default search action
Liang Hu 0001
Person information
- affiliation (PhD 1999): Jilin University, College of Computer Science and Technology, Changchun, China
Other persons with the same name
- Liang Hu — disambiguation page
- Liang Hu 0002 — De Montfort University, School of Computer Science and Informatics, Leicester, UK (and 3 more)
- Liang Hu 0003 — Beijing Jiaotong University, School of Electronics and Information Engineering, China
- Liang Hu 0004 — Tongji University, Department of Computer Science, Shanghai, China (and 2 more)
- Liang Hu 0005 — Zhejiang University, State Key Laboratory of Fluid Power and Mechatronic Systems, Hangzhou, China
- Liang Hu 0006 — Aalborg University, Department of Electronic Systems, Denmark
- Liang Hu 0007 — Iowa State University, Department of Civil, Construction, and Environmental Engineering, Ames, IA, USA
- Liang Hu 0008 — Shanghai Jiao Tong University, Department of Electronic Engineering, China (and 2 more)
- Liang Hu 0009 — Beihang University, School of Biological Science and Medical Engineering, Beijing, China
- Liang Hu 0010 — Zhejiang University, State Key Laboratory of CAD&CG, Hangzhou, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j126]Shuai Li, Liang Hu, Chengyu Sun, Juncheng Hu, Hongtu Li:
Federated edge learning for medical image augmentation. Appl. Intell. 55(1): 56 (2025) - [j125]Qingqi Han, Zhanpeng Zhao, Liang Hu, Wanfu Gao:
Enhanced multi-label feature selection considering label-specific relevant information. Expert Syst. Appl. 264: 125819 (2025) - [j124]Pingting Hao, Wanfu Gao, Liang Hu:
Embedded feature fusion for multi-view multi-label feature selection. Pattern Recognit. 157: 110888 (2025) - 2024
- [j123]Haiou Huang, Bangyi Sun, Liang Hu:
A task offloading approach based on risk assessment to mitigate edge DDoS attacks. Comput. Secur. 140: 103789 (2024) - [j122]Gang Wu, Liang Hu, Xuelin Mao, Yongheng Xing, Feng Wang:
A data fusion framework based on heterogeneous information network embedding for trigger-action programming in IoT. Expert Syst. Appl. 235: 121065 (2024) - [j121]Yongheng Xing, Liang Hu, Xinqi Du, Zhiqi Shen, Juncheng Hu, Feng Wang:
A privacy-preserving federated graph learning framework for threat detection in IoT trigger-action programming. Expert Syst. Appl. 255: 124724 (2024) - [j120]Dongming Sun, Liang Hu, Gang Wu, Yongheng Xing, Juncheng Hu, Feng Wang:
Threat Detection in Trigger-Action Programming Rules of Smart Home With Heterogeneous Information Network Model. IEEE Internet Things J. 11(10): 18320-18334 (2024) - [j119]Yongheng Xing, Liang Hu, Xinqi Du, Zhiqi Shen, Juncheng Hu, Feng Wang:
CCDF-TAP: A Context-Aware Conflict Detection Framework for IoT Trigger-Action Programming With Graph Neural Network. IEEE Internet Things J. 11(19): 31534-31544 (2024) - [j118]Yonghao Li, Liang Hu, Wanfu Gao:
Multi-label feature selection with high-sparse personalized and low-redundancy shared common features. Inf. Process. Manag. 61(2): 103633 (2024) - [j117]Qingqi Han, Liang Hu, Wanfu Gao:
Feature relevance and redundancy coefficients for multi-view multi-label feature selection. Inf. Sci. 652: 119747 (2024) - [j116]Yang Wu, Yu Wang, Liang Hu, Juncheng Hu:
DCGNN: Adaptive deep graph convolution for heterophily graphs. Inf. Sci. 666: 120427 (2024) - [j115]Jiaxu Guo, Yushan Lai, Jinxiao Zhang, Juepeng Zheng, Haohuan Fu, Lin Gan, Liang Hu, Gaochao Xu, Xilong Che:
C³DA: A Universal Domain Adaptation Method for Scene Classification From Remote Sensing Imagery. IEEE Geosci. Remote. Sens. Lett. 21: 1-5 (2024) - [j114]Yu Wang, Liang Hu, Xiaofeng Cao, Yi Chang, Ivor W. Tsang:
Enhancing Locally Adaptive Smoothing of Graph Neural Networks Via Laplacian Node Disagreement. IEEE Trans. Knowl. Data Eng. 36(3): 1099-1112 (2024) - 2023
- [j113]Yang Wu, Liang Hu, Yu Wang:
Signed attention based graph neural network for graphs with heterophily. Neurocomputing 557: 126731 (2023) - [j112]Pingting Hao, Liang Hu, Wanfu Gao:
Partial multi-label feature selection via subspace optimization. Inf. Sci. 648: 119556 (2023) - [j111]Tuohang Li, Liang Hu, Hongtu Li, Chengyu Sun, Shuai Li, Ling Chi:
Towards unsupervised keyphrase extraction via an autoregressive approach. Knowl. Based Syst. 274: 110664 (2023) - [j110]Chengyu Sun, Liang Hu, Hongtu Li, Shuai Li, Tuohang Li, Ling Chi:
HAT-GAE: Self-supervised graph autoencoders with hierarchical adaptive masking and trainable corruption. Knowl. Based Syst. 279: 110920 (2023) - [j109]Yonghao Li, Liang Hu, Wanfu Gao:
Multi-label feature selection via robust flexible sparse regularization. Pattern Recognit. 134: 109074 (2023) - [j108]Yonghao Li, Liang Hu, Wanfu Gao:
Robust sparse and low-redundancy multi-label feature selection with dynamic local and global structure preservation. Pattern Recognit. 134: 109120 (2023) - [j107]Yu Wang, Liang Hu, Wanfu Gao, Xiaofeng Cao, Yi Chang:
AdaNS: Adaptive negative sampling for unsupervised graph representation learning. Pattern Recognit. 136: 109266 (2023) - [j106]Juncheng Hu, Gaochao Xu, Liang Hu, Shujing Li, Yang Xing:
An Adaptive Energy Efficient MAC Protocol for RF Energy Harvesting WBANs. IEEE Trans. Commun. 71(1): 473-484 (2023) - [j105]Wanfu Gao, Yonghao Li, Liang Hu:
Multilabel Feature Selection With Constrained Latent Structure Shared Term. IEEE Trans. Neural Networks Learn. Syst. 34(3): 1253-1262 (2023) - [j104]Tengfei Li, Jianfeng Chu, Liang Hu:
CIA: A Collaborative Integrity Auditing Scheme for Cloud Data With Multi-Replica on Multi-Cloud Storage Providers. IEEE Trans. Parallel Distributed Syst. 34(1): 154-162 (2023) - [c47]Yufeng Jin, Guosheng Hu, Haonan Chen, Duoqian Miao, Liang Hu, Cairong Zhao:
Cross-Modal Distillation for Speaker Recognition. AAAI 2023: 12977-12985 - 2022
- [j103]Yu Wang, Liang Hu, Yang Wu, Wanfu Gao:
Graph Multihead Attention Pooling with Self-Supervised Learning. Entropy 24(12): 1745 (2022) - [j102]Liang Hu, Lingbo Gao, Yonghao Li, Ping Zhang, Wanfu Gao:
Feature-specific mutual information variation for multi-label feature selection. Inf. Sci. 593: 449-471 (2022) - [j101]Yonghao Li, Liang Hu, Wanfu Gao:
Label correlations variation for robust multi-label feature selection. Inf. Sci. 609: 1075-1097 (2022) - [j100]Yiqiang Wang, Liang Hu, Lingbo Gao, Shuai Li, Hongtu Li:
Efficient reversible data hiding scheme based on prediction-error expansion and optimal parameters dynamic selection. J. Electronic Imaging 31(1) (2022) - [j99]Yongheng Xing, Liang Hu, Xiaolu Zhang, Gang Wu, Feng Wang:
Nonnegative Matrix Factorization Based Heterogeneous Graph Embedding Method for Trigger-Action Programming in IoT. IEEE Trans. Ind. Informatics 18(2): 1231-1239 (2022) - 2021
- [j98]Dongming Sun, Xiaolu Zhang, Kim-Kwang Raymond Choo, Liang Hu, Feng Wang:
NLP-based digital forensic investigation platform for online communications. Comput. Secur. 104: 102210 (2021) - [j97]Lingbo Gao, Yiqiang Wang, Yonghao Li, Ping Zhang, Liang Hu:
Multi-Label Feature Selection Combining Three Types of Conditional Relevance. Entropy 23(12): 1617 (2021) - [j96]Tuohang Li, Liang Hu, Hongtu Li, Chengyu Sun, Shuai Li, Ling Chi:
TripleRank: An unsupervised keyphrase extraction algorithm. Knowl. Based Syst. 219: 106846 (2021) - [j95]Yu Wang, Liang Hu, Wanfu Gao:
Learning flexible network representation via anonymous walks. Knowl. Based Syst. 222: 107021 (2021) - [j94]Ling Chi, Liang Hu:
ISKE: An unsupervised automatic keyphrase extraction approach using the iterated sentences based on graph method. Knowl. Based Syst. 223: 107014 (2021) - [j93]Shuai Li, Liang Hu, Chengyu Sun, Ling Chi, Hongtu Li:
Comparative assessment of PEE methods and new performance measurement for RDH. Multim. Tools Appl. 80(15): 23541-23560 (2021) - [j92]Wanfu Gao, Liang Hu, Yonghao Li, Ping Zhang:
Preserving Similarity and Staring Decisis for Feature Selection. IEEE Trans. Artif. Intell. 2(6): 584-593 (2021) - [j91]Zhenzhen Xie, Liang Hu, Yan Huang, Junjie Pang:
A Semiopportunistic Task Allocation Framework for Mobile Crowdsensing with Deep Learning. Wirel. Commun. Mob. Comput. 2021: 6643229:1-6643229:15 (2021) - 2020
- [j90]Tengfei Li, Huifeng Li, Liang Hu, Hongtu Li:
A Reversible Steganography Method With Statistical Features Maintained Based on the Difference Value. IEEE Access 8: 12845-12855 (2020) - [j89]Guohang Song, Liang Hu, Yuzhou Liu:
Common but Innovative: Learning Features From Apps in Different Domains. IEEE Access 8: 186904-186918 (2020) - [j88]Shuai Li, Liang Hu, Chengyu Sun, Ling Chi, Tuohang Li, Hongtu Li:
A Reversible Data Hiding Algorithm Based on Prediction Error With Large Amounts of Data Hiding in Spatial Domain. IEEE Access 8: 214732-214741 (2020) - [j87]Wanfu Gao, Liang Hu, Ping Zhang:
Feature redundancy term variation for mutual information-based feature selection. Appl. Intell. 50(4): 1272-1288 (2020) - [j86]Jingyan Jiang, Liang Hu:
Decentralised federated learning with adaptive partial gradient aggregation. CAAI Trans. Intell. Technol. 5(3): 230-236 (2020) - [j85]Liang Hu, Gang Wu, Yongheng Xing, Feng Wang:
Things2Vec: Semantic Modeling in the Internet of Things With Graph Representation Learning. IEEE Internet Things J. 7(3): 1939-1948 (2020) - [j84]Yeguang Li, Mingyuan Zhang, Liang Hu, Jun Li, Deqing Wang:
Candidate region correlation for video action detection. J. Vis. Commun. Image Represent. 71: 102818 (2020) - [j83]Liang Hu, Yonghao Li, Wanfu Gao, Ping Zhang, Juncheng Hu:
Multi-label feature selection with shared common mode. Pattern Recognit. 104: 107344 (2020) - [j82]Yicheng Yu, Liang Hu, Jianfeng Chu:
A Secure Authentication and Key Agreement Scheme for IoT-Based Cloud Computing Environment. Symmetry 12(1): 150 (2020) - [j81]Chengyu Sun, Liang Hu, Shuai Li, Tuohang Li, Hongtu Li, Ling Chi:
A Review of Unsupervised Keyphrase Extraction Methods Using Within-Collection Resources. Symmetry 12(11): 1864 (2020)
2010 – 2019
- 2019
- [j80]Liang Hu, Yanlei Gong, Yongheng Xing, Feng Wang:
Semantic Representation With Heterogeneous Information Network Using Matrix Factorization for Clustering in the Internet of Things. IEEE Access 7: 31233-31242 (2019) - [j79]Tengfei Li, Liang Hu, Jianfeng Chu, Hongtu Li, Ling Chi:
An Unsupervised Approach for Keyphrase Extraction Using Within-Collection Resources. IEEE Access 7: 126088-126097 (2019) - [j78]Haiou Huang, Liang Hu, Jianfeng Chu, Xiaochun Cheng:
An Authentication Scheme to Defend Against UDP DrDoS Attacks in 5G Networks. IEEE Access 7: 175970-175979 (2019) - [j77]Yeguang Li, Liang Hu, Ke Xia, Jie Luo:
Fast distributed video deduplication via locality-sensitive hashing with similarity ranking. EURASIP J. Image Video Process. 2019: 51 (2019) - [j76]Liang Hu, Yongheng Xing, Yanlei Gong, Kuo Zhao, Feng Wang:
Nonnegative matrix tri-factorization with user similarity for clustering in point-of-interest. Neurocomputing 363: 58-65 (2019) - [j75]Pingting Hao, Liang Hu, Jingyan Jiang, Xilong Che, Tong Li, Kuo Zhao:
Framework for replica placement over cooperative edge networks. J. Ambient Intell. Humaniz. Comput. 10(8): 3011-3021 (2019) - [j74]Pingting Hao, Liang Hu, Kuo Zhao, Jingyan Jiang, Tong Li, Xilong Che:
Dynamic pricing with traffic engineering for adaptive video streaming over software-defined content delivery networking. Multim. Tools Appl. 78(3): 3471-3492 (2019) - [j73]Jicheng Dai, Li Yan, Hua Liu, Changjun Chen, Liang Hu:
An Offline Coarse-To-Fine Precision Optimization Algorithm for 3D Laser SLAM Point Cloud. Remote. Sens. 11(20): 2352 (2019) - [j72]Pingting Hao, Liang Hu, Jingyan Jiang, Jiejun Hu, Xilong Che:
Mobile Edge Provision with Flexible Deployment. IEEE Trans. Serv. Comput. 12(5): 750-761 (2019) - [c46]Zelei Liu, Han Yu, Leye Wang, Liang Hu, Qiang Yang:
Ethically Aligned Mobilization of Community Effort to Reposition Shared Bikes. AAAI 2019: 9983-9984 - [c45]Zelei Liu, Han Yu, Leye Wang, Liang Hu, Qiang Yang:
Social Mobilization to Reposition Indiscriminately Parked Shareable Bikes. AAMAS 2019: 2099-2101 - 2018
- [j71]Zhenzhen Xie, Liang Hu, Kuo Zhao, Feng Wang, Junjie Pang:
Topology2Vec: Topology Representation Learning For Data Center Networking. IEEE Access 6: 33840-33848 (2018) - [j70]Jiejun Hu, Kun Yang, Liang Hu, Kezhi Wang:
Reward-Aided Sensing Task Execution in Mobile Crowdsensing Enabled by Energy Harvesting. IEEE Access 6: 37604-37614 (2018) - [j69]Pingting Hao, Liang Hu, Jingyan Jiang, Xilong Che:
A Stochastic Adjustment Strategy for Coordination Process in Distributed Networks. Comput. Informatics 37(5): 1184-1208 (2018) - [j68]Liang Hu, Wanfu Gao, Kuo Zhao, Ping Zhang, Feng Wang:
Feature selection considering two types of feature relevancy and feature interdependency. Expert Syst. Appl. 93: 423-434 (2018) - [j67]Wanfu Gao, Liang Hu, Ping Zhang, Feng Wang:
Feature selection by integrating two groups of feature evaluation criteria. Expert Syst. Appl. 110: 11-19 (2018) - [j66]Zelei Liu, Liang Hu, Chunyi Wu, Yan Ding, Quangang Wen, Jia Zhao:
A novel process-based association rule approach through maximal frequent itemsets for big data processing. Future Gener. Comput. Syst. 81: 414-424 (2018) - [j65]Feng Wang, Liang Hu, Rui Sun, Jiejun Hu, Kuo Zhao:
SRMCS: A semantic-aware recommendation framework for mobile crowd sensing. Inf. Sci. 433-434: 333-345 (2018) - [j64]Haiou Huang, Liang Hu, Jianfeng Chu:
Updated SSDP Scheme for DDoS Attack Defense. KSII Trans. Internet Inf. Syst. 12(9): 4599-4617 (2018) - [j63]Jingyan Jiang, Liang Hu, Pingting Hao, Rui Sun, Jiejun Hu, Hongtu Li:
Q-FDBA: improving QoE fairness for video streaming. Multim. Tools Appl. 77(9): 10787-10806 (2018) - [j62]Huifeng Li, Liang Hu, Jianfeng Chu, Ling Chi, Hongtu Li:
The maximum matching degree sifting algorithm for steganography pretreatment applied to IoT. Multim. Tools Appl. 77(14): 18203-18221 (2018) - [j61]Wanfu Gao, Liang Hu, Ping Zhang:
Class-specific mutual information variation for feature selection. Pattern Recognit. 79: 328-339 (2018) - [j60]Wanfu Gao, Liang Hu, Ping Zhang, Jialong He:
Feature selection considering the composition of feature relevancy. Pattern Recognit. Lett. 112: 70-74 (2018) - [c44]Wanfu Gao, Liang Hu, Ping Zhang:
Feature Selection by Maximizing Part Mutual Information. SPML 2018: 120-127 - 2017
- [j59]Liang Hu, Yu Wang, Zhenzhen Xie, Feng Wang:
Semantic Preference-Based Personalized Recommendation on Heterogeneous Information Network. IEEE Access 5: 19773-19781 (2017) - [j58]Jia Zhao, Shumao Ou, Liang Hu, Yan Ding, Gaochao Xu:
A heuristic placement selection approach of partitions of mobile applications in mobile cloud computing model based on community collaboration. Clust. Comput. 20(4): 3131-3146 (2017) - [j57]Yan Ding, Gaochao Xu, Chunyi Wu, Liang Hu, Yunan Zhai, Jia Zhao:
Explore virtual machine deployment to mobile cloud computing for multi-tenancy and energy conservation in wireless network. Clust. Comput. 20(4): 3263-3274 (2017) - [j56]Bangyi Sun, Jianfeng Chu, Liang Hu, Hongtu Li, Guangkun Shi:
A secure and effective scheme providing comprehensive forward security to LTE/SAE X2 handover key management. KSII Trans. Internet Inf. Syst. 11(9): 4609-4623 (2017) - [j55]Feng Wang, Liang Hu, Jin Zhou, Jiejun Hu, Kuo Zhao:
A semantics-based approach to multi-source heterogeneous information fusion in the internet of things. Soft Comput. 21(8): 2005-2013 (2017) - [j54]Fu Tao, Liang Hu, Xiaodi Yu, Jiejun Hu, Kuo Zhao:
Role-based intelligent application state computing for OpenFlow distributed controllers in software-defined networking. Soft Comput. 21(21): 6269-6277 (2017) - 2016
- [j53]Liang Hu, Xilong Che, Si-Qing Zheng:
A Closer Look at GPGPU. ACM Comput. Surv. 48(4): 60:1-60:20 (2016) - [j52]Zelei Liu, Liang Hu, Chunyi Wu, Yan Ding, Jia Zhao:
A novel trajectory similarity-based approach for location prediction. Int. J. Distributed Sens. Networks 12(11) (2016) - [j51]Liang Hu, Rui Sun, Feng Wang, Xiuhong Fei, Kuo Zhao:
A Stream Processing System for Multisource Heterogeneous Sensor Data. J. Sensors 2016: 4287834:1-4287834:8 (2016) - [j50]Feng Wang, Liang Hu, Jiejun Hu, Kuo Zhao:
Computer forensic analysis model for the reconstruction of chain of evidence of volatile memory data. Multim. Tools Appl. 75(16): 10097-10107 (2016) - [j49]Liang Hu, Yan Li, Tengfei Li, Hongtu Li, Jianfeng Chu:
The efficiency improved scheme for secure access control of digital video distribution. Multim. Tools Appl. 75(20): 12645-12662 (2016) - [j48]Jia Zhao, Kun Yang, Xiaohui Wei, Yan Ding, Liang Hu, Gaochao Xu:
A Heuristic Clustering-Based Task Deployment Approach for Load Balancing Using Bayes Theorem in Cloud Environment. IEEE Trans. Parallel Distributed Syst. 27(2): 305-316 (2016) - [c43]Ahmed Abdo Farhan Saif, Liang Hu:
Multi-pattern Matching Algorithm with Wildcards Based on Euclidean Distance and Hash Function. ICCSA (1) 2016: 334-344 - 2015
- [j47]Feng Wang, Liang Hu, Dongdai Zhou, Rui Sun, Jiejun Hu, Kuo Zhao:
Estimating online vacancies in real-time road traffic monitoring with traffic sensor data stream. Ad Hoc Networks 35: 3-13 (2015) - [j46]Feng Wang, Liang Hu, Jin Zhou, Kuo Zhao:
A Survey from the Perspective of Evolutionary Process in the Internet of Things. Int. J. Distributed Sens. Networks 11: 462752:1-462752:9 (2015) - [j45]Feng Wang, Liang Hu, Jin Zhou, Yang Wu, Jiejun Hu, Kuo Zhao:
Software Toolkits: Practical Aspects of the Internet of Things - A Survey. Int. J. Distributed Sens. Networks 11: 534378:1-534378:9 (2015) - [j44]Tong Liu, Liang Hu, Chao Ma, Zhi-Yan Wang, Hui-Ling Chen:
A fast approach for detection of erythemato-squamous diseases based on extreme learning machine with maximum relevance minimum redundancy feature selection. Int. J. Syst. Sci. 46(5): 919-931 (2015) - [j43]Tengfei Li, Liang Hu, Yan Li, Jianfeng Chu, Hongtu Li, Hongying Han:
The Research and Prospect of Secure Data Access Control in Cloud Storage Environment. J. Commun. 10(10): 753-759 (2015) - [j42]Liang Hu, Tengfei Li, Yan Li, Jianfeng Chu, Hongtu Li, Hongying Han:
The Research and Outlook for Keyword-Based Searchable Encryption in Cloud Storage. J. Commun. 10(10): 766-772 (2015) - [j41]Feng Wang, Liang Hu, Jin Zhou, Kuo Zhao:
A Data Processing Middleware Based on SOA for the Internet of Things. J. Sensors 2015: 827045:1-827045:8 (2015) - [c42]Liang Hu, Taihui Li, Nannan Xie, Jiejun Hu:
False positive elimination in intrusion detection based on clustering. FSKD 2015: 519-523 - [c41]Liang Hu, Zhen Zhang, Huanyu Tang, Nannan Xie:
An improved intrusion detection framework based on Artificial Neural Networks. ICNC 2015: 1115-1120 - [c40]Zhenzhen Xie, Liang Hu, Feng Wang, Jin Li, Kuo Zhao:
PEMM: A Privacy-Aware Data Aggregation Solution for Mobile Sensing Networks. ISICA 2015: 474-482 - 2014
- [j40]Chathura M. Sarathchandra Magurawalage, Kun Yang, Liang Hu, Jianming Zhang:
Energy-efficient and network-aware offloading algorithm for mobile cloud computing. Comput. Networks 74: 22-33 (2014) - [j39]Ling Chi, Liang Hu, Hongtu Li, Jianfeng Chu:
Analysis and Improvement of a Robust User Authentication Framework for Ubiquitous Sensor Networks. Int. J. Distributed Sens. Networks 10 (2014) - [j38]Xiaolu Zhang, Liang Hu, Shinan Song, Zhenzhen Xie, Xiangyu Meng, Kuo Zhao:
Windows Volatile Memory Forensics Based on Correlation Analysis. J. Networks 9(3): 645-652 (2014) - [j37]Liang Hu, Bofeng Liu, Kuo Zhao, Xiangyu Meng, Feng Wang:
Research and Implementation of the Localization Algorithm Based on RSSI Technology. J. Networks 9(11): 3135-3142 (2014) - 2013
- [j36]Jia Zhao, Liang Hu, Gaochao Xu, Yan Ding, Jianfeng Chu:
A Survey on Green Computing Based on Cloud Environment. Int. J. Online Eng. 9(3): 27-33 (2013) - [j35]Xiaobo Yan, Feng Wang, Liang Hu, Kuo Zhao, Weiqing Xiong:
Application-oriented Network Performance Evaluation for the Internet of Things. Int. J. Online Biomed. Eng. 9(S7): 51-56 (2013) - [j34]Kuo Zhao, Longhe Huang, Hongtu Li, Fangming Wu, Jianfeng Chu, Liang Hu:
A Survey on Key Management of Identity-based Schemes in Mobile Ad Hoc Networks. J. Commun. 8(11): 768-779 (2013) - [j33]Weiwu Ren, Liang Hu, Kuo Zhao, Jianfeng Chu, Bing Jia:
Intrusion Classifier based on Multiple Attribute Selection Algorithms. J. Comput. 8(10): 2536-2543 (2013) - [j32]Yuan Wang, Liang Hu, Jian Feng Chu, Xiao Bo Xu:
Analysis and Improvement for SPINS. J. Networks 8(1): 229-236 (2013) - [j31]Weiwu Ren, Liang Hu, Kuo Zhao, Jianfeng Chu:
An Efficient Parallel Anomaly Detection Algorithm Based on Hierarchical Clustering. J. Networks 8(3): 672-679 (2013) - [j30]Zhejun Kuang, Liang Hu, Chen Zhang:
Research on Human Sensory Architecture for Cyber Physical Systems. J. Networks 8(9): 1936-1942 (2013) - [j29]Xiaolu Zhang, Liang Hu, Shinan Song, Zhenzhen Xie, Xiangyu Meng, Kuo Zhao:
An Intelligent Analysis Model for Multisource Volatile Memory. J. Networks 8(9): 1943-1949 (2013) - [j28]Liang Hu, Shinan Song, Xiaolu Zhang, Zhenzhen Xie, Xiangyu Meng, Kuo Zhao:
Analyzing Malware Based on Volatile Memory. J. Networks 8(11): 2512-2519 (2013) - [j27]Zhejun Kuang, Liang Hu, Chen Zhang:
Research on Human Sensory Architecture for Cyber Physical Systems. J. Networks 8(11): 2692-2698 (2013) - [j26]Xiaolu Zhang, Liang Hu, Shinan Song, Zhenzhen Xie, Xiangyu Meng, Kuo Zhao:
An Intelligent Analysis Model for Multisource Volatile Memory. J. Networks 8(11): 2699-2705 (2013) - [j25]Liang Hu, Jingyan Jiang, Jin Zhou, Kuo Zhao, Liang Chen, Huimin Lu:
Environment Observation System based on Semantics in the Internet of Things. J. Networks 8(12): 2721-2727 (2013) - [j24]Wei Yuan, Liang Hu, Hongtu Li, Jianfeng Chu:
Secure event signature protocol for peer-to-peer massive multiplayer online games using bilinear pairing. Secur. Commun. Networks 6(7): 881-888 (2013) - [c39]Wei Yuan, Liang Hu, Kun Yang:
A topology hidden anonymous multicast routing for ad hoc networks. GLOBECOM 2013: 599-604 - [c38]Decheng Chang, Gaochao Xu, Liang Hu, Kun Yang:
A network-aware virtual machine placement algorithm in mobile cloud computing environment. WCNC Workshops 2013: 117-122 - 2012
- [j23]Lei Liu, Feng Yang, Peng Zhang, Jing-Yi Wu, Liang Hu:
SVM-based ontology matching approach. Int. J. Autom. Comput. 9(3): 306-314 (2012) - [j22]Kun Yang, Xueqi Cheng, Liang Hu, Jianming Zhang:
Mobile social networks: state-of-the-art and a new vision. Int. J. Commun. Syst. 25(10): 1245-1259 (2012) - [j21]Liang Hu, Meng Zhang, Yi Zhang, Jijun Tang:
Label-Guided Graph Exploration with Adjustable Ratio of Labels. Int. J. Found. Comput. Sci. 23(4): 903-930 (2012) - [j20]Liang Hu, Ling Chi, Hongtu Li, Wei Yuan, Yuyu Sun, Jianfeng Chu:
The Classic Security Application in M2M: the Authentication Scheme of Mobile Payment. KSII Trans. Internet Inf. Syst. 6(1): 131-146 (2012) - [j19]Wei Yuan, Liang Hu, Hongtu Li, Jianfeng Chu, Yuyu Sun:
Analysis and Enhancement of Three Identity-based Signcryption Protocols. J. Comput. 7(4): 1006-1013 (2012) - [j18]Wei Yuan, Liang Hu, Hongtu Li, Jianfeng Chu, Hui Wang:
Cryptanalysis and Improvement of an ID-Based Threshold Signcryption Scheme. J. Comput. 7(6): 1345-1352 (2012) - [j17]Liang Hu, Jia Zhao, Gaochao Xu, Yan Ding, Jianfeng Chu:
A Survey on Data Migration Management in Cloud Environment. J. Digit. Inf. Manag. 10(5): 324-331 (2012) - [j16]Wei Yuan, Liang Hu, Hongtu Li, Jianfeng Chu, Yuyu Sun:
Cryptanalysis of Three Event Signature Protocols for Peer-to-peer Massively Multiplayer Online Games. J. Networks 7(3): 510-516 (2012) - [j15]Wei Yuan, Liang Hu, Hongtu Li, Jianfeng Chu, Yuyu Sun:
An Improved Dynamic Password based Group Key Agreement against Dictionary Attack. J. Softw. 7(7): 1524-1530 (2012) - [j14]Liang Hu, Wenbo Wang, Feng Wang, Xiaolu Zhang, Kuo Zhao:
The Design and Implementation of Composite Collaborative Filtering Algorithm for Personalized Recommendation. J. Softw. 7(9): 2040-2045 (2012) - [j13]Jian Zhao, Lei Liu, Liang Hu:
Extended representation of the conceptual element in temporal context and the diachronism of the knowledge system. Knowl. Based Syst. 33: 136-144 (2012) - [j12]Liang Hu, Lin Lin, Jia Zhao, Xilong Che, Xiaohui Wei:
Optimisation to the execution performance of grid job based on distributed file system. Int. J. Parallel Emergent Distributed Syst. 27(2): 109-121 (2012) - [j11]Liang Hu, Xilong Che, Si-Qing Zheng:
Online System for Grid Resource Monitoring and Machine Learning-Based Prediction. IEEE Trans. Parallel Distributed Syst. 23(1): 134-145 (2012) - [c37]Guopeng Zhang, Kun Yang, Yan-Jun Hu, Xiao-Ji Li, Liang Hu:
Fair and efficient spectrum splitting for cooperative cognitive radio networks. GLOBECOM 2012: 4916-4920 - [c36]Liang Hu, Nannan Xie, Zhejun Kuang, Kuo Zhao:
Review of Cyber-Physical System Architecture. ISORC Workshops 2012: 25-30 - [c35]Nurbol Luktarhan, Xue Jia, Liang Hu, Nannan Xie:
Multi-stage Attack Detection Algorithm Based on Hidden Markov Model. WISM 2012: 275-282 - 2011
- [j10]Meng Zhang, Liang Hu, Yi Zhang:
Weighted Automata for Full-Text Indexing. Int. J. Found. Comput. Sci. 22(4): 921-943 (2011) - [j9]Wei Yuan, Liang Hu, Hongtu Li, Jianfeng Chu, Yuyu Sun:
Cryptanalysis and Improvement of Selvi et al.'s Identity-Based Threshold Signcryption Scheme. J. Networks 6(11): 1557-1564 (2011) - [j8]Wei Yuan, Liang Hu, Hongtu Li, Jianfeng Chu, Yuyu Sun:
Enhancement of an Authenticated 3-round Identity-Based Group Key Agreement Protocol. J. Networks 6(11): 1578-1585 (2011) - [j7]Huimin Lu, Liang Hu, Gang Liu:
Study on Visual Knowledge Structure Reasoning. J. Softw. 6(5): 783-790 (2011) - [c34]Nannan Xie, Liang Hu, Nurbol Luktarhan, Kuo Zhao:
A Classification of Cluster Validity Indexes Based on Membership Degree and Applications. WISM (1) 2011: 43-50 - [c33]Xiaolong Bai, Liang Hu, Zixing Song, Feiyan Chen, Kuo Zhao:
Defense against DNS Man-In-The-Middle Spoofing. WISM (1) 2011: 312-319 - [c32]Dong Guo, Yong Du, Qiang Li, Liang Hu:
Design and Realization of the Cloud Data Backup System Based on HDFS. WISM (3) 2011: 396-403 - 2010
- [j6]Liang Hu, Xilong Che, Xiaochun Cheng:
Bandwidth Prediction based on Nu-Support Vector Regression and Parallel Hybrid Particle Swarm Optimization. Int. J. Comput. Intell. Syst. 3(1): 70-83 (2010) - [j5]Liang Hu, Xiaochun Cheng, Xilong Che:
Survey of Grid Resource Monitoring and Prediction Strategies. Int. J. Intell. Inf. Process. 1(2): 78-85 (2010) - [j4]Meng Zhang, Yi Zhang, Liang Hu:
A faster algorithm for matching a set of patterns with variable length don't cares. Inf. Process. Lett. 110(6): 216-220 (2010) - [j3]Meng Zhang, Yi Zhang, Liang Hu:
Pattern matching with wildcards using words of shorter length. Inf. Process. Lett. 110(24): 1099-1102 (2010) - [j2]Liang Hu, Kuo Tang, Yu Ku, Kuo Zhao:
Improvement on Intrusion Detection Technology Based on Protocol Analysis and Pattern Matching. J. Convergence Inf. Technol. 5(3): 86-94 (2010) - [j1]Liang Hu, Zheli Liu, Xiaochun Cheng:
Efficient Identity-based Broadcast Encryption without Random Oracles. J. Comput. 5(3): 331-336 (2010) - [c31]Liang Hu, Lin Lin, Jia Zhao:
Research on Performance Optimization for Grid Application Using Distributed File System. FCST 2010: 3-8 - [c30]Kexin Yang, Liang Hu, Ning Zhang, Yan-mei Huo, Kuo Zhao:
Improving the Defence against Web Server Fingerprinting by Eliminating Compliance Variation. FCST 2010: 227-232 - [c29]Liang Hu, Hongtu Li, Jianfen Chu, Hongwei Li, Wei Yan:
Registration and Private Key Distribution Protocol Based on IBE. FCST 2010: 420-423 - [c28]Guosheng Hu, Liang Hu, Jing Song, Pengchao Li, Xilong Che, Hongwei Li:
Support Vector Regression and Ant Colony Optimization for Grid Resources Prediction. ISNN (2) 2010: 1-8 - [c27]Guosheng Hu, Liang Hu, Qinghai Bai, Guangyu Zhao, Hongwei Li:
Genetic Algorithms with Improved Simulated Binary Crossover and Support Vector Regression for Grid Resources Prediction. ISNN (2) 2010: 60-67
2000 – 2009
- 2009
- [c26]Meng Zhang, Yi Zhang, Liang Hu, Peichen Xin:
On the Structure of Consistent Partitions of Substring Set of a Word. FAW 2009: 326-335 - [c25]Liang Hu, Guosheng Hu, Kuo Tang, Xilong Che:
Grid Resource Prediction Based on Support Vector Regression and Genetic Algorithms. ICNC (1) 2009: 499-505 - [c24]Fei Ren, Hao Liang, Liang Hu, Wanli Zuo:
The Ontology Based Semantic Evaluating Method in LAV. PACCS 2009: 167-170 - 2008
- [c23]Fei Ren, Liang Hu, Hao Liang, Xiaobo Liu, Weiwu Ren:
Using Density-Based Incremental Clustering for Anomaly Detection. CSSE (3) 2008: 986-989 - [c22]Liang Hu, Xilong Che:
Design and Implementation of Bandwidth Prediction Based on Grid Service. HPCC 2008: 45-52 - [c21]Liang Hu, Dong Guo, Xilong Che:
A Fast Resource Selection Approach for Grid Applications Based on Fuzzy Clustering Technology. HPCC 2008: 1019-1024 - [c20]Meng Zhang, Yi Zhang, Kuo Zhao, Liang Hu:
Automata for Weak Factor Recognition. ICYCS 2008: 1771-1776 - [c19]Xilong Che, Liang Hu:
Parallel Multidimensional Step search algorithm for epsilon-insensitive support vector regression in time series prediction. IJCNN 2008: 595-601 - 2007
- [c18]Yan-mei Huo, Kuo Tang, Liang Hu, Kexin Yang, Jiubin Ju:
A Reliable Data Management Method for Parallel File System. CIT 2007: 328-332 - [c17]Dong Guo, Liang Hu, Shilan Jin, Bingxin Guo:
Applying Preference-Based Fuzzy Clustering Technology to Improve Grid Resources Selection Performance. FSKD (2) 2007: 214-218 - [c16]Shumao Ou, Kun Yang, Liang Hu:
CRoSS: A Combined Routing and Surrogate Selection Algorithm for Pervasive Service Offloading in Mobile Ad Hoc Environments. GLOBECOM 2007: 720-725 - [c15]Shumao Ou, Kun Yang, Antonio Liotta, Liang Hu:
Performance Analysis of Offloading Systems in Mobile Wireless Environments. ICC 2007: 1821-1826 - [c14]Kuo Zhao, Meng Zhang, Kexin Yang, Liang Hu:
Data Collection for Intrusion Detection System Based on Stratified Random Sampling. ICNSC 2007: 852-855 - 2006
- [c13]Liang Hu, Kuo Tang, Kuo Zhao, Dong Guo, Bing Liang:
Extended Resource Information Services Based-on Directory Service Technology. CSCWD 2006: 905-909 - [c12]Guannan Gong, Liang Hu, Kuo Zhao, Jinxin He, Yuefeng Xu, Ying Duan:
SPS-VN: Research on the Security Policy System for Virtual Network. Security and Management 2006: 44-47 - [c11]Kuo Zhao, Liang Hu, Guannan Gong, Meng Zhang, Kexin Yang:
Comparison of Two Sampling-Based Data Collection Mechanisms for Intrusion Detection System. Security and Management 2006: 261-265 - [c10]Yan-mei Huo, Jiubin Ju, Liang Hu:
UFCR: An Efficient I/O Method for Parallel File System. PDCAT 2006: 223-228 - [c9]Meng Zhang, Jijun Tang, Dong Guo, Liang Hu, Qiang Li:
Succinct Text Indexes on Large Alphabet. TAMC 2006: 528-537 - 2005
- [c8]Meng Zhang, Liang Hu, Qiang Li, Jiubin Ju:
Weighted Directed Word Graph. CPM 2005: 156-167 - [c7]Xiaohui Wei, Wilfred W. Li, Osamu Tatebe, Gaochao Xu, Liang Hu, Jiubin Ju:
Implementing Data Aware Scheduling In Gfarm(R) Using LSF(TM) Scheduler plugin Mechanism. GCA 2005: 3-10 - [c6]Xiu-chuan Wu, Li-jie Sha, Dong Guo, Lan-fang Lou, Liang Hu:
GT-Based Performance Improving for Resource Management of Computational Grid. GCC 2005: 1072-1077 - [c5]Yan-mei Huo, Jiubin Ju, Liang Hu:
RRBS: A Fault Tolerance Model for Cluster/Grid Parallel File System. ISPA 2005: 180-187 - [c4]Xiaohui Wei, Wilfred W. Li, Osamu Tatebe, Gaochao Xu, Liang Hu, Jiubin Ju:
Integrating Local Job Scheduler - LSFTM with GfarmTM. ISPA 2005: 196-204 - [c3]Qiang Li, Qinyuan Feng, Liang Hu, Jiubin Ju:
Fast Two Phrases PPM for IP Traceback. PDCAT 2005: 386-389 - [c2]Liang Hu, Dong Guo, Gaochao Xu, Xiaohui Wei, Bingxin Guo, Kuo Tang, Shengli Zhao:
A Grid CPU Availability Forecasting Tool for Windows. IASTED PDCS 2005: 25-30 - [c1]Dong Guo, Liang Hu, Meng Zhang, Zhuopeng Zhang:
GcpSensor: a CPU Performance Tool for Grid Environments. QSIC 2005: 273-278
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 19:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint