default search action
Wenyan Liu 0005
Person information
- affiliation: National Digital Switching System Engineering and Technological Research Center, Zhengzhou, China
Other persons with the same name
- Wenyan Liu (aka: Wen-yan Liu, Wen-Yan Liu) — disambiguation page
- Wenyan Liu 0001 — East China Normal University, Shanghai Key Laboratory of Trustworthy Computing, Shanghai, China
- Wenyan Liu 0002 — Northeastern University, College of Medicine and Biological and Information Engineering, Shenyang, China
- Wenyan Liu 0003 (aka: Wen-yan Liu 0003) — National University of Defense Technology, College of Electronic Science and Engineering, Changsha, China
- Wenyan Liu 0004 — Zhengzhou Institute of Information Science and Technology, Zhengzhou, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Shuyi Li, Xiaohan Yang, Guozhen Cheng, Wenyan Liu, Hongchao Hu:
SA-MDRAD: sample-adaptive multi-teacher dynamic rectification adversarial distillation. Multim. Syst. 30(4): 225 (2024) - 2020
- [j6]Yawen Wang, Yunfei Guo, Zehua Guo, Thar Baker, Wenyan Liu:
CLOSURE: A cloud scientific workflow scheduling algorithm based on attack-defense game model. Future Gener. Comput. Syst. 111: 460-474 (2020) - [j5]Yawen Wang, Yunfei Guo, Zehua Guo, Wenyan Liu, Chao Yang:
Protecting scientific workflows in clouds with an intrusion tolerant system. IET Inf. Secur. 14(2): 157-165 (2020)
2010 – 2019
- 2019
- [j4]Yawen Wang, Yunfei Guo, Zehua Guo, Wenyan Liu, Chao Yang:
Securing the Intermediate Data of Scientific Workflows in Clouds With ACISO. IEEE Access 7: 126603-126617 (2019) - [j3]Qing Tong, Yunfei Guo, Hongchao Hu, Wenyan Liu, Guozhen Cheng, Ling-shu Li:
A Diversity Metric Based Study on the Correlation between Diversity and Security. IEICE Trans. Inf. Syst. 102-D(10): 1993-2003 (2019) - 2018
- [j2]Chao Yang, Yunfei Guo, Hongchao Hu, Wenyan Liu:
CacheSCDefender: VMM-based Comprehensive Framework against Cache-based Side-channel Attacks. KSII Trans. Internet Inf. Syst. 12(12): 6098-6122 (2018) - [j1]Ya-wen Wang, Jiang-xing Wu, Yun-fei Guo, Hong-chao Hu, Wen-yan Liu, Guo-zhen Cheng:
Scientific workflow execution system based on mimic defense in the cloud environment. Frontiers Inf. Technol. Electron. Eng. 19(12): 1522-1536 (2018) - 2017
- [c2]Wenyan Liu, Fucai Chen, Hongchao Hu, Guozhen Cheng, Shumin Huo, Hao Liang:
A Novel Framework for Zero-Day Attacks Detection and Response with Cyberspace Mimic Defense Architecture. CyberC 2017: 50-53 - 2016
- [c1]Chao Qi, Jiangxing Wu, Hongchao Hu, Guozhen Cheng, Wenyan Liu, Jianjian Ai, Chao Yang:
An intensive security architecture with multi-controller for SDN. INFOCOM Workshops 2016: 401-402
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 21:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint