Xiaolei Liu

Orcid: 0000-0001-8510-4025

Affiliations:
  • University of Electronic Science and Technology of China, Chengdu, China
  • China Academy of Engineering Physics, Mianyang, China


According to our database1, Xiaolei Liu authored at least 31 papers between 2016 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Anti-Attack Intrusion Detection Model Based on MPNN and Traffic Spatiotemporal Characteristics.
J. Grid Comput., December, 2023

Launching a Robust Backdoor Attack under Capability Constrained Scenarios.
CoRR, 2023

Sparse Black-Box Inversion Attack with Limited Information.
Proceedings of the IEEE International Conference on Acoustics, 2023

2022
IBD: An Interpretable Backdoor-Detection Method via Multivariate Interactions.
Sensors, 2022

A Novel Steganography Method for Character-Level Text Image Based on Adversarial Attacks.
Sensors, 2022

Automatic Selection Attacks Framework for Hard Label Black-Box Models.
Proceedings of the IEEE INFOCOM 2022, 2022

Targeted Anonymization: A Face Image Anonymization Method for Unauthorized Models.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

Sparse Adversarial Attack For Video Via Gradient-Based Keyframe Selection.
Proceedings of the IEEE International Conference on Acoustics, 2022

2021
Compiler-Based Efficient CNN Model Construction for 5G Edge Devices.
IEEE Trans. Intell. Transp. Syst., 2021

HTTP-Based APT Malware Infection Detection Using URL Correlation Analysis.
Secur. Commun. Networks, 2021

A Hybrid Association Rule-Based Method to Detect and Classify Botnets.
Secur. Commun. Networks, 2021

Research on information steganography based on network data stream.
Neural Comput. Appl., 2021

A low-query black-box adversarial attack based on transferability.
Knowl. Based Syst., 2021

Transaction-based classification and detection approach for Ethereum smart contract.
Inf. Process. Manag., 2021

2020
Tracking the Insider Attacker: A Blockchain Traceability System for Insider Threats.
Sensors, 2020

Research and Analysis of Electromagnetic Trojan Detection Based on Deep Learning.
Secur. Commun. Networks, 2020

An equalisation control method for network big data transmission based on parallel computing.
Int. J. Internet Protoc. Technol., 2020

A Black-Box Attack on Neural Networks Based on Swarm Evolutionary Algorithm.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020

Weighted-Sampling Audio Adversarial Example Attack.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Adversarial Samples on Android Malware Detection Systems for IoT Systems.
Sensors, 2019

Integrating Traffics with Network Device Logs for Anomaly Detection.
Secur. Commun. Networks, 2019

An Insider Threat Detection Approach Based on Mouse Dynamics and Deep Learning.
Secur. Commun. Networks, 2019

A Lockable Abnormal Electromagnetic Signal Joint Detection Algorithm.
Int. J. Pattern Recognit. Artif. Intell., 2019

Network Intrusion Feature Map Node Equalization Algorithm Based on Modified Variable Step-Size Constant Modulus.
Int. J. Pattern Recognit. Artif. Intell., 2019

Adversarial Samples on Android Malware Detection Systems for IoT Systems.
CoRR, 2019

Adversarial attack on Speech-to-Text Recognition Models.
CoRR, 2019

A Black-box Attack on Neural Networks Based on Swarm Evolutionary Algorithm.
CoRR, 2019

Adversarial attacks against profile HMM website fingerprinting detection model.
Cogn. Syst. Res., 2019

Evolution-algorithm-based unmanned aerial vehicles path planning in complex environment.
Comput. Electr. Eng., 2019

2018
TLTD: A Testing Framework for Learning-Based IoT Traffic Detection Systems.
Sensors, 2018

2016
Modified t-Distribution Evolutionary Algorithm for Dynamic Deployment of Wireless Sensor Networks.
IEICE Trans. Inf. Syst., 2016


  Loading...