


Остановите войну!
for scientists:


default search action
Jiqiang Liu
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j79]Dalin Zhang
, Yi Xu
, Yunjuan Peng, Chenyue Du, Nan Wang, Mincong Tang
, Lingyun Lu, Jiqiang Liu
:
An Interpretable Station Delay Prediction Model Based on Graph Community Neural Network and Time-Series Fuzzy Decision Tree. IEEE Trans. Fuzzy Syst. 31(2): 421-433 (2023) - [j78]Xudong He
, Jian Wang
, Jiqiang Liu
, Weiping Ding
, Zhen Han
, Bin Wang
, Jamel Nebhen
, Wei Wang
:
DNS Rebinding Threat Modeling and Security Analysis for Local Area Network of Maritime Transportation Systems. IEEE Trans. Intell. Transp. Syst. 24(2): 2643-2655 (2023) - [i18]Nan Wang, Xuezhi Wen, Dalin Zhang, Xibin Zhao, Jiahui Ma, Mengxia Luo, Sen Nie, Shi Wu, Jiqiang Liu:
TBDetector: Transformer-Based Detector for Advanced Persistent Threats with Provenance Graph. CoRR abs/2304.02838 (2023) - 2022
- [j77]Yingying Yao, Xiaolin Chang
, Lin Li
, Jiqiang Liu, Hong Wang
:
Dual Privacy-Preserving Lightweight Navigation System for Vehicular Networks. IEEE Access 10: 121120-121132 (2022) - [j76]Xiao Zhang
, Jiqiang Liu, Zhongjie Ba, Yaodong Tao, Xiaochun Cheng
:
MobiScan: An enhanced invisible screen-camera communication system for IoT applications. Trans. Emerg. Telecommun. Technol. 33(4) (2022) - [j75]Yingxiao Xiang, Chao Li, Tong Chen, Yike Li, Endong Tong, Wenjia Niu, Qiong Li, Jiqiang Liu, Wei Wang:
Toward Blockchain-Based Spoofing Defense for Controlled Optimization of Phases in Traffic Signal System. IEICE Trans. Inf. Syst. 105-D(2): 280-288 (2022) - [j74]Yixiang Wang
, Jiqiang Liu
, Xiaolin Chang
, Jelena V. Misic
, Vojislav B. Misic
:
IWA: Integrated gradient-based white-box attacks for fooling deep neural networks. Int. J. Intell. Syst. 37(7): 4253-4276 (2022) - [j73]Yixiang Wang, Jiqiang Liu, Xiaolin Chang, Ricardo J. Rodríguez, Jianhua Wang
:
DI-AA: An interpretable white-box attack for fooling deep neural networks. Inf. Sci. 610: 14-32 (2022) - [j72]Yixiang Wang
, Jiqiang Liu, Xiaolin Chang
, Jianhua Wang
, Ricardo J. Rodríguez
:
AB-FGSM: AdaBelief optimizer and FGSM-based approach to generate adversarial examples. J. Inf. Secur. Appl. 68: 103227 (2022) - [j71]Yanling Dong, Shufen Zhang, Jingcheng Xu, Haoshi Wang, Jiqiang Liu:
Random Forest Algorithm Based on Linear Privacy Budget Allocation. J. Database Manag. 33(2): 1-19 (2022) - [j70]Heng Ye
, Jiqiang Liu, Hao Zhen
, Wenbin Jiang, Bin Wang, Wei Wang:
VREFL: Verifiable and Reconnection-Efficient Federated Learning in IoT scenarios. J. Netw. Comput. Appl. 207: 103486 (2022) - [j69]Peng Wu
, Zhenjie Hou, Jiqiang Liu, Jinzhao Wu:
Reasoning Method Based on Intervals with Symmetric Truncated Normal Density. Symmetry 14(1): 25 (2022) - [j68]Jin Li
, Heng Ye
, Tong Li
, Wei Wang
, Wenjing Lou
, Y. Thomas Hou
, Jiqiang Liu
, Rongxing Lu
:
Efficient and Secure Outsourcing of Differentially Private Data Publishing With Multiple Evaluators. IEEE Trans. Dependable Secur. Comput. 19(1): 67-76 (2022) - [j67]Qiang Li, Dawei Tan, Xin Ge, Haining Wang, Zhi Li, Jiqiang Liu:
Understanding Security Risks of Embedded Devices Through Fine-Grained Firmware Fingerprinting. IEEE Trans. Dependable Secur. Comput. 19(6): 4099-4112 (2022) - [j66]Yike Li
, Wenjia Niu
, Yunzhe Tian, Tong Chen
, Zhiqiang Xie, Yalun Wu
, Yingxiao Xiang, Endong Tong
, Thar Baker
, Jiqiang Liu
:
Multiagent Reinforcement Learning-Based Signal Planning for Resisting Congestion Attack in Green Transportation. IEEE Trans. Green Commun. Netw. 6(3): 1448-1458 (2022) - [j65]Endong Tong
, Wenjia Niu, Jiqiang Liu:
A Missing QoS Prediction Approach via Time-Aware Collaborative Filtering. IEEE Trans. Serv. Comput. 15(6): 3115-3128 (2022) - [c68]Dan Su, Jiqiang Liu, Sencun Zhu, Xiaoyang Wang, Wei Wang:
Alexa Skills: Security Vulnerabilities and Countermeasures. CNS 2022: 1-9 - [c67]Di Zhai, Jian Wang, Jiqiang Liu, Tianhao Liu, Wenjia Niu:
Efficient-HotStuff: A BFT Blockchain Consensus with Higher Efficiency and Stronger Robustness. ICPADS 2022: 217-225 - [c66]Ziyan Qiao
, Rui Sun
, Shiyao Chen
, Dong Zi
, Xingyu Wu
, Qian Wang
, Endong Tong
, Wenjia Niu
, Jiqiang Liu
:
Adapting on Road Traffic-Oriented Controlled Optimization of Phases to Heterogeneous Intersections. Intelligent Information Processing 2022: 522-535 - 2021
- [j64]Tong Chen
, Jiqiang Liu
, Yingxiao Xiang
, Wenjia Niu
, Endong Tong
, Shuoru Wang
, He Li
, Liang Chang, Gang Li, Qi Alfred Chen:
Adversarial retraining attack of asynchronous advantage actor-critic based pathfinding. Int. J. Intell. Syst. 36(5): 2323-2346 (2021) - [j63]Yingdi Wang, Yunzhe Tian, Jiqiang Liu, Wenjia Niu
, Endong Tong:
A Training-Based Identification Approach to VIN Adversarial Examples in Path Planning. J. Circuits Syst. Comput. 30(13): 2150229:1-2150229:21 (2021) - [j62]Tong Chen, Jiqiang Liu, He Li, Shuoru Wang, Wenjia Niu, Endong Tong, Liang Chang, Qi Alfred Chen, Gang Li
:
Robustness Assessment of Asynchronous Advantage Actor-Critic Based on Dynamic Skewness and Sparseness Computation: A Parallel Computing View. J. Comput. Sci. Technol. 36(5): 1002-1021 (2021) - [j61]Yunzhe Tian
, Jiqiang Liu
, Endong Tong
, Wenjia Niu
, Liang Chang
, Qi Alfred Chen
, Gang Li
, Wei Wang
:
Towards Revealing Parallel Adversarial Attack on Politician Socialnet of Graph Structure. Secur. Commun. Networks 2021: 6631247:1-6631247:13 (2021) - [j60]Endong Tong
, Wenjia Niu, Yunzhe Tian, Jiqiang Liu
, Thar Baker
, Sandeep Verma
, Zheli Liu
:
A Hierarchical Energy-Efficient Service Selection Approach With QoS Constraints for Internet of Things. IEEE Trans. Green Commun. Netw. 5(2): 645-657 (2021) - [j59]Lun Li
, Xiaolin Chang
, Jingxian Liu
, Jiqiang Liu
, Zhu Han:
Bit2CV: A Novel Bitcoin Anti-Fraud Deposit Scheme for Connected Vehicles. IEEE Trans. Intell. Transp. Syst. 22(7): 4181-4193 (2021) - [j58]Lichen Cheng
, Jiqiang Liu, Yi Jin, Yidong Li, Wei Wang:
Account Guarantee Scheme: Making Anonymous Accounts Supervised in Blockchain. ACM Trans. Internet Techn. 21(1): 11:1-11:19 (2021) - [j57]Qiang Li, Zhihao Wang, Dawei Tan, Jinke Song, Haining Wang, Limin Sun, Jiqiang Liu
:
GeoCAM: An IP-Based Geolocation Service Through Fine-Grained and Stable Webcam Landmarks. IEEE/ACM Trans. Netw. 29(4): 1798-1812 (2021) - [c65]Guozhi Zhang, Jiqiang Liu, Xiaolin Chang:
Mec2: Mobile Edge Computing enabled Caching Framework for Internet of Vehicles. BigCom 2021: 14-21 - [c64]Qiang Li, Jinke Song, Dawei Tan, Haining Wang, Jiqiang Liu:
PDGraph: A Large-Scale Empirical Study on Project Dependency of Security Vulnerabilities. DSN 2021: 161-173 - [c63]Shuang Zhao, Yalun Wu, Rui Sun, Xiaoai Qian, Dong Zi, Zhiqiang Xie, Endong Tong, Wenjia Niu, Jiqiang Liu, Zhen Han:
Blockchain-based decentralized federated learning: A secure and privacy-preserving system. HPCC/DSS/SmartCity/DependSys 2021: 941-948 - [c62]Zhiqiang Xie, Yingxiao Xiang, Yike Li, Shuang Zhao, Endong Tong, Wenjia Niu, Jiqiang Liu, Jian Wang:
Security Analysis of Poisoning Attacks Against Multi-agent Reinforcement Learning. ICA3PP (1) 2021: 660-675 - [c61]Yufei Liu, Jiqiang Liu, Jian Wang, Tianhao Liu, Xudong He:
BSS-ITS: Blockchain Scaling Scheme with Sharding for Intelligent Transportation System: Scale Blockchain for Better Data Exchange and Storage with Full Sharding for Intelligent Transportation System. ICBTA 2021: 128-134 - [c60]Tianhao Liu, Jiqiang Liu, Jian Wang, Di Zhai, Yufei Liu, Xudong He:
Anonymous Storage and Verification Model of IIoT Based on Blockchain: Anonymous storage and verification model of IIoT production status based on blockchain. ICBTA 2021: 144-150 - [c59]Yalun Wu, Minglu Song, Yike Li, Yunzhe Tian, Endong Tong, Wenjia Niu, Bowei Jia, Haixiang Huang, Qiong Li, Jiqiang Liu:
Improving Convolutional Neural Network-Based Webshell Detection Through Reinforcement Learning. ICICS (1) 2021: 368-383 - [c58]Tong Chen, Yingxiao Xiang, Yike Li, Yunzhe Tian, Endong Tong, Wenjia Niu, Jiqiang Liu, Gang Li
, Qi Alfred Chen:
Protecting Reward Function of Reinforcement Learning via Minimal and Non-catastrophic Adversarial Trajectory. SRDS 2021: 299-309 - [i17]Yixiang Wang, Jiqiang Liu, Xiaolin Chang:
Generalizing Adversarial Examples by AdaBelief Optimizer. CoRR abs/2101.09930 (2021) - [i16]Yixiang Wang, Jiqiang Liu, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic:
IWA: Integrated Gradient based White-box Attacks for Fooling Deep Neural Networks. CoRR abs/2102.02128 (2021) - [i15]Dan Su, Jiqiang Liu, Sencun Zhu, Xiaoyang Wang, Wei Wang, Xiangliang Zhang
:
AppQ: Warm-starting App Recommendation Based on View Graphs. CoRR abs/2109.03798 (2021) - [i14]Yixiang Wang, Jiqiang Liu, Xiaolin Chang, Jianhua Wang, Ricardo J. Rodríguez:
DI-AA: An Interpretable White-box Attack for Fooling Deep Neural Networks. CoRR abs/2110.07305 (2021) - 2020
- [j56]Yixiang Wang, ShaoHua Lv, Jiqiang Liu, Xiaolin Chang
, Jinqiang Wang:
On the combination of data augmentation method and gated convolution model for building effective and robust intrusion detection. Cybersecur. 3(1): 23 (2020) - [j55]Heng Ye, Jiqiang Liu, Wei Wang, Ping Li, Tong Li, Jin Li:
Secure and efficient outsourcing differential privacy data release scheme in Cyber-physical system. Future Gener. Comput. Syst. 108: 1314-1323 (2020) - [j54]Ziqi Yan, Gang Li
, Jiqiang Liu:
Private rank aggregation under local differential privacy. Int. J. Intell. Syst. 35(10): 1492-1519 (2020) - [j53]Lun Li, Jiqiang Liu, Xiaolin Chang, Tianhao Liu, Jingxian Liu:
Toward conditionally anonymous Bitcoin transactions: A lightweight-script approach. Inf. Sci. 509: 290-303 (2020) - [j52]Wei Wang
, Yaoyao Shang, Yongzhong He, Yidong Li, Jiqiang Liu:
BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors. Inf. Sci. 511: 284-296 (2020) - [j51]Xinyu Huang
, Yunzhe Tian
, Yifei He
, Endong Tong
, Wenjia Niu
, Chenyang Li
, Jiqiang Liu
, Liang Chang
:
Exposing Spoofing Attack on Flocking-Based Unmanned Aerial Vehicle Cluster: A Threat to Swarm Intelligence. Secur. Commun. Networks 2020: 8889122:1-8889122:15 (2020) - [j50]Shuo Qiu
, Boyang Wang
, Ming Li
, Jiqiang Liu
, Yanfeng Shi:
Toward Practical Privacy-Preserving Frequent Itemset Mining on Encrypted Cloud Data. IEEE Trans. Cloud Comput. 8(1): 312-323 (2020) - [j49]Xing Liu
, Jiqiang Liu
, Sencun Zhu
, Wei Wang
, Xiangliang Zhang
:
Privacy Risk Analysis and Mitigation of Analytics Libraries in the Android Ecosystem. IEEE Trans. Mob. Comput. 19(5): 1184-1199 (2020) - [j48]Yike Li
, Yingxiao Xiang
, Endong Tong
, Wenjia Niu
, Bowei Jia
, Long Li
, Jiqiang Liu
, Zhen Han
:
An Empirical Study on GAN-Based Traffic Congestion Attack Analysis: A Visualized Method. Wirel. Commun. Mob. Comput. 2020: 8823300:1-8823300:14 (2020) - [c57]Wenping Ji, Jian Wang, Xudong He, Jiqiang Liu:
Malware Analysis Method Based Random Access Memory in Android. ATIS 2020: 78-94 - [c56]Bowei Jia, Yunzhe Tian, Di Zhao, Xiaojin Wang, Chenyang Li, Wenjia Niu, Endong Tong, Jiqiang Liu:
Bidirectional RNN-Based Few-Shot Training for Detecting Multi-stage Attack. Inscrypt 2020: 37-52 - [c55]Xudong He, Jian Wang, Jiqiang Liu, Zhen Han, Zhuo Lv, Wei Wang:
DNS Rebinding Detection for Local Internet of Things Devices. FCS 2020: 19-29 - [c54]Yunzhe Tian, Yingdi Wang, Endong Tong, Wenjia Niu, Liang Chang, Qi Alfred Chen, Gang Li
, Jiqiang Liu:
Exploring Data Correlation between Feature Pairs for Generating Constraint-based Adversarial Examples. ICPADS 2020: 430-437 - [c53]Xiaojin Wang, Yingxiao Xiang, Wenjia Niu, Endong Tong, Jiqiang Liu:
Explainable Congestion Attack Prediction and Software-level Reinforcement in Intelligent Traffic Signal System. ICPADS 2020: 667-672 - [c52]Xu Gao, Jiqiang Liu, Yike Li, Xiaojin Wang, Yingxiao Xiang, Endong Tong, Wenjia Niu, Zhen Han:
Queue Length Estimation Based Defence Against Data Poisoning Attack for Traffic Signal Control. Intelligent Information Processing 2020: 254-265 - [c51]Xiaojin Wang, Yingxiao Xiang, Wenjia Niu, Endong Tong, Qi Alfred Chen, Gang Li
, Jiqiang Liu, Long Li:
Constructing Optimal Sparse Decision Tree for Analying I-SIG System Attack. ISPA/BDCloud/SocialCom/SustainCom 2020: 321-328 - [c50]Shuoru Wang, Jiqiang Liu, Tong Chen, He Li, Wenjia Niu, Endong Tong, Long Li, Minglu Song:
A Configurable off-Policy Evaluation with Key State-Based Bias Constraints in AI Reinforcement Learning. SocialSec 2020: 120-131 - [c49]Yifei He, Jiqiang Liu, Endong Tong, Wenjia Niu, Xinyu Huang, Ying Zhou, Chenyang Li, Liang Chang:
Adapt Swarm Path Planning for UAV Based on Artificial Potential Field with Birds Intelligence Extensions. SocialSec 2020: 340-354 - [c48]Chao Li, Balaji Palanisamy, Runhua Xu, Jian Wang, Jiqiang Liu:
NF-Crowd: Nearly-free Blockchain-based Crowdsourcing. SRDS 2020: 41-50 - [c47]Yingdi Wang, Yixiang Wang, Endong Tong, Wenjia Niu, Jiqiang Liu:
A C-IFGSM Based Adversarial Approach for Deep Learning Based Intrusion Detection. VECoS 2020: 207-221 - [c46]Peng Wu
, Ning Xiong, Jiqiang Liu, Jie Meng, Jinzhao Wu
:
Quadratic Difference Set-Based Quorum Generation Algorithm in Distributed System. WSSE 2020: 85-89 - [i13]Chao Li, Balaji Palanisamy, Runhua Xu, Jian Wang, Jiqiang Liu:
NF-Crowd: Nearly-free Blockchain-based Crowdsourcing. CoRR abs/2009.02561 (2020) - [i12]Dan Su, Jiqiang Liu, Sencun Zhu, Xiaoyang Wang, Wei Wang:
"Are you home alone?" "Yes" Disclosing Security and Privacy Vulnerabilities in Alexa Skills. CoRR abs/2010.10788 (2020)
2010 – 2019
- 2019
- [j47]Dan Su
, Jiqiang Liu, Xiaoyang Wang, Wei Wang:
Detecting Android Locker-Ransomware on Chinese Social Networks. IEEE Access 7: 20381-20393 (2019) - [j46]Yixiang Wang, Jiqiang Liu
, Jelena V. Misic, Vojislav B. Misic, ShaoHua Lv
, Xiaolin Chang
:
Assessing Optimizer Impact on DNN Model Sensitivity to Adversarial Examples. IEEE Access 7: 152766-152776 (2019) - [j45]Ziqi Yan
, Qiong Wu, Meng Ren, Jiqiang Liu, Shaowu Liu
, Shuo Qiu:
Locally private Jaccard similarity estimation. Concurr. Comput. Pract. Exp. 31(24) (2019) - [j44]Tong Chen
, Jiqiang Liu, Yingxiao Xiang, Wenjia Niu, Endong Tong, Zhen Han:
Adversarial attack and defense in reinforcement learning-from AI security view. Cybersecur. 2(1): 11 (2019) - [j43]Ziqi Yan
, Jiqiang Liu, Shaowu Liu
:
DPWeVote: differentially private weighted voting protocol for cloud-based decision-making. Enterp. Inf. Syst. 13(2): 236-256 (2019) - [j42]Nannan Xie, Xing Wang, Wei Wang, Jiqiang Liu:
Fingerprinting Android malware families. Frontiers Comput. Sci. 13(3): 637-646 (2019) - [j41]Lichen Cheng, Jiqiang Liu, Chunhua Su, Kaitai Liang
, Guangquan Xu, Wei Wang:
Polynomial-based modifiable blockchain structure for removing fraud transactions. Future Gener. Comput. Syst. 99: 154-163 (2019) - [j40]Xinwei Gao, Jintai Ding, R. V. Saraswathy, Lin Li, Jiqiang Liu:
Comparison analysis and efficient implementation of reconciliation-based RLWE key exchange protocol. Int. J. High Perform. Comput. Netw. 13(2): 141-152 (2019) - [j39]Xiao Zhang
, Jiqiang Liu
, Si Chen, Yongjun Kong, Kui Ren:
PriWhisper+: An Enhanced Acoustic Short-Range Communication System for Smartphones. IEEE Internet Things J. 6(1): 614-627 (2019) - [j38]Lichen Cheng
, Jiqiang Liu
, Guangquan Xu
, Zonghua Zhang
, Hao Wang
, Hong-Ning Dai
, Yulei Wu
, Wei Wang
:
SCTSC: A Semicentralized Traffic Signal Control Mode With Attribute-Based Blockchain in IoVs. IEEE Trans. Comput. Soc. Syst. 6(6): 1373-1385 (2019) - [c45]Lun Li, Ali Arab, Jiqiang Liu, Jingxian Liu, Zhu Han:
Bitcoin Options Pricing Using LSTM-Based Prediction Model and Blockchain Statistics. Blockchain 2019: 67-74 - [c44]Yixiang Wang, Jiqiang Liu, Xiaolin Chang:
Assessing transferability of adversarial examples against malware detection classifiers. CF 2019: 211-214 - [c43]Yinqi Yang, Jian Wang, Baoqin Zhai, Jiqiang Liu:
IoT-Based DDoS Attack Detection and Mitigation Using the Edge of SDN. CSS (2) 2019: 3-17 - [c42]Bei Li, Yinqiao Li, Chen Xu, Ye Lin, Jiqiang Liu, Hui Liu, Ziyang Wang, Yuhao Zhang, Nuo Xu, Zeyang Wang, Kai Feng, Hexuan Chen, Tengbo Liu, Yanyang Li, Qiang Wang, Tong Xiao, Jingbo Zhu:
The NiuTrans Machine Translation Systems for WMT19. WMT (2) 2019: 257-266 - [i11]Jian Wang, Yacong Geng, Jiqiang Liu:
Adaptive Quantum Image Encryption Method Based on Wavelet Transform. CoRR abs/1901.07762 (2019) - [i10]Di Zhao, Jiqiang Liu, Jialin Wang, Wenjia Niu, Endong Tong, Tong Chen, Gang Li:
Bidirectional RNN-based Few-shot Training for Detecting Multi-stage Attack. CoRR abs/1905.03454 (2019) - [i9]Ziqi Yan, Gang Li, Jiqiang Liu:
Private Rank Aggregation under Local Differential Privacy. CoRR abs/1908.04486 (2019) - 2018
- [j37]Wei Wang, Zhenzhen Gao, Meichen Zhao, Yidong Li
, Jiqiang Liu, Xiangliang Zhang
:
DroidEnsemble: Detecting Android Malicious Applications With Ensemble of String and Structural Static Features. IEEE Access 6: 31798-31807 (2018) - [j36]ShaoHua Lv
, Jian Wang, Yinqi Yang, Jiqiang Liu:
Intrusion Prediction With System-Call Sequence-to-Sequence Model. IEEE Access 6: 71413-71421 (2018) - [j35]Dan Su, Jiqiang Liu, Wei Wang
, Xiaoyang Wang, Xiaojiang Du, Mohsen Guizani:
Discovering communities of malapps on Android-based mobile cyber-physical systems. Ad Hoc Networks 80: 104-115 (2018) - [j34]Wei Wang, Yuanyuan Li, Xing Wang, Jiqiang Liu, Xiangliang Zhang
:
Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers. Future Gener. Comput. Syst. 78: 987-994 (2018) - [j33]Xing Liu, Jiqiang Liu, Wei Wang, Sencun Zhu:
Android single sign-on security: Issues, taxonomy and directions. Future Gener. Comput. Syst. 89: 402-420 (2018) - [j32]Xinwei Gao, Jintai Ding, Lin Li, Saraswathy RV, Jiqiang Liu:
Efficient Implementation of Password-based Authenticated Key Exchange from RLWE and Post-Quantum TLS. Int. J. Netw. Secur. 20(5): 923-930 (2018) - [j31]Wei Wang, Jiqiang Liu, Georgios Pitsilis, Xiangliang Zhang
:
Abstracting massive data for lightweight intrusion detection in computer networks. Inf. Sci. 433-434: 417-430 (2018) - [j30]Xinwei Gao
, Jintai Ding
, Lin Li, Jiqiang Liu
:
Practical Randomized RLWE-Based Key Exchange Against Signal Leakage Attack. IEEE Trans. Computers 67(11): 1584-1593 (2018) - [j29]Shuo Qiu
, Jiqiang Liu
, Yanfeng Shi, Ming Li
, Wei Wang
:
Identity-Based Private Matching over Outsourced Encrypted Datasets. IEEE Trans. Cloud Comput. 6(3): 747-759 (2018) - [j28]Xiaolin Chang
, Ruofan Xia, Jogesh K. Muppala, Kishor S. Trivedi, Jiqiang Liu
:
Effective Modeling Approach for IaaS Data Center Performance Analysis under Heterogeneous Workload. IEEE Trans. Cloud Comput. 6(4): 991-1003 (2018) - [j27]Lun Li
, Jiqiang Liu, Lichen Cheng, Shuo Qiu, Wei Wang
, Xiangliang Zhang
, Zonghua Zhang
:
CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles. IEEE Trans. Intell. Transp. Syst. 19(7): 2204-2220 (2018) - [j26]Jia Zhao
, Jiqiang Liu, Zhan Qin, Kui Ren:
Privacy Protection Scheme Based on Remote Anonymous Attestation for Trusted Smart Meters. IEEE Trans. Smart Grid 9(4): 3313-3320 (2018) - [j25]Xing Liu, Jiqiang Liu, Wei Wang, Yongzhong He, Xiangliang Zhang
:
Discovering and understanding android sensor usage behaviors with data flow analysis. World Wide Web 21(1): 105-126 (2018) - [c41]Yingxiao Xiang, Wenjia Niu, Jiqiang Liu, Tong Chen, Zhen Han:
A PCA-Based Model to Predict Adversarial Examples on Q-Learning of Path Finding. DSC 2018: 773-780 - [c40]XiaoXuan Bai, Wenjia Niu, Jiqiang Liu, Xu Gao, Yingxiao Xiang, Jingjing Liu:
Adversarial Examples Construction Towards White-Box Q Table Variation in DQN Pathfinding Training. DSC 2018: 781-787 - [c39]Chunjing Qiu, Jiqiang Liu, Yingxiao Xiang, Wenjia Niu, Tong Chen:
Intention-Aware Multi-channel Keyword Extension for Content Security. DSC 2018: 788-794 - [c38]Shuanshuan Pang, Wenjia Niu, Jiqiang Liu, Yingxiao Xiang, Yingdi Wang:
An Approach to Generate Topic Similar Document by Seed Extraction-Based SeqGAN Training for Bait Document. DSC 2018: 803-810 - [c37]Jin Li, Heng Ye, Wei Wang, Wenjing Lou, Y. Thomas Hou, Jiqiang Liu, Rongxing Lu:
Efficient and Secure Outsourcing of Differentially Private Data Publication. ESORICS (2) 2018: 187-206 - [c36]Guozhi Zhang
, Jiqiang Liu
, Xiaolin Chang
, Yang Yang
:
Interest Relevance-Based Caching Design in Content-Centric Networking. ICA3PP (3) 2018: 661-671 - [c35]Xudong He, Jian Wang, Jiqiang Liu, Lei Han, Yang Yu, ShaoHua Lv:
Hierarchical Filtering Method of Alerts Based on Multi-Source Information Correlation Analysis. ICCCN 2018: 1-6 - [c34]Yang Yu, Jian Wang, Jiqiang Liu, Lei Han, Xudong He, ShaoHua Lv:
Multi-Dimension Threat Situation Assessment Based on Network Security Attributes. ICCCN 2018: 1-2 - [c33]Jiaping Men, Wei Wang, Jiqiang Liu, Zhen Han:
Designing Mutual Authentication Protocols in Industrial Wireless Network. ICDIS 2018: 153-158 - [c32]Xu Gao, Wenjia Niu, Jingjing Liu, Tong Chen, Yingxiao Xiang, XiaoXuan Bai, Jiqiang Liu:
A DeepWalk-Based Approach to Defend Profile Injection Attack in Recommendation System. Intelligent Information Processing 2018: 213-222 - [c31]Qiang Wang, Bei Li, Jiqiang Liu, Bojian Jiang, Zheyang Zhang, Yinqiao Li, Ye Lin, Tong Xiao, Jingbo Zhu:
The NiuTrans Machine Translation System for WMT18. WMT (shared task) 2018: 528-534 - [i8]Dan Su, Jiqiang Liu, Wei Wang, Xiaoyang Wang, Xiaojiang Du, Mohsen Guizani:
Discovering Communities of Malapps on Android-based Mobile Cyber-physical Systems. CoRR abs/1804.01641 (2018) - [i7]Tong Chen, Wenjia Niu, Yingxiao Xiang, XiaoXuan Bai, Jiqiang Liu, Zhen Han, Gang Li:
Gradient Band-based Adversarial Training for Generalized Attack Immunity of A3C Path Finding. CoRR abs/1807.06752 (2018) - [i6]ShaoHua Lv, Jian Wang, Yinqi Yang, Jiqiang Liu:
Intrusion Prediction with System-call Sequence-to-Sequence Model. CoRR abs/1808.01717 (2018) - [i5]Yingdi Wang, Wenjia Niu, Tong Chen, Yingxiao Xiang, Jingjing Liu, Gang Li, Jiqiang Liu:
A Training-based Identification Approach to VIN Adversarial Examples. CoRR abs/1810.08070 (2018) - 2017
- [j24]