Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Luo, Yonglong
add a person with the name Luo, Yonglong
 

Other publications of authors with the same name

An Algorithm for Privacy-Preserving Quantitative Association Rules Mining., , , , and . DASC, page 315-324. IEEE Computer Society, (2006)Arm up Administrators: Automated Vulnerability Management., , , and . ISPAN, page 587-593. IEEE Computer Society, (2004)Tourism Destination Recommender System for the Cold Start Problem., , , , and . TIIS, 10 (7): 3192-3212 (2016)A Recommender System with Advanced Time Series Medical Data Analysis for Diabetes Patients in a Telehealth Environment., , , , , , and . DEXA (2), volume 11030 of Lecture Notes in Computer Science, page 185-192. Springer, (2018)Privacy-preserving technology and its applications in statistics measurements., , , , , and . Infoscale, volume 304 of ACM International Conference Proceeding Series, page 74. ACM, (2007)An efficient and robust privacy protection technique for massive streaming choice-based information., , and . CIKM, page 1169-1172. ACM, (2013)Secure Two-Party Point-Circle Inclusion Problem., , and . J. Comput. Sci. Technol., 22 (1): 88-91 (2007)A Recommendation Trust Method Based on Fuzzy Clustering in P2P Networks., , , and . JSW, 8 (2): 357-360 (2013)Fingerprint ridge orientation field reconstruction using the best quadratic approximation by orthogonal polynomials in two discrete variables., , , and . Pattern Recognition, 47 (10): 3304-3313 (2014)Privacy-Preserving Practical Convex Hulls Protocol., , , , , , and . FCST, page 10-16. IEEE Computer Society, (2008)