Dongjie Liu

Orcid: 0000-0001-9969-3318

According to our database1, Dongjie Liu authored at least 30 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A CNN-Based SIA Screenshot Method to Visually Identify Phishing Websites.
J. Netw. Syst. Manag., March, 2024

2023
Novel empty train return strategy and passenger control strategy to satisfy asymmetric passenger demand: A joint optimization with train timetabling.
Comput. Ind. Eng., July, 2023

Toward 6G $\text{TK}\mu$ Extreme Connectivity: Architecture, Key Technologies and Experiments.
IEEE Wirel. Commun., June, 2023

Experimental Performance Evaluation of Cell-Free Massive MIMO Systems Using COTS RRU With OTA Reciprocity Calibration and Phase Synchronization.
IEEE J. Sel. Areas Commun., June, 2023

Service Delay Minimization for Federated Learning Over Mobile Devices.
IEEE J. Sel. Areas Commun., April, 2023

Full-spectrum cell-free RAN for 6G systems: system design and experimental results.
Sci. China Inf. Sci., March, 2023

From ORAN to Cell-Free RAN: Architecture, Performance Analysis, Testbeds and Trials.
CoRR, 2023

2022
Seeing Traffic Paths: Encrypted Traffic Classification With Path Signature Features.
IEEE Trans. Inf. Forensics Secur., 2022

Two-point generalized Hermite interpolation: Double-weight function and functional recursion methods for solving nonlinear equations.
Math. Comput. Simul., 2022

CFLedger: Preventing chargeback fraud with blockchain.
ICT Express, 2022

Multi-scale semantic deep fusion models for phishing website detection.
Expert Syst. Appl., 2022

Downlink transmission and channel estimation for cell-free massive MIMO-OFDM with DSDs.
EURASIP J. Adv. Signal Process., 2022

Toward 6G TKμ Extreme Connectivity: Architecture, Key Technologies and Experiments.
CoRR, 2022

On an adaptive FEM-BEM for nonlinear transmission problem.
Appl. Math. Lett., 2022

A General Downlink Frequency-domain ICIC Framework for Next-generation RAN.
Proceedings of the IEEE Globecom 2022 Workshops, 2022

2021
An efficient multistage phishing website detection model based on the CASE feature framework: Aiming at the real web environment.
Comput. Secur., 2021

An Abused Webpage Detection Method Based on Screenshots Text Recognition.
Proceedings of the ACM ICEA '21: 2021 ACM International Conference on Intelligent Computing and its Emerging Applications, Jinan, China, December 28, 2021

2020
CNN Based Malicious Website Detection by Invalidating Multiple Web Spams.
IEEE Access, 2020

Automated detection of atrial fibrillation based on DenseNet using ECG signals.
Proceedings of the ISAIMS 2020: International Symposium on Artificial Intelligence in Medical Sciences, 2020

2019
Convergence of \(\text{ dG(1) }\) in elastoplastic evolution.
Numerische Mathematik, 2019

An Efficient Antiphishing Method to Secure eConsume.
IEEE Consumer Electron. Mag., 2019

PhishLedger: A Decentralized Phishing Data Sharing Mechanism.
Proceedings of the 2019 International Electronics Communication Conference, 2019

2018
Optimal shape parameter in the MQ-RBF by minimizing an energy gap functional.
Appl. Math. Lett., 2018

2017
Stabilized FEM for Some Optimal Design Problem.
J. Sci. Comput., 2017

The adaptive composite trapezoidal rule for Hadamard finite-part integrals on an interval.
J. Comput. Appl. Math., 2017

Solving a singular beam equation by using a weak-form integral equation method.
Appl. Math. Lett., 2017

2015
Nonconforming FEMs for an Optimal Design Problem.
SIAM J. Numer. Anal., 2015

2013
A collocation scheme for a certain Cauchy singular integral equation based on the superconvergence analysis.
Appl. Math. Comput., 2013

2010
The superconvergence of the Newton-Cotes rule for Cauchy principal value integrals.
J. Comput. Appl. Math., 2010

2009
Solution of exterior problem using ellipsoidal artificial boundary.
J. Comput. Appl. Math., 2009


  Loading...