default search action
Yanhua Liu
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Yanhua Liu 0001 (aka: Liu Yanhua 0001) — North University of China, Affiliated Hospital, Shanxi, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Yanhua Liu, Zhihuang Liu, Qiu Zhang, Jinshu Su, Zhiping Cai, Xiaoyan Li:
Blockchain and trusted reputation assessment-based incentive mechanism for healthcare services. Future Gener. Comput. Syst. 154: 59-71 (2024) - [j20]Yanhua Liu, Yao Cheng:
Local discontinuous Galerkin method for a singularly perturbed fourth-order problem of reaction-diffusion type. J. Comput. Appl. Math. 440: 115641 (2024) - [j19]Zhihuang Liu, Ling Hu, Zhiping Cai, Ximeng Liu, Yanhua Liu:
SeCoSe: Toward Searchable and Communicable Healthcare Service Seeking in Flexible and Secure EHR Sharing. IEEE Trans. Inf. Forensics Secur. 19: 4999-5014 (2024) - [j18]Lei Liu, Yunfei Yin, Zhenbin Zhang, Haoyu Chen, Haotian Xie, Yanhua Liu, Yuxin Zhao, Ralph Kennel:
Multidisturbances Compensation for Three-Level NPC Converters in Microgrids: A Robust Adaptive Sliding Mode Control Approach. IEEE Trans. Ind. Informatics 20(6): 8917-8931 (2024) - [j17]Yanhua Liu, Wentao Deng, Zhihuang Liu, Fanhao Zeng:
Semi-supervised attack detection in industrial control systems with deviation networks and feature selection. J. Supercomput. 80(10): 14600-14621 (2024) - 2023
- [j16]Yanhua Liu, Zhihuang Liu, Ximeng Liu, Wenzhong Guo:
A Web Back-End Database Leakage Incident Reconstruction Framework Over Unlabeled Logs. IEEE Trans. Emerg. Top. Comput. 11(1): 237-252 (2023) - [j15]Jieling Li, Hao Zhang, Zhihuang Liu, Yanhua Liu:
Network intrusion detection via tri-broad learning system based on spatial-temporal granularity. J. Supercomput. 79(8): 9180-9205 (2023) - [j14]Hao Zhang, Zude Xiao, Jason Gu, Yanhua Liu:
A network anomaly detection algorithm based on semi-supervised learning and adaptive multiclass balancing. J. Supercomput. 79(18): 20445-20480 (2023) - [c23]Huaihang Lin, Xiaoyan Li, Yanhua Liu, Weibei Fan:
A Secure Transaction Forwarding Strategy for Blockchain Payment Channel Networks. APNet 2023: 192-193 - [c22]Jianhao Liu, Xiaoyan Li, Yanhua Liu, Weibei Fan:
A Unified, Flexible Framework in Network Topology Generation for Distributed Machine Learning. APNet 2023: 196-197 - [c21]Wentao Deng, Lilin Chen, Yonglu Hong, Yanhua Liu:
An Abnormal Event Classification Model for Big Data Platforms Based on Semi-supervised Learning. ICSAI 2023: 1-6 - [c20]Zeke Li, Haiwei Fan, Jiuyu Guo, Genyuan Dong, Shaokang Xu, Qiu Zhang, Yanhua Liu:
A Reliability Prediction Method for Power Communication Network Based on Node Importance. ICSAI 2023: 1-6 - [c19]Mingwei Yang, Yanhua Liu, Hong Chen, Jiefei Lin, Haoqiang Lin:
An Anomaly Detection Method for Nonlinear Industrial Process Using Sparse Stacked Denoising Autoencoder. ICSAI 2023: 1-6 - [c18]Shihang Feng, Hanchen Wang, Chengyuan Deng, Yinan Feng, Yanhua Liu, Min Zhu, Peng Jin, Yinpeng Chen, Youzuo Lin:
EFWI: Multiparameter Benchmark Datasets for Elastic Full Waveform Inversion of Geophysical Properties. NeurIPS 2023 - [i2]Shihang Feng, Hanchen Wang, Chengyuan Deng, Yinan Feng, Yanhua Liu, Min Zhu, Peng Jin, Yinpeng Chen, Youzuo Lin:
EFWI: Multi-parameter Benchmark Datasets for Elastic Full Waveform Inversion of Geophysical Properties. CoRR abs/2306.12386 (2023) - 2022
- [j13]Yao Cheng, Li Yan, Xuesong Wang, Yanhua Liu:
Optimal maximum-norm estimate of the LDG method for singularly perturbed convection-diffusion problem. Appl. Math. Lett. 128: 107947 (2022) - [j12]Yanhua Liu, Jiaqi Li, Baoxu Liu, Xiaoling Gao, Ximeng Liu:
Malware detection method based on image analysis and generative adversarial networks. Concurr. Comput. Pract. Exp. 34(22) (2022) - [j11]Yanhua Liu, Zhihuang Liu, Wentao Deng, Yanbin Qiu, Ximeng Liu, Wenzhong Guo:
A Network Attack Risk Control Framework for Large-Scale Network Topology Driven by Node Importance Assessment. Int. J. Grid High Perform. Comput. 14(1): 1-22 (2022) - [j10]Yanhua Liu, Shuo Shi, Zhenbin Zhang, Zhenfeng Di, Oluleke Babayomi:
Data-Driven Model Predictive Control for Wave Energy Converters Using Gaussian Process. Symmetry 14(7): 1284 (2022) - [j9]Jieling Li, Hao Zhang, Yanhua Liu, Zhihuang Liu:
Semi-supervised machine learning framework for network intrusion detection. J. Supercomput. 78(11): 13122-13144 (2022) - [c17]Xiaoming Wu, Yanhua Liu, Lichao Su, Xiao-Yan Li:
On Construction of Fault-Tolerant Virtual Backbones in Heterogeneous Wireless Sensor Networks. APNet 2022: 92-94 - [i1]Yanhua Liu, Xitong Zhang, Ilya Tsvankin, Youzuo Lin:
Enhanced prediction accuracy with uncertainty quantification in monitoring CO2 sequestration using convolutional neural networks. CoRR abs/2212.04567 (2022) - 2021
- [j8]Yanhua Liu, Xiaoguang Yuan, Xin Jiang, Pei Wang, Jinqiao Kou, Haofeng Wang, Mingzhe Liu:
Dilated Adversarial U-Net Network for automatic gross tumor volume segmentation of nasopharyngeal carcinoma. Appl. Soft Comput. 111: 107722 (2021) - [j7]Yanhua Liu, Xiaojie Wu, Yu Zhang, Na Li, Hua Luan:
Evaluation of Variable Parameter Active Demons Algorithm-Based Diffusion Tensor Imaging on Ventricular Remodeling after Myocardial Infarction and Nursing. Sci. Program. 2021: 6419240:1-6419240:8 (2021) - [c16]Bihai Lin, Jiaqi Li, Yanhua Liu, Kedong Wu:
Optimal Strategy of IP Address Hopping Based on Attack Surface Evaluation. ICSAI 2021: 1-6 - [c15]Zhiwen Zhang, Qian Gong, Yuan Cao, Cheng Yin, Enyi Yao, Yanhua Liu, Yongqing Pan:
Detecting LED Chip Surface Defects with Modified Faster R-CNN. ISOCC 2021: 268-269 - 2020
- [j6]Mingzhe Liu, Xin Jiang, Yanhua Liu, Feixiang Zhao, Helen Zhou:
A semi-supervised convolutional transfer neural network for 3D pulmonary nodules detection. Neurocomputing 391: 199-209 (2020)
2010 – 2019
- 2019
- [j5]Rongzhong Chen, Chen Dong, Yin Ye, Zhenyi Chen, Yanhua Liu:
QSSA: Quantum Evolutionary Salp Swarm Algorithm for Mechanical Design. IEEE Access 7: 145582-145595 (2019) - [c14]Huajun Liu, Zhanghui Liu, Yanhua Liu, Xiaoling Gao:
Abnormal Network Traffic Detection based on Leaf Node Density Ratio. ICCNS 2019: 69-74 - [c13]Xiaoling Gao, Yanhua Liu, Yanbin Qiu, Huajun Liu:
A Comprehensive Assessment Method of Asset Importance for Key Asset Protection. ICCNS 2019: 79-83 - [c12]Biqiong Chen, Yanhua Liu, Shijin Li, Xiaoling Gao:
Attack Intent Analysis Method Based on Attack Path Graph. ICCNS 2019: 97-102 - 2018
- [j4]Xin Jiang, Mingzhe Liu, Kun Yang, Yanhua Liu, Ruili Wang:
A Security Sandbox Approach of Android Based on Hook Mechanism. Secur. Commun. Networks 2018: 9856537:1-9856537:8 (2018) - [c11]Yanbin Qiu, Yanhua Liu, Shijin Li:
A method of cyber risk control node selection based on Game Theory. ICCNS 2018: 32-36 - [c10]Peihuang Su, Yanhua Liu, Xiang Song:
Research on Intrusion Detection Method Based on Improved Smote and XGBoost. ICCNS 2018: 37-41 - 2017
- [c9]Ruocheng Wang, Yanhua Liu:
The method of micro-blog article retrieval based on text similarity. ICSAI 2017: 1552-1556 - 2015
- [j3]Yanhua Liu, Guolong Chen, Yiyun Zhang:
An Anonymous Email Identification Solution based on Writing Structural Patterns. Int. J. Grid High Perform. Comput. 7(2): 37-49 (2015) - [j2]Hairong Zhang, Lijiang Lu, Yanhua Liu, Wei Liu:
Spatial Sampling Strategies for the Effect of Interpolation Accuracy. ISPRS Int. J. Geo Inf. 4(4): 2742-2768 (2015) - [c8]Yiyun Zhang, Yanhua Liu, Guolong Chen:
A solution of anonymous email identification based on writing structural pattern. FSKD 2015: 1525-1531 - [c7]Lili Xie, Yanhua Liu, Guolong Chen:
A forensic analysis solution of the email network based on email contents. FSKD 2015: 1613-1619 - 2013
- [j1]Yanhua Liu, Ying Ruan, Zongsheng Lai:
New heuristic algorithms for low-energy mapping and routing in 3D NoC. Int. J. Comput. Appl. Technol. 47(1): 1-13 (2013) - [c6]Xiaojiang Peng, Xiao Wu, Qiang Peng, Xianbiao Qi, Yu Qiao, Yanhua Liu:
Exploring dense trajectory feature and encoding methods for human interaction recognition. ICIMCS 2013: 23-27 - 2012
- [c5]Lionel C. Briand, Yvan Labiche, Yanhua Liu:
Combining UML Sequence and State Machine Diagrams for Data-Flow Based Integration Testing. ECMFA 2012: 74-89
2000 – 2009
- 2009
- [c4]Qiaoyun Huang, Guolong Chen, Yanhua Liu, Wenzhong Guo, Xiaotong Fang:
A Research and Application of Continuous Attributes Discretization Based on Cloud Model and Information Entropy. FSKD (3) 2009: 34-38 - [c3]Honglei Gao, Wenzhong Guo, Guolong Chen, Yanhua Liu, Mei Gao:
Cyberspace Situation Prediction Based on Gene Expression Programming. ICNC (4) 2009: 191-195 - 2008
- [c2]Xuegong Xu, Xiaofeng Duan, Richard Dawson, Yanhua Liu, Yu He, Huifang Peng, Chaowei Cui:
Effects of Lucc Resulting From Tffp Land Usepattern in the Yellow River Delta, China. CCTA (1) 2008: 431-441 - 2007
- [c1]Qingxin Ren, Tingguo Chen, Chengkui Huang, Yanhua Liu, Shunqun Li:
Analysis of Circular Reinforced Concrete Long Columns Confined with Carbon Fiber Reinforced Plastic Sheets under Small Eccentric Compression. IMECS 2007: 2071-2073
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-30 21:38 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint