Yonglong Luo
Orcid: 0000-0003-4987-0376
According to our database1,
Yonglong Luo
authored at least 114 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Appl. Intell., December, 2024
Int. J. Mach. Learn. Cybern., November, 2024
Security-Enhanced Data Sharing Scheme With Location Privacy Preservation for Internet of Vehicles.
IEEE Trans. Veh. Technol., September, 2024
Enhanced Self-Attention Mechanism for Long and Short Term Sequential Recommendation Models.
IEEE Trans. Emerg. Top. Comput. Intell., June, 2024
Federated Matrix Factorization Recommendation Based on Secret Sharing for Privacy Preserving.
IEEE Trans. Comput. Soc. Syst., June, 2024
Inf. Sci., February, 2024
Kernelized Deep Learning for Matrix Factorization Recommendation System Using Explicit and Implicit Information.
IEEE Trans. Neural Networks Learn. Syst., January, 2024
IEEE Trans. Netw. Sci. Eng., 2024
Appl. Soft Comput., 2024
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024
2023
IEEE Trans. Netw. Serv. Manag., December, 2023
Expert Syst. Appl., December, 2023
JointContrast: Skeleton-Based Interaction Recognition with New Representation and Contrastive Learning.
Algorithms, April, 2023
IEEE Trans. Ind. Informatics, 2023
A Matrix Factorization Recommendation System-Based Local Differential Privacy for Protecting Users' Sensitive Data.
IEEE Trans. Comput. Soc. Syst., 2023
A matrix factorization recommendation model for tourism points of interest based on interest shift and differential privacy.
J. Intell. Fuzzy Syst., 2023
Privacy-Preserving Method for Trajectory Data Publication Based on Local Preferential Anonymity.
Inf., 2023
Eng. Appl. Artif. Intell., 2023
Proceedings of the Ubiquitous Security, 2023
2022
IEEE Trans. Intell. Transp. Syst., 2022
IEEE Trans. Comput. Soc. Syst., 2022
Access Control Method for EV Charging Stations Based on State Aggregation and Q-Learning.
J. Syst. Sci. Complex., 2022
ISPRS Int. J. Geo Inf., 2022
Concurr. Comput. Pract. Exp., 2022
Proceedings of the PRICAI 2022: Trends in Artificial Intelligence, 2022
Skeleton-Based Mutual Action Recognition Using Interactive Skeleton Graph and Joint Attention.
Proceedings of the Database and Expert Systems Applications, 2022
2021
Secur. Commun. Networks, 2021
Multim. Tools Appl., 2021
Mob. Inf. Syst., 2021
J. Intell. Inf. Syst., 2021
J. Intell. Fuzzy Syst., 2021
J. Ambient Intell. Humaniz. Comput., 2021
Int. J. Netw. Manag., 2021
Personalized trajectory privacy-preserving method based on sensitive attribute generalization and location perturbation.
Intell. Data Anal., 2021
Using information entropy and a multi-layer neural network with trajectory data to identify transportation modes.
Int. J. Geogr. Inf. Sci., 2021
A trust management model based on mutual trust and a reward-with-punishment mechanism for cloud environments.
Concurr. Comput. Pract. Exp., 2021
Short Text Clustering Using Joint Optimization of Feature Representations and Cluster Assignments.
Proceedings of the PRICAI 2021: Trends in Artificial Intelligence, 2021
An Effective Algorithm for Classification of Text with Weak Sequential Relationships.
Proceedings of the Database and Expert Systems Applications, 2021
2020
A Framework of Abnormal Behavior Detection and Classification Based on Big Trajectory Data for Mobile Networks.
Secur. Commun. Networks, 2020
A Privacy-Preserving Trajectory Publication Method Based on Secure Start-Points and End-Points.
Mob. Inf. Syst., 2020
A novel privacy-preserving matrix factorization recommendation system based on random perturbation.
J. Intell. Fuzzy Syst., 2020
Fingerprint enhancement using multi-scale classification dictionaries with reduced dimensionality.
IET Biom., 2020
Concurr. Comput. Pract. Exp., 2020
LBBESA: An efficient software-defined networking load-balancing scheme based on elevator scheduling algorithm.
Concurr. Comput. Pract. Exp., 2020
Towards Efficient, Credible and Privacy-Preserving Service QoS Prediction in Unreliable Mobile Edge Environments.
Proceedings of the International Symposium on Reliable Distributed Systems, 2020
Proceedings of the 2020 IEEE International Conference on Web Services, 2020
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020
2019
Reversible data hiding based on reducing invalid shifting of pixels in histogram shifting.
Signal Process., 2019
J. Intell. Inf. Syst., 2019
ISPRS Int. J. Geo Inf., 2019
ISPRS Int. J. Geo Inf., 2019
Intell. Data Anal., 2019
Subspace k-anonymity algorithm for location-privacy preservation based on locality-sensitive hashing.
Intell. Data Anal., 2019
Intell. Data Anal., 2019
Future Gener. Comput. Syst., 2019
Combining density peaks clustering and gravitational search method to enhance data clustering.
Eng. Appl. Artif. Intell., 2019
One-to-many image encryption with privacy-preserving homomorphic outsourced decryption based on compressed sensing.
Digit. Signal Process., 2019
Appl. Intell., 2019
Differential Privacy-Preserving Density Peaks Clustering Based on Shared Near Neighbors Similarity.
IEEE Access, 2019
Proceedings of the Web Information Systems Engineering, 2019
Proceedings of the 2019 IEEE SmartWorld, 2019
2018
A novel social network hybrid recommender system based on hypergraph topologic structure.
World Wide Web, 2018
An infrastructure framework for privacy protection of community medical internet of things - Transmission protection, storage protection and access control.
World Wide Web, 2018
Privacy-Preserving and Energy-Efficient Continuous Data Aggregation Algorithm in Wireless Sensor Networks.
Wirel. Pers. Commun., 2018
A tourism destination recommender system using users' sentiment and temporal dynamics.
J. Intell. Inf. Syst., 2018
Probabilistic optimal projection partition KD-Tree k-anonymity for data publishing privacy protection.
Intell. Data Anal., 2018
Appl. Intell., 2018
A Game Based Consolidation Method of Virtual Machines in Cloud Data Centers With Energy and Load Constraints.
IEEE Access, 2018
Proceedings of the 14th International Conference on Mobile Ad-Hoc and Sensor Networks, 2018
How Do Metro Station Crowd Flows Influence the Taxi Demand Based on Deep Spatial-Temporal Network?
Proceedings of the 14th International Conference on Mobile Ad-Hoc and Sensor Networks, 2018
Proceedings of the 2018 IEEE International Conference on Data Mining Workshops, 2018
A Recommender System with Advanced Time Series Medical Data Analysis for Diabetes Patients in a Telehealth Environment.
Proceedings of the Database and Expert Systems Applications, 2018
Proceedings of the Database Systems for Advanced Applications, 2018
2017
On Efficient and Robust Anonymization for Privacy Protection on Massive Streaming Categorical Information.
IEEE Trans. Dependable Secur. Comput., 2017
J. Inf. Hiding Multim. Signal Process., 2017
KSII Trans. Internet Inf. Syst., 2017
Coupling a Fast Fourier Transformation With a Machine Learning Ensemble Model to Support Recommendations for Heart Disease Patients in a Telehealth Environment.
IEEE Access, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
A Fast Fourier Transform-Coupled Machine Learning-Based Ensemble Model for Disease Risk Prediction Using a Real-Life Dataset.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2017
Profit maximization resource allocation in cloud computing with performance guarantee.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017
Proceedings of the 23rd International Conference on Automation and Computing, 2017
2016
An intelligent recommender system based on predictive analysis in telehealthcare environment.
Web Intell., 2016
J. Electronic Imaging, 2016
KSII Trans. Internet Inf. Syst., 2016
Intell. Data Anal., 2016
Outlier-eliminated k-means clustering algorithm based on differential privacy preservation.
Appl. Intell., 2016
GO-PEAS: A Scalable Yet Accurate Grid-Based Outlier Detection Method Using Novel Pruning Searching Techniques.
Proceedings of the Artificial Life and Computational Intelligence, 2016
2015
Detecting anomalies from big network traffic data using an adaptive detection approach.
Inf. Sci., 2015
2014
Fingerprint ridge orientation field reconstruction using the best quadratic approximation by orthogonal polynomials in two discrete variables.
Pattern Recognit., 2014
J. Softw., 2014
A Novel Artificial Immune Algorithm for Spatial Clustering with Obstacle Constraint and Its Applications.
Comput. Intell. Neurosci., 2014
2013
J. Softw., 2013
J. Softw., 2013
An efficient and robust privacy protection technique for massive streaming choice-based information.
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013
2011
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
A Novel Fuzzy Logic Based Bit Freezing Technique to Improve Gene Specific Co-regulation Discovery from Gene Expression Databases.
Proceedings of the Thirty-Fourth Australasian Computer Science Conference, 2011
2010
Proceedings of the Fourth International Conference on Network and System Security, 2010
2009
Three New Approaches to Privacy-preserving Add to Multiply Protocol and its Application.
Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, 2009
2008
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008
Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology, 2008
Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007
2006
Quantum Oblivious Transfer Based on POVM Measurements.
Proceedings of the 2006 International Conference on Foundations of Computer Science, 2006
Proceedings of the Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September, 2006
2005
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005
2004
Proceedings of the 7th International Symposium on Parallel Architectures, 2004