Yuan Tian

Orcid: 0000-0002-2307-8201

Affiliations:
  • King Saud University, Riyadh, Saudi Arabia
  • Kyung Hee University, Republic of Korea (former)


According to our database1, Yuan Tian authored at least 78 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
3D Convolutional Network based micro-gesture recognition.
Proceedings of the ACM Turing Award Celebration Conference 2024, 2024

2022
Aggregated squeeze-and-excitation transformations for densely connected convolutional networks.
Vis. Comput., 2022

T-BERTSum: Topic-Aware Text Summarization Based on BERT.
IEEE Trans. Comput. Soc. Syst., 2022

A Novel Sentiment Polarity Detection Framework for Chinese.
IEEE Trans. Affect. Comput., 2022

Simultaneous p- and s-orders minmax robust locality preserving projection.
Multim. Tools Appl., 2022

Trustworthy collaborative trajectory scheme for continuous LBS.
Int. J. Sens. Networks, 2022

MDMN: Multi-task and Domain Adaptation based Multi-modal Network for early rumor detection.
Expert Syst. Appl., 2022

Weighted enclosing subgraph-based link prediction for complex network.
EURASIP J. Wirel. Commun. Netw., 2022

A Cluster-Based Facial Image Anonymization Method Using Variational Autoencoder.
Proceedings of the Big Data and Security - 4th International Conference, 2022

An Innovative AdaBoost Process Using Flexible Soft Labels on Imbalanced Big Data.
Proceedings of the Big Data and Security - 4th International Conference, 2022

Efficient Spatiotemporal Big Data Indexing Algorithm with Loss Control.
Proceedings of the Big Data and Security - 4th International Conference, 2022

A Survey of Integrating Federated Learning with Smart Grids: Application Prospect, Privacy Preserving and Challenges Analysis.
Proceedings of the Big Data and Security - 4th International Conference, 2022

2021
A novel mutation strategy selection mechanism for differential evolution based on local fitness landscape.
J. Supercomput., 2021

Deep learning-based algorithm for vehicle detection in intelligent transportation systems.
J. Supercomput., 2021

Analysis and comparison of machine learning classifiers and deep neural networks techniques for recognition of Farsi handwritten digits.
J. Supercomput., 2021

Dual-path CNN with Max Gated block for text-based person re-identification.
Image Vis. Comput., 2021

Emotion-Aware and Intelligent Internet of Medical Things Toward Emotion Recognition During COVID-19 Pandemic.
IEEE Internet Things J., 2021

A novel rumor detection algorithm based on entity recognition, sentence reconfiguration, and ordinary differential equation network.
Neurocomputing, 2021

Graph classification based on structural features of significant nodes and spatial convolutional neural networks.
Neurocomputing, 2021

A Hybrid Chinese Conversation model based on retrieval and generation.
Future Gener. Comput. Syst., 2021

A feature-based intelligent deduplication compression system with extreme resemblance detection.
Connect. Sci., 2021

Bi-Tier Differential Privacy for Precise Auction-Based People-Centric IoT Service.
IEEE Access, 2021

Vehicle Road Privacy Recommendation System Equipped with Markov Chain.
Proceedings of the Big Data and Security - Third International Conference, 2021

Trustworthy Collaborative Trajectory Privacy Scheme for Continuous LBS.
Proceedings of the Big Data and Security - Third International Conference, 2021

Detecting Hybrid Anomalies Using an Unsupervised Approach in Online Social Networks.
Proceedings of the Big Data and Security - Third International Conference, 2021

2020
Multi-view network embedding with node similarity ensemble.
World Wide Web, 2020

A Review of Techniques and Methods for IoT Applications in Collaborative Cloud-Fog Environment.
Secur. Commun. Networks, 2020

Preserving Privacy in Multimedia Social Networks Using Machine Learning Anomaly Detection.
Secur. Commun. Networks, 2020

LGIEM: Global and local node influence based community detection.
Future Gener. Comput. Syst., 2020

Graph classification algorithm based on graph structure embedding.
Expert Syst. Appl., 2020

2019
PPSDT: A Novel Privacy-Preserving Single Decision Tree Algorithm for Clinical Decision-Support Systems Using IoT Devices.
Sensors, 2019

Privacy-Preserving Vehicular Rogue Node Detection Scheme for Fog Computing.
Sensors, 2019

A privacy preserving location service for cloud-of-things system.
J. Parallel Distributed Comput., 2019

Deep rolling: A novel emotion prediction model for a multi-participant communication context.
Inf. Sci., 2019

ICRA: index based cache replacement algorithm for cloud storage.
Int. J. Sens. Networks, 2019

Natural disaster topic extraction in Sina microblogging based on graph analysis.
Expert Syst. Appl., 2019

Sign Prediction on Unlabeled Social Networks Using Branch and Bound Optimized Transfer Learning.
Complex., 2019

Efficient AoA-Based Rigid Body Localization via Single Base Station for Internet of Things Applications.
IEEE Access, 2019

$\mathcal{K}$ -Lowest-Influence Overlapping Nodes Based Community Detection in Complex Networks.
IEEE Access, 2019

A New Method of Privacy Protection: Random k-Anonymous.
IEEE Access, 2019

SWNF: Sign Prediction of Weak Ties Based on the Network Features.
IEEE Access, 2019

Computationally Efficient Fine-Grain Cube CP-ABE Scheme with Partially Hidden Access Structure.
Proceedings of the Big Data and Security - First International Conference, 2019

2018
A Randomized Watermarking Technique for Detecting Malicious Data Injection Attacks in Heterogeneous Wireless Sensor Networks for Internet of Things Applications.
Sensors, 2018

Improving Vehicular Authentication in VANET Using.
Int. J. Commun. Networks Inf. Secur., 2018

A comparative study of clustering ensemble algorithms.
Comput. Electr. Eng., 2018

Protection of location privacy for moving <i>k</i>NN queries in social networks.
Appl. Soft Comput., 2018

A Comparative Study of Subgraph Matching Isomorphic Methods in Social Networks.
IEEE Access, 2018

Weighted Greedy Dual Size Frequency Based Caching Replacement Algorithm.
IEEE Access, 2018

An Improved Web Cache Replacement Algorithm Based on Weighting and Cost.
IEEE Access, 2018

Improving Label Noise Filtering by Exploiting Unlabeled Data.
IEEE Access, 2018

EkCRNN: A kNN Privacy Preserving Query Algorithm Based on Circular Region Extension.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
A Secure Privacy-Preserving Data Aggregation Scheme Based on Bilinear ElGamal Cryptosystem for Remote Health Monitoring Systems.
IEEE Access, 2017

2016
Remote display solution for video surveillance in multimedia cloud.
Multim. Tools Appl., 2016

LED: A fast overlapping communities detection algorithm based on structural clustering.
Neurocomputing, 2016

An efficient and scalable density-based clustering algorithm for datasets with complex structures.
Neurocomputing, 2016

Secure multi-owner-based cloud computing scheme for big data.
Int. J. Big Data Intell., 2016

A Collaborative Filtering Recommendation Algorithm Based on Hierarchical Structure and Time Awareness.
IEICE Trans. Inf. Syst., 2016

A secure service provisioning framework for cyber physical cloud computing systems.
CoRR, 2016

Detect structural-connected communities based on BSCHEF in C-DBLP.
Concurr. Comput. Pract. Exp., 2016

A two-stage approach for task and resource management in multimedia cloud environment.
Computing, 2016

2015
Social Network and Tag Sources Based Augmenting Collaborative Recommender System.
IEICE Trans. Inf. Syst., 2015

KDVEM : a k-degree anonymity with vertex and edge modification algorithm.
Computing, 2015

Weighted curvature-preserving PDE image filtering method.
Comput. Math. Appl., 2015

2014
Somewhat homomorphic cryptography for matrix multiplication using GPU acceleration.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

Design and Evaluation of Remote Video Surveillance System on Private Cloud.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

Threat-based evaluation for context-aware multimedia surveillance system.
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014

Novel remote display method for multimedia cloud.
Proceedings of the 2013 IEEE International Conference on Multimedia and Expo Workshops, 2014

2013
An efficient privacy preserving Pub-Sub system for ubiquitous computing.
Int. J. Ad Hoc Ubiquitous Comput., 2013

2012
A Privacy-aware Graph-based Access Control System for Healthcare Domain.
KSII Trans. Internet Inf. Syst., 2012

2011
A novel Threat Evaluation method for privacy-aware system in RFID.
Int. J. Ad Hoc Ubiquitous Comput., 2011

A Parameterized Privacy-Aware Pub-sub System in Smart Work.
Proceedings of the Security Technology, 2011

Dynamic content-based cloud data integration system with privacy and cost concern.
Proceedings of the 8th Annual Collaboration, 2011

2010
Inter-cloud Data Integration System Considering Privacy and Cost.
Proceedings of the Computational Collective Intelligence. Technologies and Applications, 2010

2009
A purpose-based privacy-aware system using privacy data graph.
Proceedings of the MoMM'2009, 2009

A threat-based privacy preservation system in untrusted environment.
Proceedings of the 2009 International Conference on Hybrid Information Technology, 2009

Relationship Based Privacy Management for Ubiquitous Society.
Proceedings of the Computational Science and Its Applications, 2009

A Privacy-Aware System Using Threat-Based Evaluation and Feedback Method in Untrusted Ubiquitous Environments.
Proceedings of the Security Technology, 2009

A Back Propagation Neural Network for Evaluating Collaborative Performance in Cloud Computing.
Proceedings of the Grid and Distributed Computing, 2009


  Loading...