Weiwei Liu

Orcid: 0000-0001-7353-9136

Affiliations:
  • Nanjing University of Science and Technology, School of Automation, China (PhD 2015)


According to our database1, Weiwei Liu authored at least 29 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
M2VT-IDS: A multi-task multi-view learning architecture for designing IoT intrusion detection system.
Internet Things, April, 2024

2023
A deep learning-based framework to identify and characterise heterogeneous secure network traffic.
IET Inf. Secur., March, 2023

2021
Detecting Multielement Algorithmically Generated Domain Names Based on Adaptive Embedding Model.
Secur. Commun. Networks, 2021

N-Gram, Semantic-Based Neural Network for Mobile Malware Network Traffic Detection.
Secur. Commun. Networks, 2021

Optimal attack strategy selection of an autonomous cyber-physical micro-grid based on attack-defense game model.
J. Ambient Intell. Humaniz. Comput., 2021

Design a Wireless Covert Channel Based on Dither Analog Chaotic Code.
Int. J. Digit. Crime Forensics, 2021

A correlation-based approach to detecting wireless physical covert channels.
Comput. Commun., 2021

VoIP Traffic Detection in Tunneled and Anonymous Networks Using Deep Learning.
IEEE Access, 2021

Application Behavior Identification in DNS Tunnels Based on Spatial-Temporal Information.
IEEE Access, 2021

2020
Exploiting Correlation Characteristics to Detect Covert digital communication.
KSII Trans. Internet Inf. Syst., 2020

Prospect Theoretic Study of Honeypot Defense Against Advanced Persistent Threats in Power Grid.
IEEE Access, 2020

Mimicking Ship-Radiated Noise With Chaos Signal for Covert Underwater Acoustic Communication.
IEEE Access, 2020

2019
Detecting Word-Based Algorithmically Generated Domains Using Semantic Analysis.
Symmetry, 2019

An end-to-end generative network for environmental sound-based covert communication.
Multim. Tools Appl., 2019

Designing Rich-Secure Network Covert Timing Channels Based on Nested Lattices.
KSII Trans. Internet Inf. Syst., 2019

2018
Using Insider Swapping of Time Intervals to Perform Highly Invisible Network Flow Watermarking.
Secur. Commun. Networks, 2018

A Wireless Covert Channel Based on Constellation Shaping Modulation.
Secur. Commun. Networks, 2018

Sound Texture Generative Model Guided by a Lossless Mel-Frequency Convolutional Neural Network.
IEEE Access, 2018

A Comprehensive Analysis of Interval Based Network Flow Watermarking.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
Detection of Jitterbug Covert Channel Based on Partial Entropy Test.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2016
Designing Analog Fountain Timing Channels: Undetectability, Robustness, and Model-Adaptation.
IEEE Trans. Inf. Forensics Secur., 2016

Matrix embedding in multicast steganography: analysis in privacy, security and immediacy.
Secur. Commun. Networks, 2016

Novel Covert Timing Channels Implemented over Multiple Flows by Using Space-Time Trellis Codes.
J. Inf. Hiding Multim. Signal Process., 2016

A Construction Scheme of Steganographic Codes Based on Matrix Unwrapping.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

2015
Damage-resistance matrix embedding framework: the contradiction between robustness and embedding efficiency.
Secur. Commun. Networks, 2015

2014
Adaptive steganography based on block complexity and matrix embedding.
Multim. Syst., 2014

Alternative Syndrome-Trellis Codes With Reduced Trellis Complexity.
J. Inf. Hiding Multim. Signal Process., 2014

Syndrome trellis codes based on minimal span generator matrix.
Ann. des Télécommunications, 2014

2011
An adaptive matrix embedding based on LSB matching for grey-scale images.
Int. J. Multim. Intell. Secur., 2011


  Loading...