Yang Liu

Orcid: 0000-0003-2486-5765

Affiliations:
  • Harbin Institute of Technology, Shenzhen, China
  • University of Oxford, Department of Computer Science, Oxford, UK (PhD 2018)


According to our database1, Yang Liu authored at least 63 papers between 2016 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
An efficient computer-aided diagnosis model for classifying melanoma cancer using fuzzy-ID3-pvalue decision tree algorithm.
Multim. Tools Appl., September, 2024

APCSMA: Adaptive Personalized Client-Selection and Model-Aggregation Algorithm for Federated Learning in Edge Computing Scenarios.
Entropy, August, 2024

RPSC: Regulatable Privacy-Preserving Smart Contracts on Account-Based Blockchain.
IEEE Trans. Netw. Sci. Eng., 2024

Privacy-Preserving Recommendation Based on a Shuffled Federated Graph Neural Network.
IEEE Internet Comput., 2024

CAPPAD: a privacy-preservation solution for autonomous vehicles using SDN, differential privacy and data aggregation.
Appl. Intell., 2024

2023
Exploring a Mesh-Hub-Based Wireless Sensor Network for Smart Home Electrical Monitoring.
Wirel. Pers. Commun., December, 2023

Listening to Users' Voice: Automatic Summarization of Helpful App Reviews.
IEEE Trans. Reliab., December, 2023

Elliptic curve cryptographic image encryption using Henon map and Hopfield chaotic neural network.
Multim. Tools Appl., September, 2023

Privacy-Preserving Techniques in Cloud/Fog and Internet of Things.
Cryptogr., September, 2023

Deep learning: Applications, architectures, models, tools, and frameworks: A comprehensive survey.
CAAI Trans. Intell. Technol., September, 2023

A blockchain-based privacy-preserving advertising attribution architecture: Requirements, design, and a prototype implementation.
Softw. Pract. Exp., August, 2023

A novel buffering fault-tolerance approach for network on chip (NoC).
IET Circuits Devices Syst., July, 2023

Automatic IoT device identification: a deep learning based approach using graphic traffic characteristics.
Telecommun. Syst., June, 2023

Evolutionary Multilabel Adversarial Examples: An Effective Black-Box Attack.
IEEE Trans. Artif. Intell., June, 2023

SVScanner: Detecting smart contract vulnerabilities via deep semantic extraction.
J. Inf. Secur. Appl., June, 2023

An intelligent sustainable efficient transmission internet protocol to switch between User Datagram Protocol and Transmission Control Protocol in IoT computing.
Expert Syst. J. Knowl. Eng., June, 2023

A near-optimal & load balanced resilient system design for high-performance computing platform.
Clust. Comput., April, 2023

Recent trends towards privacy-preservation in Internet of Things, its challenges and future directions.
IET Circuits Devices Syst., March, 2023

Defending Against Data Poisoning Attacks: From Distributed Learning to Federated Learning.
Comput. J., March, 2023

ShrewdAttack: Low Cost High Accuracy Model Extraction.
Entropy, February, 2023

SLGNN: synthetic lethality prediction in human cancers based on factor-aware knowledge graph neural network.
Bioinform., February, 2023

Dynamic Contrastive Distillation for Image-Text Retrieval.
IEEE Trans. Multim., 2023

Adversarial ELF Malware Detection Method Using Model Interpretation.
IEEE Trans. Ind. Informatics, 2023

PSPGO: Cross-Species Heterogeneous Network Propagation for Protein Function Prediction.
IEEE ACM Trans. Comput. Biol. Bioinform., 2023

A Generic Cryptographic Deep-Learning Inference Platform for Remote Sensing Scenes.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2023

Kdb-D2CFR: Solving Multiplayer imperfect-information games with knowledge distillation-based DeepCFR.
Knowl. Based Syst., 2023

PPDMIT: a lightweight architecture for privacy-preserving data aggregation in the Internet of Things.
J. Ambient Intell. Humaniz. Comput., 2023

User-Centric Federated Matrix Factorization Based on Differential Privacy.
IEEE Internet Comput., 2023

2022
Collaborative Detection of Community Structure in Multiple Private Networks.
IEEE Trans. Comput. Soc. Syst., 2022

Simulation Method for Blockchain Systems with a Public Chain.
Sensors, 2022

3D face recognition algorithm based on nose tip contour and radial curve.
Multim. Tools Appl., 2022

An IoT and machine learning-based routing protocol for reconfigurable engineering application.
IET Commun., 2022

Robust Unlearnable Examples: Protecting Data Against Adversarial Learning.
CoRR, 2022

Adversarial malware sample generation method based on the prototype of deep learning detector.
Comput. Secur., 2022

An efficient cluster head selection for wireless sensor network-based smart agriculture systems.
Comput. Electron. Agric., 2022

Robust Unlearnable Examples: Protecting Data Privacy Against Adversarial Learning.
Proceedings of the Tenth International Conference on Learning Representations, 2022

CFDMA: A Novel Click Fraud Detection Method in Mobile Advertising.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

Local Energy Trading Platform Based on Privacy-Preserving Blockchain with Linkable Ring Signature.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

A Robust Watermarking Method For Image Processing Models.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

PyHENet: A Generic Framework for Privacy-Preserving DL Inference Based on Fully Homomorphic Encryption.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

A Lightweight Advertisement Ecosystem Simulation Platform for Security Analysis.
Proceedings of the 6th International Conference on Cryptography, Security and Privacy, 2022

A Blockchain-based Electricity Retail Contracts Management System.
Proceedings of the 4th Blockchain and Internet of Things Conference, 2022

2021
An Evolutionary Study of IoT Malware.
IEEE Internet Things J., 2021

Providing Cache Consistency Guarantee for ICN-Based IoT Based on Push Mechanism.
IEEE Commun. Lett., 2021

RR-LADP: A Privacy-Enhanced Federated Learning Scheme for Internet of Everything.
IEEE Consumer Electron. Mag., 2021

Detecting Android Malware Based on Dynamic Feature Sequence and Attention Mechanism.
Proceedings of the 5th IEEE International Conference on Cryptography, Security and Privacy, 2021

A Blockchain-based Privacy-Preserving Recommendation Mechanism.
Proceedings of the 5th IEEE International Conference on Cryptography, Security and Privacy, 2021

FedSP: Federated Speaker Verification with Personal Privacy Preservation.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

HFL-DP: Hierarchical Federated Learning with Differential Privacy.
Proceedings of the IEEE Global Communications Conference, 2021

FedDeepFM: Ad CTR prediction based on Federated Factorization Machine.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

Secure Neural Network in Federated Learning with Model Aggregation under Multiple Keys.
Proceedings of the 8th IEEE International Conference on Cyber Security and Cloud Computing, 2021

2020
Solving imperfect-information games via exponential counterfactual regret minimization.
CoRR, 2020

Delta-DNN: Efficiently Compressing Deep Neural Networks via Exploiting Floats Similarity.
Proceedings of the ICPP 2020: 49th International Conference on Parallel Processing, 2020

A Privacy-Preserving Friend Recommendation Mechanism for Online Social Networks.
Proceedings of the ICCSP 2020: 4th International Conference on Cryptography, 2020

PRTransE: Emphasize More Important Facts Based on Pagerank for Knowledge Graph Completion.
Proceedings of the Cognitive Computing - ICCC 2020, 2020

2019
Solving Six-Player Games via Online Situation Estimation.
Proceedings of the 31st IEEE International Conference on Tools with Artificial Intelligence, 2019

Structural-Based Graph Publishing Under Differential Privacy.
Proceedings of the Cognitive Computing - ICCC 2019, 2019

On the Trade-Off Between Privacy and Utility in Mobile Services: A Qualitative Study.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

2018
A high-performance virtual machine filesystem monitor in cloud-assisted cognitive IoT.
Future Gener. Comput. Syst., 2018

2017
Privacy-preserving targeted advertising for mobile devices.
PhD thesis, 2017

AdSelector: A Privacy-Preserving Advertisement Selection Mechanism for Mobile Devices.
Comput. J., 2017

2016
Privacy-preserving targeted mobile advertising: requirements, design and a prototype implementation.
Softw. Pract. Exp., 2016

Privacy-Preserving Targeted Mobile Advertising: Formal Models and Analysis.
Proceedings of the Data Privacy Management and Security Assurance, 2016


  Loading...