default search action
Jiqiang Liu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j99]Kai Yang, Qiang Li, Haining Wang, Limin Sun, Jiqiang Liu:
Fingerprinting Industrial IoT devices based on multi-branch neural network. Expert Syst. Appl. 238(Part F): 122371 (2024) - [j98]Yongkai Fan, Kaile Ma, Linlin Zhang, Jiqiang Liu, Naixue Xiong, Shui Yu:
VeriCNN: Integrity verification of large-scale CNN training process based on zk-SNARK. Expert Syst. Appl. 255: 124531 (2024) - [j97]Meng Li, Jiqiang Liu, Yeping Yang:
Automated Identification of Sensitive Financial Data Based on the Topic Analysis. Future Internet 16(2): 55 (2024) - [j96]Di Zhai, Jiqiang Liu, Tao Zhang, Jian Wang, Hongyang Du, Tianhao Liu, Tianxi Wang, Chuan Zhang, Jiawen Kang, Dusit Niyato:
EPDB: An Efficient and Privacy-Preserving Electric Charging Scheme in Internet of Robotic Things. IEEE Internet Things J. 11(20): 32464-32477 (2024) - [j95]Xuezhi Wen, Meiqi Gao, Nan Wang, Jiahui Ma, Dalin Zhang, Xibin Zhao, Jiqiang Liu:
Fairness based on anomaly score and adaptive weight in network attack detection. Inf. Sci. 678: 120972 (2024) - [j94]Junfeng An, Mengmeng Lu, Gang Li, Jiqiang Liu, Chongqing Wang:
Automated subway touch button detection using image process. J. Big Data 11(1): 119 (2024) - [j93]Zhenyan Ji, Deyan Kong, Yanyan Yang, Jiqiang Liu, Zhao Li:
ASSL-HGAT: Active semi-supervised learning empowered heterogeneous graph attention network. Knowl. Based Syst. 290: 111567 (2024) - [j92]Yalun Wu, Yingxiao Xiang, Endong Tong, Yuqi Ye, Zhibo Cui, Yunzhe Tian, Lejun Zhang, Jiqiang Liu, Zhen Han, Wenjia Niu:
Improving the Robustness of Pedestrian Detection in Autonomous Driving With Generative Data Augmentation. IEEE Netw. 38(3): 63-69 (2024) - [j91]Junfeng An, Jiqiang Liu, Mengmeng Lu, Gang Li, Huasheng Sun:
Image change combined with CNN power subway vent valve state monitoring. Signal Image Video Process. 18(3): 2151-2166 (2024) - [j90]Jinke Song, Qiang Li, Haining Wang, Jiqiang Liu:
PKVIC: Supplement Missing Software Package Information in Security Vulnerability Reports. IEEE Trans. Dependable Secur. Comput. 21(4): 3785-3800 (2024) - [j89]Jingye Shi, Ruicong Zhi, Jingru Zhao, Yuewu Hou, Zeyong Zhao, Jingyi Wu, Jiqiang Liu:
A Double-Head Global Reasoning Network for Object Detection of Remote Sensing Images. IEEE Trans. Geosci. Remote. Sens. 62: 1-16 (2024) - [j88]Xiaohan Yuan, Jiqiang Liu, Bin Wang, Wei Wang, Bin Wang, Tao Li, Xiaobo Ma, Witold Pedrycz:
FedComm: A Privacy-Enhanced and Efficient Authentication Protocol for Federated Learning in Vehicular Ad-Hoc Networks. IEEE Trans. Inf. Forensics Secur. 19: 777-792 (2024) - [j87]Jinke Song, Shangfeng Wan, Min Huang, Jiqiang Liu, Limin Sun, Qiang Li:
Toward Automatically Connecting IoT Devices with Vulnerabilities in the Wild. ACM Trans. Sens. Networks 20(1): 6:1-6:26 (2024) - [j86]Yunzhe Tian, Dongyue Xu, Endong Tong, Rui Sun, Kang Chen, Yike Li, Thar Baker, Wenjia Niu, Jiqiang Liu:
Toward Learning Model-Agnostic Explanations for Deep Learning-Based Signal Modulation Classifiers. IEEE Trans. Reliab. 73(3): 1529-1543 (2024) - [j85]Haonan Tong, Dalin Zhang, Jiqiang Liu, Weiwei Xing, Lingyun Lu, Wei Lu, Yumei Wu:
MASTER: Multi-Source Transfer Weighted Ensemble Learning for Multiple Sources Cross-Project Defect Prediction. IEEE Trans. Software Eng. 50(5): 1281-1305 (2024) - [c83]Yibo Lian, Tao Zhang, Changqiao Xu, Wei Dong, Minrui Xu, Zhenyu Xiahou, Jiawen Kang, Jiqiang Liu, Dusit Niyato:
Deep Reinforcement Learning-Based Moving Target Defense for Multicast in Software-Defined Satellite Networks. ICC 2024: 4786-4791 - [c82]Lianying He, Dalin Zhang, Dongqing Zhu, Junwen Zhang, Rui Wang, Jiqiang Liu:
Path Exploration Strategy for Symbolic Execution based on Multi-strategy Active Learning. Internetware 2024 - [c81]Xiaoshu Cui, Yalun Wu, Yanfeng Gu, Qiong Li, Endong Tong, Jiqiang Liu, Wenjia Niu:
Lurking in the Shadows: Imperceptible Shadow Black-Box Attacks Against Lane Detection Models. KSEM (3) 2024: 220-232 - [c80]Jiayin Song, Yike Li, Yunzhe Tian, Xingyu Wu, Qiong Li, Endong Tong, Wenjia Niu, Zhenguo Zhang, Jiqiang Liu:
Knowledge-Driven Backdoor Removal in Deep Neural Networks via Reinforcement Learning. KSEM (3) 2024: 336-348 - [c79]Xiaoting Lyu, Yufei Han, Wei Wang, Jingkai Liu, Yongsheng Zhu, Guangquan Xu, Jiqiang Liu, Xiangliang Zhang:
Lurking in the shadows: Unveiling Stealthy Backdoor Attacks against Personalized Federated Learning. USENIX Security Symposium 2024 - [i27]Hangsheng Zhang, Dongqi Han, Yinlong Liu, Zhiliang Wang, Jiyan Sun, Shangyuan Zhuang, Jiqiang Liu, Jinsong Dong:
Explainable and Transferable Adversarial Attack for ML-Based Network Intrusion Detectors. CoRR abs/2401.10691 (2024) - [i26]Hangsheng Zhang, Jiqiang Liu, Jinsong Dong:
CARE: Ensemble Adversarial Robustness Evaluation Against Adaptive Attackers for Security Applications. CoRR abs/2401.11126 (2024) - [i25]Xiaoxiao Liu, Fan Xu, Nan Wang, Qinxin Zhao, Dalin Zhang, Xibin Zhao, Jiqiang Liu:
LTRDetector: Exploring Long-Term Relationship for Advanced Persistent Threats Detection. CoRR abs/2404.03162 (2024) - [i24]Xiaoyan Zhou, Ying Zhang, Wenjia Niu, Jiqiang Liu, Haining Wang, Qiang Li:
OSS Malicious Package Analysis in the Wild. CoRR abs/2404.04991 (2024) - [i23]Xiaoyan Zhou, Feiran Liang, Zhaojie Xie, Yang Lan, Wenjia Niu, Jiqiang Liu, Haining Wang, Qiang Li:
A Large-scale Fine-grained Analysis of Packages in Open-Source Software Ecosystems. CoRR abs/2404.11467 (2024) - [i22]Xiaoting Lyu, Yufei Han, Wei Wang, Jingkai Liu, Yongsheng Zhu, Guangquan Xu, Jiqiang Liu, Xiangliang Zhang:
Lurking in the shadows: Unveiling Stealthy Backdoor Attacks against Personalized Federated Learning. CoRR abs/2406.06207 (2024) - [i21]Ying Zhang, Xiaoyan Zhou, Hui Wen, Wenjia Niu, Jiqiang Liu, Haining Wang, Qiang Li:
Tactics, Techniques, and Procedures (TTPs) in Interpreted Malware: A Zero-Shot Generation with Large Language Models. CoRR abs/2407.08532 (2024) - [i20]Chao Li, Runhua Xu, Balaji Palanisamy, Li Duan, Meng Shen, Jiqiang Liu, Wei Wang:
Blockchain Takeovers in Web 3.0: An Empirical Study on the TRON-Steem Incident. CoRR abs/2407.17825 (2024) - 2023
- [j84]Meng Li, Jiqiang Liu, Yeping Yang:
Financial Data Quality Evaluation Method Based on Multiple Linear Regression. Future Internet 15(10): 338 (2023) - [j83]Li Duan, Yangyang Sun, Wei Ni, Weiping Ding, Jiqiang Liu, Wei Wang:
Attacks Against Cross-Chain Systems and Defense Approaches: A Contemporary Survey. IEEE CAA J. Autom. Sinica 10(8): 1647-1667 (2023) - [j82]Tong Chen, Jiqiang Liu, Thar Baker, Yalun Wu, Yingxiao Xiang, Yike Li, Wenjia Niu, Endong Tong, Albert Y. Zomaya:
A Mutual Information-Based Assessment of Reverse Engineering on Rewards of Reinforcement Learning. IEEE Trans. Artif. Intell. 4(5): 1089-1100 (2023) - [j81]Heng Ye, Qiang Zeng, Jiqiang Liu, Xiaojiang Du, Wei Wang:
Easy Peasy: A New Handy Method for Pairing Multiple COTS IoT Devices. IEEE Trans. Dependable Secur. Comput. 20(4): 3483-3494 (2023) - [j80]Dalin Zhang, Yi Xu, Yunjuan Peng, Chenyue Du, Nan Wang, Mincong Tang, Lingyun Lu, Jiqiang Liu:
An Interpretable Station Delay Prediction Model Based on Graph Community Neural Network and Time-Series Fuzzy Decision Tree. IEEE Trans. Fuzzy Syst. 31(2): 421-433 (2023) - [j79]Yuqing Zhu, Jiqiang Liu:
Constructing CM Fields for NFS to Accelerate DL Computation in Non-Prime Finite Fields. IEEE Trans. Inf. Theory 69(6): 4045-4055 (2023) - [j78]Xudong He, Jian Wang, Jiqiang Liu, Weiping Ding, Zhen Han, Bin Wang, Jamel Nebhen, Wei Wang:
DNS Rebinding Threat Modeling and Security Analysis for Local Area Network of Maritime Transportation Systems. IEEE Trans. Intell. Transp. Syst. 24(2): 2643-2655 (2023) - [c78]Xiaoting Lyu, Yufei Han, Wei Wang, Jingkai Liu, Bin Wang, Jiqiang Liu, Xiangliang Zhang:
Poisoning with Cerberus: Stealthy and Colluded Backdoor Attack against Federated Learning. AAAI 2023: 9020-9028 - [c77]Chao Li, Balaji Palanisamy, Runhua Xu, Li Duan, Jiqiang Liu, Wei Wang:
How Hard is Takeover in DPoS Blockchains? Understanding the Security of Coin-based Voting Governance. CCS 2023: 150-164 - [c76]Yingying Yao, Xiaolin Chang, Lin Li, Jiqiang Liu, Jelena V. Misic, Vojislav B. Misic:
DIDs-Assisted Secure Cross-Metaverse Authentication Scheme for MEC-Enabled Metaverse. ICC 2023: 6318-6323 - [c75]Yike Li, Yunzhe Tian, Endong Tong, Wenjia Niu, Jiqiang Liu:
Robust Reinforcement Learning via Progressive Task Sequence. IJCAI 2023: 455-463 - [c74]Yunzhe Tian, Yike Li, Kang Chen, Endong Tong, Wenjia Niu, Jiqiang Liu, Fangyun Qin, Zheng Zheng:
Mitigating Overfitting for Deep Learning-based Aging-related Bug Prediction via Brain-inspired Regularization in Spiking Neural Networks. ISSREW 2023: 214-221 - [c73]Tianxi Wang, Jiqiang Liu, Tianhao Liu, Di Zhai, Jian Wang, Tao Zhang:
Secure and Scalable Blockchain for IIoT with Dual Compression Scheme. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2023: 1-6 - [c72]Pengna Liu, Ziyan Qiao, Yalun Wu, Kang Chen, Jiasong Hou, Yingqi Cai, Liqun Chu, Endong Tong, Wenjia Niu, Jiqiang Liu:
Traffic Signal Timing Optimization Based on Intersection Importance in Vehicle-Road Collaboration. ML4CS 2023: 74-89 - [c71]Shuli Zhu, Lingkun Li, Xuyu Wang, Changcheng Liu, Yuqin Jiang, Zengwei Huo, Hua Chai, Jiqiang Liu, Dan Tao, Ruipeng Gao:
Experience: Large-scale Cellular Localization for Pickup Position Recommendation at Black-hole. MobiCom 2023: 84:1-84:15 - [i19]Nan Wang, Xuezhi Wen, Dalin Zhang, Xibin Zhao, Jiahui Ma, Mengxia Luo, Sen Nie, Shi Wu, Jiqiang Liu:
TBDetector: Transformer-Based Detector for Advanced Persistent Threats with Provenance Graph. CoRR abs/2304.02838 (2023) - [i18]Chao Li, Balaji Palanisamy, Runhua Xu, Li Duan, Jiqiang Liu, Wei Wang:
How Hard is Takeover in DPoS Blockchains? Understanding the Security of Coin-based Voting Governance. CoRR abs/2310.18596 (2023) - 2022
- [j77]Yingying Yao, Xiaolin Chang, Lin Li, Jiqiang Liu, Hong Wang:
Dual Privacy-Preserving Lightweight Navigation System for Vehicular Networks. IEEE Access 10: 121120-121132 (2022) - [j76]Xiao Zhang, Jiqiang Liu, Zhongjie Ba, Yaodong Tao, Xiaochun Cheng:
MobiScan: An enhanced invisible screen-camera communication system for IoT applications. Trans. Emerg. Telecommun. Technol. 33(4) (2022) - [j75]Yingxiao Xiang, Chao Li, Tong Chen, Yike Li, Endong Tong, Wenjia Niu, Qiong Li, Jiqiang Liu, Wei Wang:
Toward Blockchain-Based Spoofing Defense for Controlled Optimization of Phases in Traffic Signal System. IEICE Trans. Inf. Syst. 105-D(2): 280-288 (2022) - [j74]Yixiang Wang, Jiqiang Liu, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic:
IWA: Integrated gradient-based white-box attacks for fooling deep neural networks. Int. J. Intell. Syst. 37(7): 4253-4276 (2022) - [j73]Yixiang Wang, Jiqiang Liu, Xiaolin Chang, Ricardo J. Rodríguez, Jianhua Wang:
DI-AA: An interpretable white-box attack for fooling deep neural networks. Inf. Sci. 610: 14-32 (2022) - [j72]Yixiang Wang, Jiqiang Liu, Xiaolin Chang, Jianhua Wang, Ricardo J. Rodríguez:
AB-FGSM: AdaBelief optimizer and FGSM-based approach to generate adversarial examples. J. Inf. Secur. Appl. 68: 103227 (2022) - [j71]Yanling Dong, Shufen Zhang, Jingcheng Xu, Haoshi Wang, Jiqiang Liu:
Random Forest Algorithm Based on Linear Privacy Budget Allocation. J. Database Manag. 33(2): 1-19 (2022) - [j70]Heng Ye, Jiqiang Liu, Hao Zhen, Wenbin Jiang, Bin Wang, Wei Wang:
VREFL: Verifiable and Reconnection-Efficient Federated Learning in IoT scenarios. J. Netw. Comput. Appl. 207: 103486 (2022) - [j69]Peng Wu, Zhenjie Hou, Jiqiang Liu, Jinzhao Wu:
Reasoning Method Based on Intervals with Symmetric Truncated Normal Density. Symmetry 14(1): 25 (2022) - [j68]Jin Li, Heng Ye, Tong Li, Wei Wang, Wenjing Lou, Y. Thomas Hou, Jiqiang Liu, Rongxing Lu:
Efficient and Secure Outsourcing of Differentially Private Data Publishing With Multiple Evaluators. IEEE Trans. Dependable Secur. Comput. 19(1): 67-76 (2022) - [j67]Qiang Li, Dawei Tan, Xin Ge, Haining Wang, Zhi Li, Jiqiang Liu:
Understanding Security Risks of Embedded Devices Through Fine-Grained Firmware Fingerprinting. IEEE Trans. Dependable Secur. Comput. 19(6): 4099-4112 (2022) - [j66]Yike Li, Wenjia Niu, Yunzhe Tian, Tong Chen, Zhiqiang Xie, Yalun Wu, Yingxiao Xiang, Endong Tong, Thar Baker, Jiqiang Liu:
Multiagent Reinforcement Learning-Based Signal Planning for Resisting Congestion Attack in Green Transportation. IEEE Trans. Green Commun. Netw. 6(3): 1448-1458 (2022) - [j65]Endong Tong, Wenjia Niu, Jiqiang Liu:
A Missing QoS Prediction Approach via Time-Aware Collaborative Filtering. IEEE Trans. Serv. Comput. 15(6): 3115-3128 (2022) - [c70]Dan Su, Jiqiang Liu, Sencun Zhu, Xiaoyang Wang, Wei Wang:
Alexa Skills: Security Vulnerabilities and Countermeasures. CNS 2022: 1-9 - [c69]Di Zhai, Jian Wang, Jiqiang Liu, Tianhao Liu, Wenjia Niu:
Efficient-HotStuff: A BFT Blockchain Consensus with Higher Efficiency and Stronger Robustness. ICPADS 2022: 217-225 - [c68]Ziyan Qiao, Rui Sun, Shiyao Chen, Dong Zi, Xingyu Wu, Qian Wang, Endong Tong, Wenjia Niu, Jiqiang Liu:
Adapting on Road Traffic-Oriented Controlled Optimization of Phases to Heterogeneous Intersections. Intelligent Information Processing 2022: 522-535 - [c67]Yingying Yao, Xiaolin Chang, Lin Li, Jiqiang Liu, Jelena V. Misic, Vojislav B. Misic:
Metaverse-AKA: A Lightweight and PrivacyPreserving Seamless Cross-Metaverse Authentication and Key Agreement Scheme. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 2421-2427 - 2021
- [j64]Tong Chen, Jiqiang Liu, Yingxiao Xiang, Wenjia Niu, Endong Tong, Shuoru Wang, He Li, Liang Chang, Gang Li, Qi Alfred Chen:
Adversarial retraining attack of asynchronous advantage actor-critic based pathfinding. Int. J. Intell. Syst. 36(5): 2323-2346 (2021) - [j63]Yingdi Wang, Yunzhe Tian, Jiqiang Liu, Wenjia Niu, Endong Tong:
A Training-Based Identification Approach to VIN Adversarial Examples in Path Planning. J. Circuits Syst. Comput. 30(13): 2150229:1-2150229:21 (2021) - [j62]Tong Chen, Jiqiang Liu, He Li, Shuoru Wang, Wenjia Niu, Endong Tong, Liang Chang, Qi Alfred Chen, Gang Li:
Robustness Assessment of Asynchronous Advantage Actor-Critic Based on Dynamic Skewness and Sparseness Computation: A Parallel Computing View. J. Comput. Sci. Technol. 36(5): 1002-1021 (2021) - [j61]Yunzhe Tian, Jiqiang Liu, Endong Tong, Wenjia Niu, Liang Chang, Qi Alfred Chen, Gang Li, Wei Wang:
Towards Revealing Parallel Adversarial Attack on Politician Socialnet of Graph Structure. Secur. Commun. Networks 2021: 6631247:1-6631247:13 (2021) - [j60]Endong Tong, Wenjia Niu, Yunzhe Tian, Jiqiang Liu, Thar Baker, Sandeep Verma, Zheli Liu:
A Hierarchical Energy-Efficient Service Selection Approach With QoS Constraints for Internet of Things. IEEE Trans. Green Commun. Netw. 5(2): 645-657 (2021) - [j59]Lun Li, Xiaolin Chang, Jingxian Liu, Jiqiang Liu, Zhu Han:
Bit2CV: A Novel Bitcoin Anti-Fraud Deposit Scheme for Connected Vehicles. IEEE Trans. Intell. Transp. Syst. 22(7): 4181-4193 (2021) - [j58]Lichen Cheng, Jiqiang Liu, Yi Jin, Yidong Li, Wei Wang:
Account Guarantee Scheme: Making Anonymous Accounts Supervised in Blockchain. ACM Trans. Internet Techn. 21(1): 11:1-11:19 (2021) - [j57]Qiang Li, Zhihao Wang, Dawei Tan, Jinke Song, Haining Wang, Limin Sun, Jiqiang Liu:
GeoCAM: An IP-Based Geolocation Service Through Fine-Grained and Stable Webcam Landmarks. IEEE/ACM Trans. Netw. 29(4): 1798-1812 (2021) - [c66]Guozhi Zhang, Jiqiang Liu, Xiaolin Chang:
Mec2: Mobile Edge Computing enabled Caching Framework for Internet of Vehicles. BigCom 2021: 14-21 - [c65]Qiang Li, Jinke Song, Dawei Tan, Haining Wang, Jiqiang Liu:
PDGraph: A Large-Scale Empirical Study on Project Dependency of Security Vulnerabilities. DSN 2021: 161-173 - [c64]Shuang Zhao, Yalun Wu, Rui Sun, Xiaoai Qian, Dong Zi, Zhiqiang Xie, Endong Tong, Wenjia Niu, Jiqiang Liu, Zhen Han:
Blockchain-based decentralized federated learning: A secure and privacy-preserving system. HPCC/DSS/SmartCity/DependSys 2021: 941-948 - [c63]Zhiqiang Xie, Yingxiao Xiang, Yike Li, Shuang Zhao, Endong Tong, Wenjia Niu, Jiqiang Liu, Jian Wang:
Security Analysis of Poisoning Attacks Against Multi-agent Reinforcement Learning. ICA3PP (1) 2021: 660-675 - [c62]Yufei Liu, Jiqiang Liu, Jian Wang, Tianhao Liu, Xudong He:
BSS-ITS: Blockchain Scaling Scheme with Sharding for Intelligent Transportation System: Scale Blockchain for Better Data Exchange and Storage with Full Sharding for Intelligent Transportation System. ICBTA 2021: 128-134 - [c61]Tianhao Liu, Jiqiang Liu, Jian Wang, Di Zhai, Yufei Liu, Xudong He:
Anonymous Storage and Verification Model of IIoT Based on Blockchain: Anonymous storage and verification model of IIoT production status based on blockchain. ICBTA 2021: 144-150 - [c60]Yalun Wu, Minglu Song, Yike Li, Yunzhe Tian, Endong Tong, Wenjia Niu, Bowei Jia, Haixiang Huang, Qiong Li, Jiqiang Liu:
Improving Convolutional Neural Network-Based Webshell Detection Through Reinforcement Learning. ICICS (1) 2021: 368-383 - [c59]Tong Chen, Yingxiao Xiang, Yike Li, Yunzhe Tian, Endong Tong, Wenjia Niu, Jiqiang Liu, Gang Li, Qi Alfred Chen:
Protecting Reward Function of Reinforcement Learning via Minimal and Non-catastrophic Adversarial Trajectory. SRDS 2021: 299-309 - [i17]Yixiang Wang, Jiqiang Liu, Xiaolin Chang:
Generalizing Adversarial Examples by AdaBelief Optimizer. CoRR abs/2101.09930 (2021) - [i16]Yixiang Wang, Jiqiang Liu, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic:
IWA: Integrated Gradient based White-box Attacks for Fooling Deep Neural Networks. CoRR abs/2102.02128 (2021) - [i15]Dan Su, Jiqiang Liu, Sencun Zhu, Xiaoyang Wang, Wei Wang, Xiangliang Zhang:
AppQ: Warm-starting App Recommendation Based on View Graphs. CoRR abs/2109.03798 (2021) - [i14]Yixiang Wang, Jiqiang Liu, Xiaolin Chang, Jianhua Wang, Ricardo J. Rodríguez:
DI-AA: An Interpretable White-box Attack for Fooling Deep Neural Networks. CoRR abs/2110.07305 (2021) - 2020
- [j56]Yixiang Wang, ShaoHua Lv, Jiqiang Liu, Xiaolin Chang, Jinqiang Wang:
On the combination of data augmentation method and gated convolution model for building effective and robust intrusion detection. Cybersecur. 3(1): 23 (2020) - [j55]Heng Ye, Jiqiang Liu, Wei Wang, Ping Li, Tong Li, Jin Li:
Secure and efficient outsourcing differential privacy data release scheme in Cyber-physical system. Future Gener. Comput. Syst. 108: 1314-1323 (2020) - [j54]Ziqi Yan, Gang Li, Jiqiang Liu:
Private rank aggregation under local differential privacy. Int. J. Intell. Syst. 35(10): 1492-1519 (2020) - [j53]Lun Li, Jiqiang Liu, Xiaolin Chang, Tianhao Liu, Jingxian Liu:
Toward conditionally anonymous Bitcoin transactions: A lightweight-script approach. Inf. Sci. 509: 290-303 (2020) - [j52]Wei Wang, Yaoyao Shang, Yongzhong He, Yidong Li, Jiqiang Liu:
BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors. Inf. Sci. 511: 284-296 (2020) - [j51]Xinyu Huang, Yunzhe Tian, Yifei He, Endong Tong, Wenjia Niu, Chenyang Li, Jiqiang Liu, Liang Chang:
Exposing Spoofing Attack on Flocking-Based Unmanned Aerial Vehicle Cluster: A Threat to Swarm Intelligence. Secur. Commun. Networks 2020: 8889122:1-8889122:15 (2020) - [j50]Shuo Qiu, Boyang Wang, Ming Li, Jiqiang Liu, Yanfeng Shi:
Toward Practical Privacy-Preserving Frequent Itemset Mining on Encrypted Cloud Data. IEEE Trans. Cloud Comput. 8(1): 312-323 (2020) - [j49]Xing Liu, Jiqiang Liu, Sencun Zhu, Wei Wang, Xiangliang Zhang:
Privacy Risk Analysis and Mitigation of Analytics Libraries in the Android Ecosystem. IEEE Trans. Mob. Comput. 19(5): 1184-1199 (2020) - [j48]Yike Li, Yingxiao Xiang, Endong Tong, Wenjia Niu, Bowei Jia, Long Li, Jiqiang Liu, Zhen Han:
An Empirical Study on GAN-Based Traffic Congestion Attack Analysis: A Visualized Method. Wirel. Commun. Mob. Comput. 2020: 8823300:1-8823300:14 (2020) - [c58]Wenping Ji, Jian Wang, Xudong He, Jiqiang Liu:
Malware Analysis Method Based Random Access Memory in Android. ATIS 2020: 78-94 - [c57]Bowei Jia, Yunzhe Tian, Di Zhao, Xiaojin Wang, Chenyang Li, Wenjia Niu, Endong Tong, Jiqiang Liu:
Bidirectional RNN-Based Few-Shot Training for Detecting Multi-stage Attack. Inscrypt 2020: 37-52 - [c56]Xudong He, Jian Wang, Jiqiang Liu, Zhen Han, Zhuo Lv, Wei Wang:
DNS Rebinding Detection for Local Internet of Things Devices. FCS 2020: 19-29 - [c55]Yunzhe Tian, Yingdi Wang, Endong Tong, Wenjia Niu, Liang Chang, Qi Alfred Chen, Gang Li, Jiqiang Liu:
Exploring Data Correlation between Feature Pairs for Generating Constraint-based Adversarial Examples. ICPADS 2020: 430-437 - [c54]Xiaojin Wang, Yingxiao Xiang, Wenjia Niu, Endong Tong, Jiqiang Liu:
Explainable Congestion Attack Prediction and Software-level Reinforcement in Intelligent Traffic Signal System. ICPADS 2020: 667-672 - [c53]Xu Gao, Jiqiang Liu, Yike Li, Xiaojin Wang, Yingxiao Xiang, Endong Tong, Wenjia Niu, Zhen Han:
Queue Length Estimation Based Defence Against Data Poisoning Attack for Traffic Signal Control. Intelligent Information Processing 2020: 254-265 - [c52]Xiaojin Wang, Yingxiao Xiang, Wenjia Niu, Endong Tong, Qi Alfred Chen, Gang Li, Jiqiang Liu, Long Li:
Constructing Optimal Sparse Decision Tree for Analying I-SIG System Attack. ISPA/BDCloud/SocialCom/SustainCom 2020: 321-328 - [c51]Shuoru Wang, Jiqiang Liu, Tong Chen, He Li, Wenjia Niu, Endong Tong, Long Li, Minglu Song:
A Configurable off-Policy Evaluation with Key State-Based Bias Constraints in AI Reinforcement Learning. SocialSec 2020: 120-131 - [c50]Yifei He, Jiqiang Liu, Endong Tong, Wenjia Niu, Xinyu Huang, Ying Zhou, Chenyang Li, Liang Chang:
Adapt Swarm Path Planning for UAV Based on Artificial Potential Field with Birds Intelligence Extensions. SocialSec 2020: 340-354 - [c49]Chao Li, Balaji Palanisamy, Runhua Xu, Jian Wang, Jiqiang Liu:
NF-Crowd: Nearly-free Blockchain-based Crowdsourcing. SRDS 2020: 41-50 - [c48]Yingdi Wang, Yixiang Wang, Endong Tong, Wenjia Niu, Jiqiang Liu:
A C-IFGSM Based Adversarial Approach for Deep Learning Based Intrusion Detection. VECoS 2020: 207-221 - [c47]Peng Wu, Ning Xiong, Jiqiang Liu, Jie Meng, Jinzhao Wu:
Quadratic Difference Set-Based Quorum Generation Algorithm in Distributed System. WSSE 2020: 85-89 - [i13]Chao Li, Balaji Palanisamy, Runhua Xu, Jian Wang, Jiqiang Liu:
NF-Crowd: Nearly-free Blockchain-based Crowdsourcing. CoRR abs/2009.02561 (2020) - [i12]Dan Su, Jiqiang Liu, Sencun Zhu, Xiaoyang Wang, Wei Wang:
"Are you home alone?" "Yes" Disclosing Security and Privacy Vulnerabilities in Alexa Skills. CoRR abs/2010.10788 (2020)
2010 – 2019
- 2019
- [j47]Dan Su, Jiqiang Liu, Xiaoyang Wang, Wei Wang:
Detecting Android Locker-Ransomware on Chinese Social Networks. IEEE Access 7: 20381-20393 (2019) - [j46]Yixiang Wang, Jiqiang Liu, Jelena V. Misic, Vojislav B. Misic, ShaoHua Lv, Xiaolin Chang:
Assessing Optimizer Impact on DNN Model Sensitivity to Adversarial Examples. IEEE Access 7: 152766-152776 (2019) - [j45]Ziqi Yan, Qiong Wu, Meng Ren, Jiqiang Liu, Shaowu Liu, Shuo Qiu:
Locally private Jaccard similarity estimation. Concurr. Comput. Pract. Exp. 31(24) (2019) - [j44]Tong Chen, Jiqiang Liu, Yingxiao Xiang, Wenjia Niu, Endong Tong, Zhen Han:
Adversarial attack and defense in reinforcement learning-from AI security view. Cybersecur. 2(1): 11 (2019) - [j43]Ziqi Yan, Jiqiang Liu, Shaowu Liu:
DPWeVote: differentially private weighted voting protocol for cloud-based decision-making. Enterp. Inf. Syst. 13(2): 236-256 (2019) - [j42]Nannan Xie, Xing Wang, Wei Wang, Jiqiang Liu:
Fingerprinting Android malware families. Frontiers Comput. Sci. 13(3): 637-646 (2019) - [j41]Lichen Cheng, Jiqiang Liu, Chunhua Su, Kaitai Liang, Guangquan Xu, Wei Wang:
Polynomial-based modifiable blockchain structure for removing fraud transactions. Future Gener. Comput. Syst. 99: 154-163 (2019) - [j40]Xinwei Gao, Jintai Ding, R. V. Saraswathy, Lin Li, Jiqiang Liu:
Comparison analysis and efficient implementation of reconciliation-based RLWE key exchange protocol. Int. J. High Perform. Comput. Netw. 13(2): 141-152 (2019) - [j39]Xiao Zhang, Jiqiang Liu, Si Chen, Yongjun Kong, Kui Ren:
PriWhisper+: An Enhanced Acoustic Short-Range Communication System for Smartphones. IEEE Internet Things J. 6(1): 614-627 (2019) - [j38]Lichen Cheng, Jiqiang Liu, Guangquan Xu, Zonghua Zhang, Hao Wang, Hong-Ning Dai, Yulei Wu, Wei Wang:
SCTSC: A Semicentralized Traffic Signal Control Mode With Attribute-Based Blockchain in IoVs. IEEE Trans. Comput. Soc. Syst. 6(6): 1373-1385 (2019) - [c46]Lun Li, Ali Arab, Jiqiang Liu, Jingxian Liu, Zhu Han:
Bitcoin Options Pricing Using LSTM-Based Prediction Model and Blockchain Statistics. Blockchain 2019: 67-74 - [c45]Yixiang Wang, Jiqiang Liu, Xiaolin Chang:
Assessing transferability of adversarial examples against malware detection classifiers. CF 2019: 211-214 - [c44]Yinqi Yang, Jian Wang, Baoqin Zhai, Jiqiang Liu:
IoT-Based DDoS Attack Detection and Mitigation Using the Edge of SDN. CSS (2) 2019: 3-17 - [c43]Yanfeng Shi, Shuo Qiu, Jiqiang Liu:
An Efficient Lattice-Based IBE Scheme Using Combined Public Key. ICBDS 2019: 3-16 - [c42]Bei Li, Yinqiao Li, Chen Xu, Ye Lin, Jiqiang Liu, Hui Liu, Ziyang Wang, Yuhao Zhang, Nuo Xu, Zeyang Wang, Kai Feng, Hexuan Chen, Tengbo Liu, Yanyang Li, Qiang Wang, Tong Xiao, Jingbo Zhu:
The NiuTrans Machine Translation Systems for WMT19. WMT (2) 2019: 257-266 - [i11]Jian Wang, Yacong Geng, Jiqiang Liu:
Adaptive Quantum Image Encryption Method Based on Wavelet Transform. CoRR abs/1901.07762 (2019) - [i10]Di Zhao, Jiqiang Liu, Jialin Wang, Wenjia Niu, Endong Tong, Tong Chen, Gang Li:
Bidirectional RNN-based Few-shot Training for Detecting Multi-stage Attack. CoRR abs/1905.03454 (2019) - [i9]Ziqi Yan, Gang Li, Jiqiang Liu:
Private Rank Aggregation under Local Differential Privacy. CoRR abs/1908.04486 (2019) - 2018
- [j37]Wei Wang, Zhenzhen Gao, Meichen Zhao, Yidong Li, Jiqiang Liu, Xiangliang Zhang:
DroidEnsemble: Detecting Android Malicious Applications With Ensemble of String and Structural Static Features. IEEE Access 6: 31798-31807 (2018) - [j36]ShaoHua Lv, Jian Wang, Yinqi Yang, Jiqiang Liu:
Intrusion Prediction With System-Call Sequence-to-Sequence Model. IEEE Access 6: 71413-71421 (2018) - [j35]Dan Su, Jiqiang Liu, Wei Wang, Xiaoyang Wang, Xiaojiang Du, Mohsen Guizani:
Discovering communities of malapps on Android-based mobile cyber-physical systems. Ad Hoc Networks 80: 104-115 (2018) - [j34]Wei Wang, Yuanyuan Li, Xing Wang, Jiqiang Liu, Xiangliang Zhang:
Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers. Future Gener. Comput. Syst. 78: 987-994 (2018) - [j33]Xing Liu, Jiqiang Liu, Wei Wang, Sencun Zhu:
Android single sign-on security: Issues, taxonomy and directions. Future Gener. Comput. Syst. 89: 402-420 (2018) - [j32]Xinwei Gao, Jintai Ding, Lin Li, Saraswathy RV, Jiqiang Liu:
Efficient Implementation of Password-based Authenticated Key Exchange from RLWE and Post-Quantum TLS. Int. J. Netw. Secur. 20(5): 923-930 (2018) - [j31]Wei Wang, Jiqiang Liu, Georgios Pitsilis, Xiangliang Zhang:
Abstracting massive data for lightweight intrusion detection in computer networks. Inf. Sci. 433-434: 417-430 (2018) - [j30]Xinwei Gao, Jintai Ding, Lin Li, Jiqiang Liu:
Practical Randomized RLWE-Based Key Exchange Against Signal Leakage Attack. IEEE Trans. Computers 67(11): 1584-1593 (2018) - [j29]Shuo Qiu, Jiqiang Liu, Yanfeng Shi, Ming Li, Wei Wang:
Identity-Based Private Matching over Outsourced Encrypted Datasets. IEEE Trans. Cloud Comput. 6(3): 747-759 (2018) - [j28]Xiaolin Chang, Ruofan Xia, Jogesh K. Muppala, Kishor S. Trivedi, Jiqiang Liu:
Effective Modeling Approach for IaaS Data Center Performance Analysis under Heterogeneous Workload. IEEE Trans. Cloud Comput. 6(4): 991-1003 (2018) - [j27]Lun Li, Jiqiang Liu, Lichen Cheng, Shuo Qiu, Wei Wang, Xiangliang Zhang, Zonghua Zhang:
CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles. IEEE Trans. Intell. Transp. Syst. 19(7): 2204-2220 (2018) - [j26]Jia Zhao, Jiqiang Liu, Zhan Qin, Kui Ren:
Privacy Protection Scheme Based on Remote Anonymous Attestation for Trusted Smart Meters. IEEE Trans. Smart Grid 9(4): 3313-3320 (2018) - [j25]Xing Liu, Jiqiang Liu, Wei Wang, Yongzhong He, Xiangliang Zhang:
Discovering and understanding android sensor usage behaviors with data flow analysis. World Wide Web 21(1): 105-126 (2018) - [c41]Yingxiao Xiang, Wenjia Niu, Jiqiang Liu, Tong Chen, Zhen Han:
A PCA-Based Model to Predict Adversarial Examples on Q-Learning of Path Finding. DSC 2018: 773-780 - [c40]XiaoXuan Bai, Wenjia Niu, Jiqiang Liu, Xu Gao, Yingxiao Xiang, Jingjing Liu:
Adversarial Examples Construction Towards White-Box Q Table Variation in DQN Pathfinding Training. DSC 2018: 781-787 - [c39]Chunjing Qiu, Jiqiang Liu, Yingxiao Xiang, Wenjia Niu, Tong Chen:
Intention-Aware Multi-channel Keyword Extension for Content Security. DSC 2018: 788-794 - [c38]Shuanshuan Pang, Wenjia Niu, Jiqiang Liu, Yingxiao Xiang, Yingdi Wang:
An Approach to Generate Topic Similar Document by Seed Extraction-Based SeqGAN Training for Bait Document. DSC 2018: 803-810 - [c37]Jin Li, Heng Ye, Wei Wang, Wenjing Lou, Y. Thomas Hou, Jiqiang Liu, Rongxing Lu:
Efficient and Secure Outsourcing of Differentially Private Data Publication. ESORICS (2) 2018: 187-206 - [c36]Guozhi Zhang, Jiqiang Liu, Xiaolin Chang, Yang Yang:
Interest Relevance-Based Caching Design in Content-Centric Networking. ICA3PP (3) 2018: 661-671 - [c35]Xudong He, Jian Wang, Jiqiang Liu, Lei Han, Yang Yu, ShaoHua Lv:
Hierarchical Filtering Method of Alerts Based on Multi-Source Information Correlation Analysis. ICCCN 2018: 1-6 - [c34]Yang Yu, Jian Wang, Jiqiang Liu, Lei Han, Xudong He, ShaoHua Lv:
Multi-Dimension Threat Situation Assessment Based on Network Security Attributes. ICCCN 2018: 1-2 - [c33]Jiaping Men, Wei Wang, Jiqiang Liu, Zhen Han:
Designing Mutual Authentication Protocols in Industrial Wireless Network. ICDIS 2018: 153-158 - [c32]Xu Gao, Wenjia Niu, Jingjing Liu, Tong Chen, Yingxiao Xiang, XiaoXuan Bai, Jiqiang Liu:
A DeepWalk-Based Approach to Defend Profile Injection Attack in Recommendation System. Intelligent Information Processing 2018: 213-222 - [c31]Qiang Wang, Bei Li, Jiqiang Liu, Bojian Jiang, Zheyang Zhang, Yinqiao Li, Ye Lin, Tong Xiao, Jingbo Zhu:
The NiuTrans Machine Translation System for WMT18. WMT (shared task) 2018: 528-534 - [i8]Dan Su, Jiqiang Liu, Wei Wang, Xiaoyang Wang, Xiaojiang Du, Mohsen Guizani:
Discovering Communities of Malapps on Android-based Mobile Cyber-physical Systems. CoRR abs/1804.01641 (2018) - [i7]Tong Chen, Wenjia Niu, Yingxiao Xiang, XiaoXuan Bai, Jiqiang Liu, Zhen Han, Gang Li:
Gradient Band-based Adversarial Training for Generalized Attack Immunity of A3C Path Finding. CoRR abs/1807.06752 (2018) - [i6]ShaoHua Lv, Jian Wang, Yinqi Yang, Jiqiang Liu:
Intrusion Prediction with System-call Sequence-to-Sequence Model. CoRR abs/1808.01717 (2018) - [i5]Yingdi Wang, Wenjia Niu, Tong Chen, Yingxiao Xiang, Jingjing Liu, Gang Li, Jiqiang Liu:
A Training-based Identification Approach to VIN Adversarial Examples. CoRR abs/1810.08070 (2018) - 2017
- [j24]Guozhi Zhang, Jiqiang Liu, Xiaolin Chang, Zhi Chen:
Combining Popularity and Locality to Enhance In-Network Caching Performance and Mitigate Pollution Attacks in Content-Centric Networking. IEEE Access 5: 19012-19022 (2017) - [j23]Shuo Qiu, Jiqiang Liu, Yanfeng Shi, Rui Zhang:
Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack. Sci. China Inf. Sci. 60(5): 052105:1-052105:12 (2017) - [j22]Gang Li, Wenjia Niu, Lynn Batten, Jiqiang Liu:
New advances in securing cyberspace and curbing crowdturfing. Concurr. Comput. Pract. Exp. 29(20) (2017) - [j21]Xing Wang, Wei Wang, Yongzhong He, Jiqiang Liu, Zhen Han, Xiangliang Zhang:
Characterizing Android apps' behavior for effective detection of malapps at large scale. Future Gener. Comput. Syst. 75: 30-45 (2017) - [j20]Yang Yang, Xiaolin Chang, Jiqiang Liu, Lin Li:
Towards Robust Green Virtual Cloud Data Center Provisioning. IEEE Trans. Cloud Comput. 5(2): 168-181 (2017) - [c30]Xinwei Gao, Jintai Ding, Jiqiang Liu, Lin Li:
Post-Quantum Secure Remote Password Protocol from RLWE Problem. Inscrypt 2017: 99-116 - [c29]Jingjing Liu, Wenjia Niu, Jiqiang Liu, Jia Zhao, Tong Chen, Yinqi Yang, Yingxiao Xiang, Lei Han:
A Method to Effectively Detect Vulnerabilities on Path Planning of VIN. ICICS 2017: 374-384 - [c28]XiaoXuan Bai, Yingxiao Xiang, Wenjia Niu, Jiqiang Liu, Tong Chen, Jingjing Liu, Tong Wu:
A Cross-Modal CCA-Based Astroturfing Detection Approach. ICICS 2017: 582-592 - [c27]Xinwei Gao, Lin Li, Jintai Ding, Jiqiang Liu, R. V. Saraswathy, Zhe Liu:
Fast Discretized Gaussian Sampling and Post-quantum TLS Ciphersuite. ISPEC 2017: 551-565 - [c26]Tong Chen, Noora Hashim Alallaq, Wenjia Niu, Yingdi Wang, XiaoXuan Bai, Jingjing Liu, Yingxiao Xiang, Tong Wu, Jiqiang Liu:
A Hidden Astroturfing Detection Approach Base on Emotion Analysis. KSEM 2017: 55-66 - [i4]Ziqi Yan, Jiqiang Liu, Gang Li, Zhen Han, Shuo Qiu:
PrivMin: Differentially Private MinHash for Jaccard Similarity Computation. CoRR abs/1705.07258 (2017) - [i3]Xinwei Gao, Jintai Ding, Saraswathy RV, Lin Li, Jiqiang Liu:
Comparison analysis and efficient implementation of reconciliation-based RLWE key exchange protocol. IACR Cryptol. ePrint Arch. 2017: 1178 (2017) - [i2]Xinwei Gao, Jintai Ding, Lin Li, Saraswathy RV, Jiqiang Liu:
Efficient Implementation of Password-Based Authenticated Key Exchange from RLWE and Post-Quantum TLS. IACR Cryptol. ePrint Arch. 2017: 1192 (2017) - [i1]Xinwei Gao, Jintai Ding, Jiqiang Liu, Lin Li:
Post-Quantum Secure Remote Password Protocol from RLWE Problem. IACR Cryptol. ePrint Arch. 2017: 1196 (2017) - 2016
- [j19]Zhonghua Wang, Zhen Han, Jiqiang Liu:
Public verifiability for shared data in cloud storage with a defense against collusion attacks. Sci. China Inf. Sci. 59(3): 39101:1-39101:3 (2016) - [j18]Bianqing Yuan, Jiqiang Liu:
A universally composable secure grouping-proof protocol for RFID tags. Concurr. Comput. Pract. Exp. 28(6): 1872-1883 (2016) - [j17]Yanfeng Shi, Jiqiang Liu, Zhen Han, Shuo Qiu:
Deterministic attribute-based encryption. Int. J. High Perform. Comput. Netw. 9(5/6): 443-450 (2016) - [j16]Guang Yang, Jiqiang Liu, Lei Han:
An ID-based node key management scheme based on PTPM in MANETs. Secur. Commun. Networks 9(15): 2816-2826 (2016) - [j15]Xiaolin Chang, Bin Wang, Jogesh K. Muppala, Jiqiang Liu:
Modeling Active Virtual Machines on IaaS Clouds Using an M/G/m/m+K Queue. IEEE Trans. Serv. Comput. 9(3): 408-420 (2016) - [c25]Shuo Qiu, Boyang Wang, Ming Li, Jesse Victors, Jiqiang Liu, Yanfeng Shi, Wei Wang:
Fast, Private and Verifiable: Server-aided Approximate Similarity Computation over Large-Scale Datasets. SCC@AsiaCCS 2016: 29-36 - [c24]Lun Li, Meihong Li, Jiqiang Liu, Jia Zhao:
An SDKEY Data Protection and Sharing Scheme with Attribute-Based Encryption for Smartphone. ES 2016: 104-109 - [c23]Xing Liu, Sencun Zhu, Wei Wang, Jiqiang Liu:
Alde: Privacy Risk Analysis of Analytics Libraries in the Android Ecosystem. SecureComm 2016: 655-672 - [c22]Dan Su, Wei Wang, Xing Wang, Jiqiang Liu:
Anomadroid: Profiling Android Applications' Behaviors for Identifying Unknown Malapps. Trustcom/BigDataSE/ISPA 2016: 691-698 - 2015
- [j14]Xuezhen Huang, Jiqiang Liu, Zhen Han, Jun Yang:
Privacy beyond sensitive values. Sci. China Inf. Sci. 58(7): 1-15 (2015) - [j13]Changlong Tang, Jiqiang Liu:
Selecting a trusted cloud service provider for your SaaS program. Comput. Secur. 50: 60-73 (2015) - [j12]Bin Xing, Zhen Han, Xiaolin Chang, Jiqiang Liu:
OB-IMA: out-of-the-box integrity measurement approach for guest virtual machines. Concurr. Comput. Pract. Exp. 27(5): 1092-1109 (2015) - [j11]Bin Wang, Xiaolin Chang, Jiqiang Liu:
Modeling Heterogeneous Virtual Machines on IaaS Data Centers. IEEE Commun. Lett. 19(4): 537-540 (2015) - [j10]Wei Wang, Yongzhong He, Jiqiang Liu, Sylvain Gombault:
Constructing important features from massive network traffic for lightweight intrusion detection. IET Inf. Secur. 9(6): 374-379 (2015) - [j9]Yanfeng Shi, Qingji Zheng, Jiqiang Liu, Zhen Han:
Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation. Inf. Sci. 295: 221-231 (2015) - [c21]Xing Liu, Wei Wang, Jiqiang Liu:
POSTER: The Popular Apps in Your Pocket Are Leaking Your Privacy. CCS 2015: 1653-1655 - [c20]Xing Liu, Jiqiang Liu, Wei Wang:
Exploring sensor usage behaviors of Android applications based on data flow analysis. IPCCC 2015: 1-8 - 2014
- [j8]Wei Wang, Xing Wang, Dawei Feng, Jiqiang Liu, Zhen Han, Xiangliang Zhang:
Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection. IEEE Trans. Inf. Forensics Secur. 9(11): 1869-1882 (2014) - [c19]Xuezhen Huang, Jiqiang Liu, Zhen Han:
A Privacy-Aware Access Model on Anonymized Data. INTRUST 2014: 201-212 - [c18]Xing Liu, Jiqiang Liu:
A Two-Layered Permission-Based Android Malware Detection Scheme. MobileCloud 2014: 142-148 - 2013
- [c17]Wenbo Wang, Xiaolin Chang, Jiqiang Liu, Bin Wang:
Simulated annealing based resource allocation for cloud data centers. GECCO (Companion) 2013: 81-82 - [c16]Xiaolin Chang, Bin Wang, Jiqiang Liu, Wenbo Wang, Jogesh K. Muppala:
Green cloud virtual network provisioning based ant colony optimization. GECCO (Companion) 2013: 1553-1560 - [c15]Yang Yang, Xiaolin Chang, Xuanni Du, Jiqiang Liu, Lin Li:
Effective and efficient AI-based approaches to cloud resource provisioning. ICON 2013: 1-6 - [c14]Shuo Qiu, Jiqiang Liu, Yanfeng Shi:
Identity-Based Symmetric Private Set Intersection. SocialCom 2013: 653-658 - 2012
- [c13]Bin Wang, Xiaolin Chang, Jiqiang Liu, Jogesh K. Muppala:
Reducing power consumption in embedding virtual infrastructures. GLOBECOM Workshops 2012: 714-718 - [c12]Xiaolin Chang, Jogesh K. Muppala, Bin Wang, Jiqiang Liu, Longmei Sun:
Migration cost aware virtual network re-embedding in presence of resource failures. ICON 2012: 24-29 - [c11]Xiaolin Chang, Bin Wang, Jiqiang Liu:
Network state aware virtual network parallel embedding. IPCCC 2012: 193-194 - [c10]Xiuming Mi, Xiaolin Chang, Jiqiang Liu, Longmei Sun, Bin Xing:
Embedding Virtual Infrastructure Based on Genetic Algorithm. PDCAT 2012: 239-244 - [c9]Xiaolin Chang, Bin Xing, Jiqiang Liu, Zhonglan Yuan, Longmei Sun:
Robust and Efficient Response to TCG TOCTOU Attacks in TPVM. PDCAT 2012: 323-328 - 2011
- [j7]Lei Han, Jiqiang Liu, Zhen Han, Xueye Wei:
Design and implementation of a portable TPM scheme for general-purpose trusted computing based on EFI. Frontiers Comput. Sci. China 5(2): 169-180 (2011) - [j6]Ye Du, Jiqiang Liu, Ruhui Zhang, Jieyuan Li:
A Dynamic Security Mechanism for Web Services Based on NDIS Intermediate Drivers. J. Comput. 6(10): 2021-2028 (2011) - 2010
- [j5]Rui Zhang, Jiqiang Liu, Zhen Han, Lijuan Zheng:
An IBE scheme using ECC combined public key. Comput. Electr. Eng. 36(6): 1046-1054 (2010) - [j4]Jiqiang Liu, Xun Chen, Zhen Han:
Full and partial deniability for authentication schemes. Frontiers Comput. Sci. China 4(4): 516-521 (2010) - [j3]Fan Wu, Sheng Zhong, Jiqiang Liu:
An optimal, strategy-proof scheme for multi-path traffic assignment in non-cooperative networks. IEEE Trans. Wirel. Commun. 9(3): 1012-1021 (2010)
2000 – 2009
- 2009
- [j2]Jiqiang Liu, Sheng Zhong:
Analysis of Kim-Jeon-Yoo Password Authentication Schemes. Cryptologia 33(2): 183-187 (2009) - [j1]Fan Wu, Jiqiang Liu, Sheng Zhong:
An efficient protocol for private and accurate mining of support counts. Pattern Recognit. Lett. 30(1): 80-86 (2009) - [c8]Xiaolin Chang, Bin Xing, Jiqiang Liu, Jogesh K. Muppala:
LWRM: A lightweight response mechanism for TCG TOCTOU attack. IPCCC 2009: 200-207 - 2008
- [c7]Xiaolin Chang, Jogesh K. Muppala, Zhen Han, Jiqiang Liu:
Analysis of Interrupt Coalescing Schemes for Receive-Livelock Problem in Gigabit Ethernet Network Hosts. ICC 2008: 1835-1839 - [c6]Jiqiang Liu, Jia Zhao, Zhen Han:
A remote anonymous attestation protocol in trusted computing. IPDPS 2008: 1-6 - 2007
- [c5]Fan Wu, Sheng Zhong, Jiqiang Liu:
Cost-Effective Traffic Assignment for Multipath Routing in Selfish Networks. GLOBECOM 2007: 453-457 - [c4]Xiaogang Yang, Jiqiang Liu, Ning Li:
Congestion Control Based on Priority Drop for H.264/SVC. MUE 2007: 585-589 - 2005
- [c3]Yong Zhao, Zhen Han, Jiqiang Liu, Zhigang Li:
An Efficient and Divisible Payment Scheme for M-Commerce. KES (3) 2005: 488-496 - [c2]Xin Liu, Zhen Han, Jiqiang Liu, Chang-xiang Shen:
Develop Secure Database System with Security Extended ER Model. KES (3) 2005: 1005-1010 - 2004
- [c1]Ke-jun Sheng, Jiqiang Liu, Xin Liu:
Organization structure based access control model. InfoSecu 2004: 210-215
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:36 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint