Skip to main content

and
  1. Article

    Open Access

    Revisiting the potential value of vital signs in the real-time prediction of mortality risk in intensive care unit patients

    Predicting patient mortality risk facilitates early intervention in intensive care unit (ICU) patients at greater risk of disease progression. This study applies machine learning methods to multidimensional cl...

    Pan Pan, Yue Wang, Chang Liu, Yanhui Tu, Haibo Cheng, Qingyun Yang in Journal of Big Data (2024)

  2. No Access

    Article

    Asymmetric multi-branch GCN for skeleton-based sign language recognition

    With the increase in the number of hearing-impaired people in the world, sign language recognition (SLR) has attracted extensive attention from scholars. Given the problems existing in the current research of ...

    Yuhong Liu, Fei Lu, **anpeng Cheng, Ying Yuan in Multimedia Tools and Applications (2024)

  3. No Access

    Article

    An Interpretive Adversarial Attack Method: Attacking Softmax Gradient Layer-Wise Relevance Propagation Based on Cosine Similarity Constraint and TS-Invariant

    Deep learning has shown remarkable advantages in many fields. Although the image recognition capabilities and deep neural network (DNN) have developed rapidly in recent years, relevant studies have confirmed t...

    Zigang Chen, Renjie Dai, Zhenghao Liu, Long Chen, Yuhong Liu in Neural Processing Letters (2023)

  4. No Access

    Article

    Cross-supervision-based equilibrated fusion mechanism of local and global attention for semantic segmentation

    In recent years, weakly supervised semantic segmentation has become one of the hot research directions, but the problems of object location accuracy and small activation areas are still a challenge. In this pa...

    Wenhao Yuan, **aoyan Lu, Rongfen Zhang, Yuhong Liu in Applied Intelligence (2023)

  5. No Access

    Chapter and Conference Paper

    Trust-Based Communities for Smart Grid Security and Privacy

    In smart grids, two-way communication between end-users and the grid allows frequent data exchange, which on one hand enhances users’ experience, while on the other hand increase security and privacy risks. In...

    Seohyun Park, **ang Li, Yuhong Liu in Wireless Internet (2023)

  6. No Access

    Article

    Heterogeneous information network embedding for user behavior analysis on social media

    User behavior prediction with low-dimensional vectors generated by user network embedding models has been verified to be efficient and reliable in real applications. However, existing graph representation lear...

    **aofang Zhao, Zhigang **, Yuhong Liu, Yi Hu in Neural Computing and Applications (2022)

  7. No Access

    Article

    A novel transfer learning for recognition of overlap** nano object

    While the science and technology of nanostructure have rapidly been developed in many fields, it is still hard to obtain sufficient samples of nano objects due to high cost, thus, impeding the development of d...

    Yuexing Han, Yuhong Liu, Bing Wang, Qiaochuan Chen in Neural Computing and Applications (2022)

  8. No Access

    Chapter and Conference Paper

    Leveraging Frame Aggregation in Wi-Fi IoT Networks for Low-Rate DDoS Attack Detection

    The proliferation of smart home Internet of Things (IoT) devices is demonstrated by their prominence in people’s lives. However, the resource-constraint essence of these devices introduces various security fla...

    Bhagyashri Tushir, Yuhong Liu, Behnam Dezfouli in Network and System Security (2022)

  9. No Access

    Book and Conference Proceedings

    Security and Privacy in Social Networks and Big Data

    7th International Symposium, SocialSec 2021, Fuzhou, China, November 19–21, 2021, Proceedings

    Limei Lin, Yuhong Liu in Communications in Computer and Information Science (2021)

  10. No Access

    Article

    Heterogeneous Graph Network Embedding for Sentiment Analysis on Social Media

    Nowadays, more people are used to express their attitudes on different entities in online social networks, forming user-to-entity sentiment links. These sentiment links imply positive or negative semantics. Mo...

    Zhigang **, **aofang Zhao, Yuhong Liu in Cognitive Computation (2021)

  11. No Access

    Article

    Stock closing price prediction based on sentiment analysis and LSTM

    Stock market prediction has been identified as a very important practical problem in the economic field. However, the timely prediction of the market is generally regarded as one of the most challenging proble...

    Zhigang **, Yang Yang, Yuhong Liu in Neural Computing and Applications (2020)

  12. No Access

    Article

    Sentiment analysis via semi-supervised learning: a model based on dynamic threshold and multi-classifiers

    Sentiment analysis has become a very popular research topic, especially for retrieving valuable information from various online environments. Most existing sentiment studies are based on supervised learning, w...

    Yue Han, Yuhong Liu, Zhigang ** in Neural Computing and Applications (2020)

  13. No Access

    Chapter and Conference Paper

    Blockchain Based Owner-Controlled Secure Software Updates for Resource-Constrained IoT

    With a large number of connected Internet of Things (IoT) devices deployed across the world, they have become popular targets of malicious attacks raising great security challenges. Many manufacturers are maki...

    Gabriel Jerome Solomon, Peng Zhang, Yuhong Liu in Network and System Security (2019)

  14. No Access

    Article

    A security evaluation framework for cloud security auditing

    Cloud computing is clearly one of today’s most enticing technologies due to its scalable, flexible, and cost-efficient access to infrastructure and application services. Despite these benefits, cloud service u...

    Syed Rizvi, Jungwoo Ryoo, John Kissell, William Aiken in The Journal of Supercomputing (2018)

  15. No Access

    Article

    Case learning for CBR-based collision avoidance systems

    With the rapid development of case-based reasoning (CBR) techniques, CBR has been widely applied to real-world applications such as collision avoidance systems. A successful CBR-based system relies on a high-q...

    Yuhong Liu, Chunsheng Yang, Yubin Yang, Fuhua Lin, Xuanmin Du in Applied Intelligence (2012)

  16. No Access

    Chapter and Conference Paper

    Policy Proposals on Promoting the Development of “Guanzhong-—Tianshui Economic Zone”

    Located in the center of Eurasia Continental Bridge, Guanzhong and Tianshui play a centrally leading role in coordinating regional development. “Guanzhong-—Tianshui Economic Zone” has practical significance in...

    Yuhong Liu, **n-an Wang in Advances in Education and Management (2011)

  17. No Access

    Chapter and Conference Paper

    Case Learning in CBR-Based Agent Systems for Ship Collision Avoidance

    With the rapid development of case-based reasoning (CBR) techniques, CBR has been widely applied to real-world applications such as agent-based systems for ship collision avoidance. A successful CBR-based syst...

    Yuhong Liu, Chunsheng Yang, Yubin Yang in Principles of Practice in Multi-Agent Syst… (2009)

  18. No Access

    Chapter and Conference Paper

    A CBR-Based Approach for Ship Collision Avoidance

    In this paper, we propose a novel CBR-based approach for ship collision avoidance. After the introduction of the CBR-based decision-making support, we present two abstraction principles, selecting view points ...

    Yuhong Liu, Chunsheng Yang, Xuanmin Du in New Frontiers in Applied Artificial Intelligence (2008)

  19. No Access

    Chapter and Conference Paper

    A Multiagent-Based Simulation System for Ship Collision Avoidance

    This paper presents a multiagent-based simulation system for the decision-making research of ship collision avoidance. The system has the characteristics of flexible agent, variable topology, isomorphic functi...

    Yuhong Liu, Chunsheng Yang, Xuanmin Du in Advanced Intelligent Computing Theories an… (2007)

  20. No Access

    Chapter and Conference Paper

    Cluster Computing on the Fly: P2P Scheduling of Idle Cycles in the Internet

    Peer-to-peer computing, the harnessing of idle compute cycles throughout the Internet, offers exciting new research challenges in the converging domains of networking and distributed computing. Our system, Cluste...

    Virginia Lo, Daniel Zappala, Dayi Zhou, Yuhong Liu, Shanyu Zhao in Peer-to-Peer Systems III (2005)