Jiayong Liu
Orcid: 0000-0002-5895-8276
According to our database1,
Jiayong Liu
authored at least 56 papers
between 2008 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
ENZZ: Effective N-gram coverage assisted fuzzing with nearest neighboring branch estimation.
Inf. Softw. Technol., 2025
2024
bjEnet: a fast and accurate software bug localization method in natural language semantic space.
Softw. Qual. J., December, 2024
Attack detection model for BCoT based on contrastive variational autoencoder and metric learning.
J. Cloud Comput., December, 2024
Expert Syst. Appl., March, 2024
Towards robust image watermarking via random distortion assignment based meta-learning.
J. Vis. Commun. Image Represent., 2024
Joint relational triple extraction with enhanced representation and binary tagging framework in cybersecurity.
Comput. Secur., 2024
Comput. Secur., 2024
Proceedings of the Natural Language Processing and Chinese Computing, 2024
Preserving Content in Text Style Transfer via Normalizing Flow and Adversarial Learning.
Proceedings of the Natural Language Processing and Chinese Computing, 2024
2023
Knowl. Based Syst., December, 2023
J. Vis. Commun. Image Represent., December, 2023
Neurocomputing, November, 2023
Comput. Secur., September, 2023
SRFA-GRL: Predicting group influence in social networks with graph representation learning.
Inf. Sci., August, 2023
bjXnet: an improved bug localization model based on code property graph and attention mechanism.
Autom. Softw. Eng., June, 2023
Improving security for image steganography using content-adaptive adversarial perturbations.
Appl. Intell., June, 2023
Identify influential nodes in social networks with graph multi-head attention regression model.
Neurocomputing, April, 2023
An event-based opinion summarization model for long chinese text with sentiment awareness and parameter fusion mechanism.
Appl. Intell., March, 2023
A novel feature integration and entity boundary detection for named entity recognition in cybersecurity.
Knowl. Based Syst., 2023
Inf. Sci., 2023
BinVulDet: Detecting vulnerability in binary program via decompiled pseudo code and BiLSTM-attention.
Comput. Secur., 2023
Unveiling Cybersecurity Threats from Online Chat Groups: A Triple Extraction Approach.
Proceedings of the Knowledge Science, Engineering and Management, 2023
Content-adaptive Adversarial Embedding for Image Steganography Using Deep Reinforcement Learning.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023
2022
IEEE Trans. Syst. Man Cybern. Syst., 2022
A zeroing neural dynamics based acceleration optimization approach for optimizers in deep neural networks.
Neural Networks, 2022
HLTD-CSA: Cover selection algorithm based on hybrid local texture descriptor for color image steganography.
J. Vis. Commun. Image Represent., 2022
2021
IEEE Trans. Computational Imaging, 2021
Secur. Commun. Networks, 2021
J. Intell. Fuzzy Syst., 2021
J. Comput. Methods Sci. Eng., 2021
A generalized approach to solve perfect Bayesian Nash equilibrium for practical network attack and defense.
Inf. Sci., 2021
SecTEP: Enabling secure tender evaluation with sealed prices and quality evaluation in procurement bidding systems over blockchain.
Comput. Secur., 2021
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
2020
Secur. Commun. Networks, 2020
Secur. Commun. Networks, 2020
SPCTR: Sealed Auction-Based Procurement for Closest Pre-Tender with Range Validation.
Secur. Commun. Networks, 2020
Cross-modality earth mover's distance-driven convolutional neural network for different-modality data.
Neural Comput. Appl., 2020
基于密集连接卷积神经网络的远程监督关系抽取 (Distant Supervised Relation Extraction Based on Densely Connected Convolutional Networks).
计算机科学, 2020
基于增强BiLSTM-CRF模型的推文恶意软件名称识别 (Malware Name Recognition in Tweets Based on Enhanced BiLSTM-CRF Model).
计算机科学, 2020
J. Inf. Secur. Appl., 2020
Modified gradient neural networks for solving the time-varying Sylvester equation with adaptive coefficients and elimination of matrix inversion.
Neurocomputing, 2020
Covert timing channel detection method based on time interval and payload length analysis.
Comput. Secur., 2020
2019
Secur. Commun. Networks, 2019
J. Intell. Fuzzy Syst., 2019
Comput. Intell. Neurosci., 2019
Capturing the symptoms of malicious code in electronic documents by file's entropy signal combined with machine learning.
Appl. Soft Comput., 2019
A Distance-Based Method for Building an Encrypted Malware Traffic Identification Framework.
IEEE Access, 2019
2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
A study on Web security incidents in China by analyzing vulnerability disclosure platforms.
Comput. Secur., 2016
2009
Comput. Commun., 2009
2008
Comput. Commun., 2008