default search action
Yonglong Luo
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j76]Xiaoyao Zheng, Hao You, He Huang, Liping Sun, Qingying Yu, Yonglong Luo:
Two-stage greedy algorithm based on crowd sensing for tour route recommendation. Appl. Soft Comput. 153: 111260 (2024) - [j75]Xintao Ding, Yonglong Luo, Biao Jie, Qingde Li, Yongqiang Cheng:
Using outlier elimination to assess learning-based correspondence matching methods. Inf. Sci. 659: 120056 (2024) - [j74]Zhonghao Lu, Yonglong Luo, Lina Xu, Ying Hu, Xiaoyao Zheng, Liping Sun:
Channel spatio-temporal convolutional network for pedestrian trajectory prediction. Int. J. Mach. Learn. Cybern. 15(11): 5395-5413 (2024) - [j73]Xiaoyao Zheng, Manping Guan, Xianmin Jia, Liping Sun, Yonglong Luo:
Federated Matrix Factorization Recommendation Based on Secret Sharing for Privacy Preserving. IEEE Trans. Comput. Soc. Syst. 11(3): 3525-3535 (2024) - [j72]Xiaoyao Zheng, Xingwang Li, Zhenghua Chen, Liping Sun, Qingying Yu, Liangmin Guo, Yonglong Luo:
Enhanced Self-Attention Mechanism for Long and Short Term Sequential Recommendation Models. IEEE Trans. Emerg. Top. Comput. Intell. 8(3): 2457-2466 (2024) - [j71]Hongchao Li, Aihua Zheng, Liping Sun, Yonglong Luo:
Camera Topology Graph Guided Vehicle Re-Identification. IEEE Trans. Multim. 26: 1565-1577 (2024) - [j70]Xiaoyao Zheng, Zhen Ni, Xiangnan Zhong, Yonglong Luo:
Kernelized Deep Learning for Matrix Factorization Recommendation System Using Explicit and Implicit Information. IEEE Trans. Neural Networks Learn. Syst. 35(1): 1205-1216 (2024) - [j69]Youwen Zhu, Qimeng Song, Yonglong Luo:
Differentially Private Top-$k$ Flows Estimation Mechanism in Network Traffic. IEEE Trans. Netw. Sci. Eng. 11(3): 2462-2472 (2024) - [j68]Peng Hu, Xixi Chu, Kaizhong Zuo, Tianjiao Ni, Dong Xie, Zhangyi Shen, Fulong Chen, Yonglong Luo:
Security-Enhanced Data Sharing Scheme With Location Privacy Preservation for Internet of Vehicles. IEEE Trans. Veh. Technol. 73(9): 13751-13764 (2024) - [c37]Hongchao Li, Jingong Chen, Aihua Zheng, Yong Wu, Yonglong Luo:
Day-Night Cross-domain Vehicle Re-identification. CVPR 2024: 12626-12635 - 2023
- [j67]Ji Zhang, Xiangze Jia, Zhen Wang, Yonglong Luo, Fulong Chen, Gaoming Yang, Lihui Zhao:
JointContrast: Skeleton-Based Interaction Recognition with New Representation and Contrastive Learning. Algorithms 16(4): 190 (2023) - [j66]Liangmin Guo, Kaixuan Luan, Li Sun, Yonglong Luo, Xiaoyao Zheng:
Collaborative filtering recommendations based on multi-factor random walks. Eng. Appl. Artif. Intell. 123(Part B): 106409 (2023) - [j65]Liangmin Guo, Li Sun, Rong Jiang, Yonglong Luo, Xiaoyao Zheng:
Recommendation based on attributes and social relationships. Expert Syst. Appl. 234: 121027 (2023) - [j64]Xiao Zhang, Yonglong Luo, Qingying Yu, Lina Xu, Zhonghao Lu:
Privacy-Preserving Method for Trajectory Data Publication Based on Local Preferential Anonymity. Inf. 14(3): 157 (2023) - [j63]Zhiyun Xu, Zhaoyan Hu, Xiaoyao Zheng, Haiyan Zhang, Yonglong Luo:
A matrix factorization recommendation model for tourism points of interest based on interest shift and differential privacy. J. Intell. Fuzzy Syst. 44(1): 713-727 (2023) - [j62]Liping Sun, Xiaoyu Duan, Kai Zhang, Pingan Xu, Xiaoyao Zheng, Qingying Yu, Yonglong Luo:
Improved path planning algorithm for mobile robots. Soft Comput. 27(20): 15057-15073 (2023) - [j61]Xiaoyao Zheng, Manping Guan, Xianmin Jia, Liangmin Guo, Yonglong Luo:
A Matrix Factorization Recommendation System-Based Local Differential Privacy for Protecting Users' Sensitive Data. IEEE Trans. Comput. Soc. Syst. 10(3): 1189-1198 (2023) - [j60]Xintao Ding, Yongqiang Cheng, Yonglong Luo, Qingde Li, Prosanta Gope:
Consensus Adversarial Defense Method Based on Augmented Examples. IEEE Trans. Ind. Informatics 19(1): 984-994 (2023) - [j59]Liangmin Guo, Hao Yang, Kaixuan Luan, Li Sun, Yonglong Luo, Liping Sun:
A Trust Model Based on Characteristic Factors and SLAs for Cloud Environments. IEEE Trans. Netw. Serv. Manag. 20(4): 4383-4396 (2023) - [c36]Zhonghao Lu, Lina Xu, Ying Hu, Liping Sun, Yonglong Luo:
Channel Spatio-Temporal Convolutional Network for Trajectory Prediction. UbiSec 2023: 205-218 - 2022
- [j58]Liangmin Guo, Ying Zhu, Hao Yang, Yonglong Luo, Liping Sun, Xiaoyao Zheng:
A k-nearest neighbor query method based on trust and location privacy protection. Concurr. Comput. Pract. Exp. 34(16) (2022) - [j57]Xiaohan Wang, Zepei Zhang, Yonglong Luo:
Clustering Methods Based on Stay Points and Grid Density for Hotspot Detection. ISPRS Int. J. Geo Inf. 11(3): 190 (2022) - [j56]Ziyu Tang, Yonglong Luo, Daohong Fang, Chuanxin Zhao:
Access Control Method for EV Charging Stations Based on State Aggregation and Q-Learning. J. Syst. Sci. Complex. 35(6): 2145-2165 (2022) - [j55]Liping Sun, Tao Ye, Jian Sun, Xiaoyu Duan, Yonglong Luo:
Density-Peak-Based Overlapping Community Detection Algorithm. IEEE Trans. Comput. Soc. Syst. 9(4): 1211-1223 (2022) - [j54]Qingying Yu, Fan Hu, Zhen Ye, Chuanming Chen, Liping Sun, Yonglong Luo:
High-Frequency Trajectory Map Matching Algorithm Based on Road Network Topology. IEEE Trans. Intell. Transp. Syst. 23(10): 17530-17545 (2022) - [c35]Xiangze Jia, Ji Zhang, Zhen Wang, Yonglong Luo, Fulong Chen, Gaoming Yang:
Skeleton-Based Mutual Action Recognition Using Interactive Skeleton Graph and Joint Attention. DEXA (2) 2022: 110-116 - [c34]Xiangze Jia, Ji Zhang, Zhen Wang, Yonglong Luo, Fulong Chen, Jing Xiao:
JointContrast: Skeleton-Based Mutual Action Recognition with Contrastive Learning. PRICAI (3) 2022: 478-489 - 2021
- [j53]Liangmin Guo, Hao Yang, Kaixuan Luan, Yonglong Luo, Liping Sun, Xiaoyao Zheng:
A trust management model based on mutual trust and a reward-with-punishment mechanism for cloud environments. Concurr. Comput. Pract. Exp. 33(16) (2021) - [j52]Qingying Yu, Yonglong Luo, Dongxia Wang, Chuanming Chen, Liping Sun, Yawen Zhang:
Using information entropy and a multi-layer neural network with trajectory data to identify transportation modes. Int. J. Geogr. Inf. Sci. 35(7): 1346-1373 (2021) - [j51]Chuanming Chen, Wenshi Lin, Shuanggui Zhang, Zitong Ye, Qingying Yu, Yonglong Luo:
Personalized trajectory privacy-preserving method based on sensitive attribute generalization and location perturbation. Intell. Data Anal. 25(5): 1247-1271 (2021) - [j50]Liping Sun, Shang Ci, Xiaoqing Liu, Liangmin Guo, Xiaoyao Zheng, Yonglong Luo:
Secure grid-based density peaks clustering on hybrid cloud for industrial IoT. Int. J. Netw. Manag. 31(2) (2021) - [j49]Wenjian Yang, Yu-e Sun, He Huang, Yang Du, Danlei Huang, Tao Tao, Yonglong Luo:
Persistent transportation traffic volume estimation with differential privacy. J. Ambient Intell. Humaniz. Comput. 12(1): 213-231 (2021) - [j48]Haiyan Zhang, Yonglong Luo, Qingying Yu, Xiaoyao Zheng, Xuejing Li:
Map-matching approach based on link factor and hidden Markov model. J. Intell. Fuzzy Syst. 40(3): 5455-5471 (2021) - [j47]Liping Sun, Xiaoqing Liu, Yuanjun Liu, Tao Wang, Liangmin Guo, Xiaoyao Zheng, Yonglong Luo:
A novel deep recommend model based on rating matrix and item attributes. J. Intell. Inf. Syst. 57(2): 295-319 (2021) - [j46]Zhiyun Xu, Xiaoyao Zheng, Haiyan Zhang, Yonglong Luo:
A Novel Travel Group Recommendation Model Based on User Trust and Social Influence. Mob. Inf. Syst. 2021: 7080116:1-7080116:10 (2021) - [j45]Xuejing Li, Yonglong Luo, Weixin Bian:
Retracing extended sudoku matrix for high-capacity image steganography. Multim. Tools Appl. 80(12): 18627-18651 (2021) - [j44]Taochun Wang, Chengmei Lv, Chengtian Wang, Fulong Chen, Yonglong Luo:
A Secure Truth Discovery for Data Aggregation in Mobile Crowd Sensing. Secur. Commun. Networks 2021: 2296386:1-2296386:15 (2021) - [c33]Qiqiang Xu, Ji Zhang, Ting Yu, Wenbin Zhang, Mingli Zhang, Yonglong Luo, Fulong Chen, Zhen Liu:
An Effective Algorithm for Classification of Text with Weak Sequential Relationships. DEXA (2) 2021: 283-294 - [c32]Liping Sun, Tingli Du, Xiaoyu Duan, Yonglong Luo:
Short Text Clustering Using Joint Optimization of Feature Representations and Cluster Assignments. PRICAI (2) 2021: 217-231 - 2020
- [j43]Liping Sun, Shang Ci, Xiaoqing Liu, Xiaoyao Zheng, Qingying Yu, Yonglong Luo:
A privacy-preserving density peak clustering algorithm in cloud computing. Concurr. Comput. Pract. Exp. 32(11) (2020) - [j42]Qiliang Li, Jie Cui, Hong Zhong, Yichao Du, Yonglong Luo, Lu Liu:
LBBESA: An efficient software-defined networking load-balancing scheme based on elevator scheduling algorithm. Concurr. Comput. Pract. Exp. 32(16) (2020) - [j41]Deqin Xu, Weixin Bian, Yongqiang Cheng, Qingde Li, Yonglong Luo, Qingying Yu:
Fingerprint enhancement using multi-scale classification dictionaries with reduced dimensionality. IET Biom. 9(5): 194-204 (2020) - [j40]Zhaoyan Hu, Yonglong Luo, Xiaoyao Zheng, Yannian Zhao:
A novel privacy-preserving matrix factorization recommendation system based on random perturbation. J. Intell. Fuzzy Syst. 38(4): 4525-4535 (2020) - [j39]Yannian Zhao, Yonglong Luo, Qingying Yu, Zhaoyan Hu:
A Privacy-Preserving Trajectory Publication Method Based on Secure Start-Points and End-Points. Mob. Inf. Syst. 2020: 3429256:1-3429256:12 (2020) - [j38]Haiyan Zhang, Yonglong Luo, Qingying Yu, Liping Sun, Xuejing Li, Zhenqiang Sun:
A Framework of Abnormal Behavior Detection and Classification Based on Big Trajectory Data for Mobile Networks. Secur. Commun. Networks 2020: 8858444:1-8858444:15 (2020) - [c31]Qiqiang Xu, Ji Zhang, Zenghui Xu, Yonglong Luo, Fulong Chen, Xiaoyao Zheng, Gaoming Yang:
Effective Tuple-based Anonymization for Massive Streaming Categorical Data. IEEE BigData 2020: 5858-5860 - [c30]Yilei Zhang, Peiyun Zhang, Yonglong Luo, Jun Luo:
Efficient and Privacy-Preserving Federated QoS Prediction for Cloud Services. ICWS 2020: 549-553 - [c29]Yilei Zhang, Peiyun Zhang, Yonglong Luo, Liya Ji:
Towards Efficient, Credible and Privacy-Preserving Service QoS Prediction in Unreliable Mobile Edge Environments. SRDS 2020: 309-318
2010 – 2019
- 2019
- [j37]Liping Sun, Shuting Bao, Shang Ci, Xiaoyao Zheng, Liangmin Guo, Yonglong Luo:
Differential Privacy-Preserving Density Peaks Clustering Based on Shared Near Neighbors Similarity. IEEE Access 7: 89427-89440 (2019) - [j36]Qingying Yu, Yonglong Luo, Chuanming Chen, Shigang Chen:
Trajectory similarity clustering based on multi-feature distance measurement. Appl. Intell. 49(6): 2315-2338 (2019) - [j35]Dong Xie, Fulong Chen, Yonglong Luo, Lixiang Li:
One-to-many image encryption with privacy-preserving homomorphic outsourced decryption based on compressed sensing. Digit. Signal Process. 95 (2019) - [j34]Liping Sun, Tao Tao, Xiaoyao Zheng, Shuting Bao, Yonglong Luo:
Combining density peaks clustering and gravitational search method to enhance data clustering. Eng. Appl. Artif. Intell. 85: 865-873 (2019) - [j33]Jie Cui, Mingjun Wang, Yonglong Luo, Hong Zhong:
DDoS detection and defense mechanism based on cognitive-inspired computing in SDN. Future Gener. Comput. Syst. 97: 275-283 (2019) - [j32]Chuanming Chen, Yonglong Luo, Qingying Yu, Guiyin Hu:
TPPG: Privacy-preserving trajectory data publication based on 3D-Grid partition. Intell. Data Anal. 23(3): 503-533 (2019) - [j31]Xiaohan Wang, Yonglong Luo, Shiyang Liu, Taochun Wang, Huihui Han:
Subspace k-anonymity algorithm for location-privacy preservation based on locality-sensitive hashing. Intell. Data Anal. 23(5): 1167-1185 (2019) - [j30]Xiaohan Wang, Zepei Zhang, Yonglong Luo, Qingying Yu:
Hierarchical interpolation point anonymity for trajectory privacy protection. Intell. Data Anal. 23(6): 1397-1419 (2019) - [j29]Qingying Yu, Yonglong Luo, Chuanming Chen, Xiaoyao Zheng:
Road Congestion Detection Based on Trajectory Stay-Place Clustering. ISPRS Int. J. Geo Inf. 8(6): 264 (2019) - [j28]Wen Chen, Zhiyun Xu, Xiaoyao Zheng, Yonglong Luo:
Geo-Tagged Photo Metadata Processing Method for Beijing Inbound Tourism Flow. ISPRS Int. J. Geo Inf. 8(12): 556 (2019) - [j27]Liangmin Guo, Jiakun Liang, Ying Zhu, Yonglong Luo, Liping Sun, Xiaoyao Zheng:
Collaborative filtering recommendation based on trust and emotion. J. Intell. Inf. Syst. 53(1): 113-135 (2019) - [j26]Qingqing Liu, Yonglong Luo, Yifei Wang, Xiaoyao Zheng, Wen Chen:
基于SVD填充的混合推荐算法 (Hybrid Recommendation Algorithm Based on SVD Filling). 计算机科学 46(6A): 468-472 (2019) - [j25]Yujie Jia, Zhaoxia Yin, Xinpeng Zhang, Yonglong Luo:
Reversible data hiding based on reducing invalid shifting of pixels in histogram shifting. Signal Process. 163: 238-246 (2019) - [c28]Wenjian Yang, Yu-e Sun, He Huang, Yang Du, Danlei Huang, Fanzhang Li, Yonglong Luo:
Persistent Transportation Traffic Volume Estimation with Differential Privacy. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 566-573 - [c27]Ji Zhang, Leonard Tan, Xiaohui Tao, Hongzhou Li, Fulong Chen, Yonglong Luo:
SLIND+: Stable LINk Detection. WISE Workshops 2019: 73-80 - [i1]Yujie Jia, Zhaoxia Yin, Xinpeng Zhang, Yonglong Luo:
Reversible data hiding based on reducing invalid shifting of pixels in histogram shifting. CoRR abs/1905.05365 (2019) - 2018
- [j24]Liangmin Guo, Guiyin Hu, Yan Dong, Yonglong Luo, Ying Zhu:
A Game Based Consolidation Method of Virtual Machines in Cloud Data Centers With Energy and Load Constraints. IEEE Access 6: 4664-4676 (2018) - [j23]Qingying Yu, Yonglong Luo, Chuanming Chen, Xiaohan Wang:
Trajectory outlier detection approach based on common slices sub-sequence. Appl. Intell. 48(9): 2661-2680 (2018) - [j22]Xiaohan Wang, Yonglong Luo, Yefeng Jiang, Wenli Wu, Qingying Yu:
Probabilistic optimal projection partition KD-Tree k-anonymity for data publishing privacy protection. Intell. Data Anal. 22(6): 1415-1437 (2018) - [j21]Xiaoyao Zheng, Yonglong Luo, Liping Sun, Ji Zhang, Fulong Chen:
A tourism destination recommender system using users' sentiment and temporal dynamics. J. Intell. Inf. Syst. 51(3): 557-578 (2018) - [j20]Taochun Wang, Xiaolin Qin, Youwei Ding, Liang Liu, Yonglong Luo:
Privacy-Preserving and Energy-Efficient Continuous Data Aggregation Algorithm in Wireless Sensor Networks. Wirel. Pers. Commun. 98(1): 665-684 (2018) - [j19]Fulong Chen, Yonglong Luo, Ji Zhang, Junru Zhu, Ziyang Zhang, Chuanxin Zhao, Taochun Wang:
An infrastructure framework for privacy protection of community medical internet of things - Transmission protection, storage protection and access control. World Wide Web 21(1): 33-57 (2018) - [j18]Xiaoyao Zheng, Yonglong Luo, Liping Sun, Xintao Ding, Ji Zhang:
A novel social network hybrid recommender system based on hypergraph topologic structure. World Wide Web 21(4): 985-1013 (2018) - [c26]Ji Zhang, Leonard Tan, Xiaohui Tao, Xiaoyao Zheng, Yonglong Luo, Jerry Chun-Wei Lin:
SLIND: Identifying Stable Links in Online Social Networks. DASFAA (2) 2018: 813-816 - [c25]Raid Lafta, Ji Zhang, Xiaohui Tao, Jerry Chun-Wei Lin, Fulong Chen, Yonglong Luo, Xiaoyao Zheng:
A Recommender System with Advanced Time Series Medical Data Analysis for Diabetes Patients in a Telehealth Environment. DEXA (2) 2018: 185-192 - [c24]Xiaoyao Zheng, Yonglong Luo, Ji Zhang, Liping Sun, Fulong Chen:
A Novel Differential Privacy Recommendation Method Based on a Distributed Framework. ICDM Workshops 2018: 1332-1339 - [c23]Tao Tao, Yu-e Sun, Dongmei Chen, Yu Xin, Yonglong Luo, He Huang:
PosAla: A Smartphone-Based Posture Alarm System Design for Smartphone Users. MSN 2018: 115-120 - [c22]Yu Bao, Yu-e Sun, Xiaofei Bu, Yang Du, Xiaocan Wu, He Huang, Yonglong Luo, Liusheng Huang:
How Do Metro Station Crowd Flows Influence the Taxi Demand Based on Deep Spatial-Temporal Network? MSN 2018: 188-192 - 2017
- [j17]Ji Zhang, Raid Lafta, Xiaohui Tao, Yan Li, Fulong Chen, Yonglong Luo, Xiaodong Zhu:
Coupling a Fast Fourier Transformation With a Machine Learning Ensemble Model to Support Recommendations for Heart Disease Patients in a Telehealth Environment. IEEE Access 5: 10674-10685 (2017) - [j16]Liangmin Guo, Yonglong Luo, Xiaokang He, Guiyin Hu, Yan Dong:
A Method for Service Evaluation Based on Fuzzy Theory for Cloud Computing. KSII Trans. Internet Inf. Syst. 11(4): 1820-1840 (2017) - [j15]Xintao Ding, Yonglong Luo, Guorong Cai, Xiaobo Zhang:
Multi-scale Application of Camera Calibration in Tourism Service Platforms. J. Inf. Hiding Multim. Signal Process. 8(4): 929-936 (2017) - [j14]Ji Zhang, Hongzhou Li, Xuemei Liu, Yonglong Luo, Fulong Chen, Hua Wang, Liang Chang:
On Efficient and Robust Anonymization for Privacy Protection on Massive Streaming Categorical Information. IEEE Trans. Dependable Secur. Comput. 14(5): 507-520 (2017) - [c21]Xintao Ding, Yonglong Luo, Qingying Yu, Qingde Li, Yongqiang Cheng, Robert Munnoch, Dongfei Xue, Guorong Cai:
Indoor object recognition using pre-trained convolutional neural network. ICAC 2017: 1-6 - [c20]Meixuan Li, Yu-e Sun, He Huang, Jing Yuan, Yang Du, Yu Bao, Yonglong Luo:
Profit maximization resource allocation in cloud computing with performance guarantee. IPCCC 2017: 1-2 - [c19]Raid Lafta, Ji Zhang, Xiaohui Tao, Yan Li, Wessam Abbas, Yonglong Luo, Fulong Chen, Vincent S. Tseng:
A Fast Fourier Transform-Coupled Machine Learning-Based Ensemble Model for Disease Risk Prediction Using a Real-Life Dataset. PAKDD (1) 2017: 654-670 - [c18]Taochun Wang, Ji Zhang, Yonglong Luo, Kaizhong Zuo, Xintao Ding:
An Efficient and Secure Itinerary-Based Data Aggregation Algorithm for WSNs. TrustCom/BigDataSE/ICESS 2017: 433-440 - 2016
- [j13]Qingying Yu, Yonglong Luo, Chuanming Chen, Xintao Ding:
Outlier-eliminated k-means clustering algorithm based on differential privacy preservation. Appl. Intell. 45(4): 1179-1191 (2016) - [j12]Qingying Yu, Yonglong Luo, Chuanming Chen, Weixin Bian:
Neighborhood relevant outlier detection approach based on information entropy. Intell. Data Anal. 20(6): 1247-1265 (2016) - [j11]Xiaoyao Zheng, Yonglong Luo, Zhiyun Xu, Qingying Yu, Lin Lu:
Tourism Destination Recommender System for the Cold Start Problem. KSII Trans. Internet Inf. Syst. 10(7): 3192-3212 (2016) - [j10]Xintao Ding, Yonglong Luo, Yunyun Yi, Biao Jie, Taochun Wang, Weixin Bian:
Orthogonal design for scale invariant feature transform optimization. J. Electronic Imaging 25(5): 053030 (2016) - [j9]Raid Lafta, Ji Zhang, Xiaohui Tao, Yan Li, Vincent S. Tseng, Yonglong Luo, Fulong Chen:
An intelligent recommender system based on predictive analysis in telehealthcare environment. Web Intell. 14(4): 325-336 (2016) - [c17]Hongzhou Li, Ji Zhang, Yonglong Luo, Fulong Chen, Liang Chang:
GO-PEAS: A Scalable Yet Accurate Grid-Based Outlier Detection Method Using Novel Pruning Searching Techniques. ACALCI 2016: 125-133 - 2015
- [j8]Ji Zhang, Hongzhou Li, Qigang Gao, Hai Wang, Yonglong Luo:
Detecting anomalies from big network traffic data using an adaptive detection approach. Inf. Sci. 318: 91-110 (2015) - 2014
- [j7]Liping Sun, Yonglong Luo, Xintao Ding, Ji Zhang:
A Novel Artificial Immune Algorithm for Spatial Clustering with Obstacle Constraint and Its Applications. Comput. Intell. Neurosci. 2014: 160730:1-160730:11 (2014) - [j6]Liping Sun, Yonglong Luo, Yalei Yu, Xintao Ding:
Voronoi Diagram Generation Algorithm based on Delaunay Triangulation. J. Softw. 9(3): 777-784 (2014) - [j5]Weixin Bian, Yonglong Luo, Deqin Xu, Qingying Yu:
Fingerprint ridge orientation field reconstruction using the best quadratic approximation by orthogonal polynomials in two discrete variables. Pattern Recognit. 47(10): 3304-3313 (2014) - 2013
- [j4]Liangmin Guo, Yonglong Luo, Zhengzhen Zhou, Meijing Ji:
A Recommendation Trust Method Based on Fuzzy Clustering in P2P Networks. J. Softw. 8(2): 357-360 (2013) - [j3]Zhengzhen Zhou, Yonglong Luo, Liangmin Guo, Liping Sun:
Assessment of P2P Trust Model Based on Fuzzy Comprehensive Evaluation. J. Softw. 8(11): 2711-2714 (2013) - [c16]Ji Zhang, Xuemei Liu, Yonglong Luo:
An efficient and robust privacy protection technique for massive streaming choice-based information. CIKM 2013: 1169-1172 - 2011
- [c15]Ji Zhang, Yonglong Luo:
A Novel Fuzzy Logic Based Bit Freezing Technique to Improve Gene Specific Co-regulation Discovery from Gene Expression Databases. ACSC 2011: 99-106 - [c14]Yonglong Luo, Chao Cheng, Cai-xia Chen, Hong Zhong:
A Protocol of Privacy-Preserving Closest Pair in Two Dimensional Space. CIS 2011: 865-869 - 2010
- [j2]Cheng Chao, Yonglong Luo, Wenjuan Cheng:
Research on the Problem of Privacy-Preserving Closest Pair. J. Comput. 5(7): 1120-1124 (2010) - [c13]Yonglong Luo, Lei Shi, Caiyun Zhang, Ji Zhang:
Privacy-Preserving Protocols for String Matching. NSS 2010: 481-485
2000 – 2009
- 2009
- [c12]Youwen Zhu, Liusheng Huang, Wei Yang, Dong Li, Yonglong Luo, Fan Dong:
Three New Approaches to Privacy-preserving Add to Multiply Protocol and its Application. WKDD 2009: 554-558 - 2008
- [c11]Qi Wang, Yonglong Luo, Liusheng Huang:
Privacy-preserving Protocols for Finding the Convex Hulls. ARES 2008: 727-732 - [c10]Youwen Zhu, Liusheng Huang, Wei Yang, Zhili Chen, Lingjun Li, Zhenshan Yu, Yonglong Luo:
Privacy-Preserving Practical Convex Hulls Protocol. FCST 2008: 10-16 - [c9]Dong Li, Liusheng Huang, Wei Yang, Youwen Zhu, Yonglong Luo, Zhili Chen, Lingjun Li, Yun Ye:
A Practical Three-Dimensional Privacy-Preserving Approximate Convex Hulls Protocol. FCST 2008: 17-23 - [c8]Runhua Shi, Liusheng Huang, Yonglong Luo, Hong Zhong:
A Threshold Multi-secret Sharing Scheme. ICNSC 2008: 1705-1707 - 2007
- [j1]Yonglong Luo, Liusheng Huang, Hong Zhong:
Secure Two-Party Point-Circle Inclusion Problem. J. Comput. Sci. Technol. 22(1): 88-91 (2007) - [c7]Yifei Yao, Yonglong Luo, Liusheng Huang, Weiwei Jing, Wei Yang, Weijiang Xu:
Privacy-preserving technology and its applications in statistics measurements. Infoscale 2007: 74 - [c6]Weijiang Xu, Liusheng Huang, Yonglong Luo, Yifei Yao, Weiwei Jing:
Privacy-Preserving DBSCAN Clustering Over Vertically Partitioned Data. MUE 2007: 850-856 - 2006
- [c5]Weiwei Jing, Liusheng Huang, Yonglong Luo, Weijiang Xu, Yifei Yao:
An Algorithm for Privacy-Preserving Quantitative Association Rules Mining. DASC 2006: 315-324 - [c4]Wei Yang, Liusheng Huang, Yonglong Luo, Mingjun Xiao:
Quantum Oblivious Transfer Based on POVM Measurements. FCS 2006: 154-162 - 2005
- [c3]Mingjun Xiao, Liusheng Huang, Yonglong Luo, Hong Shen:
Privacy Preserving ID3 Algorithm over Horizontally Partitioned Data. PDCAT 2005: 239-243 - [c2]Liusheng Huang, Hong Zhong, Hong Shen, Yonglong Luo:
An Efficient Multiple-Precision Division Algorithm. PDCAT 2005: 971-974 - 2004
- [c1]Haitao Tian, Liusheng Huang, Zhi Zhou, Yonglong Luo:
Arm up Administrators: Automated Vulnerability Management. ISPAN 2004: 587-593
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint