Liang Liu

Orcid: 0000-0003-3422-1832

Affiliations:
  • Civil Aviation University of China, School of Electronic Information and Automation, Tianjin, China


According to our database1, Liang Liu authored at least 16 papers between 2017 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
ADS-Bchain: A Blockchain-Based Trusted Service Scheme for Automatic Dependent Surveillance Broadcast.
IEEE Trans. Aerosp. Electron. Syst., December, 2023

Detection of Improved Collusive Interest Flooding Attacks Using BO-GBM Fusion Algorithm in NDN.
IEEE Trans. Netw. Sci. Eng., 2023

2022
LDoS attack detection method based on traffic classification prediction.
IET Inf. Secur., 2022

Detection of A Novel Dual Attack in Named Data Networking.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2022

2020
An ADS-B Message Authentication Method Based on Certificateless Short Signature.
IEEE Trans. Aerosp. Electron. Syst., 2020

The detection method of low-rate DoS attack based on multi-feature fusion.
Digit. Commun. Networks, 2020

Mitigation measures of collusive interest flooding attacks in named data networking.
Comput. Secur., 2020

Detecting DoS Attacks Based on Multi-Features in SDN.
IEEE Access, 2020

Low-Rate DDoS Attack Detection Based on Factorization Machine in Software Defined Network.
IEEE Access, 2020

Low-Rate DoS Attacks, Detection, Defense, and Challenges: A Survey.
IEEE Access, 2020

The Detection Method of Collusive Interest Flooding Attacks Based on Prediction Error in NDN.
IEEE Access, 2020

2019
Research on SWIM Services Dynamic Migration Method.
Future Internet, 2019

Sequence alignment detection of TCP-targeted synchronous low-rate DoS attacks.
Comput. Networks, 2019

CHTDS: A CP-ABE Access Control Scheme Based on Hash Table and Data Segmentation in NDN.
Proceedings of the 18th IEEE International Conference On Trust, 2019

2018
Identifying LDoS attack traffic based on wavelet energy spectrum and combined neural network.
Int. J. Commun. Syst., 2018

2017
The approach of SWIM data sharing based on multi-dimensional data encryption.
Proceedings of the 25th International Conference on Software, 2017


  Loading...