Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Yang Liu 0039
@article{DBLP:journals/apin/GheisariKNMR0FA24, author = {Mehdi Gheisari and Wazir Zada Khan and Hamid Esmaeili Najafabadi and Gavin McArdle and Hamidreza Rabiei{-}Dastjerdi and Yang Liu and Christian Fern{\'{a}}ndez{-}Campusano and Hemn Barzan Abdalla}, title = {{CAPPAD:} a privacy-preservation solution for autonomous vehicles using SDN, differential privacy and data aggregation}, journal = {Appl. Intell.}, volume = {54}, number = {4}, pages = {3417--3428}, year = {2024}, url = {https://doi.org/10.1007/s10489-023-04991-w}, doi = {10.1007/S10489-023-04991-W}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/apin/GheisariKNMR0FA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bioinformatics/ZhuZLWL23, author = {Yan Zhu and Yuhuan Zhou and Yang Liu and Xuan Wang and Junyi Li}, title = {{SLGNN:} synthetic lethality prediction in human cancers based on factor-aware knowledge graph neural network}, journal = {Bioinform.}, volume = {39}, number = {2}, year = {2023}, url = {https://doi.org/10.1093/bioinformatics/btad015}, doi = {10.1093/BIOINFORMATICS/BTAD015}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bioinformatics/ZhuZLWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/caaitrit/GheisariERMLPHMGFK23, author = {Mehdi Gheisari and Fereshteh Ebrahimzadeh and Mohamadtaghi Rahimi and Mahdieh Moazzamigodarzi and Yang Liu and Pijush Kanti Dutta Pramanik and Mohammad Ali Heravi and Abolfazl Mehbodniya and Mustafa Ghaderzadeh and Mohammad Reza Feylizadeh and Saeed Kosari}, title = {Deep learning: Applications, architectures, models, tools, and frameworks: {A} comprehensive survey}, journal = {{CAAI} Trans. Intell. Technol.}, volume = {8}, number = {3}, pages = {581--606}, year = {2023}, url = {https://doi.org/10.1049/cit2.12180}, doi = {10.1049/CIT2.12180}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/caaitrit/GheisariERMLPHMGFK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/TianZSLJ23, author = {Yuchen Tian and Weizhe Zhang and Andrew Simpson and Yang Liu and Zoe Lin Jiang}, title = {Defending Against Data Poisoning Attacks: From Distributed Learning to Federated Learning}, journal = {Comput. J.}, volume = {66}, number = {3}, pages = {711--726}, year = {2023}, url = {https://doi.org/10.1093/comjnl/bxab192}, doi = {10.1093/COMJNL/BXAB192}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/TianZSLJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/KamilaPDBNGL23, author = {Nilayam Kumar Kamila and Subhendu Kumar Pani and Rashmi Das and P. K. Bharti and Hamid Esmaeili Najafabadi and Mehdi Gheisari and Yang Liu}, title = {A near-optimal {\&} load balanced resilient system design for high-performance computing platform}, journal = {Clust. Comput.}, volume = {26}, number = {2}, pages = {1535--1550}, year = {2023}, url = {https://doi.org/10.1007/s10586-022-03913-8}, doi = {10.1007/S10586-022-03913-8}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/KamilaPDBNGL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/LeeGSAL23, author = {Cheng{-}Chi Lee and Mehdi Gheisari and Mohammad Javad Shayegan and Milad Taleby Ahvanooey and Yang Liu}, title = {Privacy-Preserving Techniques in Cloud/Fog and Internet of Things}, journal = {Cryptogr.}, volume = {7}, number = {4}, pages = {51}, year = {2023}, url = {https://doi.org/10.3390/cryptography7040051}, doi = {10.3390/CRYPTOGRAPHY7040051}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/LeeGSAL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/LiuLYWGL23, author = {Yang Liu and Ji Luo and Yi Yang and Xuan Wang and Mehdi Gheisari and Feng Luo}, title = {ShrewdAttack: Low Cost High Accuracy Model Extraction}, journal = {Entropy}, volume = {25}, number = {2}, pages = {282}, year = {2023}, url = {https://doi.org/10.3390/e25020282}, doi = {10.3390/E25020282}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entropy/LiuLYWGL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/es/KhaniabadiJGZLS23, author = {Shadi Mahmoodi Khaniabadi and Amir Javadpour and Mehdi Gheisari and Weizhe Zhang and Yang Liu and Arun Kumar Sangaiah}, title = {An intelligent sustainable efficient transmission internet protocol to switch between User Datagram Protocol and Transmission Control Protocol in IoT computing}, journal = {Expert Syst. J. Knowl. Eng.}, volume = {40}, number = {5}, year = {2023}, url = {https://doi.org/10.1111/exsy.13129}, doi = {10.1111/EXSY.13129}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/es/KhaniabadiJGZLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-cds/YarazizJGL23, author = {Mahdi Safaei Yaraziz and Ahmad Jalili and Mehdi Gheisari and Yang Liu}, title = {Recent trends towards privacy-preservation in Internet of Things, its challenges and future directions}, journal = {{IET} Circuits Devices Syst.}, volume = {17}, number = {2}, pages = {53--61}, year = {2023}, url = {https://doi.org/10.1049/cds2.12138}, doi = {10.1049/CDS2.12138}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-cds/YarazizJGL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-cds/JafarzadehJARLGBJ23, author = {Nima Jafarzadeh and Ahmad Jalili and Jafar Ahmad Abed Alzubi and Khosro Rezaee and Yang Liu and Mehdi Gheisari and Bahram Sadeghi Bigham and Amir Javadpour}, title = {A novel buffering fault-tolerance approach for network on chip (NoC)}, journal = {{IET} Circuits Devices Syst.}, volume = {17}, number = {4}, pages = {250--257}, year = {2023}, url = {https://doi.org/10.1049/cds2.12127}, doi = {10.1049/CDS2.12127}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-cds/JafarzadehJARLGBJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/LiuXLW23, author = {Yang Liu and Wanyin Xu and Jiaxin Lai and Jiabo Wang}, title = {User-Centric Federated Matrix Factorization Based on Differential Privacy}, journal = {{IEEE} Internet Comput.}, volume = {27}, number = {3}, pages = {21--27}, year = {2023}, url = {https://doi.org/10.1109/MIC.2023.3263896}, doi = {10.1109/MIC.2023.3263896}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/internet/LiuXLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhangZFL23, author = {Hengyan Zhang and Weizhe Zhang and Yuming Feng and Yang Liu}, title = {SVScanner: Detecting smart contract vulnerabilities via deep semantic extraction}, journal = {J. Inf. Secur. Appl.}, volume = {75}, pages = {103484}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103484}, doi = {10.1016/J.JISA.2023.103484}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ZhangZFL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/GheisariJGAP023, author = {Mehdi Gheisari and Amir Javadpour and Jiechao Gao and Aaqif Afzaal Abbasi and Quoc{-}Viet Pham and Yang Liu}, title = {{PPDMIT:} a lightweight architecture for privacy-preserving data aggregation in the Internet of Things}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {14}, number = {5}, pages = {5211--5223}, year = {2023}, url = {https://doi.org/10.1007/s12652-022-03866-1}, doi = {10.1007/S12652-022-03866-1}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jaihc/GheisariJGAP023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kbs/LiG00Q0023, author = {Huale Li and Zengyue Guo and Yang Liu and Xuan Wang and Shuhan Qi and Jiajia Zhang and Jing Xiao}, title = {Kdb-D2CFR: Solving Multiplayer imperfect-information games with knowledge distillation-based DeepCFR}, journal = {Knowl. Based Syst.}, volume = {272}, pages = {110567}, year = {2023}, url = {https://doi.org/10.1016/j.knosys.2023.110567}, doi = {10.1016/J.KNOSYS.2023.110567}, timestamp = {Sun, 30 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/kbs/LiG00Q0023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ParidaPAJGLL23, author = {Priyansi Parida and Chittaranjan Pradhan and Jafar Ahmad Abed Alzubi and Amir Javadpour and Mehdi Gheisari and Yang Liu and Cheng{-}Chi Lee}, title = {Elliptic curve cryptographic image encryption using Henon map and Hopfield chaotic neural network}, journal = {Multim. Tools Appl.}, volume = {82}, number = {22}, pages = {33637--33662}, year = {2023}, url = {https://doi.org/10.1007/s11042-023-14607-7}, doi = {10.1007/S11042-023-14607-7}, timestamp = {Sat, 28 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/ParidaPAJGLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spe/LiuLJZWGGGN23, author = {Yang Liu and Liangjie Lin and Lin Jiang and Weizhe Zhang and Xuan Wang and Mehdi Gheisari and Tao Gong and Chao Gao and Hamid Esmaeili Najafabadi}, title = {A blockchain-based privacy-preserving advertising attribution architecture: Requirements, design, and a prototype implementation}, journal = {Softw. Pract. Exp.}, volume = {53}, number = {8}, pages = {1700--1721}, year = {2023}, url = {https://doi.org/10.1002/spe.3209}, doi = {10.1002/SPE.3209}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/spe/LiuLJZWGGGN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/staeors/ChenWWJZLA23, author = {Qian Chen and Yulin Wu and Xuan Wang and Zoe Lin Jiang and Weizhe Zhang and Yang Liu and Mamoun Alazab}, title = {A Generic Cryptographic Deep-Learning Inference Platform for Remote Sensing Scenes}, journal = {{IEEE} J. Sel. Top. Appl. Earth Obs. Remote. Sens.}, volume = {16}, pages = {3309--3321}, year = {2023}, url = {https://doi.org/10.1109/JSTARS.2023.3260867}, doi = {10.1109/JSTARS.2023.3260867}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/staeors/ChenWWJZLA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tai/KongLZLS23, author = {Linghao Kong and Wenjian Luo and Hongwei Zhang and Yang Liu and Yuhui Shi}, title = {Evolutionary Multilabel Adversarial Examples: An Effective Black-Box Attack}, journal = {{IEEE} Trans. Artif. Intell.}, volume = {4}, number = {3}, pages = {562--572}, year = {2023}, url = {https://doi.org/10.1109/TAI.2022.3198629}, doi = {10.1109/TAI.2022.3198629}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tai/KongLZLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcbb/WuW00WL23, author = {Kaitao Wu and Lexiang Wang and Bo Liu and Yang Liu and Yadong Wang and Junyi Li}, title = {{PSPGO:} Cross-Species Heterogeneous Network Propagation for Protein Function Prediction}, journal = {{IEEE} {ACM} Trans. Comput. Biol. Bioinform.}, volume = {20}, number = {3}, pages = {1713--1724}, year = {2023}, url = {https://doi.org/10.1109/TCBB.2022.3215257}, doi = {10.1109/TCBB.2022.3215257}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcbb/WuW00WL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/QiaoZTYLA23, author = {Yanchen Qiao and Weizhe Zhang and Zhicheng Tian and Laurence T. Yang and Yang Liu and Mamoun Alazab}, title = {Adversarial {ELF} Malware Detection Method Using Model Interpretation}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {19}, number = {1}, pages = {605--615}, year = {2023}, url = {https://doi.org/10.1109/TII.2022.3192901}, doi = {10.1109/TII.2022.3192901}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tii/QiaoZTYLA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmm/RaoDQFLST23, author = {Jun Rao and Liang Ding and Shuhan Qi and Meng Fang and Yang Liu and Li Shen and Dacheng Tao}, title = {Dynamic Contrastive Distillation for Image-Text Retrieval}, journal = {{IEEE} Trans. Multim.}, volume = {25}, pages = {8383--8395}, year = {2023}, url = {https://doi.org/10.1109/TMM.2023.3236837}, doi = {10.1109/TMM.2023.3236837}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmm/RaoDQFLST23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tr/GaoLQLWZL23, author = {Cuiyun Gao and Yaoxian Li and Shuhan Qi and Yang Liu and Xuan Wang and Zibin Zheng and Qing Liao}, title = {Listening to Users' Voice: Automatic Summarization of Helpful App Reviews}, journal = {{IEEE} Trans. Reliab.}, volume = {72}, number = {4}, pages = {1619--1631}, year = {2023}, url = {https://doi.org/10.1109/TR.2022.3217566}, doi = {10.1109/TR.2022.3217566}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tr/GaoLQLWZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cea/GheisariYAFFPAL22, author = {Mehdi Gheisari and Mahdi Safaei Yaraziz and Jafar Ahmad Abed Alzubi and Christian Fern{\'{a}}ndez{-}Campusano and Mohammad Reza Feylizadeh and Saied Pirasteh and Aaqif Afzaal Abbasi and Yang Liu and Cheng{-}Chi Lee}, title = {An efficient cluster head selection for wireless sensor network-based smart agriculture systems}, journal = {Comput. Electron. Agric.}, volume = {198}, pages = {107105}, year = {2022}, url = {https://doi.org/10.1016/j.compag.2022.107105}, doi = {10.1016/J.COMPAG.2022.107105}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cea/GheisariYAFFPAL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/QiaoZTYLA22, author = {Yanchen Qiao and Weizhe Zhang and Zhicheng Tian and Laurence T. Yang and Yang Liu and Mamoun Alazab}, title = {Adversarial malware sample generation method based on the prototype of deep learning detector}, journal = {Comput. Secur.}, volume = {119}, pages = {102762}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102762}, doi = {10.1016/J.COSE.2022.102762}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/QiaoZTYLA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-com/NatarajanSDCGLL22, author = {Yuvaraj Natarajan and Kannan Srihari and Gaurav Dhiman and Selvaraj Chandragandhi and Mehdi Gheisari and Yang Liu and Cheng{-}Chi Lee and Krishna Kant Singh and Kusum Yadav and Hadeel Fahad Alharbi}, title = {An IoT and machine learning-based routing protocol for reconfigurable engineering application}, journal = {{IET} Commun.}, volume = {16}, number = {5}, pages = {464--475}, year = {2022}, url = {https://doi.org/10.1049/cmu2.12266}, doi = {10.1049/CMU2.12266}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-com/NatarajanSDCGLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/TangLLQZPS22, author = {Linlin Tang and Zhangyan Li and Yang Liu and Shuhan Qi and Jiajia Zhang and Jiancheng Pan and Shuaijie Shi}, title = {3D face recognition algorithm based on nose tip contour and radial curve}, journal = {Multim. Tools Appl.}, volume = {81}, number = {17}, pages = {23889--23912}, year = {2022}, url = {https://doi.org/10.1007/s11042-022-12730-5}, doi = {10.1007/S11042-022-12730-5}, timestamp = {Thu, 07 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/TangLLQZPS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/LiuZLWW22, author = {Yang Liu and Yuxi Zhang and Zhiyuan Lin and Zhaoguo Wang and Xuan Wang}, title = {Simulation Method for Blockchain Systems with a Public Chain}, journal = {Sensors}, volume = {22}, number = {24}, pages = {9750}, year = {2022}, url = {https://doi.org/10.3390/s22249750}, doi = {10.3390/S22249750}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/LiuZLWW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcss/LuoDNL22, author = {Wenjian Luo and Binyao Duan and Li Ni and Yang Liu}, title = {Collaborative Detection of Community Structure in Multiple Private Networks}, journal = {{IEEE} Trans. Comput. Soc. Syst.}, volume = {9}, number = {2}, pages = {612--623}, year = {2022}, url = {https://doi.org/10.1109/TCSS.2021.3089535}, doi = {10.1109/TCSS.2021.3089535}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcss/LuoDNL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/biotc/ZhouSXSL22, author = {Rui Zhou and Kangan Shu and Dejun Xiang and Hang Sun and Yang Liu}, title = {A Blockchain-based Electricity Retail Contracts Management System}, booktitle = {4th Blockchain and Internet of Things Conference, {BIOTC} 2022, Tokyo, Japan, July 8-10, 2022}, pages = {46--53}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3559795.3559802}, doi = {10.1145/3559795.3559802}, timestamp = {Tue, 12 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/biotc/ZhouSXSL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsp/YuGL22, author = {Chenjia Yu and Mehdi Gheisari and Yang Liu}, title = {A Lightweight Advertisement Ecosystem Simulation Platform for Security Analysis}, booktitle = {6th International Conference on Cryptography, Security and Privacy, {CSP} 2022, Tianjin, China, January 14-16, 2022}, pages = {41--45}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CSP55486.2022.00016}, doi = {10.1109/CSP55486.2022.00016}, timestamp = {Mon, 06 Nov 2023 13:06:30 +0100}, biburl = {https://dblp.org/rec/conf/iccsp/YuGL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdis/HouTQL22, author = {Minghua Hou and Linlin Tang and Shuhan Qi and Yang Liu}, title = {A Robust Watermarking Method For Image Processing Models}, booktitle = {4th International Conference on Data Intelligence and Security, {ICDIS} 2022, Shenzhen, China, August 24-26, 2022}, pages = {75--81}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICDIS55630.2022.00019}, doi = {10.1109/ICDIS55630.2022.00019}, timestamp = {Wed, 04 Jan 2023 16:48:27 +0100}, biburl = {https://dblp.org/rec/conf/icdis/HouTQL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdis/ChenYWWZJLA22, author = {Qian Chen and Lin Yao and Yulin Wu and Xuan Wang and Weizhe Zhang and Zoe Lin Jiang and Yang Liu and Mamoun Alazab}, title = {PyHENet: {A} Generic Framework for Privacy-Preserving {DL} Inference Based on Fully Homomorphic Encryption}, booktitle = {4th International Conference on Data Intelligence and Security, {ICDIS} 2022, Shenzhen, China, August 24-26, 2022}, pages = {127--133}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICDIS55630.2022.00027}, doi = {10.1109/ICDIS55630.2022.00027}, timestamp = {Wed, 04 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdis/ChenYWWZJLA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdis/JiangPFYLWYWF22, author = {Zoe Lin Jiang and Yijian Pan and Maoshun Fan and Lin Yao and Yang Liu and Yulin Wu and Siu{-}Ming Yiu and Xuan Wang and Junbin Fang}, title = {Local Energy Trading Platform Based on Privacy-Preserving Blockchain with Linkable Ring Signature}, booktitle = {4th International Conference on Data Intelligence and Security, {ICDIS} 2022, Shenzhen, China, August 24-26, 2022}, pages = {134--141}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICDIS55630.2022.00028}, doi = {10.1109/ICDIS55630.2022.00028}, timestamp = {Wed, 04 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdis/JiangPFYLWYWF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdis/LiuLG22, author = {Yanglin Liu and Yang Liu and Mehdi Gheisari}, title = {{CFDMA:} {A} Novel Click Fraud Detection Method in Mobile Advertising}, booktitle = {4th International Conference on Data Intelligence and Security, {ICDIS} 2022, Shenzhen, China, August 24-26, 2022}, pages = {394--401}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICDIS55630.2022.00066}, doi = {10.1109/ICDIS55630.2022.00066}, timestamp = {Wed, 04 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdis/LiuLG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cem/LiTZLLDG21, author = {Zerui Li and Yuchen Tian and Weizhe Zhang and Qing Liao and Yang Liu and Xiaojiang Du and Mohsen Guizani}, title = {{RR-LADP:} {A} Privacy-Enhanced Federated Learning Scheme for Internet of Everything}, journal = {{IEEE} Consumer Electron. Mag.}, volume = {10}, number = {5}, pages = {93--101}, year = {2021}, url = {https://doi.org/10.1109/MCE.2021.3059958}, doi = {10.1109/MCE.2021.3059958}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cem/LiTZLLDG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/YangQYWL21, author = {Weihong Yang and Yang Qin and Zhangchengzhe Yi and Xuan Wang and Yang Liu}, title = {Providing Cache Consistency Guarantee for ICN-Based IoT Based on Push Mechanism}, journal = {{IEEE} Commun. Lett.}, volume = {25}, number = {12}, pages = {3858--3862}, year = {2021}, url = {https://doi.org/10.1109/LCOMM.2021.3116238}, doi = {10.1109/LCOMM.2021.3116238}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/icl/YangQYWL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/WangZHLLLJLZLZL21, author = {Huanran Wang and Weizhe Zhang and Hui He and Peng Liu and Daniel Xiapu Luo and Yang Liu and Jiawei Jiang and Yan Li and Xing Zhang and Wenmao Liu and Runzi Zhang and Xing Lan}, title = {An Evolutionary Study of IoT Malware}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {20}, pages = {15422--15440}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2021.3063840}, doi = {10.1109/JIOT.2021.3063840}, timestamp = {Sat, 26 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/WangZHLLLJLZLZL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscloud/JiangGPLWZ21, author = {Zoe Lin Jiang and Hui Guo and Yijian Pan and Yang Liu and Xuan Wang and Jun Zhang}, title = {Secure Neural Network in Federated Learning with Model Aggregation under Multiple Keys}, booktitle = {8th {IEEE} International Conference on Cyber Security and Cloud Computing, CSCloud 2021/7th {IEEE} International Conference on Edge Computing and Scalable Cloud, EdgeCom 2021, Washington, DC, USA, June 26-28, 2021}, pages = {47--52}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CSCloud-EdgeCom52276.2021.00019}, doi = {10.1109/CSCLOUD-EDGECOM52276.2021.00019}, timestamp = {Tue, 12 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cscloud/JiangGPLWZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/YuQL21, author = {Chenjia Yu and Shuhan Qi and Yang Liu}, title = {FedDeepFM: Ad {CTR} prediction based on Federated Factorization Machine}, booktitle = {Sixth {IEEE} International Conference on Data Science in Cyberspace, {DSC} 2021, Shenzhen, China, October 9-11, 2021}, pages = {195--202}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC53577.2021.00034}, doi = {10.1109/DSC53577.2021.00034}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsc/YuQL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/ShiSZL21, author = {Lu Shi and Jiangang Shu and Weizhe Zhang and Yang Liu}, title = {{HFL-DP:} Hierarchical Federated Learning with Differential Privacy}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2021, Madrid, Spain, December 7-11, 2021}, pages = {1--7}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/GLOBECOM46510.2021.9685644}, doi = {10.1109/GLOBECOM46510.2021.9685644}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/ShiSZL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/WangSJD0LL21, author = {Yangqian Wang and Yuanfeng Song and Di Jiang and Ye Ding and Xuan Wang and Yang Liu and Qing Liao}, editor = {Yongxuan Lai and Tian Wang and Min Jiang and Guangquan Xu and Wei Liang and Aniello Castiglione}, title = {FedSP: Federated Speaker Verification with Personal Privacy Preservation}, booktitle = {Algorithms and Architectures for Parallel Processing - 21st International Conference, {ICA3PP} 2021, Virtual Event, December 3-5, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13157}, pages = {462--478}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-95391-1\_29}, doi = {10.1007/978-3-030-95391-1\_29}, timestamp = {Tue, 12 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ica3pp/WangSJD0LL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsp/LinTL21, author = {Liangjie Lin and Yuchen Tian and Yang Liu}, title = {A Blockchain-based Privacy-Preserving Recommendation Mechanism}, booktitle = {5th {IEEE} International Conference on Cryptography, Security and Privacy, {CSP} 2021, Zhuhai, China, January 8-10, 2021}, pages = {74--78}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CSP51677.2021.9357604}, doi = {10.1109/CSP51677.2021.9357604}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsp/LinTL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsp/LongTL21, author = {Hanlin Long and Zhicheng Tian and Yang Liu}, title = {Detecting Android Malware Based on Dynamic Feature Sequence and Attention Mechanism}, booktitle = {5th {IEEE} International Conference on Cryptography, Security and Privacy, {CSP} 2021, Zhuhai, China, January 8-10, 2021}, pages = {129--133}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CSP51677.2021.9357569}, doi = {10.1109/CSP51677.2021.9357569}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsp/LongTL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccc2/LiZLL20, author = {Zhongwen Li and Bin Zhang and Yang Liu and Qing Liao}, editor = {Yujiu Yang and Lei Yu and Liang{-}Jie Zhang}, title = {PRTransE: Emphasize More Important Facts Based on Pagerank for Knowledge Graph Completion}, booktitle = {Cognitive Computing - {ICCC} 2020 - 4th International Conference, Held as Part of the Services Conference Federation, {SCF} 2020, Honolulu, HI, USA, September 18-20, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12408}, pages = {15--26}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-59585-2\_2}, doi = {10.1007/978-3-030-59585-2\_2}, timestamp = {Sun, 02 Oct 2022 16:04:01 +0200}, biburl = {https://dblp.org/rec/conf/iccc2/LiZLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsp/LiuWL20, author = {Fukang Liu and Guorui Wu and Yang Liu}, title = {A Privacy-Preserving Friend Recommendation Mechanism for Online Social Networks}, booktitle = {{ICCSP} 2020: 4th International Conference on Cryptography, Security and Privacy, Nanjing, China, January 10-12, 2020}, pages = {63--67}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3377644.3377648}, doi = {10.1145/3377644.3377648}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsp/LiuWL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpp/HuZXJTLZZ20, author = {Zhenbo Hu and Xiangyu Zou and Wen Xia and Sian Jin and Dingwen Tao and Yang Liu and Weizhe Zhang and Zheng Zhang}, editor = {Jos{\'{e}} Nelson Amaral and Lizy Kurian John and Xipeng Shen}, title = {Delta-DNN: Efficiently Compressing Deep Neural Networks via Exploiting Floats Similarity}, booktitle = {{ICPP} 2020: 49th International Conference on Parallel Processing, Edmonton, AB, Canada, August 17-20, 2020}, pages = {40:1--40:12}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3404397.3404408}, doi = {10.1145/3404397.3404408}, timestamp = {Wed, 22 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpp/HuZXJTLZZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2008-02679, author = {Huale Li and Xuan Wang and Shuhan Qi and Jiajia Zhang and Yang Liu and Fengwei Jia}, title = {Solving imperfect-information games via exponential counterfactual regret minimization}, journal = {CoRR}, volume = {abs/2008.02679}, year = {2020}, url = {https://arxiv.org/abs/2008.02679}, eprinttype = {arXiv}, eprint = {2008.02679}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2008-02679.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/0039S19, author = {Yang Liu and Andrew Simpson}, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Costas Lambrinoudakis and Christos Kalloniatis and John Mylopoulos and Annie I. Ant{\'{o}}n and Stefanos Gritzalis and Frank Pallas and J{\"{o}}rg Pohle and M. Angela Sasse and Weizhi Meng and Steven Furnell and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {On the Trade-Off Between Privacy and Utility in Mobile Services: {A} Qualitative Study}, booktitle = {Computer Security - {ESORICS} 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26-27, 2019 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11980}, pages = {261--278}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-42048-2\_17}, doi = {10.1007/978-3-030-42048-2\_17}, timestamp = {Thu, 18 Feb 2021 13:46:45 +0100}, biburl = {https://dblp.org/rec/conf/esorics/0039S19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccc2/YinLLX19, author = {Yiping Yin and Qing Liao and Yang Liu and Ruifeng Xu}, editor = {Ruifeng Xu and Jianzong Wang and Liang{-}Jie Zhang}, title = {Structural-Based Graph Publishing Under Differential Privacy}, booktitle = {Cognitive Computing - {ICCC} 2019 - Third International Conference, Held as Part of the Services Conference Federation, {SCF} 2019, San Diego, CA, USA, June 25-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11518}, pages = {67--78}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-23407-2\_6}, doi = {10.1007/978-3-030-23407-2\_6}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccc2/YinLLX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictai/LiWQLWJZ19, author = {Huale Li and Xuan Wang and Shuhan Qi and Yang Liu and Haojie Wang and Fengwei Jia and Jiajia Zhang}, title = {Solving Six-Player Games via Online Situation Estimation}, booktitle = {31st {IEEE} International Conference on Tools with Artificial Intelligence, {ICTAI} 2019, Portland, OR, USA, November 4-6, 2019}, pages = {1795--1799}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICTAI.2019.00270}, doi = {10.1109/ICTAI.2019.00270}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ictai/LiWQLWJZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ethos/Liu17c, author = {Yang Liu}, title = {Privacy-preserving targeted advertising for mobile devices}, school = {University of Oxford, {UK}}, year = {2017}, url = {https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.748869}, timestamp = {Tue, 05 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ethos/Liu17c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LiuS17, author = {Yang Liu and Andrew Simpson}, title = {AdSelector: {A} Privacy-Preserving Advertisement Selection Mechanism for Mobile Devices}, journal = {Comput. J.}, volume = {60}, number = {8}, pages = {1251--1270}, year = {2017}, url = {https://doi.org/10.1093/comjnl/bxx029}, doi = {10.1093/COMJNL/BXX029}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/LiuS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spe/LiuS16, author = {Yang Liu and Andrew Simpson}, title = {Privacy-preserving targeted mobile advertising: requirements, design and a prototype implementation}, journal = {Softw. Pract. Exp.}, volume = {46}, number = {12}, pages = {1657--1684}, year = {2016}, url = {https://doi.org/10.1002/spe.2403}, doi = {10.1002/SPE.2403}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spe/LiuS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LiuS16, author = {Yang Liu and Andrew Simpson}, editor = {Giovanni Livraga and Vicen{\c{c}} Torra and Alessandro Aldini and Fabio Martinelli and Neeraj Suri}, title = {Privacy-Preserving Targeted Mobile Advertising: Formal Models and Analysis}, booktitle = {Data Privacy Management and Security Assurance - 11th International Workshop, {DPM} 2016 and 5th International Workshop, {QASA} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9963}, pages = {94--110}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47072-6\_7}, doi = {10.1007/978-3-319-47072-6\_7}, timestamp = {Tue, 07 May 2024 20:10:32 +0200}, biburl = {https://dblp.org/rec/conf/esorics/LiuS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.