Jiqiang Liu

According to our database1, Jiqiang Liu authored at least 86 papers between 2005 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
PriWhisper+: An Enhanced Acoustic Short-Range Communication System for Smartphones.
IEEE Internet of Things Journal, 2019

Comparison analysis and efficient implementation of reconciliation-based RLWE key exchange protocol.
IJHPCN, 2019

Fingerprinting Android malware families.
Frontiers Comput. Sci., 2019

DPWeVote: differentially private weighted voting protocol for cloud-based decision-making.
Enterprise IS, 2019

Adversarial attack and defense in reinforcement learning-from AI security view.
Cybersecurity, 2019

Detecting Android Locker-Ransomware on Chinese Social Networks.
IEEE Access, 2019

Assessing transferability of adversarial examples against malware detection classifiers.
Proceedings of the 16th ACM International Conference on Computing Frontiers, 2019

2018
Discovering and understanding android sensor usage behaviors with data flow analysis.
World Wide Web, 2018

Privacy Protection Scheme Based on Remote Anonymous Attestation for Trusted Smart Meters.
IEEE Trans. Smart Grid, 2018

CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles.
IEEE Trans. Intelligent Transportation Systems, 2018

Identity-Based Private Matching over Outsourced Encrypted Datasets.
IEEE Trans. Cloud Computing, 2018

Effective Modeling Approach for IaaS Data Center Performance Analysis under Heterogeneous Workload.
IEEE Trans. Cloud Computing, 2018

Practical Randomized RLWE-Based Key Exchange Against Signal Leakage Attack.
IEEE Trans. Computers, 2018

Abstracting massive data for lightweight intrusion detection in computer networks.
Inf. Sci., 2018

Efficient Implementation of Password-based Authenticated Key Exchange from RLWE and Post-Quantum TLS.
I. J. Network Security, 2018

Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers.
Future Generation Comp. Syst., 2018

Android single sign-on security: Issues, taxonomy and directions.
Future Generation Comp. Syst., 2018

Discovering communities of malapps on Android-based mobile cyber-physical systems.
Ad Hoc Networks, 2018

DroidEnsemble: Detecting Android Malicious Applications With Ensemble of String and Structural Static Features.
IEEE Access, 2018

Intrusion Prediction With System-Call Sequence-to-Sequence Model.
IEEE Access, 2018

The NiuTrans Machine Translation System for WMT18.
Proceedings of the Third Conference on Machine Translation: Shared Task Papers, 2018

A DeepWalk-Based Approach to Defend Profile Injection Attack in Recommendation System.
Proceedings of the Intelligent Information Processing IX, 2018

Designing Mutual Authentication Protocols in Industrial Wireless Network.
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018

Multi-Dimension Threat Situation Assessment Based on Network Security Attributes.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Hierarchical Filtering Method of Alerts Based on Multi-Source Information Correlation Analysis.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Interest Relevance-Based Caching Design in Content-Centric Networking.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Efficient and Secure Outsourcing of Differentially Private Data Publication.
Proceedings of the Computer Security, 2018

A PCA-Based Model to Predict Adversarial Examples on Q-Learning of Path Finding.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Intention-Aware Multi-channel Keyword Extension for Content Security.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

An Approach to Generate Topic Similar Document by Seed Extraction-Based SeqGAN Training for Bait Document.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Adversarial Examples Construction Towards White-Box Q Table Variation in DQN Pathfinding Training.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

2017
Towards Robust Green Virtual Cloud Data Center Provisioning.
IEEE Trans. Cloud Computing, 2017

Comparison analysis and efficient implementation of reconciliation-based RLWE key exchange protocol.
IACR Cryptology ePrint Archive, 2017

Efficient Implementation of Password-Based Authenticated Key Exchange from RLWE and Post-Quantum TLS.
IACR Cryptology ePrint Archive, 2017

Characterizing Android apps' behavior for effective detection of malapps at large scale.
Future Generation Comp. Syst., 2017

New advances in securing cyberspace and curbing crowdturfing.
Concurrency and Computation: Practice and Experience, 2017

Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack.
SCIENCE CHINA Information Sciences, 2017

Combining Popularity and Locality to Enhance In-Network Caching Performance and Mitigate Pollution Attacks in Content-Centric Networking.
IEEE Access, 2017

A Hidden Astroturfing Detection Approach Base on Emotion Analysis.
Proceedings of the Knowledge Science, Engineering and Management, 2017

Fast Discretized Gaussian Sampling and Post-quantum TLS Ciphersuite.
Proceedings of the Information Security Practice and Experience, 2017

A Method to Effectively Detect Vulnerabilities on Path Planning of VIN.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

A Cross-Modal CCA-Based Astroturfing Detection Approach.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

Post-Quantum Secure Remote Password Protocol from RLWE Problem.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

2016
Modeling Active Virtual Machines on IaaS Clouds Using an M/G/m/m+K Queue.
IEEE Trans. Services Computing, 2016

An ID-based node key management scheme based on PTPM in MANETs.
Security and Communication Networks, 2016

Deterministic attribute-based encryption.
IJHPCN, 2016

A universally composable secure grouping-proof protocol for RFID tags.
Concurrency and Computation: Practice and Experience, 2016

Public verifiability for shared data in cloud storage with a defense against collusion attacks.
SCIENCE CHINA Information Sciences, 2016

Anomadroid: Profiling Android Applications' Behaviors for Identifying Unknown Malapps.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Alde: Privacy Risk Analysis of Analytics Libraries in the Android Ecosystem.
Proceedings of the Security and Privacy in Communication Networks, 2016

An SDKEY Data Protection and Sharing Scheme with Attribute-Based Encryption for Smartphone.
Proceedings of the 4th International Conference on Enterprise Systems, 2016

Fast, Private and Verifiable: Server-aided Approximate Similarity Computation over Large-Scale Datasets.
Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, 2016

2015
Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation.
Inf. Sci., 2015

Constructing important features from massive network traffic for lightweight intrusion detection.
IET Information Security, 2015

Modeling Heterogeneous Virtual Machines on IaaS Data Centers.
IEEE Communications Letters, 2015

OB-IMA: out-of-the-box integrity measurement approach for guest virtual machines.
Concurrency and Computation: Practice and Experience, 2015

Selecting a trusted cloud service provider for your SaaS program.
Computers & Security, 2015

Privacy beyond sensitive values.
SCIENCE CHINA Information Sciences, 2015

Exploring sensor usage behaviors of Android applications based on data flow analysis.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

POSTER: The Popular Apps in Your Pocket Are Leaking Your Privacy.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection.
IEEE Trans. Information Forensics and Security, 2014

A Two-Layered Permission-Based Android Malware Detection Scheme.
Proceedings of the 2nd IEEE International Conference on Mobile Cloud Computing, 2014

A Privacy-Aware Access Model on Anonymized Data.
Proceedings of the Trusted Systems - 6th International Conference, 2014

2013
Identity-Based Symmetric Private Set Intersection.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Effective and efficient AI-based approaches to cloud resource provisioning.
Proceedings of the 19th IEEE International Conference on Networks, 2013

Simulated annealing based resource allocation for cloud data centers.
Proceedings of the Genetic and Evolutionary Computation Conference, 2013

Green cloud virtual network provisioning based ant colony optimization.
Proceedings of the Genetic and Evolutionary Computation Conference, 2013

2012
Embedding Virtual Infrastructure Based on Genetic Algorithm.
Proceedings of the 13th International Conference on Parallel and Distributed Computing, 2012

Robust and Efficient Response to TCG TOCTOU Attacks in TPVM.
Proceedings of the 13th International Conference on Parallel and Distributed Computing, 2012

Network state aware virtual network parallel embedding.
Proceedings of the 31st IEEE International Performance Computing and Communications Conference, 2012

Migration cost aware virtual network re-embedding in presence of resource failures.
Proceedings of the 18th IEEE International Conference on Networks, 2012

Reducing power consumption in embedding virtual infrastructures.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2012

2011
A Dynamic Security Mechanism for Web Services Based on NDIS Intermediate Drivers.
JCP, 2011

Design and implementation of a portable TPM scheme for general-purpose trusted computing based on EFI.
Frontiers Comput. Sci. China, 2011

2010
An optimal, strategy-proof scheme for multi-path traffic assignment in non-cooperative networks.
IEEE Trans. Wireless Communications, 2010

Full and partial deniability for authentication schemes.
Frontiers Comput. Sci. China, 2010

An IBE scheme using ECC combined public key.
Computers & Electrical Engineering, 2010

2009
An efficient protocol for private and accurate mining of support counts.
Pattern Recognition Letters, 2009

Analysis of Kim-Jeon-Yoo Password Authentication Schemes.
Cryptologia, 2009

LWRM: A lightweight response mechanism for TCG TOCTOU attack.
Proceedings of the 28th International Performance Computing and Communications Conference, 2009

2008
A remote anonymous attestation protocol in trusted computing.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008

Analysis of Interrupt Coalescing Schemes for Receive-Livelock Problem in Gigabit Ethernet Network Hosts.
Proceedings of IEEE International Conference on Communications, 2008

2007
Congestion Control Based on Priority Drop for H.264/SVC.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Cost-Effective Traffic Assignment for Multipath Routing in Selfish Networks.
Proceedings of the Global Communications Conference, 2007

2005
An Efficient and Divisible Payment Scheme for M-Commerce.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Develop Secure Database System with Security Extended ER Model.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005


  Loading...