default search action
Weijiang Liu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j23]Dajian Huang, Wen-an Zhang, Fanghong Guo, Weijiang Liu, Xiaoming Shi:
Wavelet Packet Decomposition-Based Multiscale CNN for Fault Diagnosis of Wind Turbine Gearbox. IEEE Trans. Cybern. 53(1): 443-453 (2023) - 2022
- [j22]Liran Shen, Meng Joo Er, Weijiang Liu, Yunsheng Fan, Qingbo Yin:
Population structure-learned classifier for high-dimension low-sample-size class-imbalanced problem. Eng. Appl. Artif. Intell. 111: 104828 (2022) - 2021
- [j21]Zhiyang Li, Fengjuan Chen, Junfeng Wu, Zhaobin Liu, Weijiang Liu:
Efficient weighted probabilistic frequent itemset mining in uncertain databases. Expert Syst. J. Knowl. Eng. 38(5) (2021) - [j20]Kaiqiang Kou, Zhaobin Liu, Hong Ye, Zhiyang Li, Weijiang Liu:
A location privacy protection algorithm based on differential privacy in sensor network. Int. J. Embed. Syst. 14(5): 432-442 (2021) - [j19]Yongqiang Lu, Zhaobin Liu, Shaoqi Wang, Zhiyang Li, Weijiang Liu, Xuhui Chen:
Temporal Index Scheme of Hyperledger Fabric System in IoT. Wirel. Commun. Mob. Comput. 2021: 9945530:1-9945530:15 (2021) - [c20]Wenxiu Sui, Zhaobin Liu, Haoze Lv, Zhiyang Li, Weijiang Liu:
Random Partition Region for Location Privacy Protection on Edge Computing. CSCloud/EdgeCom 2021: 155-160 - 2020
- [j18]Weijiang Liu, Kaiye Zhang, Zhiyang Li, Zhaobin Liu:
An Efficient Protocol of Queries for Large and Small Categories in RFID Systems. IEEE Internet Things J. 7(10): 10594-10605 (2020) - [j17]Zhiyang Li, Jia Hu, Milos Stojmenovic, Zhaobin Liu, Weijiang Liu:
Revisiting spectral clustering for near-convex decomposition of 2D shape. Pattern Recognit. 105: 107371 (2020)
2010 – 2019
- 2019
- [j16]Yi Qiao, Zhaobin Liu, Haoze Lv, Minghui Li, Zhiyi Huang, Zhiyang Li, Weijiang Liu:
An Effective Data Privacy Protection Algorithm Based on Differential Privacy in Edge Computing. IEEE Access 7: 136203-136213 (2019) - [j15]Songyan Li, Zhaobin Liu, Zhiyi Huang, Haoze Lyu, Zhiyang Li, Weijiang Liu:
DynaPro: Dynamic Wireless Sensor Network Data Protection Algorithm in IoT via Differential Privacy. IEEE Access 7: 167754-167765 (2019) - [j14]Haoze Lv, Zhaobin Liu, Zhonglian Hu, Lihai Nie, Weijiang Liu, Xinfeng Ye:
Research on improved privacy publishing algorithm based on set cover. Comput. Sci. Inf. Syst. 16(3): 705-731 (2019) - [j13]Lajiao Chen, Liying Sun, Weijiang Liu, Lizhe Wang, Hui Wu, A-Xing Zhu, Yiqi Luo:
Evapotranspiration partitioning using an optimality-based ecohydrological model in a semiarid shrubland. Int. J. Digit. Earth 12(12): 1423-1440 (2019) - [j12]Jingyan Wang, Weijiang Liu, Lei Zheng, Zhiyang Li, Zhaobin Liu:
A novel algorithm for detecting superpoints based on reversible virtual bitmaps. J. Inf. Secur. Appl. 49 (2019) - [j11]Wenyuan Han, Weijiang Liu, Kaiye Zhang, Zhiyang Li, Zhaobin Liu:
A protocol for detecting missing target tags in RFID systems. J. Netw. Comput. Appl. 132: 40-48 (2019) - 2018
- [c19]Jianhui Miao, Zhiyang Li, Wenyu Qu, Zeyan Zhou, Zhaobin Liu, Weijiang Liu:
Approximate Nearest Neighbor Search Based on Hierarchical Multi-Index Hashing. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 1791-1796 - 2017
- [j10]Lei Zheng, Dongrui Liu, Weijiang Liu, Zhaobin Liu, Zhiyang Li, Tiantian Wu:
A Data Streaming Algorithm for Detection of Superpoints With Small Memory Consumption. IEEE Commun. Lett. 21(5): 1067-1070 (2017) - [c18]Lihai Nie, Zhiyang Li, Heng Qi, Weijiang Liu, Wenyu Qu:
Probabilistic Frequent Itemsets Mining Based on Expectation Bound over Uncertain Database. ISPAN-FCST-ISCC 2017: 14-19 - 2016
- [j9]Weijiang Liu, Chao Liu, Shuming Guo:
A hash-based algorithm for measuring cardinality distribution in network traffic. Int. J. Auton. Adapt. Commun. Syst. 9(1/2): 136-148 (2016) - [j8]Weijiang Liu, Wenyu Qu, Jian Gong, Keqiu Li:
Detection of Superpoints Using a Vector Bloom Filter. IEEE Trans. Inf. Forensics Secur. 11(3): 514-527 (2016) - [c17]Yujie Sun, Weijiang Liu, Zhaobin Liu, Chao Liu:
Comparison of Five Packet-Sampling-Based Methods for Detecting Elephant Flows. Trustcom/BigDataSE/ISPA 2016: 2018-2023 - [c16]Lin Han, Zhiyang Li, Weijiang Liu, Ke Dai, Wenyu Qu:
Minimum Control Latency of SDN Controller Placement. Trustcom/BigDataSE/ISPA 2016: 2175-2180 - 2015
- [j7]Zhaobin Liu, Wenyu Qu, Weijiang Liu, Zhiyang Li, Yujie Xu:
Resource preprocessing and optimal task scheduling in cloud computing environments. Concurr. Comput. Pract. Exp. 27(13): 3461-3482 (2015) - [j6]Weijiang Liu, Zhiyang Li:
Special issue: ICA3PP/U-Science 2014. Comput. Syst. Sci. Eng. 30(6) (2015) - [j5]Tingting Wang, Weijiang Liu, Yujie Xu, Mianxiong Dong:
QoS oriented task scheduling based on generic algorithm in cloud computing. Comput. Syst. Sci. Eng. 30(6) (2015) - 2014
- [j4]Weijiang Liu, Wenyu Qu, Zhaobin Liu:
Scalable algorithms for estimating flow length distributions from sampled data. Computing 96(6): 527-543 (2014) - [c15]Zhimin Li, Weijiang Liu, Zhiyang Li, Jingxia Sun:
A Bitmap-Based Algorithm for Detecting Stealthy Superpoints. DASC 2014: 333-337 - [c14]Xuefei Zhou, Weijiang Liu, Zhiyang Li, Wenwen Gao:
A Continuous Virtual Vector-Based Algorithm for Measuring Cardinality Distribution. ICA3PP (2) 2014: 43-53 - 2013
- [j3]Weijiang Liu, Wenyu Qu, Xiaona He, Zhaobin Liu:
Detecting superpoints through a reversible counting Bloom filter. J. Supercomput. 63(1): 218-234 (2013) - [c13]Lili Wang, Weijiang Liu, Shanshan Liu:
Finding Heavy-Hitter by Periodically Deleting Small Flows. HPCC/EUC 2013: 1948-1952 - 2012
- [c12]Weijiang Liu, Wenyu Qu, Zhaobin Liu, Keqiu Li, Jian Gong:
Identifying Elephant Flows Using a Reversible MultiLayer Hashed Counting Bloom Filter. HPCC-ICESS 2012: 246-253 - 2011
- [j2]Weijiang Liu, Wenyu Qu, Zhaobin Liu, Keqiu Li:
A novel method for estimating flow length distributions from double-sampled flow statistics. Comput. Syst. Sci. Eng. 26(5) (2011) - [c11]Zhaobin Liu, Tao Qin, Wenyu Qu, Weijiang Liu:
DAG Cluster Scheduling Algorithm for Grid Computing. CSE 2011: 632-636 - 2010
- [c10]Weijiang Liu, Wenyu Qu, Zhaobin Liu, Keqiu Li:
A Novel Method for Estimating Flow Length Distributions from Double-Sampled Flow Statistics. HPCC 2010: 568-572 - [c9]Zhaobin Liu, Wenyu Qu, Weijiang Liu, Keqiu Li:
Xen Live Migration with Slowdown Scheduling Algorithm. PDCAT 2010: 215-221
2000 – 2009
- 2009
- [c8]Weijiang Liu, Wenyu Qu, Hong Ye, Zhaobin Liu, Keqiu Li:
A Resource-Efficient System for Measuring Flow Length Distribution. FCST 2009: 40-44 - [c7]Weijiang Liu, Hong Ye, Wenyu Qu:
Estimating Flow Length Distributions from Double-Sampled Flow Statistics. ScalCom-EmbeddedCom 2009: 173-177 - [c6]Zhaobin Liu, Hui Wang, Wenyu Qu, Weijiang Liu, Ruoyu Fan:
Sparse Matrix Prediction Filling in Collaborative Filtering. ScalCom-EmbeddedCom 2009: 304-307 - 2008
- [j1]Weijiang Liu, Jian Gong:
Double sampling for flow measurement on high speed links. Comput. Networks 52(11): 2221-2226 (2008) - 2007
- [c5]Weijiang Liu:
Estimating Flow Length Distributions Using Least Square Method and Maximum Likelihood Estimation. International Conference on Computational Science (4) 2007: 793-796 - [c4]Weijiang Liu:
A Novel Algorithm for Estimating Flow Length Distributions-LSM. NPC 2007: 445-452 - 2006
- [c3]Weijiang Liu, Jian Gong, Wei Ding, Yanbing Peng:
Estimating Original Flow Length from Sampled Flow Statistics. International Conference on Computational Science (4) 2006: 120-127 - [c2]Weijiang Liu, Jian Gong, Wei Ding, Guang Cheng:
An Algorithm for Estimation of Flow Length Distributions Using Heavy-Tailed Feature. International Conference on Computational Science (4) 2006: 144-151 - [c1]Yanbing Peng, Jian Gong, Wang Yang, Weijiang Liu:
Disclosing the Element Distribution of Bloom Filter. International Conference on Computational Science (1) 2006: 1022-1025
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint