
Yuan Tian 0003
Person information
- affiliation: King Saud University, Riyadh, Saudi Arabia
- affiliation (former): Kyung Hee University, Republic of Korea
Other persons with the same name
- Yuan Tian — disambiguation page
- Yuan Tian 0001
— University of Virginia, VA, USA (and 1 more)
- Yuan Tian 0002 — University of Texas at Dallas, TX, USA
- Yuan Tian 0004 — Auburn University, Auburn, AL, USA
- Yuan Tian 0005
— Dalian University, China
- Yuan Tian 0006 — Peking University, Beijing, China
- Yuan Tian 0008 — Singapore Management University
- Yuan Tian 0009
— Huazhong University of Science and Technology, School of Electronic Information and Communications, Wuhan, China (and 1 more)
- Yuan Tian 0010
— Shanghai Jiao Tong University, Department of Electrical Engineering, China (and 1 more)
- Yuan Tian 0011
— Shanghai Jiao Tong University, State Key Laboratory of Mechanical System and Vibration, China
- Yuan Tian 0012 — University of Paris-Saclay, France
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j38]Tinghuai Ma, Huimin Yang, Qing Tian, Yuan Tian, Najla Al-Nabhan:
A Hybrid Chinese Conversation model based on retrieval and generation. Future Gener. Comput. Syst. 114: 481-490 (2021) - [j37]Tinghuai Ma, Hongmei Wang, Lejun Zhang, Yuan Tian, Najla Al-Nabhan:
Graph classification based on structural features of significant nodes and spatial convolutional neural networks. Neurocomputing 423: 639-650 (2021) - 2020
- [j36]Tinghuai Ma
, Qian Pan, Hongmei Wang, Wenye Shao, Yuan Tian, Najla Al-Nabhan:
Graph classification algorithm based on graph structure embedding. Expert Syst. Appl. 161: 113715 (2020) - [j35]Tinghuai Ma, Qin Liu, Jie Cao, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
LGIEM: Global and local node influence based community detection. Future Gener. Comput. Syst. 105: 533-546 (2020) - [j34]Weiwei Yuan, Kangya He, Chenyang Shi, Donghai Guan, Yuan Tian, Abdullah Al-Dhelaan, Mohammed Al-Dhelaan:
Multi-view network embedding with node similarity ensemble. World Wide Web 23(5): 2699-2714 (2020) - [i2]Tinghuai Ma, Mingming Yang, Huan Rong, Yurong Qian, Yuan Tian, Najla Al-Nabhan:
Dual-path CNN with Max Gated block for Text-Based Person Re-identification. CoRR abs/2009.09343 (2020)
2010 – 2019
- 2019
- [j33]Fagen Song
, Tinghuai Ma
, Yuan Tian
, Mznah Al-Rodhaan
:
A New Method of Privacy Protection: Random k-Anonymous. IEEE Access 7: 75434-75445 (2019) - [j32]Donghai Guan
, Tingting Wang, Weiwei Yuan, Lejun Zhang, Yuan Tian, Mohammed Al-Dhelaan, Abdullah Al-Dhelaan:
SWNF: Sign Prediction of Weak Ties Based on the Network Features. IEEE Access 7: 102054-102063 (2019) - [j31]Meili Tang, Qin Liu, Tinghuai Ma
, Jie Cao, Yuan Tian
, Abdullah Al-Dhelaan, Mohammed Al-Dhelaan:
$\mathcal{K}$ -Lowest-Influence Overlapping Nodes Based Community Detection in Complex Networks. IEEE Access 7: 109646-109661 (2019) - [j30]Biao Zhou
, Mingming Zhang
, Yu-Qiang Chen
, Naixue Xiong
, Yuan Tian
, Sabbir Ahmed
:
Efficient AoA-Based Rigid Body Localization via Single Base Station for Internet of Things Applications. IEEE Access 7: 171140-171152 (2019) - [j29]Weiwei Yuan, Jiali Pang, Donghai Guan
, Yuan Tian
, Abdullah Al-Dhelaan
, Mohammed Al-Dhelaan:
Sign Prediction on Unlabeled Social Networks Using Branch and Bound Optimized Transfer Learning. Complex. 2019: 4906903:1-4906903:11 (2019) - [j28]Tinghuai Ma
, YuWei Zhao, Honghao Zhou, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
Natural disaster topic extraction in Sina microblogging based on graph analysis. Expert Syst. Appl. 115: 346-355 (2019) - [j27]YuWei Zhao, Tinghuai Ma, Yu Hao, Wenhai Shen, Yuan Tian, Abdullah Al-Dhelaan:
ICRA: index based cache replacement algorithm for cloud storage. Int. J. Sens. Networks 29(1): 48-57 (2019) - [j26]Huan Rong, Tinghuai Ma
, Jie Cao, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
Deep rolling: A novel emotion prediction model for a multi-participant communication context. Inf. Sci. 488: 158-180 (2019) - [j25]Yuan Tian, Mariya M. Kaleemullah, Mznah Al-Rodhaan, Biao Song, Abdullah Al-Dhelaan, Tinghuai Ma:
A privacy preserving location service for cloud-of-things system. J. Parallel Distributed Comput. 123: 215-222 (2019) - [j24]Alia Alabdulkarim
, Mznah Al-Rodhaan
, Tinghuai Ma
, Yuan Tian
:
PPSDT: A Novel Privacy-Preserving Single Decision Tree Algorithm for Clinical Decision-Support Systems Using IoT Devices. Sensors 19(1): 142 (2019) - [j23]Basmah Al-Otaibi
, Najla Al-Nabhan, Yuan Tian
:
Privacy-Preserving Vehicular Rogue Node Detection Scheme for Fog Computing. Sensors 19(4): 965 (2019) - 2018
- [j22]Tinghuai Ma
, Jingjing Qu, Wenhai Shen, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
Weighted Greedy Dual Size Frequency Based Caching Replacement Algorithm. IEEE Access 6: 7214-7223 (2018) - [j21]Donghai Guan, Hongqiang Wei, Weiwei Yuan, Guangjie Han
, Yuan Tian, Mohammed Al-Dhelaan, Abdullah Al-Dhelaan:
Improving Label Noise Filtering by Exploiting Unlabeled Data. IEEE Access 6: 11154-11165 (2018) - [j20]Tinghuai Ma
, Yu Hao, Wenhai Shen, Yuan Tian
, Mznah Al-Rodhaan:
An Improved Web Cache Replacement Algorithm Based on Weighting and Cost. IEEE Access 6: 27010-27017 (2018) - [j19]Tinghuai Ma
, Siyang Yu, Jie Cao, Yuan Tian
, Abdullah Al-Dhelaan, Mznah Al-Rodhaan
:
A Comparative Study of Subgraph Matching Isomorphic Methods in Social Networks. IEEE Access 6: 66621-66631 (2018) - [j18]Tinghuai Ma
, Jing Jia, Yu Xue, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
Protection of location privacy for moving kNN queries in social networks. Appl. Soft Comput. 66: 525-532 (2018) - [j17]Xiuge Wu, Tinghuai Ma
, Jie Cao, Yuan Tian, Alia Alabdulkarim:
A comparative study of clustering ensemble algorithms. Comput. Electr. Eng. 68: 603-615 (2018) - [j16]Rasha Al-Mutiri, Mznah Al-Rodhaan, Yuan Tian:
Improving Vehicular Authentication in VANET Using. Int. J. Commun. Networks Inf. Secur. 10(1) (2018) - [j15]Arwa Alromih
, Mznah Al-Rodhaan
, Yuan Tian
:
A Randomized Watermarking Technique for Detecting Malicious Data Injection Attacks in Heterogeneous Wireless Sensor Networks for Internet of Things Applications. Sensors 18(12): 4346 (2018) - [c13]Honghao Zhou, Tinghuai Ma, Jing Jia, Yuan Tian, Mznah Al-Rodhaan:
EkCRNN: A kNN Privacy Preserving Query Algorithm Based on Circular Region Extension. ICCCS (3) 2018: 32-43 - 2017
- [j14]Anees Ara
, Mznah Al-Rodhaan, Yuan Tian, Abdullah Al-Dhelaan:
A Secure Privacy-Preserving Data Aggregation Scheme Based on Bilinear ElGamal Cryptosystem for Remote Health Monitoring Systems. IEEE Access 5: 12601-12617 (2017) - 2016
- [j13]Biao Song, Mohammad Mehedi Hassan, Atif Alamri, Abdulhameed Alelaiwi, Yuan Tian, Mukaddim Pathan, Ahmad Almogren:
A two-stage approach for task and resource management in multimedia cloud environment. Computing 98(1-2): 119-145 (2016) - [j12]Tinghuai Ma
, Huan Rong, Changhong Ying, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
Detect structural-connected communities based on BSCHEF in C-DBLP. Concurr. Comput. Pract. Exp. 28(2): 311-330 (2016) - [j11]Tinghuai Ma, Limin Guo, Meili Tang, Yuan Tian, Mznah Al-Rodhaan, Abdullah Al-Dhelaan:
A Collaborative Filtering Recommendation Algorithm Based on Hierarchical Structure and Time Awareness. IEICE Trans. Inf. Syst. 99-D(6): 1512-1520 (2016) - [j10]Maram Al-Shablan, Yuan Tian, Mznah Al-Rodhaan:
Secure multi-owner-based cloud computing scheme for big data. Int. J. Big Data Intell. 3(3): 182-189 (2016) - [j9]Yinghua Lv, Tinghuai Ma
, Meili Tang, Jie Cao, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
An efficient and scalable density-based clustering algorithm for datasets with complex structures. Neurocomputing 171: 9-22 (2016) - [j8]Tinghuai Ma
, Yao Wang, Meili Tang, Jie Cao, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
LED: A fast overlapping communities detection algorithm based on structural clustering. Neurocomputing 207: 488-500 (2016) - [j7]Biao Song, Mohammad Mehedi Hassan, Yuan Tian, M. Shamim Hossain, Atif Alamri:
Remote display solution for video surveillance in multimedia cloud. Multim. Tools Appl. 75(21): 13375-13396 (2016) - [i1]Anees Ara, Mznah Al-Rodhaan, Yuan Tian, Abdullah Al-Dhelaan:
A secure service provisioning framework for cyber physical cloud computing systems. CoRR abs/1611.00374 (2016) - 2015
- [j6]Wei Tian
, Tinghuai Ma
, Yuhui Zheng, Xin Wang, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
Weighted curvature-preserving PDE image filtering method. Comput. Math. Appl. 70(6): 1336-1344 (2015) - [j5]Tinghuai Ma
, Yuliang Zhang, Jie Cao, Jian Shen, Meili Tang, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan:
KDVEM : a k-degree anonymity with vertex and edge modification algorithm. Computing 97(12): 1165-1184 (2015) - [j4]Tinghuai Ma
, Jinjuan Zhou, Meili Tang, Yuan Tian, Abdullah Al-Dhelaan, Mznah Al-Rodhaan, Sungyoung Lee:
Social Network and Tag Sources Based Augmenting Collaborative Recommender System. IEICE Trans. Inf. Syst. 98-D(4): 902-910 (2015) - 2014
- [c12]Biao Song, Yuan Tian, Mohammad Mehedi Hassan, Atif Alamri, M. Shamim Hossain, Abdulhameed Alelaiwi, Bingyin Zhou
:
Novel remote display method for multimedia cloud. ICME Workshops 2014: 1-6 - [c11]Yuan Tian, Biao Song, Mznah Al-Rodhaan, Abdullah Al-Dhelaan, Eui-Nam Huh:
Threat-based evaluation for context-aware multimedia surveillance system. ICUIMC 2014: 48:1-48:8 - [c10]Yuan Tian, Mznah Al-Rodhaan, Biao Song, Abdullah Al-Dhelaan, Tinghuai Ma
:
Somewhat homomorphic cryptography for matrix multiplication using GPU acceleration. ISBAST 2014: 166-170 - [c9]Biao Song, Yuan Tian, Bingyin Zhou
:
Design and Evaluation of Remote Video Surveillance System on Private Cloud. ISBAST 2014: 256-262 - 2013
- [j3]Yuan Tian, Biao Song, Mohammad Mehedi Hassan, Eui-nam Huh:
An efficient privacy preserving Pub-Sub system for ubiquitous computing. Int. J. Ad Hoc Ubiquitous Comput. 12(1): 23-33 (2013) - 2012
- [j2]Yuan Tian, Biao Song, Mohammad Mehedi Hassan, Eui-Nam Huh:
A Privacy-aware Graph-based Access Control System for Healthcare Domain. KSII Trans. Internet Inf. Syst. 6(10): 2708-2730 (2012) - 2011
- [j1]Yuan Tian, Biao Song, Eui-nam Huh:
A novel Threat Evaluation method for privacy-aware system in RFID. Int. J. Ad Hoc Ubiquitous Comput. 8(4): 230-240 (2011) - [c8]Yuan Tian, Biao Song, Eui-nam Huh:
Dynamic content-based cloud data integration system with privacy and cost concern. CEAS 2011: 193-199 - [c7]Yuan Tian, Biao Song, Eui-nam Huh:
A Parameterized Privacy-Aware Pub-sub System in Smart Work. FGIT-SecTech 2011: 204-214 - 2010
- [c6]Yuan Tian, Biao Song, Jimupimg Park, Eui-nam Huh:
Inter-cloud Data Integration System Considering Privacy and Cost. ICCCI (1) 2010: 195-204
2000 – 2009
- 2009
- [c5]Biao Song, Mohammad Mehedi Hassan, Yuan Tian, Eui-Nam Huh:
A Back Propagation Neural Network for Evaluating Collaborative Performance in Cloud Computing. FGIT-GDC 2009: 57-64 - [c4]Yuan Tian, Biao Song, Eui-nam Huh:
A Privacy-Aware System Using Threat-Based Evaluation and Feedback Method in Untrusted Ubiquitous Environments. FGIT-SecTech 2009: 193-200 - [c3]Yuan Tian, Biao Song, Eui-nam Huh:
Relationship Based Privacy Management for Ubiquitous Society. ICCSA (1) 2009: 853-867 - [c2]Yuan Tian, Biao Song, Eui-nam Huh:
A threat-based privacy preservation system in untrusted environment. ICHIT 2009: 102-107 - [c1]Yuan Tian, Biao Song, Eui-nam Huh:
A purpose-based privacy-aware system using privacy data graph. MoMM 2009: 412-416
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-03-02 22:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint