Yonglong Luo
Yonglong Luo
Adresă de e-mail confirmată pe ustc.edu.cn - Pagina de pornire
Citat de
Citat de
DDoS detection and defense mechanism based on cognitive-inspired computing in SDN
J Cui, M Wang, Y Luo, H Zhong
Future generation computer systems 97, 275-283, 2019
Privacy preserving id3 algorithm over horizontally partitioned data
MJ Xiao, LS Huang, YL Luo, H Shen
Sixth international conference on parallel and distributed computing …, 2005
A tourism destination recommender system using users’ sentiment and temporal dynamics
X Zheng, Y Luo, L Sun, J Zhang, F Chen
Journal of Intelligent Information Systems 51 (3), 557-578, 2018
Detecting anomalies from big network traffic data using an adaptive detection approach
J Zhang, H Li, Q Gao, H Wang, Y Luo
Information Sciences 318, 91-110, 2015
A novel social network hybrid recommender system based on hypergraph topologic structure
X Zheng, Y Luo, L Sun, X Ding, J Zhang
World Wide Web 21, 985-1013, 2018
On efficient and robust anonymization for privacy protection on massive streaming categorical information
J Zhang, H Li, X Liu, Y Luo, F Chen, H Wang, L Chang
IEEE Transactions on Dependable and Secure Computing 14 (5), 507-520, 2015
Coupling a fast fourier transformation with a machine learning ensemble model to support recommendations for heart disease patients in a telehealth environment
J Zhang, RL Lafta, X Tao, Y Li, F Chen, Y Luo, X Zhu
Ieee Access 5, 10674-10685, 2017
Secure two-party point-circle inclusion problem
YL Luo, LS Huang, H Zhong
Journal of Computer Science and Technology 22 (1), 88-91, 2007
Research on sentiment classification of online travel review text
W Chen, Z Xu, X Zheng, Q Yu, Y Luo
Applied Sciences 10 (15), 5275, 2020
Outlier-eliminated k-means clustering algorithm based on differential privacy preservation
Q Yu, Y Luo, C Chen, X Ding
Applied Intelligence 45, 1179-1191, 2016
Collaborative filtering recommendation based on trust and emotion
L Guo, J Liang, Y Zhu, Y Luo, L Sun, X Zheng
Journal of Intelligent Information Systems 53, 113-135, 2019
Trajectory similarity clustering based on multi-feature distance measurement
Q Yu, Y Luo, C Chen, S Chen
Applied Intelligence 49, 2315-2338, 2019
罗永龙, 黄刘生, 荆巍巍, 徐维江
计算机研究与发展 43 (3), 410-416, 2006
Trajectory outlier detection approach based on common slices sub-sequence
Q Yu, Y Luo, C Chen, X Wang
Applied Intelligence 48, 2661-2680, 2018
An infrastructure framework for privacy protection of community medical internet of things: Transmission protection, storage protection and access control
F Chen, Y Luo, J Zhang, J Zhu, Z Zhang, C Zhao, T Wang
World Wide Web 21, 33-57, 2018
A secure protocol for determining whether a point is inside a convex polygon
L Yonglong, H Liusheng, Z Hong, C Guoliang
Chinese Journal of Electronics 15 (4), 578-582, 2006
Design of fast fault tolerant reversible signed multiplier
X Qi, F Chen, K Zuo, L Guo, Y Luo, M Hu
International Journal of the Physical Sciences 7 (17), 2506-2514, 2012
Privacy protection in the relative position determination for two spatial geometric objects.
Y Luo, L Huang, W Jing, W Xu
Jisuanji Yanjiu yu Fazhan(Computer Research and Development) 43 (3), 410-416, 2006
Privacy-preserving distance measurement and its applications
YL Luo, LS Huang, GL Chen, H Shen
Chinese Journal of Electronics 15 (2), 237-241, 2006
Probability method for Cerenkov luminescence tomography based on conformance error minimization
X Ding, K Wang, B Jie, Y Luo, Z Hu, J Tian
Biomedical optics express 5 (7), 2091-2112, 2014
Sistemul nu poate realiza operația în acest moment. Încercați din nou mai târziu.
Articole 1–20