Xuchong Liu

Orcid: 0000-0003-4788-079X

According to our database1, Xuchong Liu authored at least 18 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Coordinated cyber-physical attacks based on different attack strategies for cascading failure analysis in smart grids.
Wirel. Networks, July, 2024

Tiny Defect-Oriented Single-View CT Reconstruction Based on a Hybrid Framework.
IEEE Trans. Instrum. Meas., 2024

2022
A mutual authentication scheme in VANET providing vehicular anonymity and tracking.
Telecommun. Syst., 2022

Privacy-preserving data aggregation scheme for edge computing supported vehicular ad hoc networks.
Trans. Emerg. Telecommun. Technol., 2022

Memory-augmented meta-learning on meta-path for fast adaptation cold-start recommendation.
Connect. Sci., 2022

Social Relationship Mining Based on User Telephone Communication Data for Cooperative Relationship Recommendation.
Proceedings of the IEEE INFOCOM 2022, 2022

2020
DroidDeep: using Deep Belief Network to characterize and detect android malware.
Soft Comput., 2020

An Informative and Comprehensive Behavioral Characteristics Analysis Methodology of Android Application for Data Security in Brain-Machine Interfacing.
Comput. Math. Methods Medicine, 2020

Integrated Defense Mechanism Based on Attack Goals against Three Attack Strategies in Smart Grid.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Multi-dimensional Security Risk Assessment Model Based on Three Elements in the IoT System.
Proceedings of the 9th IEEE/CIC International Conference on Communications in China, 2020

2019
Real-time detecting one specific tampering operation in multiple operator chains.
J. Real Time Image Process., 2019

A network traffic-aware mobile application recommendation system based on network traffic cost consideration.
Int. J. Comput. Sci. Eng., 2019

VDetector: Detecting Vulnerability Based on Inter-Component Data Flows in Android Applications.
Proceedings of the 15th International Conference on Mobile Ad-Hoc and Sensor Networks, 2019

A New Power Load Forecasting Model (SIndRNN): Independently Recurrent Neural Network Based on Softmax Kernel Function.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

2018
Detectability of the Image Operation Order: Upsampling and Mean Filtering.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

2017
De-cloaking Malicious Activities in Smartphones Using HTTP Flow Mining.
KSII Trans. Internet Inf. Syst., 2017

An Android App Recommendation Approach by Merging Network Traffic Cost.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2012
Lossless Visible Three-Dimensional Watermark of Digital Elevation Model Data.
Trans. Edutainment, 2012


  Loading...