Liping Ding
Orcid: 0000-0002-6157-1013
According to our database1,
Liping Ding
authored at least 38 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
A Flexible Surgical Robot with Hemispherical Magnet Array Steering and Embedded Piezoelectric Beacon for Ultrasonic Position Sensing.
Adv. Intell. Syst., March, 2024
2023
Basketball Action Recognition Method of Deep Neural Network Based on Dynamic Residual Attention Mechanism.
Inf., January, 2023
2021
Int. J. Digit. Crime Forensics, 2021
A Network Forensics Investigating Method Based on Weak Consistency for Distributed SDN.
Proceedings of the Ubiquitous Security - First International Conference, 2021
2020
Int. J. Digit. Crime Forensics, 2020
2018
Int. J. Digit. Crime Forensics, 2018
Int. J. Digit. Crime Forensics, 2018
Proceedings of the 15th IEEE International Conference on Advanced Video and Signal Based Surveillance, 2018
2017
Signal Process. Image Commun., 2017
Building a Cost and Profit Sharing Model for an E-business Project in Rural China: a Shapely Value Approach.
Proceedings of the 16th Wuhan International Conference on E-Business, 2017
Proceedings of the 2017 IEEE International Conference on Software Testing, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017
2015
Appl. Math. Comput., 2015
Data Hidng in Digital Image Using Four Pixel-Value-Differencing and Multiple-Base Notational.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015
Modelling and Analysis of Network Security - a Probabilistic Value-passing CCS Approach.
Proceedings of the Information and Communications Security - 17th International Conference, 2015
2014
Secur. Commun. Networks, 2014
J. Softw., 2014
IACR Cryptol. ePrint Arch., 2014
2013
Robust and Efficient Covert Channel Communications in Operating Systems: Design, Implementation and Evaluation.
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013
CIVSched: Communication-aware Inter-VM Scheduling in Virtual Machine Monitor Based on the Process.
Proceedings of the 13th IEEE/ACM International Symposium on Cluster, 2013
2012
Math. Comput. Model., 2012
On the nonexistence of nontrivial small cycles of the <i>µ</i> function in 3<i>x</i>+1 conjecture.
J. Syst. Sci. Complex., 2012
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012
2011
Extended Probabilistic Latent Semantic Analysis Model For Topics In Time-Stamped Images.
Intell. Autom. Soft Comput., 2011
Proceedings of the Fifth International Conference on Secure Software Integration and Reliability Improvement, 2011
A Practical Covert Channel Identification Approach in Source Code Based on Directed Information Flow Graph.
Proceedings of the Fifth International Conference on Secure Software Integration and Reliability Improvement, 2011
Proceedings of the Fifth International Conference on Secure Software Integration and Reliability Improvement, 2011
Proceedings of the Fifth International Conference on Secure Software Integration and Reliability Improvement, 2011
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011
Proceedings of the Web Technologies and Applications - 13th Asia-Pacific Web Conference, 2011
Identification and Evaluation of Sharing Memory Covert Timing Channel in Xen Virtual Machines.
Proceedings of the IEEE International Conference on Cloud Computing, 2011
2010
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010
Multi-objective disassembly line balancing via modified ant colony optimization algorithm.
Proceedings of the Fifth International Conference on Bio-Inspired Computing: Theories and Applications, 2010
2005
Evaluation of the Capability of Personal Software Process Based on Data Envelopment Analysis.
Proceedings of the Unifying the Software Process Spectrum, 2005