Liang Liu

Orcid: 0000-0002-5612-1915

Affiliations:
  • Sichuan University, College of Cybersecurity, Chengdu, China


According to our database1, Liang Liu authored at least 34 papers between 2013 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
FEEL: Federated End-to-End Learning With Non-IID Data for Vehicular Ad Hoc Networks.
IEEE Trans. Intell. Transp. Syst., 2022

MSCCS: A Monero-based security-enhanced covert communication system.
Comput. Networks, 2022

2021
A generalized approach to solve perfect Bayesian Nash equilibrium for practical network attack and defense.
Inf. Sci., 2021

2020
Exposing Fake Bitrate Videos Using Hybrid Deep-Learning Network From Recompression Error.
IEEE Trans. Circuits Syst. Video Technol., 2020

Automatic Detection of Pornographic and Gambling Websites Based on Visual and Textual Content Using a Decision Mechanism.
Sensors, 2020

Preprocessing Method for Encrypted Traffic Based on Semisupervised Clustering.
Secur. Commun. Networks, 2020

Cross-modality earth mover's distance-driven convolutional neural network for different-modality data.
Neural Comput. Appl., 2020

Malware Classification Based on Shallow Neural Network.
Future Internet, 2020

SankeyVis: Visualizing active relationship from emails based on multiple dimensions and topic classification methods.
Digit. Investig., 2020

A Hive-Based Retrieval Optimization Scheme for Long-Term Storage of Massive Call Detail Records.
IEEE Access, 2020

A Neural Network-Based Approach for Cryptographic Function Detection in Malware.
IEEE Access, 2020

2019
Network traffic anomaly detection algorithm using mahout classifier.
J. Intell. Fuzzy Syst., 2019

Network Attack and Defense Game Theory Based on Bayes-Nash Equilibrium.
KSII Trans. Internet Inf. Syst., 2019

Capturing the symptoms of malicious code in electronic documents by file's entropy signal combined with machine learning.
Appl. Soft Comput., 2019

InsFuzz: Fuzzing Binaries With Location Sensitivity.
IEEE Access, 2019

A Distance-Based Method for Building an Encrypted Malware Traffic Identification Framework.
IEEE Access, 2019

Fuzzing the Android Applications With HTTP/HTTPS Network Data.
IEEE Access, 2019

Phishing Email Detection Using Improved RCNN Model With Multilevel Vectors and Attention Mechanism.
IEEE Access, 2019

Analyzing and Identifying Data Breaches in Underground Forums.
IEEE Access, 2019

Against Malicious SSL/TLS Encryption: Identify Malicious Traffic Based on Random Forest.
Proceedings of the Fourth International Congress on Information and Communication Technology, 2019

Network Attack and Defense Effectiveness Evaluation Based on Dematel Method.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

2018
Indoor Positioning Based on Bluetooth Low-Energy Beacons Adopting Graph Optimization.
Sensors, 2018

MACSPMD: 基于恶意API调用序列模式挖掘的恶意代码检测 (MACSPMD: Malicious API Call Sequential Pattern Mining Based Malware Detection).
计算机科学, 2018

Research on Malicious JavaScript Detection Technology Based on LSTM.
IEEE Access, 2018

WOVSQLI: Detection of SQL Injection Behaviors Using Word Vector and LSTM.
Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, 2018

DarkHunter: A Fingerprint Recognition Model for Web Automated Scanners Based on CNN.
Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, 2018

Detecting Webshell Based on Random Forest with FastText.
Proceedings of the 2018 International Conference on Computing and Artificial Intelligence, 2018

DeepXSS: Cross Site Scripting Detection Based on Deep Learning.
Proceedings of the 2018 International Conference on Computing and Artificial Intelligence, 2018

Webshell Detection Based on Random Forest-Gradient Boosting Decision Tree Algorithm.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

2015
Classification of Ultra-High Resolution Orthophotos Combined with DSM Using a Dual Morphological Top Hat Profile.
Remote. Sens., 2015

A New Static Detection Method of Malicious Document Based on Wavelet Package Analysis.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

A framework for privacy information protection on Android.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

2014
Multi-agent Intrusion Detection System Using Feature Selection Approach.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

2013
Website Regional Rapid Security Detection Method.
Proceedings of the Fifth International Conference on Computational Intelligence, 2013


  Loading...