default search action
Liangmin Guo
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Ming Zheng, Kai Ma, Fei Wang, Xiaowen Hu, Qingying Yu, Liangmin Guo, Fulong Chen:
Which standard classification algorithm has more stable performance for imbalanced network traffic data? Soft Comput. 28(1): 217-234 (2024) - [j18]Xiaoyao Zheng, Xingwang Li, Zhenghua Chen, Liping Sun, Qingying Yu, Liangmin Guo, Yonglong Luo:
Enhanced Self-Attention Mechanism for Long and Short Term Sequential Recommendation Models. IEEE Trans. Emerg. Top. Comput. Intell. 8(3): 2457-2466 (2024) - 2023
- [j17]Liangmin Guo, Kaixuan Luan, Li Sun, Yonglong Luo, Xiaoyao Zheng:
Collaborative filtering recommendations based on multi-factor random walks. Eng. Appl. Artif. Intell. 123(Part B): 106409 (2023) - [j16]Liangmin Guo, Li Sun, Rong Jiang, Yonglong Luo, Xiaoyao Zheng:
Recommendation based on attributes and social relationships. Expert Syst. Appl. 234: 121027 (2023) - [j15]Xiaoyao Zheng, Manping Guan, Xianmin Jia, Liangmin Guo, Yonglong Luo:
A Matrix Factorization Recommendation System-Based Local Differential Privacy for Protecting Users' Sensitive Data. IEEE Trans. Comput. Soc. Syst. 10(3): 1189-1198 (2023) - [j14]Liangmin Guo, Hao Yang, Kaixuan Luan, Li Sun, Yonglong Luo, Liping Sun:
A Trust Model Based on Characteristic Factors and SLAs for Cloud Environments. IEEE Trans. Netw. Serv. Manag. 20(4): 4383-4396 (2023) - 2022
- [j13]Liangmin Guo, Ying Zhu, Hao Yang, Yonglong Luo, Liping Sun, Xiaoyao Zheng:
A k-nearest neighbor query method based on trust and location privacy protection. Concurr. Comput. Pract. Exp. 34(16) (2022) - 2021
- [j12]Liangmin Guo, Hao Yang, Kaixuan Luan, Yonglong Luo, Liping Sun, Xiaoyao Zheng:
A trust management model based on mutual trust and a reward-with-punishment mechanism for cloud environments. Concurr. Comput. Pract. Exp. 33(16) (2021) - [j11]Liping Sun, Shang Ci, Xiaoqing Liu, Liangmin Guo, Xiaoyao Zheng, Yonglong Luo:
Secure grid-based density peaks clustering on hybrid cloud for industrial IoT. Int. J. Netw. Manag. 31(2) (2021) - [j10]Liping Sun, Xiaoqing Liu, Yuanjun Liu, Tao Wang, Liangmin Guo, Xiaoyao Zheng, Yonglong Luo:
A novel deep recommend model based on rating matrix and item attributes. J. Intell. Inf. Syst. 57(2): 295-319 (2021) - [j9]Liangmin Guo, Kaixuan Luan, Xiaoyao Zheng, Jing Qian:
A Service Recommendation Method Based on Requirements for the Cloud Environment. J. Control. Sci. Eng. 2021: 6669798:1-6669798:11 (2021)
2010 – 2019
- 2019
- [j8]Liping Sun, Shuting Bao, Shang Ci, Xiaoyao Zheng, Liangmin Guo, Yonglong Luo:
Differential Privacy-Preserving Density Peaks Clustering Based on Shared Near Neighbors Similarity. IEEE Access 7: 89427-89440 (2019) - [j7]Liangmin Guo, Jiakun Liang, Ying Zhu, Yonglong Luo, Liping Sun, Xiaoyao Zheng:
Collaborative filtering recommendation based on trust and emotion. J. Intell. Inf. Syst. 53(1): 113-135 (2019) - [c6]Yonglu Wang, Kaizhong Zuo, Rui Liu, Liangmin Guo:
Semantic Location Privacy Protection Based on Privacy Preference for Road Network. CSS (2) 2019: 330-342 - 2018
- [j6]Liangmin Guo, Guiyin Hu, Yan Dong, Yonglong Luo, Ying Zhu:
A Game Based Consolidation Method of Virtual Machines in Cloud Data Centers With Energy and Load Constraints. IEEE Access 6: 4664-4676 (2018) - [j5]Xiaoyao Zheng, Yuqing Liu, Hao You, Liangmin Guo, Chuanxin Zhao:
A New Mining and Protection Method Based on Sensitive Data. J. Control. Sci. Eng. 2018: 1864703:1-1864703:7 (2018) - 2017
- [j4]Liangmin Guo, Yonglong Luo, Xiaokang He, Guiyin Hu, Yan Dong:
A Method for Service Evaluation Based on Fuzzy Theory for Cloud Computing. KSII Trans. Internet Inf. Syst. 11(4): 1820-1840 (2017) - 2013
- [j3]Liangmin Guo, Yonglong Luo, Zhengzhen Zhou, Meijing Ji:
A Recommendation Trust Method Based on Fuzzy Clustering in P2P Networks. J. Softw. 8(2): 357-360 (2013) - [j2]Zhengzhen Zhou, Yonglong Luo, Liangmin Guo, Liping Sun:
Assessment of P2P Trust Model Based on Fuzzy Comprehensive Evaluation. J. Softw. 8(11): 2711-2714 (2013) - 2011
- [j1]Zhengzhen Zhou, Yongluo Luo, Liangmin Guo, Meijing Ji:
A Trust Evaluation Model based on Fuzzy Theory in P2P Networks. J. Comput. 6(8): 1634-1638 (2011) - [c5]Shuling Wang, Shoubao Yang, Liangmin Guo:
LiChord: A Linear Code Based Structured P2P for Approximate Match. CMC 2011: 118-121
2000 – 2009
- 2009
- [c4]Lili Shi, Shoubao Yang, Liangmin Guo, Bin Wu:
A Markov Chain Based Resource Prediction in Computational Grid. FCST 2009: 119-124 - [c3]Xianlong Niu, Shoubao Yang, Bin Wu, Xiaoqian Liu, Liangmin Guo:
A Cache Scheduling Scheme Based on Layered Coding VOD System. GCC 2009: 238-243 - [c2]Hu Song, Shoubao Yang, Bin Wu, Xiaoqian Liu, Liangmin Guo:
An Optimal Algorithm for Scheduling Tasks within Deadline and Budget Constraints. NCM 2009: 62-65 - 2007
- [c1]Liangmin Guo, Shoubao Yang, Leitao Guo, Kai Shen, Weina Lu:
Trust-aware Adaptive P2P Overlay Topology Based on Superpeer-partition. GCC 2007: 117-124
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-19 21:00 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint