Liping Ding
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – today
- 2018
- [j9]Guangxuan Chen, Liping Ding, Jin Du, Guomin Zhou, Panke Qin, Guangxiao Chen, Qiang Liu:
Trust Evaluation Strategy for Single Sign-on Solution in Cloud. IJDCF 10(1): 1-11 (2018) - [j8]Guangxuan Chen, Liping Ding, Guangxiao Chen, Panke Qin:
Reliable Security Strategy for Message-Oriented Middleware. IJDCF 10(1): 12-23 (2018) - [c22]Yasen Aizezi, Anniwaer Jiamali, Ruxianguli Abudurexiti, Xuehua Liu, Jin Du, Liping Ding:
Research on Image Recognition Method Based on Deep Learning Algorithm. AVSS 2018: 1-6 - 2017
- [j7]Xin Liao, Zheng Qin, Liping Ding:
Data embedding in digital images using critical functions. Sig. Proc.: Image Comm. 58: 146-156 (2017) - [c21]Qi Li, Xin Liao, Guoyong Chen, Liping Ding:
A Novel Game-Theoretic Model for Content-Adaptive Image Steganography. ICDCS Workshops 2017: 232-237 - [c20]Shaojiang Wang, Tianyong Wu, Yuan Yao, Beihong Jin, Liping Ding:
Combinatorial Testing on MP3 for Audio Players. ICST Workshops 2017: 272-275 - [c19]Jing Shuai, Xin Cheng, Liping Ding, Jun Yang, Wenjing Li:
Building a Cost and Profit Sharing Model for an E-business Project in Rural China: a Shapely Value Approach. WHICEB 2017: 48 - 2015
- [j6]Qing Tian, Wei Yang, Liping Ding:
On the general trigonometric sums weighted by character sums. Applied Mathematics and Computation 268: 375-387 (2015) - [c18]Qian Zhang, Ying Jiang, Liping Ding:
Modelling and Analysis of Network Security - a Probabilistic Value-passing CCS Approach. ICICS 2015: 295-302 - [c17]Xin Liao, Liping Ding:
Data Hidng in Digital Image Using Four Pixel-Value-Differencing and Multiple-Base Notational. IIH-MSP 2015: 76-80 - [i2]Qian Zhang, Ying Jiang, Liping Ding:
Modelling and Analysis Network Security - a PVCCS approach. CoRR abs/1507.06769 (2015) - 2014
- [j5]Genqiang Wu, Yeping He, Yi Lu, Liping Ding:
Privacy-Preserving Location Assurance Protocols for Mobile Applications. JSW 9(8): 1991-2001 (2014) - [j4]JingZheng Wu, Liping Ding, Yanjun Wu, Nasro Min-Allah, Samee Ullah Khan, Yongji Wang:
C2Detector: a covert channel detection framework in cloud computing. Security and Communication Networks 7(3): 544-557 (2014) - [i1]Genqiang Wu, Yeping He, Yi Lu, Liping Ding:
Efficient Interval Check in the Presence of Malicious Adversaries. IACR Cryptology ePrint Archive 2014: 690 (2014) - 2013
- [c16]Bei Guan, Yanjun Wu, Liping Ding, Yongji Wang:
CIVSched: Communication-aware Inter-VM Scheduling in Virtual Machine Monitor Based on the Process. CCGRID 2013: 597-604 - [c15]Yuqi Lin, Liping Ding, JingZheng Wu, Yalong Xie, Yongji Wang:
Robust and Efficient Covert Channel Communications in Operating Systems: Design, Implementation and Evaluation. SERE (Companion) 2013: 45-52 - 2012
- [j3]Dengguo Feng, Xiubin Fan, Liping Ding, Zhang-yi Wang:
On the nonexistence of nontrivial small cycles of the µ function in 3x+1 conjecture. J. Systems Science & Complexity 25(6): 1215-1222 (2012) - [j2]JingZheng Wu, Yongji Wang, Liping Ding, Xiaofeng Liao:
Improving performance of network covert timing channel through Huffman coding. Mathematical and Computer Modelling 55(1-2): 69-79 (2012) - [c14]JingZheng Wu, Liping Ding, Yuqi Lin, Nasro Min-Allah, Yongji Wang:
XenPump: A New Method to Mitigate Timing Channel in Cloud Computing. IEEE CLOUD 2012: 678-685 - [c13]
- [c12]Jianchun Jiang, Liping Ding, Ennan Zhai, Ting Yu:
VRank: A Context-Aware Approach to Vulnerability Scoring and Ranking in SOA. SERE 2012: 61-70 - 2011
- [j1]Xiaofeng Liao, Yongji Wang, Liping Ding, Jian Gu:
Extended Probabilistic Latent Semantic Analysis Model For Topics In Time-Stamped Images. Intelligent Automation & Soft Computing 17(7): 997-1007 (2011) - [c11]JingZheng Wu, Liping Ding, Yongji Wang, Wei Han:
Identification and Evaluation of Sharing Memory Covert Timing Channel in Xen Virtual Machines. IEEE CLOUD 2011: 283-291 - [c10]Ennan Zhai, Qingni Shen, Yonggang Wang, Tao Yang, Liping Ding, Sihan Qing:
SecGuard: Secure and Practical Integrity Protection Model for Operating Systems. APWeb 2011: 370-375 - [c9]Yi Lu, Serge Vaudenay, Willi Meier, Liping Ding, Jianchun Jiang:
Synthetic Linear Analysis: Improved Attacks on CubeHash and Rabbit. ICISC 2011: 248-260 - [c8]Xiaofeng Liao, Liping Ding, Yongji Wang:
Secure Machine Learning, a Brief Overview. SSIRI (Companion) 2011: 26-29 - [c7]Wei Han, Yeping He, Liping Ding:
Verifying the Safety of Xen Security Modules. SSIRI (Companion) 2011: 30-34 - [c6]JingZheng Wu, Liping Ding, Yongji Wang, Wei Han:
A Practical Covert Channel Identification Approach in Source Code Based on Directed Information Flow Graph. SSIRI 2011: 98-107 - [c5]Ennan Zhai, Liping Ding, Sihan Qing:
Towards a Reliable Spam-Proof Tagging System. SSIRI 2011: 174-181 - 2010
- [c4]Liping Ding, Wenliang Chen, Jianrong Tan, Yixiong Feng:
Multi-objective disassembly line balancing via modified ant colony optimization algorithm. BIC-TA 2010: 426-430 - [c3]Liping Ding, Jian Gu, Yongji Wang, JingZheng Wu:
Analysis of Telephone Call Detail Records Based on Fuzzy Decision Tree. e-Forensics 2010: 301-311 - [c2]Jianchun Jiang, Weifeng Chen, Liping Ding:
On Estimating Cyber Adversaries' Capabilities: A Bayesian Model Approach. RAID 2010: 502-504
2000 – 2009
- 2005
- [c1]Liping Ding, Qiusong Yang, Liang Sun, Jie Tong, Yongji Wang:
Evaluation of the Capability of Personal Software Process Based on Data Envelopment Analysis. ISPW 2005: 235-248
Coauthor Index
last updated on 2019-02-20 00:34 CET by the dblp team
data released under the ODC-BY 1.0 license
see also: Terms of Use | Privacy Policy | Imprint