Chuanyi Liu
Orcid: 0000-0001-8237-8979
According to our database1,
Chuanyi Liu
authored at least 93 papers
between 2008 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
IEEE Robotics Autom. Lett., February, 2025
2024
Adaptive scheduling-based fine-grained greybox fuzzing for cloud-native applications.
J. Cloud Comput., December, 2024
Tibetan-BERT-wwm: A Tibetan Pretrained Model With Whole Word Masking for Text Classification.
IEEE Trans. Comput. Soc. Syst., October, 2024
IEEE Trans. Artif. Intell., February, 2024
TopicAns: Topic-informed Architecture for Answer Recommendation on Technical Q&A Site.
ACM Trans. Softw. Eng. Methodol., January, 2024
IACR Cryptol. ePrint Arch., 2024
Generative data augmentation with differential privacy for non-IID problem in decentralized clinical machine learning.
Future Gener. Comput. Syst., 2024
State-of-the-art optical-based physical adversarial attacks for deep learning computer vision systems.
Expert Syst. Appl., 2024
CoRR, 2024
CoRR, 2024
First-principles Based 3D Virtual Simulation Testing for Discovering SOTIF Corner Cases of Autonomous Driving.
CoRR, 2024
FRBBM-Scheme: A Flexible Ratio Virtual Primary Key Generation Approach Based on Binary Matching.
Proceedings of the Intelligent Information Processing XII, 2024
FEDKA: Federated Knowledge Augmentation for Multi-Center Medical Image Segmentation on non-IID Data.
Proceedings of the IEEE International Conference on Acoustics, 2024
Enhancing Text-to-SQL Parsing through Question Rewriting and Execution-Guided Refinement.
Proceedings of the Findings of the Association for Computational Linguistics, 2024
ZO-AdaMU Optimizer: Adapting Perturbation by the Momentum and Uncertainty in Zeroth-Order Optimization.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
IEEE Trans. Reliab., September, 2023
Int. J. Mach. Learn. Cybern., March, 2023
Entropy, January, 2023
IEEE Trans. Serv. Comput., 2023
Appl. Soft Comput., 2023
Cross-Task Physical Adversarial Attack Against Lane Detection System Based on LED Illumination Modulation.
Proceedings of the Pattern Recognition and Computer Vision - 6th Chinese Conference, 2023
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023
2022
IEEE Trans. Emerg. Top. Comput. Intell., 2022
Bi-TCCS: Trustworthy Cloud Collaboration Service Scheme Based on Bilateral Social Feedback.
IEEE Trans. Cloud Comput., 2022
Fed-DR-Filter: Using global data representation to reduce the impact of noisy labels on the performance of federated learning.
Future Gener. Comput. Syst., 2022
CoRR, 2022
FBIPT: A New Robust Reversible Database Watermarking Technique Based on Position Tuples.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022
Generative Data Augmentation for Non-IID Problem in Decentralized Clinical Machine Learning.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022
Towards Privacy-Preserving Computation on Gene: Construct Covid-19 Phylogenetic Tree using Homomorphic Encryption.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022
2021
Int. J. Mach. Learn. Cybern., 2021
Node-Fusion: Topology-aware virtual network embedding algorithm for repeatable virtual network mapping over substrate nodes.
Concurr. Comput. Pract. Exp., 2021
Clust. Comput., 2021
An efficient general black-box adversarial attack approach based on multi-objective optimization for high dimensional images.
Comput. Electr. Eng., 2021
Reconstruct Anomaly to Normal: Adversarially Learned and Latent Vector-Constrained Autoencoder for Time-Series Anomaly Detection.
Proceedings of the PRICAI 2021: Trends in Artificial Intelligence, 2021
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021
Proceedings of the Cyber Security - 18th China Annual Conference, 2021
2020
An adaptive heuristic for managing energy consumption and overloaded hosts in a cloud data center.
Wirel. Networks, 2020
The Design of Fast Content-Defined Chunking for Data Deduplication Based Storage Systems.
IEEE Trans. Parallel Distributed Syst., 2020
IEEE Trans. Cloud Comput., 2020
Fast, Resource-Saving, and Anti-Collaborative Attack Trust Computing Scheme Based on Cross-Validation for Clustered Wireless Sensor Networks.
Sensors, 2020
Pattern Recognit. Lett., 2020
CloudDLP: Transparent and Scalable Data Sanitization for Browser-Based Cloud Storage.
IEEE Access, 2020
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020
From One-hot Encoding to Privacy-preserving Synthetic Electronic Health Records Embedding.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020
2019
Pattern Recognit. Lett., 2019
Proceedings of the Human-Computer Interaction - INTERACT 2019, 2019
Proceedings of the ICITEE-2019: 2nd International Conference on Information Technologies and Electrical Engineering, 2019
An Adversarial Attack Based on Multi-objective Optimization in the Black-Box Scenario: MOEA-APGA II.
Proceedings of the Information and Communications Security - 21st International Conference, 2019
Smart-Scrolling: Improving Information Access Performance in Linear Layout Views for Small-Screen Devices.
Proceedings of the Intelligent Computing Theories and Application, 2019
Proceedings of the Intelligent Computing Methodologies - 15th International Conference, 2019
CloudDLP: Transparent and Automatic Data Sanitization for Browser-Based Cloud Storage.
Proceedings of the 28th International Conference on Computer Communication and Networks, 2019
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019
FileCrypt: Transparent and Scalable Protection of Sensitive Data in Browser-based Cloud Storage.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019
2018
IEEE Access, 2018
Leakage Models and Inference Attacks on Searchable Encryption for Cyber-Physical Social Systems.
IEEE Access, 2018
Proceedings of the 2018 IEEE International Conference on Software Maintenance and Evolution, 2018
Proceedings of the Intelligent Computing Methodologies - 14th International Conference, 2018
Find the 'Lost' Cursor: A Comparative Experiment of Visually Enhanced Cursor Techniques.
Proceedings of the Intelligent Computing Theories and Application, 2018
Automatically Crawling Dynamic Web Applications via Proxy-Based JavaScript Injection and Runtime Analysis.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
2017
Proceedings of the International Conference on Security, Pattern Analysis, and Cybernetics, 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
Proceedings of the 2017 International Conference on Computing, 2017
2016
Revisiting the Practicality of Search on Encrypted Data: From the Security Broker's Perspective.
Sci. Program., 2016
IEICE Trans. Commun., 2016
Proceedings of the Advances in Swarm Intelligence, 7th International Conference, 2016
2015
IEICE Trans. Inf. Syst., 2015
2014
An Accident Severity Classification Model Based on Multi-Objective Particle Swarm Optimization.
IEICE Trans. Inf. Syst., 2014
IEICE Trans. Inf. Syst., 2014
Proceedings of the Trustworthy Computing and Services - International Conference, 2014
POSTER: TraceVirt: A Framework for Detecting the Non-tampering Attacks in the Virtual Machine.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Detecting the run time attacks in the cloud with an evidence collection based approach.
Proceedings of the IEEE 3rd International Conference on Cloud Computing and Intelligence Systems, 2014
2013
IEICE Trans. Inf. Syst., 2013
IEICE Trans. Inf. Syst., 2013
Transparency and Semantics Coexist: When Malware Analysis Meets the Hardware Assisted Virtualization.
Proceedings of the Trustworthy Computing and Services, 2013
Proceedings of the 2013 IEEE Global Communications Conference, 2013
2012
Int. J. Wirel. Mob. Comput., 2012
IEICE Trans. Inf. Syst., 2012
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012
2009
Proceedings of the Human-Computer Interaction, 2009
R-ADMAD: high reliability provision for large-scale de-duplication archival storage systems.
Proceedings of the 23rd international conference on Supercomputing, 2009
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009
2008
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2008
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008
Proceedings of the 13th Asia-Pacific Computer Systems Architecture Conference, 2008