Guangjie Liu

Orcid: 0000-0003-4729-7406

According to our database1, Guangjie Liu authored at least 95 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
MDTrans: Multi-scale and dual-branch feature fusion network based on Swin Transformer for building extraction in remote sensing images.
IET Image Process., September, 2024

UAV-Enabled Communication Strategy Against Detection in Covert Communication With Asymmetric Information.
IEEE Trans. Wirel. Commun., July, 2024

Resource Knowledge-Driven Heterogeneous Graph Learning for Website Fingerprinting.
IEEE Trans. Cogn. Commun. Netw., June, 2024

M2VT-IDS: A multi-task multi-view learning architecture for designing IoT intrusion detection system.
Internet Things, April, 2024

Optimal Position Design for Unmanned Aerial Vehicle Relay-Assisted Covert Communication Based on Active Countermeasures.
IEEE Syst. J., March, 2024

Short-Term Passenger Flow Prediction in Urban Rail Transit Based on Points of Interest.
IEEE Access, 2024

Generating Image Adversarial Example by Modifying JPEG Stream.
Proceedings of the International Conference on Computer Vision and Deep Learning, 2024

2023
A UAV-Assisted Secure Communication System by Jointly Optimizing Transmit Power and Trajectory in the Internet of Things.
IEEE Trans. Green Commun. Netw., December, 2023

Energy Consumption Minimization in Unmanned Aerial Vehicle-Enabled Secure Wireless Sensor Networks.
Sensors, December, 2023

Strategic UAV-Assisted Game Model for Detection in Covert Communication.
IEEE Trans. Veh. Technol., June, 2023

A deep learning-based framework to identify and characterise heterogeneous secure network traffic.
IET Inf. Secur., March, 2023

Covert Communication Gains From Adversary's Uncertainty of Phase Angles.
IEEE Trans. Inf. Forensics Secur., 2023

Securing Network Traffic Classification Models against Adversarial Examples Using Derived Variables.
Future Internet, 2023

2022
GAN-generated fake face detection via two-stream CNN with PRNU in the wild.
Multim. Tools Appl., 2022

Directional crossover slime mould algorithm with adaptive Lévy diversity for the optimal design of real-world problems.
J. Comput. Des. Eng., 2022

A semantic element representation model for malicious domain name detection.
J. Inf. Secur. Appl., 2022

Intradialytic hypotension prediction using covariance matrix-driven whale optimizer with orthogonal structure-assisted extreme learning machine.
Frontiers Neuroinformatics, 2022

SPOC Project Teaching Research based on STEAM Education Concept : - - Takes the secondary vocational school "Data Structure" course as an example.
Proceedings of the IEEE Intl. Conf. on Dependable, 2022

2021
Contract-Based Incentive Mechanisms for Honeypot Defense in Advanced Metering Infrastructure.
IEEE Trans. Smart Grid, 2021

Detecting Multielement Algorithmically Generated Domain Names Based on Adaptive Embedding Model.
Secur. Commun. Networks, 2021

N-Gram, Semantic-Based Neural Network for Mobile Malware Network Traffic Detection.
Secur. Commun. Networks, 2021

Route Optimization Algorithm Based on Game Theory for Tourism Routes at Pseudo-Imperial Palace.
J. Inf. Process. Syst., 2021

Optimal attack strategy selection of an autonomous cyber-physical micro-grid based on attack-defense game model.
J. Ambient Intell. Humaniz. Comput., 2021

Fast3DS: A real-time full-convolutional malicious domain name detection system.
J. Inf. Secur. Appl., 2021

Honeypot Detection Strategy Against Advanced Persistent Threats in Industrial Internet of Things: A Prospect Theoretic Game.
IEEE Internet Things J., 2021

Design a Wireless Covert Channel Based on Dither Analog Chaotic Code.
Int. J. Digit. Crime Forensics, 2021

A correlation-based approach to detecting wireless physical covert channels.
Comput. Commun., 2021

VoIP Traffic Detection in Tunneled and Anonymous Networks Using Deep Learning.
IEEE Access, 2021

Application Behavior Identification in DNS Tunnels Based on Spatial-Temporal Information.
IEEE Access, 2021

Self-Attention based Multitasking Sequential Recom Mendation.
Proceedings of the 16th International Conference on Computer Science & Education, 2021

2020
Classroom Roll-Call System Based on ResNet Networks.
J. Inf. Process. Syst., 2020

Exploiting Correlation Characteristics to Detect Covert digital communication.
KSII Trans. Internet Inf. Syst., 2020

Image splicing detection based on convolutional neural network with weight combination strategy.
J. Inf. Secur. Appl., 2020

Detecting Stealthy Domain Generation Algorithms Using Heterogeneous Deep Neural Network Framework.
IEEE Access, 2020

Prospect Theoretic Study of Honeypot Defense Against Advanced Persistent Threats in Power Grid.
IEEE Access, 2020

GANs-LSTM Model for Soil Temperature Estimation From Meteorological: A New Approach.
IEEE Access, 2020

Mimicking Ship-Radiated Noise With Chaos Signal for Covert Underwater Acoustic Communication.
IEEE Access, 2020

2019
Detecting Word-Based Algorithmically Generated Domains Using Semantic Analysis.
Symmetry, 2019

Remote-Sensing Monitoring of Grassland Degradation Based on the GDI in Shangri-La, China.
Remote. Sens., 2019

An end-to-end generative network for environmental sound-based covert communication.
Multim. Tools Appl., 2019

Designing Rich-Secure Network Covert Timing Channels Based on Nested Lattices.
KSII Trans. Internet Inf. Syst., 2019

2018
Using Insider Swapping of Time Intervals to Perform Highly Invisible Network Flow Watermarking.
Secur. Commun. Networks, 2018

A Wireless Covert Channel Based on Constellation Shaping Modulation.
Secur. Commun. Networks, 2018

Image Encryption Scheme Based on 4D4W Hyperchaotic System.
J. Inf. Hiding Multim. Signal Process., 2018

Sound Texture Generative Model Guided by a Lossless Mel-Frequency Convolutional Neural Network.
IEEE Access, 2018

A Novel Detection Method for Word-Based DGA.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

A Comprehensive Analysis of Interval Based Network Flow Watermarking.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
Detection of Jitterbug Covert Channel Based on Partial Entropy Test.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2016
Designing Analog Fountain Timing Channels: Undetectability, Robustness, and Model-Adaptation.
IEEE Trans. Inf. Forensics Secur., 2016

Detecting <i>JitterBug</i> covert timing channel with sparse embedding.
Secur. Commun. Networks, 2016

Matrix embedding in multicast steganography: analysis in privacy, security and immediacy.
Secur. Commun. Networks, 2016

Novel Covert Timing Channels Implemented over Multiple Flows by Using Space-Time Trellis Codes.
J. Inf. Hiding Multim. Signal Process., 2016

Detection and Parameter Estimation for Jitterbug Covert Channel Based on Coefficient of Variation.
KSII Trans. Internet Inf. Syst., 2016

A Construction Scheme of Steganographic Codes Based on Matrix Unwrapping.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

2015
Damage-resistance matrix embedding framework: the contradiction between robustness and embedding efficiency.
Secur. Commun. Networks, 2015

基于信任的反馈云模型WSN节点信任评价机制 (Trust Evaluation Mechanism for Nodes Based on Adaptive Cloud Model in Wireless Sensor Network).
计算机科学, 2015

一种基于递归图的网络时间隐蔽信道检测方法 (Approach Based on Recurrence Plot to Detect Covert Timing Channels).
计算机科学, 2015

基于Snort的Modbus TCP工控协议异常数据检测规则设计 (Design of Modbus TCP Industrial Control Network Protocol Abnormal Data Detection Rules Based on Snort).
计算机科学, 2015

Improving Reliability of Covert Timing Channel to Packet Loss.
J. Inf. Hiding Multim. Signal Process., 2015

SkyLen: a Skype-based length covert channel.
J. Inf. Hiding Multim. Signal Process., 2015

A Detection Method for Cloak Covert Channel Based on Distribution of TCP Burst Size.
J. Inf. Hiding Multim. Signal Process., 2015

Topology authentication for piping isometric drawings.
Comput. Aided Des., 2015

A hierarchical trust model for cluster-based wireless sensor network.
Proceedings of the 2015 International Conference on Control, 2015

Designing snort rules to detect abnormal DNP3 network data.
Proceedings of the 2015 International Conference on Control, 2015

Bionic camouflage underwater acoustic communication based on sea lion sounds.
Proceedings of the 2015 International Conference on Control, 2015

Research on extraction method of urban impervious surface information.
Proceedings of the 23rd International Conference on Geoinformatics, 2015

2014
Authenticating topological integrity of process plant models through digital watermarking.
Multim. Tools Appl., 2014

Adaptive steganography based on block complexity and matrix embedding.
Multim. Syst., 2014

Network Packet Length Covert Channel Based on Empirical Distribution Function.
J. Networks, 2014

Alternative Syndrome-Trellis Codes With Reduced Trellis Complexity.
J. Inf. Hiding Multim. Signal Process., 2014

Syndrome trellis codes based on minimal span generator matrix.
Ann. des Télécommunications, 2014

2013
Detection of TCP covert channel based on Markov model.
Telecommun. Syst., 2013

Detect image splicing with artificial blurred boundary.
Math. Comput. Model., 2013

An Improved Retransmission-based Network Steganography: Design and Detection.
J. Networks, 2013

2012
Network covert timing channel with distribution matching.
Telecommun. Syst., 2012

2011
A passive image authentication scheme for detecting region-duplication forgery with rotation.
J. Netw. Comput. Appl., 2011

An adaptive matrix embedding based on LSB matching for grey-scale images.
Int. J. Multim. Intell. Secur., 2011

2010
Improved LSB-matching Steganography for Preserving Second-order Statistics.
J. Multim., 2010

Copyright Protecting Using The Secure Visible Removable Watermarking In JPEG Compression.
J. Digit. Content Technol. its Appl., 2010

Secure Multimedia Distribution Based on Watermarking and Encryption.
J. Convergence Inf. Technol., 2010

Research on an Educational Software Defect Prediction Model Based on SVM.
Proceedings of the Entertainment for Education. Digital Techniques and Systems, 2010

2009
On the Design of Secure Multimedia Authentication.
J. Univers. Comput. Sci., 2009

2008
Locally optimum detection for Barni's multiplicative watermarking in DWT domain.
Signal Process., 2008

Efficient video encryption scheme based on advanced video coding.
Multim. Tools Appl., 2008

Secure multimedia watermarking authentication in wavelet domain.
J. Electronic Imaging, 2008

Forgery-location highway monitoring systembased on video watermarking.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

Optimum Decoder for Barni's Multiplicative Watermarking Based on Minimum Bayesian Risk Criterion.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

Assessment of Integrated Electronic Information System survivability based on u-function.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

Robust Hashing Based on Persistent Points for Video Copy Detection.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2007
A RST-Resilient Watermarking Scheme Based on Invariant Features.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007

Image Steganography Based on Quantization-Embedders Combination.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

2006
Data Hiding in Neural Network Prediction Errors.
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006

Robustness Analysis of Watermarking Schemes Based on Two Novel Transforms.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

2005
Image Hiding by Non-uniform Generalized LSB and Dynamic Programming.
Proceedings of the IEEE 7th Workshop on Multimedia Signal Processing, 2005

On Sequence Synchronization Analysis Against Chaos Based Spread Spectrum Image Steganography.
Proceedings of the Advances in Natural Computation, First International Conference, 2005


  Loading...