Yonglong Luo
Yonglong Luo
Verified email at - Homepage
Cited by
Cited by
DDoS detection and defense mechanism based on cognitive-inspired computing in SDN
J Cui, M Wang, Y Luo, H Zhong
Future generation computer systems 97, 275-283, 2019
Privacy preserving id3 algorithm over horizontally partitioned data
MJ Xiao, LS Huang, YL Luo, H Shen
Sixth international conference on parallel and distributed computing …, 2005
Detecting anomalies from big network traffic data using an adaptive detection approach
J Zhang, H Li, Q Gao, H Wang, Y Luo
Information Sciences 318, 91-110, 2015
On efficient and robust anonymization for privacy protection on massive streaming categorical information
J Zhang, H Li, X Liu, Y Luo, F Chen, H Wang, L Chang
IEEE Transactions on Dependable and Secure Computing 14 (5), 507-520, 2015
A tourism destination recommender system using users’ sentiment and temporal dynamics
X Zheng, Y Luo, L Sun, J Zhang, F Chen
Journal of Intelligent Information Systems 51, 557-578, 2018
Secure two-party point-circle inclusion problem
YL Luo, LS Huang, H Zhong
Journal of Computer Science and Technology 22 (1), 88-91, 2007
A novel social network hybrid recommender system based on hypergraph topologic structure
X Zheng, Y Luo, L Sun, X Ding, J Zhang
World Wide Web 21, 985-1013, 2018
Coupling a fast fourier transformation with a machine learning ensemble model to support recommendations for heart disease patients in a telehealth environment
J Zhang, RL Lafta, X Tao, Y Li, F Chen, Y Luo, X Zhu
Ieee Access 5, 10674-10685, 2017
A secure protocol for determining whether a point is inside a convex polygon
L Yonglong, H Liusheng, Z Hong, C Guoliang
Chinese Journal of Electronics 15 (4), 578-582, 2006
罗永龙, 黄刘生, 荆巍巍, 徐维江
计算机研究与发展 43 (3), 410-416, 2006
Collaborative filtering recommendation based on trust and emotion
L Guo, J Liang, Y Zhu, Y Luo, L Sun, X Zheng
Journal of Intelligent Information Systems 53, 113-135, 2019
Outlier-eliminated k-means clustering algorithm based on differential privacy preservation
Q Yu, Y Luo, C Chen, X Ding
Applied Intelligence 45, 1179-1191, 2016
Privacy-preserving distance measurement and its applications
YL Luo, LS Huang, GL Chen, H Shen
Chinese Journal of Electronics 15 (2), 237-241, 2006
Privacy protection in the relative position determination for two spatial geometric objects.
Y Luo, L Huang, W Jing, W Xu
Jisuanji Yanjiu yu Fazhan(Computer Research and Development) 43 (3), 410-416, 2006
Research on sentiment classification of online travel review text
W Chen, Z Xu, X Zheng, Q Yu, Y Luo
Applied Sciences 10 (15), 5275, 2020
An infrastructure framework for privacy protection of community medical internet of things: Transmission protection, storage protection and access control
F Chen, Y Luo, J Zhang, J Zhu, Z Zhang, C Zhao, T Wang
World Wide Web 21, 33-57, 2018
Design of fast fault tolerant reversible signed multiplier
X Qi, F Chen, K Zuo, L Guo, Y Luo, M Hu
International Journal of the Physical Sciences 7 (17), 2506-2514, 2012
罗永龙, 黄刘生, 荆巍巍, 姚亦飞, 陈国良
电子学报 33 (5), 900, 2005
An algorithm for privacy-preserving Boolean association rule mining
YL Luo, LS Huang, WW Jing, YF Yao, GL Chen
ACTA ELECTONICA SINICA 33 (5), 900, 2005
Trajectory similarity clustering based on multi-feature distance measurement
Q Yu, Y Luo, C Chen, S Chen
Applied Intelligence 49, 2315-2338, 2019
The system can't perform the operation now. Try again later.
Articles 1–20