default search action
Qiang Liu 0004
Person information
- affiliation: National University of Defense Technology, College of Computer, Changsha, China
Other persons with the same name
- Qiang Liu — disambiguation page
- Qiang Liu 0001 — University of Texas at Austin, Department of Computer Science, TX, USA (and 2 more)
- Qiang Liu 0002 — Linköping University, Swedish e-Science Research Centre, Sweden
- Qiang Liu 0003 — University of Essex, School of Computer Science and Electronic Engineering, Colchester, UK
- Qiang Liu 0005 — Delft University of Technology, The Netherlands (and 1 more)
- Qiang Liu 0006 — Chinese Academy of Sciences, Institute of Automation, Center for Research on Intelligent Perception and Computing, Beijing, China
- Qiang Liu 0007 — Oak Ridge National Laboratory, Computer Science and Mathematics Division, TN, USA (and 1 more)
- Qiang Liu 0008 — Chinese Academy of Sciences, Institute of Computing Technology, Beijing, China (and 1 more)
- Qiang Liu 0009 — Joint Center for Global Change Studies, Beijing, China (and 2 more)
- Qiang Liu 0010 — Liaoning Shihua University, School of Information and Control Engineering, Fushun, China (and 1 more)
- Qiang Liu 0011 — Tianjin University, School of Microelectronics, China (and 1 more)
- Qiang Liu 0012 — Huaihai Institute of Technology, School of Electric Engineering, Lianyungang, China
- Qiang Liu 0013 — University of Nebraska-Lincoln, NE, USA (and 1 more)
- Qiang Liu 0014 — Beijing Jiaotong University, School of Computer and Information Technology, China
- Qiang Liu 0015 — Chinese University of Hong Kong
- Qiang Liu 0016 — University of Electronic Science and Technology of China, School of Communication and Information Engineering, Chengdu, China
- Qiang Liu 0017 — Hunan University, College of Electrical and Information Engineering, Changsha, China (and 1 more)
- Qiang Liu 0018 — Northeastern University, State Key Laboratory of Synthetical Automation for Process Industries, Shenyang, China
- Qiang Liu 0019 — University of Manchester, School of Engineering, UK
- Qiang Liu 0020 — Beijing Jiaotong University, Beijing Key Laboratory of Transportation Data Analysis and Mining, China
- Qiang Liu 0021 — Sichuan University, College of Electronics and Information Engineering, Chengdu, China
- Qiang Liu 0022 — University of Antwerp, Department of Biology, Belgium (and 1 more)
- Qiang Liu 0023 — Dalian University of Technology, School of Mechanical Engineering, China
- Qiang Liu 0024 — Beihang University, School of Mechanical Engineering and Automation, Beijing, China
- Qiang Liu 0025 — Shenzhen University, School of Mathematics and Statistics, China (and 1 more)
- Qiang Liu 0026 — Shandong University of Finance and Economics, Department of Network and Information Security, Jinan, China (and 1 more)
- Qiang Liu 0027 — Chinese Academy of Sciences, Changchun Institute of Optics, Fine Mechanics and Physics, China
- Qiang Liu 0028 — Harbin Institute of Technology, State Key Laboratory of Robotics and System, China
- Qiang Liu 0029 — Beijing Institute of Petrochemical Technology, Institute of Precision Electromagnetic Equipment and Advanced Measurement Technology, China (and 1 more)
- Qiang Liu 0030 — Beijing University of Posts and Telecommunications, School of Information and Communication, China
- Qiang Liu 0031 — Guangdong University of Technology, Guangzhou, China
- Qiang Liu 0032 — Hunan University of Technology, College of Computer Science, Intelligent Information Perception and Processing Technology Hunan Province Key Laboratory, Zhuzhou, China
- Qiang Liu 0033 — University of Pittsburgh, Department of Neurological Surgery, PA, USA
- Qiang Liu 0034 — EPFL, Lausanne, Vaud, Switzerland (and 1 more)
- Qiang Liu 0035 — Ningbo University, Faculty of Electrical Engineering and Computer Science, China
- Qiang Liu 0036 — Alibaba Group, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j48]Wenjie Kang, Qiang Liu, Peidong Zhu, Wei Zhao, Xuchong Liu, Gang Hu:
Coordinated cyber-physical attacks based on different attack strategies for cascading failure analysis in smart grids. Wirel. Networks 30(5): 3821-3836 (2024) - 2023
- [j47]Qiang Liu, Tongqing Zhou, Zhiping Cai, Yuan Yuan, Ming Xu, Jiaohua Qin, Wentao Ma:
Turning backdoors for efficient privacy protection against image retrieval violations. Inf. Process. Manag. 60(5): 103471 (2023) - 2022
- [j46]Qiang Liu, Ryan Shea, Zhi Liu, Zehua Wang, Han Hu:
Editorial: Heterogeneous Cloud-Based Intelligent Computing for Next-Generation 5G Applications. Mob. Networks Appl. 27(5): 1779-1782 (2022) - [j45]Qiang Liu, Xuyu Xiang, Jiaohua Qin, Yun Tan, Qin Zhang:
A Robust Coverless Steganography Scheme Using Camouflage Image. IEEE Trans. Circuits Syst. Video Technol. 32(6): 4038-4051 (2022) - [c48]Tengfei Zheng, Tongqing Zhou, Qiang Liu, Kui Wu, Zhiping Cai:
Characterizing and Detecting Non-Consensual Photo Sharing on Social Networks. CCS 2022: 3209-3222 - [c47]Qiang Liu, Tongqing Zhou, Zhiping Cai, Yonghao Tang:
Opportunistic Backdoor Attacks: Exploring Human-imperceptible Vulnerabilities on Speech Recognition Systems. ACM Multimedia 2022: 2390-2398 - 2021
- [j44]Qiang Liu, Xuyu Xiang, Jiaohua Qin, Yun Tan, Qin Zhang:
Reversible Sub-Feature Retrieval: Toward Robust Coverless Image Steganography for Geometric Attacks Resistance. KSII Trans. Internet Inf. Syst. 15(3): 1078-1099 (2021) - [c46]Qiang Liu, Wentao Zhao, Ruijin Wang, Jiangyong Shi:
A Competence-Based Three-Layer Cybersecurity Education Framework and Its Application. ACM TUR-C 2021: 54-60 - [c45]Qiang Liu, Yifei Gao, Runhao Liu, Jiayao Wang:
AutoCEW: An Autonomous Cyberspace Early Warning Framework via Ensemble Learning. INFOCOM Workshops 2021: 1-6 - 2020
- [j43]Wentao Zhao, Xiao Liu, Qiang Liu, Jiuren Chen, Pan Li:
Model Capacity Vulnerability in Hyper-Parameters Estimation. IEEE Access 8: 21602-21612 (2020) - [j42]Junxing Zhu, Xiang Wang, Qiang Liu, Xiaoyong Li, Chengcheng Shao, Bin Zhou:
A multiview approach based on naming behavioral modeling for aligning chinese user accounts across multiple networks. Concurr. Comput. Pract. Exp. 32(22) (2020) - [j41]Qiang Liu, Xuyu Xiang, Jiaohua Qin, Yun Tan, Yao Qiu:
Coverless image steganography based on DenseNet feature mapping. EURASIP J. Image Video Process. 2020(1): 39 (2020) - [j40]Yunlong Zhang, Xuan Wang, Dan Liu, Chunhui Li, Qiang Liu, Yanpeng Cai, Yujun Yi, Zhifeng Yang:
Joint probability-based classifier based on vine copula method for land use classification of multispectral remote sensing data. Earth Sci. Informatics 13(4): 1079-1092 (2020) - [j39]Ye Peng, Wentao Zhao, Wei Cai, Jinshu Su, Biao Han, Qiang Liu:
Evaluating Deep Learning for Image Classification in Adversarial Environment. IEICE Trans. Inf. Syst. 103-D(4): 825-837 (2020) - [j38]Sihang Zhou, En Zhu, Xinwang Liu, Tianming Zheng, Qiang Liu, Jingyuan Xia, Jianping Yin:
Subspace segmentation-based robust multiple kernel clustering. Inf. Fusion 53: 145-154 (2020) - [j37]Yuanjing Luo, Jiaohua Qin, Xuyu Xiang, Yun Tan, Qiang Liu, Lingyun Xiang:
Coverless real-time image information hiding based on image block matching and dense convolutional network. J. Real Time Image Process. 17(1): 125-135 (2020) - [j36]Qiang Liu, Xuyu Xiang, Jiaohua Qin, Yun Tan, Junshan Tan, Yuanjing Luo:
Coverless steganography based on image retrieval of DenseNet features and DWT sequence mapping. Knowl. Based Syst. 192: 105375 (2020) - [j35]Haoyang Zhu, Xiaoyong Li, Qiang Liu, Zichen Xu:
Top-k Dominating Queries on Skyline Groups. IEEE Trans. Knowl. Data Eng. 32(7): 1431-1444 (2020) - [j34]Zhi Liu, Qiang Liu, Ryan Shea, Wei Cai, Zehua Wang, Yongyi Ran:
Intelligent resource management for 5G. Wirel. Networks 26(3): 1535-1536 (2020) - [c44]Pu Zhao, Wentao Zhao, Qiang Liu:
Research on SDN Enabled by Machine Learning: An Overview. 6GN 2020: 190-203 - [c43]Qiang Liu, Wentao Zhao, Minghui Wu, Chengzhang Zhu:
Web Security Education in A Multidisciplinary Learning Context. ACM TUR-C 2020: 1-7 - [c42]Rongkun Zhang, Dan Liu, Wentao Zhao, Qiang Liu, Chengzhang Zhu:
A Simple yet Effective Unsupervised Adversarial Example Generation Framework for Vulnerability Assessment on Deep Learning. NCTCS 2020: 107-122 - [c41]Pu Zhao, Wentao Zhao, Qiang Liu, Anbang Wang:
Trusted Link-Separation Multipath Selection for Software-Defined Wireless Sensor Networks in Adversarial Environments. SPDE 2020: 19-32 - [e2]Xiaofei Wang, Victor C. M. Leung, Keqiu Li, Haijun Zhang, Xiping Hu, Qiang Liu:
6GN for Future Wireless Networks - Third EAI International Conference, 6GN 2020, Tianjin, China, August 15-16, 2020, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 337, Springer 2020, ISBN 978-3-030-63940-2 [contents] - [i3]Junxing Zhu, Xiang Wang, Qiang Liu, Xiaoyong Li, Chengcheng Shao, Bin Zhou:
A Multi-View Approach Based on Naming Behavioral Modeling for Aligning Chinese User Accounts across Multiple Networks. CoRR abs/2006.10633 (2020)
2010 – 2019
- 2019
- [j33]Yuewei Ming, En Zhu, Mao Wang, Qiang Liu, Xinwang Liu, Jianping Yin:
Scalable k-means for large-scale clustering. Intell. Data Anal. 23(4): 825-838 (2019) - [j32]Siqi Wang, Qiang Liu, Xifeng Guo, En Zhu, Jianping Yin:
Fast and unsupervised outlier removal by recurrent adaptive reconstruction extreme learning machine. Int. J. Mach. Learn. Cybern. 10(12): 3539-3556 (2019) - [c40]Siqi Wang, En Zhu, Xiping Hu, Xinwang Liu, Qiang Liu, Jianping Yin, Fei Wang:
Robustness Can Be Cheap: A Highly Efficient Approach to Discover Outliers under High Outlier Ratios. AAAI 2019: 5313-5320 - [c39]Pu Zhao, Wentao Zhao, Qiang Liu:
Multi-objective Link-Separation Multipath Selection Using k Max-Min for Software-Defined MANETs. MSN 2019: 253-258 - [c38]Runhao Liu, Weitao Wang, Jiayao Wang, Zhixin Ou, Haozhong Qiu, Benyu Wang, Qiang Liu:
iWEP: An Intelligent WLAN Early Warning Platform Using Edge Computing. MSN 2019: 384-389 - [e1]Victor C. M. Leung, Haijun Zhang, Xiping Hu, Qiang Liu, Zhi Liu:
5G for Future Wireless Networks - 2nd EAI International Conference, 5GWN 2019, Changsha, China, February 23-24, 2019, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 278, Springer 2019, ISBN 978-3-030-17512-2 [contents] - 2018
- [j31]Qiang Liu, Pan Li, Wentao Zhao, Wei Cai, Shui Yu, Victor C. M. Leung:
A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View. IEEE Access 6: 12103-12117 (2018) - [j30]Mao Wang, En Zhu, Qiang Liu, Yongkai Ye, Yuewei Ming, Jianping Yin:
Intensity Filtering and Group Fusion for Accurate Mobile Place Recognition. IEEE Access 6: 31088-31098 (2018) - [j29]Erxue Min, Xifeng Guo, Qiang Liu, Gen Zhang, Jianjing Cui, Jun Long:
A Survey of Clustering With Deep Learning: From the Perspective of Network Architecture. IEEE Access 6: 39501-39514 (2018) - [j28]Jingming Xue, En Zhu, Qiang Liu, Jianping Yin:
Group Recommendation Based on Financial Social Network for Robo-Advisor. IEEE Access 6: 54527-54535 (2018) - [j27]Yongkai Ye, Xinwang Liu, Qiang Liu, Xifeng Guo, Jianping Yin:
Incomplete Multiview Clustering via Late Fusion. Comput. Intell. Neurosci. 2018: 6148456:1-6148456:11 (2018) - [j26]Jieren Cheng, Jinghe Zhou, Qiang Liu, Xiangyan Tang, Yanxiang Guo:
A DDoS Detection Method for Socially Aware Networking Based on Forecasting Fusion Feature Sequence. Comput. J. 61(7): 959-970 (2018) - [j25]Jingming Xue, Sihang Zhou, Qiang Liu, Xinwang Liu, Jianping Yin:
Financial time series prediction using ℓ2, 1RF-ELM. Neurocomputing 277: 176-186 (2018) - [j24]Caihong Liu, Qiang Liu:
Community Detection Based on Differential Evolution Using Modularity Density. Inf. 9(9): 218 (2018) - [j23]Wentao Zhao, Pan Li, Qiang Liu, Dan Liu, Xinwang Liu:
Selecting the Optimal Hidden Layer of Extreme Learning Machine Using Multiple Kernel Learning. KSII Trans. Internet Inf. Syst. 12(12): 5765-5781 (2018) - [j22]Siqi Wang, Qiang Liu, En Zhu, Fatih Porikli, Jianping Yin:
Hyperparameter selection of one-class support vector machine by self-adaptive data shifting. Pattern Recognit. 74: 198-211 (2018) - [j21]Heng Zhang, Zhiping Cai, Qiang Liu, Qingjun Xiao, Yangyang Li, Chak-Fong Cheang:
A Survey on Security-Aware Measurement in SDN. Secur. Commun. Networks 2018: 2459154:1-2459154:14 (2018) - [j20]Erxue Min, Jun Long, Qiang Liu, Jianjing Cui, Wei Chen:
TR-IDS: Anomaly-Based Intrusion Detection through Text-Convolutional Neural Network and Random Forest. Secur. Commun. Networks 2018: 4943509:1-4943509:9 (2018) - [j19]Wenjie Kang, Gang Hu, Peidong Zhu, Qiang Liu, Zhi Hang, Xin Liu:
Influence of Different Coupling Modes on the Robustness of Smart Grid under Targeted Attack. Sensors 18(6): 1699 (2018) - [j18]Jingming Xue, Qiang Liu, Miaomiao Li, Xinwang Liu, Yongkai Ye, Siqi Wang, Jianping Yin:
Incremental multiple kernel extreme learning machine and its application in Robo-advisors. Soft Comput. 22(11): 3507-3517 (2018) - [j17]Chengzhang Zhu, Longbing Cao, Qiang Liu, Jianping Yin, Vipin Kumar:
Heterogeneous Metric Learning of Categorical Data with Hierarchical Couplings. IEEE Trans. Knowl. Data Eng. 30(7): 1254-1267 (2018) - [c37]Qiang Liu, Jiao Ji, Juan Chen, Wentao Zhao, Jianping Yin:
Evaluating the effectiveness of situational case-based teaching: a view of concept mapping. TURC 2018: 60-66 - [c36]Yan Jia, Lu Deng, Bin Zhou, Binxing Fang, Weihong Han, Aiping Li, Qiang Liu, Yong Quan:
Topic Analysis Model for Online Social Network. DSC 2018: 39-44 - [c35]Yan Jia, Qiang Liu, Binxing Fang, Bin Zhou, Lu Deng, Yong Quan:
Virtual Community Detection Model and Related Research in Online Social Networks. DSC 2018: 61-68 - [c34]Pan Li, Qiang Liu, Wentao Zhao, Dongxu Wang, Siqi Wang:
Chronic Poisoning against Machine Learning Based IDSs Using Edge Pattern Detection. ICC 2018: 1-7 - [c33]Jingming Xue, En Zhu, Qiang Liu, Chuanli Wang, Jianping Yin:
A Joint Approach to Data Clustering and Robo-Advisor. ICCCS (1) 2018: 97-109 - [c32]Erxue Min, Jun Long, Qiang Liu, Jianjing Cui, Zhiping Cai, Junbo Ma:
SU-IDS: A Semi-supervised and Unsupervised Framework for Network Intrusion Detection. ICCCS (3) 2018: 322-334 - [c31]Ruizhi Zhang, Jieren Cheng, Xiangyan Tang, Qiang Liu, Xiangfeng He:
DDoS Attack Security Situation Assessment Model Using Fusion Feature Based on Fuzzy C-Means Clustering Algorithm. ICCCS (2) 2018: 654-669 - [c30]Siqi Wang, Yijie Zeng, Qiang Liu, Chengzhang Zhu, En Zhu, Jianping Yin:
Detecting Abnormality without Knowing Normality: A Two-stage Approach for Unsupervised Video Abnormal Event Detection. ACM Multimedia 2018: 636-644 - [c29]Yan Jia, Yong Quan, Weihong Han, Binxing Fang, Qiang Liu, Lu Deng:
Individual Analysis Model and Related Research in Social Networks. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 1837-1843 - [c28]Yifan Dong, Peidong Zhu, Qiang Liu, Yingwen Chen, Peng Xun:
Degrading Detection Performance of Wireless IDSs Through Poisoning Feature Selection. WASA 2018: 90-102 - [c27]Pan Li, Wentao Zhao, Qiang Liu, Xiao Liu, Linyuan Yu:
Poisoning Machine Learning Based Wireless IDSs via Stealing Learning Model. WASA 2018: 261-273 - [c26]Yiqi Wang, En Zhu, Qiang Liu, Yingwen Chen, Jianping Yin:
Exploration of Human Activities Using Sensing Data via Deep Embedded Determination. WASA 2018: 473-484 - [i2]Pan Li, Qiang Liu, Wentao Zhao, Dongxu Wang, Siqi Wang:
BEBP: An Poisoning Method Against Machine Learning Based IDSs. CoRR abs/1803.03965 (2018) - 2017
- [j16]En Zhu, Qiang Liu, Jianping Yin:
Coupled Multiple Kernel Learning for Supervised Classification. Comput. Informatics 36(3): 618-636 (2017) - [j15]Yongkai Ye, Xinwang Liu, Qiang Liu, Jianping Yin:
Consensus Kernel K-Means Clustering for Incomplete Multiview Data. Comput. Intell. Neurosci. 2017: 3961718:1-3961718:11 (2017) - [j14]Haoyang Zhu, Peidong Zhu, Xiaoyong Li, Qiang Liu, Peng Xun:
Parallelization of group-based skyline computation for multi-core processors. Concurr. Comput. Pract. Exp. 29(18) (2017) - [j13]Haoyang Zhu, Peidong Zhu, Xiaoyong Li, Qiang Liu, Peng Xun:
Parallelization of skyline probability computation over uncertain preferences. Concurr. Comput. Pract. Exp. 29(18) (2017) - [j12]Lili Zhao, Kuan Li, Jianping Yin, Qiang Liu, Siqi Wang:
Complete three-phase detection framework for identifying abnormal cervical cells. IET Image Process. 11(4): 258-265 (2017) - [j11]Lihuan Yuan, Qiang Liu, Mengchi Lu, Sihang Zhou, Chengzhang Zhu, Jianping Yin:
A highly efficient human activity classification method using mobile data from wearable sensors. Int. J. Sens. Networks 25(2): 86-92 (2017) - [j10]Xiping Hu, Jun Cheng, Xitong Li, Wei Tan, Qiang Liu, Zhengguo Sheng:
Mobile Cyber-Physical System. Mob. Inf. Syst. 2017: 4970290:1-4970290:2 (2017) - [j9]Siqi Wang, Qiang Liu, En Zhu, Jianping Yin, Wentao Zhao:
MST-GEN: An Efficient Parameter Selection Method for One-Class Extreme Learning Machine. IEEE Trans. Cybern. 47(10): 3266-3279 (2017) - [c25]Qiang Liu, Wentao Zhao, Dan Liu, Jiao Ji:
Evaluation of situational case-based teaching technique in engineering education. ACM TUR-C 2017: 11:1-11:7 - [c24]Haoyang Zhu, Peidong Zhu, Xiaoyong Li, Qiang Liu:
Computing skyline groups: an experimental evaluation. ACM TUR-C 2017: 48:1-48:6 - [c23]Mao Wang, Yuewei Ming, Qiang Liu, Jianping Yin:
Similarity search for image retrieval via local-constrained linear coding. CISP-BMEI 2017: 1-6 - [c22]Haoyang Zhu, Peidong Zhu, Xiaoyong Li, Qiang Liu:
Top-k Skyline Groups Queries. EDBT 2017: 442-445 - [c21]Jianglong Song, Chengzhang Zhu, Wentao Zhao, Wenjie Liu, Qiang Liu:
Model-Aware Representation Learning for Categorical Data with Hierarchical Couplings. ICANN (2) 2017: 242-249 - [c20]Yan Liu, Wentao Zhao, Qiang Liu, Linyuan Yu, Dongxu Wang:
HL-HAR: Hierarchical Learning Based Human Activity Recognition in Wearable Computing. ICCCS (2) 2017: 684-693 - [c19]Mao Wang, Yuewei Ming, Qiang Liu, Jianping Yin:
Fusion of Global and Local Deep Representation for Effective Object Retrieval. NCTCS 2017: 31-45 - [c18]Jingming Xue, Lu Huang, Qiang Liu, Jianping Yin:
A Bi-directional Evolution Algorithm for Financial Recommendation Model. NCTCS 2017: 341-354 - [c17]Mao Wang, Qiang Liu, Yuewei Ming, Jianping Yin:
Group Burstiness Weighting for Image Retrieval. PCM (2) 2017: 244-253 - [c16]Mao Wang, Yuewei Ming, Qiang Liu, Jianping Yin:
Image-Based Video Retrieval Using Deep Feature. SMARTCOMP 2017: 1-6 - [c15]Dongxu Wang, Qiang Liu, Huikang Yi, Han Han, Wentao Zhao, Tiejun Wu:
A Practical Data Forwarding Path Selecting Method for Software-Defined 5G Networking. WCNC 2017: 1-6 - [i1]Qiang Liu, Yuxiao Zhu, Yan Jia, Lu Deng, Bin Zhou, Junxing Zhu, Peng Zou:
Leveraging local h-index to identify and rank influential spreaders in networks. CoRR abs/1708.09532 (2017) - 2016
- [j8]Jiarun Lin, Changwang Zhang, Zhiping Cai, Qiang Liu, Jianping Yin:
A TCP-friendly AQM algorithm to mitigate low-rate DDoS attacks. Int. J. Auton. Adapt. Commun. Syst. 9(1/2): 149-163 (2016) - [j7]Qiang Liu, Sihang Zhou, Chengzhang Zhu, Xinwang Liu, Jianping Yin:
MI-ELM: Highly efficient multi-instance learning based on hierarchical extreme learning machine. Neurocomputing 173: 1044-1053 (2016) - [j6]Sihang Zhou, Xinwang Liu, Qiang Liu, Siqi Wang, Chengzhang Zhu, Jianping Yin:
Random Fourier extreme learning machine with ℓ2, 1-norm regularization. Neurocomputing 174: 143-153 (2016) - [j5]Qiang Liu, Jianping Yin, Victor C. M. Leung, Jun-Hai Zhai, Zhiping Cai, Jiarun Lin:
Applying a new localized generalization error model to design neural networks trained with extreme learning machine. Neural Comput. Appl. 27(1): 59-66 (2016) - [j4]Qiang Liu, Xiping Hu, Edith C. H. Ngai, Min Liang, Victor C. M. Leung, Zhiping Cai, Jianping Yin:
A security patch addressing bandwidth request vulnerabilities in the IEEE 802.16 standard. IEEE Netw. 30(5): 26-34 (2016) - [c14]Xiaolei Fu, Ming Gao, Qiang Liu, Hongmei Liu:
Group Detection for Specific Topic on Micro-Blog. IEEE WISA 2016: 134-137 - [c13]Lu Deng, Jiuming Huang, Yi Han, Bin Zhou, Qiang Liu:
The Prediction of User Topic Interest Based on Tags and Interaction of Users. DSC 2016: 20-26 - [c12]Qiang Liu, Lu Deng, Junxing Zhu, Fenglan Li, Bin Zhou, Peng Zou:
A Novel Method of Influence Ranking via Node Degree and H-index for Community Detection. WAIM Workshops 2016: 149-160 - [c11]Fenglan Li, Anming Ji, Songchang Jin, Shuqiang Yang, Qiang Liu:
Collaborative Partitioning for Multiple Social Networks with Anchor Nodes. WAIM (1) 2016: 353-364 - 2015
- [c10]Qiang Liu, Edith C. H. Ngai, Xiping Hu, Zhengguo Sheng, Victor C. M. Leung, Jianping Yin:
SH-CRAN: Hierarchical Framework to Support Mobile Big Data Computing in a Secure Manner. Mobidata@MobiHoc 2015: 19-24 - [c9]Qiang Liu, Chengzhang Zhu, Xiping Hu, Wentao Zhao:
CIS: Community-based information sharing mechanism for automotive IoT. WF-IoT 2015: 138-142 - 2014
- [c8]Sihang Zhou, Xinwang Liu, Chengzhang Zhu, Qiang Liu, Jianping Yin:
Spectral clustering-based local and global structure preservation for feature selection. IJCNN 2014: 550-557 - [c7]Chengzhang Zhu, Xinwang Liu, Sihang Zhou, Qiang Liu, Jianping Yin:
A binary feature selection framework in kernel spaces. IJCNN 2014: 4190-4197 - 2013
- [j3]Erik Cambria, Guang-Bin Huang, Liyanaarachchi Lekamalage Chamara Kasun, Hongming Zhou, Chi-Man Vong, Jiarun Lin, Jianping Yin, Zhiping Cai, Qiang Liu, Kuan Li, Victor C. M. Leung, Liang Feng, Yew-Soon Ong, Meng-Hiot Lim, Anton Akusok, Amaury Lendasse, Francesco Corona, Rui Nian, Yoan Miche, Paolo Gastaldo, Rodolfo Zunino, Sergio Decherchi, Xuefeng Yang, Kezhi Mao, Beom-Seok Oh, Je-Hyoung Jeon, Kar-Ann Toh, Andrew Beng Jin Teoh, Jaihie Kim, Hanchao Yu, Yiqiang Chen, Junfa Liu:
Extreme Learning Machines. IEEE Intell. Syst. 28(6): 30-59 (2013) - [j2]Qiang Liu, Jianping Yin, Victor C. M. Leung, Zhiping Cai:
FADE: Forwarding Assessment Based Detection of Collaborative Grey Hole Attacks in WMNs. IEEE Trans. Wirel. Commun. 12(10): 5124-5137 (2013) - [c6]Hasen Nicanfar, Qiang Liu, Peyman TalebiFard, Wei Cai, Victor C. M. Leung:
Community Cloud: Concept, Model, Attacks and Solution. CloudCom (2) 2013: 126-131 - [c5]Qiang Liu, Jianping Yin, Shui Yu:
A Bio-inspired Jamming Detection and Restoration for WMNs: In View of Adaptive Immunology. CSS 2013: 243-257 - [c4]Qiang Liu, Jianping Yin, Paria Jokar, Xiping Hu:
Enhanced detection and restoration of low-rate denial-of-service in wireless multi-hop networks. ICNC 2013: 195-199 - [c3]Xiping Hu, Qiang Liu, Chunsheng Zhu, Victor C. M. Leung, Terry H. S. Chu, Henry C. B. Chan:
A mobile crowdsensing system enhanced by cloud-based social networking services. MCS@Middleware 2013: 3:1-3:6 - 2012
- [j1]Qiang Liu, Jianping Yin, Victor C. M. Leung, Zhiping Cai:
ISAR: Improved Situation-Aware Routing Method for Wireless Mesh Backbones. IEEE Commun. Lett. 16(9): 1404-1407 (2012) - 2010
- [c2]Zhiping Cai, Fang Liu, Nong Xiao, Qiang Liu, Zhiying Wang:
Virtual Network Embedding for Evolving Networks. GLOBECOM 2010: 1-5 - [c1]Qiang Liu, Jianping Yin, Zhiping Cai, Ming Zhu:
A Novel Threat Assessment Method for DDoS Early Warning Using Network Vulnerability Analysis. NSS 2010: 70-74
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 20:17 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint