Geosci. Remote. Sens. Lett., 2024

DCGNN: Adaptive deep graph convolution for heterophily graphs.
Inf. Sci., 2024

A privacy-preserving federated graph learning framework for threat detection in IoT trigger-action programming.
Expert Syst. Appl., 2024

A task offloading approach based on risk assessment to mitigate edge DDoS attacks.
Comput. Secur., 2024

2023
HAT-GAE: Self-supervised graph autoencoders with hierarchical adaptive masking and trainable corruption.
Knowl. Based Syst., November, 2023

Partial multi-label feature selection via subspace optimization.
Inf. Sci., November, 2023

Signed attention based graph neural network for graphs with heterophily.
Neurocomputing, November, 2023

AdaNS: Adaptive negative sampling for unsupervised graph representation learning.
Pattern Recognit., April, 2023

Multilabel Feature Selection With Constrained Latent Structure Shared Term.
IEEE Trans. Neural Networks Learn. Syst., March, 2023

CIA: A Collaborative Integrity Auditing Scheme for Cloud Data With Multi-Replica on Multi-Cloud Storage Providers.
IEEE Trans. Parallel Distributed Syst., 2023

An Adaptive Energy Efficient MAC Protocol for RF Energy Harvesting WBANs.
IEEE Trans. Commun., 2023

Robust sparse and low-redundancy multi-label feature selection with dynamic local and global structure preservation.
Pattern Recognit., 2023

Multi-label feature selection via robust flexible sparse regularization.
Pattern Recognit., 2023

Towards unsupervised keyphrase extraction via an autoregressive approach.
Knowl. Based Syst., 2023

Cross-Modal Distillation for Speaker Recognition.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Graph Multihead Attention Pooling with Self-Supervised Learning.
Entropy, December, 2022

Nonnegative Matrix Factorization Based Heterogeneous Graph Embedding Method for Trigger-Action Programming in IoT.
IEEE Trans. Ind. Informatics, 2022

Efficient reversible data hiding scheme based on prediction-error expansion and optimal parameters dynamic selection.
J. Electronic Imaging, 2022

Label correlations variation for robust multi-label feature selection.
Inf. Sci., 2022

Feature-specific mutual information variation for multi-label feature selection.
Inf. Sci., 2022

2021
A Semiopportunistic Task Allocation Framework for Mobile Crowdsensing with Deep Learning.
Wirel. Commun. Mob. Comput., 2021

Preserving Similarity and Staring Decisis for Feature Selection.
IEEE Trans. Artif. Intell., 2021

Comparative assessment of PEE methods and new performance measurement for RDH.
Multim. Tools Appl., 2021

Learning flexible network representation via anonymous walks.
Knowl. Based Syst., 2021

TripleRank: An unsupervised keyphrase extraction algorithm.
Knowl. Based Syst., 2021

ISKE: An unsupervised automatic keyphrase extraction approach using the iterated sentences based on graph method.
Knowl. Based Syst., 2021

Multi-Label Feature Selection Combining Three Types of Conditional Relevance.
Entropy, 2021

NLP-based digital forensic investigation platform for online communications.
Comput. Secur., 2021

2020
A Secure Authentication and Key Agreement Scheme for IoT-Based Cloud Computing Environment.
Symmetry, 2020

A Review of Unsupervised Keyphrase Extraction Methods Using Within-Collection Resources.
Symmetry, 2020

Multi-label feature selection with shared common mode.
Pattern Recognit., 2020

Candidate region correlation for video action detection.
J. Vis. Commun. Image Represent., 2020

Things2Vec: Semantic Modeling in the Internet of Things With Graph Representation Learning.
IEEE Internet Things J., 2020

Decentralised federated learning with adaptive partial gradient aggregation.
CAAI Trans. Intell. Technol., 2020

Feature redundancy term variation for mutual information-based feature selection.
Appl. Intell., 2020

Common but Innovative: Learning Features From Apps in Different Domains.
IEEE Access, 2020

A Reversible Steganography Method With Statistical Features Maintained Based on the Difference Value.
IEEE Access, 2020

A Reversible Data Hiding Algorithm Based on Prediction Error With Large Amounts of Data Hiding in Spatial Domain.
IEEE Access, 2020

2019
Mobile Edge Provision with Flexible Deployment.
IEEE Trans. Serv. Comput., 2019

An Offline Coarse-To-Fine Precision Optimization Algorithm for 3D Laser SLAM Point Cloud.
Remote. Sens., 2019

Dynamic pricing with traffic engineering for adaptive video streaming over software-defined content delivery networking.
Multim. Tools Appl., 2019

Framework for replica placement over cooperative edge networks.
J. Ambient Intell. Humaniz. Comput., 2019

Nonnegative matrix tri-factorization with user similarity for clustering in point-of-interest.
Neurocomputing, 2019

Fast distributed video deduplication via locality-sensitive hashing with similarity ranking.
EURASIP J. Image Video Process., 2019

An Unsupervised Approach for Keyphrase Extraction Using Within-Collection Resources.
IEEE Access, 2019

An Authentication Scheme to Defend Against UDP DrDoS Attacks in 5G Networks.
IEEE Access, 2019

Semantic Representation With Heterogeneous Information Network Using Matrix Factorization for Clustering in the Internet of Things.
IEEE Access, 2019

Social Mobilization to Reposition Indiscriminately Parked Shareable Bikes.
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019

Ethically Aligned Mobilization of Community Effort to Reposition Shared Bikes.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
Feature selection considering the composition of feature relevancy.
Pattern Recognit. Lett., 2018

Class-specific mutual information variation for feature selection.
Pattern Recognit., 2018

The maximum matching degree sifting algorithm for steganography pretreatment applied to IoT.
Multim. Tools Appl., 2018

Q-FDBA: improving QoE fairness for video streaming.
Multim. Tools Appl., 2018

Updated SSDP Scheme for DDoS Attack Defense.
KSII Trans. Internet Inf. Syst., 2018

SRMCS: A semantic-aware recommendation framework for mobile crowd sensing.
Inf. Sci., 2018

A novel process-based association rule approach through maximal frequent itemsets for big data processing.
Future Gener. Comput. Syst., 2018

Feature selection considering two types of feature relevancy and feature interdependency.
Expert Syst. Appl., 2018

Feature selection by integrating two groups of feature evaluation criteria.
Expert Syst. Appl., 2018

A Stochastic Adjustment Strategy for Coordination Process in Distributed Networks.
Comput. Informatics, 2018

Topology2Vec: Topology Representation Learning For Data Center Networking.
IEEE Access, 2018

Reward-Aided Sensing Task Execution in Mobile Crowdsensing Enabled by Energy Harvesting.
IEEE Access, 2018

Feature Selection by Maximizing Part Mutual Information.
Proceedings of the 2018 International Conference on Signal Processing and Machine Learning, 2018

2017
A semantics-based approach to multi-source heterogeneous information fusion in the internet of things.
Soft Comput., 2017

Role-based intelligent application state computing for OpenFlow distributed controllers in software-defined networking.
Soft Comput., 2017

A secure and effective scheme providing comprehensive forward security to LTE/SAE X2 handover key management.
KSII Trans. Internet Inf. Syst., 2017

A heuristic placement selection approach of partitions of mobile applications in mobile cloud computing model based on community collaboration.
Clust. Comput., 2017

Explore virtual machine deployment to mobile cloud computing for multi-tenancy and energy conservation in wireless network.
Clust. Comput., 2017

Semantic Preference-Based Personalized Recommendation on Heterogeneous Information Network.
IEEE Access, 2017

2016
A Heuristic Clustering-Based Task Deployment Approach for Load Balancing Using Bayes Theorem in Cloud Environment.
IEEE Trans. Parallel Distributed Syst., 2016

Computer forensic analysis model for the reconstruction of chain of evidence of volatile memory data.
Multim. Tools Appl., 2016

The efficiency improved scheme for secure access control of digital video distribution.
Multim. Tools Appl., 2016

A Stream Processing System for Multisource Heterogeneous Sensor Data.
J. Sensors, 2016

A novel trajectory similarity-based approach for location prediction.
Int. J. Distributed Sens. Networks, 2016

A Closer Look at GPGPU.
ACM Comput. Surv., 2016

Multi-pattern Matching Algorithm with Wildcards Based on Euclidean Distance and Hash Function.
Proceedings of the Computational Science and Its Applications - ICCSA 2016, 2016

2015
A Data Processing Middleware Based on SOA for the Internet of Things.
J. Sensors, 2015

The Research and Prospect of Secure Data Access Control in Cloud Storage Environment.
J. Commun., 2015

The Research and Outlook for Keyword-Based Searchable Encryption in Cloud Storage.
J. Commun., 2015

A fast approach for detection of erythemato-squamous diseases based on extreme learning machine with maximum relevance minimum redundancy feature selection.
Int. J. Syst. Sci., 2015

A Survey from the Perspective of Evolutionary Process in the Internet of Things.
Int. J. Distributed Sens. Networks, 2015

Software Toolkits: Practical Aspects of the Internet of Things - A Survey.
Int. J. Distributed Sens. Networks, 2015

Estimating online vacancies in real-time road traffic monitoring with traffic sensor data stream.
Ad Hoc Networks, 2015

PEMM: A Privacy-Aware Data Aggregation Solution for Mobile Sensing Networks.
Proceedings of the Computational Intelligence and Intelligent Systems, 2015

An improved intrusion detection framework based on Artificial Neural Networks.
Proceedings of the 11th International Conference on Natural Computation, 2015

False positive elimination in intrusion detection based on clustering.
Proceedings of the 12th International Conference on Fuzzy Systems and Knowledge Discovery, 2015

2014
Windows Volatile Memory Forensics Based on Correlation Analysis.
J. Networks, 2014

Research and Implementation of the Localization Algorithm Based on RSSI Technology.
J. Networks, 2014

Analysis and Improvement of a Robust User Authentication Framework for Ubiquitous Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

Energy-efficient and network-aware offloading algorithm for mobile cloud computing.
Comput. Networks, 2014

2013
Secure event signature protocol for peer-to-peer massive multiplayer online games using bilinear pairing.
Secur. Commun. Networks, 2013

An Intelligent Analysis Model for Multisource Volatile Memory.
J. Networks, 2013

An Efficient Parallel Anomaly Detection Algorithm Based on Hierarchical Clustering.
J. Networks, 2013

Analysis and Improvement for SPINS.
J. Networks, 2013

Research on Human Sensory Architecture for Cyber Physical Systems.
J. Networks, 2013

Analyzing Malware Based on Volatile Memory.
J. Networks, 2013

Environment Observation System based on Semantics in the Internet of Things.
J. Networks, 2013

Intrusion Classifier based on Multiple Attribute Selection Algorithms.
J. Comput., 2013

A Survey on Key Management of Identity-based Schemes in Mobile Ad Hoc Networks.
J. Commun., 2013

A Survey on Green Computing Based on Cloud Environment.
Int. J. Online Eng., 2013

Application-oriented Network Performance Evaluation for the Internet of Things.
Int. J. Online Biomed. Eng., 2013

A network-aware virtual machine placement algorithm in mobile cloud computing environment.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference Workshops, 2013

A topology hidden anonymous multicast routing for ad hoc networks.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
Online System for Grid Resource Monitoring and Machine Learning-Based Prediction.
IEEE Trans. Parallel Distributed Syst., 2012

Optimisation to the execution performance of grid job based on distributed file system.
Int. J. Parallel Emergent Distributed Syst., 2012

Extended representation of the conceptual element in temporal context and the diachronism of the knowledge system.
Knowl. Based Syst., 2012

An Improved Dynamic Password based Group Key Agreement against Dictionary Attack.
J. Softw., 2012

The Design and Implementation of Composite Collaborative Filtering Algorithm for Personalized Recommendation.
J. Softw., 2012

Cryptanalysis of Three Event Signature Protocols for Peer-to-peer Massively Multiplayer Online Games.
J. Networks, 2012

A Survey on Data Migration Management in Cloud Environment.
J. Digit. Inf. Manag., 2012

Cryptanalysis and Improvement of an ID-Based Threshold Signcryption Scheme.
J. Comput., 2012

Analysis and Enhancement of Three Identity-based Signcryption Protocols.
J. Comput., 2012

The Classic Security Application in M2M: the Authentication Scheme of Mobile Payment.
KSII Trans. Internet Inf. Syst., 2012

Label-Guided Graph Exploration with Adjustable Ratio of Labels.
Int. J. Found. Comput. Sci., 2012

Mobile social networks: state-of-the-art and a new vision.
Int. J. Commun. Syst., 2012

SVM-based ontology matching approach.
Int. J. Autom. Comput., 2012

Multi-stage Attack Detection Algorithm Based on Hidden Markov Model.
Proceedings of the Web Information Systems and Mining - International Conference, 2012

Review of Cyber-Physical System Architecture.
Proceedings of the 15th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops, 2012

Fair and efficient spectrum splitting for cooperative cognitive radio networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
Study on Visual Knowledge Structure Reasoning.
J. Softw., 2011

Enhancement of an Authenticated 3-round Identity-Based Group Key Agreement Protocol.
J. Networks, 2011

Cryptanalysis and Improvement of Selvi et al.'s Identity-Based Threshold Signcryption Scheme.
J. Networks, 2011

Weighted Automata for Full-Text Indexing.
Int. J. Found. Comput. Sci., 2011

A Classification of Cluster Validity Indexes Based on Membership Degree and Applications.
Proceedings of the Web Information Systems and Mining - International Conference, 2011

Design and Realization of the Cloud Data Backup System Based on HDFS.
Proceedings of the Emerging Research in Web Information Systems and Mining, 2011

Defense against DNS Man-In-The-Middle Spoofing.
Proceedings of the Web Information Systems and Mining - International Conference, 2011

2010
Efficient Identity-based Broadcast Encryption without Random Oracles.
J. Comput., 2010

Improvement on Intrusion Detection Technology Based on Protocol Analysis and Pattern Matching.
J. Convergence Inf. Technol., 2010

Pattern matching with wildcards using words of shorter length.
Inf. Process. Lett., 2010

A faster algorithm for matching a set of patterns with variable length don't cares.
Inf. Process. Lett., 2010

Survey of Grid Resource Monitoring and Prediction Strategies.
Int. J. Intell. Inf. Process., 2010

Bandwidth Prediction based on Nu-Support Vector Regression and Parallel Hybrid Particle Swarm Optimization.
Int. J. Comput. Intell. Syst., 2010

Support Vector Regression and Ant Colony Optimization for Grid Resources Prediction.
Proceedings of the Advances in Neural Networks, 2010

Genetic Algorithms with Improved Simulated Binary Crossover and Support Vector Regression for Grid Resources Prediction.
Proceedings of the Advances in Neural Networks, 2010

Improving the Defence against Web Server Fingerprinting by Eliminating Compliance Variation.
Proceedings of the Fifth International Conference on Frontier of Computer Science and Technology, 2010

Research on Performance Optimization for Grid Application Using Distributed File System.
Proceedings of the Fifth International Conference on Frontier of Computer Science and Technology, 2010

Registration and Private Key Distribution Protocol Based on IBE.
Proceedings of the Fifth International Conference on Frontier of Computer Science and Technology, 2010

2009
The Ontology Based Semantic Evaluating Method in LAV.
Proceedings of the 2009 Pacific-Asia Conference on Circuits, Communications and Systems, 2009

Grid Resource Prediction Based on Support Vector Regression and Genetic Algorithms.
Proceedings of the Fifth International Conference on Natural Computation, 2009

On the Structure of Consistent Partitions of Substring Set of a Word.
Proceedings of the Frontiers in Algorithmics, Third International Workshop, 2009

2008
Parallel Multidimensional Step search algorithm for epsilon-insensitive support vector regression in time series prediction.
Proceedings of the International Joint Conference on Neural Networks, 2008

Automata for Weak Factor Recognition.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

A Fast Resource Selection Approach for Grid Applications Based on Fuzzy Clustering Technology.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008

Design and Implementation of Bandwidth Prediction Based on Grid Service.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008

Using Density-Based Incremental Clustering for Anomaly Detection.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
Data Collection for Intrusion Detection System Based on Stratified Random Sampling.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2007

Performance Analysis of Offloading Systems in Mobile Wireless Environments.
Proceedings of IEEE International Conference on Communications, 2007

CRoSS: A Combined Routing and Surrogate Selection Algorithm for Pervasive Service Offloading in Mobile Ad Hoc Environments.
Proceedings of the Global Communications Conference, 2007

Applying Preference-Based Fuzzy Clustering Technology to Improve Grid Resources Selection Performance.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

A Reliable Data Management Method for Parallel File System.
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007

2006
Succinct Text Indexes on Large Alphabet.
Proceedings of the Theory and Applications of Models of Computation, 2006

UFCR: An Efficient I/O Method for Parallel File System.
Proceedings of the Seventh International Conference on Parallel and Distributed Computing, 2006

Comparison of Two Sampling-Based Data Collection Mechanisms for Intrusion Detection System.
Proceedings of the 2006 International Conference on Security & Management, 2006

SPS-VN: Research on the Security Policy System for Virtual Network.
Proceedings of the 2006 International Conference on Security & Management, 2006

Extended Resource Information Services Based-on Directory Service Technology.
Proceedings of the 10th International Conference on CSCW in Design, 2006

2005
GcpSensor: a CPU Performance Tool for Grid Environments.
Proceedings of the Fifth International Conference on Quality Software (QSIC 2005), 2005

A Grid CPU Availability Forecasting Tool for Windows.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2005

Fast Two Phrases PPM for IP Traceback.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

Integrating Local Job Scheduler - LSF<sup>TM</sup> with Gfarm<sup>TM</sup>.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

RRBS: A Fault Tolerance Model for Cluster/Grid Parallel File System.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

GT-Based Performance Improving for Resource Management of Computational Grid.
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005

Implementing Data Aware Scheduling In Gfarm(R) Using LSF(TM) Scheduler plugin Mechanism.
Proceedings of The 2005 International Conference on Grid Computing and Applications, 2005

Weighted Directed Word Graph.
Proceedings of the Combinatorial Pattern Matching, 16th Annual Symposium, 2005


  Loading...