Liping Ding

According to our database1, Liping Ding authored at least 33 papers between 2005 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Trust Evaluation Strategy for Single Sign-on Solution in Cloud.
IJDCF, 2018

Reliable Security Strategy for Message-Oriented Middleware.
IJDCF, 2018

Research on Image Recognition Method Based on Deep Learning Algorithm.
Proceedings of the 15th IEEE International Conference on Advanced Video and Signal Based Surveillance, 2018

2017
Data embedding in digital images using critical functions.
Sig. Proc.: Image Comm., 2017

Building a Cost and Profit Sharing Model for an E-business Project in Rural China: a Shapely Value Approach.
Proceedings of the 16th Wuhan International Conference on E-Business, 2017

Combinatorial Testing on MP3 for Audio Players.
Proceedings of the 2017 IEEE International Conference on Software Testing, 2017

A Novel Game-Theoretic Model for Content-Adaptive Image Steganography.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017

2015
Modelling and Analysis Network Security - a PVCCS approach.
CoRR, 2015

On the general trigonometric sums weighted by character sums.
Applied Mathematics and Computation, 2015

Data Hidng in Digital Image Using Four Pixel-Value-Differencing and Multiple-Base Notational.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

Modelling and Analysis of Network Security - a Probabilistic Value-passing CCS Approach.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

2014
C2Detector: a covert channel detection framework in cloud computing.
Security and Communication Networks, 2014

Privacy-Preserving Location Assurance Protocols for Mobile Applications.
JSW, 2014

Efficient Interval Check in the Presence of Malicious Adversaries.
IACR Cryptology ePrint Archive, 2014

2013
Robust and Efficient Covert Channel Communications in Operating Systems: Design, Implementation and Evaluation.
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013

CIVSched: Communication-aware Inter-VM Scheduling in Virtual Machine Monitor Based on the Process.
Proceedings of the 13th IEEE/ACM International Symposium on Cluster, 2013

2012
Improving performance of network covert timing channel through Huffman coding.
Mathematical and Computer Modelling, 2012

On the nonexistence of nontrivial small cycles of the µ function in 3x+1 conjecture.
J. Systems Science & Complexity, 2012

VRank: A Context-Aware Approach to Vulnerability Scoring and Ranking in SOA.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

Improved Linear Analysis on Block Cipher MULTI2.
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012

XenPump: A New Method to Mitigate Timing Channel in Cloud Computing.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012

2011
Extended Probabilistic Latent Semantic Analysis Model For Topics In Time-Stamped Images.
Intelligent Automation & Soft Computing, 2011

Towards a Reliable Spam-Proof Tagging System.
Proceedings of the Fifth International Conference on Secure Software Integration and Reliability Improvement, 2011

A Practical Covert Channel Identification Approach in Source Code Based on Directed Information Flow Graph.
Proceedings of the Fifth International Conference on Secure Software Integration and Reliability Improvement, 2011

Secure Machine Learning, a Brief Overview.
Proceedings of the Fifth International Conference on Secure Software Integration and Reliability Improvement, 2011

Verifying the Safety of Xen Security Modules.
Proceedings of the Fifth International Conference on Secure Software Integration and Reliability Improvement, 2011

Synthetic Linear Analysis: Improved Attacks on CubeHash and Rabbit.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011

SecGuard: Secure and Practical Integrity Protection Model for Operating Systems.
Proceedings of the Web Technologies and Applications - 13th Asia-Pacific Web Conference, 2011

Identification and Evaluation of Sharing Memory Covert Timing Channel in Xen Virtual Machines.
Proceedings of the IEEE International Conference on Cloud Computing, 2011

2010
On Estimating Cyber Adversaries' Capabilities: A Bayesian Model Approach.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

Analysis of Telephone Call Detail Records Based on Fuzzy Decision Tree.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

Multi-objective disassembly line balancing via modified ant colony optimization algorithm.
Proceedings of the Fifth International Conference on Bio-Inspired Computing: Theories and Applications, 2010

2005
Evaluation of the Capability of Personal Software Process Based on Data Envelopment Analysis.
Proceedings of the Unifying the Software Process Spectrum, 2005


  Loading...