Ting Liu
Orcid: 0000-0002-7600-0934Affiliations:
- Xi'an Jiaotong University, School of Electronic and Information Engineering, MOEKLINNS, China (PhD 2010)
According to our database1,
Ting Liu
authored at least 152 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
A Dynamic and Static Combined State Recovery Method Against FDI Attacks in Power Grids.
IEEE Trans. Smart Grid, November, 2024
3Erefactor: Effective, Efficient and Executable Refactoring Recommendation for Software Architectural Consistency.
IEEE Trans. Software Eng., October, 2024
Stealthy Data Integrity Attack Against Consensus-Based Distributed Energy Management Algorithm.
IEEE Trans. Ind. Informatics, August, 2024
Data Protection Method Against Cross-Domain Inference Threat in Cyber-Physical Power Grid.
IEEE Trans. Smart Grid, July, 2024
Estimating Nodal Admittance Matrix for Ill-Posed Inverse Power Flow Problem in Power Grid.
IEEE Trans. Ind. Informatics, April, 2024
IEEE Trans. Inf. Forensics Secur., 2024
Intrusion Device Detection in Fieldbus Networks Based on Channel-State Group Fingerprint.
IEEE Trans. Inf. Forensics Secur., 2024
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
LIReDroid: LLM-Enhanced Test Case Generation for Static Sensitive Behavior Replication.
Proceedings of the 15th Asia-Pacific Symposium on Internetware, 2024
Proceedings of the 15th Asia-Pacific Symposium on Internetware, 2024
PyAnalyzer: An Effective and Practical Approach for Dependency Extraction from Python Code.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
A Virtual Primary Key Generation Scheme Based on Dimensionality Reduction and Encoding for Digital Fingerprinting.
Proceedings of the 20th IEEE International Conference on Automation Science and Engineering, 2024
A Positive-Unlabeled Learning Approach for Detecting Malicious In-app Purchases on the App Store.
Proceedings of the 20th IEEE International Conference on Automation Science and Engineering, 2024
2023
PatchDiscovery: Patch Presence Test for Identifying Binary Vulnerabilities Based on Key Basic Blocks.
IEEE Trans. Software Eng., December, 2023
1-to-1 or 1-to-n? Investigating the Effect of Function Inlining on Binary Similarity Analysis.
ACM Trans. Softw. Eng. Methodol., July, 2023
IEEE Internet Things J., July, 2023
Aesthetics++: Refining Graphic Designs by Exploring Design Principles and Human Preference.
IEEE Trans. Vis. Comput. Graph., June, 2023
A Reflection-Based Channel Fingerprint to Locate Physically Intrusive Devices in ICS.
IEEE Trans. Ind. Informatics, April, 2023
IEEE Trans. Ind. Informatics, April, 2023
Evaluating the Impact of Possible Dependencies on Architecture-Level Maintainability.
IEEE Trans. Software Eng., March, 2023
IEEE Trans. Software Eng., February, 2023
Detecting suspicious transactions in a virtual-currency-enabled online social network.
J. Netw. Comput. Appl., February, 2023
Implementation of Risk-Aggregated Substation Testbed Using Generative Adversarial Networks.
IEEE Trans. Smart Grid, 2023
IEEE Trans. Dependable Secur. Comput., 2023
Do as You Say: Consistency Detection of Data Practice in Program Code and Privacy Policy in Mini-App.
CoRR, 2023
Proceedings of the 2023 ACM/IEEE International Conference on Technical Debt (TechDebt), 2023
Proceedings of the 2023 ACM Workshop on Secure and Trustworthy Superapps, 2023
Proceedings of the 2023 ACM Workshop on Secure and Trustworthy Superapps, 2023
Dependency Facade: The Coupling and Conflicts between Android Framework and Its Customization.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023
A Parse-Then-Place Approach for Generating Graphic Layouts from Textual Descriptions.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
2022
IEEE Trans. Reliab., 2022
Multiperiod Unmanned Aerial Vehicles Path Planning With Dynamic Emergency Priorities for Geohazards Monitoring.
IEEE Trans. Ind. Informatics, 2022
IEEE Trans Autom. Sci. Eng., 2022
How to manage a task-oriented virtual assistant software project: an experience report.
Frontiers Inf. Technol. Electron. Eng., 2022
Channel-State-Based Fingerprinting Against Physical Access Attack in Industrial Field Bus Network.
IEEE Internet Things J., 2022
Comparing One with Many - Solving Binary2source Function Matching Under Function Inlining.
CoRR, 2022
Multi-stage Moving Target Defense: A Security-enhanced D-FACTS Implementation Approach.
CoRR, 2022
CoRR, 2022
Towards characterizing bug fixes through dependency-level changes in Apache Java open source projects.
Sci. China Inf. Sci., 2022
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022
Proceedings of the 44th IEEE/ACM International Conference on Software Engineering: Software Engineering in Practice, 2022
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022
Proceedings of the 18th IEEE International Conference on Automation Science and Engineering, 2022
2021
IEEE Trans. Software Eng., 2021
Using K-core Decomposition on Class Dependency Networks to Improve Bug Prediction Model's Practical Performance.
IEEE Trans. Software Eng., 2021
IEEE Trans. Software Eng., 2021
Can We Trust Your Explanations? Sanity Checks for Interpreters in Android Malware Analysis.
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Inf. Forensics Secur., 2021
A Novel Large Group Decision-Making Method via Normalized Alternative Prediction Selection.
IEEE Trans. Fuzzy Syst., 2021
One-to-One or One-to-many? What function inlining brings to binary2source similarity analysis.
CoRR, 2021
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021
Interpretation-enabled Software Reuse Detection Based on a Multi-Level Birthmark Model.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2021, 2021
An Estimation Method of Transmission Line Parameters Based on Measurements of Injection Power and Voltage Phasor in Power Grid.
Proceedings of the 17th IEEE International Conference on Automation Science and Engineering, 2021
An Unsupervised-Learning Based Method for Detecting Groups of Malicious Web Crawlers in Internet.
Proceedings of the 17th IEEE International Conference on Automation Science and Engineering, 2021
Identifying Vulnerable Set of Cascading Failure in Power Grid Using Deep Learning Framework.
Proceedings of the 17th IEEE International Conference on Automation Science and Engineering, 2021
Chase: A Large-Scale and Pragmatic Chinese Dataset for Cross-Database Context-Dependent Text-to-SQL.
Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, 2021
2020
IEEE Trans. Smart Grid, 2020
IEEE Trans. Software Eng., 2020
IEEE Trans. Reliab., 2020
IEEE Trans. Inf. Forensics Secur., 2020
J. Syst. Softw., 2020
CoRR, 2020
Proceedings of the 27th IEEE International Conference on Software Analysis, 2020
Proceedings of the MSR '20: 17th International Conference on Mining Software Repositories, 2020
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020
Proceedings of the ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020
Recovering fitness gradients for interprocedural Boolean flags in search-based testing.
Proceedings of the ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020
Proceedings of the 31st IEEE International Symposium on Software Reliability Engineering, 2020
Proceedings of the Internetware'20: 12th Asia-Pacific Symposium on Internetware, 2020
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020
Proceedings of the ICSE-SEIP 2020: 42nd International Conference on Software Engineering, Software Engineering in Practice, Seoul, South Korea, 27 June, 2020
Physical Intrusion Detection against Device-connected Attack in Industrial Control Systems.
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing, 2020
Proceedings of the 16th IEEE International Conference on Automation Science and Engineering, 2020
2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019
Active Hotspot: An Issue-Oriented Model to Monitor Software Evolution and Degradation.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019
Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2019
Proceedings of the 41st International Conference on Software Engineering: Software Engineering Education and Training, 2019
Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, 2019
Graph embedding based familial analysis of Android malware using unsupervised learning.
Proceedings of the 41st International Conference on Software Engineering, 2019
Proceedings of the 41st International Conference on Software Engineering, 2019
Method Selecting Correct One Among Alternatives Utilizing Intuitionistic Fuzzy Preference Relation Without Consensus Reaching Process.
Proceedings of the 2019 IEEE International Conference on Fuzzy Systems, 2019
A Model-Driven Learning Approach for Predicting the Personalized Dynamic Thermal Comfort in Ordinary Office Environment.
Proceedings of the 15th IEEE International Conference on Automation Science and Engineering, 2019
Towards Complex Text-to-SQL in Cross-Domain Database with Intermediate Representation.
Proceedings of the 57th Conference of the Association for Computational Linguistics, 2019
2018
Reviving Sequential Program Birthmarking for Multithreaded Software Plagiarism Detection.
IEEE Trans. Software Eng., 2018
Android Malware Familial Classification and Representative Sample Selection via Frequent Subgraph Analysis.
IEEE Trans. Inf. Forensics Secur., 2018
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018
Proceedings of the 2018 IEEE International Conference on Web Services, 2018
Crowd Intelligence for Decision Making Based on Positive and Negative Comparing With Linguistic Scale.
Proceedings of the 2018 IEEE International Conference on Fuzzy Systems, 2018
SemRegex: A Semantics-Based Approach for Generating Regular Expressions from Natural Language Specifications.
Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing, Brussels, Belgium, October 31, 2018
Android Malware Detector Exploiting Convolutional Neural Network and Adaptive Classifier Selection.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
Mitigating Stealthy False Data Injection Attacks Against State Estimation in Smart Grid.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
Generating Regular Expressions from Natural Language Specifications: Are We There Yet?
Proceedings of the Workshops of the The Thirty-Second AAAI Conference on Artificial Intelligence, 2018
2017
IEEE Trans. Inf. Forensics Secur., 2017
Analyzing and modeling dynamics of information diffusion in microblogging social network.
J. Netw. Comput. Appl., 2017
IEEE Commun. Mag., 2017
IEEE Access, 2017
IEEE Access, 2017
Proceedings of the 2017 IEEE International Conference on Software Testing, 2017
Proceedings of the 2nd Workshop on Cyber-Physical Security and Resilience in Smart Grids, 2017
Load identification based on Factorial Hidden Markov Model and online performance analysis.
Proceedings of the 13th IEEE Conference on Automation Science and Engineering, 2017
2016
Improving Linguistic Pairwise Comparison Consistency via Linguistic Discrete Regions.
IEEE Trans. Fuzzy Syst., 2016
Exploiting thread-related system calls for plagiarism detection of multithreaded programs.
J. Syst. Softw., 2016
Proceedings of the International Conference on Software Analysis, Testing and Evolution, 2016
Proceedings of the 1st International Workshop on Specification, 2016
Proceedings of the 27th IEEE International Symposium on Software Reliability Engineering, 2016
Proceedings of the 38th International Conference on Software Engineering, 2016
Proceedings of the 2016 IEEE International Conference on Fuzzy Systems, 2016
Proceedings of the IEEE International Conference on Automation Science and Engineering, 2016
2015
Software Plagiarism Detection with Birthmarks Based on Dynamic Key Instruction Sequences.
IEEE Trans. Software Eng., 2015
ACM SIGSOFT Softw. Eng. Notes, 2015
Exploring community structure of software Call Graph and its applications in class cohesion measurement.
J. Syst. Softw., 2015
Abnormal traffic-indexed state estimation: A cyber-physical fusion approach for Smart Grid attack detection.
Future Gener. Comput. Syst., 2015
SHE: Smart home energy management system based on social and motion behavior cognition.
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015
Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2015 ACM International Symposium on Wearable Computers, 2015
Proceedings of the 2015 IEEE International Conference on Fuzzy Systems, 2015
2014
IEEE Trans. Smart Grid, 2014
Reducing Test Cases with Causality Partitions.
Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering, 2014
DBPD: A Dynamic Birthmark-based Software Plagiarism Detection Tool.
Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering, 2014
Proceedings of the Symposium on Applied Computing, 2014
Plagiarism detection for multithreaded software based on thread-aware software birthmarks.
Proceedings of the 22nd International Conference on Program Comprehension, 2014
Proceedings of the 6th International Workshop on Constraints in Software Testing, 2014
Proceedings of the 5th International Workshop on Emerging Trends in Software Metrics, 2014
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014
SHE: smart home energy management system for appliance identification and personalized scheduling.
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014
A new approach to improve the consistency of linguistic pair-wise comparison matrix and derive interval weight vector.
Proceedings of the IEEE International Conference on Fuzzy Systems, 2014
IFSDA: An intuitionistic fuzzy set-based data aggregation approach for software maintainability evaluation.
Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery, 2014
Proceedings of the 2014 IEEE International Conference on Automation Science and Engineering, 2014
2013
Proceedings of the ACM SIGCOMM 2013 Conference, 2013
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Proceedings of IEEE International Conference on Communications, 2013
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013
A discrete region-based approach to improve the consistency of pair-wise comparison matrix.
Proceedings of the FUZZ-IEEE 2013, 2013
2012
Int. J. Comput. Commun. Control, 2012
A layered classification for malicious function identification and malware detection.
Concurr. Comput. Pract. Exp., 2012
Sci. China Inf. Sci., 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
2011
Proceedings of the Network and Parallel Computing - 8th IFIP International Conference, 2011
Proceedings of the Network and Parallel Computing - 8th IFIP International Conference, 2011
2009
A new worm exploiting IPv6 and IPv4-IPv6 dual-stack networks: experiment, modeling, simulation, and defense.
IEEE Netw., 2009
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009