Yuhong Liu
Orcid: 0000-0002-3717-427X
According to our database1,
Yuhong Liu
authored at least 147 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Revisiting the potential value of vital signs in the real-time prediction of mortality risk in intensive care unit patients.
J. Big Data, December, 2024
Video security in logistics monitoring systems: a blockchain based secure storage and access control scheme.
Clust. Comput., November, 2024
Multim. Tools Appl., September, 2024
Rgb-t semantic segmentation based on cross-operational fusion attention in autonomous driving scenario.
Evol. Syst., August, 2024
Telecommun. Syst., June, 2024
Soft Comput., June, 2024
IEEE Trans. Veh. Technol., April, 2024
Graph Neural Networks for Quality of Service Improvement in Interference-Limited Ultra-Reliable and Low-Latency Communications.
IEEE Trans. Veh. Technol., March, 2024
Int. J. Pattern Recognit. Artif. Intell., January, 2024
Lightweight hybrid model based on MobileNet-v2 and Vision Transformer for human-robot interaction.
Eng. Appl. Artif. Intell., January, 2024
A Two-Stage Personalized Virtual Try-On Framework With Shape Control and Texture Guidance.
IEEE Trans. Multim., 2024
A Tightly Coupled Method for Indoor Vehicle Navigation Based on Smartphone IMU and BLE.
IEEE Trans. Instrum. Meas., 2024
A Mean Field to Capture Asynchronous Irregular Dynamics of Conductance-Based Networks of Adaptive Quadratic Integrate-and-Fire Neuron Models.
Neural Comput., 2024
Hyperspectral Image Classification Based on Atrous Convolution Channel Attention-Aided Dense Convolutional Neural Network.
IEEE Geosci. Remote. Sens. Lett., 2024
Leveraging Machine Learning for Accurate IoT Device Identification in Dynamic Wireless Contexts.
CoRR, 2024
Hunyuan-DiT: A Powerful Multi-Resolution Diffusion Transformer with Fine-Grained Chinese Understanding.
CoRR, 2024
A Multi-Faceted Evaluation Framework for Assessing Synthetic Data Generated by Large Language Models.
CoRR, 2024
Batch-oriented Element-wise Approximate Activation for Privacy-Preserving Neural Networks.
CoRR, 2024
Hybrid-Task Meta-Learning: A Graph Neural Network Approach for Scalable and Transferable Bandwidth Allocation.
CoRR, 2024
A method for recovering adversarial samples with both adversarial attack forensics and recognition accuracy.
Comput. Secur., 2024
Condition-based maintenance optimization for multi-equipment batch production system based on stochastic demand.
Comput. Chem. Eng., 2024
2023
Evol. Syst., December, 2023
Global Trends and Future Directions in Agricultural Remote Sensing for Wheat Scab Detection: Insights from a Bibliometric Analysis.
Remote. Sens., July, 2023
Cross-supervision-based equilibrated fusion mechanism of local and global attention for semantic segmentation.
Appl. Intell., May, 2023
FSMFA: Efficient firmware-secure multi-factor authentication protocol for IoT devices.
Internet Things, April, 2023
FCKDNet: A Feature Condensation Knowledge Distillation Network for Semantic Segmentation.
Entropy, January, 2023
Development of an FBG-Based Wearable Sensor for Simultaneous Respiration and Heartbeat Measurement.
IEEE Trans. Instrum. Meas., 2023
An Interpretive Adversarial Attack Method: Attacking Softmax Gradient Layer-Wise Relevance Propagation Based on Cosine Similarity Constraint and TS-Invariant.
Neural Process. Lett., 2023
TencentLLMEval: A Hierarchical Evaluation of Real-World Capabilities for Human-Aligned LLMs.
CoRR, 2023
VDKMS: Vehicular Decentralized Key Management System for Cellular Vehicular-to-Everything Networks, A Blockchain-Based Approach.
CoRR, 2023
Proxy Re-encryption based Fair Trade Protocol for Digital Goods Transactions via Smart Contracts.
CoRR, 2023
Achieving Maximum Efficiency in Schnorr-based Multi-signature and Applications in Blockchain.
CoRR, 2023
IEEE Access, 2023
Proceedings of the 46th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2023
Proceedings of the IEEE International Conference on Communications, 2023
VDKMS: Vehicular Decentralized Key Management System for Cellular Vehicular-to-Everything Networks, A Blockchain-Based Approach.
Proceedings of the IEEE Global Communications Conference, 2023
A Blockchain-based Co-Simulation Platform for Transparent and Fair Energy Trading and Management.
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2023
Group-Oriented Multi-Signature supporting Monotonic Endorse Policies in Hyperledger Fabric.
Proceedings of the IEEE International Conference on Blockchain, 2023
iBCTrans: A Practical Blockchain-Based Framework for Cellular Vehicular-To-Everything Networks.
Proceedings of the IEEE International Conference on Blockchain, 2023
2022
Sensors, 2022
Author Correction: Development and clinical deployment of a smartphone-based visual field deep learning system for glaucoma detection.
npj Digit. Medicine, 2022
Heterogeneous information network embedding for user behavior analysis on social media.
Neural Comput. Appl., 2022
Neural Comput. Appl., 2022
A dual-factor access authentication scheme for IoT terminal in 5G environments with network slice selection.
J. Inf. Secur. Appl., 2022
Residential House Occupancy Detection: Trust-Based Scheme Using Economic and Privacy-Aware Sensors.
IEEE Internet Things J., 2022
IET Image Process., 2022
Interference-Limited Ultra-Reliable and Low-Latency Communications: Graph Neural Networks or Stochastic Geometry?
CoRR, 2022
Secure IoT Routing: Selective Forwarding Attacks and Trust-based Defenses in RPL Network.
CoRR, 2022
Instant on-demand charging strategy with multiple chargers in wireless rechargeable sensor networks.
Ad Hoc Networks, 2022
Defending Against Co-Residence Attack in Energy-Efficient Cloud: An Optimization Based Real-Time Secure VM Allocation Strategy.
IEEE Access, 2022
Proceedings of the Wireless Internet - 15th EAI International Conference, 2022
PEMT-CoSim: A Co-Simulation Platform for Packetized Energy Management and Trading in Distributed Energy Systems.
Proceedings of the IEEE International Conference on Communications, 2022
Leveraging Frame Aggregation in Wi-Fi IoT Networks for Low-Rate DDoS Attack Detection.
Proceedings of the Network and System Security - 16th International Conference, 2022
Proceedings of the IEEE International Conference on Data Mining, 2022
Graph Neural Networks for Timely Updates of Short Packets in Interference-Limited Networks.
Proceedings of the 56th Asilomar Conference on Signals, Systems, and Computers, ACSSC 2022, Pacific Grove, CA, USA, October 31, 2022
2021
Secure and Efficient Multi-Signature Schemes for Fabric: An Enterprise Blockchain Platform.
IEEE Trans. Inf. Forensics Secur., 2021
A Framework for Managing Device Association and Offloading the Transport Layer's Security Overhead of WiFi Device to Access Points.
Sensors, 2021
IEEE Internet Things J., 2021
The Impact of DoS Attacks onResource-constrained IoT Devices: A Study on the Mirai Attack.
CoRR, 2021
Cogn. Comput., 2021
Comput. Graph., 2021
Sales mode selection of fresh food supply chain based on blockchain technology under different channel competition.
Comput. Ind. Eng., 2021
A New Topology Control Algorithm in Software Defined Wireless Rechargeable Sensor Networks.
IEEE Access, 2021
Proceedings of the 27th IEEE International Symposium on Local and Metropolitan Area Networks, 2021
Understanding COVID-19 Public Sentiment Towards Public Health Policies Using Social Media Data.
Proceedings of the IEEE Global Humanitarian Technology Conference, 2021
Is Social Diversity Related to Misinformation Resistance? An Empirical Study on Social Communities.
Proceedings of the IEEE Global Humanitarian Technology Conference, 2021
Securing Smart Homes via Software-Defined Networking and Low-Cost Traffic Classification.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021
Proceedings of the AIAM 2021: 3rd International Conference on Artificial Intelligence and Advanced Manufacture, Manchester, United Kingdom, October 23, 2021
2020
Development and clinical deployment of a smartphone-based visual field deep learning system for glaucoma detection.
npj Digit. Medicine, 2020
Neural Comput. Appl., 2020
Sentiment analysis via semi-supervised learning: a model based on dynamic threshold and multi-classifiers.
Neural Comput. Appl., 2020
基于卷积神经网络的压缩感知重构算法优化 (Optimization of Compressed Sensing Reconstruction Algorithms Based on Convolutional Neural Network).
计算机科学, 2020
J. Control. Decis., 2020
Comput. Math. Methods Medicine, 2020
IEEE Access, 2020
Adaptive Lead Weighted ResNet Trained With Different Duration Signals for Classifying 12-lead ECGs.
Proceedings of the Computing in Cardiology, 2020
SMART: Emerging Activity Recognition with Limited Data for Multi-modal Wearable Sensing.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020
2019
Retrieving Hidden Friends: A Collusion Privacy Attack Against Online Friend Search Engine.
IEEE Trans. Inf. Forensics Secur., 2019
Int. J. Inf. Technol. Decis. Mak., 2019
Int. J. Comput. Intell. Syst., 2019
GraphSE<sup>2</sup>: An Encrypted Graph Database for Privacy-Preserving Social Search.
CoRR, 2019
IEEE Access, 2019
An Extensive Game-Based Resource Allocation for Securing D2D Underlay Communications.
IEEE Access, 2019
IEEE Access, 2019
Blockchain Based Owner-Controlled Secure Software Updates for Resource-Constrained IoT.
Proceedings of the Network and System Security - 13th International Conference, 2019
A Comprehensive Empirical Analysis of TLS Handshake and Record Layer on IoT Platforms.
Proceedings of the 22nd International ACM Conference on Modeling, 2019
Analysis of the duration and energy consumption of AES algorithms on a contiki-based IoT device.
Proceedings of the MobiQuitous 2019, 2019
Proceedings of the IEEE International Symposium on Circuits and Systems, 2019
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the Computing, Communications and IoT Applications, ComComAp 2019, Shenzhen, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Proceedings of the 2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2019
Proceedings of the 2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2019
2018
IEEE Trans. Multim., 2018
Robust mode-dependent control for discrete-time singular Markovian jump systems with time-varying delay.
J. Control. Decis., 2018
A dynamic trust based two-layer neighbor selection scheme towards online recommender systems.
Neurocomputing, 2018
Incremental general non-negative matrix factorization without dimension matching constraints.
Neurocomputing, 2018
IET Image Process., 2018
Minimizing Required User Effort for Cold-Start Recommendation by Identifying the Most Important Latent Factors.
IEEE Access, 2018
Proceedings of the 2018 International Symposium on Security and Privacy in Social Networks and Big Data, 2018
Proceedings of the 2018 International Symposium on Security and Privacy in Social Networks and Big Data, 2018
Proceedings of the 2018 IEEE International Workshop on Signal Processing Systems, 2018
Energy and Processing Demand Analysis of TLS Protocol in Internet of Things Applications.
Proceedings of the 2018 IEEE International Workshop on Signal Processing Systems, 2018
Machine Deserves Better Logging: A Log Enhancement Approach for Automatic Fault Diagnosis.
Proceedings of the 2018 IEEE International Symposium on Software Reliability Engineering Workshops, 2018
Single Frame Super Resolution with Convolutional Neural Network for Remote Sensing Imagery.
Proceedings of the 2018 IEEE International Geoscience and Remote Sensing Symposium, 2018
An optimized VM Allocation Strategy to Make a Secure and Energy-Efficient Cloud Against Co-residence Attack.
Proceedings of the 2018 International Conference on Computing, 2018
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018
A Root-based Defense Mechanism Against RPL Blackhole Attacks in Internet of Things Networks.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018
2017
Efficiently Promoting Product Online Outcome: An Iterative Rating Attack Utilizing Product and Market Property.
IEEE Trans. Inf. Forensics Secur., 2017
Structural and Functional Abnormalities in Children with Attention-Deficit/Hyperactivity Disorder: A Focus on Subgenual Anterior Cingulate Cortex.
Brain Connect., 2017
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017
Selecting influential and trustworthy neighbors for collaborative filtering recommender systems.
Proceedings of the IEEE 7th Annual Computing and Communication Workshop and Conference, 2017
Personalized preference elicitation in recommender systems using matrix factorization.
Proceedings of the 51st Asilomar Conference on Signals, Systems, and Computers, 2017
2016
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
2015
A Survey of Security and Privacy Challenges in Cloud Computing: Solutions and Future Directions.
J. Comput. Sci. Eng., 2015
2014
IEEE Signal Process. Mag., 2014
Proceedings of the 23rd Wireless and Optical Communication Conference, 2014
2013
IEEE Trans. Inf. Forensics Secur., 2013
Proceedings of the IEEE International Conference on Acoustics, 2013
2012
IEEE Trans. Ind. Informatics, 2012
IEEE Signal Process. Mag., 2012
2011
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Trust sensor interface for improving reliability of EMG-based user intent recognition.
Proceedings of the 33rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2011
2010
Anomaly Detection in Feedback-based Reputation Systems through Temporal and Correlation Analysis.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Proceedings of the 2010 IEEE International Conference on Robotics and Biomimetics, 2010
Proceedings of the ACM/IEEE 1st International Conference on Cyber-Physical Systems, 2010
2009
Proceedings of the Principles of Practice in Multi-Agent Systems, 2009
2008
Comput. Biol. Medicine, 2008
Proceedings of the 2008 IEEE Conference on Robotics, Automation and Mechatronics, 2008
Proceedings of the New Frontiers in Applied Artificial Intelligence, 2008
Proceedings of the 42nd Asilomar Conference on Signals, Systems and Computers, 2008
2007
P. Renard, H. Demougeot-Renard, R. Froidevaux, Editors, , Geostatistics for Environmental Applications, Proceedings of the Fifth European Conference on Geostatistics for Environmental Applications (2006) Springer, New York (480pp., US$169, Hardbound, ISBN: 3-540-26533-3).
Comput. Geosci., 2007
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, 2007
2006
Comput. Geosci., 2006
2005
Proceedings of the Second International Workshop on Hot Topics in Peer-to-Peer Systems, 2005
2004
Proceedings of the Peer-to-Peer Systems III, Third International Workshop, 2004