Guangjie Liu
Orcid: 0000-0003-4729-7406Affiliations:
- Nanjing University of Information Science and Technology, School of Electronics and Information Engineering, China
- University of California at Davis (UCD), Department of Computer Science, CA, USA (2016-2017)
- Nanjing University of Science and Technology, China (PhD 2007)
According to our database1,
Guangjie Liu
authored at least 86 papers
between 2005 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Lightweight Identification of Malicious IoT Traffic via Cross-View Knowledge Distillation.
IEEE Internet Things J., October, 2025
IEEE Internet Things J., June, 2025
IEEE Trans. Veh. Technol., May, 2025
WF-A2D: Enhancing Privacy With Asymmetric Adversarial Defense Against Website Fingerprinting.
IEEE Trans. Inf. Forensics Secur., 2025
IEEE Trans. Inf. Forensics Secur., 2025
QuicCourier: Leveraging the Dynamics of QUIC- Based Website Browsing Behaviors Through Proxy for Covert Communication.
IEEE Trans. Dependable Secur. Comput., 2025
Investigating the impact of feature selection on adversarial transferability in intrusion detection system.
Comput. Secur., 2025
IoT-AMLHP: Aligned multimodal learning of header-payload representations for resource-efficient malicious IoT traffic classification.
Ad Hoc Networks, 2025
2024
UAV-Enabled Communication Strategy Against Detection in Covert Communication With Asymmetric Information.
IEEE Trans. Wirel. Commun., July, 2024
IEEE Trans. Cogn. Commun. Netw., June, 2024
M2VT-IDS: A multi-task multi-view learning architecture for designing IoT intrusion detection system.
Internet Things, April, 2024
Optimal Position Design for Unmanned Aerial Vehicle Relay-Assisted Covert Communication Based on Active Countermeasures.
IEEE Syst. J., March, 2024
Short-Term Passenger Flow Prediction in Urban Rail Transit Based on Points of Interest.
IEEE Access, 2024
Proceedings of the 2024 4th International Conference on Big Data, 2024
Proceedings of the International Conference on Computer Vision and Deep Learning, 2024
2023
A UAV-Assisted Secure Communication System by Jointly Optimizing Transmit Power and Trajectory in the Internet of Things.
IEEE Trans. Green Commun. Netw., December, 2023
Energy Consumption Minimization in Unmanned Aerial Vehicle-Enabled Secure Wireless Sensor Networks.
Sensors, December, 2023
IEEE Trans. Veh. Technol., June, 2023
A deep learning-based framework to identify and characterise heterogeneous secure network traffic.
IET Inf. Secur., March, 2023
IEEE Trans. Inf. Forensics Secur., 2023
2022
J. Inf. Secur. Appl., 2022
2021
Contract-Based Incentive Mechanisms for Honeypot Defense in Advanced Metering Infrastructure.
IEEE Trans. Smart Grid, 2021
Detecting Multielement Algorithmically Generated Domain Names Based on Adaptive Embedding Model.
Secur. Commun. Networks, 2021
Secur. Commun. Networks, 2021
Optimal attack strategy selection of an autonomous cyber-physical micro-grid based on attack-defense game model.
J. Ambient Intell. Humaniz. Comput., 2021
J. Inf. Secur. Appl., 2021
Honeypot Detection Strategy Against Advanced Persistent Threats in Industrial Internet of Things: A Prospect Theoretic Game.
IEEE Internet Things J., 2021
Int. J. Digit. Crime Forensics, 2021
Comput. Commun., 2021
IEEE Access, 2021
Application Behavior Identification in DNS Tunnels Based on Spatial-Temporal Information.
IEEE Access, 2021
2020
KSII Trans. Internet Inf. Syst., 2020
Detecting Stealthy Domain Generation Algorithms Using Heterogeneous Deep Neural Network Framework.
IEEE Access, 2020
Prospect Theoretic Study of Honeypot Defense Against Advanced Persistent Threats in Power Grid.
IEEE Access, 2020
Mimicking Ship-Radiated Noise With Chaos Signal for Covert Underwater Acoustic Communication.
IEEE Access, 2020
2019
Symmetry, 2019
Multim. Tools Appl., 2019
KSII Trans. Internet Inf. Syst., 2019
2018
Using Insider Swapping of Time Intervals to Perform Highly Invisible Network Flow Watermarking.
Secur. Commun. Networks, 2018
Secur. Commun. Networks, 2018
Sound Texture Generative Model Guided by a Lossless Mel-Frequency Convolutional Neural Network.
IEEE Access, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
2017
Proceedings of the Cloud Computing and Security - Third International Conference, 2017
2016
Designing Analog Fountain Timing Channels: Undetectability, Robustness, and Model-Adaptation.
IEEE Trans. Inf. Forensics Secur., 2016
Secur. Commun. Networks, 2016
Matrix embedding in multicast steganography: analysis in privacy, security and immediacy.
Secur. Commun. Networks, 2016
Novel Covert Timing Channels Implemented over Multiple Flows by Using Space-Time Trellis Codes.
J. Inf. Hiding Multim. Signal Process., 2016
Detection and Parameter Estimation for Jitterbug Covert Channel Based on Coefficient of Variation.
KSII Trans. Internet Inf. Syst., 2016
Proceedings of the Cloud Computing and Security - Second International Conference, 2016
2015
Damage-resistance matrix embedding framework: the contradiction between robustness and embedding efficiency.
Secur. Commun. Networks, 2015
基于信任的反馈云模型WSN节点信任评价机制 (Trust Evaluation Mechanism for Nodes Based on Adaptive Cloud Model in Wireless Sensor Network).
计算机科学, 2015
基于Snort的Modbus TCP工控协议异常数据检测规则设计 (Design of Modbus TCP Industrial Control Network Protocol Abnormal Data Detection Rules Based on Snort).
计算机科学, 2015
J. Inf. Hiding Multim. Signal Process., 2015
J. Inf. Hiding Multim. Signal Process., 2015
J. Inf. Hiding Multim. Signal Process., 2015
Proceedings of the 2015 International Conference on Control, 2015
2014
Authenticating topological integrity of process plant models through digital watermarking.
Multim. Tools Appl., 2014
Multim. Syst., 2014
J. Networks, 2014
J. Inf. Hiding Multim. Signal Process., 2014
Ann. des Télécommunications, 2014
2013
J. Networks, 2013
2012
2011
A passive image authentication scheme for detecting region-duplication forgery with rotation.
J. Netw. Comput. Appl., 2011
Int. J. Multim. Intell. Secur., 2011
2010
J. Multim., 2010
Copyright Protecting Using The Secure Visible Removable Watermarking In JPEG Compression.
J. Digit. Content Technol. its Appl., 2010
J. Convergence Inf. Technol., 2010
2009
2008
Signal Process., 2008
Multim. Tools Appl., 2008
J. Electronic Imaging, 2008
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008
Optimum Decoder for Barni's Multiplicative Watermarking Based on Minimum Bayesian Risk Criterion.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008
Assessment of Integrated Electronic Information System survivability based on u-function.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008
2007
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007
2006
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006
2005
Proceedings of the IEEE 7th Workshop on Multimedia Signal Processing, 2005
On Sequence Synchronization Analysis Against Chaos Based Spread Spectrum Image Steganography.
Proceedings of the Advances in Natural Computation, First International Conference, 2005