Jingju Liu
Orcid: 0009-0005-9506-6903
According to our database1,
Jingju Liu
authored at least 22 papers
between 2011 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
APRIL: Towards Scalable and Transferable Autonomous Penetration Testing in Large Action Space via Action Embedding.
IEEE Trans. Dependable Secur. Comput., 2025
SCRIPT: A Scalable Continual Reinforcement Learning Framework for Autonomous Penetration Testing.
Expert Syst. Appl., 2025
SecLMNER: A framework for enhanced named entity recognition in multi-source cybersecurity data using large language models.
Expert Syst. Appl., 2025
Automated Penetration Testing Through Hierarchical PPO with Large Language Model Enhancement.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2025
2024
Towards Generalizable Autonomous Penetration Testing via Domain Randomization and Meta-Reinforcement Learning.
CoRR, 2024
Proceedings of the Network and Parallel Computing, 2024
PTGroup: An Automated Penetration Testing Framework Using LLMs and Multiple Prompt Chains.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024
2023
Proceedings of the Knowledge Science, Engineering and Management, 2023
Proceedings of the IEEE International Performance, 2023
A Cyber Threat Entity Recognition Method Based on Robust Feature Representation and Adversarial Training.
Proceedings of the 2023 12th International Conference on Computing and Pattern Recognition, 2023
2022
DUSC-DQN: An Improved Deep Q-Network for Intelligent Penetration Testing Path Design.
Proceedings of the 7th International Conference on Computer and Communication Systems, 2022
2021
Int. J. Digit. Crime Forensics, 2021
Proceedings of the DSIT 2021: 4th International Conference on Data Science and Information Technology, Shanghai, China, July 23, 2021
2020
Signal Process. Image Commun., 2020
2019
Int. J. Digit. Crime Forensics, 2019
2018
基于网络攻防博弈模型的最优防御策略选取方法 (Optimal Defense Strategy Selection Method Based on Network Attack-Defense Game Model).
计算机科学, 2018
J. Inf. Hiding Multim. Signal Process., 2018
Chinese remainder theorem-based two-in-one image secret sharing with three decoding options.
Digit. Signal Process., 2018
2017
Proceedings of the 2017 IEEE 3rd International Conference on Big Data Security on Cloud (BigDataSecurity), 2017
2011
Proceedings of the 2nd International Symposium on Intelligence Information Processing and Trusted Computing, 2011