default search action
Jiqiang Liu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j105]Kai Yang, Qiang Li, Haining Wang, Limin Sun, Jiqiang Liu:
Fingerprinting Industrial IoT devices based on multi-branch neural network. Expert Syst. Appl. 238(Part F): 122371 (2024) - [j104]Yongkai Fan, Kaile Ma, Linlin Zhang, Jiqiang Liu, Naixue Xiong, Shui Yu:
VeriCNN: Integrity verification of large-scale CNN training process based on zk-SNARK. Expert Syst. Appl. 255: 124531 (2024) - [j103]Meng Li, Jiqiang Liu, Yeping Yang:
Automated Identification of Sensitive Financial Data Based on the Topic Analysis. Future Internet 16(2): 55 (2024) - [j102]Di Zhai, Jiqiang Liu, Tao Zhang, Jian Wang, Hongyang Du, Tianhao Liu, Tianxi Wang, Chuan Zhang, Jiawen Kang, Dusit Niyato:
EPDB: An Efficient and Privacy-Preserving Electric Charging Scheme in Internet of Robotic Things. IEEE Internet Things J. 11(20): 32464-32477 (2024) - [j101]Tianhao Liu, Jiqiang Liu, Tao Zhang, Jian Wang, Zhenhui Yuan, Minrui Xu, Di Zhai, Tianxi Wang, Hongyang Du, Dusit Niyato:
Blockchain and Trusted Hardware-Enabled Data Scheduling for Edge Learning in Wireless IIoT. IEEE Internet Things J. 11(21): 34229-34242 (2024) - [j100]Xuezhi Wen, Meiqi Gao, Nan Wang, Jiahui Ma, Dalin Zhang, Xibin Zhao, Jiqiang Liu:
Fairness based on anomaly score and adaptive weight in network attack detection. Inf. Sci. 678: 120972 (2024) - [j99]Junfeng An, Mengmeng Lu, Gang Li, Jiqiang Liu, Chongqing Wang:
Automated subway touch button detection using image process. J. Big Data 11(1): 119 (2024) - [j98]Zhenyan Ji, Deyan Kong, Yanyan Yang, Jiqiang Liu, Zhao Li:
ASSL-HGAT: Active semi-supervised learning empowered heterogeneous graph attention network. Knowl. Based Syst. 290: 111567 (2024) - [j97]Yalun Wu, Yingxiao Xiang, Endong Tong, Yuqi Ye, Zhibo Cui, Yunzhe Tian, Lejun Zhang, Jiqiang Liu, Zhen Han, Wenjia Niu:
Improving the Robustness of Pedestrian Detection in Autonomous Driving With Generative Data Augmentation. IEEE Netw. 38(3): 63-69 (2024) - [j96]Junfeng An, Jiqiang Liu, Mengmeng Lu, Gang Li, Huasheng Sun:
Image change combined with CNN power subway vent valve state monitoring. Signal Image Video Process. 18(3): 2151-2166 (2024) - [j95]Jinke Song, Qiang Li, Haining Wang, Jiqiang Liu:
PKVIC: Supplement Missing Software Package Information in Security Vulnerability Reports. IEEE Trans. Dependable Secur. Comput. 21(4): 3785-3800 (2024) - [j94]Jingye Shi, Mengge Zhang, Yuewu Hou, Ruicong Zhi, Jiqiang Liu:
A Multitask Network and Two Large-Scale Datasets for Change Detection and Captioning in Remote Sensing Images. IEEE Trans. Geosci. Remote. Sens. 62: 1-17 (2024) - [j93]Jingye Shi, Ruicong Zhi, Jingru Zhao, Yuewu Hou, Zeyong Zhao, Jingyi Wu, Jiqiang Liu:
A Double-Head Global Reasoning Network for Object Detection of Remote Sensing Images. IEEE Trans. Geosci. Remote. Sens. 62: 1-16 (2024) - [j92]Xiaohan Yuan, Jiqiang Liu, Bin Wang, Wei Wang, Bin Wang, Tao Li, Xiaobo Ma, Witold Pedrycz:
FedComm: A Privacy-Enhanced and Efficient Authentication Protocol for Federated Learning in Vehicular Ad-Hoc Networks. IEEE Trans. Inf. Forensics Secur. 19: 777-792 (2024) - [j91]Yurong Hao, Xihui Chen, Wei Wang, Jiqiang Liu, Tao Li, Junyong Wang, Witold Pedrycz:
Eyes on Federated Recommendation: Targeted Poisoning With Competition and Its Mitigation. IEEE Trans. Inf. Forensics Secur. 19: 10173-10188 (2024) - [j90]Dalin Zhang, Chenyue Du, Yunjuan Peng, Jiqiang Liu, Sabah Mohammed, Alessandro Calvi:
A Multi-Source Dynamic Temporal Point Process Model for Train Delay Prediction. IEEE Trans. Intell. Transp. Syst. 25(11): 17865-17877 (2024) - [j89]Dongshang Deng, Xuangou Wu, Tao Zhang, Xiangyun Tang, Hongyang Du, Jiawen Kang, Jiqiang Liu, Dusit Niyato:
FedASA: A Personalized Federated Learning With Adaptive Model Aggregation for Heterogeneous Mobile Edge Computing. IEEE Trans. Mob. Comput. 23(12): 14787-14802 (2024) - [j88]Ruipeng Gao, Shuli Zhu, Lingkun Li, Xuyu Wang, Yuqin Jiang, Naiqiang Tan, Hua Chai, Peng Qi, Jiqiang Liu, Dan Tao:
Real-World Large-Scale Cellular Localization for Pickup Position Recommendation at Black-Hole. IEEE Trans. Mob. Comput. 23(12): 15114-15131 (2024) - [j87]Jinke Song, Shangfeng Wan, Min Huang, Jiqiang Liu, Limin Sun, Qiang Li:
Toward Automatically Connecting IoT Devices with Vulnerabilities in the Wild. ACM Trans. Sens. Networks 20(1): 6:1-6:26 (2024) - [j86]Yunzhe Tian, Dongyue Xu, Endong Tong, Rui Sun, Kang Chen, Yike Li, Thar Baker, Wenjia Niu, Jiqiang Liu:
Toward Learning Model-Agnostic Explanations for Deep Learning-Based Signal Modulation Classifiers. IEEE Trans. Reliab. 73(3): 1529-1543 (2024) - [j85]Haonan Tong, Dalin Zhang, Jiqiang Liu, Weiwei Xing, Lingyun Lu, Wei Lu, Yumei Wu:
MASTER: Multi-Source Transfer Weighted Ensemble Learning for Multiple Sources Cross-Project Defect Prediction. IEEE Trans. Software Eng. 50(5): 1281-1305 (2024) - [c83]Yibo Lian, Tao Zhang, Changqiao Xu, Wei Dong, Minrui Xu, Zhenyu Xiahou, Jiawen Kang, Jiqiang Liu, Dusit Niyato:
Deep Reinforcement Learning-Based Moving Target Defense for Multicast in Software-Defined Satellite Networks. ICC 2024: 4786-4791 - [c82]Lianying He, Dalin Zhang, Dongqing Zhu, Junwen Zhang, Rui Wang, Jiqiang Liu:
Path Exploration Strategy for Symbolic Execution based on Multi-strategy Active Learning. Internetware 2024 - [c81]Xiaoshu Cui, Yalun Wu, Yanfeng Gu, Qiong Li, Endong Tong, Jiqiang Liu, Wenjia Niu:
Lurking in the Shadows: Imperceptible Shadow Black-Box Attacks Against Lane Detection Models. KSEM (3) 2024: 220-232 - [c80]Jiayin Song, Yike Li, Yunzhe Tian, Xingyu Wu, Qiong Li, Endong Tong, Wenjia Niu, Zhenguo Zhang, Jiqiang Liu:
Knowledge-Driven Backdoor Removal in Deep Neural Networks via Reinforcement Learning. KSEM (3) 2024: 336-348 - [c79]Xiaoting Lyu, Yufei Han, Wei Wang, Jingkai Liu, Yongsheng Zhu, Guangquan Xu, Jiqiang Liu, Xiangliang Zhang:
Lurking in the shadows: Unveiling Stealthy Backdoor Attacks against Personalized Federated Learning. USENIX Security Symposium 2024 - [i27]Hangsheng Zhang, Dongqi Han, Yinlong Liu, Zhiliang Wang, Jiyan Sun, Shangyuan Zhuang, Jiqiang Liu, Jinsong Dong:
Explainable and Transferable Adversarial Attack for ML-Based Network Intrusion Detectors. CoRR abs/2401.10691 (2024) - [i26]Hangsheng Zhang, Jiqiang Liu, Jinsong Dong:
CARE: Ensemble Adversarial Robustness Evaluation Against Adaptive Attackers for Security Applications. CoRR abs/2401.11126 (2024) - [i25]Xiaoxiao Liu, Fan Xu, Nan Wang, Qinxin Zhao, Dalin Zhang, Xibin Zhao, Jiqiang Liu:
LTRDetector: Exploring Long-Term Relationship for Advanced Persistent Threats Detection. CoRR abs/2404.03162 (2024) - [i24]Xiaoyan Zhou, Ying Zhang, Wenjia Niu, Jiqiang Liu, Haining Wang, Qiang Li:
OSS Malicious Package Analysis in the Wild. CoRR abs/2404.04991 (2024) - [i23]Xiaoyan Zhou, Feiran Liang, Zhaojie Xie, Yang Lan, Wenjia Niu, Jiqiang Liu, Haining Wang, Qiang Li:
A Large-scale Fine-grained Analysis of Packages in Open-Source Software Ecosystems. CoRR abs/2404.11467 (2024) - [i22]Xiaoting Lyu, Yufei Han, Wei Wang, Jingkai Liu, Yongsheng Zhu, Guangquan Xu, Jiqiang Liu, Xiangliang Zhang:
Lurking in the shadows: Unveiling Stealthy Backdoor Attacks against Personalized Federated Learning. CoRR abs/2406.06207 (2024) - [i21]Ying Zhang, Xiaoyan Zhou, Hui Wen, Wenjia Niu, Jiqiang Liu, Haining Wang, Qiang Li:
Tactics, Techniques, and Procedures (TTPs) in Interpreted Malware: A Zero-Shot Generation with Large Language Models. CoRR abs/2407.08532 (2024) - [i20]Chao Li, Runhua Xu, Balaji Palanisamy, Li Duan, Meng Shen, Jiqiang Liu, Wei Wang:
Blockchain Takeovers in Web 3.0: An Empirical Study on the TRON-Steem Incident. CoRR abs/2407.17825 (2024) - 2023
- [j84]Meng Li, Jiqiang Liu, Yeping Yang:
Financial Data Quality Evaluation Method Based on Multiple Linear Regression. Future Internet 15(10): 338 (2023) - [j83]Li Duan, Yangyang Sun, Wei Ni, Weiping Ding, Jiqiang Liu, Wei Wang:
Attacks Against Cross-Chain Systems and Defense Approaches: A Contemporary Survey. IEEE CAA J. Autom. Sinica 10(8): 1647-1667 (2023) - [j82]Tong Chen, Jiqiang Liu, Thar Baker, Yalun Wu, Yingxiao Xiang, Yike Li, Wenjia Niu, Endong Tong, Albert Y. Zomaya:
A Mutual Information-Based Assessment of Reverse Engineering on Rewards of Reinforcement Learning. IEEE Trans. Artif. Intell. 4(5): 1089-1100 (2023) - [j81]Heng Ye, Qiang Zeng, Jiqiang Liu, Xiaojiang Du, Wei Wang:
Easy Peasy: A New Handy Method for Pairing Multiple COTS IoT Devices. IEEE Trans. Dependable Secur. Comput. 20(4): 3483-3494 (2023) - [j80]Dalin Zhang, Yi Xu, Yunjuan Peng, Chenyue Du, Nan Wang, Mincong Tang, Lingyun Lu, Jiqiang Liu:
An Interpretable Station Delay Prediction Model Based on Graph Community Neural Network and Time-Series Fuzzy Decision Tree. IEEE Trans. Fuzzy Syst. 31(2): 421-433 (2023) - [j79]Yuqing Zhu, Jiqiang Liu:
Constructing CM Fields for NFS to Accelerate DL Computation in Non-Prime Finite Fields. IEEE Trans. Inf. Theory 69(6): 4045-4055 (2023) - [j78]Xudong He, Jian Wang, Jiqiang Liu, Weiping Ding, Zhen Han, Bin Wang, Jamel Nebhen, Wei Wang:
DNS Rebinding Threat Modeling and Security Analysis for Local Area Network of Maritime Transportation Systems. IEEE Trans. Intell. Transp. Syst. 24(2): 2643-2655 (2023) - [c78]Xiaoting Lyu, Yufei Han, Wei Wang, Jingkai Liu, Bin Wang, Jiqiang Liu, Xiangliang Zhang:
Poisoning with Cerberus: Stealthy and Colluded Backdoor Attack against Federated Learning. AAAI 2023: 9020-9028 - [c77]Chao Li, Balaji Palanisamy, Runhua Xu, Li Duan, Jiqiang Liu, Wei Wang:
How Hard is Takeover in DPoS Blockchains? Understanding the Security of Coin-based Voting Governance. CCS 2023: 150-164 - [c76]Yingying Yao, Xiaolin Chang, Lin Li, Jiqiang Liu, Jelena V. Misic, Vojislav B. Misic:
DIDs-Assisted Secure Cross-Metaverse Authentication Scheme for MEC-Enabled Metaverse. ICC 2023: 6318-6323 - [c75]Yike Li, Yunzhe Tian, Endong Tong, Wenjia Niu, Jiqiang Liu:
Robust Reinforcement Learning via Progressive Task Sequence. IJCAI 2023: 455-463 - [c74]Yunzhe Tian, Yike Li, Kang Chen, Endong Tong, Wenjia Niu, Jiqiang Liu, Fangyun Qin, Zheng Zheng:
Mitigating Overfitting for Deep Learning-based Aging-related Bug Prediction via Brain-inspired Regularization in Spiking Neural Networks. ISSREW 2023: 214-221 - [c73]Tianxi Wang, Jiqiang Liu, Tianhao Liu, Di Zhai, Jian Wang, Tao Zhang:
Secure and Scalable Blockchain for IIoT with Dual Compression Scheme. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2023: 1-6 - [c72]Pengna Liu, Ziyan Qiao, Yalun Wu, Kang Chen, Jiasong Hou, Yingqi Cai, Liqun Chu, Endong Tong, Wenjia Niu, Jiqiang Liu:
Traffic Signal Timing Optimization Based on Intersection Importance in Vehicle-Road Collaboration. ML4CS 2023: 74-89 - [c71]Shuli Zhu, Lingkun Li, Xuyu Wang, Changcheng Liu, Yuqin Jiang, Zengwei Huo, Hua Chai, Jiqiang Liu, Dan Tao, Ruipeng Gao:
Experience: Large-scale Cellular Localization for Pickup Position Recommendation at Black-hole. MobiCom 2023: 84:1-84:15 - [i19]Nan Wang, Xuezhi Wen, Dalin Zhang, Xibin Zhao, Jiahui Ma, Mengxia Luo, Sen Nie, Shi Wu, Jiqiang Liu:
TBDetector: Transformer-Based Detector for Advanced Persistent Threats with Provenance Graph. CoRR abs/2304.02838 (2023) - [i18]Chao Li, Balaji Palanisamy, Runhua Xu, Li Duan, Jiqiang Liu, Wei Wang:
How Hard is Takeover in DPoS Blockchains? Understanding the Security of Coin-based Voting Governance. CoRR abs/2310.18596 (2023) - 2022
- [j77]Yingying Yao, Xiaolin Chang, Lin Li, Jiqiang Liu, Hong Wang:
Dual Privacy-Preserving Lightweight Navigation System for Vehicular Networks. IEEE Access 10: 121120-121132 (2022) - [j76]Xiao Zhang, Jiqiang Liu, Zhongjie Ba, Yaodong Tao, Xiaochun Cheng:
MobiScan: An enhanced invisible screen-camera communication system for IoT applications. Trans. Emerg. Telecommun. Technol. 33(4) (2022) - [j75]Yingxiao Xiang, Chao Li, Tong Chen, Yike Li, Endong Tong, Wenjia Niu, Qiong Li, Jiqiang Liu, Wei Wang:
Toward Blockchain-Based Spoofing Defense for Controlled Optimization of Phases in Traffic Signal System. IEICE Trans. Inf. Syst. 105-D(2): 280-288 (2022) - [j74]Yixiang Wang, Jiqiang Liu, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic:
IWA: Integrated gradient-based white-box attacks for fooling deep neural networks. Int. J. Intell. Syst. 37(7): 4253-4276 (2022) - [j73]Yixiang Wang, Jiqiang Liu, Xiaolin Chang, Ricardo J. Rodríguez, Jianhua Wang:
DI-AA: An interpretable white-box attack for fooling deep neural networks. Inf. Sci. 610: 14-32 (2022) - [j72]Yixiang Wang, Jiqiang Liu, Xiaolin Chang, Jianhua Wang, Ricardo J. Rodríguez:
AB-FGSM: AdaBelief optimizer and FGSM-based approach to generate adversarial examples. J. Inf. Secur. Appl. 68: 103227 (2022) - [j71]Yanling Dong, Shufen Zhang, Jingcheng Xu, Haoshi Wang, Jiqiang Liu:
Random Forest Algorithm Based on Linear Privacy Budget Allocation. J. Database Manag. 33(2): 1-19 (2022) - [j70]Heng Ye, Jiqiang Liu, Hao Zhen, Wenbin Jiang, Bin Wang, Wei Wang:
VREFL: Verifiable and Reconnection-Efficient Federated Learning in IoT scenarios. J. Netw. Comput. Appl. 207: 103486 (2022) - [j69]Peng Wu, Zhenjie Hou, Jiqiang Liu, Jinzhao Wu:
Reasoning Method Based on Intervals with Symmetric Truncated Normal Density. Symmetry 14(1): 25 (2022) - [j68]Jin Li, Heng Ye, Tong Li, Wei Wang, Wenjing Lou, Y. Thomas Hou, Jiqiang Liu, Rongxing Lu:
Efficient and Secure Outsourcing of Differentially Private Data Publishing With Multiple Evaluators. IEEE Trans. Dependable Secur. Comput. 19(1): 67-76 (2022) - [j67]Qiang Li, Dawei Tan, Xin Ge, Haining Wang, Zhi Li, Jiqiang Liu:
Understanding Security Risks of Embedded Devices Through Fine-Grained Firmware Fingerprinting. IEEE Trans. Dependable Secur. Comput. 19(6): 4099-4112 (2022) - [j66]Yike Li, Wenjia Niu, Yunzhe Tian, Tong Chen, Zhiqiang Xie, Yalun Wu, Yingxiao Xiang, Endong Tong, Thar Baker, Jiqiang Liu:
Multiagent Reinforcement Learning-Based Signal Planning for Resisting Congestion Attack in Green Transportation. IEEE Trans. Green Commun. Netw. 6(3): 1448-1458 (2022) - [j65]Endong Tong, Wenjia Niu, Jiqiang Liu:
A Missing QoS Prediction Approach via Time-Aware Collaborative Filtering. IEEE Trans. Serv. Comput. 15(6): 3115-3128 (2022) - [c70]Dan Su, Jiqiang Liu, Sencun Zhu, Xiaoyang Wang, Wei Wang:
Alexa Skills: Security Vulnerabilities and Countermeasures. CNS 2022: 1-9 - [c69]Di Zhai, Jian Wang, Jiqiang Liu, Tianhao Liu, Wenjia Niu:
Efficient-HotStuff: A BFT Blockchain Consensus with Higher Efficiency and Stronger Robustness. ICPADS 2022: 217-225 - [c68]Ziyan Qiao, Rui Sun, Shiyao Chen, Dong Zi, Xingyu Wu, Qian Wang, Endong Tong, Wenjia Niu, Jiqiang Liu:
Adapting on Road Traffic-Oriented Controlled Optimization of Phases to Heterogeneous Intersections. Intelligent Information Processing 2022: 522-535 - [c67]Yingying Yao, Xiaolin Chang, Lin Li, Jiqiang Liu, Jelena V. Misic, Vojislav B. Misic:
Metaverse-AKA: A Lightweight and PrivacyPreserving Seamless Cross-Metaverse Authentication and Key Agreement Scheme. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 2421-2427 - 2021
- [j64]Tong Chen, Jiqiang Liu, Yingxiao Xiang, Wenjia Niu, Endong Tong, Shuoru Wang, He Li, Liang Chang, Gang Li, Qi Alfred Chen:
Adversarial retraining attack of asynchronous advantage actor-critic based pathfinding. Int. J. Intell. Syst. 36(5): 2323-2346 (2021) - [j63]Yingdi Wang, Yunzhe Tian, Jiqiang Liu, Wenjia Niu, Endong Tong:
A Training-Based Identification Approach to VIN Adversarial Examples in Path Planning. J. Circuits Syst. Comput. 30(13): 2150229:1-2150229:21 (2021) - [j62]Tong Chen, Jiqiang Liu, He Li, Shuoru Wang, Wenjia Niu, Endong Tong, Liang Chang, Qi Alfred Chen, Gang Li:
Robustness Assessment of Asynchronous Advantage Actor-Critic Based on Dynamic Skewness and Sparseness Computation: A Parallel Computing View. J. Comput. Sci. Technol. 36(5): 1002-1021 (2021) - [j61]Yunzhe Tian, Jiqiang Liu, Endong Tong, Wenjia Niu, Liang Chang, Qi Alfred Chen, Gang Li, Wei Wang:
Towards Revealing Parallel Adversarial Attack on Politician Socialnet of Graph Structure. Secur. Commun. Networks 2021: 6631247:1-6631247:13 (2021) - [j60]Endong Tong, Wenjia Niu, Yunzhe Tian, Jiqiang Liu, Thar Baker, Sandeep Verma, Zheli Liu:
A Hierarchical Energy-Efficient Service Selection Approach With QoS Constraints for Internet of Things. IEEE Trans. Green Commun. Netw. 5(2): 645-657 (2021) - [j59]Lun Li, Xiaolin Chang, Jingxian Liu, Jiqiang Liu, Zhu Han:
Bit2CV: A Novel Bitcoin Anti-Fraud Deposit Scheme for Connected Vehicles. IEEE Trans. Intell. Transp. Syst. 22(7): 4181-4193 (2021) - [j58]Lichen Cheng, Jiqiang Liu, Yi Jin, Yidong Li, Wei Wang:
Account Guarantee Scheme: Making Anonymous Accounts Supervised in Blockchain. ACM Trans. Internet Techn. 21(1): 11:1-11:19 (2021) - [j57]Qiang Li, Zhihao Wang, Dawei Tan, Jinke Song, Haining Wang, Limin Sun, Jiqiang Liu:
GeoCAM: An IP-Based Geolocation Service Through Fine-Grained and Stable Webcam Landmarks. IEEE/ACM Trans. Netw. 29(4): 1798-1812 (2021) - [c66]Guozhi Zhang, Jiqiang Liu, Xiaolin Chang:
Mec2: Mobile Edge Computing enabled Caching Framework for Internet of Vehicles. BigCom 2021: 14-21 - [c65]Qiang Li, Jinke Song, Dawei Tan, Haining Wang, Jiqiang Liu:
PDGraph: A Large-Scale Empirical Study on Project Dependency of Security Vulnerabilities. DSN 2021: 161-173 - [c64]Shuang Zhao, Yalun Wu, Rui Sun, Xiaoai Qian, Dong Zi, Zhiqiang Xie, Endong Tong, Wenjia Niu, Jiqiang Liu, Zhen Han:
Blockchain-based decentralized federated learning: A secure and privacy-preserving system. HPCC/DSS/SmartCity/DependSys 2021: 941-948 - [c63]Zhiqiang Xie, Yingxiao Xiang, Yike Li, Shuang Zhao, Endong Tong, Wenjia Niu, Jiqiang Liu, Jian Wang:
Security Analysis of Poisoning Attacks Against Multi-agent Reinforcement Learning. ICA3PP (1) 2021: 660-675 - [c62]Yufei Liu, Jiqiang Liu, Jian Wang, Tianhao Liu, Xudong He:
BSS-ITS: Blockchain Scaling Scheme with Sharding for Intelligent Transportation System: Scale Blockchain for Better Data Exchange and Storage with Full Sharding for Intelligent Transportation System. ICBTA 2021: 128-134 - [c61]Tianhao Liu, Jiqiang Liu, Jian Wang, Di Zhai, Yufei Liu, Xudong He:
Anonymous Storage and Verification Model of IIoT Based on Blockchain: Anonymous storage and verification model of IIoT production status based on blockchain. ICBTA 2021: 144-150 - [c60]Yalun Wu, Minglu Song, Yike Li, Yunzhe Tian, Endong Tong, Wenjia Niu, Bowei Jia, Haixiang Huang, Qiong Li, Jiqiang Liu:
Improving Convolutional Neural Network-Based Webshell Detection Through Reinforcement Learning. ICICS (1) 2021: 368-383 - [c59]Tong Chen, Yingxiao Xiang, Yike Li, Yunzhe Tian, Endong Tong, Wenjia Niu, Jiqiang Liu, Gang Li, Qi Alfred Chen:
Protecting Reward Function of Reinforcement Learning via Minimal and Non-catastrophic Adversarial Trajectory. SRDS 2021: 299-309 - [i17]Yixiang Wang, Jiqiang Liu, Xiaolin Chang:
Generalizing Adversarial Examples by AdaBelief Optimizer. CoRR abs/2101.09930 (2021) - [i16]Yixiang Wang, Jiqiang Liu, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic:
IWA: Integrated Gradient based White-box Attacks for Fooling Deep Neural Networks. CoRR abs/2102.02128 (2021) - [i15]Dan Su, Jiqiang Liu, Sencun Zhu, Xiaoyang Wang, Wei Wang, Xiangliang Zhang:
AppQ: Warm-starting App Recommendation Based on View Graphs. CoRR abs/2109.03798 (2021) - [i14]Yixiang Wang, Jiqiang Liu, Xiaolin Chang, Jianhua Wang, Ricardo J. Rodríguez:
DI-AA: An Interpretable White-box Attack for Fooling Deep Neural Networks. CoRR abs/2110.07305 (2021) - 2020
- [j56]Yixiang Wang, ShaoHua Lv, Jiqiang Liu, Xiaolin Chang, Jinqiang Wang:
On the combination of data augmentation method and gated convolution model for building effective and robust intrusion detection. Cybersecur. 3(1): 23 (2020) - [j55]Heng Ye, Jiqiang Liu, Wei Wang, Ping Li, Tong Li, Jin Li:
Secure and efficient outsourcing differential privacy data release scheme in Cyber-physical system. Future Gener. Comput. Syst. 108: 1314-1323 (2020) - [j54]Ziqi Yan, Gang Li, Jiqiang Liu:
Private rank aggregation under local differential privacy. Int. J. Intell. Syst. 35(10): 1492-1519 (2020) - [j53]Lun Li, Jiqiang Liu, Xiaolin Chang, Tianhao Liu, Jingxian Liu:
Toward conditionally anonymous Bitcoin transactions: A lightweight-script approach. Inf. Sci. 509: 290-303 (2020) - [j52]Wei Wang, Yaoyao Shang, Yongzhong He, Yidong Li, Jiqiang Liu:
BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors. Inf. Sci. 511: 284-296 (2020) - [j51]Xinyu Huang, Yunzhe Tian, Yifei He, Endong Tong, Wenjia Niu, Chenyang Li, Jiqiang Liu, Liang Chang:
Exposing Spoofing Attack on Flocking-Based Unmanned Aerial Vehicle Cluster: A Threat to Swarm Intelligence. Secur. Commun. Networks 2020: 8889122:1-8889122:15 (2020) - [j50]Shuo Qiu, Boyang Wang, Ming Li, Jiqiang Liu, Yanfeng Shi:
Toward Practical Privacy-Preserving Frequent Itemset Mining on Encrypted Cloud Data. IEEE Trans. Cloud Comput. 8(1): 312-323 (2020) - [j49]Xing Liu, Jiqiang Liu, Sencun Zhu, Wei Wang, Xiangliang Zhang:
Privacy Risk Analysis and Mitigation of Analytics Libraries in the Android Ecosystem. IEEE Trans. Mob. Comput. 19(5): 1184-1199 (2020) - [j48]Yike Li, Yingxiao Xiang, Endong Tong, Wenjia Niu, Bowei Jia, Long Li, Jiqiang Liu, Zhen Han:
An Empirical Study on GAN-Based Traffic Congestion Attack Analysis: A Visualized Method. Wirel. Commun. Mob. Comput. 2020: 8823300:1-8823300:14 (2020) - [c58]Wenping Ji, Jian Wang, Xudong He, Jiqiang Liu:
Malware Analysis Method Based Random Access Memory in Android. ATIS 2020: 78-94 - [c57]Bowei Jia, Yunzhe Tian, Di Zhao, Xiaojin Wang, Chenyang Li, Wenjia Niu, Endong Tong, Jiqiang Liu:
Bidirectional RNN-Based Few-Shot Training for Detecting Multi-stage Attack. Inscrypt 2020: 37-52 - [c56]Xudong He, Jian Wang, Jiqiang Liu, Zhen Han, Zhuo Lv, Wei Wang:
DNS Rebinding Detection for Local Internet of Things Devices. FCS 2020: 19-29 - [c55]Yunzhe Tian, Yingdi Wang, Endong Tong, Wenjia Niu, Liang Chang, Qi Alfred Chen, Gang Li, Jiqiang Liu:
Exploring Data Correlation between Feature Pairs for Generating Constraint-based Adversarial Examples. ICPADS 2020: 430-437 - [c54]Xiaojin Wang, Yingxiao Xiang, Wenjia Niu, Endong Tong, Jiqiang Liu:
Explainable Congestion Attack Prediction and Software-level Reinforcement in Intelligent Traffic Signal System. ICPADS 2020: 667-672 - [c53]Xu Gao, Jiqiang Liu, Yike Li, Xiaojin Wang, Yingxiao Xiang, Endong Tong, Wenjia Niu, Zhen Han:
Queue Length Estimation Based Defence Against Data Poisoning Attack for Traffic Signal Control. Intelligent Information Processing 2020: 254-265 - [c52]