Seuraa
Yuhong Liu
Nimike
Viittaukset
Viittaukset
Vuosi
Stock closing price prediction based on sentiment analysis and LSTM
Z Jin, Y Yang, Y Liu
Neural Computing and Applications 32, 9713-9729, 2020
4202020
Security of online reputation systems: The evolution of attacks and defenses
Y Sun, Y Liu
IEEE Signal Processing Magazine 29 (2), 87-97, 2012
1382012
A survey of security and privacy challenges in cloud computing: solutions and future directions
Y Liu, YL Sun, J Ryoo, AV Vasilakos
Korean Institute of Information Scientists and Engineers (KIISE), 2015
1252015
On design and implementation of neural-machine interface for artificial legs
X Zhang, Y Liu, F Zhang, J Ren, YL Sun, Q Yang, H Huang
IEEE Transactions on Industrial Informatics 8 (2), 418-429, 2011
742011
A quantitative study of DDoS and E-DDoS attacks on WiFi smart home devices
B Tushir, Y Dalal, B Dezfouli, Y Liu
IEEE Internet of Things Journal 8 (8), 6282-6292, 2020
712020
Anomaly detection in feedback-based reputation systems through temporal and correlation analysis
Y Liu, Y Sun
2010 IEEE Second International Conference on Social Computing, 65-72, 2010
702010
A novel digital watermarking based on general non-negative matrix factorization
Z Chen, L Li, H Peng, Y Liu, Y Yang
IEEE Transactions on Multimedia 20 (8), 1973-1986, 2018
552018
Detection of collusion behaviors in online reputation systems
Y Liu, Y Yang, YL Sun
2008 42nd Asilomar Conference on Signals, Systems and Computers, 1368-1372, 2008
552008
A centralized trust model approach for cloud computing
S Rizvi, J Ryoo, Y Liu, D Zazworsky, A Cappeta
IEEE 2014 23rd Wireless and Optical Communication Conference, 2014
482014
Integrated sensor data processing for occupancy detection in residential buildings
C Wang, J Jiang, T Roth, C Nguyen, Y Liu, H Lee
Energy and buildings 237, 110810, 2021
472021
Secure and efficient multi-signature schemes for fabric: An enterprise blockchain platform
Y Xiao, P Zhang, Y Liu
IEEE Transactions on Information Forensics and Security 16, 1782-1794, 2020
472020
The impact of dos attacks onresource-constrained iot devices: A study on the mirai attack
B Tushir, H Sehgal, R Nair, B Dezfouli, Y Liu
arXiv preprint arXiv:2104.09041, 2021
462021
Graphse²: An encrypted graph database for privacy-preserving social search
S Lai, X Yuan, SF Sun, JK Liu, Y Liu, D Liu
Proceedings of the 2019 ACM Asia conference on computer and communications …, 2019
452019
Analyzing the resource utilization of AES encryption on IoT devices
PS Munoz, N Tran, B Craig, B Dezfouli, Y Liu
2018 Asia-Pacific Signal and Information Processing Association Annual …, 2018
442018
Integrating neuromuscular and cyber systems for neural control of artificial legs
H Huang, Y Sun, Q Yang, F Zhang, X Zhang, Y Liu, J Ren, F Sierra
Proceedings of the 1st ACM/IEEE international conference on cyber-physical …, 2010
432010
Sentiment analysis via semi-supervised learning: a model based on dynamic threshold and multi-classifiers
Y Han, Y Liu, Z Jin
Neural Computing and Applications 32, 5117-5129, 2020
412020
A security evaluation framework for cloud security auditing
S Rizvi, J Ryoo, J Kissell, W Aiken, Y Liu
The Journal of Supercomputing 74, 5774-5796, 2018
412018
Toward a noninvasive automatic seizure control system in rats with transcranial focal stimulations via tripolar concentric ring electrodes
O Makeyev, X Liu, H Luna-Munguía, G Rogel-Salazar, S Mucio-Ramirez, ...
IEEE Transactions on Neural Systems and Rehabilitation Engineering 20 (4 …, 2012
342012
Heterogeneous graph network embedding for sentiment analysis on social media
Z Jin, X Zhao, Y Liu
Cognitive Computation 13 (1), 81-95, 2021
332021
Securing smart homes via software-defined networking and low-cost traffic classification
H Gordon, C Batula, B Tushir, B Dezfouli, Y Liu
2021 IEEE 45th Annual Computers, Software, and Applications Conference …, 2021
322021
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20