Bo Liu

Orcid: 0000-0002-9953-8438

Affiliations:
  • National University of Defense Technology, School of Computer Science, Changsha, China


According to our database1, Bo Liu authored at least 35 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A website fingerprinting technology with time-sampling.
Peer Peer Netw. Appl., March, 2024

2023
PsyLink: User Identity Linkage via Psychological Characteristic Modeling.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

2022
Efficient boolean SSE: A novel encrypted database (EDB) for biometric authentication.
Int. J. Intell. Syst., December, 2022

A Website Fingerprint defense technology with low delay and controllable bandwidth.
Comput. Commun., 2022

Jointly Learning Sentimental Clues and Context Incongruity for Sarcasm Detection.
IEEE Access, 2022

Sentiment-Aware Fake News Detection on Social Media with Hypergraph Attention Networks.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2022

Commonsense-Aware Sarcasm Detection with Heterogeneous Graph Attention Network.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2022

A General Personality Analysis Model Based on Social Posts and Links.
Proceedings of the PRICAI 2022: Trends in Artificial Intelligence, 2022

Your Voice is Not Yours? Black-Box Adversarial Attacks Against Speaker Recognition Systems.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2022

Joint Few-Shot Text Classification Aided by Label Semantic and Sentence-Aware Interaction.
Proceedings of the International Joint Conference on Neural Networks, 2022

Deep Attention-based Lightweight Network For Aerial Image Deblurring.
Proceedings of the 26th International Conference on Pattern Recognition, 2022

Prompt-Based Learning for Aspect-Level Sentiment Classification.
Proceedings of the Neural Information Processing - 29th International Conference, 2022

Sentence-aware Adversarial Meta-Learning for Few-Shot Text Classification.
Proceedings of the 29th International Conference on Computational Linguistics, 2022

A Scalable Covert Communication Service For Coworkers.
Proceedings of the 22nd IEEE International Symposium on Cluster, 2022

2021
A Survey of Android Malware Static Detection Technology Based on Machine Learning.
Mob. Inf. Syst., 2021

Sentiment-Aware Emoji Insertion Via Sequence Tagging.
IEEE Multim., 2021

CPMTD: Cyber-physical moving target defense for hardening the security of power system against false data injected attack.
Comput. Secur., 2021

Heterogeneous Graph Attention Network for User Geolocation.
Proceedings of the PRICAI 2021: Trends in Artificial Intelligence, 2021

An Android Malware Detection and Malicious Code Location Method Based on Graph Neural Network.
Proceedings of the MLMI 2021: The 4th International Conference on Machine Learning and Machine Intelligence, Hangzhou, China, September 17, 2021

Intrusion Detection System Based on RF-SVM Model Optimized with Feature Selection.
Proceedings of the International Conference on Communications, 2021

2020
PC-SAN: Pretraining-Based Contextual Self-Attention Model for Topic Essay Generation.
KSII Trans. Internet Inf. Syst., 2020

MVIIDroid: A Multiple View Information Integration Approach for Android Malware Detection and Family Identification.
IEEE Multim., 2020

UGAN: Unified Generative Adversarial Networks for Multidirectional Text Style Transfer.
IEEE Access, 2020

Efficient Boolean SSE: A Novel Encrypted Database (EDB).
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020

DexFus: An Android Obfuscation Technique Based on Dalvik Bytecode Translation.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020

2014
Detecting and Defending against Sybil Attacks in Social Networks: An Overview.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

2012
Further Analyzing the Sybil Attack in Mitigating Peer-to-Peer Botnets.
KSII Trans. Internet Inf. Syst., 2012

Design and Implementation of Facebook Crawler Based on Interaction Simulation.
Proceedings of the 11th IEEE International Conference on Trust, 2012

A Layered Malware Detection Model Using VMM.
Proceedings of the 11th IEEE International Conference on Trust, 2012

2011
Robustness of RED in Mitigating LDoS Attack.
KSII Trans. Internet Inf. Syst., 2011

Detecting Parasite P2P Botnet in eMule-like Networks through Quasi-periodicity Recognition.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011

2008
ASG Automated Signature Generation for Worm-Like P2P Traffic Patterns.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

A Novel Worm Detection Model Based on Host Packet Behavior Ranking.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008, 2008

Performance Analysis of the HLLACF.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

ALHACF: An Anonymity-Level Selected Hierarchical Anonymous Communication Framework.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008


  Loading...