


default search action
Liming Wang 0001
Person information
- affiliation: Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China
- affiliation (PhD 2007): Chinese Academy of Sciences, Institute of Software, Beijing, China
Other persons with the same name
- Liming Wang (aka: Li-Ming Wang, Li-ming Wang, LiMing Wang) — disambiguation page
- Liming Wang 0002
— Tsinghua University, Shenzhen International Graduate School, Institute of Advanced Technology of Power and Electrical Engineering, Shenzhen, China (and 1 more)
- Liming Wang 0003
— University of Illinois Urbana-Champaign, Department of Electrical and Computer Engineering, Urbana-Champaign, IL, USA
- Liming Wang 0004
— HERE Technologies, Chicago, IL, USA (and 4 more)
- Liming Wang 0005
— North University of China, School of Information and Communication Engineering, State Key Laboratory for Electronic Testing Technology, Taiyuan, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Linwei Fang
, Liming Wang, Hongjia Li:
Iterative and mixed-spaces image gradient inversion attack in federated learning. Cybersecur. 7(1): 35 (2024) - [j18]Yao Pan
, Zheng Chao, He Wang, Jing Yang, Hongjia Li, Liming Wang:
FedSHE: privacy preserving and efficient federated learning with adaptive segmented CKKS homomorphic encryption. Cybersecur. 7(1): 40 (2024) - [j17]Xinrui Tan
, Hongjia Li
, Xiaofei Xie
, Lu Guo, Nirwan Ansari
, Xueqing Huang
, Liming Wang, Zhen Xu, Yang Liu
:
Reinforcement Learning Based Online Request Scheduling Framework for Workload-Adaptive Edge Deep Learning Inference. IEEE Trans. Mob. Comput. 23(12): 13222-13239 (2024) - [c92]Chao Zheng
, Liming Wang
, Zhen Xu
, Hongjia Li
:
Optimizing Privacy in Federated Learning with MPC and Differential Privacy. CACML 2024: 165-169 - [c91]Pengwei Zhan, Jing Yang, He Wang, Chao Zheng, Liming Wang:
Rethinking Word-level Adversarial Attack: The Trade-off between Efficiency, Effectiveness, and Imperceptibility. LREC/COLING 2024: 14037-14052 - [c90]Kai Chen, Qian Yang, Jiankai Wang, Duohe Ma, Liming Wang, Zhen Xu:
What You See Is The Tip Of The Iceberg: A Novel Technique For Data Leakage Prevention. CSCWD 2024: 2870-2875 - [c89]Chao Zheng, Liming Wang, Zhen Xu, Hongjia Li:
Mutual Information Based Noise Scale Optimization for Gradient Leakage Resistant Federated Learning. ICASSP 2024: 7345-7349 - [c88]Yang Wu, Jing Yang, Liming Wang, Zhen Xu:
Graph-Aware Multi-View Fusion for Rumor Detection on Social Media. ICASSP 2024: 9961-9965 - [c87]Kai Chen, Duohe Ma, Zhenchao Zhang, Zhimin Tang, Liming Wang, Junye Jiang:
Using Microposture Features and Optical Flows for Deepfake Detection. IFIP Int. Conf. Digital Forensics 2024: 81-97 - [c86]Qian Yang, Hongjia Li, Kai Chen, Jiankai Wang, Liming Wang, Zhen Xu:
Runtime Anomaly Detection for MEC Services with Multi-Timescale and Dimensional Feature. WCNC 2024: 1-6 - [c85]Jingyi Yao, Chen Song, Hongjia Li, Yuxiang Wang, Qian Yang, Liming Wang:
An Enclave-Aided Byzantine-Robust Federated Aggregation Framework. WCNC 2024: 1-6 - [c84]Ru Xie, Liming Wang, Chen Song:
Towards Minimum Latency in Cloud-Native Applications via Service-Characteristic- Aware Microservice Deployment. SANER 2024: 35-46 - 2023
- [j16]Yunjian Zhang
, Yanwei Liu
, Jinxia Liu
, Antonios Argyriou
, Liming Wang, Zhen Xu, Xiangyang Ji
:
Perspectively Equivariant Keypoint Learning for Omnidirectional Images. IEEE Trans. Image Process. 32: 2552-2567 (2023) - [j15]Hongjia Li
, Chang Yang
, Liming Wang, Nirwan Ansari, Ding Tang, Xueqing Huang
, Zhen Xu, Dan Hu:
A Cooperative Defense Framework Against Application-Level DDoS Attacks on Mobile Edge Computing Services. IEEE Trans. Mob. Comput. 22(1): 1-18 (2023) - [c83]Pengwei Zhan, Jing Yang, Xiao Huang, Chunlei Jing, Jingying Li, Liming Wang:
Contrastive Learning with Adversarial Examples for Alleviating Pathology of Language Model. ACL (1) 2023: 6493-6508 - [c82]Pengwei Zhan, Jing Yang, He Wang, Chao Zheng, Xiao Huang, Liming Wang:
Similarizing the Influence of Words with Contrastive Learning to Defend Word-level Adversarial Text Attack. ACL (Findings) 2023: 7891-7906 - [c81]Yuqiao Hou, Hongjia Li, Yuxiang Wang, Liming Wang, Zhen Xu:
Satellite Anomaly Detection based on Improved Transformer Method. APNOMS 2023: 322-325 - [c80]Benyu Li, Jing Yang, Yuxiang Wang, Xiao Huang, Junshuai Ren, Liming Wang:
A Blockchain-Based Privacy-Preserving Data Sharing Scheme with Security-Enhanced Access Control. CSCWD 2023: 825-830 - [c79]Pan Yao, He Wang, Chao Zheng, Jing Yang, Liming Wang:
Efficient Federated Learning Aggregation Protocol Using Approximate Homomorphic Encryption. CSCWD 2023: 1884-1889 - [c78]Ru Xie, Jing Yang, Jingying Li, Liming Wang:
ImpactTracer: Root Cause Localization in Microservices Based on Fault Propagation Modeling. DATE 2023: 1-6 - [c77]Yuqiao Hou
, Yuxiang Wang
, Jiankai Wang
, Liming Wang
, Zhen Xu
:
GPT Method Based Traffic Anomaly Detection for Space-ground Integrated Network. ICBAR 2023: 452-457 - [c76]Xinzhe Wang, Duohe Ma, Liming Wang, Zhitong Lu, Zhenchao Zhang, Junye Jiang:
Deepfake Detection Using Multiple Facial Features. IFIP Int. Conf. Digital Forensics 2023: 161-175 - [c75]Zhimin Tang, Duohe Ma, Xiaoyan Sun
, Kai Chen, Liming Wang, Junye Jiang:
Every Time Can Be Different: A Data Dynamic Protection Method Based on Moving Target Defense. ISCC 2023: 568-574 - [c74]Wenjie Liu, Liming Wang:
A Novel Malware Classification Method Based on Memory Image Representation. ISCC 2023: 1404-1409 - [c73]Yang Wu, Chen Song, Zhitong Lu, Chunlei Jing, Pengwei Zhan, Zhen Xu, Liming Wang:
Unsupervised Clustering with Contrastive Learning for Rumor Tracking on Social Media. NLPCC (2) 2023: 562-574 - [c72]Yuqiao Hou, Zhen Xu, Liming Wang, Yuxiang Wang, Hongjia Li:
NadGPT: Semi-Supervised Network Anomaly Detection via Auto-Regressive Auxiliary Prediction. SMC 2023: 133-138 - [c71]Hanyu Wang, Liming Wang, Hongjia Li:
Byzantine-Robust Federated Learning through Dynamic Clustering. TrustCom 2023: 222-230 - [c70]Baojian Chen, Hongjia Li, Lu Guo, Liming Wang:
Label-wise Distribution Adaptive Federated Learning on Non-IID Data. WCNC 2023: 1-6 - [c69]Jiankai Wang, Hongjia Li, Liming Wang, Zhen Xu:
Satellite Telemetry Data Anomaly Detection using Multiple Factors and Co-Attention based LSTM. WCNC 2023: 1-6 - 2022
- [j14]Mingjiang Huang, Zhen Xu, Liming Wang:
On the Probability and Automatic Search of Rotational-XOR Cryptanalysis on ARX Ciphers. Comput. J. 65(12): 3062-3080 (2022) - [c68]Pengwei Zhan, Yang Wu, Shaolei Zhou, Yunjian Zhang, Liming Wang:
Mitigating the Inconsistency Between Word Saliency and Model Confidence with Pathological Contrastive Training. ACL (Findings) 2022: 2226-2244 - [c67]Duohe Ma, Zhimin Tang, Xiaoyan Sun, Lu Guo, Liming Wang, Kai Chen:
Game Theory Approaches for Evaluating the Deception-based Moving Target Defense. MTD@CCS 2022: 67-77 - [c66]Pengwei Zhan, Chao Zheng, Jing Yang, Yuxiang Wang, Liming Wang, Yang Wu, Yunjian Zhang:
PARSE: An Efficient Search Method for Black-box Adversarial Text Attacks. COLING 2022: 4776-4787 - [c65]Shaolei Zhou, Liming Wang, Jing Yang, Pengwei Zhan:
SITD: Insider Threat Detection Using Siamese Architecture on Imbalanced Data. CSCWD 2022: 245-250 - [c64]Xiaojie Tao, Liming Wang, Zhen Xu, Ru Xie:
Detection of Hardware-Assisted Virtualization Based on Low-Level Feature. CSCWD 2022: 914-919 - [c63]Qiqing Deng, Xinrui Tan, Jing Yang, Chao Zheng, Liming Wang, Zhen Xu:
A Secure Container Placement Strategy Using Deep Reinforcement Learning in Cloud. CSCWD 2022: 1299-1304 - [c62]Yunjian Zhang, Yanwei Liu, Jinxia Liu, Jingbo Miao, Antonios Argyriou, Liming Wang, Zhen Xu:
360-Attack: Distortion-Aware Perturbations from Perspective-Views. CVPR 2022: 15015-15024 - [c61]Yunjian Zhang, Yanwei Liu, Jinxia Liu, Pengwei Zhan, Liming Wang, Zhen Xu:
SP Attack: Single-Perspective Attack for Generating Adversarial Omnidirectional Images. ICASSP 2022: 2475-2479 - [c60]Zhuoyi Shang
, Yanwei Liu, Guoyi Li, Yunjian Zhang, Jingbo Miao, Jinxia Liu, Liming Wang:
Viewport-Oriented Panoramic Image Inpainting. ICIP 2022: 3031-3035 - [c59]Yuyao Shao, Liming Wang:
GPSAttack: A Unified Glyphs, Phonetics and Semantics Multi-Modal Attack against Chinese Text Classification Models. IJCNN 2022: 1-8 - [c58]Pengwei Zhan, Yang Wu, Yunjian Zhang, Liming Wang, Chao Zheng, Jing Yang:
Crafting Textual Adversarial Examples through Second-Order Enhanced Word Saliency. IJCNN 2022: 1-8 - [c57]Jingran Jiang, Hongjia Li, Liming Wang:
Joint Model, Task Partitioning and Privacy Preserving Adaptation for Edge DNN Inference. WCNC 2022: 1224-1229 - [i4]Yang Wu, Jing Yang, Xiaojun Zhou, Liming Wang, Zhen Xu:
Exploring Graph-aware Multi-View Fusion for Rumor Detection on Social Media. CoRR abs/2212.02419 (2022) - 2021
- [j13]Pengwei Zhan
, Liming Wang, Yi Tang
:
Website fingerprinting on early QUIC traffic. Comput. Networks 200: 108538 (2021) - [j12]Yunlong He, Hequn Xian
, Liming Wang, Shuguang Zhang:
Secure Encrypted Data Deduplication Based on Data Popularity. Mob. Networks Appl. 26(4): 1686-1695 (2021) - [j11]Yanwei Liu, Jinxia Liu, Antonios Argyriou, Siwei Ma, Liming Wang, Zhen Xu:
360-Degree VR Video Watermarking Based on Spherical Wavelet Transform. ACM Trans. Multim. Comput. Commun. Appl. 17(1): 38:1-38:23 (2021) - [j10]Yanwei Liu
, Jinxia Liu, Antonios Argyriou
, Liming Wang, Zhen Xu:
Rendering-Aware VR Video Caching Over Multi-Cell MEC Networks. IEEE Trans. Veh. Technol. 70(3): 2728-2742 (2021) - [c56]Xinrui Tan, Hongjia Li, Liming Wang, Xueqing Huang, Zhen Xu:
Empowering Adaptive Early-Exit Inference with Latency Awareness. AAAI 2021: 9825-9833 - [c55]Yang Wu
, Pengwei Zhan
, Yunjian Zhang, Liming Wang, Zhen Xu:
Multimodal Fusion with Co-Attention Networks for Fake News Detection. ACL/IJCNLP (Findings) 2021: 2560-2569 - [c54]Yixin Li, Xi Luo, Liming Wang, Zhen Xu:
DyDom: Detecting Malicious Domains with Spatial-Temporal Analysis on Dynamic Graphs. HPCC/DSS/SmartCity/DependSys 2021: 283-290 - [c53]Xiaoxue Ge, Liming Wang, Wei An, Xiaojun Zhou, Benyu Li:
CRchain: An Efficient Certificate Revocation Scheme Based on Blockchain. ICA3PP (2) 2021: 453-472 - [c52]Chen Song, Zhen Xu, Liming Wang:
Distributed Capability Based Dynamic Path Authorization Scheme for SDSIN. ICCBN 2021: 86-93 - [c51]Chuan Zhou, Huiyun Jing, Xin He, Liming Wang, Kai Chen, Duohe Ma:
Disappeared Face: A Physical Adversarial Attack Method on Black-Box Face Detection Models. ICICS (1) 2021: 119-135 - [c50]Xiaojie Tao, Liming Wang, Zhen Xu, Ru Xie:
Secure and Efficient Allocation of Virtual Machines in Cloud Data Center. ISCC 2021: 1-7 - [c49]Fengchao Wang, Yanwei Liu, Jinxia Liu, Antonios Argyriou, Liming Wang, Zhen Xu:
Output Security for Multi-user Augmented Reality using Federated Reinforcement Learning. ISCC 2021: 1-7 - [c48]Xiaojie Tao, Liming Wang, Zhen Xu, Ru Xie:
SCAMS: A Novel Side-Channel Attack Mitigation System in IaaS Cloud. MILCOM 2021: 329-334 - [c47]Ru Xie, Liming Wang, Xiaojie Tao:
A Secure VM Allocation Strategy Based on Tenant Behavior Analysis and Anomaly Identification. MILCOM 2021: 721-726 - [i3]Pengwei Zhan, Liming Wang, Yi Tang:
Website Fingerprinting on Early QUIC Traffic. CoRR abs/2101.11871 (2021) - 2020
- [j9]Shuguang Zhang
, Hequn Xian
, Zengpeng Li
, Liming Wang:
SecDedup: Secure Encrypted Data Deduplication With Dynamic Ownership Updating. IEEE Access 8: 186323-186334 (2020) - [j8]Jianfeng Xu, Liming Wang, Zhen Xu:
An enhanced saturation attack and its mitigation mechanism in software-defined networking. Comput. Networks 169: 107092 (2020) - [j7]Mingjiang Huang
, Liming Wang
:
Automatic Search for the Linear (Hull) Characteristics of ARX Ciphers: Applied to SPECK, SPARX, Chaskey, and CHAM-64. Secur. Commun. Networks 2020: 4898612:1-4898612:14 (2020) - [j6]Yixin Li, Liming Wang, Jing Yang, Zhen Xu, Xi Luo:
deMSF: a Method for Detecting Malicious Server Flocks for Same Campaign. EAI Endorsed Trans. Security Safety 7(26): e1 (2020) - [j5]Xinrui Tan
, Hongjia Li
, Liming Wang, Zhen Xu:
Comments on "Dropping Activation Outputs with Localized First-Layer Deep Network for Enhancing User Privacy and Data Security". IEEE Trans. Inf. Forensics Secur. 15: 3938-3939 (2020) - [j4]Lihua Yin, Xi Luo
, Chunsheng Zhu
, Liming Wang, Zhen Xu, Hui Lu
:
ConnSpoiler: Disrupting C&C Communication of IoT-Based Botnet Through Fast Detection of Anomalous Domain Queries. IEEE Trans. Ind. Informatics 16(2): 1373-1384 (2020) - [c46]Tong Kong, Liming Wang, Duohe Ma, Zhen Xu, Qian Yang, Zhitong Lu, Yijun Lu:
Automated Honeynet Deployment Strategy for Active Defense in Container-based Cloud. HPCC/DSS/SmartCity 2020: 483-490 - [c45]Yixin Li, Xi Luo, Liming Wang, Jing Yang, Zhen Xu:
SiegeCannon: Detecting Malicious Infrastructures by Analyzing Integral Characteristics of Involved Server Flocks. HPCC/DSS/SmartCity 2020: 491-498 - [c44]Tong Kong, Liming Wang, Duohe Ma, Kai Chen, Zhen Xu, Yijun Lu:
ConfigRand: A Moving Target Defense Framework against the Shared Kernel Information Leakages for Container-based Cloud. HPCC/DSS/SmartCity 2020: 794-801 - [c43]Wen Zhou, Liming Wang, Yaohao Zheng:
An Efficient Blurring-Reconstruction Model to Defend Against Adversarial Attacks. ICANN (1) 2020: 491-503 - [c42]Xueshuang Ren, Liming Wang:
A Hybrid Intelligent System for Insider Threat Detection Using Iterative Attention. ICCDE 2020: 189-194 - [c41]Yunjian Zhang, Yanwei Liu, Liming Wang, Zhen Xu, Qiuqing Jin:
RegionSparse: Leveraging Sparse Coding and Object Localization to Counter Adversarial Attacks. IJCNN 2020: 1-8 - [c40]Shiming Hou, Hongjia Li, Chang Yang, Liming Wang:
A New Privacy-Preserving Framework based on Edge-Fog-Cloud Continuum for Load Forecasting. WCNC 2020: 1-8 - [c39]Xinrui Tan, Hongjia Li, Liming Wang, Zhen Xu:
End-Edge Coordinated Inference for Real-Time BYOD Malware Detection using Deep Learning. WCNC 2020: 1-6
2010 – 2019
- 2019
- [j3]Kai Chen
, Chen Song, Liming Wang, Zhen Xu:
Using memory propagation tree to improve performance of protocol fuzzer when testing ICS. Comput. Secur. 87 (2019) - [j2]Zhaocan Li, Liming Wang, Sijiang Ge, Duohe Ma, Bo Qin:
基于正交编码的大数据纯文本水印方法 (Big Data Plain Text Watermarking Based on Orthogonal Coding). 计算机科学 46(12): 148-154 (2019) - [c38]Minjie Ou, Liming Wang, Hao Xun:
DeaPS: Deep Learning-Based User-Level Proactive Security Auditing for Clouds. GLOBECOM 2019: 1-6 - [c37]Tong Kong, Liming Wang, Duohe Ma, Zhen Xu, Qian Yang, Kai Chen:
A Secure Container Deployment Strategy by Genetic Algorithm to Defend against Co-Resident Attacks in Cloud Computing. HPCC/SmartCity/DSS 2019: 1825-1832 - [c36]Yuan Wang, Liming Wang:
Bot-like Behavior Detection in Online Banking. ICBDC 2019: 140-144 - [c35]Qiuqing Jin, Liming Wang:
Intranet User-Level Security Traffic Management with Deep Reinforcement Learning. IJCNN 2019: 1-8 - [c34]Mingjiang Huang, Liming Wang:
Automatic Tool for Searching for Differential Characteristics in ARX Ciphers and Applications. INDOCRYPT 2019: 115-138 - [c33]Mingli Zhang, Liming Wang, Jing Yang:
A Blockchain-Based Authentication Method with One-Time Password. IPCCC 2019: 1-9 - [c32]Xin Wang, Liming Wang, Fabiao Miao, Jing Yang:
SVMDF: A Secure Virtual Machine Deployment Framework to Mitigate Co-Resident Threat in Cloud. ISCC 2019: 1-7 - [c31]Jianfeng Xu, Liming Wang, Chen Song, Zhen Xu:
Adaptive SDN Master Controller Assignment for Maximizing Network Throughput. ISCC 2019: 1-6 - [c30]Jianfeng Xu, Liming Wang, Chen Song, Zhen Xu:
Minimizing Multi-Controller Deployment Cost in Software-Defined Networking. ISCC 2019: 1-6 - [c29]Jianfeng Xu, Liming Wang, Chen Song, Zhen Xu:
An Effective Table-Overflow Attack and Defense in Software-Defined Networking. LCN Symposium 2019: 10-17 - [c28]Xueshuang Ren
, Liming Wang:
DMNAED: A Novel Framework Based on Dynamic Memory Network for Abnormal Event Detection in Enterprise Networks. PAKDD (1) 2019: 574-586 - [c27]Xinrui Tan, Hongjia Li, Liming Wang, Zhen Xu:
Global Orchestration of Cooperative Defense against DDoS Attacks for MEC. WCNC 2019: 1-6 - [c26]Jianfeng Xu, Liming Wang, Zhen Xu:
EFastLane: Toward Bandwidth-Efficient Flow Setup in Software-Defined Networking. WCNC 2019: 1-7 - [i2]Mingjiang Huang, Liming Wang:
Automatic Tool for Searching for Differential Characteristics in ARX Ciphers and Applications. IACR Cryptol. ePrint Arch. 2019: 1318 (2019) - [i1]Mingjiang Huang, Liming Wang:
Automatic Search for the Linear (hull) Characteristics of ARX Ciphers: Applied to SPECK, SPARX, Chaskey and CHAM-64. IACR Cryptol. ePrint Arch. 2019: 1319 (2019) - 2018
- [j1]Cheng Lei, Hongqi Zhang, Liming Wang, Lu Liu, Duohe Ma:
Incomplete information Markov game theoretic approach to strategy generation for moving target defense. Comput. Commun. 116: 184-199 (2018) - [c25]Yuan Wang, Liming Wang, Zhen Xu, Wei An:
Understanding User Behavior in Online Banking System. Inscrypt 2018: 637-646 - [c24]Xi Luo, Liming Wang, Zhen Xu, Kai Chen, Jing Yang, Tian Tian:
A Large Scale Analysis of DNS Water Torture Attack. CSAI/ICIMT 2018: 168-173 - [c23]Dan Li, Liming Wang:
Detecting Chinese Domain Name Piracy. CSAI/ICIMT 2018: 530-535 - [c22]Xi Luo, Liming Wang, Zhen Xu, Wei An:
LagProber: Detecting DGA-Based Malware by Using Query Time Lag of Non-existent Domains. ICICS 2018: 41-56 - [c21]Kai Chen, Ning Zhang, Liming Wang, Zhen Xu:
Automatic Identification of Industrial Control Network Protocol Field Boundary Using Memory Propagation Tree. ICICS 2018: 551-565 - [c20]Mingjiang Huang, Liming Wang, Yan Zhang:
Improved Automatic Search Algorithm for Differential and Linear Cryptanalysis on SIMECK and the Applications. ICICS 2018: 664-681 - [c19]Bin Pan, Liming Wang, Xinran Yu, Zhenwei Shi:
Single-Sample Aeroplane Detection in High-Resolution Optimal Remote Sensing Imagery. IGARSS 2018: 2495-2498 - [c18]Bin Pan, Liming Wang, Xia Xu, Zhenwei Shi:
Towards Weakly Pareto Optimal: An Improved Multi-Objective Based Band Selection Method for Hyperspectral Imagery. IGARSS 2018: 4705-4708 - [c17]Xia Xu, Liming Wang, Bin Pan, Zhenwei Shi:
Robust Sparse Hyperspectral Unmixing Based on Multi-Objective Optimization. IGARSS 2018: 5760-5763 - [c16]Fabiao Miao, Liming Wang, Zailong Wu:
A VM Placement Based Approach to Proactively Mitigate Co-Resident Attacks in Cloud. ISCC 2018: 285-291 - [c15]Jianfeng Xu, Liming Wang, Chen Song, Zhen Xu:
Proactive Mitigation to Table-Overflow in Software-Defined Networking. ISCC 2018: 719-725 - [c14]Ying Ding, Yanwei Liu, Jinxia Liu, Kedong Liu, Liming Wang, Zhen Xu:
Panoramic Image Saliency Detection by Fusing Visual Frequency Feature and Viewing Behavior Pattern. PCM (2) 2018: 418-429 - [c13]Hongjia Li, Liming Wang:
Online orchestration of cooperative defense against DDoS attacks for 5G MEC. WCNC 2018: 1-6 - [c12]Chang Yang, Hongjia Li, Liming Wang, Ding Tang:
Exploring the behaviors and threats of pollution attack in cooperative MEC caching. WCNC 2018: 1-6 - 2017
- [c11]Wen Feng, Hongjia Li, Ding Tang, Liming Wang, Zhen Xu:
A Multi-queue Aggregation Framework for M2M Traffic in LTE-A and Beyond Networks. 5GWN 2017: 609-621 - [c10]Duohe Ma, Liming Wang, Cheng Lei, Zhen Xu, Hongqi Zhang, Meng Li:
Quantitative Security Assessment Method based on Entropy for Moving Target Defense. AsiaCCS 2017: 920-922 - [c9]Xiaojun Zhou, Zhen Xu, Liming Wang, Kai Chen:
What should we do? A structured review of SCADA system cyber security standards. CoDIT 2017: 605-614 - [c8]Chang Yang, Hongjia Li, Liming Wang, Zhen Xu:
A game theoretical framework for improving the quality of service in cooperative RAN caching. ICC 2017: 1-7 - [c7]Xi Luo, Liming Wang, Zhen Xu, Jing Yang, Mo Sun, Jing Wang:
DGASensor: Fast Detection for DGA-Based Malwares. ICCBN 2017: 47-53 - [c6]Jing Yang, Liming Wang, Zhen Xu:
A Novel Semantic-Aware Approach for Detecting Malicious Web Traffic. ICICS 2017: 633-645 - [c5]Yan Zhang, Gui Peng, Lu Yang, Yazhe Wang, Minghui Tian, Jianxing Hu, Liming Wang, Chen Song:
Visual Analysis of Android Malware Behavior Profile Based on PMCG_droid : A Pruned Lightweight APP Call Graph. SecureComm 2017: 449-468 - 2016
- [c4]Duohe Ma, Cheng Lei, Liming Wang, Hongqi Zhang, Zhen Xu, Meng Li:
A Self-adaptive Hopping Approach of Moving Target Defense to thwart Scanning Attacks. ICICS 2016: 39-53 - [c3]Duohe Ma, Liming Wang, Cheng Lei, Zhen Xu, Hongqi Zhang, Meng Li:
Thwart eavesdropping attacks on network communication based on moving target defense. IPCCC 2016: 1-2 - [c2]Zejue Wang, Hongjia Li, Dan Wang, Liming Wang, Song Ci:
Adaptive relaying for full-duplex energy harvesting enabled cooperative communication in harsh environments. MILCOM 2016: 85-90
2000 – 2009
- 2006
- [c1]Liming Wang, Chuan-Kun Wu:
Authenticated Group Key Agreement for Multicast. CANS 2006: 55-72
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-24 01:00 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint