Jing Liu

Orcid: 0000-0002-7495-4419

Affiliations:
  • Beijing University of Technology, College of Computer Science, China


According to our database1, Jing Liu authored at least 22 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
AGCM: A multi-stage attack correlation and scenario reconstruction method based on graph aggregation.
Comput. Commun., 2024

2023
MSGAN: multi-stage generative adversarial network-based data recovery in cyber-attacks.
Neural Comput. Appl., October, 2023

Intrusion Detection System Based on In-Depth Understandings of Industrial Control Logic.
IEEE Trans. Ind. Informatics, March, 2023

Selective forwarding attack detection and network recovery mechanism based on cloud-edge cooperation in software-defined wireless sensor network.
Comput. Secur., March, 2023

EEFED: Personalized Federated Learning of Execution&Evaluation Dual Network for CPS Intrusion Detection.
IEEE Trans. Inf. Forensics Secur., 2023

2022
WSN node access authentication protocol based on trusted computing.
Simul. Model. Pract. Theory, 2022

Correction to: DEIDS: a novel intrusion detection system for industrial control systems.
Neural Comput. Appl., 2022

DEIDS: a novel intrusion detection system for industrial control systems.
Neural Comput. Appl., 2022

Stealthy attack detection method based on Multi-feature long short-term memory prediction model.
Future Gener. Comput. Syst., 2022

Identifying malicious nodes in wireless sensor networks based on correlation detection.
Comput. Secur., 2022

2021
MIF: A multi-step attack scenario reconstruction and attack chains extraction method based on multi-information fusion.
Comput. Networks, 2021

2020
Explaining the Attributes of a Deep Learning Based Intrusion Detection System for Industrial Control Networks.
Sensors, 2020

Vulnerability Mining Method for the Modbus TCP Using an Anti-Sample Fuzzer.
Sensors, 2020

Protection of Sensitive Data in Industrial Internet Based on Three-Layer Local/Fog/Cloud Storage.
Secur. Commun. Networks, 2020

基于链上链下相结合的日志安全存储与检索 (Log Security Storage and Retrieval Based on Combination ofOn-chain and Off-chain).
计算机科学, 2020

2019
Industrial Control Intrusion Detection Approach Based on Multiclassification GoogLeNet-LSTM Model.
Secur. Commun. Networks, 2019

一种面向WSN的双向身份认证协议及串空间模型 (Bilateral Authentication Protocol for WSN and Certification by Strand Space Model).
计算机科学, 2019

Cloud resource orchestration optimisation based on ARIMA.
Int. J. Simul. Process. Model., 2019

2017
A trusted access method in software-defined network.
Simul. Model. Pract. Theory, 2017

FL-GUARD: A Detection and Defense System for DDoS Attack in SDN.
Proceedings of the 2017 International Conference on Cryptography, Security and Privacy, 2017

2015
Study on Authentication Protocol of SDN Trusted Domain.
Proceedings of the Twelfth IEEE International Symposium on Autonomous Decentralized Systems, 2015

2010
Framework of Web content filtering for IPv6.
Proceedings of the 2010 International Conference on High Performance Computing & Simulation, 2010


  Loading...