Qiang Liu
Orcid: 0000-0002-2749-160XAffiliations:
- National University of Defense Technology, College of Computer, Changsha, China
According to our database1,
Qiang Liu
authored at least 100 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Coordinated cyber-physical attacks based on different attack strategies for cascading failure analysis in smart grids.
Wirel. Networks, July, 2024
2023
Turning backdoors for efficient privacy protection against image retrieval violations.
Inf. Process. Manag., September, 2023
2022
IEEE Trans. Circuits Syst. Video Technol., 2022
Editorial: Heterogeneous Cloud-Based Intelligent Computing for Next-Generation 5G Applications.
Mob. Networks Appl., 2022
Opportunistic Backdoor Attacks: Exploring Human-imperceptible Vulnerabilities on Speech Recognition Systems.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Reversible Sub-Feature Retrieval: Toward Robust Coverless Image Steganography for Geometric Attacks Resistance.
KSII Trans. Internet Inf. Syst., 2021
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021
A Competence-Based Three-Layer Cybersecurity Education Framework and Its Application.
Proceedings of the ACM TURC 2021: ACM Turing Award Celebration Conference - Hefei, China, 30 July 2021, 2021
2020
Coverless steganography based on image retrieval of DenseNet features and DWT sequence mapping.
Knowl. Based Syst., 2020
Coverless real-time image information hiding based on image block matching and dense convolutional network.
J. Real Time Image Process., 2020
IEICE Trans. Inf. Syst., 2020
Joint probability-based classifier based on vine copula method for land use classification of multispectral remote sensing data.
Earth Sci. Informatics, 2020
EURASIP J. Image Video Process., 2020
A Multi-View Approach Based on Naming Behavioral Modeling for Aligning Chinese User Accounts across Multiple Networks.
CoRR, 2020
A multiview approach based on naming behavioral modeling for aligning chinese user accounts across multiple networks.
Concurr. Comput. Pract. Exp., 2020
Trusted Link-Separation Multipath Selection for Software-Defined Wireless Sensor Networks in Adversarial Environments.
Proceedings of the Security and Privacy in Digital Economy, 2020
A Simple yet Effective Unsupervised Adversarial Example Generation Framework for Vulnerability Assessment on Deep Learning.
Proceedings of the Theoretical Computer Science - 38th National Conference, 2020
Proceedings of the ACM TUR-C'20: ACM Turing Celebration Conference, 2020
Proceedings of the 6GN for Future Wireless Networks - Third EAI International Conference, 2020
2019
Fast and unsupervised outlier removal by recurrent adaptive reconstruction extreme learning machine.
Int. J. Mach. Learn. Cybern., 2019
Multi-objective Link-Separation Multipath Selection Using k Max-Min for Software-Defined MANETs.
Proceedings of the 15th International Conference on Mobile Ad-Hoc and Sensor Networks, 2019
Proceedings of the 15th International Conference on Mobile Ad-Hoc and Sensor Networks, 2019
Robustness Can Be Cheap: A Highly Efficient Approach to Discover Outliers under High Outlier Ratios.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019
2018
IEEE Trans. Knowl. Data Eng., 2018
Incremental multiple kernel extreme learning machine and its application in Robo-advisors.
Soft Comput., 2018
Influence of Different Coupling Modes on the Robustness of Smart Grid under Targeted Attack.
Sensors, 2018
TR-IDS: Anomaly-Based Intrusion Detection through Text-Convolutional Neural Network and Random Forest.
Secur. Commun. Networks, 2018
Hyperparameter selection of one-class support vector machine by self-adaptive data shifting.
Pattern Recognit., 2018
Selecting the Optimal Hidden Layer of Extreme Learning Machine Using Multiple Kernel Learning.
KSII Trans. Internet Inf. Syst., 2018
Inf., 2018
A DDoS Detection Method for Socially Aware Networking Based on Forecasting Fusion Feature Sequence.
Comput. J., 2018
IEEE Access, 2018
IEEE Access, 2018
A Survey of Clustering With Deep Learning: From the Perspective of Network Architecture.
IEEE Access, 2018
A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View.
IEEE Access, 2018
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018
Degrading Detection Performance of Wireless IDSs Through Poisoning Feature Selection.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018
Proceedings of the 2018 IEEE SmartWorld, 2018
Detecting Abnormality without Knowing Normality: A Two-stage Approach for Unsupervised Video Abnormal Event Detection.
Proceedings of the 2018 ACM Multimedia Conference on Multimedia Conference, 2018
DDoS Attack Security Situation Assessment Model Using Fusion Feature Based on Fuzzy C-Means Clustering Algorithm.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
SU-IDS: A Semi-supervised and Unsupervised Framework for Network Intrusion Detection.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
Evaluating the effectiveness of situational case-based teaching: a view of concept mapping.
Proceedings of ACM Turing Celebration Conference - China, 2018
2017
MST-GEN: An Efficient Parameter Selection Method for One-Class Extreme Learning Machine.
IEEE Trans. Cybern., 2017
A highly efficient human activity classification method using mobile data from wearable sensors.
Int. J. Sens. Networks, 2017
IET Image Process., 2017
CoRR, 2017
Concurr. Comput. Pract. Exp., 2017
Concurr. Comput. Pract. Exp., 2017
Comput. Intell. Neurosci., 2017
Comput. Informatics, 2017
A Practical Data Forwarding Path Selecting Method for Software-Defined 5G Networking.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017
Proceedings of the 2017 IEEE International Conference on Smart Computing, 2017
Proceedings of the Advances in Multimedia Information Processing - PCM 2017, 2017
Proceedings of the Theoretical Computer Science - 35th National Conference, 2017
Proceedings of the Theoretical Computer Science - 35th National Conference, 2017
HL-HAR: Hierarchical Learning Based Human Activity Recognition in Wearable Computing.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017
Model-Aware Representation Learning for Categorical Data with Hierarchical Couplings.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2017, 2017
Proceedings of the 20th International Conference on Extending Database Technology, 2017
Proceedings of the 10th International Congress on Image and Signal Processing, 2017
Proceedings of the ACM Turing 50th Celebration Conference, 2017
Proceedings of the ACM Turing 50th Celebration Conference, 2017
2016
A security patch addressing bandwidth request vulnerabilities in the IEEE 802.16 standard.
IEEE Netw., 2016
Applying a new localized generalization error model to design neural networks trained with extreme learning machine.
Neural Comput. Appl., 2016
Neurocomputing, 2016
MI-ELM: Highly efficient multi-instance learning based on hierarchical extreme learning machine.
Neurocomputing, 2016
Int. J. Auton. Adapt. Commun. Syst., 2016
A Novel Method of Influence Ranking via Node Degree and H-index for Community Detection.
Proceedings of the Web-Age Information Management, 2016
Proceedings of the Web-Age Information Management - 17th International Conference, 2016
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016
Proceedings of the 13th Web Information Systems and Applications Conference, 2016
2015
Proceedings of the 2nd IEEE World Forum on Internet of Things, 2015
SH-CRAN: Hierarchical Framework to Support Mobile Big Data Computing in a Secure Manner.
Proceedings of the 2015 Workshop on Mobile Big Data, 2015
2014
Proceedings of the 2014 International Joint Conference on Neural Networks, 2014
Spectral clustering-based local and global structure preservation for feature selection.
Proceedings of the 2014 International Joint Conference on Neural Networks, 2014
2013
FADE: Forwarding Assessment Based Detection of Collaborative Grey Hole Attacks in WMNs.
IEEE Trans. Wirel. Commun., 2013
Proceedings of the First International Workshop on Middleware for Cloud-enabled Sensing, 2013
Enhanced detection and restoration of low-rate denial-of-service in wireless multi-hop networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2013
A Bio-inspired Jamming Detection and Restoration for WMNs: In View of Adaptive Immunology.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013
2012
IEEE Commun. Lett., 2012
2010
A Novel Threat Assessment Method for DDoS Early Warning Using Network Vulnerability Analysis.
Proceedings of the Fourth International Conference on Network and System Security, 2010
Proceedings of the Global Communications Conference, 2010