Guangjie Liu
Orcid: 0000-0003-4729-7406
According to our database1,
Guangjie Liu
authored at least 95 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
MDTrans: Multi-scale and dual-branch feature fusion network based on Swin Transformer for building extraction in remote sensing images.
IET Image Process., September, 2024
UAV-Enabled Communication Strategy Against Detection in Covert Communication With Asymmetric Information.
IEEE Trans. Wirel. Commun., July, 2024
IEEE Trans. Cogn. Commun. Netw., June, 2024
M2VT-IDS: A multi-task multi-view learning architecture for designing IoT intrusion detection system.
Internet Things, April, 2024
Optimal Position Design for Unmanned Aerial Vehicle Relay-Assisted Covert Communication Based on Active Countermeasures.
IEEE Syst. J., March, 2024
Short-Term Passenger Flow Prediction in Urban Rail Transit Based on Points of Interest.
IEEE Access, 2024
Proceedings of the International Conference on Computer Vision and Deep Learning, 2024
2023
A UAV-Assisted Secure Communication System by Jointly Optimizing Transmit Power and Trajectory in the Internet of Things.
IEEE Trans. Green Commun. Netw., December, 2023
Energy Consumption Minimization in Unmanned Aerial Vehicle-Enabled Secure Wireless Sensor Networks.
Sensors, December, 2023
IEEE Trans. Veh. Technol., June, 2023
A deep learning-based framework to identify and characterise heterogeneous secure network traffic.
IET Inf. Secur., March, 2023
IEEE Trans. Inf. Forensics Secur., 2023
Securing Network Traffic Classification Models against Adversarial Examples Using Derived Variables.
Future Internet, 2023
2022
Multim. Tools Appl., 2022
Directional crossover slime mould algorithm with adaptive Lévy diversity for the optimal design of real-world problems.
J. Comput. Des. Eng., 2022
J. Inf. Secur. Appl., 2022
Intradialytic hypotension prediction using covariance matrix-driven whale optimizer with orthogonal structure-assisted extreme learning machine.
Frontiers Neuroinformatics, 2022
SPOC Project Teaching Research based on STEAM Education Concept : - - Takes the secondary vocational school "Data Structure" course as an example.
Proceedings of the IEEE Intl. Conf. on Dependable, 2022
2021
Contract-Based Incentive Mechanisms for Honeypot Defense in Advanced Metering Infrastructure.
IEEE Trans. Smart Grid, 2021
Detecting Multielement Algorithmically Generated Domain Names Based on Adaptive Embedding Model.
Secur. Commun. Networks, 2021
Secur. Commun. Networks, 2021
Route Optimization Algorithm Based on Game Theory for Tourism Routes at Pseudo-Imperial Palace.
J. Inf. Process. Syst., 2021
Optimal attack strategy selection of an autonomous cyber-physical micro-grid based on attack-defense game model.
J. Ambient Intell. Humaniz. Comput., 2021
J. Inf. Secur. Appl., 2021
Honeypot Detection Strategy Against Advanced Persistent Threats in Industrial Internet of Things: A Prospect Theoretic Game.
IEEE Internet Things J., 2021
Int. J. Digit. Crime Forensics, 2021
Comput. Commun., 2021
IEEE Access, 2021
Application Behavior Identification in DNS Tunnels Based on Spatial-Temporal Information.
IEEE Access, 2021
Proceedings of the 16th International Conference on Computer Science & Education, 2021
2020
KSII Trans. Internet Inf. Syst., 2020
Image splicing detection based on convolutional neural network with weight combination strategy.
J. Inf. Secur. Appl., 2020
Detecting Stealthy Domain Generation Algorithms Using Heterogeneous Deep Neural Network Framework.
IEEE Access, 2020
Prospect Theoretic Study of Honeypot Defense Against Advanced Persistent Threats in Power Grid.
IEEE Access, 2020
IEEE Access, 2020
Mimicking Ship-Radiated Noise With Chaos Signal for Covert Underwater Acoustic Communication.
IEEE Access, 2020
2019
Symmetry, 2019
Remote-Sensing Monitoring of Grassland Degradation Based on the GDI in Shangri-La, China.
Remote. Sens., 2019
Multim. Tools Appl., 2019
KSII Trans. Internet Inf. Syst., 2019
2018
Using Insider Swapping of Time Intervals to Perform Highly Invisible Network Flow Watermarking.
Secur. Commun. Networks, 2018
Secur. Commun. Networks, 2018
J. Inf. Hiding Multim. Signal Process., 2018
Sound Texture Generative Model Guided by a Lossless Mel-Frequency Convolutional Neural Network.
IEEE Access, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
2017
Proceedings of the Cloud Computing and Security - Third International Conference, 2017
2016
Designing Analog Fountain Timing Channels: Undetectability, Robustness, and Model-Adaptation.
IEEE Trans. Inf. Forensics Secur., 2016
Secur. Commun. Networks, 2016
Matrix embedding in multicast steganography: analysis in privacy, security and immediacy.
Secur. Commun. Networks, 2016
Novel Covert Timing Channels Implemented over Multiple Flows by Using Space-Time Trellis Codes.
J. Inf. Hiding Multim. Signal Process., 2016
Detection and Parameter Estimation for Jitterbug Covert Channel Based on Coefficient of Variation.
KSII Trans. Internet Inf. Syst., 2016
Proceedings of the Cloud Computing and Security - Second International Conference, 2016
2015
Damage-resistance matrix embedding framework: the contradiction between robustness and embedding efficiency.
Secur. Commun. Networks, 2015
基于信任的反馈云模型WSN节点信任评价机制 (Trust Evaluation Mechanism for Nodes Based on Adaptive Cloud Model in Wireless Sensor Network).
计算机科学, 2015
一种基于递归图的网络时间隐蔽信道检测方法 (Approach Based on Recurrence Plot to Detect Covert Timing Channels).
计算机科学, 2015
基于Snort的Modbus TCP工控协议异常数据检测规则设计 (Design of Modbus TCP Industrial Control Network Protocol Abnormal Data Detection Rules Based on Snort).
计算机科学, 2015
J. Inf. Hiding Multim. Signal Process., 2015
J. Inf. Hiding Multim. Signal Process., 2015
J. Inf. Hiding Multim. Signal Process., 2015
Proceedings of the 2015 International Conference on Control, 2015
Proceedings of the 2015 International Conference on Control, 2015
Proceedings of the 2015 International Conference on Control, 2015
Proceedings of the 23rd International Conference on Geoinformatics, 2015
2014
Authenticating topological integrity of process plant models through digital watermarking.
Multim. Tools Appl., 2014
Multim. Syst., 2014
J. Networks, 2014
J. Inf. Hiding Multim. Signal Process., 2014
Ann. des Télécommunications, 2014
2013
J. Networks, 2013
2012
2011
A passive image authentication scheme for detecting region-duplication forgery with rotation.
J. Netw. Comput. Appl., 2011
Int. J. Multim. Intell. Secur., 2011
2010
J. Multim., 2010
Copyright Protecting Using The Secure Visible Removable Watermarking In JPEG Compression.
J. Digit. Content Technol. its Appl., 2010
J. Convergence Inf. Technol., 2010
Proceedings of the Entertainment for Education. Digital Techniques and Systems, 2010
2009
2008
Signal Process., 2008
Multim. Tools Appl., 2008
J. Electronic Imaging, 2008
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008
Optimum Decoder for Barni's Multiplicative Watermarking Based on Minimum Bayesian Risk Criterion.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008
Assessment of Integrated Electronic Information System survivability based on u-function.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008
2007
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007
2006
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006
2005
Proceedings of the IEEE 7th Workshop on Multimedia Signal Processing, 2005
On Sequence Synchronization Analysis Against Chaos Based Spread Spectrum Image Steganography.
Proceedings of the Advances in Natural Computation, First International Conference, 2005