Qiang Liu

Orcid: 0000-0002-2749-160X

Affiliations:
  • National University of Defense Technology, College of Computer, Changsha, China


According to our database1, Qiang Liu authored at least 100 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Coordinated cyber-physical attacks based on different attack strategies for cascading failure analysis in smart grids.
Wirel. Networks, July, 2024

2023
Turning backdoors for efficient privacy protection against image retrieval violations.
Inf. Process. Manag., September, 2023

2022
A Robust Coverless Steganography Scheme Using Camouflage Image.
IEEE Trans. Circuits Syst. Video Technol., 2022

Editorial: Heterogeneous Cloud-Based Intelligent Computing for Next-Generation 5G Applications.
Mob. Networks Appl., 2022

Opportunistic Backdoor Attacks: Exploring Human-imperceptible Vulnerabilities on Speech Recognition Systems.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

Characterizing and Detecting Non-Consensual Photo Sharing on Social Networks.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Reversible Sub-Feature Retrieval: Toward Robust Coverless Image Steganography for Geometric Attacks Resistance.
KSII Trans. Internet Inf. Syst., 2021

AutoCEW: An Autonomous Cyberspace Early Warning Framework via Ensemble Learning.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

A Competence-Based Three-Layer Cybersecurity Education Framework and Its Application.
Proceedings of the ACM TURC 2021: ACM Turing Award Celebration Conference - Hefei, China, 30 July 2021, 2021

2020
Intelligent resource management for 5G.
Wirel. Networks, 2020

Top-k Dominating Queries on Skyline Groups.
IEEE Trans. Knowl. Data Eng., 2020

Coverless steganography based on image retrieval of DenseNet features and DWT sequence mapping.
Knowl. Based Syst., 2020

Coverless real-time image information hiding based on image block matching and dense convolutional network.
J. Real Time Image Process., 2020

Subspace segmentation-based robust multiple kernel clustering.
Inf. Fusion, 2020

Evaluating Deep Learning for Image Classification in Adversarial Environment.
IEICE Trans. Inf. Syst., 2020

Joint probability-based classifier based on vine copula method for land use classification of multispectral remote sensing data.
Earth Sci. Informatics, 2020

Coverless image steganography based on DenseNet feature mapping.
EURASIP J. Image Video Process., 2020

A Multi-View Approach Based on Naming Behavioral Modeling for Aligning Chinese User Accounts across Multiple Networks.
CoRR, 2020

A multiview approach based on naming behavioral modeling for aligning chinese user accounts across multiple networks.
Concurr. Comput. Pract. Exp., 2020

Model Capacity Vulnerability in Hyper-Parameters Estimation.
IEEE Access, 2020

Trusted Link-Separation Multipath Selection for Software-Defined Wireless Sensor Networks in Adversarial Environments.
Proceedings of the Security and Privacy in Digital Economy, 2020

A Simple yet Effective Unsupervised Adversarial Example Generation Framework for Vulnerability Assessment on Deep Learning.
Proceedings of the Theoretical Computer Science - 38th National Conference, 2020

Web Security Education in A Multidisciplinary Learning Context.
Proceedings of the ACM TUR-C'20: ACM Turing Celebration Conference, 2020

Research on SDN Enabled by Machine Learning: An Overview.
Proceedings of the 6GN for Future Wireless Networks - Third EAI International Conference, 2020

2019
Fast and unsupervised outlier removal by recurrent adaptive reconstruction extreme learning machine.
Int. J. Mach. Learn. Cybern., 2019

Scalable k-means for large-scale clustering.
Intell. Data Anal., 2019

Multi-objective Link-Separation Multipath Selection Using k Max-Min for Software-Defined MANETs.
Proceedings of the 15th International Conference on Mobile Ad-Hoc and Sensor Networks, 2019

iWEP: An Intelligent WLAN Early Warning Platform Using Edge Computing.
Proceedings of the 15th International Conference on Mobile Ad-Hoc and Sensor Networks, 2019

Robustness Can Be Cheap: A Highly Efficient Approach to Discover Outliers under High Outlier Ratios.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
Heterogeneous Metric Learning of Categorical Data with Hierarchical Couplings.
IEEE Trans. Knowl. Data Eng., 2018

Incremental multiple kernel extreme learning machine and its application in Robo-advisors.
Soft Comput., 2018

Influence of Different Coupling Modes on the Robustness of Smart Grid under Targeted Attack.
Sensors, 2018

A Survey on Security-Aware Measurement in SDN.
Secur. Commun. Networks, 2018

TR-IDS: Anomaly-Based Intrusion Detection through Text-Convolutional Neural Network and Random Forest.
Secur. Commun. Networks, 2018

Hyperparameter selection of one-class support vector machine by self-adaptive data shifting.
Pattern Recognit., 2018

Selecting the Optimal Hidden Layer of Extreme Learning Machine Using Multiple Kernel Learning.
KSII Trans. Internet Inf. Syst., 2018

Community Detection Based on Differential Evolution Using Modularity Density.
Inf., 2018

Financial time series prediction using ℓ<sub>2, 1</sub>RF-ELM.
Neurocomputing, 2018

BEBP: An Poisoning Method Against Machine Learning Based IDSs.
CoRR, 2018

A DDoS Detection Method for Socially Aware Networking Based on Forecasting Fusion Feature Sequence.
Comput. J., 2018

Incomplete Multiview Clustering via Late Fusion.
Comput. Intell. Neurosci., 2018

Group Recommendation Based on Financial Social Network for Robo-Advisor.
IEEE Access, 2018

Intensity Filtering and Group Fusion for Accurate Mobile Place Recognition.
IEEE Access, 2018

A Survey of Clustering With Deep Learning: From the Perspective of Network Architecture.
IEEE Access, 2018

A Survey on Security Threats and Defensive Techniques of Machine Learning: A Data Driven View.
IEEE Access, 2018

Exploration of Human Activities Using Sensing Data via Deep Embedded Determination.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

Poisoning Machine Learning Based Wireless IDSs via Stealing Learning Model.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

Degrading Detection Performance of Wireless IDSs Through Poisoning Feature Selection.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

Individual Analysis Model and Related Research in Social Networks.
Proceedings of the 2018 IEEE SmartWorld, 2018

Detecting Abnormality without Knowing Normality: A Two-stage Approach for Unsupervised Video Abnormal Event Detection.
Proceedings of the 2018 ACM Multimedia Conference on Multimedia Conference, 2018

DDoS Attack Security Situation Assessment Model Using Fusion Feature Based on Fuzzy C-Means Clustering Algorithm.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

A Joint Approach to Data Clustering and Robo-Advisor.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

SU-IDS: A Semi-supervised and Unsupervised Framework for Network Intrusion Detection.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Comparative Study of CNN and RNN for Deep Learning Based Intrusion Detection System.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Chronic Poisoning against Machine Learning Based IDSs Using Edge Pattern Detection.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Topic Analysis Model for Online Social Network.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Virtual Community Detection Model and Related Research in Online Social Networks.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Evaluating the effectiveness of situational case-based teaching: a view of concept mapping.
Proceedings of ACM Turing Celebration Conference - China, 2018

2017
MST-GEN: An Efficient Parameter Selection Method for One-Class Extreme Learning Machine.
IEEE Trans. Cybern., 2017

Mobile Cyber-Physical System.
Mob. Inf. Syst., 2017

A highly efficient human activity classification method using mobile data from wearable sensors.
Int. J. Sens. Networks, 2017

Complete three-phase detection framework for identifying abnormal cervical cells.
IET Image Process., 2017

Leveraging local h-index to identify and rank influential spreaders in networks.
CoRR, 2017

Parallelization of skyline probability computation over uncertain preferences.
Concurr. Comput. Pract. Exp., 2017

Parallelization of group-based skyline computation for multi-core processors.
Concurr. Comput. Pract. Exp., 2017

Consensus Kernel K-Means Clustering for Incomplete Multiview Data.
Comput. Intell. Neurosci., 2017

Coupled Multiple Kernel Learning for Supervised Classification.
Comput. Informatics, 2017

A Practical Data Forwarding Path Selecting Method for Software-Defined 5G Networking.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

Image-Based Video Retrieval Using Deep Feature.
Proceedings of the 2017 IEEE International Conference on Smart Computing, 2017

Group Burstiness Weighting for Image Retrieval.
Proceedings of the Advances in Multimedia Information Processing - PCM 2017, 2017

A Bi-directional Evolution Algorithm for Financial Recommendation Model.
Proceedings of the Theoretical Computer Science - 35th National Conference, 2017

Fusion of Global and Local Deep Representation for Effective Object Retrieval.
Proceedings of the Theoretical Computer Science - 35th National Conference, 2017

HL-HAR: Hierarchical Learning Based Human Activity Recognition in Wearable Computing.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

Model-Aware Representation Learning for Categorical Data with Hierarchical Couplings.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2017, 2017

Top-k Skyline Groups Queries.
Proceedings of the 20th International Conference on Extending Database Technology, 2017

Similarity search for image retrieval via local-constrained linear coding.
Proceedings of the 10th International Congress on Image and Signal Processing, 2017

Computing skyline groups: an experimental evaluation.
Proceedings of the ACM Turing 50th Celebration Conference, 2017

Evaluation of situational case-based teaching technique in engineering education.
Proceedings of the ACM Turing 50th Celebration Conference, 2017

2016
A security patch addressing bandwidth request vulnerabilities in the IEEE 802.16 standard.
IEEE Netw., 2016

Applying a new localized generalization error model to design neural networks trained with extreme learning machine.
Neural Comput. Appl., 2016

Random Fourier extreme learning machine with ℓ<sub>2, 1</sub>-norm regularization.
Neurocomputing, 2016

MI-ELM: Highly efficient multi-instance learning based on hierarchical extreme learning machine.
Neurocomputing, 2016

A TCP-friendly AQM algorithm to mitigate low-rate DDoS attacks.
Int. J. Auton. Adapt. Commun. Syst., 2016

A Novel Method of Influence Ranking via Node Degree and H-index for Community Detection.
Proceedings of the Web-Age Information Management, 2016

Collaborative Partitioning for Multiple Social Networks with Anchor Nodes.
Proceedings of the Web-Age Information Management - 17th International Conference, 2016

The Prediction of User Topic Interest Based on Tags and Interaction of Users.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

Group Detection for Specific Topic on Micro-Blog.
Proceedings of the 13th Web Information Systems and Applications Conference, 2016

2015
CIS: Community-based information sharing mechanism for automotive IoT.
Proceedings of the 2nd IEEE World Forum on Internet of Things, 2015

SH-CRAN: Hierarchical Framework to Support Mobile Big Data Computing in a Secure Manner.
Proceedings of the 2015 Workshop on Mobile Big Data, 2015

2014
A binary feature selection framework in kernel spaces.
Proceedings of the 2014 International Joint Conference on Neural Networks, 2014

Spectral clustering-based local and global structure preservation for feature selection.
Proceedings of the 2014 International Joint Conference on Neural Networks, 2014

2013
FADE: Forwarding Assessment Based Detection of Collaborative Grey Hole Attacks in WMNs.
IEEE Trans. Wirel. Commun., 2013

Extreme Learning Machines.
IEEE Intell. Syst., 2013

A mobile crowdsensing system enhanced by cloud-based social networking services.
Proceedings of the First International Workshop on Middleware for Cloud-enabled Sensing, 2013

Enhanced detection and restoration of low-rate denial-of-service in wireless multi-hop networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2013

A Bio-inspired Jamming Detection and Restoration for WMNs: In View of Adaptive Immunology.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

Community Cloud: Concept, Model, Attacks and Solution.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

2012
ISAR: Improved Situation-Aware Routing Method for Wireless Mesh Backbones.
IEEE Commun. Lett., 2012

2010
A Novel Threat Assessment Method for DDoS Early Warning Using Network Vulnerability Analysis.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Virtual Network Embedding for Evolving Networks.
Proceedings of the Global Communications Conference, 2010


  Loading...