Caiming Liu

Orcid: 0000-0002-1355-2619

According to our database1, Caiming Liu authored at least 35 papers between 2006 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Deep Transfer Network with Multi-Space Dynamic Distribution Adaptation for Bearing Fault Diagnosis.
Entropy, 2022

A Novel Deep Transfer Learning Method for Intelligent Fault Diagnosis Based on Variational Mode Decomposition and Efficient Channel Attention.
Entropy, 2022

Quantitative matching method for network traffic features.
Proceedings of the 18th International Conference on Computational Intelligence and Security, 2022

2021
An Immune Algorithm for Network Data Security Detection.
Proceedings of the 17th International Conference on Computational Intelligence and Security CIS 2021, 2021

An Intrusion Detection Model Combining Signature-Based Recognition and Two-Round Immune-Based Recognition.
Proceedings of the 17th International Conference on Computational Intelligence and Security CIS 2021, 2021

2020
Full Coverage Detection of Immune Detector for Public Data Set.
Proceedings of the 16th International Conference on Computational Intelligence and Security, 2020

2019
Architecture of Real-Time and Dynamic Audit for Network Behavior Security.
Proceedings of the Advances in Natural Computation, Fuzzy Systems and Knowledge Discovery - Proceedings of the 15th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD 2019), Kunming, China, July 20-22, 2019, 2019

2018
Efficient parallel algorithm for computing rough set approximation on GPU.
Soft Comput., 2018

Improved Implementation of Expectation Maximization Algorithm on Graphic Processing Unit.
Proceedings of the Chinese Lexical Semantics - 19th Workshop, 2018

2017
An Effective Solution to Nonlinear Bilevel Programming Problems Using Improved Particle Swarm Optimization Algorithm.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

An Efficient Algorithm for Parallel Computation of Rough Entropy Using CUDA.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

2015
Clonal Selection-Based Surveillance Algorithm for Transmission Control Protocol Anomaly Network Behavior.
Proceedings of the 11th International Conference on Semantics, Knowledge and Grids, 2015

Constructing an Emerging Semantic Supported Intelligence Learning Network for Web-Based Learning.
Proceedings of the 11th International Conference on Semantics, Knowledge and Grids, 2015

Effective lossless compression of fixed-length data.
Proceedings of the 12th International Conference on Fuzzy Systems and Knowledge Discovery, 2015

Immunity-Based Detection for Large-Scale Behavior of Denial of Service.
Proceedings of the 11th International Conference on Computational Intelligence and Security, 2015

Dynamic Defense Architecture for the Security of the Internet of Things.
Proceedings of the 11th International Conference on Computational Intelligence and Security, 2015

2013
Cloud Computing for Network Security Intrusion Detection System.
J. Networks, 2013

Artificial Immunity-based Security Response Model for the Internet of Things.
J. Comput., 2013

Artificial immunity-based anomaly detection of network user behavior.
Proceedings of the Ninth International Conference on Natural Computation, 2013

A real-time algorithm for fixed-length short data compression.
Proceedings of the 10th International Conference on Fuzzy Systems and Knowledge Discovery, 2013

A Novel Approach to IoT Security Based on Immunology.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

2012
Research on Dynamical Security Risk Assessment for the Internet of Things inspired by immunology.
Proceedings of the Eighth International Conference on Natural Computation, 2012

Efficient Detect Scheme of Botnet Command and Control Communication.
Proceedings of the Information Computing and Applications - Third International Conference, 2012

Real-Valued Negative Selection Algorithm with Variable-Sized Self Radius.
Proceedings of the Information Computing and Applications - Third International Conference, 2012

Network Security Evaluation Model Based on Cloud Computing.
Proceedings of the Information Computing and Applications - Third International Conference, 2012

An Architecture for Cloud Computing and Human Immunity Based Network Intrusion Detection.
Proceedings of the Artificial Intelligence and Computational Intelligence, 2012

2011
Research on immunity-based intrusion detection technology for the Internet of Things.
Proceedings of the Seventh International Conference on Natural Computation, 2011

A Distributed Surveillance Model for Network Security Inspired by Immunology.
Proceedings of the Artificial Intelligence and Computational Intelligence, 2011

2007
A Computer Forensics Model Based On Danger Theory.
Proceedings of the Workshop on Intelligent Information Technology Application, 2007

A Feedback Negative Selection Algorithm to Anomaly Detection.
Proceedings of the Third International Conference on Natural Computation, 2007

Dynamical Network Forensics Based on Immune Agent.
Proceedings of the Third International Conference on Natural Computation, 2007

A Supervised Classifier Based on Artificial Immune System.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

Artificial Immunity-Based Discovery for Popular Information in WEB Pages.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

Exploration of Network Security Information Hid in Web Pages Based on Immunology.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

2006
An Immune-Based Model for Service Survivability.
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006


  Loading...