DDoS detection and defense mechanism based on cognitive-inspired computing in SDN J Cui, M Wang, Y Luo, H Zhong Future generation computer systems 97, 275-283, 2019 | 91 | 2019 |
Privacy preserving id3 algorithm over horizontally partitioned data MJ Xiao, LS Huang, YL Luo, H Shen Sixth international conference on parallel and distributed computing …, 2005 | 77 | 2005 |
Detecting anomalies from big network traffic data using an adaptive detection approach J Zhang, H Li, Q Gao, H Wang, Y Luo Information Sciences 318, 91-110, 2015 | 72 | 2015 |
On efficient and robust anonymization for privacy protection on massive streaming categorical information J Zhang, H Li, X Liu, Y Luo, F Chen, H Wang, L Chang IEEE Transactions on Dependable and Secure Computing 14 (5), 507-520, 2015 | 64 | 2015 |
A tourism destination recommender system using users’ sentiment and temporal dynamics X Zheng, Y Luo, L Sun, J Zhang, F Chen Journal of Intelligent Information Systems 51, 557-578, 2018 | 63 | 2018 |
Secure two-party point-circle inclusion problem YL Luo, LS Huang, H Zhong Journal of Computer Science and Technology 22 (1), 88-91, 2007 | 58 | 2007 |
A novel social network hybrid recommender system based on hypergraph topologic structure X Zheng, Y Luo, L Sun, X Ding, J Zhang World Wide Web 21, 985-1013, 2018 | 56 | 2018 |
Coupling a fast fourier transformation with a machine learning ensemble model to support recommendations for heart disease patients in a telehealth environment J Zhang, RL Lafta, X Tao, Y Li, F Chen, Y Luo, X Zhu Ieee Access 5, 10674-10685, 2017 | 49 | 2017 |
Research on sentiment classification of online travel review text W Chen, Z Xu, X Zheng, Q Yu, Y Luo Applied Sciences 10 (15), 5275, 2020 | 42 | 2020 |
Collaborative filtering recommendation based on trust and emotion L Guo, J Liang, Y Zhu, Y Luo, L Sun, X Zheng Journal of Intelligent Information Systems 53, 113-135, 2019 | 41 | 2019 |
Outlier-eliminated k-means clustering algorithm based on differential privacy preservation Q Yu, Y Luo, C Chen, X Ding Applied Intelligence 45, 1179-1191, 2016 | 41 | 2016 |
A secure protocol for determining whether a point is inside a convex polygon L Yonglong, H Liusheng, Z Hong, C Guoliang Chinese Journal of Electronics 15 (4), 578-582, 2006 | 41 | 2006 |
空间几何对象相对位置判定中的私有信息保护 罗永龙, 黄刘生, 荆巍巍, 徐维江 计算机研究与发展 43 (3), 410-416, 2006 | 41 | 2006 |
Privacy-preserving distance measurement and its applications YL Luo, LS Huang, GL Chen, H Shen Chinese Journal of Electronics 15 (2), 237-241, 2006 | 38 | 2006 |
An infrastructure framework for privacy protection of community medical internet of things: Transmission protection, storage protection and access control F Chen, Y Luo, J Zhang, J Zhu, Z Zhang, C Zhao, T Wang World Wide Web 21, 33-57, 2018 | 37 | 2018 |
Privacy protection in the relative position determination for two spatial geometric objects. Y Luo, L Huang, W Jing, W Xu Jisuanji Yanjiu yu Fazhan(Computer Research and Development) 43 (3), 410-416, 2006 | 37 | 2006 |
Design of fast fault tolerant reversible signed multiplier X Qi, F Chen, K Zuo, L Guo, Y Luo, M Hu International Journal of the Physical Sciences 7 (17), 2506-2514, 2012 | 36 | 2012 |
Trajectory outlier detection approach based on common slices sub-sequence Q Yu, Y Luo, C Chen, X Wang Applied Intelligence 48, 2661-2680, 2018 | 35 | 2018 |
一个保护私有信息的布尔关联规则挖掘算法 罗永龙, 黄刘生, 荆巍巍, 姚亦飞, 陈国良 电子学报 33 (5), 900, 2005 | 34 | 2005 |
An algorithm for privacy-preserving Boolean association rule mining YL Luo, LS Huang, WW Jing, YF Yao, GL Chen ACTA ELECTONICA SINICA 33 (5), 900, 2005 | 34 | 2005 |