Jiayong Liu

Orcid: 0000-0002-5895-8276

According to our database1, Jiayong Liu authored at least 56 papers between 2008 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
ENZZ: Effective N-gram coverage assisted fuzzing with nearest neighboring branch estimation.
Inf. Softw. Technol., 2025

2024
bjEnet: a fast and accurate software bug localization method in natural language semantic space.
Softw. Qual. J., December, 2024

Attack detection model for BCoT based on contrastive variational autoencoder and metric learning.
J. Cloud Comput., December, 2024

A variational selection mechanism for article comment generation.
Expert Syst. Appl., March, 2024

Towards robust image watermarking via random distortion assignment based meta-learning.
J. Vis. Commun. Image Represent., 2024

Joint relational triple extraction with enhanced representation and binary tagging framework in cybersecurity.
Comput. Secur., 2024

bjCnet: A contrastive learning-based framework for software defect prediction.
Comput. Secur., 2024

Emotion Cause Extraction in Conversations with Response Graphing.
Proceedings of the Natural Language Processing and Chinese Computing, 2024

Preserving Content in Text Style Transfer via Normalizing Flow and Adversarial Learning.
Proceedings of the Natural Language Processing and Chinese Computing, 2024

2023
DiffuCom: A novel diffusion model for comment generation.
Knowl. Based Syst., December, 2023

Reversible adversarial steganography for security enhancement.
J. Vis. Commun. Image Represent., December, 2023

Reinforcement learning for few-shot text generation adaptation.
Neurocomputing, November, 2023

A framework for threat intelligence extraction and fusion.
Comput. Secur., September, 2023

SRFA-GRL: Predicting group influence in social networks with graph representation learning.
Inf. Sci., August, 2023

bjXnet: an improved bug localization model based on code property graph and attention mechanism.
Autom. Softw. Eng., June, 2023

Improving security for image steganography using content-adaptive adversarial perturbations.
Appl. Intell., June, 2023

Identify influential nodes in social networks with graph multi-head attention regression model.
Neurocomputing, April, 2023

An event-based opinion summarization model for long chinese text with sentiment awareness and parameter fusion mechanism.
Appl. Intell., March, 2023

A novel feature integration and entity boundary detection for named entity recognition in cybersecurity.
Knowl. Based Syst., 2023

Fraud detection on multi-relation graphs via imbalanced and interactive learning.
Inf. Sci., 2023

BinVulDet: Detecting vulnerability in binary program via decompiled pseudo code and BiLSTM-attention.
Comput. Secur., 2023

Unveiling Cybersecurity Threats from Online Chat Groups: A Triple Extraction Approach.
Proceedings of the Knowledge Science, Engineering and Management, 2023

Content-adaptive Adversarial Embedding for Image Steganography Using Deep Reinforcement Learning.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

2022
An Adaptive Gradient Neural Network to Solve Dynamic Linear Matrix Equations.
IEEE Trans. Syst. Man Cybern. Syst., 2022

A zeroing neural dynamics based acceleration optimization approach for optimizers in deep neural networks.
Neural Networks, 2022

CatVRNN: Generating category texts via multi-task learning.
Knowl. Based Syst., 2022

HLTD-CSA: Cover selection algorithm based on hybrid local texture descriptor for color image steganography.
J. Vis. Commun. Image Represent., 2022

2021
Modified Newton Integration Algorithm With Noise Tolerance for Image Deblurring.
IEEE Trans. Computational Imaging, 2021

Zombie Follower Recognition Based on Industrial Chain Feature Analysis.
Secur. Commun. Networks, 2021

MF-COTE: A chinese opinion target extraction model based on multiple features.
J. Intell. Fuzzy Syst., 2021

Detection method for stability of microcontroller accessories based on biosensor.
J. Comput. Methods Sci. Eng., 2021

A generalized approach to solve perfect Bayesian Nash equilibrium for practical network attack and defense.
Inf. Sci., 2021

Reinforcement Learning for Few-Shot Text Generation Adaptation.
CoRR, 2021

SecTEP: Enabling secure tender evaluation with sealed prices and quality evaluation in procurement bidding systems over blockchain.
Comput. Secur., 2021

Exsense: Extract sensitive information from unstructured data.
Comput. Secur., 2021

CyberRel: Joint Entity and Relation Extraction for Cybersecurity Concepts.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

2020
Preprocessing Method for Encrypted Traffic Based on Semisupervised Clustering.
Secur. Commun. Networks, 2020

Detecting Web Spam Based on Novel Features from Web Page Source Code.
Secur. Commun. Networks, 2020

SPCTR: Sealed Auction-Based Procurement for Closest Pre-Tender with Range Validation.
Secur. Commun. Networks, 2020

Cross-modality earth mover's distance-driven convolutional neural network for different-modality data.
Neural Comput. Appl., 2020

基于密集连接卷积神经网络的远程监督关系抽取 (Distant Supervised Relation Extraction Based on Densely Connected Convolutional Networks).
计算机科学, 2020

基于增强BiLSTM-CRF模型的推文恶意软件名称识别 (Malware Name Recognition in Tweets Based on Enhanced BiLSTM-CRF Model).
计算机科学, 2020

SecACS: Enabling lightweight secure auditable cloud storage with data dynamics.
J. Inf. Secur. Appl., 2020

Modified gradient neural networks for solving the time-varying Sylvester equation with adaptive coefficients and elimination of matrix inversion.
Neurocomputing, 2020

Covert timing channel detection method based on time interval and payload length analysis.
Comput. Secur., 2020

2019
Automatic Identification of Honeypot Server Using Machine Learning Techniques.
Secur. Commun. Networks, 2019

Network traffic anomaly detection algorithm using mahout classifier.
J. Intell. Fuzzy Syst., 2019

A systematic review of fuzzing based on machine learning techniques.
CoRR, 2019

Learning Domain-Independent Deep Representations by Mutual Information Minimization.
Comput. Intell. Neurosci., 2019

Capturing the symptoms of malicious code in electronic documents by file's entropy signal combined with machine learning.
Appl. Soft Comput., 2019

A Distance-Based Method for Building an Encrypted Malware Traffic Identification Framework.
IEEE Access, 2019

2017
Domain transfer multi-instance dictionary learning.
Neural Comput. Appl., 2017

Gossip: Automatically Identifying Malicious Domains from Mailing List Discussions.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
A study on Web security incidents in China by analyzing vulnerability disclosure platforms.
Comput. Secur., 2016

2009
A more efficient and secure dynamic ID-based remote user authentication scheme.
Comput. Commun., 2009

2008
A new mutual authentication scheme based on nonce and smart cards.
Comput. Commun., 2008


  Loading...