Weiwei Liu
Orcid: 0000-0001-7353-9136Affiliations:
- Nanjing University of Science and Technology, School of Automation, China (PhD 2015)
According to our database1,
Weiwei Liu
authored at least 31 papers
between 2011 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on scopus.com
-
on orcid.org
On csauthors.net:
Bibliography
2025
IEEE Trans. Inf. Forensics Secur., 2025
2024
IEEE Trans. Cogn. Commun. Netw., June, 2024
M2VT-IDS: A multi-task multi-view learning architecture for designing IoT intrusion detection system.
Internet Things, April, 2024
2023
A deep learning-based framework to identify and characterise heterogeneous secure network traffic.
IET Inf. Secur., March, 2023
2021
Detecting Multielement Algorithmically Generated Domain Names Based on Adaptive Embedding Model.
Secur. Commun. Networks, 2021
Secur. Commun. Networks, 2021
Optimal attack strategy selection of an autonomous cyber-physical micro-grid based on attack-defense game model.
J. Ambient Intell. Humaniz. Comput., 2021
Int. J. Digit. Crime Forensics, 2021
Comput. Commun., 2021
IEEE Access, 2021
Application Behavior Identification in DNS Tunnels Based on Spatial-Temporal Information.
IEEE Access, 2021
2020
KSII Trans. Internet Inf. Syst., 2020
Prospect Theoretic Study of Honeypot Defense Against Advanced Persistent Threats in Power Grid.
IEEE Access, 2020
Mimicking Ship-Radiated Noise With Chaos Signal for Covert Underwater Acoustic Communication.
IEEE Access, 2020
2019
Symmetry, 2019
Multim. Tools Appl., 2019
KSII Trans. Internet Inf. Syst., 2019
2018
Using Insider Swapping of Time Intervals to Perform Highly Invisible Network Flow Watermarking.
Secur. Commun. Networks, 2018
Secur. Commun. Networks, 2018
Sound Texture Generative Model Guided by a Lossless Mel-Frequency Convolutional Neural Network.
IEEE Access, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
2017
Proceedings of the Cloud Computing and Security - Third International Conference, 2017
2016
Designing Analog Fountain Timing Channels: Undetectability, Robustness, and Model-Adaptation.
IEEE Trans. Inf. Forensics Secur., 2016
Matrix embedding in multicast steganography: analysis in privacy, security and immediacy.
Secur. Commun. Networks, 2016
Novel Covert Timing Channels Implemented over Multiple Flows by Using Space-Time Trellis Codes.
J. Inf. Hiding Multim. Signal Process., 2016
Proceedings of the Cloud Computing and Security - Second International Conference, 2016
2015
Damage-resistance matrix embedding framework: the contradiction between robustness and embedding efficiency.
Secur. Commun. Networks, 2015
2014
Multim. Syst., 2014
J. Inf. Hiding Multim. Signal Process., 2014
Ann. des Télécommunications, 2014
2011
Int. J. Multim. Intell. Secur., 2011