Internet of medical things privacy and security: Challenges, solutions, and future trends from a new perspective F Kamalov, B Pourghebleh, M Gheisari, Y Liu, S Moussa Sustainability 15 (4), 3317, 2023 | 68 | 2023 |
An IoT and machine learning‐based routing protocol for reconfigurable engineering application Y Natarajan, K Srihari, G Dhiman, S Chandragandhi, M Gheisari, Y Liu, ... IET Communications 16 (5), 464-475, 2022 | 67 | 2022 |
Deep learning: Applications, architectures, models, tools, and frameworks: A comprehensive survey M Gheisari, F Ebrahimzadeh, M Rahimi, M Moazzamigodarzi, Y Liu, ... CAAI Transactions on Intelligence Technology 8 (3), 581-606, 2023 | 64 | 2023 |
Exploring motion and appearance information for temporal sentence grounding D Liu, X Qu, P Zhou, Y Liu Proceedings of the AAAI Conference on Artificial Intelligence 36 (2), 1674-1682, 2022 | 36 | 2022 |
Privacy‐preserving targeted mobile advertising: requirements, design and a prototype implementation Y Liu, A Simpson Software: Practice and Experience 46 (12), 1657-1684, 2016 | 35 | 2016 |
An evolutionary study of IoT malware H Wang, W Zhang, H He, P Liu, DX Luo, Y Liu, J Jiang, Y Li, X Zhang, ... IEEE Internet of Things Journal 8 (20), 15422-15440, 2021 | 27 | 2021 |
An intelligent sustainable efficient transmission internet protocol to switch between User Datagram Protocol and Transmission Control Protocol in IoT computing S Mahmoodi Khaniabadi, A Javadpour, M Gheisari, W Zhang, Y Liu, ... Expert Systems 40 (5), e13129, 2023 | 22 | 2023 |
HFL-DP: Hierarchical federated learning with differential privacy L Shi, J Shu, W Zhang, Y Liu 2021 IEEE Global Communications Conference (GLOBECOM), 1-7, 2021 | 22 | 2021 |
Secure neural network in federated learning with model aggregation under multiple keys ZL Jiang, H Guo, Y Pan, Y Liu, X Wang, J Zhang 2021 8th IEEE International Conference on Cyber Security and Cloud Computing …, 2021 | 19 | 2021 |
Elliptic curve cryptographic image encryption using Henon map and Hopfield chaotic neural network P Parida, C Pradhan, JA Alzubi, A Javadpour, M Gheisari, Y Liu, CC Lee Multimedia Tools and Applications 82 (22), 33637-33662, 2023 | 18 | 2023 |
A dynamic SDN-based privacy-preserving approach for smart city using trust technique JA Alzubi, AA Movassagh, M Gheisari, HE Najafabadi, AA Abbasi, Y Liu, ... 2022 9th Iranian Joint Congress on Fuzzy and Intelligent Systems (CFIS), 1-5, 2022 | 15 | 2022 |
Delta-DNN: Efficiently compressing deep neural networks via exploiting floats similarity Z Hu, X Zou, W Xia, S Jin, D Tao, Y Liu, W Zhang, Z Zhang Proceedings of the 49th International Conference on Parallel Processing, 1-12, 2020 | 12 | 2020 |
RR-LADP: A privacy-enhanced federated learning scheme for internet of everything Z Li, Y Tian, W Zhang, Q Liao, Y Liu, X Du, M Guizani IEEE Consumer Electronics Magazine 10 (5), 93-101, 2021 | 11 | 2021 |
Identifying Influencing Factors of Road Accidents in Emerging Road Accident Blackspots K Athiappan, C Karthik, M Rajalaskshmi, C Subrata, HR Dastjerdi, Y Liu, ... Advances in Civil Engineering 2022, 2022 | 10 | 2022 |
A blockchain-based privacy-preserving recommendation mechanism L Lin, Y Tian, Y Liu 2021 IEEE 5th international conference on cryptography, security and privacy …, 2021 | 10 | 2021 |
A novel buffering fault‐tolerance approach for network on chip (NoC) N Jafarzadeh, A Jalili, JA Alzubi, K Rezaee, Y Liu, M Gheisari, ... IET Circuits, Devices & Systems 17 (4), 250-257, 2023 | 9 | 2023 |
Adversarial malware sample generation method based on the prototype of deep learning detector Y Qiao, W Zhang, Z Tian, LT Yang, Y Liu, M Alazab Computers & Security 119, 102762, 2022 | 9 | 2022 |
Collaborative detection of community structure in multiple private networks W Luo, B Duan, L Ni, Y Liu IEEE Transactions on Computational Social Systems 9 (2), 612-623, 2021 | 9 | 2021 |
Critical controlling for the network security and privacy based on blockchain technology: A fuzzy dematel approach F Kamalov, M Gheisari, Y Liu, MR Feylizadeh, S Moussa Sustainability 15 (13), 10068, 2023 | 8 | 2023 |
Adversarial ELF malware detection method using model interpretation Y Qiao, W Zhang, Z Tian, LT Yang, Y Liu, M Alazab IEEE Transactions on Industrial Informatics 19 (1), 605-615, 2022 | 8 | 2022 |