


default search action
Jingju Liu
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j9]Yunlong Zhang, Jingju Liu, Xiaofeng Zhong, Lei Wu:
SecLMNER: A framework for enhanced named entity recognition in multi-source cybersecurity data using large language models. Expert Syst. Appl. 271: 126651 (2025) - 2024
- [c8]Lei Wu
, Xiaofeng Zhong, Jingju Liu
, Xiang Wang:
PTGroup: An Automated Penetration Testing Framework Using LLMs and Multiple Prompt Chains. ICIC (9) 2024: 220-232 - [i1]Shicheng Zhou, Jingju Liu, Yuliang Lu, Jiahai Yang, Yue Zhang, Jie Chen:
Towards Generalizable Autonomous Penetration Testing via Domain Randomization and Meta-Reinforcement Learning. CoRR abs/2412.04078 (2024) - 2023
- [c7]Peng Wang
, Jingju Liu
:
A Cyber Threat Entity Recognition Method Based on Robust Feature Representation and Adversarial Training. ICCPR 2023: 255-259 - [c6]Jianfei Cai, Guozheng Yang, Jingju Liu, Yi Xie:
FuzzyCAT: A Framework for Network Configuration Verification Based on Fuzzing. IPCCC 2023: 123-131 - [c5]Peng Wang, Jingju Liu, Qian Yao
, Xinli Xiong:
A Cybersecurity Knowledge Graph Completion Method for Scalable Scenarios. KSEM (4) 2023: 83-98 - 2022
- [j8]Zhihao Luo, Jingju Liu, Guozheng Yang, Yongheng Zhang
, Zijun Hang:
High-Speed Path Probing Method for Large-Scale Network. Sensors 22(15): 5650 (2022) - [c4]Peng Wang, Jingju Liu, Xiaofeng Zhong, Guozheng Yang, Shicheng Zhou
, Yue Zhang:
DUSC-DQN: An Improved Deep Q-Network for Intelligent Penetration Testing Path Design. ICCCS 2022: 476-480 - 2021
- [j7]Hanlin Liu, Jingju Liu, Xuehu Yan
, Pengfei Xue, Dingwei Tan:
An Audio Steganography Based on Run Length Encoding and Integer Wavelet Transform. Int. J. Digit. Crime Forensics 13(2): 16-34 (2021) - [c3]Qiuyun Cheng, Guozheng Yang, Jingju Liu, Yongheng Zhang:
Research on Network Security Issues from the Perspective of Multilayer Networks. DSIT 2021: 92-97 - 2020
- [j6]Xuehu Yan
, Yuliang Lu, Lintao Liu, Xia Li, Jingju Liu, Guozheng Yang:
Application of random elements in ISS. IET Image Process. 14(3): 530-535 (2020) - [j5]Xuehu Yan, Qinghong Gong, Longlong Li
, Guozheng Yang, Yuliang Lu, Jingju Liu:
Secret image sharing with separate shadow authentication ability. Signal Process. Image Commun. 82: 115721 (2020)
2010 – 2019
- 2019
- [j4]Hanlin Liu, Jingju Liu, Xuehu Yan
, Lintao Liu, Wanmeng Ding, Yue Jiang:
A Novel Behavior Steganography Model Based on Secret Sharing. Int. J. Digit. Crime Forensics 11(4): 97-117 (2019) - 2018
- [j3]Xuehu Yan, Yuliang Lu, Lintao Liu, Jingju Liu, Guozheng Yang:
Chinese remainder theorem-based two-in-one image secret sharing with three decoding options. Digit. Signal Process. 82: 80-90 (2018) - [j2]Hanlin Liu, Jingju Liu, Xuehu Yan, Pengfei Xue, Song Wan, Li Li:
Centroid-Based Audio Steganography Scheme in Wavelet Domain. J. Inf. Hiding Multim. Signal Process. 9(5): 1222-1232 (2018) - [j1]Jingwei Liu, Jingju Liu, Yuliang Lu, Bin Yang, Kailong Zhu:
基于网络攻防博弈模型的最优防御策略选取方法 (Optimal Defense Strategy Selection Method Based on Network Attack-Defense Game Model). 计算机科学 45(6): 117-123 (2018) - 2017
- [c2]Hanlin Liu, Jingju Liu, RongGui Hu, Xuehu Yan
, Song Wan:
Adaptive Audio Steganography Scheme Based on Wavelet Packet Energy. BigDataSecurity/HPSC/IDS 2017: 26-31 - 2011
- [c1]Xinzhi Wang, Lechang Sun, Jingju Liu, Qiang Li:
VISHNU: A Software Behavior Trustworthiness Control Method Based on DRTM. IPTC 2011: 169-172
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-21 20:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint