Anyi Liu

Orcid: 0000-0002-6011-1998

According to our database1, Anyi Liu authored at least 29 papers between 2005 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Heterogeneous Generative Dataset for UASes.
Proceedings of the IEEE International Conference on Mobility, 2023

Net-GPT: A LLM-Empowered Man-in-the-Middle Chatbot for Unmanned Aerial Vehicle.
Proceedings of the IEEE/ACM Symposium on Edge Computing, 2023

2022
TEEm: A Tangle-based Elastic Emulator for Storing Connected Vehicle Data in a Distributed Ledger Technology.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

FineObfuscator: Defeating Reverse Engineering Attacks with Context-sensitive and Cost-efficient Obfuscation for Android Apps.
Proceedings of the 2022 IEEE International Conference on Electro Information Technology, 2022

2021
Iotverif: Automatic Verification of SSL/TLS Certificate for IoT Applications.
IEEE Access, 2021

2020
A new framework for privacy-preserving biometric-based remote user authentication.
J. Comput. Secur., 2020

2019
Supplementary Material for "LiveForen: Ensuring Live Forensic Integrity in the Cloud".
Dataset, January, 2019

<i>LiveForen</i>: Ensuring Live Forensic Integrity in the Cloud.
IEEE Trans. Inf. Forensics Secur., 2019

Confidential State Verification for the Delegated Cloud Jobs with Confidential Audit Log.
EAI Endorsed Trans. Security Safety, 2019

Global and Adaptive Contrast Enhancement for Low Illumination Gray Images.
IEEE Access, 2019

2018
H-Verifier: Verifying Confidential System State with Delegated Sandboxes.
Proceedings of the Science of Cyber Security - First International Conference, 2018

Fast Tamper Detection for Hierarchical Data in Live Cloud Forensics.
Proceedings of the 2018 IEEE International Conference on Electro/Information Technology, 2018

RanDroid: Structural Similarity Approach for Detecting Ransomware Applications in Android Platform.
Proceedings of the 2018 IEEE International Conference on Electro/Information Technology, 2018

Location Privacy Challenges in Spatial Crowdsourcing.
Proceedings of the 2018 IEEE International Conference on Electro/Information Technology, 2018

IoTVerif: An Automated Tool to Verify SSL/TLS Certificate Validation in Android MQTT Client Applications.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

DOPA: Detecting Open Ports in Android OS.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

Detection Sound Source Direction in 3D Space Using Convolutional Neural Networks.
Proceedings of the First International Conference on Artificial Intelligence for Industries, 2018

Genetic Algorithm Based Parallelization Planning for Legacy Real-Time Embedded Programs.
Proceedings of the First International Conference on Artificial Intelligence for Industries, 2018

2016
Teaching mobile computing and mobile security.
Proceedings of the 2016 IEEE Frontiers in Education Conference, 2016

Musical Instruments Simulation on Mobile Platform.
Proceedings of the Mobile Devices and Multimedia: Enabling Technologies, 2016

2014
Secure streaming forensic data transmission for trusted cloud.
Proceedings of the 2nd International Workshop on Security and Forensics in Communication Systems, 2014

2013
Real-Time Covert Timing Channel Detection in Networked Virtual Environments.
Proceedings of the Advances in Digital Forensics IX, 2013

2011
Development of a Secure Mobile GPS Tracking and Management System.
PhD thesis, 2011

Real-Time Detection of Covert Channels in Highly Virtualized Environments.
Proceedings of the Critical Infrastructure Protection V, 2011

Attacker behavior analysis in multi-stage attack detection system.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

2009
SQLProb: a proxy-based architecture towards preventing SQL injection attacks.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

2006
A fragile watermarking scheme for detecting malicious modifications of database relations.
Inf. Sci., 2006

Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts.
Comput. Commun., 2006

2005
An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts.
Proceedings of the Computer Security, 2005


  Loading...