default search action
Lifa Wu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j33]Qingyun Li, Wei Chen, Xiaotang Xu, Yiting Zhang, Lifa Wu:
Precision strike: Precise backdoor attack with dynamic trigger. Comput. Secur. 148: 104101 (2025) - 2024
- [j32]Junjian Ye, Xincheng Fei, Xavier de Carné de Carnavalet, Lianying Zhao, Lifa Wu, Mengyuan Zhang:
Detecting command injection vulnerabilities in Linux-based embedded firmware with LLM-based taint analysis of library functions. Comput. Secur. 144: 103971 (2024) - [j31]Bolei Zhang, Fu Xiao, Lifa Wu:
Offline Reinforcement Learning for Asynchronous Task Offloading in Mobile Edge Computing. IEEE Trans. Netw. Serv. Manag. 21(1): 939-952 (2024) - [c7]Junjian Ye, Xavier de Carné de Carnavalet, Lianying Zhao, Mengyuan Zhang, Lifa Wu, Wei Zhang:
Exposed by Default: A Security Analysis of Home Router Default Settings. AsiaCCS 2024 - [c6]Ping Yin, Wei Chen, Jiaxi Zheng, Yiting Zhang, Lifa Wu:
Privacy Protection for Image Sharing Using Reversible Adversarial Examples. ICC 2024: 1170-1175 - 2023
- [j30]Tianyue Zhang, Wei Chen, Yuxiao Liu, Lifa Wu:
An intrusion detection method based on stacked sparse autoencoder and improved gaussian mixture model. Comput. Secur. 128: 103144 (2023) - [j29]Mengnan Gao, Lifa Wu, Qi Li, Wei Chen:
Anomaly traffic detection in IoT security using graph neural networks. J. Inf. Secur. Appl. 76: 103532 (2023) - [j28]Jiayi Ni, Wei Chen, Jiacheng Tong, Haiyong Wang, Lifa Wu:
High-speed anomaly traffic detection based on staged frequency domain features. J. Inf. Secur. Appl. 77: 103575 (2023) - [c5]Bolei Zhang, Jingtao Zhang, Lifa Wu, Fu Xiao:
Robust Online Crowdsourcing with Strategic Workers. APPT 2023: 417-433 - 2022
- [j27]Bolei Zhang, Lifa Wu, Ilsun You:
Decentralized Policy Coordination in Mobile Sensing with Consensual Communication. Sensors 22(24): 9584 (2022) - [c4]Xinguang Xie, Junjian Ye, Lifa Wu, Rong Li:
RTOSExtracter: Extracting user-defined functions in stripped RTOS-based firmware. CyberC 2022: 87-96 - 2021
- [j26]Pei-hong Lin, Zheng Hong, Yihao Li, Lifa Wu:
A priority based path searching method for improving hybrid fuzzing. Comput. Secur. 105: 102242 (2021) - 2020
- [j25]XuKui Li, Wei Chen, Qianru Zhang, Lifa Wu:
Building Auto-Encoder Intrusion Detection System based on random forest feature selection. Comput. Secur. 95: 101851 (2020)
2010 – 2019
- 2019
- [j24]He Sun, Chao Zhang, He Li, Zhenhua Wu, Lifa Wu, Yun Li:
ATOS: Adaptive Program Tracing With Online Control Flow Graph Support. IEEE Access 7: 127495-127510 (2019) - [j23]Menglin Fu, Lifa Wu, Zheng Hong, Feng Zhu, He Sun, Wenbo Feng:
A Critical-Path-Coverage-Based Vulnerability Detection Method for Smart Contracts. IEEE Access 7: 147327-147344 (2019) - [j22]Hao Fang, Lifa Wu, Zhiyong Wu:
基于符号执行的Return-to-dl-resolve利用代码自动生成方法 (Automatic Return-to-dl-resolve Exploit Generation Method Based on Symbolic Execution). 计算机科学 46(2): 127-132 (2019) - [j21]Hongze Zhang, Zheng Hong, Chen Wang, Wenbo Feng, Lifa Wu:
基于闭合序列模式挖掘的未知协议格式推断方法 (Closed Sequential Patterns Mining Based Unknown Protocol Format Inference Method). 计算机科学 46(6): 80-89 (2019) - [j20]Peng Zhao, Lifa Wu, Zheng Hong:
基于经纪人的多云访问控制模型研究 (Research on Broker Based Multicloud Access Control Model). 计算机科学 46(11): 123-129 (2019) - 2018
- [j19]Di Xue, Lifa Wu, Zheng Hong, Shize Guo, Liang Gao, Zhiyong Wu, Xiaofeng Zhong, Jianshan Sun:
Deep learning-based personality recognition from text posts of online social networks. Appl. Intell. 48(11): 4232-4246 (2018) - 2017
- [j18]Di Xue, Zheng Hong, Shize Guo, Liang Gao, Lifa Wu, Jinghua Zheng, Nan Zhao:
Personality Recognition on Social Media With Label Distribution Learning. IEEE Access 5: 13478-13488 (2017) - [j17]Zhengwei Zhang, Lifa Wu, Shaozhang Xiao, Shangbing Gao:
Adaptive reversible image watermarking algorithm based on IWT and level set. EURASIP J. Adv. Signal Process. 2017: 15 (2017) - [j16]Di Xue, Lifa Wu, Huabo Li, Zheng Hong, Zhenji Zhou:
A novel destination prediction attack and corresponding location privacy protection method in geo-social networks. Int. J. Distributed Sens. Networks 13(1) (2017) - [j15]Zhengwei Zhang, Lifa Wu, Yunyang Yan, Shaozhang Xiao, He Sun:
An improved reversible image watermarking algorithm based on difference expansion. Int. J. Distributed Sens. Networks 13(1) (2017) - [j14]Yilin Ye, Lifa Wu, Zheng Hong, Kangyu Huang:
A Risk Classification Based Approach for Android Malware Detection. KSII Trans. Internet Inf. Syst. 11(2): 959-981 (2017) - [j13]Zhengwei Zhang, Lifa Wu, Yunyang Yan, Shaozhang Xiao, Shangbing Gao:
Adaptive reversible image watermarking algorithm based on DE. KSII Trans. Internet Inf. Syst. 11(3): 1761-1784 (2017) - [j12]Yafeng Zhang, Zheng Hong, Lifa Wu, Zhenji Zhou, He Sun:
基于状态的工控协议Fuzzing测试技术 (Protocol State Based Fuzzing Method for Industrial Control Protocols). 计算机科学 44(5): 132-140 (2017) - [j11]Yilin Ye, Lifa Wu, Huiying Yan:
一种基于双层语义的Android原生库安全性检测方法 (Two-layer Semantics-based Security Detection Approach for Android Native Libraries). 计算机科学 44(6): 161-167 (2017) - [j10]Zhengwei Zhang, Lifa Wu, Yunyang Yan:
基于多尺度分解与预测误差扩展的可逆图像水印算法 (Reversible Image Watermarking Algorithm Based on Multi-scale Decomposition and Prediction Error Expansion). 计算机科学 44(12): 100-104 (2017) - [j9]Huamin Zhu, Lifa Wu, Peng Zhao:
多云环境的虚拟应用网络部署决策方法研究 (Research on Deployment Decision Method of Virtual Application Network in Multi-cloud Environment). 计算机科学 44(Z11): 286-292 (2017) - 2016
- [j8]Zhengwei Zhang, Lifa Wu, Haiguang Lai, Huabo Li, Chenghui Zheng:
Double Reversible Watermarking Algorithm for Image Tamper Detection. J. Inf. Hiding Multim. Signal Process. 7(3): 530-542 (2016) - [j7]Di Xue, Lifa Wu, Huabo Li, Zheng Hong:
TraDR: 一种基于轨迹分解重构的移动社交网络位置预测方法 (TraDR: A Destination Prediction Method Based on Trajectory Decomposition and Reconstruction in Geo-social Networks). 计算机科学 43(3): 93-98 (2016) - [j6]Huamin Zhu, Lifa Wu, Hongkai Kang:
基于SecLA的云服务商选择方法研究 (Research of Cloud Provider Selection Method Based on SecLA). 计算机科学 43(5): 100-107 (2016) - 2015
- [j5]Chen Wang, Lifa Wu, Zheng Hong, Chenghui Zheng, Honglin Zhuang:
一种基于域知识的协议状态机主动推断算法 (Domain-specific Algorithm of Protocol State Machine Active Inference). 计算机科学 42(12): 233-239 (2015) - 2014
- [j4]Zhenji Zhou, Lifa Wu, Zheng Hong, Ming-fei Xu, Fan Pan:
DTSTM: Dynamic Tree Style Trust Measurement Model for Cloud Computing. KSII Trans. Internet Inf. Syst. 8(1): 305-325 (2014) - 2013
- [j3]Fan Pan, Lifa Wu, Zheng Hong, Huabo Li, Haiguang Lai, Chenghui Zheng:
Icefex: Protocol Format Extraction from IL-based Concolic Execution. KSII Trans. Internet Inf. Syst. 7(3): 576-599 (2013) - [j2]Fan Pan, Ying Hou, Zheng Hong, Lifa Wu, Haiguang Lai:
Efficient Model-based Fuzz Testing Using Higher-order Attribute Grammars. J. Softw. 8(3): 645-651 (2013) - 2011
- [j1]Zhengqiu He, Lifa Wu, Huabo Li, Haiguang Lai, Zheng Hong:
Semantics-based Access Control Approach for Web Service. J. Comput. 6(6): 1152-1161 (2011) - 2010
- [c3]Zhengqiu He, Kangyu Huang, Lifa Wu, Huabo Li, Haiguang Lai:
Using Semantic Web Techniques to Implement Access Control for Web Service. ICICA (1) 2010: 258-266
2000 – 2009
- 2009
- [c2]Zhengqiu He, Lifa Wu, Zheng Hong, Haiguang Lai:
Semantic Security Policy for Web Service. ISPA 2009: 258-262 - 2008
- [c1]Hui Meng, Lifa Wu, Tianlei Zhang, Guisheng Chen, Deyi Li:
Mining Frequent Composite Service Patterns. GCC 2008: 713-718
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 21:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint