default search action
Zhaoli Liu
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Kuiyu Zhu, Tao Qin, Xin Wang, Zhaoli Liu, Chenxu Wang:
Distribution-aware hybrid noise augmentation in graph contrastive learning for recommendation. Expert Syst. Appl. 257: 125118 (2024) - [j16]Kun Jiang, Zhaoli Liu, Qindong Sun:
Robust auto-weighted and dual-structural representation learning for image clustering. J. Electronic Imaging 33(4) (2024) - [j15]Yakun Cao, Guanglei Hou, Ziqi Chen, Yanfei Gong, Jinyuan Zhou, Zhaoli Liu:
Quantitative Determination of the Optimal Scale for the Proportion of Saline-Alkali Patches of Soda Saline-Alkali Land in Northeast China. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 17: 5378-5389 (2024) - 2023
- [c8]Zhaoli Liu, Kun Jiang, Jinpei Yan:
DDoS Attack Detection Method using Entropy and Attention-based BiGRU. HCCS 2023: 1-6 - 2022
- [j14]Tao Qin, Bo Wang, Zhaoli Liu, Zhouguo Chen, Jianwei Ding:
High-quality tweet generation for online behavior security management based on semantics measurement. Trans. Emerg. Telecommun. Technol. 33(6) (2022) - [j13]Zhihai Yang, Qindong Sun, Zhaoli Liu, Jinpei Yan, Yaling Zhang:
Rating behavior evaluation and abnormality forensics analysis for injection attack detection. J. Intell. Inf. Syst. 59(1): 93-119 (2022) - [j12]Zhaoli Liu, Tao Qin, Qindong Sun, Shancang Li, Houbing Herbert Song, Zhouguo Chen:
SIRQU: Dynamic Quarantine Defense Model for Online Rumor Propagation Control. IEEE Trans. Comput. Soc. Syst. 9(6): 1703-1714 (2022) - [j11]Zhihai Yang, Qindong Sun, Zhaoli Liu:
Three Birds With One Stone: User Intention Understanding and Influential Neighbor Disclosure for Injection Attack Detection. IEEE Trans. Inf. Forensics Secur. 17: 531-546 (2022) - 2021
- [c7]Jie Liu, Yi Sun, Fengkai Xu, Keping Yu, Ali Kashif Bashir, Zhaoli Liu:
IIS: Intelligent Identification Scheme of Massive IoT Devices. COMPSAC 2021: 1623-1626 - [c6]Kun Jiang, Zhaoli Liu, Qindong Sun:
Low-Rank Orthonormal Analysis Dictionary Learning for Image Classification. PRICAI (3) 2021: 391-402 - [i1]Kun Jiang, Zhaoli Liu, Zheng Liu, Qindong Sun:
Locality Constrained Analysis Dictionary Learning via K-SVD Algorithm. CoRR abs/2104.14130 (2021) - 2020
- [j10]Tao Qin, Zhaoli Liu, Shancang Li, Xiaohong Guan:
A Two-Stagse Approach for Social Identity Linkage Based on an Enhanced Weighted Graph Model. Mob. Networks Appl. 25(4): 1364-1375 (2020) - [j9]Tao Qin, Zhaoli Liu, Pinghui Wang, Shancang Li, Xiaohong Guan, Lixin Gao:
Symmetry Degree Measurement and its Applications to Anomaly Detection. IEEE Trans. Inf. Forensics Secur. 15: 1040-1055 (2020) - [c5]Zhaoli Liu, Qindong Sun, Zhihai Yang, Kun Jiang, Jinpei Yan:
Fined-grained Aspect Extraction from Online Reviews for Decision Support. TrustCom 2020: 1536-1541
2010 – 2019
- 2018
- [j8]Zhaoli Liu, Tao Qin, Xiaohong Guan, Hezhi Jiang, Chenxu Wang:
An Integrated Method for Anomaly Detection From Massive System Logs. IEEE Access 6: 30602-30611 (2018) - [j7]Zhaoli Liu, Xiaohong Guan, Shancang Li, Tao Qin, Chao He:
Behavior Rhythm: A New Model for Behavior Visualization and Its Application in System Security Management. IEEE Access 6: 73940-73951 (2018) - [j6]Tao Qin, Yuli Gao, Lingyan Wei, Zhaoli Liu, Chenxu Wang:
Potential threats mining methods based on correlation analysis of multi-type logs. IET Networks 7(5): 299-305 (2018) - 2017
- [j5]Shaowei Chen, Zhaoli Liu, Zhiqiang Wang:
A Variant of Clark's Theorem and Its Applications for Nonsmooth Functionals without the Palais-Smale Condition. SIAM J. Math. Anal. 49(1): 446-470 (2017) - 2016
- [j4]Chao Xu, Zhaoli Liu, Guanglei Hou:
Simulation of the Impact of a Sensor's PSF on Mixed Pixel Decomposition: 1. Nonuniformity Effect. Remote. Sens. 8(5): 437 (2016) - [c4]Zhaoli Liu, Tao Qin, Dan Zhao, Xiaohong Guan, Tao Yang:
A new model for nickname detection based on network structure and similarity propagation. ISCC 2016: 1103-1108 - 2015
- [j3]Tao Qin, Lei Wang, Zhaoli Liu, Xiaohong Guan:
Robust application identification methods for P2P and VoIP traffic classification in backbone networks. Knowl. Based Syst. 82: 152-162 (2015) - [j2]Tao Qin, Xiaohong Guan, Chenxu Wang, Zhaoli Liu:
MUCM: Multilevel User Cluster Mining Based on Behavior Profiles for Network Monitoring. IEEE Syst. J. 9(4): 1322-1333 (2015) - [c3]Zhaoli Liu, Tao Qin, Xiaohong Guan, Xiaoqiang Niu, Tao Yang:
Alias Detection Across Multi-online Applications Based on User's Behavior Characteristics. TrustCom/BigDataSE/ISPA (1) 2015: 1154-1159 - 2012
- [c2]Tao Qin, Wei Li, Xiaohong Guan, Zhaoli Liu:
Behavior spectrum: An effective method for user's web access behavior monitoring and measurement. GLOBECOM 2012: 961-966
2000 – 2009
- 2004
- [c1]Hu Peng, Qingwen Qi, Zhaoli Liu:
Progress in studies on automated generalization of spatial point cluster. IGARSS 2004: 2841-2844 - 2002
- [j1]Yongqing Li, Zhaoli Liu:
Perturbations of symmetric eigenvalue problems. Appl. Math. Lett. 15(7): 903-906 (2002)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:20 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint