Yuhong Liu
Cited by
Cited by
Stock closing price prediction based on sentiment analysis and LSTM
Z Jin, Y Yang, Y Liu
Neural Computing and Applications 32, 9713-9729, 2020
Security of online reputation systems: The evolution of attacks and defenses
Y Sun, Y Liu
IEEE Signal Processing Magazine 29 (2), 87-97, 2012
A survey of security and privacy challenges in cloud computing: solutions and future directions
Y Liu, YL Sun, J Ryoo, AV Vasilakos
Korean Institute of Information Scientists and Engineers (KIISE), 2015
On design and implementation of neural-machine interface for artificial legs
X Zhang, Y Liu, F Zhang, J Ren, YL Sun, Q Yang, H Huang
IEEE Transactions on Industrial Informatics 8 (2), 418-429, 2011
Anomaly detection in feedback-based reputation systems through temporal and correlation analysis
Y Liu, Y Sun
2010 IEEE Second International Conference on Social Computing, 65-72, 2010
A quantitative study of DDoS and E-DDoS attacks on WiFi smart home devices
B Tushir, Y Dalal, B Dezfouli, Y Liu
IEEE Internet of Things Journal 8 (8), 6282-6292, 2020
Detection of collusion behaviors in online reputation systems
Y Liu, Y Yang, YL Sun
2008 42nd Asilomar Conference on Signals, Systems and Computers, 1368-1372, 2008
A novel digital watermarking based on general non-negative matrix factorization
Z Chen, L Li, H Peng, Y Liu, Y Yang
IEEE Transactions on Multimedia 20 (8), 1973-1986, 2018
A centralized trust model approach for cloud computing
S Rizvi, J Ryoo, Y Liu, D Zazworsky, A Cappeta
IEEE 2014 23rd Wireless and Optical Communication Conference, 2014
Integrating neuromuscular and cyber systems for neural control of artificial legs
H Huang, Y Sun, Q Yang, F Zhang, X Zhang, Y Liu, J Ren, F Sierra
Proceedings of the 1st ACM/IEEE international conference on cyber-physical …, 2010
Integrated sensor data processing for occupancy detection in residential buildings
C Wang, J Jiang, T Roth, C Nguyen, Y Liu, H Lee
Energy and buildings 237, 110810, 2021
A security evaluation framework for cloud security auditing
S Rizvi, J Ryoo, J Kissell, W Aiken, Y Liu
The Journal of Supercomputing 74, 5774-5796, 2018
The impact of dos attacks onresource-constrained iot devices: A study on the mirai attack
B Tushir, H Sehgal, R Nair, B Dezfouli, Y Liu
arXiv preprint arXiv:2104.09041, 2021
Graphse²: An encrypted graph database for privacy-preserving social search
S Lai, X Yuan, SF Sun, JK Liu, Y Liu, D Liu
Proceedings of the 2019 ACM Asia conference on computer and communications …, 2019
Sentiment analysis via semi-supervised learning: a model based on dynamic threshold and multi-classifiers
Y Han, Y Liu, Z Jin
Neural Computing and Applications 32, 5117-5129, 2020
Secure and efficient multi-signature schemes for fabric: An enterprise blockchain platform
Y Xiao, P Zhang, Y Liu
IEEE Transactions on Information Forensics and Security 16, 1782-1794, 2020
Analyzing the resource utilization of aes encryption on iot devices
PS Munoz, N Tran, B Craig, B Dezfouli, Y Liu
2018 Asia-Pacific Signal and Information Processing Association Annual …, 2018
Toward a noninvasive automatic seizure control system in rats with transcranial focal stimulations via tripolar concentric ring electrodes
O Makeyev, X Liu, H Luna-Munguía, G Rogel-Salazar, S Mucio-Ramirez, ...
IEEE Transactions on Neural Systems and Rehabilitation Engineering 20 (4 …, 2012
Retrieving hidden friends: A collusion privacy attack against online friend search engine
Y Liu, N Li
IEEE Transactions on Information Forensics and Security 14 (4), 833-847, 2018
A dynamic trust based two-layer neighbor selection scheme towards online recommender systems
Z Zhang, Y Liu, Z Jin, R Zhang
Neurocomputing 285, 94-103, 2018
The system can't perform the operation now. Try again later.
Articles 1–20