Hongyu Liu

According to our database1, Hongyu Liu authored at least 55 papers between 2004 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


On csauthors.net:


CNN and RNN based payload classification methods for attack detection.
Knowl.-Based Syst., 2019

CSOD: Context-Sensitive Overflow Detection.
Proceedings of the IEEE/ACM International Symposium on Code Generation and Optimization, 2019

On Localizing and Concentrating Electromagnetic Fields.
SIAM Journal of Applied Mathematics, 2018

Guarder: A Tunable Secure Allocator.
Proceedings of the 27th USENIX Security Symposium, 2018

iReplayer: in-situ and identical record-and-replay for multithreaded applications.
Proceedings of the 39th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2018

Sampler: PMU-Based Sampling to Detect Memory Errors Latent in Production Software.
Proceedings of the 51st Annual IEEE/ACM International Symposium on Microarchitecture, 2018

On Electromagnetic Scattering from a Penetrable Corner.
SIAM J. Math. Analysis, 2017

Identity-based provable data possession revisited: Security analysis and generic construction.
Computer Standards & Interfaces, 2017

UNDEAD: detecting and preventing deadlocks in production software.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

Cloud Data Integrity Checking with Deduplication for Confidential Data Storage.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

ECNU at 2017 eHealth Task 2: Technologically Assisted Reviews in Empirical Medicine.
Proceedings of the Working Notes of CLEF 2017, 2017

FreeGuard: A Faster Secure Heap Allocator.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

On Anomalous Localized Resonance for the Elastostatic System.
SIAM J. Math. Analysis, 2016

Mathematical Design of a Novel Gesture-Based Instruction/Input Device Using Wave Detection.
SIAM J. Imaging Sciences, 2016

Plasmon Resonance with Finite Frequencies: a Validation of the Quasi-static Approximation for Diametrically Small Inclusions.
SIAM Journal of Applied Mathematics, 2016

A time domain sampling method for inverse acoustic scattering problems.
J. Comput. Physics, 2016

Influence of third-order dispersion on the compressibility of output pulses from giant chirp oscillators.
Proceedings of the 25th Wireless and Optical Communication Conference, 2016

ECNU at TREC 2016: Web-based query expansion and experts diagnosis in Medical Information Retrieval.
Proceedings of The Twenty-Fifth Text REtrieval Conference, 2016

ECNU at 2016 eHealth Task 3: Patient-centred Information Retrieval.
Proceedings of the Working Notes of CLEF 2016, 2016

ECNU at 2016 eHealth Task 1: Handover Information Extraction.
Proceedings of the Working Notes of CLEF 2016, 2016

On Quasi-Static Cloaking Due to Anomalous Localized Resonance in ℝ3.
SIAM Journal of Applied Mathematics, 2015

Insecurity of an Efficient Privacy-preserving Public Auditing Scheme for Cloud Data Storage.
J. UCS, 2015

Remote data possession checking with enhanced security for cloud storage.
Future Generation Comp. Syst., 2015

Provably Secure Identity Based Provable Data Possession.
Proceedings of the Provable Security, 2015

Inverse Elastic Scattering for Multiscale Rigid Bodies with a Single Far-Field Pattern.
SIAM J. Imaging Sciences, 2014

Nearly Cloaking the Electromagnetic Fields.
SIAM Journal of Applied Mathematics, 2014

Industrial Wastewater Discharge Retrieval Based on Stable Nighttime Light Imagery in China from 1992 to 2010.
Remote Sensing, 2014

Locating Multiple Multiscale Acoustic Scatterers.
Multiscale Modeling & Simulation, 2014

Enhanced multilevel linear sampling methods for inverse scattering problems.
J. Comput. Physics, 2014

Ground detection by a single electromagnetic far-field measurement.
J. Comput. Physics, 2014

Improved security of a dynamic remote data possession checking protocol for cloud storage.
Expert Syst. Appl., 2014

Locating Multiple Multiscale Electromagnetic Scatterers by a Single Far-Field Measurement.
SIAM J. Imaging Sciences, 2013

Two Single-Shot Methods for Locating Multiple Electromagnetic Scatterers.
SIAM Journal of Applied Mathematics, 2013

Probabilistic Models for Focused Web Crawling.
Computational Intelligence, 2012

On Approximate Electromagnetic Cloaking by Transformation Media.
SIAM Journal of Applied Mathematics, 2011

Preservation of stability properties near fixed points of linear Hamiltonian systems by symplectic integrators.
Applied Mathematics and Computation, 2011

Privacy Measures for Free Text Documents: Bridging the Gap between Theory and Practice.
Proceedings of the Trust, Privacy and Security in Digital Business, 2011

On Acoustic Cloaking Devices by Transformation Media and Their Simulation.
SIAM Journal of Applied Mathematics, 2010

A new perspective of privacy protection: Unique distinct l-SR diversity.
Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010

Strengthened Linear Sampling Method with a Reference Ball.
SIAM J. Scientific Computing, 2009

Learner Strategies on EFL E-learning Platform: An Empirical Study.
Proceedings of the Fifth International Conference on Semantics, Knowledge and Grid, 2009

Discovering Structured Event Logs from Unstructured Audit Trails for Workflow Mining.
Proceedings of the Foundations of Intelligent Systems, 18th International Symposium, 2009

A machine learning approach to identifying process instance and activity.
Proceedings of the IADIS International Conference Applied Computing 2009, 2009

Automatic Detecting Documents Containing Personal Health Information.
Proceedings of the Artificial Intelligence in Medicine, 2009

Multilevel Linear Sampling Method for Inverse Scattering Problems.
SIAM J. Scientific Computing, 2008

Exploiting Multiple Features with MEMMs for Focused Web Crawling.
Proceedings of the Natural Language and Information Systems, 2008

Private Data Discovery for Privacy Compliance in Collaborative Environments.
Proceedings of the Cooperative Design, 2008

Using Data Mining Methods to Predict Personally Identifiable Information in Emails.
Proceedings of the Advanced Data Mining and Applications, 4th International Conference, 2008

An Efficient Multilevel Algorithm for Inverse Scattering Problem.
Proceedings of the Advances in Computation and Intelligence, 2007

The multi-symplecticity of partitioned Runge-Kutta methods for Hamiltonian PDEs.
Math. Comput., 2006

Using HMM to learn user browsing patterns for focused Web crawling.
Data Knowl. Eng., 2006

Efficient symplectic Runge-Kutta methods.
Applied Mathematics and Computation, 2006

Implicit Runge-Kutta methods based on Lobatto quadrature formula.
Int. J. Comput. Math., 2005

Probabilistic models for focused web crawling.
Proceedings of the Sixth ACM CIKM International Workshop on Web Information and Data Management (WIDM 2004), 2004

Focused Crawling by Learning HMM from User's Topic-specific Browsing.
Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2004), 2004