关注
Yonglong Luo
Yonglong Luo
在 ustc.edu.cn 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
DDoS detection and defense mechanism based on cognitive-inspired computing in SDN
J Cui, M Wang, Y Luo, H Zhong
Future generation computer systems 97, 275-283, 2019
1172019
Privacy preserving id3 algorithm over horizontally partitioned data
MJ Xiao, LS Huang, YL Luo, H Shen
Sixth international conference on parallel and distributed computing …, 2005
782005
A tourism destination recommender system using users’ sentiment and temporal dynamics
X Zheng, Y Luo, L Sun, J Zhang, F Chen
Journal of Intelligent Information Systems 51 (3), 557-578, 2018
762018
Detecting anomalies from big network traffic data using an adaptive detection approach
J Zhang, H Li, Q Gao, H Wang, Y Luo
Information Sciences 318, 91-110, 2015
762015
A novel social network hybrid recommender system based on hypergraph topologic structure
X Zheng, Y Luo, L Sun, X Ding, J Zhang
World Wide Web 21, 985-1013, 2018
742018
On efficient and robust anonymization for privacy protection on massive streaming categorical information
J Zhang, H Li, X Liu, Y Luo, F Chen, H Wang, L Chang
IEEE Transactions on Dependable and Secure Computing 14 (5), 507-520, 2015
712015
Research on sentiment classification of online travel review text
W Chen, Z Xu, X Zheng, Q Yu, Y Luo
Applied Sciences 10 (15), 5275, 2020
592020
Coupling a fast fourier transformation with a machine learning ensemble model to support recommendations for heart disease patients in a telehealth environment
J Zhang, RL Lafta, X Tao, Y Li, F Chen, Y Luo, X Zhu
Ieee Access 5, 10674-10685, 2017
592017
Secure two-party point-circle inclusion problem
YL Luo, LS Huang, H Zhong
Journal of Computer Science and Technology 22 (1), 88-91, 2007
582007
Outlier-eliminated k-means clustering algorithm based on differential privacy preservation
Q Yu, Y Luo, C Chen, X Ding
Applied Intelligence 45, 1179-1191, 2016
562016
Collaborative filtering recommendation based on trust and emotion
L Guo, J Liang, Y Zhu, Y Luo, L Sun, X Zheng
Journal of Intelligent Information Systems 53, 113-135, 2019
512019
Trajectory similarity clustering based on multi-feature distance measurement
Q Yu, Y Luo, C Chen, S Chen
Applied Intelligence 49, 2315-2338, 2019
462019
空间几何对象相对位置判定中的私有信息保护
罗永龙, 黄刘生, 荆巍巍, 徐维江
计算机研究与发展 43 (3), 410-416, 2006
432006
An infrastructure framework for privacy protection of community medical internet of things: Transmission protection, storage protection and access control
F Chen, Y Luo, J Zhang, J Zhu, Z Zhang, C Zhao, T Wang
World Wide Web 21, 33-57, 2018
412018
Trajectory outlier detection approach based on common slices sub-sequence
Q Yu, Y Luo, C Chen, X Wang
Applied Intelligence 48, 2661-2680, 2018
402018
A secure protocol for determining whether a point is inside a convex polygon
L Yonglong, H Liusheng, Z Hong, C Guoliang
Chinese Journal of Electronics 15 (4), 578-582, 2006
392006
Design of fast fault tolerant reversible signed multiplier
X Qi, F Chen, K Zuo, L Guo, Y Luo, M Hu
International Journal of the Physical Sciences 7 (17), 2506-2514, 2012
372012
Privacy protection in the relative position determination for two spatial geometric objects.
Y Luo, L Huang, W Jing, W Xu
Jisuanji Yanjiu yu Fazhan(Computer Research and Development) 43 (3), 410-416, 2006
372006
Privacy-preserving distance measurement and its applications
YL Luo, LS Huang, GL Chen, H Shen
Chinese Journal of Electronics 15 (2), 237-241, 2006
362006
Probability method for Cerenkov luminescence tomography based on conformance error minimization
X Ding, K Wang, B Jie, Y Luo, Z Hu, J Tian
Biomedical optics express 5 (7), 2091-2112, 2014
342014
系统目前无法执行此操作,请稍后再试。
文章 1–20