Yuling Liu

Orcid: 0000-0002-2740-9362

According to our database1, Yuling Liu authored at least 92 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Unveiling shadows: A comprehensive framework for insider threat detection based on statistical and sequential analysis.
Comput. Secur., March, 2024

Unveiling encrypted traffic types through hierarchical network characteristics.
Comput. Secur., March, 2024

A Novel Automatic Registration Method for Array InSAR Point Clouds in Urban Scenes.
Remote. Sens., February, 2024

E-DoH: Elegantly Detecting the Depths of Open DoH Service on the Internet.
CoRR, 2024

2023
Detecting compromised email accounts via login behavior characterization.
Cybersecur., December, 2023

Aparecium: understanding and detecting scam behaviors on Ethereum via biased random walk.
Cybersecur., December, 2023

Assessment of gridded datasets of various near surface temperature variables over Heihe River Basin: Uncertainties, spatial heterogeneity and clear-sky bias.
Int. J. Appl. Earth Obs. Geoinformation, June, 2023

CNN-BiLSTM-Attention: A multi-label neural classifier for short texts with a small set of labels.
Inf. Process. Manag., May, 2023

CBSeq: A Channel-Level Behavior Sequence for Encrypted Malware Traffic Detection.
IEEE Trans. Inf. Forensics Secur., 2023

Assessing the Reliability of the MODIS LST Product to Detect Temporal Variability.
IEEE Geosci. Remote. Sens. Lett., 2023

HANDOM: Heterogeneous Attention Network Model for Malicious Domain Detection.
Comput. Secur., 2023

C-BEDIM and S-BEDIM: Lateral movement detection in enterprise network through behavior deviation measurement.
Comput. Secur., 2023

Global Daily VIIRS LST Product Quality Evaluation and Applications.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2023

A Fast Gradient Boosting Based Approach for Predicting Frags in Tactic Games.
Proceedings of the IEEE International Conference on Multimedia and Expo Workshops, 2023

TAElog: A Novel Transformer AutoEncoder-Based Log Anomaly Detection Method.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

2022
Efficient maintenance for maximal bicliques in bipartite graph streams.
World Wide Web, 2022

Optimization design and research of simulation system for urban green ecological rainwater by genetic algorithm.
J. Supercomput., 2022

Finite-frequency self-triggered model predictive control for Markov jump systems subject to actuator saturation.
Trans. Inst. Meas. Control, 2022

Ten Years of VIIRS Land Surface Temperature Product Validation.
Remote. Sens., 2022

Generative Linguistic Steganography: A Comprehensive Review.
KSII Trans. Internet Inf. Syst., 2022

A parameter-free approach to lossless summarization of fully dynamic graphs.
Inf. Sci., 2022

Moving target defense of routing randomization with deep reinforcement learning against eavesdropping attack.
Digit. Commun. Networks, 2022

Blockchain abnormal behavior awareness methods: a survey.
Cybersecur., 2022

PUMD: a PU learning-based malicious domain detection framework.
Cybersecur., 2022

S_I_LSTM: stock price prediction based on multiple data sources and sentiment analysis.
Connect. Sci., 2022

DCC-Find: DNS Covert Channel Detection by Features Concatenation-Based LSTM.
Proceedings of the IEEE International Conference on Trust, 2022

CapsITD: Malicious Insider Threat Detection Based on Capsule Neural Network.
Proceedings of the Security and Privacy in Communication Networks, 2022

Review on Intelligent Processing Technologies of Legal Documents.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

DGGCN: Dictionary based DGA detection method based on DomainGraph and GCN.
Proceedings of the 31st International Conference on Computer Communications and Networks, 2022

An Approach for Predicting the Costs of Forwarding Contracts using Gradient Boosting.
Proceedings of the 17th Conference on Computer Science and Intelligence Systems, 2022

2021
An Adaptive IP Hopping Approach for Moving Target Defense Using a Light-Weight CNN Detector.
Secur. Commun. Networks, 2021

Blockchain-Based Cloud Data Integrity Verification Scheme with High Efficiency.
Secur. Commun. Networks, 2021

Driver Fatigue Detection Based on Facial Key Points and LSTM.
Secur. Commun. Networks, 2021

An Improved Coverless Text Steganography Algorithm Based on Pretreatment and POS.
KSII Trans. Internet Inf. Syst., 2021

BEDIM: Lateral Movement Detection In Enterprise Network Through Behavior Deviation Measurement.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

A Parameter-Free Approach for Lossless Streaming Graph Summarization.
Proceedings of the Database Systems for Advanced Applications, 2021

WP-GBDT: An Approach for Winner Prediction using Gradient Boosting Decision Tree.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2020
Optimal Decision Making Approach for Cyber Security Defense Using Evolutionary Game.
IEEE Trans. Netw. Serv. Manag., 2020

A Two-Step Denoising Strategy for Early-Stage Fault Diagnosis of Rolling Bearings.
IEEE Trans. Instrum. Meas., 2020

Land Surface Emissivity Product for NOAA JPSS and GOES-R Missions: Methodology and Evaluation.
IEEE Trans. Geosci. Remote. Sens., 2020

Confusing-Keyword Based Secure Search over Encrypted Cloud Data.
Mob. Networks Appl., 2020

基于通信信号时频特性的卷积神经网络调制识别 (Convolutional Neural Networks Based on Time-Frequency Characteristics for Modulation Classification).
计算机科学, 2020

Attack scenario reconstruction approach using attack graph and alert data mining.
J. Inf. Secur. Appl., 2020

Multi-keywords carrier-free text steganography method based on Chinese Pinyin.
Int. J. Comput. Sci. Eng., 2020

Fleet-Level Selective Dispatch and Imperfect Maintenance Strategy Optimization Based on Evolutionary Co-Petition Game Theory.
IEEE Access, 2020

STIDM: A Spatial and Temporal Aware Intrusion Detection Model.
Proceedings of the 19th IEEE International Conference on Trust, 2020

MTLAT: A Multi-Task Learning Framework Based on Adversarial Training for Chinese Cybersecurity NER.
Proceedings of the Network and Parallel Computing, 2020

NOAA20 and S-NPP VIIRS Land Surface Temperature Product Validation and Inter-Comparison.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2020

Social Recommendation in Heterogeneous Evolving Relation Network.
Proceedings of the Computational Science - ICCS 2020, 2020

2019
Pseudo-Random Encryption for Security Data Transmission in Wireless Sensor Networks.
Sensors, 2019

Enterprise LST Algorithm Development and Its Evaluation with NOAA 20 Data.
Remote. Sens., 2019

Improved schemes for visual secret sharing based on random grids.
Multim. Tools Appl., 2019

Isolation and Identification of Compound Faults in Rotating Machinery via Adaptive Deep Filtering Technique.
IEEE Access, 2019

Coverless Information Hiding Method Based on Web Text.
IEEE Access, 2019

Transient Dynamics and Electric Power Estimation of Bistable Energy Harvesters Under Impulsive Excitations.
IEEE Access, 2019

Review on Text Watermarking Resistant to Print-Scan, Screen-Shooting.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

2018
Optimal probabilistic encryption for distributed detection in wireless sensor networks based on immune differential evolution algorithm.
Wirel. Networks, 2018

An Adaptive Audio Steganography for Covert Wireless Communication.
Secur. Commun. Networks, 2018

Security Metric Methods for Network Multistep Attacks Using AMC and Big Data Correlation Analysis.
Secur. Commun. Networks, 2018

Path planning and energy flow control of wireless power transfer for sensor nodes in wireless sensor networks.
Turkish J. Electr. Eng. Comput. Sci., 2018

Optimal Network Defense Strategy Selection Based on Incomplete Information Evolutionary Game.
IEEE Access, 2018

Text Coverless Information Hiding Based on Word2vec.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
Quantitative Method for Network Security Situation Based on Attack Prediction.
Secur. Commun. Networks, 2017

A bidirectional wireless power transfer system for an electric vehicle with a relay circuit.
Turkish J. Electr. Eng. Comput. Sci., 2017

Multi-keywords carrier-free text steganography based on part of speech tagging.
Proceedings of the 13th International Conference on Natural Computation, 2017

Sentiment Analysis with Improved Adaboost and Transfer Learning Based on Gaussian Process.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2016
A ROI-based reversible data hiding scheme in encrypted medical images.
J. Vis. Commun. Image Represent., 2016

一种社交网络Sybil用户检测方法 (Compound Approach for Sybil Users Detection in Social Networks).
计算机科学, 2016

Ground validation and uncertainty esitmation of VIIRS land surface temperature product.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

A Lattice-Based Access Control Model for Social Networks.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2016

2015
Quality Assessment of S-NPP VIIRS Land Surface Temperature Product.
Remote. Sens., 2015

Intelligent traffic signal controller based on type-2 fuzzy logic and NSGAII.
J. Intell. Fuzzy Syst., 2015

ROI-Based Reversible Data Hiding Scheme for Medical Images with Tamper Detection.
IEICE Trans. Inf. Syst., 2015

Read Clouds Uncover Variation in Complex Regions of the Human Genome.
Proceedings of the Research in Computational Molecular Biology, 2015

An Improved Method for Reversible Data Hiding in Encrypted Image.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
Timing-Based Clone Detection on Android Markets.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

2013
Effect of Different MODIS Emissivity Products on Land-Surface Temperature Retrieval From GOES Series.
IEEE Geosci. Remote. Sens. Lett., 2013

An ArcScene plug-in for volumetric data conversion, modeling and spatial analysis.
Comput. Geosci., 2013

Optimal Defense Strategies for DDoS Defender Using Bayesian Game Model.
Proceedings of the Information Security Practice and Experience, 2013

Cloud Model Based Zero-Watermarking Algorithm for Authentication of Text Document.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

2012
Text split-based steganography in OOXML format documents for covert communication.
Secur. Commun. Networks, 2012

2011
Forensic investigation of OOXML format documents.
Digit. Investig., 2011

Analysis of self-evacuation to rescuing process under survivability-critical states in underground flooding by vitae system based agent modeling and simulation.
Proceedings of the IEEE International Conference on Systems, 2011

2010
High quality multi-focus polychromatic composite image fusion algorithm based on filtering in frequency domain and synthesis in space domain.
J. Zhejiang Univ. Sci. C, 2010

Vitae System based agent modeling and simulation of survivability-critical evacuation in underground flooding.
Proceedings of the IEEE International Conference on Systems, 2010

2009
Natural Language Information Hiding Based on Chinese Mathematical Expression.
Int. J. Netw. Secur., 2009

2008
File-Update Based Steganography for Microsoft PowerPoint Files.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

2007
An Efficient Linguistic Steganography for Chinese Text.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

2006
3D simulation of soft geo-objects.
Int. J. Geogr. Inf. Sci., 2006

2005
A Natural Language Watermarking Based on Chinese Syntax.
Proceedings of the Advances in Natural Computation, First International Conference, 2005

Design and Analysis of a Novel Load-Balancing Model Based on Mobile Agent.
Proceedings of the Advances in Machine Learning and Cybernetics, 2005

A New Active DDoS Defense System Based on Automatic Learning.
Proceedings of the Advances in Computer Science, 2005


  Loading...