


default search action
Yuling Luo
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j50]Yuling Luo, Ce Liang, Sheng Qin, Junxiu Liu, Qiang Fu, Su Yang:
A two-branch encoder-decoder network for image tampering localization. Appl. Soft Comput. 164: 111992 (2024) - [j49]Yuling Luo, Yiqi Qiu, Baoshan Lu
, Sheng Qin, Qiang Fu, Shunsheng Zhang, Yiting Huang, Su Yang:
Reversible Data Hiding based on optimized CNN predictor and Prediction Error Expansion with Lower Surround Background Complexity. Comput. Electr. Eng. 119: 109472 (2024) - [j48]Junxiu Liu, Shaodong Huang, Qiang Fu
, Yuling Luo, Sheng Qin, Yi Cao
, Jia Zhai, Su Yang:
The open banking era: An optimal model for the emergency fund. Expert Syst. Appl. 244: 122915 (2024) - [j47]Junxiu Liu, Dong Jiang, Qiang Fu
, Yuling Luo, Yaohua Deng, Sheng Qin, Shunsheng Zhang:
Unidirectional and hierarchical on-chip interconnected architecture for large-scale hardware spiking neural networks. Neurocomputing 609: 128480 (2024) - [j46]Yuling Luo, Yuanze Li, Sheng Qin, Qiang Fu, Junxiu Liu:
Copyright protection framework for federated learning models against collusion attacks. Inf. Sci. 680: 121161 (2024) - [j45]Yuling Luo, Xianya Huang, Shunsheng Zhang
, Junxiu Liu:
An image compression-then-encryption algorithm using piecewise asymptotic deterministic random measurement matrix. Multim. Tools Appl. 83(21): 60117-60145 (2024) - [c29]Yuling Luo, Yuanze Li, Shunsheng Zhang, Junxiu Liu, Sheng Qin:
A watermark-based framework to actively protect deep neural networks. IJCNN 2024: 1-8 - 2023
- [j44]Junxiu Liu, Sheng Qin
, Min Su
, Yuling Luo
, Shunsheng Zhang
, Yanhu Wang, Su Yang
:
Traffic signal control using reinforcement learning based on the teacher-student framework. Expert Syst. Appl. 228: 120458 (2023) - [j43]Junxiu Liu, Sheng Qin, Min Su
, Yuling Luo
, Yanhu Wang, Su Yang
:
Multiple intersections traffic signal control based on cooperative multi-agent reinforcement learning. Inf. Sci. 647: 119484 (2023) - [j42]Haiping Shu, Junxiu Liu
, Yifan Hua, Jian Chen, Shunsheng Zhang
, Min Su, Yuling Luo:
A grape disease identification and severity estimation system. Multim. Tools Appl. 82(15): 23655-23672 (2023) - [j41]Junxiu Liu, Yanhu Wang, Yuling Luo
, Shunsheng Zhang
, Dong Jiang, Yifan Hua, Sheng Qin, Su Yang:
Hardware Spiking Neural Networks with Pair-Based STDP Using Stochastic Computing. Neural Process. Lett. 55(6): 7155-7173 (2023) - [j40]Yuling Luo
, Shiqi Zhang
, Shunsheng Zhang
, Junxiu Liu
, Yanhu Wang
, Su Yang
:
A Secure and Efficient Framework for Outsourcing Large-scale Matrix Determinant and Linear Equations. ACM Trans. Embed. Comput. Syst. 22(5): 86:1-86:22 (2023) - 2022
- [j39]Yuling Luo, Fangxiao Wang, Junxiu Liu
, Liangjia Li, Su Yang, Shunsheng Zhang
:
COVER: A Secure Blind Image Watermarking Scheme. Circuits Syst. Signal Process. 41(12): 6931-6959 (2022) - [j38]Junxiu Liu, Xiuhao Liang, Rixing Yang, Yuling Luo, Hao Lu, Liangjia Li, Shunsheng Zhang, Su Yang:
Federated learning-based vertebral body segmentation. Eng. Appl. Artif. Intell. 116: 105451 (2022) - [j37]Yuling Luo, Fangxiao Wang, Shanshan Xu, Shunsheng Zhang
, Liangjia Li, Min Su, Junxiu Liu:
CONCEAL: A robust dual-color image watermarking scheme. Expert Syst. Appl. 208: 118133 (2022) - [j36]Dezheng Zhang, Shunsheng Zhang
, Yuling Luo, Lvchen Cao:
Cryptanalyzing a Feistel Chaotic Block Cryptosystem Based on Correlation Power Analysis. Int. J. Bifurc. Chaos 32(9): 2250127:1-2250127:14 (2022) - [j35]Lanhang Li, Yuling Luo
, Senhui Qiu, Xue Ouyang, Lvchen Cao, Shunbin Tang:
Image encryption using chaotic map and cellular automata. Multim. Tools Appl. 81(28): 40755-40773 (2022) - [j34]Yuling Luo, Xue Ouyang, Junxiu Liu
, Lvchen Cao, Yanli Zou
:
An image encryption scheme based on particle swarm optimization algorithm and hyperchaotic system. Soft Comput. 26(11): 5409-5435 (2022) - [j33]Junxiu Liu
, Shunsheng Zhang
, Yuling Luo
, Lvchen Cao:
Machine Learning-Based Similarity Attacks for Chaos-Based Cryptosystems. IEEE Trans. Emerg. Top. Comput. 10(2): 824-837 (2022) - [j32]Junxiu Liu
, Sheng Qin
, Yuling Luo
, Yanhu Wang, Su Yang:
Intelligent Traffic Light Control by Exploring Strategies in an Optimised Space of Deep Q-Learning. IEEE Trans. Veh. Technol. 71(6): 5960-5970 (2022) - [c28]Yuling Luo, Shiqi Zhang, Shunsheng Zhang
, Junxiu Liu, Ce Liang, Su Yang:
Efficient PCA-based image compression via secure outsourcing edge cloud. HPCC/DSS/SmartCity/DependSys 2022: 1586-1592 - [c27]Yuling Luo, Zhangrui Wang, Shunsheng Zhang
, Junxiu Liu:
Efficient-Secure k-means Clustering Guaranteeing Personalized Local Differential Privacy. ICA3PP 2022: 660-675 - [c26]Yuling Luo, Ce Liang, Shunsheng Zhang
, Sheng Qin:
A Combined Feature Encoding Network with Semantic Enhancement for Image Tampering Forensics. IFIP Int. Conf. Digital Forensics 2022: 107-121 - [i1]Dongnan Liu, Mariano Cabezas
, Dongang Wang, Zihao Tang, Lei Bai
, Geng Zhan, Yuling Luo, Kain Kyle
, Linda Ly, James Yu, Chun-Chien Shieh, Aria Nguyen, Ettikan Kandasamy Karuppiah, Ryan Sullivan, Fernando Calamante, Michael Barnett
, Wanli Ouyang, Weidong Cai
, Chenyu Wang
:
MS Lesion Segmentation: Revisiting Weighting Mechanisms for Federated Learning. CoRR abs/2205.01509 (2022) - 2021
- [j31]Junxiu Liu, Mingxing Li, Yuling Luo, Su Yang, Wei Li
, Yifei Bi:
Alzheimer's disease detection using depthwise separable convolutional neural networks. Comput. Methods Programs Biomed. 203: 106032 (2021) - [j30]Junxiu Liu, Hao Lu
, Yuling Luo, Su Yang:
Spiking neural network-based multi-task autonomous learning for mobile robots. Eng. Appl. Artif. Intell. 104: 104362 (2021) - [j29]Yuling Luo, Liangjia Li, Junxiu Liu
, Shunbin Tang, Lvchen Cao, Shunsheng Zhang
, Senhui Qiu, Yi Cao
:
A multi-scale image watermarking based on integer wavelet transform and singular value decomposition. Expert Syst. Appl. 168: 114272 (2021) - [j28]Yongchuang Huang, Junxiu Liu, Jim Harkin, Liam McDaid, Yuling Luo:
An memristor-based synapse implementation using BCM learning rule. Neurocomputing 423: 336-342 (2021) - [j27]Hao Lu
, Junxiu Liu, Yuling Luo, Yifan Hua, Senhui Qiu, Yongchuang Huang:
An autonomous learning mobile robot using biological reward modulate STDP. Neurocomputing 458: 308-318 (2021) - [j26]Yuling Luo, Yunqi Liu, Junxiu Liu, Shunbin Tang, Jim Harkin, Yi Cao
:
Counteracting dynamical degradation of a class of digital chaotic systems via Unscented Kalman Filter and perturbation. Inf. Sci. 556: 49-66 (2021) - [j25]Junxiu Liu, Dong Jiang
, Yuling Luo
, Senhui Qiu, Yongchuang Huang:
Minimally buffered deflection router for spiking neural network hardware implementations. Neural Comput. Appl. 33(18): 11753-11764 (2021) - [c25]Yuling Luo, Shuming Han, Shunsheng Zhang
, Yanhu Wang, Junxiu Liu:
High Speed True Random Number Generator Controlled by Logistic Map. HPCC/DSS/SmartCity/DependSys 2021: 57-62 - [c24]Yuanzhi Li, Shanshan Xu, Yuling Luo, Sheng Qin, Shunsheng Zhang, Min Su:
A Highly Efficient Profiled Power Analysis Attack Based on Power Leakage Fitting. HPCC/DSS/SmartCity/DependSys 2021: 791-796 - 2020
- [j24]Yuling Luo
, Qiang Fu
, Juntao Xie, Yunbai Qin, Guopei Wu, Junxiu Liu
, Frank Jiang, Yi Cao, Xuemei Ding:
EEG-Based Emotion Classification Using Spiking Neural Networks. IEEE Access 8: 46007-46016 (2020) - [j23]Yuling Luo, Shunsheng Zhang
, Junxiu Liu
, Lvchen Cao:
Cryptanalysis of a Chaotic Block Cryptographic System Against Template Attacks. Int. J. Bifurc. Chaos 30(15): 2050223:1-2050223:15 (2020) - [j22]Junxiu Liu
, Tiening Sun, Yuling Luo
, Su Yang, Yi Cao
, Jia Zhai:
An echo state network architecture based on quantum logic gate and its optimization. Neurocomputing 371: 100-107 (2020) - [j21]Junxiu Liu
, Tiening Sun, Yuling Luo
, Su Yang, Yi Cao
, Jia Zhai:
Echo state network optimization using binary grey wolf algorithm. Neurocomputing 385: 310-318 (2020) - [j20]Lanhang Li, Yuling Luo, Shubin Tang, Lvchen Cao, Xue Ouyang:
Image encryption algorithm using chaotic maps and cellular automata. EAI Endorsed Trans. Security Safety 7(26): e3 (2020) - [c23]Junxiu Liu, Xingyue Huang, Dong Jiang
, Yuling Luo:
An Energy-aware Spiking Neural Network Hardware Mapping based on Particle Swarm Optimization and Genetic Algorithm. CODES+ISSS 2020: 11-13 - [c22]Junxiu Liu, Dong Jiang
, Yuling Luo, Senhui Qiu:
Multi-Ring on-Chip Interconnected Architecture for Spiking Neural Network Hardware Implementations. HPCC/DSS/SmartCity 2020: 593-598 - [c21]Xiuhao Liang, Junxiu Liu, Yuling Luo, Guopei Wu, Shunsheng Zhang, Senhui Qiu:
Automatic Segmentation and Diagnosis of Intervertebral Discs Based on Deep Neural Networks. ICONIP (4) 2020: 168-175 - [c20]Guopei Wu, Junxiu Liu, Yuling Luo, Senhui Qiu:
Sensor Drift Compensation Using Robust Classification Method. ICONIP (3) 2020: 605-615 - [c19]Liangjia Li, Yuling Luo, Junxiu Liu, Senhui Qiu, Lanhang Li:
A Robust Watermarking Scheme with High Security and Low Computational Complexity. SecureComm (2) 2020: 439-454 - [c18]Shunsheng Zhang
, Yuling Luo, Lvchen Cao, Junxiu Liu:
Cryptanalysis of a Chaos-based Block Cryptosystem Using Multiple Samples Correlation Power Analysis. TrustCom 2020: 892-898
2010 – 2019
- 2019
- [j19]Junxiu Liu
, Jinlei Zhang, Yuling Luo
, Su Yang, Jinling Wang
, Qiang Fu
:
Mass Spectral Substance Detections Using Long Short-Term Memory Networks. IEEE Access 7: 10734-10744 (2019) - [j18]Yuling Luo
, Xue Ouyang, Junxiu Liu
, Lvchen Cao:
An Image Encryption Method Based on Elliptic Curve Elgamal Encryption and Chaotic Systems. IEEE Access 7: 38507-38522 (2019) - [j17]Junxiu Liu
, Jiadong Huang
, Yuling Luo
, Lvchen Cao, Su Yang, Duqu Wei, Ronglong Zhou:
An Optimized Image Watermarking Method Based on HD and SVD in DWT Domain. IEEE Access 7: 80849-80860 (2019) - [j16]Yuling Luo, Dezheng Zhang, Junxiu Liu
:
A Chaotic Block Cryptographic System Resistant to Power Analysis Attack. Int. J. Bifurc. Chaos 29(8): 1950106:1-1950106:13 (2019) - [j15]Yuling Luo, Yunqi Liu, Junxiu Liu
, Xue Ouyang, Yi Cao, Xuemei Ding:
ECM-IBS: A Chebyshev Map-Based Broadcast Authentication for Wireless Sensor Networks. Int. J. Bifurc. Chaos 29(9): 1950118:1-1950118:16 (2019) - [j14]Junxiu Liu
, Yongchuang Huang, Yuling Luo
, Jim Harkin, Liam McDaid:
Bio-inspired fault detection circuits based on synapse and spiking neuron models. Neurocomputing 331: 473-482 (2019) - [j13]Yuling Luo, Jia Lin, Junxiu Liu
, Duqu Wei, Lvchen Cao, Ronglong Zhou, Yi Cao, Xuemei Ding:
A robust image encryption algorithm based on Chua's circuit and compressive sensing. Signal Process. 161: 227-247 (2019) - [c17]Yuling Luo, Shuming Han, Junxiu Liu, Zhewei Liang, Su Yang:
Hash Hardware Generator Based on Mutual Perturbed Logistic Map. HPCC/SmartCity/DSS 2019: 353-358 - [c16]Yuling Luo, Xue Ouyang, Junxiu Liu, Lvchen Cao:
A Colour Image Encryption Using Genetic Operators and Generalized Henon Chaotic Mapping. HPCC/SmartCity/DSS 2019: 1720-1725 - [c15]Yuling Luo, Lieyang Yao, Junxiu Liu, Dezheng Zhang, Lvchen Cao:
A Block Cryptographic Algorithm for Wireless Sensor Networks Based on Hybrid Chaotic Map. HPCC/SmartCity/DSS 2019: 2790-2797 - [c14]Junxiu Liu, Mingxing Li, Yuling Luo, Su Yang, Senhui Qiu:
Human Body Posture Recognition Using Wearable Devices. ICANN (Workshop) 2019: 326-337 - [c13]Junxiu Liu, Xingyue Huang, Yongchuang Huang, Yuling Luo, Su Yang:
Multi-objective Spiking Neural Network Hardware Mapping Based on Immune Genetic Algorithm. ICANN (1) 2019: 745-757 - [c12]Junxiu Liu, Zhewei Liang, Yuling Luo, Jiadong Huang, Su Yang:
Hardware Tripartite Synapse Architecture based on Stochastic Computing. TASE 2019: 81-85 - 2018
- [j12]Yuling Luo
, Shunbin Tang, Xingsheng Qin
, Lvchen Cao, Frank Jiang, Junxiu Liu
:
A Double-Image Encryption Scheme Based on Amplitude-Phase Encoding and Discrete Complex Random Transformation. IEEE Access 6: 77740-77753 (2018) - [j11]Shuo Liu, Jinshu Zeng, Huizhou Gong, Hongqin Yang, Jia Zhai, Yi Cao, Junxiu Liu, Yuling Luo, Yuhua Li
, Liam P. Maguire
, Xuemei Ding:
Quantitative analysis of breast cancer diagnosis using a probabilistic modelling approach. Comput. Biol. Medicine 92: 168-175 (2018) - [j10]Yuan Yao, Yi Cao
, Xuemei Ding, Jia Zhai, Junxiu Liu, Yuling Luo, Shuai Ma, Kailin Zou:
A paired neural network model for tourist arrival forecasting. Expert Syst. Appl. 114: 588-614 (2018) - [j9]Yuling Luo, Dezheng Zhang, Junxiu Liu
, Yunqi Liu, Yi Cao, Xuemei Ding:
Cryptanalysis of Chaos-Based Cryptosystem from the Hardware Perspective. Int. J. Bifurc. Chaos 28(9): 1850114:1-1850114:14 (2018) - [j8]Yuling Luo, Ronglong Zhou, Junxiu Liu
, Senhui Qiu, Yi Cao
:
An efficient and self-adapting colour-image encryption algorithm based on chaos and interactions among multiple layers. Multim. Tools Appl. 77(20): 26191-26217 (2018) - [j7]Yuling Luo, Lei Wan, Junxiu Liu
, Jim Harkin
, Yi Cao
:
An Efficient, Low-Cost Routing Architecture for Spiking Neural Network Hardware Implementations. Neural Process. Lett. 48(3): 1777-1788 (2018) - [c11]Yuling Luo, Qian Lu, Junxiu Liu, Qiang Fu, Jim Harkin, Liam McDaid, Jordi Martínez-Corral, Guillermo Biot-Marí:
Forest fire detection using spiking neural networks. CF 2018: 371-375 - [c10]Junxiu Liu, Tiening Sun, Yuling Luo, Qiang Fu
, Yi Cao, Jia Zhai, Xuemei Ding:
Financial Data Forecasting Using Optimized Echo State Network. ICONIP (5) 2018: 138-149 - [c9]Yuling Luo, Qiang Fu
, Junxiu Liu, Yongchuang Huang, Xuemei Ding, Yi Cao
:
Improving the Stability for Spiking Neural Networks Using Anti-noise Learning Rule. PRICAI 2018: 29-37 - 2017
- [j6]Yuan Yao, Jia Zhai, Yi Cao
, Xuemei Ding, Junxiu Liu, Yuling Luo:
Data analytics enhanced component volatility model. Expert Syst. Appl. 84: 232-241 (2017) - [j5]Yunqi Liu, Yuling Luo, Shuxiang Song, Lvchen Cao, Junxiu Liu, Jim Harkin
:
Counteracting Dynamical Degradation of Digital Chaotic Chebyshev Map via Perturbation. Int. J. Bifurc. Chaos 27(3): 1750033:1-1750033:14 (2017) - [j4]Lei Wan, Junxiu Liu, Jim Harkin
, Liam McDaid, Yuling Luo:
Layered tile architecture for efficient hardware spiking neural networks. Microprocess. Microsystems 53: 21-32 (2017) - [c8]Yuling Luo, Ronglong Zhou, Lvchen Cao, Junxiu Liu, Jinjie Bi, Yi Cao
, Senhui Qiu:
A chaos-based self-adapting RGB image permutation scheme. ICNC-FSKD 2017: 336-341 - [c7]Yuling Luo, Lei Wan, Junxiu Liu, Jinlei Zhang, Yi Cao
:
An Efficient Hardware Architecture for Multilayer Spiking Neural Networks. ICONIP (6) 2017: 786-795 - [c6]Junxiu Liu, Xingyue Huang, Yuling Luo, Yi Cao
:
An Energy-Aware Hybrid Particle Swarm Optimization Algorithm for Spiking Neural Network Mapping. ICONIP (3) 2017: 805-815 - [c5]Yuling Luo, Qiang Fu
, Junxiu Liu, Jim Harkin
, Liam McDaid, Yi Cao
:
An Extended Algorithm Using Adaptation of Momentum and Learning Rate for Spiking Neurons Emitting Multiple Spikes. IWANN (1) 2017: 569-579 - 2016
- [j3]Zhenkun Lu, Cui Yang, Donghong Qin, Yuling Luo:
Estimating the parameters of ultrasonic echo signal in the Gabor transform domain and its resolution analysis. Signal Process. 120: 607-619 (2016) - [c4]Lei Wan, Junxiu Liu, Senhui Qiu, Mingcan Cen, Yuling Luo:
Short-Term Electrical Load Forecasting Based on Fuzzy Logic Control and Improved Back Propagation Algorithm. SmartGIFT 2016: 79-86 - 2015
- [j2]Yuling Luo, Minghui Du, Junxiu Liu:
A symmetrical image encryption scheme in wavelet and time domain. Commun. Nonlinear Sci. Numer. Simul. 20(2): 447-460 (2015) - [j1]Lvchen Cao, Yuling Luo
, Jinjie Bi, Senhui Qiu, Zhenkun Lu, Jim Harkin
, Liam McDaid:
An authentication strategy based on spatiotemporal chaos for software copyright protection. Secur. Commun. Networks 8(18): 4073-4086 (2015) - [c3]Junxiu Liu, Jim Harkin
, Liam P. Maguire
, Yuhua Li, Lei Wan, Yuling Luo:
Fine-Grained Fault-Tolerant Adaptive Routing for Networks-on-Chip. ICA3PP (4) 2015: 492-505 - 2014
- [c2]Yuling Luo, Junxiu Liu, Lvchen Cao, Jinjie Bi, Senhui Qiu:
Hardware Implementation of Cryptographic Hash Function Based on Spatiotemporal Chaos. SecureComm (1) 2014: 395-404
2000 – 2009
- 2009
- [c1]Liming Wu, Junxiu Liu, Ji Zhang, Yuling Luo:
The Intelligent Reconfigurable Measuring Node Based on Wireless Access Network. CIS (1) 2009: 570-573
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-12 01:07 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint