Liang Cai

Orcid: 0000-0001-7898-2372

According to our database1, Liang Cai authored at least 45 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Triangulation topology aggregation optimizer: A novel mathematics-based <i>meta</i>-heuristic algorithm for continuous optimization and engineering applications.
Expert Syst. Appl., March, 2024

Efficient Unbalanced Quorum PSI from Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2024

2023
Single-stage buck-boost off-grid inverter with feedforward control.
Int. J. Circuit Theory Appl., 2023

SourceP: Smart Ponzi Schemes Detection on Ethereum Using Pre-training Model with Data Flow.
CoRR, 2023

ESM2-Tree: An maintenance efficient authentication data structure in blockchain.
Proceedings of the 35th International Conference on Scientific and Statistical Database Management, 2023

Automated right coronary artery localizer using deep learning for optimal cardiac phase selection.
Proceedings of the Medical Imaging 2023: Computer-Aided Diagnosis, 2023

VI-Store: Towards Optimizing Blockchain-Oriented Verifiable Ledger Database.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

Description of Configuration Transformation Matrix of Reconfigurable Mechanism and Automatic Retrieval and Recognition of Motion Mode.
Proceedings of the Intelligent Robotics and Applications - 16th International Conference, 2023

Segmenta: Pipelined BFT Consensus with Slicing Broadcast.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023

2022
Phalanx: A Practical Byzantine Ordered Consensus Protocol.
CoRR, 2022

Application of Adaptive Sub-band Filters on Active Noise Control.
Proceedings of the 2022 5th International Conference on Signal Processing and Machine Learning, 2022

Byzantine Consensus Based on Modified Treap Topology.
Proceedings of the 8th International Conference on Systems and Informatics, 2022

A Study on Online Game Genshin Impact and the Dissemination of Chinese Culture.
Proceedings of the Computer Science and Education - 17th International Conference, 2022

Design, Analysis and Verification of New Vehiclemounted Antenna Lifting Platform.
Proceedings of the 4th International Conference on Artificial Intelligence and Advanced Manufacturing, 2022

2021
Sum uncertainty relations based on metric-adjusted skew information.
Quantum Inf. Process., 2021

Time-series interval prediction under uncertainty using modified double multiplicative neuron network.
Expert Syst. Appl., 2021

Blockchain in China.
Commun. ACM, 2021

2020
How Instructors Initially Viewed Teaching Online in Higher Education in the UK During the COVID-19 Pandemic.
Proceedings of the Learning Technologies and Systems, 2020

Current Political News Translation Model Based on Attention Mechanism.
Proceedings of the Learning Technologies and Systems, 2020

2019
Practical and effective sandboxing for Linux containers.
Empir. Softw. Eng., 2019

AnswerBot: an answer summary generation tool based on stack overflow.
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019

BIKER: a tool for Bi-information source based API method recommendation.
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019

Deploying and Optimizing Convolutional Neural Networks on Heterogeneous Architecture.
Proceedings of the 13th IEEE International Conference on ASIC, 2019

2018
基于空样式的网页水印方法 (New Method for Webpage Watermarking Based on Empty Styles).
计算机科学, 2018

Resilient control based on disturbance observer for nonlinear singular stochastic hybrid system with partly unknown Markovian jump parameters.
J. Frankl. Inst., 2018

Categorizing and Predicting Invalid Vulnerabilities on Common Vulnerabilities and Exposures.
Proceedings of the 25th Asia-Pacific Software Engineering Conference, 2018

2017
Bug characteristics in blockchain systems: a large-scale empirical study.
Proceedings of the 14th International Conference on Mining Software Repositories, 2017

Mining Sandboxes for Linux Containers.
Proceedings of the 2017 IEEE International Conference on Software Testing, 2017

2014
RMS: Reliable Multicast System Based on UDP and NAK Window.
Int. J. Comput. Their Appl., 2014

2013
Geographic Location-Based Network-Aware QoS Prediction for Service Composition.
Proceedings of the 2013 IEEE 20th International Conference on Web Services, Santa Clara, CA, USA, June 28, 2013

2012
Nonrigid-Deformation Recovery for 3D Face Recognition Using Multiscale Registration.
IEEE Computer Graphics and Applications, 2012

On the Practicality of Motion Based Keystroke Inference Attack.
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012

2011
TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion.
Proceedings of the 6th USENIX Workshop on Hot Topics in Security, 2011

Good Neighbor: Ad hoc Pairing of Nearby Wireless Devices by Multiple Antennas.
Proceedings of the Network and Distributed System Security Symposium, 2011

2010
CapAuth: A Capability-based Handover Scheme.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

An incremental update strategy in Deep Web.
Proceedings of the Sixth International Conference on Natural Computation, 2010

Robust 3D Face Recognition by Using Shape Filtering.
Proceedings of the British Machine Vision Conference, 2010

2009
Defending against sensor-sniffing attacks on mobile phones.
Proceedings of the 1st ACM SIGCOMM Workshop on Networking, 2009

Mitigating DoS Attacks on the Paging Channel by Efficient Encoding in Page Messages.
Proceedings of the Security and Privacy in Communication Networks, 2009

2008
Differential Evolution using Historical Knowledge.
Proceedings of the 2008 IEEE International Conference on Granular Computing, 2008

2005
A reference model and system architecture for database firewall.
Proceedings of the IEEE International Conference on Systems, 2005

Architecture of a Server-Aided Signature Service (SASS) for Mobile Networks.
Proceedings of the Networking, 2005

A Robust Registration and Detection Method for Color Seal Verification.
Proceedings of the Advances in Intelligent Computing, 2005

Design and Implementation of a Server-Aided PKI Service (SaPKI.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2004
A Design Pattern Verifier in Two-Tier Programming Environment.
Proceedings of the 2004 International Conference on Computer and Information Technology (CIT 2004), 2004


  Loading...