Journal
- Shaojie Yang, Shanxi Li, Wenbo Chen, Yuhong Liu, “A Real-Time and Adaptive-Learning Malware Detection Method Based on API-Pair Graph”, IEEE Access, accepted. (IF: 3.745)
- Xiao Yue, Peng Zhang, Yuhong Liu, “Secure and Efficient Multi-Signature Schemes for Fabric: An Enterprise Blockchain Platform”, IEEE Transactions on Information Forensics and Security, accepted. (IF: 6.013)
- C. Wang, J. Jiang, T. Roth, C. Nguyen, Y. Liu, and H. Lee, “Integrated Sensor Data Processing for Occupancy Detection in Residential Buildings”, submitted to Energy and Buildings, Elsevier (IF: 4.495)
- Zhigang Jin, Xiaofang Zhao, Yuhong Liu,“Heterogeneous Graph Network Embedding for Sentiment Analysis on Social Media”, Cognitive Computing, Springer, 2020, accepted (IF: 4.98)
- Bhagyashri Tushir, Yogesh Dalal, Behnam Dezfouli, Yuhong Liu, “A Quantitative Study of DDoS and E-DDoS Attacks on WiFi Smart Home Devices”, IEEE Internet of Things Journal, 2020, accepted (IF: 11.75).
- Zhigang Jin, Yang Yang, Yuhong Liu, “Stock Closing Price Prediction Based on Sentiment Analysis and LSTM”, Neural Computing and Applications, DOI: 10.1007/s00521-019-04504-2 (IF: 4.213).*
- Oleksii Rudenko, Yuhong Liu, Chenwei Wang, Susanto Rahardja, "An Extensive Game Based Resource Allocation for Securing D2D Underlay Communications", IEEE Access, 2019 Mar 18; 7:43052-62. (IF: 4.098). *
- Yue Han, Yuhong Liu, Zhigang Jin, "Sentiment Analysis via Semi-Supervised Learning: A Model based on Dynamic Threshold and Multi-classifiers", Neural Computing and Applications, Springer, pp.1-13 (IF: 4.213).*
- Shufang Zhang, Beibei Huang, Xiangming Song, Tao Zhang, Hanjie Wang, Yuhong Liu, “A high storage density strategy for digital information based on synthetic DNA”, 3 Biotech, 2019 Sep 1; 9(9):342. (IF: 1.786). *
- Zigang Chen, Lixiang Li, Haipeng Peng, Yuhong Liu, Haihua Zhu, Yixian Yang, “Sparse general non-negative matrix factorization based on left semi-tensor product”, IEEE Access, 2019 Jun 20; 7:81599-611. (IF: 4.098). *
- Yuhong Liu, Yue Han, Kirk Iserman, Zigang Jin, “Minimizing Required User Effort for Cold-Start Recommendation by Identifying the Most Important Latent Factors”, IEEE Access, 2018; 6:71846-56 (IF: 4.098). *
- Yuhong Liu, Na Li, “Retrieving Hidden Friends: A Collusion Privacy Attack Against Online Friend Search Engine”, IEEE Transactions on Information Forensics and Security, 2019 Apr; 14(4):833-47. (IF: 5.824)*
- Vishnu Pendyala, Yuhong Liu, Silvia Figueira, “A Framework for Detecting Injected Influence Attacks on Microblog Websites Using Change Detection Techniques”, Development Engineering, 2018, Jan 1; 3:218-33.*
- Zigang Chen, Lixiang Li, Haipeng Peng, Yuhong Liu, Yixian Yang, “Incremental General Non-negative Matrix Factorization without Dimension Matching Constraints”, Neurocomputing, Elsevier, 2018 Oct 15;311:344-52. (IF: 4.072)*
- Ziyang Zhang, Yuhong Liu, Zhigang Jin, Rui Zhang, “A Dynamic Trust based Two-layer Neighbor Selection Scheme towards Online Recommender Systems”, Neurocomputing 285, pp.94-103., 2018, Elsevier (IF: 4.072)*
- Zigang Chen, Lixiang Li, Haipeng Peng, Yuhong Liu, Yixian Yang, “A novel digital watermarking based on General non-negative matrix factorization”, IEEE Transactions on Multimedia, 2018 (IF: 5.452).*
- Zigang Chen, Lixiang Li, Haipeng Peng, Yuhong Liu, Yixian Yang, “Attributed community mining using joint general non-negative matrix factorization with graph Laplacian”, Physica A: Statistical Mechanics and its Applications, Volume 495, 1 April 2018, Pages 324-335. (IF: 2.243)*
- Yuhong Liu, Wenqi Zhou and Hong Chen, “Efficiently Promoting Product Online Outcome: An Iterative Rating Attack Utilizing Product and Market Property”, IEEE Transactions on Information Forensics and Security, vol.12, issue 6, 2017. (IF: 5.824) *
- Syed Rizvi, Jungwoo Ryoo, John Kissell, Bill Aiken, Yuhong Liu, "A security evaluation framework for cloud security auditing", The Journal of Supercomputing, 2017, 1-23. (IF: 1.326)*
- Yuhong Liu, Jungwoo Ryoo, Syed Rizvi, Yan (Lindsay) Sun, Thanos Vasilakos, "A Survey of Security and Privacy Challenges in Cloud Computing: Solutions and Future Research Directions", Journal of Computing Science and Engineering (JCSE), Vol. 9, No. 3, pp. 119-133, September 2015.*
- Wenqi Zhou, Yuhong Liu, "Online Product Rating Manipulation and Market Performance", IEEE Computer, 48 (5), pp. 72-75, 2015. (IF: 1.755)
- Yuhong Liu, Yan (Lindsay) Sun, “Securing Digital Reputation in Online Social Media”, IEEE Signal Processing Magazine, vol.31, no.1, pp.149,155, Jan. 2014. (IF: 9.654)
- Yuhong Liu, Yan (Lindsay) Sun, Siyuan Liu, Alex C. Kot, “Securing Online Reputation Systems through Trust Modeling and Temporal Analysis”, IEEE transactions on Information Forensics and Security, Special Issue on Privacy and Trust Management in Cloud and Distributed Systems, vol.8, no.6, pp. 936-948, June 2013
- Yan (Lindsay) Sun, Yuhong Liu, “Security of Online Reputation Systems: Evolution of Attacks and Defenses”, Signal Processing Magazine, Special Issue On Signal and Information Processing for Social Learning and Networking, Vol. 29, No. 2, pp. 87-97, March 2012. (IF: 9.654)
- Xiaorong Zhang, Yuhong Liu, Fan Zhang, Jin Ren, Yan (Lindsay) Sun, He Huang, Qing Yang, “On Design and Implementation of Neural-Machine Interface for Artificial Legs”, IEEE Transactions on Industrial Informatics, Vol. 8, No. 2, pp. 418-429, May 2012. (IF: 6.764)
- Makeyev O., Liu X., Luna-Munguía H., Rogel-Salazar G., Mucio-Ramirez S., Liu Y., Sun Y., Hadidi R., Kay S., Besio W., Toward an automatic seizure control system in rats through transcranial focal stimulation via tripolar concentric ring electrodes, Epilepsy Currents, Vol. 12, Issues1, January/February 2012, pp. 29-30
Conference
- Madhuri Ghorpade, Haiquan Chen, Yuhong Liu, Zhe Jiang, “SMART: Emerging Activity Recognition with Limited Data for Multi-modal Wearable Sensing”, 2020 IEEE International Conference on Big Data (IEEE BigData 2020), December 10 – 13, 2020.
- Wang, J. Jiang, T. Roth, C. Nguyen, Y. Liu, and H. Lee, “Integrated Sensor Data Processing for Occupancy Detection in Residential Buildings”, presentation only, The 14th International Conference on Energy Sustainability, June 2020, American Society of Mechanical Engineers
- Brandon Tsao, Yuhong Liu, Behnam Dezfouli, “Analysis of the Duration and Energy Consumption of AES Algorithms on a Contiki-based IoT Device”, The 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous 2019), Nov. 12-14, 2019, Houston, United States*
- Gabriel Jerome Solomon, Peng Zhang, Yuhong Liu, Rachael Brooks, “Blockchain based Owner-Controlled Secure Software Updates for Resource-Constrained IoT”, The 13th International Conference on Network and System Security (NSS), Sapporo, Japan, 15-18, December 2019
- Ramzi Nofal, Nam Tran, Carlos Garcia, Yuhong Liu, Behnam Dezfouli, “A Comprehensive Empirical Analysis of TLS Handshake and Record Layer on IoT Platforms”, The 22nd ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWIM 2019), acceptance rate 29% *
- Hanlin Mou, Yuhong Liu, Li Wang, “LSTM for Mobility Based Content Popularity Prediction in Wireless Caching Networks”, IEEE GLOBECOM 2019 Workshop on Wireless Edge Intelligence, Waikoloa, Hawaii, 2019 *
- Chuxin Wu, Peng Zhang, Hongwei Liu, Yuhong Liu, “Multi-keyword Ranked Searchable Encryption Supporting CP-ABE Test”, The Computing, Communications and IoT Applications Conference (ComComAp2019), Shenzhen University, Shenzhen, China, October 26-28, 2019.*
- Kavin Kamaraj, Behnam Dezfouli, Yuhong Liu, “Edge Mining on IoT Devices Using Anomaly Detection”, Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), Lan Zhou, China, Nov. 18-21, 2019.*
- Lin Zhang, Yuhong Liu, “Modeling the Views of WeChat Articles by Branching Processes”, Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), Lan Zhou, China, Nov. 18-21, 2019.*
- Shangqi Lai, Xingliang Yuan, Shi-Feng Zhang, Joseph K. Liu, Yuhong Liu, Dongxi Liu “GraphSE^2: An Encrypted Graph Database for Privacy-Preserving Social Search”, The 14th ACM Asia Conference on Information, Computer and Communications Security (ASIACCS 2019), acceptance rate 18%*
- Shanxi Li, Qingguo Zhou, Zhifeng Chen, Yuhong Liu, Nam Ling, "A Linear Model for YUV 4:2:0 Chroma Intra Prediction," IEEE ISCAS 2019.
- Na Li, Lin Li, Yuhong Liu, "FriPEL: Friendship Privacy Educational Labware", the 4th IEEE International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec 2018), Santa Clara, CA, U.S.A., 10-11 Dec. 2018.
- Zigang Chen, Lixiang Li, Haipeng Peng, Yuhong Liu, Haihua Zhu, Yixian Yang, "An evaluation method of image scrambling degree based on pixel distribution", the 4th IEEE International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec 2018), Santa Clara, CA, U.S.A., 10-11 Dec. 2018.
- Jun Jiang, Yuhong Liu, Behnam Dezfouli, “A Root-based Defense Mechanism Against RPL Blackhole Attacks in Internet of Things Networks”, Asia Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), Hawaii, U.S.A., Nov. 12-15, 2018.
- Pedro Sanchez Munoz, Nam Tran, Brandon Craig, Behnam Dezfouli, Yuhong Liu, “Energy and Time Evaluation of AES Encryption using IoT Devices”, Asia Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), Hawaii, U.S.A., Nov. 12-15, 2018.
- Bhagyashri Tushir, Hetesh Sehgal, Rohan Nair, Behnam Dezfouli, Yuhong Liu, “The Impact of DoS Attacks on Resource-constrained IoT Devices: A Study on the Mirai Attack”, The 11th International Conference on Ubi-Media Computing (UMEDIA 2018), Nanjing, China, August 22-25, 2018.
- Alejandro Hernandez Gerez, Kavin Kamaraj, Ramzi Nofal, Yuhong Liu, Behnam Dezfouli, “Energy and Processing Demand Analysis of TLS Protocol in Internet of Things Applications”, IEEE International Workshop on Signal Processing Systems (SiPS 2018), Cape Town, South Africa, October 21-24, 2018
- Xunfei Jiang, Yuhong Liu, Xiaojun Ruan, Tuguldur Baigalmaa, Lam Nguyen, Daiki Akiyoshi, Charles Peck, “Energy Modeling of Cluster Systems”, IEEE International Workshop on Signal Processing Systems (SiPS 2018), Cape Town, South Africa, October 21-24, 2
- Yuhong Liu, Xiaojun Ruan, Songjie Cai, Ruiwei Li, Hanxiao He, “An optimized VM Allocation Strategy to Make a Secure and Energy-Efficient Cloud Against Co-residence Attack”, International Conference on Computing, Networking and Communications (ICNC 2018), Maui, Hawaii, USA, March 5-8, 2018
- Kirk Iserman, Yuhong Liu, “ Preference Elicitation in Recommender Systems using Matrix Factorization with Non-Personalized and Personalized Steps”, the 51st Asilomar Conference on Signals, Systems and Computers, Pacific Grove, California, October 29 - November 1, 2017
- Yuhong Liu, Wenqi Zhou, “A Novel Iterative Online Rating Attack based on Market Self-exciting Property”, The 42nd IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP’17), New Orleans, USA, March 5-9th, 2017
- Ziyang Zhang, Yuhong Liu, Zhigang Jin and Rui Zhang, “Selecting Influential and Trustworthy Neighbors for Collaborative Filtering Recommender Systems”, The 7th IEEE Annual Computing and Communication Workshop and Conference (CCWC’17), Las Vegas, USA, Jan. 9 – 11th, 2017
- Manav Jaiswal, Yuhong Liu and Nam Ling, "Design and Implementation of a Greener Home Automation System", The 9th International Conference on Ubi-Media Computing (UMEDIA 2016), to be held in Moscow, Russia, August 15-17, 2016
- Yuhong Liu, Na Li, "An Advanced Collusion Attack against User Friendship Privacy in OSNs", The 40th IEEE Computer Society International Conference on Computers, Software & Applications, Atlanta, Georgia, USA - June 10-14, 2016
- Yuhong Liu, Wenqi Zhou, "Can You Really Make Profit from Online Rating Manipulations?: An Empirical Study", The 40th IEEE Computer Society International Conference on Computers, Software & Applications, Atlanta, Georgia, USA - June 10-14, 2016
- Sai Samrat Malka, Na Li, Venu Madhavi Doddapaneni, Yuhong Liu, Anil Kumar Pamulapati, "A Web Application For Studying Collusion Attacks Through Friend Search Engine", STPSA: The 11th IEEE International Workshop on Security, Trust and Privacy for Software Applications, Atlanta, Georgia, USA - June 10-14, 2016
- Yuhong Liu, Jungwoo Ryoo, Syed Rizvi, "Ensuring Data Confidentiality in Cloud Computing: An Encryption and Trust-based Solution", IEEE 2014 23rd Wireless and Optical Communication Conference, NJIT, Newark, New Jersey, U.S.A., May 9th -10th, 2014
- Syed Rizvi, Jungwoo Ryoo, Yuhong Liu, Dustin Zazworsky, and Anthony Cappeta, "A centralized trust model approach for cloud computing", IEEE 2014 23rd Wireless and Optical Communication Conference, NJIT, Newark, New Jersey, U.S.A., May 9th -10th, 2014
- Yuhong Liu, Yan (Lindsay) Sun, "Can Reputation Manipulation Boost App sales in Android Market", The 38th International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Vancouver, Canada, May 26th-31st, 2013
- Yuhong Liu, Yan (Lindsay) Sun, Ting Yu, "Defending Multiple-user-multiple-target Attacks in Online Reputation Systems", submitted to IEEE International Conference on Social Computing, the Third IEEE International Conference on Social Computing (Socialcom'11, acceptance rate 9.8%), Oct. 2011.
- Yuhong Liu, Yan (Lindsay) Sun, "Anomaly Detection in Feedback-based Reputation Systems through Temporal and Correlation Analysis", (Best paper award), the Second IEEE International Conference on Social Computing (SocialCom'10, acceptance rate 13%), August 2010.
- Yuhong Liu, Fan Zhang, Yan (Lindsay) Sun, He Huang, "Trust Sensor Interface for Improving Reliability of EMG-based User Intent Recognition", the 33rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC'11), Boston, MA, USA, 2011.
- Yuhong Liu, Yafei Yang, and Yan (Lindsay) Sun, "Detection of Collusion Behaviors in Online Reputation Systems", Invited paper, Proc. of Asilomar Conference on Signals, Systems, and Computers, PACIFIC GROVE, CA, October, 2008.
- W.G. Besio, X. Liu, Yuhong Liu, Y.L. Sun, A.V. Medvedev, and K. Koka, "Algorithm for Automatic Detection of Pentylenetetrazole-Induced Seizures in Rat", the 33rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC’11), Boston, MA, USA, 2011.
- He Huang, Yan (Lindsay) Sun, Qing Yang, Fan Zhang, Xiaorong Zhang, Yuhong Liu, Jin Ren, Fabian Sierra, "Integrating Neuromuscular and Cyber Systems for Neural Control of Artificial Legs", ACM/IEEE International Conference on Cyber-Physical Systems Stockholm, Sweden. April, 2010.
Technique Report and Posters
Na Li, Yuhong Liu, Venu Madhavi Doddapaneni and Sai Samrat Malka, "The Design of a Friend Search Web Service for Studying Users' Query Behavior", special issue on "Security and Privacy in Online Social Networks", IEEE Computer Society Special Technical Community on Social Networking E-Letter, vol. 2, no. 4, December 2014.
Yuhong Liu, Yan (Lindsay) Sun, "Arguable App Boosting Strategies - Are They Working in a Small Social Community?", special issue on "Security and Privacy in Online Social Networks", IEEE Computer Society Special Technical Community on Social Networking E-Letter, vol. 2, no. 4, December 2014.
Yuhong Liu, Yan (Lindsay) Sun, Siyuan Liu, Alex C. Kot, “Identifying Malicious Users in Online Reputation Systems through Dempster-Shafer theory based Trust Model”, poster track, IEEE International Workshop on Multimedia Signal Processing (MMSP 2012), Banff, Canada, September 17-19, 2012.
Yuhong Liu, Yan (Lindsay) Sun, "Detecting Cheating Behaviors in Cyber Competitions by Constructing Competition Social Network", poster track, IEEE Intl. Workshop on Information Forensics and Security (WIFS'11), Brazil, Nov. 29th-Dec. 2nd, 2011.
Yuhong Liu, Yan L. Sun, “Detecting Cheating Behaviors in Cyber Competitions by Constructing Competition Social Network”, Cybersecurity Symposium 2012, University of Rhode Island, May 2nd, 2012
Yuhong Liu, Yan L. Sun, “Securing Reputation Systems in the Cyber Space”, Cybersecurity Symposium 2011, University of Rhode Island, April 11th, 2011
Yuhong Liu, Yan L. Sun, “Trust Sensor Interface for Improving Reliability of EMG-based User Intent Recognition”, Cybersecurity Symposium 2011, University of Rhode Island, April 11th, 2011
Yuhong Liu, Yan L. Sun, “Securing Reputation Systems in the Cyber Space”, Discovery@URI, April 13th, 2011
Book Chapter
Yuhong Liu, Yu Wang, Nam Ling, "Security, Privacy and Trust for User Generated Content: The Challenges and Solutions", in Big Data Management, Architecture, and Processing, Eds, Kuan-Ching Li, to be published by Taylor and Francis
Yuhong Liu, Ruiwen Li, Songjie Cai and Yan (Lindsay) Sun, "Security, Privacy and Trust in Cloud Computing: Challenges and Solutions", in Big Data Analytics in Cybersecurity, Eds, Onur Savas and Julia Deng, to be published by Taylor & Francis
Invited Talks
- Panelist on “Special Technical Communities (STC)” at COMPSAC 2020.
- Panelist on “Computing Trust and Security”, ACG Silicon Valley's February Keynote, Feb. 2020
- "Trustworthy Computing and Cyber Security", Lanzhou University, Nov. 2019
- “Trust and Privacy Attacks in Online Social Networks”, ISC 2 Silicon Valley Chapter, Sept. 10th, 2019.
- “Trust and Privacy Attacks in Online Social Networks”, National Central University, and Tamkang University, Taiwan, July 2019.
- "Trust and Privacy Attacks in Online Social Networks", Tianjin University, Xi'an University of Posts and Telecommunications, Zhongyuan University of Technology, China, 2018
- “Retrieving Trustworthy User Generated Information in the Big Data Era”, Beijing University of Posts and Telecommunications, China, Dec. 2017
- “Retrieving Trustworthy User Generated Information in the Big Data Era”, Peking University, Tianjin University, Nankai University, China, 2017
- “Security, Privacy and Trust in Online Social Media”, Fuzhou University and Lanzhou University, China, April, 2017
- “Security, Privacy and Trust in Online Social Media”, invited talk at Xiamen University, Tianjin University, Xi’an University of Posts and Telecommunications, China, June, 2016
- “Securing Online Reputation Systems”, Ph.D forum on Grace Hopper Celebration for Women in Computing (GHC 2012), Oct. 3rd -6th, 2012
- “Safety Assurance of Neural-controlled Artificial Legs”; Panelist, “Network Security and Trust”, Cybersecurity Symposium 2011, University of Rhode Island, April 11th, 2011