default search action
Hongyun Cai 0002
Person information
- affiliation (PhD 2020): Yanshan University, School of Information Science and Engineering, Qinhuangdao, China
- affiliation (since 2005): Hebei University, School of Cyber Security and Computer, Baoding, China
Other persons with the same name
- Hongyun Cai 0001 — Tencent, Shenzhen, China (and 2 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j12]Hongyun Cai, Lijing Gao, Jiahao Wang, Fengyu Li:
Reliable incentive mechanism in hierarchical federated learning based on two-way reputation and contract theory. Future Gener. Comput. Syst. 159: 533-544 (2024) - [j11]Hongyun Cai, Jiahao Wang, Lijing Gao, Fengyu Li:
FLMAAcBD: Defending against backdoors in Federated Learning via Model Anomalous Activation Behavior Detection. Knowl. Based Syst. 289: 111511 (2024) - [j10]Liuling Qi, Junfeng Tian, Mengjia Chai, Hongyun Cai:
STFM: a blockchain sharding algorithm based on trust field model for heterogeneous Internet of Things. J. Supercomput. 80(3): 3875-3901 (2024) - 2023
- [j9]Liuling Qi, Junfeng Tian, Mengjia Chai, Hongyun Cai:
LightPoW: A trust based time-constrained PoW for blockchain in internet of things. Comput. Networks 220: 109480 (2023) - [j8]Liuling Qi, Junfeng Tian, Mengjia Chai, Hongyun Cai:
A Cooperative PoW and Incentive Mechanism for Blockchain in Edge Computing. IEEE Internet Things J. 10(20): 18111-18124 (2023) - 2022
- [j7]Jiawei Shen, Junfeng Tian, Ziyuan Wang, Hongyun Cai:
Friendship links-based privacy-preserving algorithm against inference attacks. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part B): 9363-9375 (2022) - 2021
- [j6]Hongyun Cai, Fuzhi Zhang:
An Unsupervised Approach for Detecting Group Shilling Attacks in Recommender Systems Based on Topological Potential and Group Behaviour Features. Secur. Commun. Networks 2021: 2907691:1-2907691:18 (2021) - [j5]Hongyun Cai, Fuzhi Zhang:
BS-SC: An Unsupervised Approach for Detecting Shilling Profiles in Collaborative Recommender Systems. IEEE Trans. Knowl. Data Eng. 33(4): 1375-1388 (2021) - 2020
- [j4]Junfeng Tian, Lizheng Xue, Hongyun Cai:
An Algorithm Based on Influence to Predict Invisible Relationship. Wirel. Commun. Mob. Comput. 2020: 8829845:1-8829845:12 (2020) - 2019
- [j3]Ruizhong Du, Jiaojiao Lu, Hongyun Cai:
Double Regularization Matrix Factorization Recommendation Algorithm. IEEE Access 7: 139668-139677 (2019) - [j2]Hongyun Cai, Fuzhi Zhang:
An Unsupervised Method for Detecting Shilling Attacks in Recommender Systems by Mining Item Relationship and Identifying Target Items. Comput. J. 62(4): 579-597 (2019) - [j1]Hongyun Cai, Fuzhi Zhang:
Detecting shilling attacks in recommender systems based on analysis of user rating behavior. Knowl. Based Syst. 177: 22-43 (2019)
Conference and Workshop Papers
- 2024
- [c9]Hongyun Cai, Meiling Zhang, Shiyun Wang, Ao Zhao, Yu Zhang:
PLFa-FL: Personalized Local Differential Privacy for Fair Federated Learning. CSCWD 2024: 2325-2332 - [c8]Hongyun Cai, Ao Zhao, Chuan Feng, Xun Li:
Information Diffusion Prediction Based on User Behavior Characteristics. ICWS 2024: 1057-1066 - [c7]Hongyun Cai, Chuan Feng, Ao Zhao, Xun Li:
MMCasN: Macroscopic and microscopic properties fusion for predicting information cascades. IJCNN 2024: 1-9 - [c6]Hongyun Cai, Fengyu Li, Chuan Feng:
FedRecTID: A General Robust Federated Recommendation Framework Based on Target Items Detection. IJCNN 2024: 1-8 - 2023
- [c5]Hongyun Cai, Shiyun Wang, Yu Zhang, Meiling Zhang, Ao Zhao:
A Poisoning Attack Based on Variant Generative Adversarial Networks in Recommender Systems. ADMA (4) 2023: 371-386 - [c4]Hongyun Cai, Ao Zhao, Shiyun Wang, Meiling Zhang, Yu Zhang:
Personalized Privacy Risk Assessment Based on Deep Neural Network for Image Sharing on Social Networks. ICA3PP (2) 2023: 255-274 - 2018
- [c3]Junfeng Tian, Lizheng Xue, Hongyun Cai:
An Algorithm Based on Influence to Predict Invisible Relationship. AsiaJCIS 2018: 54-61 - 2011
- [c2]Hongyun Cai, Zhen Li, Junfeng Tian:
A New Trust Evaluation Model Based on Cloud Theory in E-Commerce Environment. IPTC 2011: 139-142 - 2010
- [c1]Hongyun Cai, Zhen Li, Junfeng Tian:
Study on the Recommendation Trust Model Based on Encouragement and Punishment. ICEE 2010: 1355-1358
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:36 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint