Jiayang Liu

Orcid: 0000-0003-2018-8509

According to our database1, Jiayang Liu authored at least 42 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Predictive Temporal Attention on Event-based Video Stream for Energy-efficient Situation Awareness.
CoRR, 2024

2023
Pinning Stabilizer Design for Probabilistic Boolean Control Networks via Condensation Digraph.
IEEE Trans. Neural Networks Learn. Syst., December, 2023

Incipient fault detection of planetary gearbox under steady and varying condition.
Expert Syst. Appl., December, 2023

Condition monitoring of wind turbines with the implementation of spatio-temporal graph neural network.
Eng. Appl. Artif. Intell., May, 2023

Condition Monitoring of Wind Turbines With Implementation of Interactive Spatio-Temporal Deep Learning Networks.
IEEE Trans. Instrum. Meas., 2023

Unauthorized AI cannot recognize me: Reversible adversarial example.
Pattern Recognit., 2023

Wind turbine fault detection based on deep residual networks.
Expert Syst. Appl., 2023

Improving Adversarial Transferability by Stable Diffusion.
CoRR, 2023

DeNoL: A Few-Shot-Sample-Based Decoupling Noise Layer for Cross-channel Watermarking Robustness.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Hybrid Map-Based Path Planning for Robot Navigation in Unstructured Environments.
IROS, 2023

Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

2022
Robustness enhancement against adversarial steganography via steganalyzer outputs.
J. Inf. Secur. Appl., 2022

A motional but temporally consistent physical video examples.
J. Inf. Secur. Appl., 2022

A Local Planner Based on Environmental Geometric Features for Rescue Robots.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2022

MBH-Net: Multi-branch Hybrid Network with Auxiliary Attention Guidance for Large Vessel Occlusion Detection.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2022

CCA4CTA: A Hybrid Attention Mechanism based Convolutional Network for Analysing Collateral Circulation via Multi-phase Cranial CTA.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2022

2021
Full Encryption: An end to end encryption mechanism in GaussDB.
Proc. VLDB Endow., 2021

2020
Secure outsourcing of large matrix determinant computation.
Frontiers Comput. Sci., February, 2020

Sampled-Data State-Feedback Stabilization of Probabilistic Boolean Control Networks: A Control Lyapunov Function Approach.
IEEE Trans. Cybern., 2020

A Robot Hybrid Hierarchical Network for Sensing Environmental Variables of a Smart Grid.
Sensors, 2020

Research on flame location based on adaptive window and weight stereo matching algorithm.
Multim. Tools Appl., 2020

Robust Superpixel-Guided Attentional Adversarial Attack.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

2019
An Improved Attack on the Basic Merkle-Hellman Knapsack Cryptosystem.
IEEE Access, 2019

Ratel: Interactive Analytics for Large Scale Trajectories.
Proceedings of the 2019 International Conference on Management of Data, 2019

Using Distillation to Improve Network Performance after Pruning and Quantization.
Proceedings of the 2nd International Conference on Machine Learning and Machine Intelligence, 2019

Practical Scheme for Secure Outsourcing of Coppersmith's Algorithm.
Proceedings of the Knowledge Science, Engineering and Management, 2019

Secure Outsourcing of Lattice Basis Reduction.
Proceedings of the Neural Information Processing - 26th International Conference, 2019

Emerging applications of reversible data hiding.
Proceedings of the 2nd International Conference on Image and Graphics Processing, 2019

Detection Based Defense Against Adversarial Examples From the Steganalysis Point of View.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019

2018
Equivalent key attack against a public-key cryptosystem based on subset sum problem.
IET Inf. Secur., 2018

CAAD 2018: Iterative Ensemble Adversarial Attack.
CoRR, 2018

Reversible Adversarial Examples.
CoRR, 2018

Detecting Adversarial Examples Based on Steganalysis.
CoRR, 2018

Adversarial Examples Against Deep Neural Network based Steganalysis.
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018

Unsupervised Learning of Semantic Audio Representations.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

2016
Cryptanalysis of a Privacy Preserving Auditing for Data Integrity Protocol from TrustCom 2013.
Proceedings of the Information Security Practice and Experience, 2016

Cryptanalysis of a Homomorphic Encryption Scheme Over Integers.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

Cryptanalysis of a Fast Private Information Retrieval Protocol.
Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography, 2016

2009
uWave: Accelerometer-based personalized gesture recognition and its applications.
Pervasive Mob. Comput., 2009

uWave: Accelerometer-based Personalized Gesture Recognition and Its Applications.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

User evaluation of lightweight user authentication with a single tri-axis accelerometer.
Proceedings of the 11th Conference on Human-Computer Interaction with Mobile Devices and Services, 2009

2008
Micro power management of active 802.11 interfaces.
Proceedings of the 6th International Conference on Mobile Systems, 2008


  Loading...