Follow
Yuhong Liu
Title
Cited by
Cited by
Year
Stock closing price prediction based on sentiment analysis and LSTM
Z Jin, Y Yang, Y Liu
Neural Computing and Applications 32 (13), 9713-9729, 2020
1462020
Security of online reputation systems: The evolution of attacks and defenses
Y Sun, Y Liu
IEEE Signal Processing Magazine 29 (2), 87-97, 2012
1172012
A survey of security and privacy challenges in cloud computing: solutions and future directions
Y Liu, YL Sun, J Ryoo, S Rizvi, AV Vasilakos
Journal of Computing Science and Engineering 9 (3), 119-133, 2015
952015
Anomaly detection in feedback-based reputation systems through temporal and correlation analysis
Y Liu, Y Sun
2010 IEEE Second International Conference on Social Computing, 65-72, 2010
702010
On design and implementation of neural-machine interface for artificial legs
X Zhang, Y Liu, F Zhang, J Ren, YL Sun, Q Yang, H Huang
IEEE Transactions on Industrial Informatics 8 (2), 418-429, 2011
642011
Detection of collusion behaviors in online reputation systems
Y Liu, Y Yang, YL Sun
2008 42nd Asilomar Conference on Signals, Systems and Computers, 1368-1372, 2008
542008
A centralized trust model approach for cloud computing
S Rizvi, J Ryoo, Y Liu, D Zazworsky, A Cappeta
IEEE 2014 23rd Wireless and Optical Communication Conference, 2014
442014
Integrating neuromuscular and cyber systems for neural control of artificial legs
H Huang, Y Sun, Q Yang, F Zhang, X Zhang, Y Liu, J Ren, F Sierra
Proceedings of the 1st ACM/IEEE international conference on cyber-physical …, 2010
432010
A novel digital watermarking based on general non-negative matrix factorization
Z Chen, L Li, H Peng, Y Liu, Y Yang
IEEE Transactions on Multimedia 20 (8), 1973-1986, 2018
332018
Toward a noninvasive automatic seizure control system in rats with transcranial focal stimulations via tripolar concentric ring electrodes
O Makeyev, X Liu, H Luna-Munguía, G Rogel-Salazar, S Mucio-Ramirez, ...
IEEE Transactions on Neural Systems and Rehabilitation Engineering 20 (4 …, 2012
302012
A security evaluation framework for cloud security auditing
S Rizvi, J Ryoo, J Kissell, W Aiken, Y Liu
The Journal of Supercomputing 74 (11), 5774-5796, 2018
282018
A dynamic trust based two-layer neighbor selection scheme towards online recommender systems
Z Zhang, Y Liu, Z Jin, R Zhang
Neurocomputing 285, 94-103, 2018
232018
A quantitative study of ddos and e-ddos attacks on wifi smart home devices
B Tushir, Y Dalal, B Dezfouli, Y Liu
IEEE Internet of Things Journal 8 (8), 6282-6292, 2020
212020
GraphSE²: An Encrypted Graph Database for Privacy-Preserving Social Search
S Lai, X Yuan, SF Sun, JK Liu, Y Liu, D Liu
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
212019
Retrieving hidden friends: a collusion privacy attack against online friend search engine
Y Liu, N Li
IEEE Transactions on Information Forensics and Security 14 (4), 833-847, 2018
202018
Sentiment analysis via semi-supervised learning: a model based on dynamic threshold and multi-classifiers
Y Han, Y Liu, Z Jin
Neural Computing and Applications 32 (9), 5117-5129, 2020
192020
Analyzing the resource utilization of aes encryption on iot devices
PS Munoz, N Tran, B Craig, B Dezfouli, Y Liu
2018 Asia-Pacific Signal and Information Processing Association Annual …, 2018
182018
Integrated sensor data processing for occupancy detection in residential buildings
C Wang, J Jiang, T Roth, C Nguyen, Y Liu, H Lee
Energy and Buildings 237, 110810, 2021
152021
Defending multiple-user-multiple-target attacks in online reputation systems
Y Liu, Y Sun, T Yu
2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011
152011
Secure and efficient multi-signature schemes for fabric: An enterprise blockchain platform
Y Xiao, P Zhang, Y Liu
IEEE Transactions on Information Forensics and Security 16, 1782-1794, 2020
142020
The system can't perform the operation now. Try again later.
Articles 1–20