Zhaoli Liu

Orcid: 0000-0003-4981-9589

According to our database1, Zhaoli Liu authored at least 24 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Quantitative Determination of the Optimal Scale for the Proportion of Saline-Alkali Patches of Soda Saline-Alkali Land in Northeast China.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2024

2023
DDoS Attack Detection Method using Entropy and Attention-based BiGRU.
Proceedings of the International Conference on Human-Centered Cognitive Systems, 2023

2022
Three Birds With One Stone: User Intention Understanding and Influential Neighbor Disclosure for Injection Attack Detection.
IEEE Trans. Inf. Forensics Secur., 2022

SIRQU: Dynamic Quarantine Defense Model for Online Rumor Propagation Control.
IEEE Trans. Comput. Soc. Syst., 2022

Rating behavior evaluation and abnormality forensics analysis for injection attack detection.
J. Intell. Inf. Syst., 2022

High-quality tweet generation for online behavior security management based on semantics measurement.
Trans. Emerg. Telecommun. Technol., 2022

2021
Locality Constrained Analysis Dictionary Learning via K-SVD Algorithm.
CoRR, 2021

Low-Rank Orthonormal Analysis Dictionary Learning for Image Classification.
Proceedings of the PRICAI 2021: Trends in Artificial Intelligence, 2021

IIS: Intelligent Identification Scheme of Massive IoT Devices.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

2020
Symmetry Degree Measurement and its Applications to Anomaly Detection.
IEEE Trans. Inf. Forensics Secur., 2020

A Two-Stagse Approach for Social Identity Linkage Based on an Enhanced Weighted Graph Model.
Mob. Networks Appl., 2020

Fined-grained Aspect Extraction from Online Reviews for Decision Support.
Proceedings of the 19th IEEE International Conference on Trust, 2020

2018
Potential threats mining methods based on correlation analysis of multi-type logs.
IET Networks, 2018

An Integrated Method for Anomaly Detection From Massive System Logs.
IEEE Access, 2018

Behavior Rhythm: A New Model for Behavior Visualization and Its Application in System Security Management.
IEEE Access, 2018

2017
A Variant of Clark's Theorem and Its Applications for Nonsmooth Functionals without the Palais-Smale Condition.
SIAM J. Math. Anal., 2017

2016
Simulation of the Impact of a Sensor's PSF on Mixed Pixel Decomposition: 1. Nonuniformity Effect.
Remote. Sens., 2016

A new model for nickname detection based on network structure and similarity propagation.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

2015
MUCM: Multilevel User Cluster Mining Based on Behavior Profiles for Network Monitoring.
IEEE Syst. J., 2015

Robust application identification methods for P2P and VoIP traffic classification in backbone networks.
Knowl. Based Syst., 2015

Alias Detection Across Multi-online Applications Based on User's Behavior Characteristics.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

2012
Behavior spectrum: An effective method for user's web access behavior monitoring and measurement.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2004
Progress in studies on automated generalization of spatial point cluster.
Proceedings of the 2004 IEEE International Geoscience and Remote Sensing Symposium, 2004

2002
Perturbations of symmetric eigenvalue problems.
Appl. Math. Lett., 2002


  Loading...