


default search action
Liping Ding
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Feng Ju, Xinfeng Gu, Bai Chen, Xiaoyu Sun, Zhiyuan Shen, Bruce W. Drinkwater, Liping Ding
:
A Flexible Surgical Robot with Hemispherical Magnet Array Steering and Embedded Piezoelectric Beacon for Ultrasonic Position Sensing. Adv. Intell. Syst. 6(3) (2024) - 2023
- [j12]Jiongen Xiao, Wenchun Tian
, Liping Ding:
Basketball Action Recognition Method of Deep Neural Network Based on Dynamic Residual Attention Mechanism. Inf. 14(1): 13 (2023) - 2021
- [j11]Jin Du, Feng Yuan, Liping Ding, Guangxuan Chen, Xuehua Liu:
Research on Threat Information Network Based on Link Prediction. Int. J. Digit. Crime Forensics 13(2): 94-102 (2021) - [c23]Xuehua Liu, Liping Ding, Tao Zheng, Fang Yu, Zhen Jia, Wang Xiao:
A Network Forensics Investigating Method Based on Weak Consistency for Distributed SDN. UbiSec 2021: 241-254 - 2020
- [j10]Jin Du, Liping Ding, Guangxuan Chen:
Research on the Rules of Electronic Evidence in Chinese Criminal Proceedings. Int. J. Digit. Crime Forensics 12(3): 111-121 (2020)
2010 – 2019
- 2018
- [j9]Guangxuan Chen, Liping Ding, Jin Du, Guomin Zhou, Panke Qin, Guangxiao Chen, Qiang Liu:
Trust Evaluation Strategy for Single Sign-on Solution in Cloud. Int. J. Digit. Crime Forensics 10(1): 1-11 (2018) - [j8]Guangxuan Chen, Liping Ding, Guangxiao Chen, Panke Qin:
Reliable Security Strategy for Message-Oriented Middleware. Int. J. Digit. Crime Forensics 10(1): 12-23 (2018) - [c22]Yasen Aizezi, Anniwaer Jiamali, Ruxianguli Abudurexiti, Xuehua Liu, Jin Du, Liping Ding:
Research on Image Recognition Method Based on Deep Learning Algorithm. AVSS 2018: 1-6 - 2017
- [j7]Xin Liao
, Zheng Qin, Liping Ding:
Data embedding in digital images using critical functions. Signal Process. Image Commun. 58: 146-156 (2017) - [c21]Qi Li, Xin Liao
, Guoyong Chen, Liping Ding:
A Novel Game-Theoretic Model for Content-Adaptive Image Steganography. ICDCS Workshops 2017: 232-237 - [c20]Shaojiang Wang, Tianyong Wu, Yuan Yao, Beihong Jin, Liping Ding:
Combinatorial Testing on MP3 for Audio Players. ICST Workshops 2017: 272-275 - [c19]Jing Shuai, Xin Cheng, Liping Ding, Jun Yang, Wenjing Li:
Building a Cost and Profit Sharing Model for an E-business Project in Rural China: a Shapely Value Approach. WHICEB 2017: 48 - 2015
- [j6]Qing Tian, Wei Yang, Liping Ding:
On the general trigonometric sums weighted by character sums. Appl. Math. Comput. 268: 375-387 (2015) - [c18]Qian Zhang, Ying Jiang, Liping Ding:
Modelling and Analysis of Network Security - a Probabilistic Value-passing CCS Approach. ICICS 2015: 295-302 - [c17]Xin Liao
, Liping Ding:
Data Hidng in Digital Image Using Four Pixel-Value-Differencing and Multiple-Base Notational. IIH-MSP 2015: 76-80 - [i2]Qian Zhang, Ying Jiang, Liping Ding:
Modelling and Analysis Network Security - a PVCCS approach. CoRR abs/1507.06769 (2015) - 2014
- [j5]Genqiang Wu, Yeping He, Yi Lu, Liping Ding:
Privacy-Preserving Location Assurance Protocols for Mobile Applications. J. Softw. 9(8): 1991-2001 (2014) - [j4]JingZheng Wu, Liping Ding, Yanjun Wu, Nasro Min-Allah
, Samee Ullah Khan
, Yongji Wang:
C2Detector: a covert channel detection framework in cloud computing. Secur. Commun. Networks 7(3): 544-557 (2014) - [i1]Genqiang Wu, Yeping He, Yi Lu, Liping Ding:
Efficient Interval Check in the Presence of Malicious Adversaries. IACR Cryptol. ePrint Arch. 2014: 690 (2014) - 2013
- [c16]Bei Guan, Yanjun Wu, Liping Ding, Yongji Wang:
CIVSched: Communication-aware Inter-VM Scheduling in Virtual Machine Monitor Based on the Process. CCGRID 2013: 597-604 - [c15]Yuqi Lin, Liping Ding, JingZheng Wu, Yalong Xie, Yongji Wang:
Robust and Efficient Covert Channel Communications in Operating Systems: Design, Implementation and Evaluation. SERE (Companion) 2013: 45-52 - 2012
- [j3]Dengguo Feng, Xiubin Fan, Liping Ding, Zhang-yi Wang:
On the nonexistence of nontrivial small cycles of the µ function in 3x+1 conjecture. J. Syst. Sci. Complex. 25(6): 1215-1222 (2012) - [j2]JingZheng Wu, Yongji Wang, Liping Ding, Xiaofeng Liao:
Improving performance of network covert timing channel through Huffman coding. Math. Comput. Model. 55(1-2): 69-79 (2012) - [c14]JingZheng Wu, Liping Ding, Yuqi Lin, Nasro Min-Allah
, Yongji Wang:
XenPump: A New Method to Mitigate Timing Channel in Cloud Computing. IEEE CLOUD 2012: 678-685 - [c13]Yi Lu, Liping Ding, Yongji Wang:
Improved Linear Analysis on Block Cipher MULTI2. CANS 2012: 72-85 - [c12]Jianchun Jiang, Liping Ding, Ennan Zhai, Ting Yu:
VRank: A Context-Aware Approach to Vulnerability Scoring and Ranking in SOA. SERE 2012: 61-70 - 2011
- [j1]Xiaofeng Liao, Yongji Wang, Liping Ding, Jian Gu:
Extended Probabilistic Latent Semantic Analysis Model For Topics In Time-Stamped Images. Intell. Autom. Soft Comput. 17(7): 997-1007 (2011) - [c11]JingZheng Wu, Liping Ding, Yongji Wang, Wei Han:
Identification and Evaluation of Sharing Memory Covert Timing Channel in Xen Virtual Machines. IEEE CLOUD 2011: 283-291 - [c10]Ennan Zhai, Qingni Shen, Yonggang Wang, Tao Yang, Liping Ding, Sihan Qing:
SecGuard: Secure and Practical Integrity Protection Model for Operating Systems. APWeb 2011: 370-375 - [c9]Yi Lu, Serge Vaudenay, Willi Meier, Liping Ding, Jianchun Jiang:
Synthetic Linear Analysis: Improved Attacks on CubeHash and Rabbit. ICISC 2011: 248-260 - [c8]Xiaofeng Liao, Liping Ding, Yongji Wang:
Secure Machine Learning, a Brief Overview. SSIRI (Companion) 2011: 26-29 - [c7]Wei Han, Yeping He, Liping Ding:
Verifying the Safety of Xen Security Modules. SSIRI (Companion) 2011: 30-34 - [c6]JingZheng Wu, Liping Ding, Yongji Wang, Wei Han:
A Practical Covert Channel Identification Approach in Source Code Based on Directed Information Flow Graph. SSIRI 2011: 98-107 - [c5]Ennan Zhai, Liping Ding, Sihan Qing:
Towards a Reliable Spam-Proof Tagging System. SSIRI 2011: 174-181 - 2010
- [c4]Liping Ding, Wenliang Chen, Jianrong Tan, Yixiong Feng
:
Multi-objective disassembly line balancing via modified ant colony optimization algorithm. BIC-TA 2010: 426-430 - [c3]Liping Ding, Jian Gu, Yongji Wang, JingZheng Wu:
Analysis of Telephone Call Detail Records Based on Fuzzy Decision Tree. e-Forensics 2010: 301-311 - [c2]Jianchun Jiang, Weifeng Chen, Liping Ding:
On Estimating Cyber Adversaries' Capabilities: A Bayesian Model Approach. RAID 2010: 502-504
2000 – 2009
- 2005
- [c1]Liping Ding, Qiusong Yang, Liang Sun, Jie Tong, Yongji Wang:
Evaluation of the Capability of Personal Software Process Based on Data Envelopment Analysis. ISPW 2005: 235-248
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:19 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint