Jingju Liu

Orcid: 0009-0005-9506-6903

According to our database1, Jingju Liu authored at least 22 papers between 2011 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
APRIL: Towards Scalable and Transferable Autonomous Penetration Testing in Large Action Space via Action Embedding.
IEEE Trans. Dependable Secur. Comput., 2025

SCRIPT: A Scalable Continual Reinforcement Learning Framework for Autonomous Penetration Testing.
Expert Syst. Appl., 2025

SecLMNER: A framework for enhanced named entity recognition in multi-source cybersecurity data using large language models.
Expert Syst. Appl., 2025

Automated Penetration Testing Through Hierarchical PPO with Large Language Model Enhancement.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2025

2024
Towards Generalizable Autonomous Penetration Testing via Domain Randomization and Meta-Reinforcement Learning.
CoRR, 2024

E2E-AutoPT: An End-to-End Automated Penetration Testing with LSTM-PPO Approach.
Proceedings of the Network and Parallel Computing, 2024

PTGroup: An Automated Penetration Testing Framework Using LLMs and Multiple Prompt Chains.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024

2023
A Cybersecurity Knowledge Graph Completion Method for Scalable Scenarios.
Proceedings of the Knowledge Science, Engineering and Management, 2023

FuzzyCAT: A Framework for Network Configuration Verification Based on Fuzzing.
Proceedings of the IEEE International Performance, 2023

A Cyber Threat Entity Recognition Method Based on Robust Feature Representation and Adversarial Training.
Proceedings of the 2023 12th International Conference on Computing and Pattern Recognition, 2023

2022
High-Speed Path Probing Method for Large-Scale Network.
Sensors, 2022

DUSC-DQN: An Improved Deep Q-Network for Intelligent Penetration Testing Path Design.
Proceedings of the 7th International Conference on Computer and Communication Systems, 2022

2021
An Audio Steganography Based on Run Length Encoding and Integer Wavelet Transform.
Int. J. Digit. Crime Forensics, 2021

Research on Network Security Issues from the Perspective of Multilayer Networks.
Proceedings of the DSIT 2021: 4th International Conference on Data Science and Information Technology, Shanghai, China, July 23, 2021

2020
Secret image sharing with separate shadow authentication ability.
Signal Process. Image Commun., 2020

Application of random elements in ISS.
IET Image Process., 2020

2019
A Novel Behavior Steganography Model Based on Secret Sharing.
Int. J. Digit. Crime Forensics, 2019

2018
基于网络攻防博弈模型的最优防御策略选取方法 (Optimal Defense Strategy Selection Method Based on Network Attack-Defense Game Model).
计算机科学, 2018

Centroid-Based Audio Steganography Scheme in Wavelet Domain.
J. Inf. Hiding Multim. Signal Process., 2018

Chinese remainder theorem-based two-in-one image secret sharing with three decoding options.
Digit. Signal Process., 2018

2017
Adaptive Audio Steganography Scheme Based on Wavelet Packet Energy.
Proceedings of the 2017 IEEE 3rd International Conference on Big Data Security on Cloud (BigDataSecurity), 2017

2011
VISHNU: A Software Behavior Trustworthiness Control Method Based on DRTM.
Proceedings of the 2nd International Symposium on Intelligence Information Processing and Trusted Computing, 2011


  Loading...