DDoS detection and defense mechanism based on cognitive-inspired computing in SDN J Cui, M Wang, Y Luo, H Zhong Future generation computer systems 97, 275-283, 2019 | 117 | 2019 |
Privacy preserving id3 algorithm over horizontally partitioned data MJ Xiao, LS Huang, YL Luo, H Shen Sixth international conference on parallel and distributed computing …, 2005 | 78 | 2005 |
A tourism destination recommender system using users’ sentiment and temporal dynamics X Zheng, Y Luo, L Sun, J Zhang, F Chen Journal of Intelligent Information Systems 51 (3), 557-578, 2018 | 76 | 2018 |
Detecting anomalies from big network traffic data using an adaptive detection approach J Zhang, H Li, Q Gao, H Wang, Y Luo Information Sciences 318, 91-110, 2015 | 76 | 2015 |
A novel social network hybrid recommender system based on hypergraph topologic structure X Zheng, Y Luo, L Sun, X Ding, J Zhang World Wide Web 21, 985-1013, 2018 | 72 | 2018 |
On efficient and robust anonymization for privacy protection on massive streaming categorical information J Zhang, H Li, X Liu, Y Luo, F Chen, H Wang, L Chang IEEE Transactions on Dependable and Secure Computing 14 (5), 507-520, 2015 | 70 | 2015 |
Coupling a fast fourier transformation with a machine learning ensemble model to support recommendations for heart disease patients in a telehealth environment J Zhang, RL Lafta, X Tao, Y Li, F Chen, Y Luo, X Zhu Ieee Access 5, 10674-10685, 2017 | 59 | 2017 |
Research on sentiment classification of online travel review text W Chen, Z Xu, X Zheng, Q Yu, Y Luo Applied Sciences 10 (15), 5275, 2020 | 58 | 2020 |
Secure two-party point-circle inclusion problem YL Luo, LS Huang, H Zhong Journal of Computer Science and Technology 22 (1), 88-91, 2007 | 58 | 2007 |
Outlier-eliminated k-means clustering algorithm based on differential privacy preservation Q Yu, Y Luo, C Chen, X Ding Applied Intelligence 45, 1179-1191, 2016 | 55 | 2016 |
Collaborative filtering recommendation based on trust and emotion L Guo, J Liang, Y Zhu, Y Luo, L Sun, X Zheng Journal of Intelligent Information Systems 53, 113-135, 2019 | 51 | 2019 |
Trajectory similarity clustering based on multi-feature distance measurement Q Yu, Y Luo, C Chen, S Chen Applied Intelligence 49, 2315-2338, 2019 | 46 | 2019 |
空间几何对象相对位置判定中的私有信息保护 罗永龙, 黄刘生, 荆巍巍, 徐维江 计算机研究与发展 43 (3), 410-416, 2006 | 43 | 2006 |
An infrastructure framework for privacy protection of community medical internet of things: Transmission protection, storage protection and access control F Chen, Y Luo, J Zhang, J Zhu, Z Zhang, C Zhao, T Wang World Wide Web 21, 33-57, 2018 | 41 | 2018 |
Trajectory outlier detection approach based on common slices sub-sequence Q Yu, Y Luo, C Chen, X Wang Applied Intelligence 48, 2661-2680, 2018 | 40 | 2018 |
A secure protocol for determining whether a point is inside a convex polygon L Yonglong, H Liusheng, Z Hong, C Guoliang Chinese Journal of Electronics 15 (4), 578-582, 2006 | 39 | 2006 |
Design of fast fault tolerant reversible signed multiplier X Qi, F Chen, K Zuo, L Guo, Y Luo, M Hu International Journal of the Physical Sciences 7 (17), 2506-2514, 2012 | 37 | 2012 |
Privacy protection in the relative position determination for two spatial geometric objects. Y Luo, L Huang, W Jing, W Xu Jisuanji Yanjiu yu Fazhan(Computer Research and Development) 43 (3), 410-416, 2006 | 37 | 2006 |
Privacy-preserving distance measurement and its applications YL Luo, LS Huang, GL Chen, H Shen Chinese Journal of Electronics 15 (2), 237-241, 2006 | 36 | 2006 |
Probability method for Cerenkov luminescence tomography based on conformance error minimization X Ding, K Wang, B Jie, Y Luo, Z Hu, J Tian Biomedical optics express 5 (7), 2091-2112, 2014 | 34 | 2014 |