default search action
Anyi Liu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2011
- [b1]Anyi Liu:
Development of a Secure Mobile GPS Tracking and Management System. George Mason University, Fairfax, Virginia, USA, 2011
Journal Articles
- 2021
- [j7]Anyi Liu, Ali Alqazzaz, Ming Hua, Balakrishnan Dharmalingam:
Iotverif: Automatic Verification of SSL/TLS Certificate for IoT Applications. IEEE Access 9: 27038-27050 (2021) - 2020
- [j6]Yangguang Tian, Yingjiu Li, Robert H. Deng, Nan Li, Pengfei Wu, Anyi Liu:
A new framework for privacy-preserving biometric-based remote user authentication. J. Comput. Secur. 28(4): 469-498 (2020) - 2019
- [j5]Canlin Li, Jinhua Liu, Anyi Liu, Qinge Wu, Lihua Bi:
Global and Adaptive Contrast Enhancement for Low Illumination Gray Images. IEEE Access 7: 163395-163411 (2019) - [j4]Anyi Liu, Selena Haidar, Yuan Cheng, Yingjiu Li:
Confidential State Verification for the Delegated Cloud Jobs with Confidential Audit Log. EAI Endorsed Trans. Security Safety 6(20): e3 (2019) - [j3]Anyi Liu, Huirong Fu, Yuan Hong, Jigang Liu, Yingjiu Li:
LiveForen: Ensuring Live Forensic Integrity in the Cloud. IEEE Trans. Inf. Forensics Secur. 14(10): 2749-2764 (2019) - 2006
- [j2]Lingyu Wang, Anyi Liu, Sushil Jajodia:
Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts. Comput. Commun. 29(15): 2917-2933 (2006) - [j1]Huiping Guo, Yingjiu Li, Anyi Liu, Sushil Jajodia:
A fragile watermarking scheme for detecting malicious modifications of database relations. Inf. Sci. 176(10): 1350-1378 (2006)
Conference and Workshop Papers
- 2023
- [c20]Brett Piggott, Siddhant Patil, Guohuan Feng, Ibrahim Odat, Rajdeep Mukherjee, Balakrishnan Dharmalingam, Anyi Liu:
Net-GPT: A LLM-Empowered Man-in-the-Middle Chatbot for Unmanned Aerial Vehicle. SEC 2023: 287-293 - [c19]Balakrishnan Dharmalingam, Ibrahim Odat, Rajdeep Mukherjee, Brett Piggott, Anyi Liu:
Heterogeneous Generative Dataset for UASes. MOST 2023: 229-230 - 2022
- [c18]Balakrishnan Dharmalingam, Anyi Liu, Subra Ganesan, Sankardas Roy:
FineObfuscator: Defeating Reverse Engineering Attacks with Context-sensitive and Cost-efficient Obfuscation for Android Apps. EIT 2022: 368-374 - [c17]David Werden, Matthew Muccioli, Anyi Liu:
TEEm: A Tangle-based Elastic Emulator for Storing Connected Vehicle Data in a Distributed Ledger Technology. ICISSP 2022: 230-241 - 2018
- [c16]Xiao Yue, Guangzhi Qu, Bo Liu, Anyi Liu:
Detection Sound Source Direction in 3D Space Using Convolutional Neural Networks. AI4I 2018: 81-84 - [c15]Zijun Han, Guangzhi Qu, Bo Liu, Anyi Liu, Weihua Cai, Dona Burkard:
Genetic Algorithm Based Parallelization Planning for Legacy Real-Time Embedded Programs. AI4I 2018: 96-99 - [c14]Ali Alshehri, Hani Alshahrani, Abdulrahman Alzahrani, Raed Alharthi, Huirong Fu, Anyi Liu, Ye Zhu:
DOPA: Detecting Open Ports in Android OS. CNS 2018: 1-2 - [c13]Khalid Alghamdi, Ali Alqazzaz, Anyi Liu, Ming Hua:
IoTVerif: An Automated Tool to Verify SSL/TLS Certificate Validation in Android MQTT Client Applications. CODASPY 2018: 95-102 - [c12]Raed Alharthi, Abdelnasser Banihani, Abdulrahman Alzahrani, Ali Alshehri, Hani Alshahrani, Huirong Fu, Anyi Liu, Ye Zhu:
Location Privacy Challenges in Spatial Crowdsourcing. EIT 2018: 564-569 - [c11]Anyi Liu, Huirong Fu:
Fast Tamper Detection for Hierarchical Data in Live Cloud Forensics. EIT 2018: 589-594 - [c10]Abdulrahman Alzahrani, Ali Alshehri, Hani Alshahrani, Raed Alharthi, Huirong Fu, Anyi Liu, Ye Zhu:
RanDroid: Structural Similarity Approach for Detecting Ransomware Applications in Android Platform. EIT 2018: 892-897 - [c9]Anyi Liu, Guangzhi Qu:
H-Verifier: Verifying Confidential System State with Delegated Sandboxes. SciSec 2018: 126-140 - 2016
- [c8]Xunyu Pan, Jacob Wilson, Megan Balukoff, Anyi Liu, Wenjuan Xu:
Musical Instruments Simulation on Mobile Platform. MOBMU 2016: 1-8 - [c7]Xiaohong Yuan, Kenneth Williams, D. Scott McCrickard, Charles Hardnett, Litany H. Lineberry, Kelvin S. Bryant, Jinsheng Xu, Albert C. Esterline, Anyi Liu, Selvarajah Mohanarajah, Rachel Rutledge:
Teaching mobile computing and mobile security. FIE 2016: 1-6 - 2014
- [c6]Anyi Liu, Jigang Liu, Tetsutaro Uehara:
Secure streaming forensic data transmission for trusted cloud. SFCS@ASIACCS 2014: 3-10 - 2013
- [c5]Anyi Liu, Jim X. Chen, Harry Wechsler:
Real-Time Covert Timing Channel Detection in Networked Virtual Environments. IFIP Int. Conf. Digital Forensics 2013: 273-288 - 2011
- [c4]Rajeshwar Katipally, Li Yang, Anyi Liu:
Attacker behavior analysis in multi-stage attack detection system. CSIIRW 2011: 63 - [c3]Anyi Liu, Jim X. Chen, Li Yang:
Real-Time Detection of Covert Channels in Highly Virtualized Environments. Critical Infrastructure Protection 2011: 151-164 - 2009
- [c2]Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Stavrou:
SQLProb: a proxy-based architecture towards preventing SQL injection attacks. SAC 2009: 2054-2061 - 2005
- [c1]Lingyu Wang, Anyi Liu, Sushil Jajodia:
An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts. ESORICS 2005: 247-266
Data and Artifacts
- 2019
- [d1]Anyi Liu:
Supplementary Material for "LiveForen: Ensuring Live Forensic Integrity in the Cloud". IEEE DataPort, 2019
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-05 22:03 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint