Chuanyi Liu

Orcid: 0000-0001-8237-8979

According to our database1, Chuanyi Liu authored at least 82 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Capacity Abuse Attack of Deep Learning Models Without Need of Label Encodings.
IEEE Trans. Artif. Intell., February, 2024

TopicAns: Topic-informed Architecture for Answer Recommendation on Technical Q&A Site.
ACM Trans. Softw. Eng. Methodol., January, 2024

First-principles Based 3D Virtual Simulation Testing for Discovering SOTIF Corner Cases of Autonomous Driving.
CoRR, 2024

FRBBM-Scheme: A Flexible Ratio Virtual Primary Key Generation Approach Based on Binary Matching.
Proceedings of the Intelligent Information Processing XII, 2024

ZO-AdaMU Optimizer: Adapting Perturbation by the Momentum and Uncertainty in Zeroth-Order Optimization.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Dynamically Relative Position Encoding-Based Transformer for Automatic Code Edit.
IEEE Trans. Reliab., September, 2023

VESC: a new variational autoencoder based model for anomaly detection.
Int. J. Mach. Learn. Cybern., March, 2023

HT-Fed-GAN: Federated Generative Model for Decentralized Tabular Data Synthesis.
Entropy, January, 2023

FIGAT: Accurately Classify Individual Crime Risks With Multi-Information Fusion.
IEEE Trans. Serv. Comput., 2023

State-of-the-art optical-based physical adversarial attacks for deep learning computer vision systems.
CoRR, 2023

LayerLog: Log sequence anomaly detection based on hierarchical semantics.
Appl. Soft Comput., 2023

Cross-Task Physical Adversarial Attack Against Lane Detection System Based on LED Illumination Modulation.
Proceedings of the Pattern Recognition and Computer Vision - 6th Chinese Conference, 2023

Once is Enough: A Light-Weight Cross-Attention for Fast Sentence Pair Modeling.
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023

2022
Taking Away Both Model and Data: Remember Training Data by Parameter Combinations.
IEEE Trans. Emerg. Top. Comput. Intell., 2022

Bi-TCCS: Trustworthy Cloud Collaboration Service Scheme Based on Bilateral Social Feedback.
IEEE Trans. Cloud Comput., 2022

Fed-DR-Filter: Using global data representation to reduce the impact of noisy labels on the performance of federated learning.
Future Gener. Comput. Syst., 2022

Fed-TDA: Federated Tabular Data Augmentation on Non-IID Data.
CoRR, 2022

Once is Enough: A Light-Weight Cross-Attention for Fast Sentence Pair Modeling.
CoRR, 2022

FBIPT: A New Robust Reversible Database Watermarking Technique Based on Position Tuples.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

Generative Data Augmentation for Non-IID Problem in Decentralized Clinical Machine Learning.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

Towards Privacy-Preserving Computation on Gene: Construct Covid-19 Phylogenetic Tree using Homomorphic Encryption.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

2021
ADET: anomaly detection in time series with linear time.
Int. J. Mach. Learn. Cybern., 2021

Node-Fusion: Topology-aware virtual network embedding algorithm for repeatable virtual network mapping over substrate nodes.
Concurr. Comput. Pract. Exp., 2021

Managing overloaded hosts for energy-efficiency in cloud data centers.
Clust. Comput., 2021

An efficient general black-box adversarial attack approach based on multi-objective optimization for high dimensional images.
Comput. Electr. Eng., 2021

Reconstruct Anomaly to Normal: Adversarially Learned and Latent Vector-Constrained Autoencoder for Time-Series Anomaly Detection.
Proceedings of the PRICAI 2021: Trends in Artificial Intelligence, 2021

FIGAT: Accurately Predict Individual Crime Risks with Multi-information Fusion.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

Sampled Data Debugging via Fuzzy C-Means.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

PRFP: Privacy-respecting and Accurate Device Fingerprint Identification.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

A Robust and Adaptive Watermarking Technique for Relational Database.
Proceedings of the Cyber Security - 18th China Annual Conference, 2021

2020
Scene text reading based cloud compliance access.
World Wide Web, 2020

An adaptive heuristic for managing energy consumption and overloaded hosts in a cloud data center.
Wirel. Networks, 2020

The Design of Fast Content-Defined Chunking for Data Deduplication Based Storage Systems.
IEEE Trans. Parallel Distributed Syst., 2020

Trustworthy Enhancement for Cloud Proxy based on Autonomic Computing.
IEEE Trans. Cloud Comput., 2020

Fast, Resource-Saving, and Anti-Collaborative Attack Trust Computing Scheme Based on Cross-Validation for Clustered Wireless Sensor Networks.
Sensors, 2020

Pixel re-representations for better classification of images.
Pattern Recognit. Lett., 2020

CloudDLP: Transparent and Scalable Data Sanitization for Browser-Based Cloud Storage.
IEEE Access, 2020

SecureMLDebugger: A Privacy-Preserving Machine Learning Debugging Tool.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

From One-hot Encoding to Privacy-preserving Synthetic Electronic Health Records Embedding.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

2019
Combining dissimilarity measures for image classification.
Pattern Recognit. Lett., 2019

Tilt Space: A Systematic Exploration of Mobile Tilt for Design Purpose.
Proceedings of the Human-Computer Interaction - INTERACT 2019, 2019

Out-of-Domain Characteristic Based Hierarchical Emulator Detection for Mobile.
Proceedings of the ICITEE-2019: 2nd International Conference on Information Technologies and Electrical Engineering, 2019

An Adversarial Attack Based on Multi-objective Optimization in the Black-Box Scenario: MOEA-APGA II.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

Smart-Scrolling: Improving Information Access Performance in Linear Layout Views for Small-Screen Devices.
Proceedings of the Intelligent Computing Theories and Application, 2019

Tilt-Scrolling: A Comparative Study of Scrolling Techniques for Mobile Devices.
Proceedings of the Intelligent Computing Methodologies - 15th International Conference, 2019

CloudDLP: Transparent and Automatic Data Sanitization for Browser-Based Cloud Storage.
Proceedings of the 28th International Conference on Computer Communication and Networks, 2019

Deep Learning Based Scene Text Reading for Cloud Audit Information Extraction.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

VMRe: A Reverse Framework of Virtual Machine Protection Packed Binaries.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

FileCrypt: Transparent and Scalable Protection of Sensitive Data in Browser-based Cloud Storage.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
IDCrypt: A Multi-User Searchable Symmetric Encryption Scheme for Cloud Applications.
IEEE Access, 2018

Leakage Models and Inference Attacks on Searchable Encryption for Cyber-Physical Social Systems.
IEEE Access, 2018

Linking Source Code to Untangled Change Intents.
Proceedings of the 2018 IEEE International Conference on Software Maintenance and Evolution, 2018

Natural and Fluid 3D Operations with Multiple Input Channels of a Digital Pen.
Proceedings of the Intelligent Computing Methodologies - 14th International Conference, 2018

Find the 'Lost' Cursor: A Comparative Experiment of Visually Enhanced Cursor Techniques.
Proceedings of the Intelligent Computing Theories and Application, 2018

Automatically Crawling Dynamic Web Applications via Proxy-Based JavaScript Injection and Runtime Analysis.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

2017
SafeBox: A scheme for searching and sharing encrypted data in cloud applications.
Proceedings of the International Conference on Security, Pattern Analysis, and Cybernetics, 2017

Query Recovery Attacks on Searchable Encryption Based on Partial Knowledge.
Proceedings of the Security and Privacy in Communication Networks, 2017

A Cloud Access Security Broker based approach for encrypted data search and sharing.
Proceedings of the 2017 International Conference on Computing, 2017

2016
Revisiting the Practicality of Search on Encrypted Data: From the Security Broker's Perspective.
Sci. Program., 2016

Reusing the Results of Queries in MapReduce Systems by Adopting Shared Storage.
IEICE Trans. Commun., 2016

Predicting Virtual Machine's Power via a RBF Neural Network.
Proceedings of the Advances in Swarm Intelligence, 7th International Conference, 2016

2015
Efficient Data Possession Auditing for Real-World Cloud Storage Environments.
IEICE Trans. Inf. Syst., 2015

2014
An Accident Severity Classification Model Based on Multi-Objective Particle Swarm Optimization.
IEICE Trans. Inf. Syst., 2014

Fast Recovery and Low Cost Coexist: When Continuous Data Protection Meets the Cloud.
IEICE Trans. Inf. Syst., 2014

Sentinel: In Case of the Untrustworthy Behaviors Inside the Clouds.
Proceedings of the Trustworthy Computing and Services - International Conference, 2014

POSTER: TraceVirt: A Framework for Detecting the Non-tampering Attacks in the Virtual Machine.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Detecting the run time attacks in the cloud with an evidence collection based approach.
Proceedings of the IEEE 3rd International Conference on Cloud Computing and Intelligence Systems, 2014

2013
Improving Cache Partitioning Algorithms for Pseudo-LRU Policies.
IEICE Trans. Inf. Syst., 2013

T-YUN: Trustworthiness Verification and Audit on the Cloud Providers.
IEICE Trans. Inf. Syst., 2013

Transparency and Semantics Coexist: When Malware Analysis Meets the Hardware Assisted Virtualization.
Proceedings of the Trustworthy Computing and Services, 2013

Effectively auditing IaaS cloud servers.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
A practical coverage algorithm for wireless sensor networks in real terrain surface.
Int. J. Wirel. Mob. Comput., 2012

DISWOP: A Novel Scheduling Algorithm for Data-Intensive Workflow Optimizations.
IEICE Trans. Inf. Syst., 2012

An Improved Design of the Trustworthiness Authentication Mechanism of IaaS.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

Policy-Based De-duplication in Secure Cloud Storage.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

An Implementation of Trusted Remote Attestation Oriented the IaaSCloud.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

2009
Making Pen-Based Operation More Seamless and Continuous.
Proceedings of the Human-Computer Interaction, 2009

R-ADMAD: high reliability provision for large-scale de-duplication archival storage systems.
Proceedings of the 23rd international conference on Supercomputing, 2009

A Novel Optimization Method to Improve De-duplication Storage System Performance.
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009

2008
A Comparative Evaluation of Mode Switching Techniques.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2008

QoS Scheduling for Networked Storage System.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

Semantic Data De-duplication for archival storage systems.
Proceedings of the 13th Asia-Pacific Computer Systems Architecture Conference, 2008


  Loading...