Follow
Yuhong Liu
Title
Cited by
Cited by
Year
Security of online reputation systems: The evolution of attacks and defenses
Y Sun, Y Liu
IEEE Signal Processing Magazine 29 (2), 87-97, 2012
1152012
Stock closing price prediction based on sentiment analysis and LSTM
Z Jin, Y Yang, Y Liu
Neural Computing and Applications 32 (13), 9713-9729, 2020
1062020
A survey of security and privacy challenges in cloud computing: solutions and future directions
Y Liu, YL Sun, J Ryoo, S Rizvi, AV Vasilakos
Journal of Computing Science and Engineering 9 (3), 119-133, 2015
892015
Anomaly detection in feedback-based reputation systems through temporal and correlation analysis
Y Liu, Y Sun
2010 IEEE Second International Conference on Social Computing, 65-72, 2010
702010
On design and implementation of neural-machine interface for artificial legs
X Zhang, Y Liu, F Zhang, J Ren, YL Sun, Q Yang, H Huang
IEEE Transactions on Industrial Informatics 8 (2), 418-429, 2011
642011
Detection of collusion behaviors in online reputation systems
Y Liu, Y Yang, YL Sun
2008 42nd Asilomar Conference on Signals, Systems and Computers, 1368-1372, 2008
512008
A centralized trust model approach for cloud computing
S Rizvi, J Ryoo, Y Liu, D Zazworsky, A Cappeta
IEEE 2014 23rd Wireless and Optical Communication Conference, 2014
432014
Integrating neuromuscular and cyber systems for neural control of artificial legs
H Huang, Y Sun, Q Yang, F Zhang, X Zhang, Y Liu, J Ren, F Sierra
Proceedings of the 1st ACM/IEEE international conference on cyber-physical …, 2010
412010
A novel digital watermarking based on general non-negative matrix factorization
Z Chen, L Li, H Peng, Y Liu, Y Yang
IEEE Transactions on Multimedia 20 (8), 1973-1986, 2018
312018
Toward a noninvasive automatic seizure control system in rats with transcranial focal stimulations via tripolar concentric ring electrodes
O Makeyev, X Liu, H Luna-Munguía, G Rogel-Salazar, S Mucio-Ramirez, ...
IEEE Transactions on Neural Systems and Rehabilitation Engineering 20 (4 …, 2012
302012
A security evaluation framework for cloud security auditing
S Rizvi, J Ryoo, J Kissell, W Aiken, Y Liu
The Journal of Supercomputing 74 (11), 5774-5796, 2018
272018
A dynamic trust based two-layer neighbor selection scheme towards online recommender systems
Z Zhang, Y Liu, Z Jin, R Zhang
Neurocomputing 285, 94-103, 2018
212018
Sentiment analysis via semi-supervised learning: a model based on dynamic threshold and multi-classifiers
Y Han, Y Liu, Z Jin
Neural Computing and Applications 32 (9), 5117-5129, 2020
182020
Retrieving hidden friends: a collusion privacy attack against online friend search engine
Y Liu, N Li
IEEE Transactions on Information Forensics and Security 14 (4), 833-847, 2018
172018
GraphSE²: An Encrypted Graph Database for Privacy-Preserving Social Search
S Lai, X Yuan, SF Sun, JK Liu, Y Liu, D Liu
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
152019
Defending multiple-user-multiple-target attacks in online reputation systems
Y Liu, Y Sun, T Yu
2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011
152011
A quantitative study of ddos and e-ddos attacks on wifi smart home devices
B Tushir, Y Dalal, B Dezfouli, Y Liu
IEEE Internet of Things Journal 8 (8), 6282-6292, 2020
142020
Securing online reputation systems through trust modeling and temporal analysis
Y Liu, Y Sun, S Liu, AC Kot
IEEE transactions on information forensics and security 8 (6), 936-948, 2013
132013
Analyzing the resource utilization of aes encryption on iot devices
PS Munoz, N Tran, B Craig, B Dezfouli, Y Liu
2018 Asia-Pacific Signal and Information Processing Association Annual …, 2018
122018
Trust sensor interface for improving reliability of EMG-based user intent recognition
Y Liu, F Zhang, Y Sun, H Huang
2011 Annual International Conference of the IEEE Engineering in Medicine and …, 2011
122011
The system can't perform the operation now. Try again later.
Articles 1–20