Junrong Liu

Orcid: 0009-0009-9209-3227

According to our database1, Junrong Liu authored at least 43 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Accelerated Atmospheric to Hydrological Spread of Drought in the Yangtze River Basin under Climate.
Remote. Sens., August, 2024

ECNet: Robust Malicious Network Traffic Detection With Multi-View Feature and Confidence Mechanism.
IEEE Trans. Inf. Forensics Secur., 2024

Diverse Image Captioning via Sequential Variational Transformer and Muti-feature Fusion.
Proceedings of the 2024 7th International Conference on Signal Processing and Machine Learning, 2024

Deep Dive into Insider Threats: Malicious Activity Detection within Enterprise.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

A single-class attack detection algorithm for smart grid AGC system based on improved support vector machines algorithm.
Proceedings of the 2024 3rd International Conference on Cyber Security, 2024

2023
Correction to: A nonlinear evolutionary equation modelling a dockless bicycle‑sharing system.
J. Ambient Intell. Humaniz. Comput., October, 2023

A nonlinear evolutionary equation modelling a dockless bicycle-sharing system.
J. Ambient Intell. Humaniz. Comput., 2023

Insider Threat Detection Based On Heterogeneous Graph Neural Network.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

A Fast Gradient Boosting Based Approach for Predicting Frags in Tactic Games.
Proceedings of the IEEE International Conference on Multimedia and Expo Workshops, 2023

2022
PUMD: a PU learning-based malicious domain detection framework.
Cybersecur., 2022

A Belief Propagation Based State Estimator for Semi-Intrusive Load Monitoring System.
IEEE Access, 2022

DGGCN: Dictionary based DGA detection method based on DomainGraph and GCN.
Proceedings of the 31st International Conference on Computer Communications and Networks, 2022

2021
Yet Another Traffic Black Hole: Amplifying CDN Fetching Traffic with RangeFragAmp Attacks.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2021

2020
The evolution of a clogging sidewalk caused by a dockless bicycle-sharing system: A stochastic particles model.
Math. Comput. Simul., 2020

Evaluating and Improving Linear Regression Based Profiling: On the Selection of Its Regularization.
J. Comput. Sci. Technol., 2020

Filtering and smoothing formulas of AR(p)-modulated Poisson processes.
Commun. Stat. Simul. Comput., 2020

Malicious Domain Detection Based on K-means and SMOTE.
Proceedings of the Computational Science - ICCS 2020, 2020

2019
Side-Channel Analysis for the Authentication Protocols of CDMA Cellular Networks.
J. Comput. Sci. Technol., 2019

Side channel attack of multiplication in GF(<i>q</i>)-application to secure RSA-CRT.
Sci. China Inf. Sci., 2019

isAnon: Flow-Based Anonymity Network Traffic Identification Using Extreme Gradient Boosting.
Proceedings of the International Joint Conference on Neural Networks, 2019

2018
Ridge-Based DPA: Improvement of Differential Power Analysis For Nanoscale Chips.
IEEE Trans. Inf. Forensics Secur., 2018

Similar operation template attack on RSA-CRT as a case study.
Sci. China Inf. Sci., 2018

EOD Edge Sampling for Visualizing Dynamic Network via Massive Sequence View.
IEEE Access, 2018

Hierarchical Clustering Based Network Traffic Data Reduction for Improving Suspicious Flow Detection.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A Novel Approach for Identifying Lateral Movement Attacks Based on Network Embedding.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

2017
Practical Partial-Nonce-Exposure Attack on ECC Algorithm.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

Efficient and Constant Time Modular Inversions Over Prime Fields.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

Boolean Matrix Masking for SM4 Block Cipher Algorithm.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

An Implementation of Trojan Side-Channel with a Masking Scheme.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

Trace Augmentation: What Can Be Done Even Before Preprocessing in a Profiled SCA?
Proceedings of the Smart Card Research and Advanced Applications, 2017

2016
Modelling a Bathtub-Shaped Failure Rate by a Coxian Distribution.
IEEE Trans. Reliab., 2016

Evaluation and Improvement of Generic-Emulating DPA Attacks.
IACR Cryptol. ePrint Arch., 2016

Inner Product Masking for Bitslice Ciphers and Security Order Amplification for Linear Leakages.
Proceedings of the Smart Card Research and Advanced Applications, 2016

2015
A first step to implement Gillespie's algorithm with rejection sampling.
Stat. Methods Appl., 2015

Small Tweaks Do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards.
Proceedings of the Computer Security - ESORICS 2015, 2015

A Circuit Design of SMS4 against Chosen Plaintext Attack.
Proceedings of the 11th International Conference on Computational Intelligence and Security, 2015

2014
Parameter Estimation for a <i>k</i>-out-of-<i>n</i>: F System.
Commun. Stat. Simul. Comput., 2014

An Improved Side-Channel Attack Based on Support Vector Machine.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

2013
Multisensor Acquirement System of Electrokinetic in Multiphase Flow.
J. Networks, 2013

Differential power analysis of stream ciphers with LFSRs.
Comput. Math. Appl., 2013

A Power Analysis on SMS4 Using the Chosen Plaintext Method.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

2012
Differential Fault Analysis on Lightweight Blockciphers with Statistical Cryptanalysis Techniques.
Proceedings of the 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2012

2010
Correlation Power Analysis Against Stream Cipher MICKEY v2.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010


  Loading...