Qingyun Liu

Orcid: 0009-0009-8326-2850

According to our database1, Qingyun Liu authored at least 137 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Zero-Phase Filter-Based Adaptive Fourier Decomposition and Its Application to Fault Diagnosis of Rolling Bearing.
IEEE Trans. Instrum. Meas., 2024

Common and Rare Fundus Diseases Identification Using Vision-Language Foundation Model with Knowledge of Over 400 Diseases.
CoRR, 2024

Wisdom of Committee: Distilling from Foundation Model to Specialized Application Model.
CoRR, 2024

TellMeTalk: Multimodal-driven talking face video generation.
Comput. Electr. Eng., 2024

TPTrack: Strengthening tracking-by-detection methods from tracklet processing perspectives.
Comput. Electr. Eng., 2024

Research on roller bearing fault diagnosis based on robust smooth constrained matrix machine under imbalanced data.
Adv. Eng. Informatics, 2024

HSDirSniper: A New Attack Exploiting Vulnerabilities in Tor's Hidden Service Directories.
Proceedings of the ACM on Web Conference 2024, 2024

Identifying VPN Servers through Graph-Represented Behaviors.
Proceedings of the ACM on Web Conference 2024, 2024

Knock-Knock: De-Anonymise Hidden Services by Exploiting Service Answer Vulnerability.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2024

Co-optimize Content Generation and Consumption in a Large Scale Video Recommendation System.
Proceedings of the 18th ACM Conference on Recommender Systems, 2024

Short-form Video Needs Long-term Interests: An Industrial Solution for Serving Large User Sequence Models.
Proceedings of the 18th ACM Conference on Recommender Systems, 2024

Zenith: Real-time Identification of DASH Encrypted Video Traffic with Distortion.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

No Source Code? No Problem! Demystifying and Detecting Mask Apps in iOS.
Proceedings of the 32nd IEEE/ACM International Conference on Program Comprehension, 2024

Measuring Encrypted DNS Service with TLS1.3 Support over IPv6.
Proceedings of the IEEE Symposium on Computers and Communications, 2024

LEVI: Generalizable Fine-tuning via Layer-wise Ensemble of Different Views.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

Beneath the Facade of IP Leasing: Graph-Based Approach for Identifying Malicious IP Blocks.
Proceedings of the Computational Science - ICCS 2024, 2024

Meta Structure Search for Link Weight Prediction in Heterogeneous Graphs.
Proceedings of the IEEE International Conference on Acoustics, 2024

A Targeted Adversarial Attack Method for Multi-Classification Malicious Traffic Detection.
Proceedings of the IEEE International Conference on Acoustics, 2024

ProxyKiller: An Anonymous Proxy Traffic Attack Model Based on Traffic Behavior Graphs.
Proceedings of the Computer Security - ESORICS 2024, 2024

From Fingerprint to Footprint: Characterizing the Dependencies in Encrypted DNS Infrastructures.
Proceedings of the Computer Security - ESORICS 2024, 2024

PFTB: A Prediction-Based Fair Token Bucket Algorithm based on CRDT.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

6GAI: Active IPv6 Address Generation via Adversarial Training with Leaked Information.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

2023
Output-Feedback Prescribed Performance Control for the Full-State Constrained Nonlinear Systems and Its Application to DC Motor System.
IEEE Trans. Syst. Man Cybern. Syst., July, 2023

A Spatiotemporally Constrained Interpolation Method for Missing Pixel Values in the Suomi-NPP VIIRS Monthly Composite Images: Taking Shanghai as an Example.
Remote. Sens., May, 2023

Barrier Lyapunov Function-Based Adaptive Output Feedback Prescribed Performance Controller for Hydraulic Systems With Uncertainties Compensation.
IEEE Trans. Ind. Electron., 2023

Talking Models: Distill Pre-trained Knowledge to Downstream Models via Interactive Communication.
CoRR, 2023

Measuring DNS-over-Encryption Performance Over IPv6.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

SeeStar: An Efficient Starlink Asset Detection Framework.
Proceedings of the Science of Cyber Security - 5th International Conference, 2023

Wrapping DNS into HTTP(S): An Empirical Study on Name Resolution in Mobile Applications.
Proceedings of the IFIP Networking Conference, 2023

SIFAST: An Efficient Unix Shell Embedding Framework for Malicious Detection.
Proceedings of the Information Security - 26th International Conference, 2023

A Comprehensive Evaluation of the Impact on Tor Network Anonymity Caused by ShadowRelay.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

Before Toasters Rise Up: A View into the Emerging DoH Resolver's Deployment Risk.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

Hunting for Hidden RDP-MITM: Analyzing and Detecting RDP MITM Tools Based on Network Features.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

GoGDDoS: A Multi-Classifier for DDoS Attacks Using Graph Neural Networks.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

CCSv6: A Detection Model for DNS-over-HTTPS Tunnel Using Attention Mechanism over IPv6.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

A Novel Phase Unwrapping Method Based on a Quality Map and Local Polynomial Surface Fitting with Applications in MR Temperature Imaging.
Proceedings of the 7th International Conference on Biomedical Engineering and Applications, 2023

Unveiling Flawed Cache Structures in DNS Infrastructure via Record Watermarking.
Proceedings of the IEEE Global Communications Conference, 2023

IDTracker: Discovering Illicit Website Communities via Third-party Service IDs.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

DarkFT: Automatic Scanning Behavior Analysis with FastText in Darknet Traffic.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

AHIP: An Adaptive IP Hopping Method for Moving Target Defense to Thwart Network Attacks.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

Detecting Fake-Normal Pornographic and Gambling Websites through one Multi-Attention HGNN.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

SpoofingGuard: A Content-agnostic Framework for Email Spoofing Detection via Delivery Graph.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

A Robust and Accurate Encrypted Video Traffic Identification Method via Graph Neural Network.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

Long-Short Terms Frequency: A Method for Encrypted Video Streaming Identification.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

DualDNSMiner: A Dual-Stack Resolver Discovery Method Based on Alias Resolution.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2023

Multitask Ranking System for Immersive Feed and No More Clicks: A Case Study of Short-Form Video Recommendation.
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023

2022
Dynamic penalty adaptive matrix machine for the intelligent detection of unbalanced faults in roller bearing.
Knowl. Based Syst., 2022

Composite Multivariate Multi-Scale Permutation Entropy and Laplacian Score Based Fault Diagnosis of Rolling Bearing.
Entropy, 2022

Adaptive neural network-based sliding mode control for a hydraulic rotary drive joint.
Comput. Electr. Eng., 2022

KAGAN: A Chinese poetry style transfer method.
Comput. Electr. Eng., 2022

SAM-TB: a whole genome sequencing data analysis website for detection of <i>Mycobacterium tuberculosis</i> drug resistance and transmission.
Briefings Bioinform., 2022

Pinball transfer support matrix machine for roller bearing fault diagnosis under limited annotation data.
Appl. Soft Comput., 2022

A Lightweight Graph-based Method to Detect Pornographic and Gambling Websites with Imperfect Datasets.
Proceedings of the IEEE International Conference on Trust, 2022

Detection of DoH Tunnels with Dual-Tier Classifier.
Proceedings of the 18th International Conference on Mobility, Sensing and Networking, 2022

Fighting Against Piracy: An Approach to Detect Pirated Video Websites Enhanced by Third-party Services.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

A Robot-Assisted System for Dental Implantation.
Proceedings of the Intelligent Robotics and Applications - 15th International Conference, 2022

MHGEE: Event Extraction via Multi-granularity Heterogeneous Graph.
Proceedings of the Computational Science - ICCS 2022, 2022

P4-NSAF: defending IPv6 networks against ICMPv6 DoS and DDoS attacks with P4.
Proceedings of the IEEE International Conference on Communications, 2022

GDMD: A Transmission Control Scheme with Block Information-aware for Delay Sensitive Multimedia.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

RTD: The Road to Encrypted Video Traffic Identification in the Heterogeneous Network Environments.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

SequenceShield: A Robust and Accurate DDoS Detection Method via Serializing the Traffic with Direction Information.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

Accelerate State Sharing of Network Function with RDMA.
Proceedings of the IEEE Global Communications Conference, 2022

GraphDDoS: Effective DDoS Attack Detection Using Graph Neural Networks.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

HinPage: Illegal and Harmful Webpage Identification Using Transductive Classification.
Proceedings of the Information Security and Cryptology - 18th International Conference, 2022

2021
Uniform robust exact differentiator-based output feedback adaptive robust control for DC motor drive systems.
Trans. Inst. Meas. Control, 2021

The Traverse Symplectic Correlation-Gram (TSCgram): A New and Effective Method of Optimal Demodulation Band Selection for Rolling Bearing.
IEEE Trans. Instrum. Meas., 2021

Coal and Rock Hardness Identification Based on EEMD and Multi-Scale Permutation Entropy.
Entropy, 2021

Permutation entropy-based improved uniform phase empirical mode decomposition for mechanical fault diagnosis.
Digit. Signal Process., 2021

Sketch to portrait generation with generative adversarial networks and edge constraint.
Comput. Electr. Eng., 2021

Relative Radiation Correction Based on CycleGAN for Visual Perception Improvement in High-Resolution Remote Sensing Images.
IEEE Access, 2021

Multivariate Nonlinear Sparse Mode Decomposition and Its Application in Gear Fault Diagnosis.
IEEE Access, 2021

Peek Inside the Encrypted World: Autoencoder-Based Detection of DoH Resolvers.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Neighbours and Kinsmen: Hateful Users Detection with Graph Neural Network.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2021

Mechanical Design of a Modular Gripper for Rehabilitation of Stroke Patients with Hemiplegia.
Proceedings of the IEEE International Symposium on Medical Measurements and Applications, 2021

CDNFinder: Detecting CDN-hosted Nodes by Graph-Based Semi-Supervised Classification.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

A P4-Based Packet Scheduling Approach for Clustered Deep Packet Inspection Appliances.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021

Attributed Heterogeneous Graph Neural Network for Malicious Domain Detection.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

Unsupervised clustering analysis of SARS-Cov-2 population structure reveals six major subtypes at early stage across the world.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2021

2020
You Are What You Broadcast: Identification of Mobile and IoT Devices from (Public) WiFi.
Proceedings of the 29th USENIX Security Symposium, 2020

MAAN: A Multiple Attribute Association Network for Mobile Encrypted Traffic Classification.
Proceedings of the Security and Privacy in Communication Networks, 2020

Predicting User Influence in the Propagation of Toxic Information.
Proceedings of the Knowledge Science, Engineering and Management, 2020

Traceback: Learning to Identify Website's Landing URLs via Noisy Web Traces Passively.
Proceedings of the 27th International Conference on Telecommunications, 2020

DOOM: a Training-Free, Real-Time Video Flow Identification Method for Encrypted Traffic.
Proceedings of the 27th International Conference on Telecommunications, 2020

ITP-KNN: Encrypted Video Flow Identification Based on the Intermittent Traffic Pattern of Video and K-Nearest Neighbors Classification.
Proceedings of the Computational Science - ICCS 2020, 2020

How Many Users Behind A Local Recursive DNS Server? Estimated by Delta-Time Cluster Model.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

BPA: The Optimal Placement of Interdependent VNFs in Many-Core System.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2020

2019
Composite Interpolation-Based Multiscale Fuzzy Entropy and Its Application to Fault Diagnosis of Rolling Bearing.
Entropy, 2019

Time-Shift Multi-scale Weighted Permutation Entropy and GWO-SVM Based Fault Diagnosis Approach for Rolling Bearing.
Entropy, 2019

State Constraint Control for Uncertain Nonlinear Systems With Disturbance Compensation.
IEEE Access, 2019

A Novel Roller Bearing Condition Monitoring Method Based on RHLCD and FVPMCD.
IEEE Access, 2019

Simulation and Evaluation of CAVs Behavior in an Isolated Signalized Intersection Equipped with Dynamic Wireless Power Transfer System.
Proceedings of the 2019 IEEE Intelligent Transportation Systems Conference, 2019

Learning from Time Series with Outlier Correction for Malicious Domain Identification.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2019

SAED: A Self-Adaptive Encryption and Decryption Architecture.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019

IDNS: A High-Performance Model for Identification of DNS Infrastructures on Large-scale Traffic.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

Tear Off Your Disguise: Phishing Website Detection Using Visual and Network Identities.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

MeshTrust: A CDN-Centric Trust Model for Reputation Management on Video Traffic.
Proceedings of the Computational Science - ICCS 2019, 2019

Hunting for Invisible SmartCam: Characterizing and Detecting Smart Camera Based on Netflow Analysis.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Tensor: A Transaction-Oriented Low-Latency and Reliable Data Distribution Scheme for Multi-IDCs Based on Redis.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

NTS: A Scalable Virtual Testbed Architecture with Dynamic Scheduling and Backpressure.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2019

2018
Extreme-point weighted mode decomposition.
Signal Process., 2018

VegaStar: An Illegal Domain Detection System on Large-Scale Video Traffic.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Adaptive Malicious URL Detection: Learning in the Presence of Concept Drifts.
Proceedings of the 17th IEEE International Conference On Trust, 2018

My Friend Leaks My Privacy: Modeling and Analyzing Privacy in Social Networks.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

Latte: Large-Scale Lateral Movement Detection.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

WDMTI: Wireless Device Manufacturer and Type Identification Using Hierarchical Dirichlet Process.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018

Redis++: A High Performance In-Memory Database Based on Segmented Memory Management and Two-Level Hash Index.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

MalFilter: A Lightweight Real-Time Malicious URL Filtering System in Large-Scale Networks.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

Hashing Incomplete and Unordered Network Streams.
Proceedings of the Advances in Digital Forensics XIV, 2018

DomainObserver: A Lightweight Solution for Detecting Malicious Domains Based on Dynamic Time Warping.
Proceedings of the Computational Science - ICCS 2018, 2018

SASD: A Self-Adaptive Stateful Decompression Architecture.
Proceedings of the IEEE Global Communications Conference, 2018

2017
Data-driven Graph Analysis.
PhD thesis, 2017

A Refined Composite Multivariate Multiscale Fuzzy Entropy and Laplacian Score-Based Fault Diagnosis Method for Rolling Bearings.
Entropy, 2017

WiFi fingerprint releasing for indoor localization based on differential privacy.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017

ProxyDetector: A Guided Approach to Finding Web Proxies.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

Echo Chambers in Investment Discussion Boards.
Proceedings of the Eleventh International Conference on Web and Social Media, 2017

De-anonymous and Anonymous Technologies for Network Traffic Release.
Proceedings of the Applications and Techniques in Information Security, 2017

2016
Self-Similarity in Social Network Dynamics.
ACM Trans. Model. Perform. Evaluation Comput. Syst., 2016

Network Growth and Link Prediction Through an Empirical Lens.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

CookieMiner: Towards real-time reconstruction of web-downloading chains from network traces.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

2015
Graph Watermarks.
CoRR, 2015

A novel robot hand with the magneto-rheological fluid solidification.
Proceedings of the 2015 IEEE International Conference on Robotics and Biomimetics, 2015

Data-oriented multi-index hashing.
Proceedings of the 2015 IEEE International Conference on Multimedia and Expo, 2015

A Scalable Distributed Private Stream Search System.
Proceedings of the IEEE 35th International Conference on Distributed Computing Systems Workshops, 2015

Limited Dictionary Builder: An approach to select representative tokens for malicious URLs detection.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Towards Graph Watermarks.
Proceedings of the 2015 ACM on Conference on Online Social Networks, 2015

2014
Metro transport network architectures for the future.
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2014

RAMID: A Novel Risk Assessment Model of Information Dissemination on Social Network.
Proceedings of the Trustworthy Computing and Services - International Conference, 2014

Self-Adaptive Frequency Scaling Architecture for Intrusion Detection System.
Proceedings of the Trustworthy Computing and Services - International Conference, 2014

A factor-searching-based multiple string matching algorithm for intrusion detection.
Proceedings of the IEEE International Conference on Communications, 2014

GuidedTracker: Track the victims with access logs to finding malicious web pages.
Proceedings of the IEEE Global Communications Conference, 2014

A Memory-Based Continuous Query Index for Stream Processing.
Proceedings of the 2014 IEEE International Congress on Big Data, Anchorage, AK, USA, June 27, 2014

2013
EPLogCleaner: Improving Data Quality of Enterprise Proxy Logs for Efficient Web Usage Mining.
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013

A New Approach to Decrease Invalidate Rate of Weak Consistency Methods in Web Proxy Caching.
Proceedings of the Trustworthy Computing and Services, 2013

2012
A Dynamic Strategy to Cache Out-of-Sequence Packet in DPI System.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

Provenance-based Indexing Support in Micro-blog Platforms.
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012

2011
Efficient Data Association in Visual Sensor Networks with Missing Detection.
EURASIP J. Adv. Signal Process., 2011

Distributed data association in smart camera networks.
Proceedings of the 2011 Fifth ACM/IEEE International Conference on Distributed Smart Cameras, 2011


  Loading...