Qingyun Liu
Orcid: 0009-0009-8326-2850
According to our database1,
Qingyun Liu
authored at least 137 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Zero-Phase Filter-Based Adaptive Fourier Decomposition and Its Application to Fault Diagnosis of Rolling Bearing.
IEEE Trans. Instrum. Meas., 2024
Common and Rare Fundus Diseases Identification Using Vision-Language Foundation Model with Knowledge of Over 400 Diseases.
CoRR, 2024
Wisdom of Committee: Distilling from Foundation Model to Specialized Application Model.
CoRR, 2024
Comput. Electr. Eng., 2024
TPTrack: Strengthening tracking-by-detection methods from tracklet processing perspectives.
Comput. Electr. Eng., 2024
Research on roller bearing fault diagnosis based on robust smooth constrained matrix machine under imbalanced data.
Adv. Eng. Informatics, 2024
HSDirSniper: A New Attack Exploiting Vulnerabilities in Tor's Hidden Service Directories.
Proceedings of the ACM on Web Conference 2024, 2024
Proceedings of the ACM on Web Conference 2024, 2024
Knock-Knock: De-Anonymise Hidden Services by Exploiting Service Answer Vulnerability.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2024
Co-optimize Content Generation and Consumption in a Large Scale Video Recommendation System.
Proceedings of the 18th ACM Conference on Recommender Systems, 2024
Short-form Video Needs Long-term Interests: An Industrial Solution for Serving Large User Sequence Models.
Proceedings of the 18th ACM Conference on Recommender Systems, 2024
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
Proceedings of the 32nd IEEE/ACM International Conference on Program Comprehension, 2024
Proceedings of the IEEE Symposium on Computers and Communications, 2024
Proceedings of the Forty-first International Conference on Machine Learning, 2024
Beneath the Facade of IP Leasing: Graph-Based Approach for Identifying Malicious IP Blocks.
Proceedings of the Computational Science - ICCS 2024, 2024
Proceedings of the IEEE International Conference on Acoustics, 2024
A Targeted Adversarial Attack Method for Multi-Classification Malicious Traffic Detection.
Proceedings of the IEEE International Conference on Acoustics, 2024
ProxyKiller: An Anonymous Proxy Traffic Attack Model Based on Traffic Behavior Graphs.
Proceedings of the Computer Security - ESORICS 2024, 2024
From Fingerprint to Footprint: Characterizing the Dependencies in Encrypted DNS Infrastructures.
Proceedings of the Computer Security - ESORICS 2024, 2024
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
6GAI: Active IPv6 Address Generation via Adversarial Training with Leaked Information.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
2023
Output-Feedback Prescribed Performance Control for the Full-State Constrained Nonlinear Systems and Its Application to DC Motor System.
IEEE Trans. Syst. Man Cybern. Syst., July, 2023
A Spatiotemporally Constrained Interpolation Method for Missing Pixel Values in the Suomi-NPP VIIRS Monthly Composite Images: Taking Shanghai as an Example.
Remote. Sens., May, 2023
Barrier Lyapunov Function-Based Adaptive Output Feedback Prescribed Performance Controller for Hydraulic Systems With Uncertainties Compensation.
IEEE Trans. Ind. Electron., 2023
Talking Models: Distill Pre-trained Knowledge to Downstream Models via Interactive Communication.
CoRR, 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the Science of Cyber Security - 5th International Conference, 2023
Wrapping DNS into HTTP(S): An Empirical Study on Name Resolution in Mobile Applications.
Proceedings of the IFIP Networking Conference, 2023
Proceedings of the Information Security - 26th International Conference, 2023
A Comprehensive Evaluation of the Impact on Tor Network Anonymity Caused by ShadowRelay.
Proceedings of the IEEE Symposium on Computers and Communications, 2023
Proceedings of the IEEE Symposium on Computers and Communications, 2023
Hunting for Hidden RDP-MITM: Analyzing and Detecting RDP MITM Tools Based on Network Features.
Proceedings of the IEEE Symposium on Computers and Communications, 2023
Proceedings of the IEEE Symposium on Computers and Communications, 2023
CCSv6: A Detection Model for DNS-over-HTTPS Tunnel Using Attention Mechanism over IPv6.
Proceedings of the IEEE Symposium on Computers and Communications, 2023
A Novel Phase Unwrapping Method Based on a Quality Map and Local Polynomial Surface Fitting with Applications in MR Temperature Imaging.
Proceedings of the 7th International Conference on Biomedical Engineering and Applications, 2023
Proceedings of the IEEE Global Communications Conference, 2023
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
AHIP: An Adaptive IP Hopping Method for Moving Target Defense to Thwart Network Attacks.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
Detecting Fake-Normal Pornographic and Gambling Websites through one Multi-Attention HGNN.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
SpoofingGuard: A Content-agnostic Framework for Email Spoofing Detection via Delivery Graph.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
A Robust and Accurate Encrypted Video Traffic Identification Method via Graph Neural Network.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2023
Multitask Ranking System for Immersive Feed and No More Clicks: A Case Study of Short-Form Video Recommendation.
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023
2022
Dynamic penalty adaptive matrix machine for the intelligent detection of unbalanced faults in roller bearing.
Knowl. Based Syst., 2022
Composite Multivariate Multi-Scale Permutation Entropy and Laplacian Score Based Fault Diagnosis of Rolling Bearing.
Entropy, 2022
Adaptive neural network-based sliding mode control for a hydraulic rotary drive joint.
Comput. Electr. Eng., 2022
SAM-TB: a whole genome sequencing data analysis website for detection of <i>Mycobacterium tuberculosis</i> drug resistance and transmission.
Briefings Bioinform., 2022
Pinball transfer support matrix machine for roller bearing fault diagnosis under limited annotation data.
Appl. Soft Comput., 2022
A Lightweight Graph-based Method to Detect Pornographic and Gambling Websites with Imperfect Datasets.
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the 18th International Conference on Mobility, Sensing and Networking, 2022
Fighting Against Piracy: An Approach to Detect Pirated Video Websites Enhanced by Third-party Services.
Proceedings of the IEEE Symposium on Computers and Communications, 2022
Proceedings of the Intelligent Robotics and Applications - 15th International Conference, 2022
Proceedings of the Computational Science - ICCS 2022, 2022
Proceedings of the IEEE International Conference on Communications, 2022
GDMD: A Transmission Control Scheme with Block Information-aware for Delay Sensitive Multimedia.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022
RTD: The Road to Encrypted Video Traffic Identification in the Heterogeneous Network Environments.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022
SequenceShield: A Robust and Accurate DDoS Detection Method via Serializing the Traffic with Direction Information.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022
Proceedings of the IEEE Global Communications Conference, 2022
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022
HinPage: Illegal and Harmful Webpage Identification Using Transductive Classification.
Proceedings of the Information Security and Cryptology - 18th International Conference, 2022
2021
Uniform robust exact differentiator-based output feedback adaptive robust control for DC motor drive systems.
Trans. Inst. Meas. Control, 2021
The Traverse Symplectic Correlation-Gram (TSCgram): A New and Effective Method of Optimal Demodulation Band Selection for Rolling Bearing.
IEEE Trans. Instrum. Meas., 2021
Coal and Rock Hardness Identification Based on EEMD and Multi-Scale Permutation Entropy.
Entropy, 2021
Permutation entropy-based improved uniform phase empirical mode decomposition for mechanical fault diagnosis.
Digit. Signal Process., 2021
Sketch to portrait generation with generative adversarial networks and edge constraint.
Comput. Electr. Eng., 2021
Relative Radiation Correction Based on CycleGAN for Visual Perception Improvement in High-Resolution Remote Sensing Images.
IEEE Access, 2021
Multivariate Nonlinear Sparse Mode Decomposition and Its Application in Gear Fault Diagnosis.
IEEE Access, 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2021
Mechanical Design of a Modular Gripper for Rehabilitation of Stroke Patients with Hemiplegia.
Proceedings of the IEEE International Symposium on Medical Measurements and Applications, 2021
Proceedings of the IEEE Symposium on Computers and Communications, 2021
A P4-Based Packet Scheduling Approach for Clustered Deep Packet Inspection Appliances.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021
Unsupervised clustering analysis of SARS-Cov-2 population structure reveals six major subtypes at early stage across the world.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2021
2020
You Are What You Broadcast: Identification of Mobile and IoT Devices from (Public) WiFi.
Proceedings of the 29th USENIX Security Symposium, 2020
MAAN: A Multiple Attribute Association Network for Mobile Encrypted Traffic Classification.
Proceedings of the Security and Privacy in Communication Networks, 2020
Proceedings of the Knowledge Science, Engineering and Management, 2020
Traceback: Learning to Identify Website's Landing URLs via Noisy Web Traces Passively.
Proceedings of the 27th International Conference on Telecommunications, 2020
DOOM: a Training-Free, Real-Time Video Flow Identification Method for Encrypted Traffic.
Proceedings of the 27th International Conference on Telecommunications, 2020
ITP-KNN: Encrypted Video Flow Identification Based on the Intermittent Traffic Pattern of Video and K-Nearest Neighbors Classification.
Proceedings of the Computational Science - ICCS 2020, 2020
How Many Users Behind A Local Recursive DNS Server? Estimated by Delta-Time Cluster Model.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2020
2019
Composite Interpolation-Based Multiscale Fuzzy Entropy and Its Application to Fault Diagnosis of Rolling Bearing.
Entropy, 2019
Time-Shift Multi-scale Weighted Permutation Entropy and GWO-SVM Based Fault Diagnosis Approach for Rolling Bearing.
Entropy, 2019
State Constraint Control for Uncertain Nonlinear Systems With Disturbance Compensation.
IEEE Access, 2019
IEEE Access, 2019
Simulation and Evaluation of CAVs Behavior in an Isolated Signalized Intersection Equipped with Dynamic Wireless Power Transfer System.
Proceedings of the 2019 IEEE Intelligent Transportation Systems Conference, 2019
Learning from Time Series with Outlier Correction for Malicious Domain Identification.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2019
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019
IDNS: A High-Performance Model for Identification of DNS Infrastructures on Large-scale Traffic.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019
Tear Off Your Disguise: Phishing Website Detection Using Visual and Network Identities.
Proceedings of the Information and Communications Security - 21st International Conference, 2019
Proceedings of the Computational Science - ICCS 2019, 2019
Hunting for Invisible SmartCam: Characterizing and Detecting Smart Camera Based on Netflow Analysis.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Tensor: A Transaction-Oriented Low-Latency and Reliable Data Distribution Scheme for Multi-IDCs Based on Redis.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019
NTS: A Scalable Virtual Testbed Architecture with Dynamic Scheduling and Backpressure.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2019
2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018
Proceedings of the 2018 IEEE Military Communications Conference, 2018
WDMTI: Wireless Device Manufacturer and Type Identification Using Hierarchical Dirichlet Process.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018
Redis++: A High Performance In-Memory Database Based on Segmented Memory Management and Two-Level Hash Index.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018
MalFilter: A Lightweight Real-Time Malicious URL Filtering System in Large-Scale Networks.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018
Proceedings of the Advances in Digital Forensics XIV, 2018
DomainObserver: A Lightweight Solution for Detecting Malicious Domains Based on Dynamic Time Warping.
Proceedings of the Computational Science - ICCS 2018, 2018
Proceedings of the IEEE Global Communications Conference, 2018
2017
A Refined Composite Multivariate Multiscale Fuzzy Entropy and Laplacian Score-Based Fault Diagnosis Method for Rolling Bearings.
Entropy, 2017
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017
Proceedings of the Eleventh International Conference on Web and Social Media, 2017
Proceedings of the Applications and Techniques in Information Security, 2017
2016
ACM Trans. Model. Perform. Evaluation Comput. Syst., 2016
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016
CookieMiner: Towards real-time reconstruction of web-downloading chains from network traces.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
2015
Proceedings of the 2015 IEEE International Conference on Robotics and Biomimetics, 2015
Proceedings of the 2015 IEEE International Conference on Multimedia and Expo, 2015
Proceedings of the IEEE 35th International Conference on Distributed Computing Systems Workshops, 2015
Limited Dictionary Builder: An approach to select representative tokens for malicious URLs detection.
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the 2015 ACM on Conference on Online Social Networks, 2015
2014
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2014
Proceedings of the Trustworthy Computing and Services - International Conference, 2014
Proceedings of the Trustworthy Computing and Services - International Conference, 2014
Proceedings of the IEEE International Conference on Communications, 2014
Proceedings of the IEEE Global Communications Conference, 2014
Proceedings of the 2014 IEEE International Congress on Big Data, Anchorage, AK, USA, June 27, 2014
2013
EPLogCleaner: Improving Data Quality of Enterprise Proxy Logs for Efficient Web Usage Mining.
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013
A New Approach to Decrease Invalidate Rate of Weak Consistency Methods in Web Proxy Caching.
Proceedings of the Trustworthy Computing and Services, 2013
2012
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012
2011
EURASIP J. Adv. Signal Process., 2011
Proceedings of the 2011 Fifth ACM/IEEE International Conference on Distributed Smart Cameras, 2011