Liming Wang

Orcid: 0000-0002-5732-5258

Affiliations:
  • Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China
  • Chinese Academy of Sciences, Institute of Software, Beijing, China (PhD 2007)


According to our database1, Liming Wang authored at least 112 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Reinforcement Learning Based Online Request Scheduling Framework for Workload-Adaptive Edge Deep Learning Inference.
IEEE Trans. Mob. Comput., December, 2024

FedSHE: privacy preserving and efficient federated learning with adaptive segmented CKKS homomorphic encryption.
Cybersecur., December, 2024

Iterative and mixed-spaces image gradient inversion attack in federated learning.
Cybersecur., December, 2024

Towards Minimum Latency in Cloud-Native Applications via Service-Characteristic- Aware Microservice Deployment.
Proceedings of the IEEE International Conference on Software Analysis, 2024

An Enclave-Aided Byzantine-Robust Federated Aggregation Framework.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2024

Runtime Anomaly Detection for MEC Services with Multi-Timescale and Dimensional Feature.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2024

Using Microposture Features and Optical Flows for Deepfake Detection.
Proceedings of the Advances in Digital Forensics XX, 2024

Mutual Information Based Noise Scale Optimization for Gradient Leakage Resistant Federated Learning.
Proceedings of the IEEE International Conference on Acoustics, 2024

Graph-Aware Multi-View Fusion for Rumor Detection on Social Media.
Proceedings of the IEEE International Conference on Acoustics, 2024

What You See Is The Tip Of The Iceberg: A Novel Technique For Data Leakage Prevention.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

Rethinking Word-level Adversarial Attack: The Trade-off between Efficiency, Effectiveness, and Imperceptibility.
Proceedings of the 2024 Joint International Conference on Computational Linguistics, 2024

Optimizing Privacy in Federated Learning with MPC and Differential Privacy.
Proceedings of the 2024 3rd Asia Conference on Algorithms, Computing and Machine Learning, 2024

2023
A Cooperative Defense Framework Against Application-Level DDoS Attacks on Mobile Edge Computing Services.
IEEE Trans. Mob. Comput., 2023

Perspectively Equivariant Keypoint Learning for Omnidirectional Images.
IEEE Trans. Image Process., 2023

Satellite Telemetry Data Anomaly Detection using Multiple Factors and Co-Attention based LSTM.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2023

Label-wise Distribution Adaptive Federated Learning on Non-IID Data.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2023

Byzantine-Robust Federated Learning through Dynamic Clustering.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

NadGPT: Semi-Supervised Network Anomaly Detection via Auto-Regressive Auxiliary Prediction.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2023

Unsupervised Clustering with Contrastive Learning for Rumor Tracking on Social Media.
Proceedings of the Natural Language Processing and Chinese Computing, 2023

Every Time Can Be Different: A Data Dynamic Protection Method Based on Moving Target Defense.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

A Novel Malware Classification Method Based on Memory Image Representation.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

Deepfake Detection Using Multiple Facial Features.
Proceedings of the Advances in Digital Forensics XIX, 2023

GPT Method Based Traffic Anomaly Detection for Space-ground Integrated Network.
Proceedings of the 2023 3rd International Conference on Big Data, 2023

ImpactTracer: Root Cause Localization in Microservices Based on Fault Propagation Modeling.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2023

Efficient Federated Learning Aggregation Protocol Using Approximate Homomorphic Encryption.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

A Blockchain-Based Privacy-Preserving Data Sharing Scheme with Security-Enhanced Access Control.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

Satellite Anomaly Detection based on Improved Transformer Method.
Proceedings of the 24st Asia-Pacific Network Operations and Management Symposium, 2023

Similarizing the Influence of Words with Contrastive Learning to Defend Word-level Adversarial Text Attack.
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2023, 2023

Contrastive Learning with Adversarial Examples for Alleviating Pathology of Language Model.
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2023

2022
Exploring Graph-aware Multi-View Fusion for Rumor Detection on Social Media.
CoRR, 2022

On the Probability and Automatic Search of Rotational-XOR Cryptanalysis on ARX Ciphers.
Comput. J., 2022

Joint Model, Task Partitioning and Privacy Preserving Adaptation for Edge DNN Inference.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022

Crafting Textual Adversarial Examples through Second-Order Enhanced Word Saliency.
Proceedings of the International Joint Conference on Neural Networks, 2022

GPSAttack: A Unified Glyphs, Phonetics and Semantics Multi-Modal Attack against Chinese Text Classification Models.
Proceedings of the International Joint Conference on Neural Networks, 2022

Viewport-Oriented Panoramic Image Inpainting.
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022

SP Attack: Single-Perspective Attack for Generating Adversarial Omnidirectional Images.
Proceedings of the IEEE International Conference on Acoustics, 2022

360-Attack: Distortion-Aware Perturbations from Perspective-Views.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

SITD: Insider Threat Detection Using Siamese Architecture on Imbalanced Data.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

Detection of Hardware-Assisted Virtualization Based on Low-Level Feature.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

A Secure Container Placement Strategy Using Deep Reinforcement Learning in Cloud.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

PARSE: An Efficient Search Method for Black-box Adversarial Text Attacks.
Proceedings of the 29th International Conference on Computational Linguistics, 2022

Game Theory Approaches for Evaluating the Deception-based Moving Target Defense.
Proceedings of the 9th ACM Workshop on Moving Target Defense, 2022

Mitigating the Inconsistency Between Word Saliency and Model Confidence with Pathological Contrastive Training.
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2022, 2022

2021
Rendering-Aware VR Video Caching Over Multi-Cell MEC Networks.
IEEE Trans. Veh. Technol., 2021

360-Degree VR Video Watermarking Based on Spherical Wavelet Transform.
ACM Trans. Multim. Comput. Commun. Appl., 2021

Secure Encrypted Data Deduplication Based on Data Popularity.
Mob. Networks Appl., 2021

Website fingerprinting on early QUIC traffic.
Comput. Networks, 2021

A Secure VM Allocation Strategy Based on Tenant Behavior Analysis and Anomaly Identification.
Proceedings of the 2021 IEEE Military Communications Conference, 2021

SCAMS: A Novel Side-Channel Attack Mitigation System in IaaS Cloud.
Proceedings of the 2021 IEEE Military Communications Conference, 2021

Output Security for Multi-user Augmented Reality using Federated Reinforcement Learning.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

Secure and Efficient Allocation of Virtual Machines in Cloud Data Center.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

Disappeared Face: A Physical Adversarial Attack Method on Black-Box Face Detection Models.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

Distributed Capability Based Dynamic Path Authorization Scheme for SDSIN.
Proceedings of the ICCBN 2021: 9th International Conference on Communications and Broadband Networking, Shanghai, China, 25 February, 2021, 2021

CRchain: An Efficient Certificate Revocation Scheme Based on Blockchain.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

DyDom: Detecting Malicious Domains with Spatial-Temporal Analysis on Dynamic Graphs.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

Multimodal Fusion with Co-Attention Networks for Fake News Detection.
Proceedings of the Findings of the Association for Computational Linguistics: ACL/IJCNLP 2021, 2021

Empowering Adaptive Early-Exit Inference with Latency Awareness.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
ConnSpoiler: Disrupting C&C Communication of IoT-Based Botnet Through Fast Detection of Anomalous Domain Queries.
IEEE Trans. Ind. Informatics, 2020

Comments on "Dropping Activation Outputs with Localized First-Layer Deep Network for Enhancing User Privacy and Data Security".
IEEE Trans. Inf. Forensics Secur., 2020

deMSF: a Method for Detecting Malicious Server Flocks for Same Campaign.
EAI Endorsed Trans. Security Safety, 2020

Automatic Search for the Linear (Hull) Characteristics of ARX Ciphers: Applied to SPECK, SPARX, Chaskey, and CHAM-64.
Secur. Commun. Networks, 2020

An enhanced saturation attack and its mitigation mechanism in software-defined networking.
Comput. Networks, 2020

SecDedup: Secure Encrypted Data Deduplication With Dynamic Ownership Updating.
IEEE Access, 2020

End-Edge Coordinated Inference for Real-Time BYOD Malware Detection using Deep Learning.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020

A New Privacy-Preserving Framework based on Edge-Fog-Cloud Continuum for Load Forecasting.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020

RegionSparse: Leveraging Sparse Coding and Object Localization to Counter Adversarial Attacks.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

A Hybrid Intelligent System for Insider Threat Detection Using Iterative Attention.
Proceedings of the ICCDE 2020: The 6th International Conference on Computing and Data Engineering, 2020

An Efficient Blurring-Reconstruction Model to Defend Against Adversarial Attacks.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2020, 2020

SiegeCannon: Detecting Malicious Infrastructures by Analyzing Integral Characteristics of Involved Server Flocks.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

Automated Honeynet Deployment Strategy for Active Defense in Container-based Cloud.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

ConfigRand: A Moving Target Defense Framework against the Shared Kernel Information Leakages for Container-based Cloud.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

2019
基于正交编码的大数据纯文本水印方法 (Big Data Plain Text Watermarking Based on Orthogonal Coding).
计算机科学, 2019

Automatic Tool for Searching for Differential Characteristics in ARX Ciphers and Applications.
IACR Cryptol. ePrint Arch., 2019

Using memory propagation tree to improve performance of protocol fuzzer when testing ICS.
Comput. Secur., 2019

EFastLane: Toward Bandwidth-Efficient Flow Setup in Software-Defined Networking.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

Global Orchestration of Cooperative Defense against DDoS Attacks for MEC.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

DMNAED: A Novel Framework Based on Dynamic Memory Network for Abnormal Event Detection in Enterprise Networks.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2019

An Effective Table-Overflow Attack and Defense in Software-Defined Networking.
Proceedings of the 2019 IEEE 44th LCN Symposium on Emerging Topics in Networking (LCN Symposium), 2019

Minimizing Multi-Controller Deployment Cost in Software-Defined Networking.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

Adaptive SDN Master Controller Assignment for Maximizing Network Throughput.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

SVMDF: A Secure Virtual Machine Deployment Framework to Mitigate Co-Resident Threat in Cloud.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

A Blockchain-Based Authentication Method with One-Time Password.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019

Intranet User-Level Security Traffic Management with Deep Reinforcement Learning.
Proceedings of the International Joint Conference on Neural Networks, 2019

Bot-like Behavior Detection in Online Banking.
Proceedings of the 4th International Conference on Big Data and Computing, 2019

A Secure Container Deployment Strategy by Genetic Algorithm to Defend against Co-Resident Attacks in Cloud Computing.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

DeaPS: Deep Learning-Based User-Level Proactive Security Auditing for Clouds.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
Incomplete information Markov game theoretic approach to strategy generation for moving target defense.
Comput. Commun., 2018

Exploring the behaviors and threats of pollution attack in cooperative MEC caching.
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference, 2018

Online orchestration of cooperative defense against DDoS attacks for 5G MEC.
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference, 2018

Panoramic Image Saliency Detection by Fusing Visual Frequency Feature and Viewing Behavior Pattern.
Proceedings of the Advances in Multimedia Information Processing - PCM 2018, 2018

Proactive Mitigation to Table-Overflow in Software-Defined Networking.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018

A VM Placement Based Approach to Proactively Mitigate Co-Resident Attacks in Cloud.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018

Robust Sparse Hyperspectral Unmixing Based on Multi-Objective Optimization.
Proceedings of the 2018 IEEE International Geoscience and Remote Sensing Symposium, 2018

Single-Sample Aeroplane Detection in High-Resolution Optimal Remote Sensing Imagery.
Proceedings of the 2018 IEEE International Geoscience and Remote Sensing Symposium, 2018

Towards Weakly Pareto Optimal: An Improved Multi-Objective Based Band Selection Method for Hyperspectral Imagery.
Proceedings of the 2018 IEEE International Geoscience and Remote Sensing Symposium, 2018

LagProber: Detecting DGA-Based Malware by Using Query Time Lag of Non-existent Domains.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

Improved Automatic Search Algorithm for Differential and Linear Cryptanalysis on SIMECK and the Applications.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

Automatic Identification of Industrial Control Network Protocol Field Boundary Using Memory Propagation Tree.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

A Large Scale Analysis of DNS Water Torture Attack.
Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence, 2018

Detecting Chinese Domain Name Piracy.
Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence, 2018

Understanding User Behavior in Online Banking System.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2017
Visual Analysis of Android Malware Behavior Profile Based on PMCG_droid : A Pruned Lightweight APP Call Graph.
Proceedings of the Security and Privacy in Communication Networks, 2017

A Novel Semantic-Aware Approach for Detecting Malicious Web Traffic.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

DGASensor: Fast Detection for DGA-Based Malwares.
Proceedings of the 5th International Conference on Communications and Broadband Networking, Bali, Indonesia, February 20, 2017

A game theoretical framework for improving the quality of service in cooperative RAN caching.
Proceedings of the IEEE International Conference on Communications, 2017

What should we do? A structured review of SCADA system cyber security standards.
Proceedings of the 4th International Conference on Control, 2017

Quantitative Security Assessment Method based on Entropy for Moving Target Defense.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

A Multi-queue Aggregation Framework for M2M Traffic in LTE-A and Beyond Networks.
Proceedings of the 5G for Future Wireless Networks - First International Conference, 2017

2016
Adaptive relaying for full-duplex energy harvesting enabled cooperative communication in harsh environments.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Thwart eavesdropping attacks on network communication based on moving target defense.
Proceedings of the 35th IEEE International Performance Computing and Communications Conference, 2016

A Self-adaptive Hopping Approach of Moving Target Defense to thwart Scanning Attacks.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

2006
Authenticated Group Key Agreement for Multicast.
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006


  Loading...