Yue Liu

ORCID: 0000-0003-2958-9923
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Blockchain Technology Applications and Security
  • Privacy-Preserving Technologies in Data
  • Cloud Computing and Resource Management
  • FinTech, Crowdfunding, Digital Finance
  • Cloud Data Security Solutions
  • Ethics and Social Impacts of AI
  • IoT and Edge/Fog Computing
  • Web Data Mining and Analysis
  • Software System Performance and Reliability
  • Digital Platforms and Economics
  • Caching and Content Delivery
  • Artificial Intelligence in Healthcare and Education
  • Educational Technology and Assessment
  • Energy Efficient Wireless Sensor Networks
  • Explainable Artificial Intelligence (XAI)
  • Hydrocarbon exploration and reservoir analysis
  • Software Engineering Research
  • Recommender Systems and Techniques
  • Cryptography and Data Security
  • Advanced Image and Video Retrieval Techniques
  • Evaluation and Optimization Models
  • Software Reliability and Analysis Research
  • QR Code Applications and Technologies
  • Petroleum Processing and Analysis
  • Sentiment Analysis and Opinion Mining

Data61
2020-2025

Commonwealth Scientific and Industrial Research Organisation
2020-2025

Macao Polytechnic University
2023-2025

Fujian Medical University
2025

Beijing University of Technology
2011-2024

Shenyang Ligong University
2018-2024

Chang'an University
2024

UNSW Sydney
2008-2024

China University of Petroleum, East China
2018-2023

University of Electronic Science and Technology of China
2013-2023

Device failure detection is one of most essential problems in Industrial Internet Things (IIoT). However, conventional IIoT device detection, client devices need to upload raw data the central server for model training, which might lead disclosure sensitive business data. Therefore, this article, ensure privacy, we propose a blockchain-based federated learning approach IIoT. First, present platform architecture systems IIoT, enables verifiable integrity In architecture, each periodically...

10.1109/jiot.2020.3032544 article EN IEEE Internet of Things Journal 2020-10-21

Large Language Models (LLMs) have significantly impacted numerous domains, including Software Engineering (SE). Many recent publications explored LLMs applied to various SE tasks. Nevertheless, a comprehensive understanding of the application, effects, and possible limitations on is still in its early stages. To bridge this gap, we conducted systematic literature review LLM4SE, with particular focus how can be exploited optimize processes outcomes. We collect analyze 229 research papers from...

10.48550/arxiv.2308.10620 preprint EN other-oa arXiv (Cornell University) 2023-01-01

Quick Response Code has been widely used in the automatic identification fields. In order to adapting various sizes, a little dirty or damaged, and lighting conditions of bar code image, this paper proposes novel implementation real-time recognition using mobile, which is an efficient technology for data transferring. An image processing system based on mobile described be able binarize, locate, segment, decode QR Code. Our experimental results indicate that these algorithms are robust real...

10.1109/ccdc.2008.4597299 article EN Chinese Control and Decision Conference 2008-07-01

The Internet of Things (IoT) aims at connecting things to the in a peer-to-peer paradigm for data collecting and sharing our daily life. A blockchain is an immutable append-only ledger maintained by network, where whole network needs reach consensus on transactional stored ledger. With decentralization nature, design IoT aligns with each other well. Blockchain has been integrated solve existing problems. Our research focuses analyzing solutions proposed academia methodologies used integrate...

10.1109/access.2019.2914675 article EN cc-by-nc-nd IEEE Access 2019-01-01

Abstract Lipidomics research could provide insights of pathobiological mechanisms in Alzheimer’s disease. This study explores a battery plasma lipids that can differentiate disease (AD) patients from healthy controls and determines whether lipid profiles correlate with genetic risk for AD. AD samples were collected the Sydney Memory Ageing Study (MAS) Sydney, Australia (aged range 75–97 years; 51.2% male). Untargeted lipidomics analysis was performed by liquid chromatography coupled–mass...

10.1038/s41398-021-01362-2 article EN cc-by Translational Psychiatry 2021-06-06

Federated learning is an emerging privacy-preserving AI technique where clients (i.e., organizations or devices) train models locally and formulate a global model based on the local updates without transferring data externally. However, federated systems struggle to achieve trustworthiness embody responsible principles. In particular, face accountability fairness challenges due multistakeholder involvement heterogeneity in client distribution. To enhance of systems, we present...

10.1109/jiot.2022.3144450 article EN IEEE Internet of Things Journal 2022-01-19

Artificial Intelligence (AI), particularly through the advent of large-scale generative AI (GenAI) models such as Large Language Models (LLMs), has become a transformative element in contemporary technology. While these have unlocked new possibilities, they simultaneously present significant challenges, concerns over data privacy and propensity to generate misleading or fabricated content. Current frameworks for Responsible (RAI) often fall short providing granular guidance necessary...

10.1145/3644815.3644959 article EN other-oa 2024-04-14

Internet of Things (IoT) devices facilitate intelligent service delivery in a broad range settings, such as smart offices, homes and cities. However, the existing IoT access control solutions are mainly based on conventional identity management schemes use centralized architectures. There known security privacy limitations with architectures, single-point failure or surveillance (e.g., device tracking). Hence, this paper, we present an architecture for capability-based utilizing blockchain...

10.1016/j.dcan.2020.10.004 article EN cc-by-nc-nd Digital Communications and Networks 2020-10-24

Self-sovereign identity (SSI) is considered to be a "killer application" of blockchain.However, there lack systematic architecture designs for blockchain-based SSI systems support methodical development.An aspect such gap demonstrated in current solutions, which are coarse grained and may increase data security risks.In this paper, we first identify the lifecycles three major objects (i.e., key, identifier, credential) present fine-grained design patterns critical application...

10.1109/ms.2020.2992783 article EN IEEE Software 2020-05-08

In industrial wireless sensor networks, an energy-efficient quality-of-service (QoS) routing algorithm is very important to ensure that the key sensing data can be forwarded in a reliable path and solve energy balance problem. this paper, we classify into three types set their priority. Furthermore, give reliability parameters timeliness parameters, propose establish candidate forwarding node order consumption. Subsequently, QoS aware designed, algorithm, different kinds of with strategies....

10.1109/access.2018.2866165 article EN cc-by-nc-nd IEEE Access 2018-01-01

The automatic recognition algorithm of quick response code is discussed in this paper. An image processing system based on embedded described to be able binarization, location, segment, and decoding the QR code. In order adapting various sizes, gray-level values, under lighting conditions real bar image, a high-speed, high-accuracy binarization method developed, which can locate finder pattern accurately integrate local thresholding with global thresholding. Experiments have shown that over...

10.1109/isda.2006.253712 article EN 2006-10-01

Self-sovereign identity is a new management paradigm that allows entities to really have the ownership of their data and control use without involving any intermediary. Blockchain an enabling technology for building self-sovereign systems by providing neutral trustable storage computing infrastructure, can be viewed as component systems. Both blockchain are emerging technologies which could present steep learning curve architects. We collect propose 12 design patterns blockchain-based help...

10.1145/3424771.3424802 article EN 2020-07-01

The advent of Generative AI has marked a significant milestone in artificial intelligence, demonstrating remarkable capabilities generating realistic images, texts, and data patterns. However, these advancements come with heightened concerns over privacy copyright infringement, primarily due to the reliance on vast datasets for model training. Traditional approaches like differential privacy, machine unlearning, poisoning only offer fragmented solutions complex issues. Our paper delves into...

10.1145/3644815.3644952 article EN other-oa 2024-04-14

Individuals working in process facilities containing toxic gases may face gas releases and poisoning risks. Many studies regarding individual risk (IR) have been carried out on a worst scenario basis. However, the scenario‐based approach cannot represent realistic release risks overestimate IR. In this study, an based complete accident set (CASS) computational fluid dynamics (CFD) is proposed to quantitatively assess IR of facilities. By combining leakage probability joint distribution wind...

10.1002/prs.11979 article EN Process Safety Progress 2018-10-02

Vascular dementia (VaD) is a complex neurocognitive disorder secondary to variety of cerebrovascular lesions. Numerous studies have shown that lipid metabolism involved in the pathobiology disease. We examined plasma profiles VaD, with expectation identifying reliable biomarkers for VaD. 49 VaD patients and 48 healthy controls were recruited from Bankstown-Lidcombe Hospital Sydney, Australia. Lipids extracted by single phase 1-butanol/methanol, untargeted analysis was performed liquid...

10.1016/j.csbj.2020.06.001 article EN cc-by Computational and Structural Biotechnology Journal 2020-01-01
Coming Soon ...