default search action
Liang Liu 0009
Person information
- affiliation: Sichuan University, College of Cybersecurity, Chengdu, China
Other persons with the same name
- Liang Liu — disambiguation page
- Liang Liu 0001 — Beijing University of Posts and Telecommunications, Beijing Key Lab of Intelligent Telecommunications Software and Multimedia, China (and 2 more)
- Liang Liu 0002 — Lund University, Department of Electrical and Information Technology, Sweden (and 2 more)
- Liang Liu 0003 — Hong Kong Polytechnic University, Department of Electronic and Information Engineering, Hong Kong (and 3 more)
- Liang Liu 0004 — University of Electronic Science and Technology of China, Center for Cyber Security, School of Information and Communication Engineering, Chengdu, China
- Liang Liu 0005 — Northeastern University, Institute of Automation, College of Information Science and Engineering, Shenyang, China
- Liang Liu 0006 — Nanjing University of Aeronautics and Astronautics, College of Computer Science and Technology, China
- Liang Liu 0007 — Zhejiang University, Department of Control Science and Engineering, Institute of Cyber-Systems and Control, Hangzhou, China
- Liang Liu 0008 — Nanjing University of Science and Technology, School of Mechanical Engineering, Nanjing, China
- Liang Liu 0010 — IBM China Research Laboratory, Beijing, China
- Liang Liu 0011 — National University of Defense Technology, Changsha, China
- Liang Liu 0012 — Civil Aviation University of China, School of Electronic Information and Automation, Tianjin, China
- Liang Liu 0013 — Georgia Institute of Technology, Atlanta, GA, USA
- Liang Liu 0014 — Northwestern University, Department of Industrial Engineering and Management Science, Evanston, IL, USA (and 2 more)
- Liang Liu 0015 — University of Shanghai for Science and Technology, Department of Computer Science, Shanghai, China
- Liang Liu 0016 — Bohai University, College of Engineering, Jinzhou, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Liang Liu, Xinyu Kuang, Lin Liu, Lei Zhang:
Defend against adversarial attacks in malware detection through attack space management. Comput. Secur. 141: 103841 (2024) - [j25]Xiaolong Lan, Ziheng Xu, Junjiang He, Liang Liu, Qingchun Chen, Tao Li:
Information-Freshness-Aware Wireless Multiuser Uplink Physical-Layer Security Communication. IEEE Internet Things J. 11(9): 15940-15956 (2024) - [c12]Liang Liu, Yuhao He, Lei Zhang, Lin Liu, Beibei Li:
GraphCyber: Identifying IP Usage Scenarios for Cyberspace Mapping. ICC 2024: 3310-3315 - 2022
- [j24]Liang Liu, Lin Liu, Beibei Li, Yi Zhong, Shan Liao, Lei Zhang:
MSCCS: A Monero-based security-enhanced covert communication system. Comput. Networks 205: 108759 (2022) - [j23]Beibei Li, Yukun Jiang, Qingqi Pei, Tao Li, Liang Liu, Rongxing Lu:
FEEL: Federated End-to-End Learning With Non-IID Data for Vehicular Ad Hoc Networks. IEEE Trans. Intell. Transp. Syst. 23(9): 16728-16740 (2022) - 2021
- [j22]Liang Liu, Lei Zhang, Shan Liao, Jiayong Liu, Zhenxue Wang:
A generalized approach to solve perfect Bayesian Nash equilibrium for practical network attack and defense. Inf. Sci. 577: 245-264 (2021) - 2020
- [j21]Xi Peng, Liang Liu, Lei Zhang:
A Hive-Based Retrieval Optimization Scheme for Long-Term Storage of Massive Call Detail Records. IEEE Access 8: 431-444 (2020) - [j20]Li Jia, Anmin Zhou, Peng Jia, Luping Liu, Yan Wang, Liang Liu:
A Neural Network-Based Approach for Cryptographic Function Detection in Malware. IEEE Access 8: 23506-23521 (2020) - [j19]Yong Fang, Cuirong Zhao, Cheng Huang, Liang Liu:
SankeyVis: Visualizing active relationship from emails based on multiple dimensions and topic classification methods. Digit. Investig. 35: 300981 (2020) - [j18]Pin Yang, Huiyu Zhou, Yue Zhu, Liang Liu, Lei Zhang:
Malware Classification Based on Shallow Neural Network. Future Internet 12(12): 219 (2020) - [j17]Zheng Zuo, Liang Liu, Jiayong Liu, Cheng Huang:
Cross-modality earth mover's distance-driven convolutional neural network for different-modality data. Neural Comput. Appl. 32(13): 9581-9592 (2020) - [j16]Rongfeng Zheng, Jiayong Liu, Weina Niu, Liang Liu, Kai Li, Shan Liao:
Preprocessing Method for Encrypted Traffic Based on Semisupervised Clustering. Secur. Commun. Networks 2020: 8824659:1-8824659:13 (2020) - [j15]Yang Chen, Rongfeng Zheng, Anmin Zhou, Shan Liao, Liang Liu:
Automatic Detection of Pornographic and Gambling Websites Based on Visual and Textual Content Using a Decision Mechanism. Sensors 20(14): 3989 (2020) - [j14]Peisong He, Haoliang Li, Bin Li, Hongxia Wang, Liang Liu:
Exposing Fake Bitrate Videos Using Hybrid Deep-Learning Network From Recompression Error. IEEE Trans. Circuits Syst. Video Technol. 30(11): 4034-4049 (2020)
2010 – 2019
- 2019
- [j13]Hanfang Zhang, Anmin Zhou, Peng Jia, Luping Liu, Jinxin Ma, Liang Liu:
InsFuzz: Fuzzing Binaries With Location Sensitivity. IEEE Access 7: 22434-22444 (2019) - [j12]Yong Fang, Yusong Guo, Cheng Huang, Liang Liu:
Analyzing and Identifying Data Breaches in Underground Forums. IEEE Access 7: 48770-48777 (2019) - [j11]Yong Fang, Cheng Zhang, Cheng Huang, Liang Liu, Yue Yang:
Phishing Email Detection Using Improved RCNN Model With Multilevel Vectors and Attention Mechanism. IEEE Access 7: 56329-56340 (2019) - [j10]Xinyue Huang, Anmin Zhou, Peng Jia, Luping Liu, Liang Liu:
Fuzzing the Android Applications With HTTP/HTTPS Network Data. IEEE Access 7: 59951-59962 (2019) - [j9]Jiayong Liu, Zhiyi Tian, Rongfeng Zheng, Liang Liu:
A Distance-Based Method for Building an Encrypted Malware Traffic Identification Framework. IEEE Access 7: 100014-100028 (2019) - [j8]Luping Liu, Xiaohai He, Liang Liu, Lingbo Qing, Yong Fang, Jiayong Liu:
Capturing the symptoms of malicious code in electronic documents by file's entropy signal combined with machine learning. Appl. Soft Comput. 82 (2019) - [j7]Liang Liu, Cheng Huang, Yong Fang, Zhenxue Wang:
Network Attack and Defense Game Theory Based on Bayes-Nash Equilibrium. KSII Trans. Internet Inf. Syst. 13(10): 5260-5275 (2019) - [j6]Hua Peng, Liang Liu, Jiayong Liu, Johnwb R. Lewis:
Network traffic anomaly detection algorithm using mahout classifier. J. Intell. Fuzzy Syst. 37(1): 137-144 (2019) - [c11]Liang Liu, Cheng Huang, Yong Fang, Zhenxue Wang:
Network Attack and Defense Effectiveness Evaluation Based on Dematel Method. ICAIS (3) 2019: 564-575 - [c10]Yong Fang, Yijia Xu, Cheng Huang, Liang Liu, Lei Zhang:
Against Malicious SSL/TLS Encryption: Identify Malicious Traffic Based on Random Forest. ICICT (2) 2019: 99-115 - [i1]Luping Liu, Xiaohai He, Liang Liu, Lingbo Qing, Yong Fang, Jiayong Liu:
Capturing the symptoms of malicious code in electronic documents by file's entropy signal combined with Machine learning. CoRR abs/1903.10208 (2019) - 2018
- [j5]Yong Fang, Cheng Huang, Liang Liu, Min Xue:
Research on Malicious JavaScript Detection Technology Based on LSTM. IEEE Access 6: 59118-59125 (2018) - [j4]Jing Zhang, Anmin Zhou, Liang Liu, Peng Jia, Luping Liu:
Crash可利用性分析方法研究综述 (Review of Crash Exploitability Analysis Methods). 计算机科学 45(5): 5-14 (2018) - [j3]Fengping Rong, Yong Fang, Zheng Zuo, Liang Liu:
MACSPMD: 基于恶意API调用序列模式挖掘的恶意代码检测 (MACSPMD: Malicious API Call Sequential Pattern Mining Based Malware Detection). 计算机科学 45(5): 131-138 (2018) - [j2]Zheng Zuo, Liang Liu, Lei Zhang, Yong Fang:
Indoor Positioning Based on Bluetooth Low-Energy Beacons Adopting Graph Optimization. Sensors 18(11): 3736 (2018) - [c9]Handong Cui, Delu Huang, Yong Fang, Liang Liu, Cheng Huang:
Webshell Detection Based on Random Forest-Gradient Boosting Decision Tree Algorithm. DSC 2018: 153-160 - [c8]Yong Fang, Yang Li, Liang Liu, Cheng Huang:
DeepXSS: Cross Site Scripting Detection Based on Deep Learning. ICCAI 2018: 47-51 - [c7]Yong Fang, Yaoyao Qiu, Liang Liu, Cheng Huang:
Detecting Webshell Based on Random Forest with FastText. ICCAI 2018: 52-56 - [c6]Yong Fang, Xiao Long, Liang Liu, Cheng Huang:
DarkHunter: A Fingerprint Recognition Model for Web Automated Scanners Based on CNN. ICCSP 2018: 10-15 - [c5]Yong Fang, Jiayi Peng, Liang Liu, Cheng Huang:
WOVSQLI: Detection of SQL Injection Behaviors Using Word Vector and LSTM. ICCSP 2018: 170-174 - 2015
- [j1]Qian Zhang, Rongjun Qin, Xin Huang, Yong Fang, Liang Liu:
Classification of Ultra-High Resolution Orthophotos Combined with DSM Using a Dual Morphological Top Hat Profile. Remote. Sens. 7(12): 16422-16440 (2015) - [c4]Peng Jia, Xiang He, Liang Liu, Binjie Gu, Yong Fang:
A framework for privacy information protection on Android. ICNC 2015: 1127-1131 - [c3]Binjie Gu, Yong Fang, Peng Jia, Liang Liu, Lei Zhang, Meilin Wang:
A New Static Detection Method of Malicious Document Based on Wavelet Package Analysis. IIH-MSP 2015: 333-336 - 2014
- [c2]Yi Gong, Yong Fang, Liang Liu, Juan Li:
Multi-agent Intrusion Detection System Using Feature Selection Approach. IIH-MSP 2014: 528-531 - 2013
- [c1]Liang He, Yong Fang, Liang Liu:
Website Regional Rapid Security Detection Method. CICSyN 2013: 185-190
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 21:07 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint