<?xml version="1.0"?>
<dblpperson name="Wenmao Liu" pid="62/9032" n="47">
<person key="homepages/62/9032" mdate="2011-01-24">
<author pid="62/9032">Wenmao Liu</author>
</person>
<r><article key="journals/tetc/WangXCXLZZ26" mdate="2026-03-25">
<author orcid="0000-0002-2291-9443" pid="190/6584">Xiangqi Wang</author>
<author orcid="0000-0003-2408-503X" pid="03/11506">Mingfu Xue</author>
<author orcid="0009-0008-2502-5796" pid="48/3404-4">Kewei Chen 0004</author>
<author orcid="0000-0002-0408-9984" pid="07/1951">Jing Xu</author>
<author orcid="0009-0000-2046-5305" pid="62/9032">Wenmao Liu</author>
<author orcid="0000-0001-9330-2662" pid="117/3526">Leo Yu Zhang</author>
<author orcid="0000-0001-8183-8435" pid="78/8511-1">Yushu Zhang 0001</author>
<title>IsBad: Imperceptible Sample-Specific Backdoor to DNN With Denoising Autoencoder.</title>
<year>2026</year>
<month>January - March</month>
<pages>30-41</pages>
<volume>14</volume>
<journal>IEEE Trans. Emerg. Top. Comput.</journal>
<number>1</number>
<ee>https://doi.org/10.1109/TETC.2025.3631134</ee>
<url>db/journals/tetc/tetc14.html#WangXCXLZZ26</url>
<stream>streams/journals/tetc</stream>
</article>
</r>
<r><article key="journals/tie/QiaoLLXJ26" mdate="2026-03-30">
<author orcid="0000-0003-4512-7841" pid="277/2974">Tianhuai Qiao</author>
<author orcid="0000-0003-1465-7014" pid="38/1164">Weili Li</author>
<author orcid="0000-0003-0980-2125" pid="62/9032">Wenmao Liu</author>
<author orcid="0000-0001-6808-4843" pid="189/5198">Guorui Xu</author>
<author orcid="0009-0009-0709-9473" pid="431/2864">Huiyong Jin</author>
<title>Design Considerations and Many-Objective Optimization of Synchronous Condenser Used for New Energy Power System Based on Electromagnetic-Thermal Constraints.</title>
<year>2026</year>
<month>April</month>
<pages>5293-5304</pages>
<volume>73</volume>
<journal>IEEE Trans. Ind. Electron.</journal>
<number>4</number>
<ee>https://doi.org/10.1109/TIE.2025.3637402</ee>
<url>db/journals/tie/tie73.html#QiaoLLXJ26</url>
<stream>streams/journals/tie</stream>
</article>
</r>
<r><article key="journals/tse/LiuLZJTLWY25" mdate="2025-09-12">
<author orcid="0000-0003-4117-2047" pid="97/2274-90">Yu Liu 0090</author>
<author orcid="0000-0002-8881-0037" pid="29/3826-1">Tong Li 0001</author>
<author orcid="0000-0003-2929-2484" pid="210/3288">Runzi Zhang</author>
<author orcid="0009-0002-6539-797X" pid="80/6899">Zhao Jin</author>
<author orcid="0009-0000-7477-2925" pid="247/3305">Mingkai Tong</author>
<author orcid="0009-0000-2046-5305" pid="62/9032">Wenmao Liu</author>
<author orcid="0000-0001-9536-7339" pid="25/9448">Yiting Wang</author>
<author orcid="0000-0002-6058-0217" pid="70/2539-4">Zhen Yang 0004</author>
<title>A Context-Aware Clustering Approach for Assisting Operators in Classifying Security Alerts.</title>
<pages>153-171</pages>
<year>2025</year>
<month>January</month>
<volume>51</volume>
<journal>IEEE Trans. Software Eng.</journal>
<number>1</number>
<ee>https://doi.org/10.1109/TSE.2024.3497588</ee>
<url>db/journals/tse/tse51.html#LiuLZJTLWY25</url>
<stream>streams/journals/tse</stream>
</article>
</r>
<r><inproceedings key="conf/bigdatasec/ZhangGCCL25" mdate="2026-04-22">
<author pid="126/5240">Yuxuan Zhang</author>
<author pid="12/5941-1">Hua Guo 0001</author>
<author pid="406/4083">Chen</author>
<author pid="193/9307">Junxin Chen</author>
<author pid="62/9032">Wenmao Liu</author>
<title>High-Performance Implementation Architecture for Additive Homomorphic Encryption Algorithms on FPGA.</title>
<pages>58-63</pages>
<year>2025</year>
<booktitle>BigDataSecurity</booktitle>
<ee>https://doi.org/10.1109/BigDataSecurity66063.2025.00010</ee>
<crossref>conf/bigdatasec/2025</crossref>
<url>db/conf/bigdatasec/bigdatasec2025.html#ZhangGCCL25</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iasam/Xu0LLL25" mdate="2025-07-29">
<author pid="189/5198">Guorui Xu</author>
<author pid="153/5855-4">Guangliang Yang 0004</author>
<author pid="14/5778">Zhiqiang Li</author>
<author pid="62/9032">Wenmao Liu</author>
<author pid="38/1164">Weili Li</author>
<title>Influence of Rotor Slot Wedge Material on Temperature Distribution of Dual-Excited Synchronous Condenser during Asynchronous Operation.</title>
<pages>1-6</pages>
<year>2025</year>
<booktitle>IAS</booktitle>
<ee>https://doi.org/10.1109/IAS62731.2025.11061424</ee>
<crossref>conf/iasam/2025</crossref>
<url>db/conf/iasam/ias2025.html#Xu0LLL25</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icics/LinYWLG25" mdate="2025-11-15">
<author orcid="0009-0005-9243-8169" pid="418/7778">Xiaocong Lin</author>
<author orcid="0000-0001-7060-5820" pid="273/9564">Weijing You</author>
<author orcid="0009-0001-0380-6945" pid="97/2027">Chenchen Wu</author>
<author orcid="0009-0000-2046-5305" pid="62/9032">Wenmao Liu</author>
<author orcid="0000-0002-8343-6234" pid="18/4144">Qi Gu</author>
<title>TA-PDC: Provable Data Contribution with Traceable Anonymous for Group Transactions.</title>
<pages>463-483</pages>
<year>2025</year>
<booktitle>ICICS (1)</booktitle>
<ee>https://doi.org/10.1007/978-981-95-3540-8_25</ee>
<crossref>conf/icics/2025-1</crossref>
<url>db/conf/icics/icics2025-1.html#LinYWLG25</url>
<stream>streams/conf/icics</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/ijcai/LiLWLY0L25" mdate="2025-09-24">
<author pid="51/4015">Zhuo Li</author>
<author pid="402/2300">Yuena Lin</author>
<author pid="36/4627-1">Yipeng Wang 0001</author>
<author pid="62/9032">Wenmao Liu</author>
<author pid="60/5440">Mingliang Yu</author>
<author pid="70/2539-4">Zhen Yang 0004</author>
<author pid="218/6818">Gengyu Lyu</author>
<title>Critical Node-aware Augmentation for Hypergraph Contrastive Learning.</title>
<pages>5671-5679</pages>
<year>2025</year>
<booktitle>IJCAI</booktitle>
<ee type="oa">https://doi.org/10.24963/ijcai.2025/631</ee>
<crossref>conf/ijcai/2025</crossref>
<url>db/conf/ijcai/ijcai2025.html#LiLWLY0L25</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ksem/ZhangLRZ25" mdate="2026-02-01">
<author pid="75/2717">Huiying Zhang</author>
<author pid="62/9032">Wenmao Liu</author>
<author orcid="0000-0001-8590-1737" pid="92/5008-2">Wei Ren 0002</author>
<author pid="40/4372-2">Xianchao Zhang 0002</author>
<title>CertBA: A Decentralized Authentication Scheme via Blockchain and Dynamic Cryptographic Accumulator.</title>
<pages>104-115</pages>
<year>2025</year>
<booktitle>KSEM (4)</booktitle>
<ee>https://doi.org/10.1007/978-981-95-3058-8_9</ee>
<crossref>conf/ksem/2025-4</crossref>
<url>db/conf/ksem/ksem2025-4.html#ZhangLRZ25</url>
<stream>streams/conf/ksem</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/trustcom/LinXLC25" mdate="2026-02-22">
<author pid="401/8328">Zhangting Lin</author>
<author pid="03/11506">Mingfu Xue</author>
<author pid="62/9032">Wenmao Liu</author>
<author pid="27/1061">Liquan Chen</author>
<title>Adversarial Example Based Fingerprint Embedding for Robust Copyright Protection in Split Learning.</title>
<booktitle>TrustCom</booktitle>
<year>2025</year>
<pages>1038-1045</pages>
<crossref>conf/trustcom/2025</crossref>
<ee>https://doi.org/10.1109/Trustcom66490.2025.00120</ee>
<url>db/conf/trustcom/trustcom2025.html#LinXLC25</url>
<stream>streams/conf/trustcom</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/wasa/LiuRCLZZ25" mdate="2025-07-02">
<author pid="173/5146">Jiahao Liu</author>
<author pid="92/5008-2">Wei Ren 0002</author>
<author pid="169/4588">Yifei Cai</author>
<author pid="62/9032">Wenmao Liu</author>
<author pid="40/4372-2">Xianchao Zhang 0002</author>
<author pid="19/8310">Tianqing Zhu</author>
<title>A Lightweight Transformation Method for Privacy Protection in Image Classification.</title>
<pages>96-106</pages>
<year>2025</year>
<booktitle>WASA (3)</booktitle>
<ee>https://doi.org/10.1007/978-981-96-8731-2_10</ee>
<crossref>conf/wasa/2025-3</crossref>
<url>db/conf/wasa/wasa2025-3.html#LiuRCLZZ25</url>
<stream>streams/conf/wasa</stream>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2503-04825" mdate="2025-05-16">
<author pid="401/8328">Zhangting Lin</author>
<author pid="03/11506">Mingfu Xue</author>
<author pid="48/3404-4">Kewei Chen 0004</author>
<author pid="62/9032">Wenmao Liu</author>
<author pid="14/3881">Xiang Gao</author>
<author pid="117/3526">Leo Yu Zhang</author>
<author pid="39/449-38">Jian Wang 0038</author>
<author pid="78/8511-1">Yushu Zhang 0001</author>
<title>Adversarial Example Based Fingerprinting for Robust Copyright Protection in Split Learning.</title>
<year>2025</year>
<month>March</month>
<volume>abs/2503.04825</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2503.04825</ee>
<url>db/journals/corr/corr2503.html#abs-2503-04825</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article key="journals/compsec/ChenLL24" mdate="2024-02-10">
<author orcid="0000-0002-8159-4984" pid="60/2">Hongsong Chen</author>
<author orcid="0000-0003-2791-944X" pid="45/2385">Xingyu Li</author>
<author pid="62/9032">Wenmao Liu</author>
<title>Multivariate time series anomaly detection by fusion of deep convolution residual autoencoding reconstruction model and ConvLstm forecasting model.</title>
<pages>103581</pages>
<year>2024</year>
<month>February</month>
<volume>137</volume>
<journal>Comput. Secur.</journal>
<ee>https://doi.org/10.1016/j.cose.2023.103581</ee>
<url>db/journals/compsec/compsec137.html#ChenLL24</url>
</article>
</r>
<r><article key="journals/tifs/XiangLBLYLRC24" mdate="2025-10-10">
<author orcid="0000-0001-5959-4817" pid="274/1902">Yuexin Xiang</author>
<author orcid="0009-0005-4610-6550" pid="284/6377">Yuchen Lei</author>
<author orcid="0009-0005-1447-2548" pid="253/3099">Ding Bao</author>
<author orcid="0000-0002-8289-4348" pid="69/10124-4">Tiantian Li 0004</author>
<author pid="49/10304">Qingqing Yang</author>
<author orcid="0009-0000-2046-5305" pid="62/9032">Wenmao Liu</author>
<author orcid="0000-0001-8590-1737" pid="92/5008-2">Wei Ren 0002</author>
<author orcid="0000-0001-9208-5336" pid="c/KimKwangRaymondChoo">Kim-Kwang Raymond Choo</author>
<title>BABD: A Bitcoin Address Behavior Dataset for Pattern Analysis.</title>
<pages>2171-2185</pages>
<year>2024</year>
<volume>19</volume>
<journal>IEEE Trans. Inf. Forensics Secur.</journal>
<ee>https://doi.org/10.1109/TIFS.2023.3347894</ee>
<ee>https://www.wikidata.org/entity/Q124305725</ee>
<url>db/journals/tifs/tifs19.html#XiangLBLYLRC24</url>
</article>
</r>
<r><article key="journals/ton/QuMLSLXLLFG24" mdate="2025-01-19">
<author orcid="0000-0003-1713-0859" pid="67/10326">Jian Qu</author>
<author orcid="0000-0002-0934-5035" pid="18/10062">Xiaobo Ma</author>
<author orcid="0009-0000-2046-5305" pid="62/9032">Wenmao Liu</author>
<author pid="322/9868">Hongqing Sang</author>
<author orcid="0000-0002-3453-0195" pid="10/3844-6">Jianfeng Li 0006</author>
<author orcid="0000-0001-5321-5740" pid="68/2052-1">Lei Xue 0001</author>
<author orcid="0000-0002-9082-3208" pid="53/1565">Xiapu Luo</author>
<author orcid="0000-0001-7286-122X" pid="61/1951-1">Zhenhua Li 0001</author>
<author pid="39/456">Li Feng</author>
<author orcid="0000-0002-8826-0362" pid="45/503">Xiaohong Guan</author>
<title>On Smartly Scanning of the Internet of Things.</title>
<pages>1019-1034</pages>
<year>2024</year>
<month>April</month>
<volume>32</volume>
<journal>IEEE/ACM Trans. Netw.</journal>
<number>2</number>
<ee>https://doi.org/10.1109/TNET.2023.3312162</ee>
<ee>https://www.wikidata.org/entity/Q130955718</ee>
<url>db/journals/ton/ton32.html#QuMLSLXLLFG24</url>
</article>
</r>
<r><inproceedings key="conf/cscwd/ZhaoLCLNBLZ24" mdate="2024-10-08">
<author pid="380/7539">Enze Zhao</author>
<author pid="83/6353-46">Peng Li 0046</author>
<author pid="72/5232">Zhang Cheng</author>
<author pid="62/9032">Wenmao Liu</author>
<author pid="03/1496">Lei Nie</author>
<author orcid="0009-0000-1138-8766" pid="214/0814">Haizhou Bao</author>
<author orcid="0000-0002-8979-5094" pid="06/2123-3">Qin Liu 0003</author>
<author pid="55/957">Kai Zhang</author>
<title>Masked Transformer-based Multi-GAN for 5G Core Network KPI Anomaly Detection.</title>
<pages>2601-2606</pages>
<year>2024</year>
<booktitle>CSCWD</booktitle>
<ee>https://doi.org/10.1109/CSCWD61410.2024.10580693</ee>
<crossref>conf/cscwd/2024</crossref>
<url>db/conf/cscwd/cscwd2024.html#ZhaoLCLNBLZ24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ica3pp/LiuRLZ24" mdate="2025-04-01">
<author orcid="0009-0003-9506-9587" pid="98/738">Xinyu Liu</author>
<author orcid="0000-0001-8590-1737" pid="92/5008-2">Wei Ren 0002</author>
<author orcid="0009-0000-2046-5305" pid="62/9032">Wenmao Liu</author>
<author orcid="0000-0001-8047-3059" pid="14/7437">Xianghan Zheng</author>
<title>A Data Watermark Scheme Base on Data Converted Bitmap for Data Trading.</title>
<pages>270-289</pages>
<year>2024</year>
<booktitle>ICA3PP (4)</booktitle>
<ee>https://doi.org/10.1007/978-981-96-1545-2_16</ee>
<crossref>conf/ica3pp/2024-4</crossref>
<url>db/conf/ica3pp/ica3pp2024-4.html#LiuRLZ24</url>
<stream>streams/conf/ica3pp</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/icnp/ChengHWYJWPZLZT24" mdate="2025-10-14">
<author pid="344/6903">Daguo Cheng</author>
<author pid="73/2845-4">Lin He 0004</author>
<author pid="397/3454">Chentian Wei</author>
<author pid="230/1810">Qilei Yin</author>
<author pid="397/3481">Boran Jin</author>
<author orcid="0009-0008-8227-3745" pid="23/2730">Zhaoan Wang</author>
<author pid="397/3360">Xiaoteng Pan</author>
<author pid="323/7039">Sixu Zhou</author>
<author pid="91/112-24">Ying Liu 0024</author>
<author pid="54/6434">Shenglin Zhang</author>
<author pid="397/3353">Fuchao Tan</author>
<author pid="62/9032">Wenmao Liu</author>
<title>Luori: Active Probing and Evaluation of Internet-Wide IPv6 Fully Responsive Prefixes.</title>
<pages>1-12</pages>
<year>2024</year>
<booktitle>ICNP</booktitle>
<ee>https://doi.org/10.1109/ICNP61940.2024.10858548</ee>
<crossref>conf/icnp/2024</crossref>
<url>db/conf/icnp/icnp2024.html#ChengHWYJWPZLZT24</url>
</inproceedings>
</r>
<r><article key="journals/computing/WuWLL23" mdate="2023-08-05">
<author orcid="0000-0003-4478-4663" pid="23/2702">Yong Wu</author>
<author pid="261/3000">Binjun Wang</author>
<author pid="64/6025">Wei Li</author>
<author pid="62/9032">Wenmao Liu</author>
<title>Signed directed attention network.</title>
<pages>1647-1671</pages>
<year>2023</year>
<month>August</month>
<volume>105</volume>
<journal>Computing</journal>
<number>8</number>
<ee>https://doi.org/10.1007/s00607-023-01158-w</ee>
<url>db/journals/computing/computing105.html#WuWLL23</url>
</article>
</r>
<r><article key="journals/kbs/QuML23" mdate="2023-03-28">
<author orcid="0000-0003-1713-0859" pid="67/10326">Jian Qu</author>
<author orcid="0000-0002-0934-5035" pid="18/10062">Xiaobo Ma</author>
<author pid="62/9032">Wenmao Liu</author>
<title>Who is DNS serving for? A human-software perspective of modeling DNS services.</title>
<pages>110279</pages>
<year>2023</year>
<month>March</month>
<volume>263</volume>
<journal>Knowl. Based Syst.</journal>
<ee>https://doi.org/10.1016/j.knosys.2023.110279</ee>
<url>db/journals/kbs/kbs263.html#QuML23</url>
</article>
</r>
<r><inproceedings key="conf/icpads/WangLCLNBLZ23" mdate="2024-10-06">
<author pid="181/2695">Min Wang</author>
<author pid="83/6353-46">Peng Li 0046</author>
<author pid="72/5232">Zhang Cheng</author>
<author pid="62/9032">Wenmao Liu</author>
<author pid="03/1496">Lei Nie</author>
<author orcid="0009-0000-1138-8766" pid="214/0814">Haizhou Bao</author>
<author orcid="0000-0002-8979-5094" pid="06/2123-3">Qin Liu 0003</author>
<author pid="55/957">Kai Zhang</author>
<title>Unsupervised Graph-Sequence Anomaly Detection for 5G Core Network Control Plane Traffic.</title>
<pages>1645-1652</pages>
<year>2023</year>
<booktitle>ICPADS</booktitle>
<ee>https://doi.org/10.1109/ICPADS60453.2023.00230</ee>
<crossref>conf/icpads/2023</crossref>
<url>db/conf/icpads/icpads2023.html#WangLCLNBLZ23</url>
</inproceedings>
</r>
<r><article key="journals/cee/WangHZLLJ22" mdate="2024-08-22">
<author orcid="0000-0003-2957-6874" pid="90/7781">Huanran Wang</author>
<author orcid="0000-0002-6494-775X" pid="53/1151">Hui He</author>
<author orcid="0000-0003-4783-876X" pid="z/WeizheZhang">Weizhe Zhang</author>
<author pid="62/9032">Wenmao Liu</author>
<author pid="21/6121-5">Peng Liu 0005</author>
<author orcid="0000-0002-4932-1660" pid="221/4702-1">Amir Javadpour 0001</author>
<title>Using honeypots to model botnet attacks on the internet of medical things.</title>
<pages>108212</pages>
<year>2022</year>
<volume>102</volume>
<journal>Comput. Electr. Eng.</journal>
<ee>https://doi.org/10.1016/j.compeleceng.2022.108212</ee>
<url>db/journals/cee/cee102.html#WangHZLLJ22</url>
</article>
</r>
<r><article key="journals/ett/TianZMJSHL22" mdate="2022-12-05">
<author pid="99/7484">Donghai Tian</author>
<author pid="256/8520">Runze Zhao</author>
<author pid="85/5058-4">Rui Ma 0004</author>
<author pid="41/761">Xiaoqi Jia</author>
<author orcid="0000-0002-7165-4787" pid="46/959">Qi Shen</author>
<author pid="57/7454">Changzhen Hu</author>
<author pid="62/9032">Wenmao Liu</author>
<title>MDCD: A malware detection approach in cloud using deep learning.</title>
<year>2022</year>
<volume>33</volume>
<journal>Trans. Emerg. Telecommun. Technol.</journal>
<number>11</number>
<ee>https://doi.org/10.1002/ett.4584</ee>
<url>db/journals/ett/ett33.html#TianZMJSHL22</url>
</article>
</r>
<r><article key="journals/infsof/LiuZLZGTWXW22" mdate="2024-10-06">
<author pid="49/1245">Jia Liu</author>
<author orcid="0000-0003-2929-2484" pid="210/3288">Runzi Zhang</author>
<author pid="62/9032">Wenmao Liu</author>
<author pid="29/1734">Yinghua Zhang</author>
<author pid="141/7267">Dujuan Gu</author>
<author pid="247/3305">Mingkai Tong</author>
<author pid="212/1333">Xingkai Wang</author>
<author pid="16/11315">Jianxin Xue</author>
<author pid="90/7781">Huanran Wang</author>
<title>Context2Vector: Accelerating security event triage via context representation learning.</title>
<pages>106856</pages>
<year>2022</year>
<volume>146</volume>
<journal>Inf. Softw. Technol.</journal>
<ee>https://doi.org/10.1016/j.infsof.2022.106856</ee>
<ee>https://www.wikidata.org/entity/Q113315599</ee>
<url>db/journals/infsof/infsof146.html#LiuZLZGTWXW22</url>
</article>
</r>
<r><article key="journals/istr/YuanCTMJL22" mdate="2022-04-01">
<author orcid="0000-0002-9780-8369" pid="197/8095">Chong Yuan</author>
<author orcid="0000-0002-5153-8105" pid="211/0840">Jingxuan Cai</author>
<author orcid="0000-0003-2217-4514" pid="99/7484">Donghai Tian</author>
<author pid="85/5058-4">Rui Ma 0004</author>
<author pid="41/761">Xiaoqi Jia</author>
<author pid="62/9032">Wenmao Liu</author>
<title>Towards time evolved malware identification using two-head neural network.</title>
<pages>103098</pages>
<year>2022</year>
<volume>65</volume>
<journal>J. Inf. Secur. Appl.</journal>
<ee>https://doi.org/10.1016/j.jisa.2021.103098</ee>
<url>db/journals/istr/istr65.html#YuanCTMJL22</url>
</article>
</r>
<r><article key="journals/tcc/XieJZXFLL22" mdate="2026-03-06">
<author orcid="0000-0001-5757-4396" pid="69/6471-2">Yulai Xie 0002</author>
<author pid="322/0233">Minpeng Jin</author>
<author orcid="0000-0002-4679-9140" pid="316/3438">Zhuping Zou</author>
<author orcid="0000-0001-8024-1565" pid="279/3569">Gongming Xu</author>
<author pid="48/5939-1">Dan Feng 0001</author>
<author pid="62/9032">Wenmao Liu</author>
<author orcid="0000-0002-0822-0740" pid="49/4298">Darrell D. E. Long</author>
<title>Real-Time Prediction of Docker Container Resource Load Based on a Hybrid Model of ARIMA and Triple Exponential Smoothing.</title>
<pages>1386-1401</pages>
<year>2022</year>
<volume>10</volume>
<journal>IEEE Trans. Cloud Comput.</journal>
<number>2</number>
<ee>https://doi.org/10.1109/TCC.2020.2989631</ee>
<ee>https://www.wikidata.org/entity/Q115534697</ee>
<url>db/journals/tcc/tcc10.html#XieJZXFLL22</url>
</article>
</r>
<r><article key="journals/ton/MaQLLLLG22" mdate="2025-01-19">
<author orcid="0000-0002-0934-5035" pid="18/10062">Xiaobo Ma</author>
<author pid="67/10326">Jian Qu</author>
<author pid="10/3844-6">Jianfeng Li 0006</author>
<author orcid="0000-0001-7466-0384" pid="l/JohnCSLui">John C. S. Lui</author>
<author orcid="0000-0001-7286-122X" pid="61/1951-1">Zhenhua Li 0001</author>
<author pid="62/9032">Wenmao Liu</author>
<author pid="45/503">Xiaohong Guan</author>
<title>Inferring Hidden IoT Devices and User Interactions via Spatial-Temporal Traffic Fingerprinting.</title>
<pages>394-408</pages>
<year>2022</year>
<volume>30</volume>
<journal>IEEE/ACM Trans. Netw.</journal>
<number>1</number>
<ee>https://doi.org/10.1109/TNET.2021.3112480</ee>
<ee>https://www.wikidata.org/entity/Q131131927</ee>
<url>db/journals/ton/ton30.html#MaQLLLLG22</url>
</article>
</r>
<r><inproceedings key="conf/hpcc/YangXLR22" mdate="2023-06-26">
<author pid="49/10304">Qingqing Yang</author>
<author orcid="0000-0001-5959-4817" pid="274/1902">Yuexin Xiang</author>
<author pid="62/9032">Wenmao Liu</author>
<author pid="92/5008-2">Wei Ren 0002</author>
<title>An Illicit Bitcoin Address Analysis Scheme Based on Subgraph Evolution.</title>
<pages>679-686</pages>
<year>2022</year>
<booktitle>HPCC/DSS/SmartCity/DependSys</booktitle>
<ee>https://doi.org/10.1109/HPCC-DSS-SmartCity-DependSys57074.2022.00116</ee>
<crossref>conf/hpcc/2022</crossref>
<url>db/conf/hpcc/hpcc2022.html#YangXLR22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iasam/XuYHLLZZ22" mdate="2022-11-25">
<author pid="189/5198">Guorui Xu</author>
<author pid="326/7416">Zeyu Yuan</author>
<author pid="334/2010">Peidong Hu</author>
<author pid="62/9032">Wenmao Liu</author>
<author pid="38/1164">Weili Li</author>
<author pid="01/2142-3">Yang Zhan 0003</author>
<author pid="148/8895">Haisen Zhao</author>
<title>Influence of Rotor Damping Bars on Rotor Temperature Rise of Synchronous Condenser after Single-Phase Short-Circuit Fault.</title>
<pages>1-7</pages>
<year>2022</year>
<booktitle>IAS</booktitle>
<ee>https://doi.org/10.1109/IAS54023.2022.9940097</ee>
<crossref>conf/iasam/2022</crossref>
<url>db/conf/iasam/ias2022.html#XuYHLLZZ22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/infocom/QuMLSLXLLFG22" mdate="2024-08-14">
<author pid="67/10326">Jian Qu</author>
<author pid="18/10062">Xiaobo Ma</author>
<author pid="62/9032">Wenmao Liu</author>
<author pid="322/9868">Hongqing Sang</author>
<author pid="10/3844-6">Jianfeng Li 0006</author>
<author pid="68/2052-1">Lei Xue 0001</author>
<author pid="53/1565">Xiapu Luo</author>
<author pid="61/1951-1">Zhenhua Li 0001</author>
<author pid="39/456">Li Feng</author>
<author pid="45/503">Xiaohong Guan</author>
<title>Landing Reinforcement Learning onto Smart Scanning of The Internet of Things.</title>
<pages>2088-2097</pages>
<year>2022</year>
<booktitle>INFOCOM</booktitle>
<ee>https://doi.org/10.1109/INFOCOM48880.2022.9796737</ee>
<crossref>conf/infocom/2022</crossref>
<url>db/conf/infocom/infocom2022.html#QuMLSLXLLFG22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/service/YuCLS22" mdate="2022-09-02">
<author pid="43/4940">Rui Yu</author>
<author pid="93/8965">Fu Chen</author>
<author pid="62/9032">Wenmao Liu</author>
<author pid="322/9868">Hongqing Sang</author>
<title>Threat identification model for suspected Internet of Things attack groups.</title>
<pages>283-288</pages>
<year>2022</year>
<booktitle>ICSS</booktitle>
<ee>https://doi.org/10.1109/ICSS55994.2022.00051</ee>
<crossref>conf/service/2022</crossref>
<url>db/conf/service/service2022.html#YuCLS22</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2204-05746" mdate="2025-10-10">
<author pid="274/1902">Yuexin Xiang</author>
<author pid="284/6377">Yuchen Lei</author>
<author pid="253/3099">Ding Bao</author>
<author pid="92/5008-2">Wei Ren 0002</author>
<author pid="69/10124-4">Tiantian Li 0004</author>
<author pid="49/10304">Qingqing Yang</author>
<author pid="62/9032">Wenmao Liu</author>
<author pid="19/8310">Tianqing Zhu</author>
<author pid="c/KimKwangRaymondChoo">Kim-Kwang Raymond Choo</author>
<title>BABD: A Bitcoin Address Behavior Dataset for Address Behavior Pattern Analysis.</title>
<year>2022</year>
<volume>abs/2204.05746</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2204.05746</ee>
<url>db/journals/corr/corr2204.html#abs-2204-05746</url>
</article>
</r>
<r><article key="journals/cm/MaQCLLTJSZ21" mdate="2024-08-15">
<author pid="18/10062">Xiaobo Ma</author>
<author pid="67/10326">Jian Qu</author>
<author pid="287/8324">Feitong Chen</author>
<author pid="62/9032">Wenmao Liu</author>
<author pid="10/3844-6">Jianfeng Li 0006</author>
<author pid="71/6308">Jing Tao</author>
<author pid="287/7960">Hongshan Jiao</author>
<author pid="287/8245">Mawei Shi</author>
<author pid="07/5905">Zhi-Li Zhang</author>
<title>One Host with So Many IPs! On The Security Implications of Dynamic Virtual Private Servers.</title>
<pages>64-69</pages>
<year>2021</year>
<volume>59</volume>
<journal>IEEE Commun. Mag.</journal>
<number>2</number>
<ee>https://doi.org/10.1109/MCOM.001.2000602</ee>
<url>db/journals/cm/cm59.html#MaQCLLTJSZ21</url>
</article>
</r>
<r><article key="journals/cn/TianYJMHL21" mdate="2021-10-08">
<author pid="99/7484">Donghai Tian</author>
<author pid="303/4378">Qianjin Ying</author>
<author pid="41/761">Xiaoqi Jia</author>
<author pid="85/5058-4">Rui Ma 0004</author>
<author pid="57/7454">Changzhen Hu</author>
<author pid="62/9032">Wenmao Liu</author>
<title>MDCHD: A novel malware detection method in cloud using hardware trace and deep learning.</title>
<pages>108394</pages>
<year>2021</year>
<volume>198</volume>
<journal>Comput. Networks</journal>
<ee>https://doi.org/10.1016/j.comnet.2021.108394</ee>
<url>db/journals/cn/cn198.html#TianYJMHL21</url>
</article>
</r>
<r><article key="journals/iotj/WangZHLLLJLZLZL21" mdate="2025-03-03">
<author orcid="0000-0003-2957-6874" pid="90/7781">Huanran Wang</author>
<author pid="z/WeizheZhang">Weizhe Zhang</author>
<author orcid="0000-0002-6494-775X" pid="53/1151">Hui He</author>
<author pid="21/6121-5">Peng Liu 0005</author>
<author orcid="0000-0002-9082-3208" pid="53/1565">Daniel Xiapu Luo</author>
<author orcid="0000-0003-2486-5765" pid="51/3710-39">Yang Liu 0039</author>
<author pid="185/1521">Jiawei Jiang</author>
<author pid="87/660-75">Yan Li 0075</author>
<author pid="52/5264">Xing Zhang</author>
<author pid="62/9032">Wenmao Liu</author>
<author orcid="0000-0003-2929-2484" pid="210/3288">Runzi Zhang</author>
<author pid="76/11156">Xing Lan</author>
<title>An Evolutionary Study of IoT Malware.</title>
<pages>15422-15440</pages>
<year>2021</year>
<volume>8</volume>
<journal>IEEE Internet Things J.</journal>
<number>20</number>
<ee>https://doi.org/10.1109/JIOT.2021.3063840</ee>
<url>db/journals/iotj/iotj8.html#WangZHLLLJLZLZL21</url>
</article>
</r>
<r><inproceedings key="conf/dsa/QuML21" mdate="2021-12-03">
<author pid="67/10326">Jian Qu</author>
<author pid="18/10062">Xiaobo Ma</author>
<author pid="62/9032">Wenmao Liu</author>
<title>Querent-centric Domain Name System Modeling and Its Application in Passive Software Discovery.</title>
<pages>152-160</pages>
<year>2021</year>
<booktitle>DSA</booktitle>
<ee>https://doi.org/10.1109/DSA52907.2021.00024</ee>
<crossref>conf/dsa/2021</crossref>
<url>db/conf/dsa/dsa2021.html#QuML21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icct/IsingizweWLWWL21" mdate="2022-09-28">
<author pid="310/4448">Didier Frank Isingizwe</author>
<author pid="93/6765">Meng Wang</author>
<author pid="62/9032">Wenmao Liu</author>
<author pid="21/841-2">Dongsheng Wang 0002</author>
<author pid="89/8650">Tiejun Wu</author>
<author pid="l/JunLi3">Jun Li 0003</author>
<title>Analyzing Learning-based Encrypted Malware Traffic Classification with AutoML.</title>
<pages>313-322</pages>
<year>2021</year>
<booktitle>ICCT</booktitle>
<ee>https://doi.org/10.1109/ICCT52962.2021.9658106</ee>
<crossref>conf/icct/2021</crossref>
<url>db/conf/icct/icct2021.html#IsingizweWLWWL21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icct/ChenYL21" mdate="2022-01-11">
<author pid="93/8965">Fu Chen</author>
<author pid="43/4940">Rui Yu</author>
<author pid="62/9032">Wenmao Liu</author>
<title>Internet of Things Attack Group Identification Model Combined with Spectral Clustering.</title>
<pages>778-782</pages>
<year>2021</year>
<booktitle>ICCT</booktitle>
<ee>https://doi.org/10.1109/ICCT52962.2021.9657991</ee>
<crossref>conf/icct/2021</crossref>
<url>db/conf/icct/icct2021.html#ChenYL21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/scisec/TangYLLWWJL21" mdate="2024-12-14">
<author pid="247/4824">Jiyue Tang</author>
<author pid="79/2888">Le Yang</author>
<author pid="80/1141">Song Liu</author>
<author pid="62/9032">Wenmao Liu</author>
<author pid="93/6765">Meng Wang</author>
<author pid="171/1034">Chonghua Wang</author>
<author pid="34/2005-13">Bo Jiang 0013</author>
<author pid="91/7802-2">Zhigang Lu 0002</author>
<title>Caps-LSTM: A Novel Hierarchical Encrypted VPN Network Traffic Identification Using CapsNet and LSTM.</title>
<pages>139-153</pages>
<year>2021</year>
<booktitle>SciSec</booktitle>
<ee>https://doi.org/10.1007/978-3-030-89137-4_10</ee>
<crossref>conf/scisec/2021</crossref>
<url>db/conf/scisec/scisec2021.html#TangYLLWWJL21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/tpsisa/YangSRLR21" mdate="2024-10-06">
<author pid="218/5245">Yutian Yang</author>
<author pid="18/5040">Wenbo Shen</author>
<author orcid="0009-0004-5500-6060" pid="318/7201">Bonan Ruan</author>
<author pid="62/9032">Wenmao Liu</author>
<author pid="20/6179-1">Kui Ren 0001</author>
<title>Security Challenges in the Container Cloud.</title>
<pages>137-145</pages>
<year>2021</year>
<booktitle>TPS-ISA</booktitle>
<ee>https://doi.org/10.1109/TPSISA52974.2021.00016</ee>
<crossref>conf/tpsisa/2021</crossref>
<url>db/conf/tpsisa/tpsisa2021.html#YangSRLR21</url>
</inproceedings>
</r>
<r><article key="journals/access/LiuLLHLLX20" mdate="2020-07-31">
<author orcid="0000-0003-0980-2125" pid="62/9032">Wenmao Liu</author>
<author pid="38/1164">Weili Li</author>
<author pid="270/6250">Shifan Luo</author>
<author pid="270/6205">Xuelian Huang</author>
<author pid="48/4185">Dan Li</author>
<author pid="14/5778">Zhiqiang Li</author>
<author pid="189/5198">Guorui Xu</author>
<title>Influence of a Novel Stator Teeth Internal Ventilation Structure on Air-Cooled Turbo-Generator Parameters and Stator Temperature.</title>
<pages>122422-122433</pages>
<year>2020</year>
<volume>8</volume>
<journal>IEEE Access</journal>
<ee type="oa">https://doi.org/10.1109/ACCESS.2020.3007339</ee>
<url>db/journals/access/access8.html#LiuLLHLLX20</url>
</article>
</r>
<r><inproceedings key="conf/trustcom/TongLZXLY20" mdate="2024-10-06">
<author pid="247/3305">Mingkai Tong</author>
<author pid="35/1964">Guo Li</author>
<author orcid="0000-0003-2929-2484" pid="210/3288">Runzi Zhang</author>
<author pid="16/11315">Jianxin Xue</author>
<author pid="62/9032">Wenmao Liu</author>
<author pid="62/2814-1">Jiahai Yang 0001</author>
<title>Far from classification algorithm: dive into the preprocessing stage in DGA detection.</title>
<pages>468-474</pages>
<year>2020</year>
<booktitle>TrustCom</booktitle>
<ee>https://doi.org/10.1109/TrustCom50675.2020.00070</ee>
<crossref>conf/trustcom/2020</crossref>
<url>db/conf/trustcom/trustcom2020.html#TongLZXLY20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/trustcom/ZhangTCXLX20" mdate="2026-01-04">
<author orcid="0000-0003-2929-2484" pid="210/3288">Runzi Zhang</author>
<author pid="247/3305">Mingkai Tong</author>
<author pid="09/3666">Lei Chen</author>
<author pid="16/11315">Jianxin Xue</author>
<author pid="62/9032">Wenmao Liu</author>
<author orcid="0009-0004-1106-1156" pid="11/4605">Feng Xie</author>
<title>CMIRGen: Automatic Signature Generation Algorithm for Malicious Network Traffic.</title>
<pages>736-743</pages>
<year>2020</year>
<booktitle>TrustCom</booktitle>
<ee>https://doi.org/10.1109/TrustCom50675.2020.00101</ee>
<crossref>conf/trustcom/2020</crossref>
<url>db/conf/trustcom/trustcom2020.html#ZhangTCXLX20</url>
</inproceedings>
</r>
<r><article key="journals/access/AnYLZ19" mdate="2025-11-20">
<author orcid="0000-0003-2868-0186" pid="142/1098">Dou An</author>
<author pid="01/2404-3">Qingyu Yang 0003</author>
<author pid="62/9032">Wenmao Liu</author>
<author pid="06/6785-97">Yang Zhang 0097</author>
<title>Defending Against Data Integrity Attacks in Smart Grid: A Deep Reinforcement Learning-Based Approach.</title>
<pages>110835-110845</pages>
<year>2019</year>
<volume>7</volume>
<journal>IEEE Access</journal>
<ee type="oa">https://doi.org/10.1109/ACCESS.2019.2933020</ee>
<url>db/journals/access/access7.html#AnYLZ19</url>
</article>
</r>
<r><inproceedings key="conf/acisp/WangLZZYYL19" mdate="2023-03-21">
<author pid="73/4689-9">Ziyu Wang 0009</author>
<author orcid="0000-0003-2965-3518" pid="43/3771-1">Jianwei Liu 0001</author>
<author pid="37/6352">Zongyang Zhang</author>
<author pid="210/4905-2">Yanting Zhang 0002</author>
<author pid="222/2140">Jiayuan Yin</author>
<author pid="26/6190">Hui Yu</author>
<author pid="62/9032">Wenmao Liu</author>
<title>A Combined Micro-block Chain Truncation Attack on Bitcoin-NG.</title>
<pages>322-339</pages>
<year>2019</year>
<booktitle>ACISP</booktitle>
<ee>https://doi.org/10.1007/978-3-030-21548-4_18</ee>
<crossref>conf/acisp/2019</crossref>
<url>db/conf/acisp/acisp2019.html#WangLZZYYL19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ifip12/JiangTLL18" mdate="2025-04-28">
<author pid="21/3839">Wei Jiang</author>
<author pid="39/5423">Yuan Tian</author>
<author pid="83/5950">Weixin Liu</author>
<author pid="62/9032">Wenmao Liu</author>
<title>An Insider Threat Detection Method Based on User Behavior Analysis.</title>
<pages>421-429</pages>
<year>2018</year>
<booktitle>IIP</booktitle>
<ee>https://doi.org/10.1007/978-3-030-00828-4_43</ee>
<crossref>conf/ifip12/2018iip</crossref>
<url>db/conf/ifip12/iip2018.html#JiangTLL18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/infocom/SunYL14" mdate="2017-08-17">
<author pid="181/2323-4">Yan Sun 0004</author>
<author pid="07/7486">Lihua Yin</author>
<author pid="62/9032">Wenmao Liu</author>
<title>Defending sybil attacks in mobile social networks.</title>
<pages>163-164</pages>
<year>2014</year>
<booktitle>INFOCOM Workshops</booktitle>
<ee>https://doi.org/10.1109/INFCOMW.2014.6849206</ee>
<crossref>conf/infocom/2014w</crossref>
<url>db/conf/infocom/infocom2014w.html#SunYL14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icpads/LiuYZZ10" mdate="2023-03-23">
<author pid="62/9032">Wenmao Liu</author>
<author pid="07/7486">Lihua Yin</author>
<author pid="z/WeizheZhang">Weizhe Zhang</author>
<author pid="z/HongliZhang">Hongli Zhang 0001</author>
<title>A General Distributed Object Locating Architecture in the Internet of Things.</title>
<pages>730-735</pages>
<year>2010</year>
<booktitle>ICPADS</booktitle>
<ee>https://doi.org/10.1109/ICPADS.2010.30</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICPADS.2010.30</ee>
<crossref>conf/icpads/2010</crossref>
<url>db/conf/icpads/icpads2010.html#LiuYZZ10</url>
</inproceedings>
</r>
<coauthors n="162" nc="2">
<co c="1"><na f="a/An:Dou" pid="142/1098">Dou An</na></co>
<co c="0"><na f="b/Bao:Ding" pid="253/3099">Ding Bao</na></co>
<co c="0"><na f="b/Bao:Haizhou" pid="214/0814">Haizhou Bao</na></co>
<co c="0"><na f="c/Cai:Jingxuan" pid="211/0840">Jingxuan Cai</na></co>
<co c="0"><na f="c/Cai:Yifei" pid="169/4588">Yifei Cai</na></co>
<co c="0"><na f="c/Chen:" pid="406/4083">Chen</na></co>
<co c="0"><na f="c/Chen:Feitong" pid="287/8324">Feitong Chen</na></co>
<co c="0"><na f="c/Chen:Fu" pid="93/8965">Fu Chen</na></co>
<co c="0"><na f="c/Chen:Hongsong" pid="60/2">Hongsong Chen</na></co>
<co c="0"><na f="c/Chen:Junxin" pid="193/9307">Junxin Chen</na></co>
<co c="0"><na f="c/Chen_0004:Kewei" pid="48/3404-4">Kewei Chen 0004</na></co>
<co c="0"><na f="c/Chen:Lei" pid="09/3666">Lei Chen</na></co>
<co c="0"><na f="c/Chen:Liquan" pid="27/1061">Liquan Chen</na></co>
<co c="0"><na f="c/Cheng:Daguo" pid="344/6903">Daguo Cheng</na></co>
<co c="0"><na f="c/Cheng:Zhang" pid="72/5232">Zhang Cheng</na></co>
<co c="0"><na f="c/Choo:Kim=Kwang_Raymond" pid="c/KimKwangRaymondChoo">Kim-Kwang Raymond Choo</na></co>
<co c="0"><na f="f/Feng_0001:Dan" pid="48/5939-1">Dan Feng 0001</na></co>
<co c="0"><na f="f/Feng:Li" pid="39/456">Li Feng</na></co>
<co c="0"><na f="g/Gao:Xiang" pid="14/3881">Xiang Gao</na></co>
<co c="0"><na f="g/Gu:Dujuan" pid="141/7267">Dujuan Gu</na></co>
<co c="0"><na f="g/Gu:Qi" pid="18/4144">Qi Gu</na></co>
<co c="0"><na f="g/Guan:Xiaohong" pid="45/503">Xiaohong Guan</na></co>
<co c="0"><na f="g/Guo_0001:Hua" pid="12/5941-1">Hua Guo 0001</na></co>
<co c="0"><na f="h/He:Hui" pid="53/1151">Hui He</na></co>
<co c="0"><na f="h/He_0004:Lin" pid="73/2845-4">Lin He 0004</na></co>
<co c="0"><na f="h/Hu:Changzhen" pid="57/7454">Changzhen Hu</na></co>
<co c="0"><na f="h/Hu:Peidong" pid="334/2010">Peidong Hu</na></co>
<co c="0"><na f="h/Huang:Xuelian" pid="270/6205">Xuelian Huang</na></co>
<co c="0"><na f="i/Isingizwe:Didier_Frank" pid="310/4448">Didier Frank Isingizwe</na></co>
<co c="0"><na f="j/Javadpour_0001:Amir" pid="221/4702-1">Amir Javadpour 0001</na></co>
<co c="0"><na f="j/Jia:Xiaoqi" pid="41/761">Xiaoqi Jia</na></co>
<co c="0"><na f="j/Jiang_0013:Bo" pid="34/2005-13">Bo Jiang 0013</na></co>
<co c="0"><na f="j/Jiang:Jiawei" pid="185/1521">Jiawei Jiang</na></co>
<co c="0"><na f="j/Jiang:Wei" pid="21/3839">Wei Jiang</na></co>
<co c="0"><na f="j/Jiao:Hongshan" pid="287/7960">Hongshan Jiao</na></co>
<co c="0"><na f="j/Jin:Boran" pid="397/3481">Boran Jin</na></co>
<co c="0"><na f="j/Jin:Huiyong" pid="431/2864">Huiyong Jin</na></co>
<co c="0"><na f="j/Jin:Minpeng" pid="322/0233">Minpeng Jin</na></co>
<co c="0"><na f="j/Jin:Zhao" pid="80/6899">Zhao Jin</na></co>
<co c="0"><na f="l/Lan:Xing" pid="76/11156">Xing Lan</na></co>
<co c="0"><na f="l/Lei:Yuchen" pid="284/6377">Yuchen Lei</na></co>
<co c="0"><na f="l/Li:Dan" pid="48/4185">Dan Li</na></co>
<co c="0"><na f="l/Li:Guo" pid="35/1964">Guo Li</na></co>
<co c="0"><na f="l/Li_0006:Jianfeng" pid="10/3844-6">Jianfeng Li 0006</na></co>
<co c="0"><na f="l/Li_0003:Jun" pid="l/JunLi3">Jun Li 0003</na></co>
<co c="0"><na f="l/Li_0046:Peng" pid="83/6353-46">Peng Li 0046</na></co>
<co c="0"><na f="l/Li_0004:Tiantian" pid="69/10124-4">Tiantian Li 0004</na></co>
<co c="0"><na f="l/Li_0001:Tong" pid="29/3826-1">Tong Li 0001</na></co>
<co c="0"><na f="l/Li:Wei" pid="64/6025">Wei Li</na></co>
<co c="0"><na f="l/Li:Weili" pid="38/1164">Weili Li</na></co>
<co c="0"><na f="l/Li:Xingyu" pid="45/2385">Xingyu Li</na></co>
<co c="0"><na f="l/Li_0075:Yan" pid="87/660-75">Yan Li 0075</na></co>
<co c="0"><na f="l/Li_0001:Zhenhua" pid="61/1951-1">Zhenhua Li 0001</na></co>
<co c="0"><na f="l/Li:Zhiqiang" pid="14/5778">Zhiqiang Li</na></co>
<co c="0"><na f="l/Li:Zhuo" pid="51/4015">Zhuo Li</na></co>
<co c="0"><na f="l/Lin:Xiaocong" pid="418/7778">Xiaocong Lin</na></co>
<co c="0"><na f="l/Lin:Yuena" pid="402/2300">Yuena Lin</na></co>
<co c="0"><na f="l/Lin:Zhangting" pid="401/8328">Zhangting Lin</na></co>
<co c="0"><na f="l/Liu:Jia" pid="49/1245">Jia Liu</na></co>
<co c="0"><na f="l/Liu:Jiahao" pid="173/5146">Jiahao Liu</na></co>
<co c="0"><na f="l/Liu_0001:Jianwei" pid="43/3771-1">Jianwei Liu 0001</na></co>
<co c="0"><na f="l/Liu_0005:Peng" pid="21/6121-5">Peng Liu 0005</na></co>
<co c="0"><na f="l/Liu_0003:Qin" pid="06/2123-3">Qin Liu 0003</na></co>
<co c="0"><na f="l/Liu:Song" pid="80/1141">Song Liu</na></co>
<co c="0"><na f="l/Liu:Weixin" pid="83/5950">Weixin Liu</na></co>
<co c="0"><na f="l/Liu:Xinyu" pid="98/738">Xinyu Liu</na></co>
<co c="0"><na f="l/Liu_0039:Yang" pid="51/3710-39">Yang Liu 0039</na></co>
<co c="0"><na f="l/Liu_0024:Ying" pid="91/112-24">Ying Liu 0024</na></co>
<co c="0"><na f="l/Liu_0090:Yu" pid="97/2274-90">Yu Liu 0090</na></co>
<co c="0"><na f="l/Long:Darrell_D=_E=" pid="49/4298">Darrell D. E. Long</na></co>
<co c="0"><na f="l/Lu_0002:Zhigang" pid="91/7802-2">Zhigang Lu 0002</na></co>
<co c="0"><na f="l/Lui:John_C=_S=" pid="l/JohnCSLui">John C. S. Lui</na></co>
<co c="0"><na f="l/Luo:Shifan" pid="270/6250">Shifan Luo</na></co>
<co c="0" n="2"><na f="l/Luo:Xiapu" pid="53/1565">Xiapu Luo</na><na>Daniel Xiapu Luo</na></co>
<co c="0"><na f="l/Lyu:Gengyu" pid="218/6818">Gengyu Lyu</na></co>
<co c="0"><na f="m/Ma_0004:Rui" pid="85/5058-4">Rui Ma 0004</na></co>
<co c="0"><na f="m/Ma:Xiaobo" pid="18/10062">Xiaobo Ma</na></co>
<co c="0"><na f="n/Nie:Lei" pid="03/1496">Lei Nie</na></co>
<co c="0"><na f="p/Pan:Xiaoteng" pid="397/3360">Xiaoteng Pan</na></co>
<co c="0"><na f="q/Qiao:Tianhuai" pid="277/2974">Tianhuai Qiao</na></co>
<co c="0"><na f="q/Qu:Jian" pid="67/10326">Jian Qu</na></co>
<co c="0"><na f="r/Ren_0001:Kui" pid="20/6179-1">Kui Ren 0001</na></co>
<co c="0"><na f="r/Ren_0002:Wei" pid="92/5008-2">Wei Ren 0002</na></co>
<co c="0"><na f="r/Ruan:Bonan" pid="318/7201">Bonan Ruan</na></co>
<co c="0"><na f="s/Sang:Hongqing" pid="322/9868">Hongqing Sang</na></co>
<co c="0"><na f="s/Shen:Qi" pid="46/959">Qi Shen</na></co>
<co c="0"><na f="s/Shen:Wenbo" pid="18/5040">Wenbo Shen</na></co>
<co c="0"><na f="s/Shi:Mawei" pid="287/8245">Mawei Shi</na></co>
<co c="0"><na f="s/Sun_0004:Yan" pid="181/2323-4">Yan Sun 0004</na></co>
<co c="0"><na f="t/Tan:Fuchao" pid="397/3353">Fuchao Tan</na></co>
<co c="0"><na f="t/Tang:Jiyue" pid="247/4824">Jiyue Tang</na></co>
<co c="0"><na f="t/Tao:Jing" pid="71/6308">Jing Tao</na></co>
<co c="0"><na f="t/Tian:Donghai" pid="99/7484">Donghai Tian</na></co>
<co c="0"><na f="t/Tian:Yuan" pid="39/5423">Yuan Tian</na></co>
<co c="0"><na f="t/Tong:Mingkai" pid="247/3305">Mingkai Tong</na></co>
<co c="0"><na f="w/Wang:Binjun" pid="261/3000">Binjun Wang</na></co>
<co c="0"><na f="w/Wang:Chonghua" pid="171/1034">Chonghua Wang</na></co>
<co c="0"><na f="w/Wang_0002:Dongsheng" pid="21/841-2">Dongsheng Wang 0002</na></co>
<co c="0"><na f="w/Wang:Huanran" pid="90/7781">Huanran Wang</na></co>
<co c="0"><na f="w/Wang_0038:Jian" pid="39/449-38">Jian Wang 0038</na></co>
<co c="0"><na f="w/Wang:Meng" pid="93/6765">Meng Wang</na></co>
<co c="0"><na f="w/Wang:Min" pid="181/2695">Min Wang</na></co>
<co c="0"><na f="w/Wang:Xiangqi" pid="190/6584">Xiangqi Wang</na></co>
<co c="0"><na f="w/Wang:Xingkai" pid="212/1333">Xingkai Wang</na></co>
<co c="0"><na f="w/Wang_0001:Yipeng" pid="36/4627-1">Yipeng Wang 0001</na></co>
<co c="0"><na f="w/Wang:Yiting" pid="25/9448">Yiting Wang</na></co>
<co c="0"><na f="w/Wang:Zhaoan" pid="23/2730">Zhaoan Wang</na></co>
<co c="0"><na f="w/Wang_0009:Ziyu" pid="73/4689-9">Ziyu Wang 0009</na></co>
<co c="0"><na f="w/Wei:Chentian" pid="397/3454">Chentian Wei</na></co>
<co c="0"><na f="w/Wu:Chenchen" pid="97/2027">Chenchen Wu</na></co>
<co c="0"><na f="w/Wu:Tiejun" pid="89/8650">Tiejun Wu</na></co>
<co c="0"><na f="w/Wu:Yong" pid="23/2702">Yong Wu</na></co>
<co c="0"><na f="x/Xiang:Yuexin" pid="274/1902">Yuexin Xiang</na></co>
<co c="0"><na f="x/Xie:Feng" pid="11/4605">Feng Xie</na></co>
<co c="0"><na f="x/Xie_0002:Yulai" pid="69/6471-2">Yulai Xie 0002</na></co>
<co c="0"><na f="x/Xu:Gongming" pid="279/3569">Gongming Xu</na></co>
<co c="0"><na f="x/Xu:Guorui" pid="189/5198">Guorui Xu</na></co>
<co c="0"><na f="x/Xu:Jing" pid="07/1951">Jing Xu</na></co>
<co c="0"><na f="x/Xue:Jianxin" pid="16/11315">Jianxin Xue</na></co>
<co c="0"><na f="x/Xue_0001:Lei" pid="68/2052-1">Lei Xue 0001</na></co>
<co c="0"><na f="x/Xue:Mingfu" pid="03/11506">Mingfu Xue</na></co>
<co c="0"><na f="y/Yang_0004:Guangliang" pid="153/5855-4">Guangliang Yang 0004</na></co>
<co c="0"><na f="y/Yang_0001:Jiahai" pid="62/2814-1">Jiahai Yang 0001</na></co>
<co c="0"><na f="y/Yang:Le" pid="79/2888">Le Yang</na></co>
<co c="0"><na f="y/Yang:Qingqing" pid="49/10304">Qingqing Yang</na></co>
<co c="1"><na f="y/Yang_0003:Qingyu" pid="01/2404-3">Qingyu Yang 0003</na></co>
<co c="0"><na f="y/Yang:Yutian" pid="218/5245">Yutian Yang</na></co>
<co c="0"><na f="y/Yang_0004:Zhen" pid="70/2539-4">Zhen Yang 0004</na></co>
<co c="0"><na f="y/Yin:Jiayuan" pid="222/2140">Jiayuan Yin</na></co>
<co c="0"><na f="y/Yin:Lihua" pid="07/7486">Lihua Yin</na></co>
<co c="0"><na f="y/Yin:Qilei" pid="230/1810">Qilei Yin</na></co>
<co c="0"><na f="y/Ying:Qianjin" pid="303/4378">Qianjin Ying</na></co>
<co c="0"><na f="y/You:Weijing" pid="273/9564">Weijing You</na></co>
<co c="0"><na f="y/Yu:Hui" pid="26/6190">Hui Yu</na></co>
<co c="0"><na f="y/Yu:Mingliang" pid="60/5440">Mingliang Yu</na></co>
<co c="0"><na f="y/Yu:Rui" pid="43/4940">Rui Yu</na></co>
<co c="0"><na f="y/Yuan:Chong" pid="197/8095">Chong Yuan</na></co>
<co c="0"><na f="y/Yuan:Zeyu" pid="326/7416">Zeyu Yuan</na></co>
<co c="0"><na f="z/Zhan_0003:Yang" pid="01/2142-3">Yang Zhan 0003</na></co>
<co c="0"><na f="z/Zhang_0001:Hongli" pid="z/HongliZhang">Hongli Zhang 0001</na></co>
<co c="0"><na f="z/Zhang:Huiying" pid="75/2717">Huiying Zhang</na></co>
<co c="0"><na f="z/Zhang:Kai" pid="55/957">Kai Zhang</na></co>
<co c="0"><na f="z/Zhang:Leo_Yu" pid="117/3526">Leo Yu Zhang</na></co>
<co c="0"><na f="z/Zhang:Runzi" pid="210/3288">Runzi Zhang</na></co>
<co c="0"><na f="z/Zhang:Shenglin" pid="54/6434">Shenglin Zhang</na></co>
<co c="0"><na f="z/Zhang:Weizhe" pid="z/WeizheZhang">Weizhe Zhang</na></co>
<co c="0"><na f="z/Zhang_0002:Xianchao" pid="40/4372-2">Xianchao Zhang 0002</na></co>
<co c="0"><na f="z/Zhang:Xing" pid="52/5264">Xing Zhang</na></co>
<co c="1"><na f="z/Zhang_0097:Yang" pid="06/6785-97">Yang Zhang 0097</na></co>
<co c="0"><na f="z/Zhang_0002:Yanting" pid="210/4905-2">Yanting Zhang 0002</na></co>
<co c="0"><na f="z/Zhang:Yinghua" pid="29/1734">Yinghua Zhang</na></co>
<co c="0"><na f="z/Zhang_0001:Yushu" pid="78/8511-1">Yushu Zhang 0001</na></co>
<co c="0"><na f="z/Zhang:Yuxuan" pid="126/5240">Yuxuan Zhang</na></co>
<co c="0"><na f="z/Zhang:Zhi=Li" pid="07/5905">Zhi-Li Zhang</na></co>
<co c="0"><na f="z/Zhang:Zongyang" pid="37/6352">Zongyang Zhang</na></co>
<co c="0"><na f="z/Zhao:Enze" pid="380/7539">Enze Zhao</na></co>
<co c="0"><na f="z/Zhao:Haisen" pid="148/8895">Haisen Zhao</na></co>
<co c="0"><na f="z/Zhao:Runze" pid="256/8520">Runze Zhao</na></co>
<co c="0"><na f="z/Zheng:Xianghan" pid="14/7437">Xianghan Zheng</na></co>
<co c="0"><na f="z/Zhou:Sixu" pid="323/7039">Sixu Zhou</na></co>
<co c="0"><na f="z/Zhu:Tianqing" pid="19/8310">Tianqing Zhu</na></co>
<co c="0"><na f="z/Zou:Zhuping" pid="316/3438">Zhuping Zou</na></co>
</coauthors>
</dblpperson>

