Peng Liu
Orcid: 0000-0003-2583-9112Affiliations:
- Guangxi Normal University, School of Computer Science and Information Technology, Guangxi Key Lab of Multi-Source Information Mining and Security, Guilin, China
- Beihang University, School of Computer Science and Engineering, Beijing, China (PhD 2017)
According to our database1,
Peng Liu
authored at least 34 papers
between 2013 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
A Trustworthy and Consistent Blockchain Oracle Scheme for Industrial Internet of Things.
IEEE Trans. Netw. Serv. Manag., October, 2024
API2Vec++: Boosting API Sequence Representation for Malware Detection and Classification.
IEEE Trans. Software Eng., August, 2024
IEICE Trans. Inf. Syst., 2024
IEICE Trans. Commun., 2024
DesTest: A Decentralised Testing Architecture for Improving Data Accuracy of Blockchain Oracle.
CoRR, 2024
Safeguarding the Truth of High-Value Price Oracle Task: A Dynamically Adjusted Truth Discovery Method.
CoRR, 2024
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024
Proceedings of the 2024 5th International Conference on Computing, 2024
Proceedings of the 2024 5th International Conference on Computing, 2024
2023
Graph neural network based approach to automatically assigning common weakness enumeration identifiers for vulnerabilities.
Cybersecur., December, 2023
FedDCT: A Dynamic Cross-Tier Federated Learning Scheme in Wireless Communication Networks.
CoRR, 2023
Secure and Trusted Copyright Protection for Educational Data on Redactable Blockchains.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023
2022
Comput. Electr. Eng., 2022
Proceedings of the 26th International Conference on Pattern Recognition, 2022
2021
VDSimilar: Vulnerability detection based on code similarity of vulnerabilities and patches.
Comput. Secur., 2021
POI Recommendation with Federated Learning and Privacy Preserving in Cross Domain Recommendation.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021
2020
IEEE Access, 2020
A Privacy Preserving Method for Publishing Set-valued Data and Its Correlative Social Network.
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the HP3C 2020: 4th International Conference on High Performance Compilation, 2020
2019
Information Entropy Differential Privacy: A Differential Privacy Protection Data Method Based on Rough Set Theory.
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019
2018
A Hierarchical k-Anonymous Technique of Graphlet Structural Perception in Social Network Publishing.
Proceedings of the Mobile, Secure, and Programmable Networking, 2018
2017
移动商务推荐系统中的一种基于P2P的隐私保护策略 (P2P-based Privacy Protection Strategy in Mobile-commerce Recommender System).
计算机科学, 2017
Int. J. Softw. Eng. Knowl. Eng., 2017
Proceedings of the IEEE International Conference on Big Knowledge, 2017
Anonymizing approach to resist label-neighborhood attacks in dynamic releases of social networks.
Proceedings of the 19th IEEE International Conference on e-Health Networking, 2017
2016
A Local-Perturbation Anonymizing Approach to Preserving Community Structure in Released Social Networks.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2016
2015
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
2014
Proceedings of the Theory and Applications of Models of Computation, 2014
Proceedings of the Advanced Data Mining and Applications - 10th International Conference, 2014
2013
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013