Wenmao Liu

Orcid: 0009-0000-2046-5305

According to our database1, Wenmao Liu authored at least 32 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Multivariate time series anomaly detection by fusion of deep convolution residual autoencoding reconstruction model and ConvLstm forecasting model.
Comput. Secur., February, 2024

BABD: A Bitcoin Address Behavior Dataset for Pattern Analysis.
IEEE Trans. Inf. Forensics Secur., 2024

2023
Signed directed attention network.
Computing, August, 2023

Who is DNS serving for? A human-software perspective of modeling DNS services.
Knowl. Based Syst., March, 2023

Unsupervised Graph-Sequence Anomaly Detection for 5G Core Network Control Plane Traffic.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

2022
Inferring Hidden IoT Devices and User Interactions via Spatial-Temporal Traffic Fingerprinting.
IEEE/ACM Trans. Netw., 2022

Real-Time Prediction of Docker Container Resource Load Based on a Hybrid Model of ARIMA and Triple Exponential Smoothing.
IEEE Trans. Cloud Comput., 2022

Towards time evolved malware identification using two-head neural network.
J. Inf. Secur. Appl., 2022

Context2Vector: Accelerating security event triage via context representation learning.
Inf. Softw. Technol., 2022

MDCD: A malware detection approach in cloud using deep learning.
Trans. Emerg. Telecommun. Technol., 2022

BABD: A Bitcoin Address Behavior Dataset for Address Behavior Pattern Analysis.
CoRR, 2022

Using honeypots to model botnet attacks on the internet of medical things.
Comput. Electr. Eng., 2022

Threat identification model for suspected Internet of Things attack groups.
Proceedings of the International Conference on Service Science, 2022

Landing Reinforcement Learning onto Smart Scanning of The Internet of Things.
Proceedings of the IEEE INFOCOM 2022, 2022

Influence of Rotor Damping Bars on Rotor Temperature Rise of Synchronous Condenser after Single-Phase Short-Circuit Fault.
Proceedings of the IEEE Industry Applications Society Annual Meeting, 2022

An Illicit Bitcoin Address Analysis Scheme Based on Subgraph Evolution.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

2021
An Evolutionary Study of IoT Malware.
IEEE Internet Things J., 2021

MDCHD: A novel malware detection method in cloud using hardware trace and deep learning.
Comput. Networks, 2021

One Host with So Many IPs! On The Security Implications of Dynamic Virtual Private Servers.
IEEE Commun. Mag., 2021

Security Challenges in the Container Cloud.
Proceedings of the 3rd IEEE International Conference on Trust, 2021

Caps-LSTM: A Novel Hierarchical Encrypted VPN Network Traffic Identification Using CapsNet and LSTM.
Proceedings of the Science of Cyber Security - Third International Conference, 2021

Analyzing Learning-based Encrypted Malware Traffic Classification with AutoML.
Proceedings of the 21st International Conference on Communication Technology, 2021

Internet of Things Attack Group Identification Model Combined with Spectral Clustering.
Proceedings of the 21st International Conference on Communication Technology, 2021

Querent-centric Domain Name System Modeling and Its Application in Passive Software Discovery.
Proceedings of the 8th International Conference on Dependable Systems and Their Applications, 2021

2020
Influence of a Novel Stator Teeth Internal Ventilation Structure on Air-Cooled Turbo-Generator Parameters and Stator Temperature.
IEEE Access, 2020

CMIRGen: Automatic Signature Generation Algorithm for Malicious Network Traffic.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Far from classification algorithm: dive into the preprocessing stage in DGA detection.
Proceedings of the 19th IEEE International Conference on Trust, 2020

2019
Defending Against Data Integrity Attacks in Smart Grid: A Deep Reinforcement Learning-Based Approach.
IEEE Access, 2019

A Combined Micro-block Chain Truncation Attack on Bitcoin-NG.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
An Insider Threat Detection Method Based on User Behavior Analysis.
Proceedings of the Intelligent Information Processing IX, 2018

2014
Defending sybil attacks in mobile social networks.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

2010
A General Distributed Object Locating Architecture in the Internet of Things.
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010


  Loading...