Stock closing price prediction based on sentiment analysis and LSTM Z Jin, Y Yang, Y Liu Neural Computing and Applications 32, 9713-9729, 2020 | 332 | 2020 |
Security of online reputation systems: The evolution of attacks and defenses Y Sun, Y Liu IEEE Signal Processing Magazine 29 (2), 87-97, 2012 | 131 | 2012 |
A survey of security and privacy challenges in cloud computing: solutions and future directions Y Liu, YL Sun, J Ryoo, AV Vasilakos Korean Institute of Information Scientists and Engineers (KIISE), 2015 | 119 | 2015 |
On design and implementation of neural-machine interface for artificial legs X Zhang, Y Liu, F Zhang, J Ren, YL Sun, Q Yang, H Huang IEEE Transactions on Industrial Informatics 8 (2), 418-429, 2011 | 71 | 2011 |
Anomaly detection in feedback-based reputation systems through temporal and correlation analysis Y Liu, Y Sun 2010 IEEE Second International Conference on Social Computing, 65-72, 2010 | 70 | 2010 |
A quantitative study of DDoS and E-DDoS attacks on WiFi smart home devices B Tushir, Y Dalal, B Dezfouli, Y Liu IEEE Internet of Things Journal 8 (8), 6282-6292, 2020 | 55 | 2020 |
Detection of collusion behaviors in online reputation systems Y Liu, Y Yang, YL Sun 2008 42nd Asilomar Conference on Signals, Systems and Computers, 1368-1372, 2008 | 54 | 2008 |
A novel digital watermarking based on general non-negative matrix factorization Z Chen, L Li, H Peng, Y Liu, Y Yang IEEE Transactions on Multimedia 20 (8), 1973-1986, 2018 | 51 | 2018 |
A centralized trust model approach for cloud computing S Rizvi, J Ryoo, Y Liu, D Zazworsky, A Cappeta IEEE 2014 23rd Wireless and Optical Communication Conference, 2014 | 45 | 2014 |
Integrating neuromuscular and cyber systems for neural control of artificial legs H Huang, Y Sun, Q Yang, F Zhang, X Zhang, Y Liu, J Ren, F Sierra Proceedings of the 1st ACM/IEEE international conference on cyber-physical …, 2010 | 43 | 2010 |
Integrated sensor data processing for occupancy detection in residential buildings C Wang, J Jiang, T Roth, C Nguyen, Y Liu, H Lee Energy and buildings 237, 110810, 2021 | 39 | 2021 |
A security evaluation framework for cloud security auditing S Rizvi, J Ryoo, J Kissell, W Aiken, Y Liu The Journal of Supercomputing 74, 5774-5796, 2018 | 39 | 2018 |
The impact of dos attacks onresource-constrained iot devices: A study on the mirai attack B Tushir, H Sehgal, R Nair, B Dezfouli, Y Liu arXiv preprint arXiv:2104.09041, 2021 | 38 | 2021 |
Graphse²: An encrypted graph database for privacy-preserving social search S Lai, X Yuan, SF Sun, JK Liu, Y Liu, D Liu Proceedings of the 2019 ACM Asia conference on computer and communications …, 2019 | 38 | 2019 |
Sentiment analysis via semi-supervised learning: a model based on dynamic threshold and multi-classifiers Y Han, Y Liu, Z Jin Neural Computing and Applications 32, 5117-5129, 2020 | 36 | 2020 |
Secure and efficient multi-signature schemes for fabric: An enterprise blockchain platform Y Xiao, P Zhang, Y Liu IEEE Transactions on Information Forensics and Security 16, 1782-1794, 2020 | 35 | 2020 |
Analyzing the resource utilization of aes encryption on iot devices PS Munoz, N Tran, B Craig, B Dezfouli, Y Liu 2018 Asia-Pacific Signal and Information Processing Association Annual …, 2018 | 32 | 2018 |
Toward a noninvasive automatic seizure control system in rats with transcranial focal stimulations via tripolar concentric ring electrodes O Makeyev, X Liu, H Luna-Munguía, G Rogel-Salazar, S Mucio-Ramirez, ... IEEE Transactions on Neural Systems and Rehabilitation Engineering 20 (4 …, 2012 | 31 | 2012 |
Retrieving hidden friends: A collusion privacy attack against online friend search engine Y Liu, N Li IEEE Transactions on Information Forensics and Security 14 (4), 833-847, 2018 | 29 | 2018 |
A dynamic trust based two-layer neighbor selection scheme towards online recommender systems Z Zhang, Y Liu, Z Jin, R Zhang Neurocomputing 285, 94-103, 2018 | 27 | 2018 |