Peng Liu

Orcid: 0000-0003-2583-9112

Affiliations:
  • Guangxi Normal University, School of Computer Science and Information Technology, Guangxi Key Lab of Multi-Source Information Mining and Security, Guilin, China
  • Beihang University, School of Computer Science and Engineering, Beijing, China (PhD 2017)


According to our database1, Peng Liu authored at least 37 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Trustworthy and Consistent Blockchain Oracle Scheme for Industrial Internet of Things.
IEEE Trans. Netw. Serv. Manag., October, 2024

API2Vec++: Boosting API Sequence Representation for Malware Detection and Classification.
IEEE Trans. Software Eng., August, 2024

RR-Row: Redirect-on-Write Based Virtual Machine Disk for Record/Replay.
IEICE Trans. Inf. Syst., 2024

A Distributed Efficient Blockchain Oracle Scheme for Internet of Things.
IEICE Trans. Commun., 2024

SEMSO: A Secure and Efficient Multi-Data Source Blockchain Oracle.
CoRR, 2024

DesTest: A Decentralised Testing Architecture for Improving Data Accuracy of Blockchain Oracle.
CoRR, 2024

Safeguarding the Truth of High-Value Price Oracle Task: A Dynamically Adjusted Truth Discovery Method.
CoRR, 2024

FedDCT: A Dynamic Cross-Tier Federated Learning Framework in Wireless Networks.
Proceedings of the Wireless Artificial Intelligent Computing Systems and Applications, 2024

APIBeh: Learning Behavior Inclination of APIs for Malware Classification.
Proceedings of the 35th IEEE International Symposium on Software Reliability Engineering, 2024

SpanMRC: Query with Entity Length for MRC-Based Named Entity Recognition.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024

A Power Trading and Scheduling Scheme Based on MA-ABSE.
Proceedings of the 2024 5th International Conference on Computing, 2024

GANcrop: A Contrastive Defense Against Backdoor Attacks in Federated Learning.
Proceedings of the 2024 5th International Conference on Computing, 2024

2023
Graph neural network based approach to automatically assigning common weakness enumeration identifiers for vulnerabilities.
Cybersecur., December, 2023

A Microgrid Trading Framework Based on PoC Consensus.
CoRR, 2023

A Data Middleware for Obtaining Trusted Price Data for Blockchain.
CoRR, 2023

FedDCT: A Dynamic Cross-Tier Federated Learning Scheme in Wireless Communication Networks.
CoRR, 2023

Secure and Trusted Copyright Protection for Educational Data on Redactable Blockchains.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

2022
Efficient and traceable data sharing for the Internet of Things in smart cities.
Comput. Electr. Eng., 2022

Backdoor Attacks against Deep Neural Networks by Personalized Audio Steganography.
Proceedings of the 26th International Conference on Pattern Recognition, 2022

2021
VDSimilar: Vulnerability detection based on code similarity of vulnerabilities and patches.
Comput. Secur., 2021

POI Recommendation with Federated Learning and Privacy Preserving in Cross Domain Recommendation.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

2020
Local differential privacy for social network publishing.
Neurocomputing, 2020

GCBlock: A Grouping and Coding Based Storage Scheme for Blockchain System.
IEEE Access, 2020

A Privacy Preserving Method for Publishing Set-valued Data and Its Correlative Social Network.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Groupchain: A Blockchain Model with Privacy-preservation and Supervision.
Proceedings of the HP3C 2020: 4th International Conference on High Performance Compilation, 2020

2019
Information Entropy Differential Privacy: A Differential Privacy Protection Data Method Based on Rough Set Theory.
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019

2018
A Hierarchical k-Anonymous Technique of Graphlet Structural Perception in Social Network Publishing.
Proceedings of the Mobile, Secure, and Programmable Networking, 2018

2017
移动商务推荐系统中的一种基于P2P的隐私保护策略 (P2P-based Privacy Protection Strategy in Mobile-commerce Recommender System).
计算机科学, 2017

Partial k-Anonymity for Privacy-Preserving Social Network Data Publishing.
Int. J. Softw. Eng. Knowl. Eng., 2017

Randomized Perturbation for Privacy-Preserving Social Network Data Publishing.
Proceedings of the IEEE International Conference on Big Knowledge, 2017

Anonymizing approach to resist label-neighborhood attacks in dynamic releases of social networks.
Proceedings of the 19th IEEE International Conference on e-Health Networking, 2017

2016
A Local-Perturbation Anonymizing Approach to Preserving Community Structure in Released Social Networks.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2016

2015
社会网络分析软件研究 (Study of Social Network Analysis Software).
计算机科学, 2015

Lightweight Virtual Machine Checkpoint and Rollback for Long-running Applications.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
A Personalized Privacy Preserving Method for Publishing Social Network Data.
Proceedings of the Theory and Applications of Models of Computation, 2014

A Hybrid Algorithm for Privacy Preserving Social Network Publication.
Proceedings of the Advanced Data Mining and Applications - 10th International Conference, 2014

2013
An Improved Privacy Preserving Algorithm for Publishing Social Network Data.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013


  Loading...