Lifa Wu

Orcid: 0000-0001-5457-1923

According to our database1, Lifa Wu authored at least 36 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Offline Reinforcement Learning for Asynchronous Task Offloading in Mobile Edge Computing.
IEEE Trans. Netw. Serv. Manag., February, 2024

2023
High-speed anomaly traffic detection based on staged frequency domain features.
J. Inf. Secur. Appl., September, 2023

Anomaly traffic detection in IoT security using graph neural networks.
J. Inf. Secur. Appl., August, 2023

An intrusion detection method based on stacked sparse autoencoder and improved gaussian mixture model.
Comput. Secur., May, 2023

Robust Online Crowdsourcing with Strategic Workers.
Proceedings of the Advanced Parallel Processing Technologies, 2023

2022
Decentralized Policy Coordination in Mobile Sensing with Consensual Communication.
Sensors, 2022

RTOSExtracter: Extracting user-defined functions in stripped RTOS-based firmware.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2022

2021
A priority based path searching method for improving hybrid fuzzing.
Comput. Secur., 2021

2020
Building Auto-Encoder Intrusion Detection System based on random forest feature selection.
Comput. Secur., 2020

2019
基于经纪人的多云访问控制模型研究 (Research on Broker Based Multicloud Access Control Model).
计算机科学, 2019

基于闭合序列模式挖掘的未知协议格式推断方法 (Closed Sequential Patterns Mining Based Unknown Protocol Format Inference Method).
计算机科学, 2019

基于符号执行的Return-to-dl-resolve利用代码自动生成方法 (Automatic Return-to-dl-resolve Exploit Generation Method Based on Symbolic Execution).
计算机科学, 2019

ATOS: Adaptive Program Tracing With Online Control Flow Graph Support.
IEEE Access, 2019

A Critical-Path-Coverage-Based Vulnerability Detection Method for Smart Contracts.
IEEE Access, 2019

2018
Deep learning-based personality recognition from text posts of online social networks.
Appl. Intell., 2018

2017
多云环境的虚拟应用网络部署决策方法研究 (Research on Deployment Decision Method of Virtual Application Network in Multi-cloud Environment).
计算机科学, 2017

基于多尺度分解与预测误差扩展的可逆图像水印算法 (Reversible Image Watermarking Algorithm Based on Multi-scale Decomposition and Prediction Error Expansion).
计算机科学, 2017

基于状态的工控协议Fuzzing测试技术 (Protocol State Based Fuzzing Method for Industrial Control Protocols).
计算机科学, 2017

一种基于双层语义的Android原生库安全性检测方法 (Two-layer Semantics-based Security Detection Approach for Android Native Libraries).
计算机科学, 2017

Adaptive reversible image watermarking algorithm based on DE.
KSII Trans. Internet Inf. Syst., 2017

A Risk Classification Based Approach for Android Malware Detection.
KSII Trans. Internet Inf. Syst., 2017

An improved reversible image watermarking algorithm based on difference expansion.
Int. J. Distributed Sens. Networks, 2017

A novel destination prediction attack and corresponding location privacy protection method in geo-social networks.
Int. J. Distributed Sens. Networks, 2017

Adaptive reversible image watermarking algorithm based on IWT and level set.
EURASIP J. Adv. Signal Process., 2017

Personality Recognition on Social Media With Label Distribution Learning.
IEEE Access, 2017

2016
基于SecLA的云服务商选择方法研究 (Research of Cloud Provider Selection Method Based on SecLA).
计算机科学, 2016

TraDR: 一种基于轨迹分解重构的移动社交网络位置预测方法 (TraDR: A Destination Prediction Method Based on Trajectory Decomposition and Reconstruction in Geo-social Networks).
计算机科学, 2016

Double Reversible Watermarking Algorithm for Image Tamper Detection.
J. Inf. Hiding Multim. Signal Process., 2016

2015
一种基于域知识的协议状态机主动推断算法 (Domain-specific Algorithm of Protocol State Machine Active Inference).
计算机科学, 2015

2014
DTSTM: Dynamic Tree Style Trust Measurement Model for Cloud Computing.
KSII Trans. Internet Inf. Syst., 2014

2013
Efficient Model-based Fuzz Testing Using Higher-order Attribute Grammars.
J. Softw., 2013

Icefex: Protocol Format Extraction from IL-based Concolic Execution.
KSII Trans. Internet Inf. Syst., 2013

2011
Semantics-based Access Control Approach for Web Service.
J. Comput., 2011

2010
Using Semantic Web Techniques to Implement Access Control for Web Service.
Proceedings of the Information Computing and Applications - International Conference, 2010

2009
Semantic Security Policy for Web Service.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009

2008
Mining Frequent Composite Service Patterns.
Proceedings of the Seventh International Conference on Grid and Cooperative Computing, 2008


  Loading...