Qi Liao

Orcid: 0000-0001-5520-157X

Affiliations:
  • Central Michigan University, Department of Computer Science, MI, USA
  • University of Notre Dame, Department of Computer Science and Engineering, IN, USA


According to our database1, Qi Liao authored at least 48 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Is Quantum Computing the Bitcoin Terminator?
Proceedings of the 30th Americas Conference on Information Systems: Elevating Life through Digital Social Entrepreneurship, 2024

2023
Game Theory of Cheating Autonomous Vehicles.
Proceedings of the IEEE International Conference on Mobility, 2023

Adversarial Spam Generation Using Adaptive Gradient-Based Word Embedding Perturbations.
Proceedings of the IEEE International Conference on Artificial Intelligence, 2023

2022
Preventive portfolio against data-selling ransomware - A game theory of encryption and deception.
Comput. Secur., 2022

2021
Game Theory of Data-selling Ransomware.
J. Cyber Secur. Mobil., 2021

2020
A Game-theoretic analysis on the economic viability of mobile content pre-staging.
Wirel. Networks, 2020

OnionGraph: Hierarchical topology+attribute multivariate network visualization.
Vis. Informatics, 2020

Ransomware 2.0: to sell, or not to sell a game-theoretical model of data-selling Ransomware.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Dynamic Link Anomaly Analysis for Network Security Management.
J. Netw. Syst. Manag., 2019

Understanding user passwords through password prefix and postfix (P3) graph analysis and visualization.
Int. J. Inf. Sec., 2019

2018
Anomaly analysis and visualization for dynamic networks through spatiotemporal graph segmentations.
J. Netw. Comput. Appl., 2018

Economic solutions to improve cybersecurity of governments and smart cities via vulnerability markets.
Gov. Inf. Q., 2018

Harnessing Uncertainty in Vulnerability Market.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

CAPTCHA: Machine or Human Solvers? A Game-Theoretical Analysis.
Proceedings of the 5th IEEE International Conference on Cyber Security and Cloud Computing, 2018

2017
Spatial-Temporal Anomaly Detection Using Security Visual Analytics via Entropy Graph and Eigen Matrix.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

2016
User password repetitive patterns analysis and visualization.
Inf. Comput. Secur., 2016

Exploration of Linked Anomalies in Sensor Data for Suspicious Behavior Detection.
Int. J. Softw. Informatics, 2016

Effective network management via dynamic network anomaly visualization.
Int. J. Netw. Manag., 2016

On the economics of mobile content pre-staging.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

An Economic Alternative to Improve Cybersecurity of E-government and Smart Cities.
Proceedings of the 17th International Digital Government Research Conference on Digital Government Research, 2016

2015
1.5D Egocentric Dynamic Network Visualization.
IEEE Trans. Vis. Comput. Graph., 2015

Dynamic DinoFun World Communication Graph.
Proceedings of the 10th IEEE Conference on Visual Analytics Science and Technology, 2015

2014
Toward a Monopoly Botnet Market.
Inf. Secur. J. A Glob. Perspect., 2014

Analyzing Spatiotemporal Anomalies through Interactive Visualization.
Informatics, 2014

Network pricing: can both ISP and P2P benefit?
Int. J. Netw. Manag., 2014

Portfolio optimization of computer and mobile botnets.
Int. J. Inf. Sec., 2014

Is more P2P always bad for ISPs? An analysis of P2P and ISP business models.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

Bridging the Gap of Network Management and Anomaly Detection through Interactive Visualization.
Proceedings of the IEEE Pacific Visualization Symposium, 2014

Hierarchical Focus+Context Heterogeneous Network Visualization.
Proceedings of the IEEE Pacific Visualization Symposium, 2014

2013
Visual analysis of large-scale network anomalies.
IBM J. Res. Dev., 2013

Scalable network traffic visualization using compressed graphs.
Proceedings of the 2013 IEEE International Conference on Big Data (IEEE BigData 2013), 2013

Analysis of offense tactics of basketball games using link prediction.
Proceedings of the 2013 IEEE/ACIS 12th International Conference on Computer and Information Science, 2013

2012
Could firewall rules be public - a game theoretical perspective.
Secur. Commun. Networks, 2012

Report on the SIGCOMM 2011 conference.
Comput. Commun. Rev., 2012

Intelligent network management using graph differential anomaly visualization.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

3D anomaly bar visualization for large-scale network: VAST 2012 Mini Challenge #1.
Proceedings of the 7th IEEE Conference on Visual Analytics Science and Technology, 2012

Investigating network traffic through compressed graph visualization: VAST 2012 Mini Challenge 2 award: "Good adaptation of graph analysis techniques".
Proceedings of the 7th IEEE Conference on Visual Analytics Science and Technology, 2012

2011
Fighting botnets with economic uncertainty.
Secur. Commun. Networks, 2011

Visualizing anomalies in sensor networks.
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011

SAVE: Sensor anomaly visualization engine.
Proceedings of the 6th IEEE Conference on Visual Analytics Science and Technology, 2011

2010
Managing networks through context: Graph visualization and exploration.
Comput. Networks, 2010

Visualizing graph dynamics and similarity for enterprise network security and management.
Proceedings of the 7th International Symposium on Visualization for Cyber Security, 2010

2009
Botnet Economics: Uncertainty Matters.
Proceedings of the Managing Information Risk and the Economics of Security, 2009

2008
RIPPS: Rogue Identifying Packet Payload Slicer Detecting Unauthorized Wireless Hosts Through Network Traffic Conditioning.
ACM Trans. Inf. Syst. Secur., 2008

Using selective, short-term memory to improve resilience against DDoS exhaustion attacks.
Secur. Commun. Networks, 2008

Botnet Economics: Uncertainty Matters.
Proceedings of the 7th Annual Workshop on the Economics of Information Security, 2008

ENAVis: Enterprise Network Activities Visualization.
Proceedings of the 22nd Large Installation System Administration Conference, 2008

2007
SAABCOT: Secure application-agnostic bandwidth conservation techniques.
Proceedings of the Fourth International Conference on Broadband Communications, 2007


  Loading...