Lihua Yin
Orcid: 0000-0001-8829-4442
According to our database1,
Lihua Yin
authored at least 104 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Trans. Netw. Serv. Manag., October, 2024
An Autoencoder-Based Hybrid Detection Model for Intrusion Detection With Small-Sample Problem.
IEEE Trans. Netw. Serv. Manag., April, 2024
PriMonitor: An adaptive tuning privacy-preserving approach for multimodal emotion detection.
World Wide Web (WWW), January, 2024
A game-theoretic approach for federated learning: A trade-off among privacy, accuracy and energy.
Digit. Commun. Networks, 2024
Private and Communication-Efficient Federated Learning based on Differentially Private Sketches.
CoRR, 2024
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024
2023
Inf. Sci., November, 2023
A feature enhancement-based model for the malicious traffic detection with small-scale imbalanced dataset.
Inf. Sci., November, 2023
A privacy-preserving botnet detection approach in largescale cooperative IoT environment.
Neural Comput. Appl., July, 2023
CDAML: a cluster-based domain adaptive meta-learning model for cross domain recommendation.
World Wide Web (WWW), May, 2023
IEEE Trans. Knowl. Data Eng., May, 2023
<i>WaterPurifier</i>: A scalable system to prevent the DNS water torture attack in 5G-enabled SIoT network.
Comput. Commun., February, 2023
GeoInformatica, 2023
2022
From Data and Model Levels: Improve the Performance of Few-Shot Malware Classification.
IEEE Trans. Netw. Serv. Manag., December, 2022
EmoMix+: An Approach of Depression Detection Based on Emotion Lexicon for Mobile Application.
Secur. Commun. Networks, 2022
TPRPF: a preserving framework of privacy relations based on adversarial training for texts in big data.
Frontiers Comput. Sci., 2022
Digit. Commun. Networks, 2022
FPMBot: Discovering the frequent pattern of IoT-botnet domain queries in large-scale network.
Comput. Commun., 2022
Proceedings of the IEEE Smartworld, 2022
2021
IEEE Trans. Netw. Sci. Eng., 2021
IEEE Trans. Netw. Sci. Eng., 2021
Secur. Commun. Networks, 2021
IEEE Netw., 2021
Inf. Process. Manag., 2021
Neurocomputing, 2021
LSVP: A visual based deep neural direction learning model for point-of-interest recommendation on sparse check-in data.
Neurocomputing, 2021
Rinegan: A Scalable Image Processing Architecture for Large Scale Surveillance Applications.
Frontiers Neurorobotics, 2021
Comput. Commun., 2021
A scalable rule engine system for trigger-action application in large-scale IoT environment.
Comput. Commun., 2021
2020
Achieving Privacy-Preserving Group Recommendation with Local Differential Privacy and Random Transmission.
Wirel. Commun. Mob. Comput., 2020
ConnSpoiler: Disrupting C&C Communication of IoT-Based Botnet Through Fast Detection of Anomalous Domain Queries.
IEEE Trans. Ind. Informatics, 2020
Int. J. Distributed Sens. Networks, 2020
Multi-objective spatial keyword query with semantics: a distance-owner based approach.
Distributed Parallel Databases, 2020
The QoS and privacy trade-off of adversarial deep learning: An evolutionary game approach.
Comput. Secur., 2020
Security of Mobile Multimedia Data: The Adversarial Examples for Spatio-temporal Data.
Comput. Networks, 2020
A Lightweight Privacy-Preserving Communication Protocol for Heterogeneous IoT Environment.
IEEE Access, 2020
A Secure Authentication Scheme for Remote Diagnosis and Maintenance in Internet of Vehicles.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020
2019
A Novel KGP Algorithm for Improving INS/GPS Integrated Navigation Positioning Accuracy.
Sensors, 2019
J. Ambient Intell. Humaniz. Comput., 2019
Mining Frequent Items Over the Distributed Hierarchical Continuous Weighted Data Streams in Internet of Things.
IEEE Access, 2019
Centralized Fusion Based on Interacting Multiple Model and Adaptive Kalman Filter for Target Tracking in Underwater Acoustic Sensor Networks.
IEEE Access, 2019
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019
A Genetic-Algorithm Based Method for Storage Location Assignments in Mobile Rack Warehouses.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Construction of Situation Assessment Indicator System Based on Latitude and Longitude Lines of Information Security.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019
Proceedings of the Communications, Signal Processing, and Systems, 2019
2018
World Wide Web, 2018
Secur. Commun. Networks, 2018
A Real-Time Correlation of Host-Level Events in Cyber Range Service for Smart Campus.
IEEE Access, 2018
Proceedings of the 2018 IEEE Military Communications Conference, 2018
Proceedings of the 2018 International Conference on Identification, 2018
Selecting Combined Countermeasures for Multi-Attack Paths in Intrusion Response System.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
Proceedings of the Computational Science - ICCS 2018, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
2017
Research on Similarity Record Detection of Device Status Information Based on Multiple Encoding Field.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Proceedings of the Network and System Security - 11th International Conference, 2017
Proceedings of the Algorithms and Architectures for Parallel Processing, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
2016
Proceedings of the 2016 IEEE Military Communications Conference, 2016
2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015
Proceedings of the Web Technologies and Applications - 17th Asia-PacificWeb Conference, 2015
2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014
Proceedings of the 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2014
Proceedings of the Web Technologies and Applications, 2014
Proceedings of the Web Technologies and Applications, 2014
A Modified-k-Anonymity Towards Spatial-Temporal Historical Data in Location-Based Social Network Service.
Proceedings of the Web Technologies and Applications, 2014
2013
Int. J. Data Min. Bioinform., 2013
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013
Proceedings of the 19th IEEE International Conference on Parallel and Distributed Systems, 2013
Proceedings of the 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2013
Proceedings of the Symposium on Architecture for Networking and Communications Systems, 2013
2012
Comput. Secur., 2012
Sci. China Inf. Sci., 2012
Network Security Analysis Method Taking into Account the Usage Information (Poster Abstract).
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012
Proceedings of the Intelligent Information Processing VI, 2012
Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems, 2012
2011
Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2011
Proceedings of the Global Communications Conference, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
Formalization and Quantitative Analysis of Controllability on Internet Information Security.
Int. J. Web Appl., 2010
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
2009
Proceedings of the International Conference on Networking, Architecture, and Storage, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2006
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006