Jingju Liu

According to our database1, Jingju Liu authored at least 13 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Cybersecurity Knowledge Graph Completion Method for Scalable Scenarios.
Proceedings of the Knowledge Science, Engineering and Management, 2023

A Cyber Threat Entity Recognition Method Based on Robust Feature Representation and Adversarial Training.
Proceedings of the 2023 12th International Conference on Computing and Pattern Recognition, 2023

2022
High-Speed Path Probing Method for Large-Scale Network.
Sensors, 2022

DUSC-DQN: An Improved Deep Q-Network for Intelligent Penetration Testing Path Design.
Proceedings of the 7th International Conference on Computer and Communication Systems, 2022

2021
An Audio Steganography Based on Run Length Encoding and Integer Wavelet Transform.
Int. J. Digit. Crime Forensics, 2021

Research on Network Security Issues from the Perspective of Multilayer Networks.
Proceedings of the DSIT 2021: 4th International Conference on Data Science and Information Technology, Shanghai, China, July 23, 2021

2020
Secret image sharing with separate shadow authentication ability.
Signal Process. Image Commun., 2020

Application of random elements in ISS.
IET Image Process., 2020

2019
A Novel Behavior Steganography Model Based on Secret Sharing.
Int. J. Digit. Crime Forensics, 2019

2018
基于网络攻防博弈模型的最优防御策略选取方法 (Optimal Defense Strategy Selection Method Based on Network Attack-Defense Game Model).
计算机科学, 2018

Centroid-Based Audio Steganography Scheme in Wavelet Domain.
J. Inf. Hiding Multim. Signal Process., 2018

Chinese remainder theorem-based two-in-one image secret sharing with three decoding options.
Digit. Signal Process., 2018

2011
VISHNU: A Software Behavior Trustworthiness Control Method Based on DRTM.
Proceedings of the 2nd International Symposium on Intelligence Information Processing and Trusted Computing, 2011


  Loading...