Liming Wang
Orcid: 0000-0002-5732-5258Affiliations:
- Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China
- Chinese Academy of Sciences, Institute of Software, Beijing, China (PhD 2007)
According to our database1,
Liming Wang
authored at least 112 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Reinforcement Learning Based Online Request Scheduling Framework for Workload-Adaptive Edge Deep Learning Inference.
IEEE Trans. Mob. Comput., December, 2024
FedSHE: privacy preserving and efficient federated learning with adaptive segmented CKKS homomorphic encryption.
Cybersecur., December, 2024
Cybersecur., December, 2024
Towards Minimum Latency in Cloud-Native Applications via Service-Characteristic- Aware Microservice Deployment.
Proceedings of the IEEE International Conference on Software Analysis, 2024
Proceedings of the IEEE Wireless Communications and Networking Conference, 2024
Runtime Anomaly Detection for MEC Services with Multi-Timescale and Dimensional Feature.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2024
Proceedings of the Advances in Digital Forensics XX, 2024
Mutual Information Based Noise Scale Optimization for Gradient Leakage Resistant Federated Learning.
Proceedings of the IEEE International Conference on Acoustics, 2024
Proceedings of the IEEE International Conference on Acoustics, 2024
What You See Is The Tip Of The Iceberg: A Novel Technique For Data Leakage Prevention.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
Rethinking Word-level Adversarial Attack: The Trade-off between Efficiency, Effectiveness, and Imperceptibility.
Proceedings of the 2024 Joint International Conference on Computational Linguistics, 2024
Proceedings of the 2024 3rd Asia Conference on Algorithms, Computing and Machine Learning, 2024
2023
A Cooperative Defense Framework Against Application-Level DDoS Attacks on Mobile Edge Computing Services.
IEEE Trans. Mob. Comput., 2023
IEEE Trans. Image Process., 2023
Satellite Telemetry Data Anomaly Detection using Multiple Factors and Co-Attention based LSTM.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2023
Proceedings of the IEEE Wireless Communications and Networking Conference, 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
NadGPT: Semi-Supervised Network Anomaly Detection via Auto-Regressive Auxiliary Prediction.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2023
Unsupervised Clustering with Contrastive Learning for Rumor Tracking on Social Media.
Proceedings of the Natural Language Processing and Chinese Computing, 2023
Every Time Can Be Different: A Data Dynamic Protection Method Based on Moving Target Defense.
Proceedings of the IEEE Symposium on Computers and Communications, 2023
Proceedings of the IEEE Symposium on Computers and Communications, 2023
Proceedings of the Advances in Digital Forensics XIX, 2023
Proceedings of the 2023 3rd International Conference on Big Data, 2023
ImpactTracer: Root Cause Localization in Microservices Based on Fault Propagation Modeling.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2023
Efficient Federated Learning Aggregation Protocol Using Approximate Homomorphic Encryption.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
A Blockchain-Based Privacy-Preserving Data Sharing Scheme with Security-Enhanced Access Control.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
Proceedings of the 24st Asia-Pacific Network Operations and Management Symposium, 2023
Similarizing the Influence of Words with Contrastive Learning to Defend Word-level Adversarial Text Attack.
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2023, 2023
Contrastive Learning with Adversarial Examples for Alleviating Pathology of Language Model.
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2023
2022
CoRR, 2022
On the Probability and Automatic Search of Rotational-XOR Cryptanalysis on ARX Ciphers.
Comput. J., 2022
Joint Model, Task Partitioning and Privacy Preserving Adaptation for Edge DNN Inference.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022
Proceedings of the International Joint Conference on Neural Networks, 2022
GPSAttack: A Unified Glyphs, Phonetics and Semantics Multi-Modal Attack against Chinese Text Classification Models.
Proceedings of the International Joint Conference on Neural Networks, 2022
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022
SP Attack: Single-Perspective Attack for Generating Adversarial Omnidirectional Images.
Proceedings of the IEEE International Conference on Acoustics, 2022
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022
Proceedings of the 29th International Conference on Computational Linguistics, 2022
Proceedings of the 9th ACM Workshop on Moving Target Defense, 2022
Mitigating the Inconsistency Between Word Saliency and Model Confidence with Pathological Contrastive Training.
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2022, 2022
2021
IEEE Trans. Veh. Technol., 2021
ACM Trans. Multim. Comput. Commun. Appl., 2021
Mob. Networks Appl., 2021
A Secure VM Allocation Strategy Based on Tenant Behavior Analysis and Anomaly Identification.
Proceedings of the 2021 IEEE Military Communications Conference, 2021
Proceedings of the 2021 IEEE Military Communications Conference, 2021
Output Security for Multi-user Augmented Reality using Federated Reinforcement Learning.
Proceedings of the IEEE Symposium on Computers and Communications, 2021
Proceedings of the IEEE Symposium on Computers and Communications, 2021
Disappeared Face: A Physical Adversarial Attack Method on Black-Box Face Detection Models.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
Proceedings of the ICCBN 2021: 9th International Conference on Communications and Broadband Networking, Shanghai, China, 25 February, 2021, 2021
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021
Proceedings of the Findings of the Association for Computational Linguistics: ACL/IJCNLP 2021, 2021
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021
2020
ConnSpoiler: Disrupting C&C Communication of IoT-Based Botnet Through Fast Detection of Anomalous Domain Queries.
IEEE Trans. Ind. Informatics, 2020
Comments on "Dropping Activation Outputs with Localized First-Layer Deep Network for Enhancing User Privacy and Data Security".
IEEE Trans. Inf. Forensics Secur., 2020
EAI Endorsed Trans. Security Safety, 2020
Automatic Search for the Linear (Hull) Characteristics of ARX Ciphers: Applied to SPECK, SPARX, Chaskey, and CHAM-64.
Secur. Commun. Networks, 2020
An enhanced saturation attack and its mitigation mechanism in software-defined networking.
Comput. Networks, 2020
IEEE Access, 2020
End-Edge Coordinated Inference for Real-Time BYOD Malware Detection using Deep Learning.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020
A New Privacy-Preserving Framework based on Edge-Fog-Cloud Continuum for Load Forecasting.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020
RegionSparse: Leveraging Sparse Coding and Object Localization to Counter Adversarial Attacks.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020
Proceedings of the ICCDE 2020: The 6th International Conference on Computing and Data Engineering, 2020
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2020, 2020
SiegeCannon: Detecting Malicious Infrastructures by Analyzing Integral Characteristics of Involved Server Flocks.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020
ConfigRand: A Moving Target Defense Framework against the Shared Kernel Information Leakages for Container-based Cloud.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020
2019
计算机科学, 2019
Automatic Tool for Searching for Differential Characteristics in ARX Ciphers and Applications.
IACR Cryptol. ePrint Arch., 2019
Using memory propagation tree to improve performance of protocol fuzzer when testing ICS.
Comput. Secur., 2019
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019
DMNAED: A Novel Framework Based on Dynamic Memory Network for Abnormal Event Detection in Enterprise Networks.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2019
Proceedings of the 2019 IEEE 44th LCN Symposium on Emerging Topics in Networking (LCN Symposium), 2019
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019
SVMDF: A Secure Virtual Machine Deployment Framework to Mitigate Co-Resident Threat in Cloud.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019
Proceedings of the International Joint Conference on Neural Networks, 2019
Proceedings of the 4th International Conference on Big Data and Computing, 2019
A Secure Container Deployment Strategy by Genetic Algorithm to Defend against Co-Resident Attacks in Cloud Computing.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
2018
Incomplete information Markov game theoretic approach to strategy generation for moving target defense.
Comput. Commun., 2018
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference, 2018
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference, 2018
Panoramic Image Saliency Detection by Fusing Visual Frequency Feature and Viewing Behavior Pattern.
Proceedings of the Advances in Multimedia Information Processing - PCM 2018, 2018
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018
Proceedings of the 2018 IEEE International Geoscience and Remote Sensing Symposium, 2018
Proceedings of the 2018 IEEE International Geoscience and Remote Sensing Symposium, 2018
Towards Weakly Pareto Optimal: An Improved Multi-Objective Based Band Selection Method for Hyperspectral Imagery.
Proceedings of the 2018 IEEE International Geoscience and Remote Sensing Symposium, 2018
LagProber: Detecting DGA-Based Malware by Using Query Time Lag of Non-existent Domains.
Proceedings of the Information and Communications Security - 20th International Conference, 2018
Improved Automatic Search Algorithm for Differential and Linear Cryptanalysis on SIMECK and the Applications.
Proceedings of the Information and Communications Security - 20th International Conference, 2018
Automatic Identification of Industrial Control Network Protocol Field Boundary Using Memory Propagation Tree.
Proceedings of the Information and Communications Security - 20th International Conference, 2018
Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence, 2018
Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence, 2018
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
2017
Visual Analysis of Android Malware Behavior Profile Based on PMCG_droid : A Pruned Lightweight APP Call Graph.
Proceedings of the Security and Privacy in Communication Networks, 2017
Proceedings of the Information and Communications Security - 19th International Conference, 2017
Proceedings of the 5th International Conference on Communications and Broadband Networking, Bali, Indonesia, February 20, 2017
A game theoretical framework for improving the quality of service in cooperative RAN caching.
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the 4th International Conference on Control, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the 5G for Future Wireless Networks - First International Conference, 2017
2016
Adaptive relaying for full-duplex energy harvesting enabled cooperative communication in harsh environments.
Proceedings of the 2016 IEEE Military Communications Conference, 2016
Thwart eavesdropping attacks on network communication based on moving target defense.
Proceedings of the 35th IEEE International Performance Computing and Communications Conference, 2016
A Self-adaptive Hopping Approach of Moving Target Defense to thwart Scanning Attacks.
Proceedings of the Information and Communications Security - 18th International Conference, 2016
2006
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006