Limin Liu

Orcid: 0000-0003-1933-6156

According to our database1, Limin Liu authored at least 104 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Machine learning for the prediction of 1-year mortality in patients with sepsis-associated acute kidney injury.
BMC Medical Informatics Decis. Mak., December, 2024

Anti-sorting signal design for radio frequency stealth radar based on cosine-exponential nonlinear chaotic mapping.
Wirel. Networks, August, 2024

Single View-Based Pose Estimation of Unknown Circular Object With RGB-D Camera.
IEEE Trans. Aerosp. Electron. Syst., August, 2024

Multiple model estimation under perspective of random-fuzzy dual interpretation of unknown uncertainty.
Signal Process., April, 2024

Ultra-short-term wind power prediction method based on FTI-VACA-XGB model.
Expert Syst. Appl., January, 2024

Navigation system for orchard spraying robot based on 3D LiDAR SLAM with NDT_ICP point cloud registration.
Comput. Electron. Agric., 2024

Practical Adversarial Attack on WiFi Sensing Through Unnoticeable Communication Packet Perturbation.
Proceedings of the 30th Annual International Conference on Mobile Computing and Networking, 2024

ELTA: An Enhancer against Long-Tail for Aesthetics-oriented Models.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

Physical Layer Secret Key Generation Leveraging Proactive Pilot Contamination.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024

Secret Key Generation with Adaptive Pilot Manipulation for Matching-Based Method.
Proceedings of the IEEE International Conference on Communications, 2024

2023
Delay sensitive data transmission optimization for energy harvesting relay satellite networks.
Internet Things, December, 2023

Modeling and analysis of droplet deposition behavior: From the micro and macro perspectives.
Comput. Electron. Agric., July, 2023

MCR: Multilayer cross-fusion with reconstructor for multimodal abstractive summarisation.
IET Comput. Vis., June, 2023

Dynamic Digital Twin and Online Scheduling for Contact Window Resources in Satellite Network.
IEEE Trans. Ind. Informatics, May, 2023

Self-supervised image clustering from multiple incomplete views via constrastive complementary generation.
IET Comput. Vis., March, 2023

Joint Optimization of Data Transmission and Energy Harvesting in Relay Satellite Networks.
Remote. Sens., 2023

Mask Reference Image Quality Assessment.
CoRR, 2023

Change Back Meter Carrier Module Intelligent Sorting and Management Techniques Based on ARM.
Proceedings of the 2023 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2023

Incremental Reliability Assessment of Large-Scale Software via Theoretical Structure Reduction.
Proceedings of the 18th International Conference on Software Technologies, 2023

JWTKey: Automatic Cryptographic Vulnerability Detection in JWT Applications.
Proceedings of the Computer Security - ESORICS 2023, 2023

2022
Deep Multi-Feature Transfer Network for Fourier Ptychographic Microscopy Imaging Reconstruction.
Sensors, 2022

Maize Characteristics Estimation and Classification by Spectral Data under Two Soil Phosphorus Levels.
Remote. Sens., 2022

Two-stage partial image-text clustering (TPIT-C).
IET Comput. Vis., 2022

Gait-D: Skeleton-based gait feature decomposition for gait recognition.
IET Comput. Vis., 2022

A novel multi-satellite and multi-task scheduling method based on task network graph aggregation.
Expert Syst. Appl., 2022

Chaotic Mapping-Based Anti-Sorting Radio Frequency Stealth Signals and Compressed Sensing-Based Echo Signal Processing Technology.
Entropy, 2022

Design of Multi-Parameter Compound Modulated RF Stealth Anti-Sorting Signals Based on Hyperchaotic Interleaving Feedback.
Entropy, 2022

Clustering-Induced Generative Incomplete Image-Text Clustering (CIGIT-C).
CoRR, 2022

CryptoGo: Automatic Detection of Go Cryptographic API Misuses.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Downlink aware data scheduling with delay guarantees in resource-limited leo satellite networks.
Peer-to-Peer Netw. Appl., 2021

The integrated sigma-max system and its application in target recognition.
Inf. Sci., 2021

What If Keys Are Leaked? towards Practical and Secure Re-Encryption in Deduplication-Based Cloud Storage.
Inf., 2021

Short-term load forecasting with dense average network.
Expert Syst. Appl., 2021

The Measurement of the Software Ecosystem's Productivity with GitHub.
Comput. Syst. Sci. Eng., 2021

The Sigma-Max System Induced from Randomness and Fuzziness.
CoRR, 2021

News Image-Text Matching With News Knowledge Graph.
IEEE Access, 2021

P-Shake: Towards Secure Authentication and Communication between Mobile Devices.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2021

Exploring Sequential and Collaborative Contexts for Next Point-of-Interest Recommendation.
Proceedings of the Knowledge Science, Engineering and Management, 2021

Robust Ellipse Fitting with an Auxiliary Normal.
Proceedings of the Image and Graphics - 11th International Conference, 2021

Teaching Path to Improve the Practical Ability of Postgraduates Majored in Data Engineering in Minority Nationality Regions.
Proceedings of the 16th International Conference on Computer Science & Education, 2021

2020
Tainting-Assisted and Context-Migrated Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation.
IEEE Trans. Mob. Comput., 2020

Analysis on Class Participation Based on Artificial Intelligence.
Rev. d'Intelligence Artif., 2020

Adaptive Slide Window-Based Feature Cognition for Deceptive Information Identification.
IEEE Access, 2020

DPVGeo: Delay-based Public Verification of Cloud Data Geolocation.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

Back Shape Measurement and Three-Dimensional Reconstruction of Spinal Shape Using One Kinect Sensor.
Proceedings of the 17th IEEE International Symposium on Biomedical Imaging, 2020

Supporting Efficient Dynamic Update in Public Integrity Verification of Cloud Data.
Proceedings of the 39th IEEE International Performance Computing and Communications Conference, 2020

Splitter: An Efficient Scheme to Determine the Geolocation of Cloud Data Publicly.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020

Deduplication-Friendly Watermarking for Multimedia Data in Public Clouds.
Proceedings of the Computer Security - ESORICS 2020, 2020

2019
European Option Based on Least-Squares Method under Non-Extensive Statistical Mechanics.
Entropy, 2019

Practical Verification of Data Encryption for Cloud Storage Services.
Proceedings of the Services Computing - SCC 2019, 2019

VoteGeo: An IoT-based Voting Approach to Verify the Geographic Location of Cloud Hosts.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019

Dynamic Slide Window-Based Feature Scoring and Extraction for On-Line Rumor Detection with CNN.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

A Privacy Enhancing Scheme for Mobile Devices Based Secure Multi-party Computation System.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

2018
The application of threshold empirical mode decomposition de-noising algorithm for battlefield ambient noise.
Int. J. Model. Simul. Sci. Comput., 2018

Optimal investment problem under non-extensive statistical mechanics.
Comput. Math. Appl., 2018

2017
Indoor Trajectory Tracking Scheme Based on Delaunay Triangulation and Heuristic Information in Wireless Sensor Networks.
Sensors, 2017

Towards Accurate Deceptive Opinion Spam Detection based on Word Order-preserving CNN.
CoRR, 2017

Towards efficient detection of sybil attacks in location-based social networks.
Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence, 2017

System Service Call-oriented Symbolic Execution of Android Framework with Applications to Vulnerability Discovery and Exploit Generation.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

How to Make Information-Flow Analysis Based Defense Ineffective: An ART Behavior-Mask Attack.
Proceedings of the Information Security - 20th International Conference, 2017

Towards Efficient Incremental Representation for Short Texts in Social Media.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

2016
A modelling methodology for the HTML knowledge base.
Int. J. Intell. Inf. Database Syst., 2016

Context-aware System Service Call-oriented Symbolic Execution of Android Framework with Application to Exploit Generation.
CoRR, 2016

2015
Electronic warfare system simulation based on SystemVue.
Int. J. Model. Simul. Sci. Comput., 2015

An efficient clustering ensemble selection algorithm.
Int. J. Auton. Adapt. Commun. Syst., 2015

An outlier mining algorithm based on approximate outlier factor.
Int. J. Auton. Adapt. Commun. Syst., 2015

TSM: Efficient Thermal and Server Management for Greening Data Centers.
Proceedings of the 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2015

2014
Towards Efficient Update of Access Control Policy for Cryptographic Cloud Storage.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Implementing a Covert Timing Channel Based on Mimic Function.
Proceedings of the Information Security Practice and Experience, 2014

A Progressive Dual-Rail Routing Repair Approach for FPGA Implementation of Crypto Algorithm.
Proceedings of the Information Security Practice and Experience, 2014

WrapDroid: Flexible and Fine-Grained Scheme Towards Regulating Behaviors of Android Apps.
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014

2013
From Mini House Game to Hobby-Driven Behavioral Biometrics-Based Password.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Fingerprint Embedding: A Proactive Strategy of Detecting Timing Channels.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

2012
A Pulse-Generator-Free Hybrid Latch Based Flip-Flop (PHLFF).
IEICE Trans. Electron., 2012

Design of novel, semi-transparent flip-flops (STFF) for high speed and low power application.
Sci. China Inf. Sci., 2012

The Modeling and Analysis of Context and Cardinality Constraints Role-Based Authorization Mechanism.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012

A MIMO intelligent control for ball mill systems.
Proceedings of the 38th Annual Conference on IEEE Industrial Electronics Society, 2012

A New Selective Clustering Ensemble Algorithm.
Proceedings of the Ninth IEEE International Conference on e-Business Engineering, 2012

From Mobiles to Clouds: Developing Energy-Aware Offloading Strategies for Workflows.
Proceedings of the 13th ACM/IEEE International Conference on Grid Computing, 2012

Performance Analysis for Workflow Management Systems under Role-Based Authorization Control.
Proceedings of the Advances in Grid and Pervasive Computing - 7th International Conference, 2012

2011
Launching Return-Oriented Programming Attacks against Randomized Relocatable Executables.
Proceedings of the IEEE 10th International Conference on Trust, 2011

A FPGA LED controller for SoC.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

The reconfigurable IP modules and design.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

2010
A Publicly Verifiable Encryption Scheme with Short Public/Private Keys.
Proceedings of the Wireless Algorithms, 2010

On Challenges in Evaluating Malware Clustering.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

2009
Efficient and Low-Complexity Surveillance Video Compression Using Backward-Channel Aware Wyner-Ziv Video Coding.
IEEE Trans. Circuits Syst. Video Technol., 2009

Denial-of-Service Attacks on Host-Based Generic Unpackers.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

Dynamic Cross-System Workflow Integration Based on MAS.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

Improvement of Fuzzy Comprehensive Evaluation Model for Water Quality.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009

2008
Backward channel aware Wyner-Ziv video coding: A study of complexity, rate, and distortion tradeoff.
Signal Process. Image Commun., 2008

Mixed hedging under additive market price information.
J. Syst. Sci. Complex., 2008

A low-complexity iterative mode selection algorithm Forwyner-Ziv video compression.
Proceedings of the International Conference on Image Processing, 2008

2007
Rate Distortion Analysis of Motion Side Estimation in Wyner-Ziv Video Coding.
IEEE Trans. Image Process., 2007

Content-adaptive motion estimation for efficient video compression.
Proceedings of the Visual Communications and Image Processing 2007, 2007

Recent advances in video compression: What's next?
Proceedings of the 9th International Symposium on Signal Processing and Its Applications, 2007

Complexity-Rate-Distortion Analysis of Backward Channel Aware Wyner-Ziv Video Coding.
Proceedings of the International Conference on Image Processing, 2007

KÅ1 Composite Genetic Algorithm and Its Properties.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence, 2007

A Kind of Composite Genetic Algorithm Based on Extreme Pre-Judgement.
Proceedings of the 11th International Conference on Computer Supported Cooperative Work in Design, 2007

A Bumpless Switching Scheme for Dynamic Reconfiguration.
Proceedings of the Cooperative Design, 2007

2006
Wyner-Ziv Video Coding With Universal Prediction.
IEEE Trans. Circuits Syst. Video Technol., 2006

Martingale measures in the market with restricted information.
Adv. Decis. Sci., 2006

Backward Channel Aware Wyner-Ziv Video Coding.
Proceedings of the International Conference on Image Processing, 2006

2005
Network-driven Wyner-Ziv video coding using forward prediction.
Proceedings of the Electronic Imaging: Image and Video Communications and Processing 2005, 2005

2003
A Layered Grid User Expression Model in Grid User Management.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003


  Loading...