default search action
Yuling Liu
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j63]Yun Zhang, Yuling Liu, Ge Cheng, Jie Wang:
Similarity Regression Of Functions In Different Compiled Forms With Neural Attentions On Dual Control-Flow Graphs. Comput. J. 67(5): 1710-1718 (2024) - [j62]Yufan Chen, Jiahai Yang, Susu Cui, Cong Dong, Bo Jiang, Yuling Liu, Zhigang Lu:
Unveiling encrypted traffic types through hierarchical network characteristics. Comput. Secur. 138: 103645 (2024) - [j61]Haitao Xiao, Yan Zhu, Bin Zhang, Zhigang Lu, Dan Du, Yuling Liu:
Unveiling shadows: A comprehensive framework for insider threat detection based on statistical and sequential analysis. Comput. Secur. 138: 103665 (2024) - [j60]Chunwen Liu, Ru Tan, Yang Wu, Yun Feng, Ze Jin, Fangjiao Zhang, Yuling Liu, Qixu Liu:
Dissecting zero trust: research landscape and its implementation in IoT. Cybersecur. 7(1): 20 (2024) - [j59]Chuyi Yan, Xueying Han, Yan Zhu, Dan Du, Zhigang Lu, Yuling Liu:
Phishing behavior detection on different blockchains via adversarial domain adaptation. Cybersecur. 7(1): 45 (2024) - [j58]Boyuan Xu, Yiru Gong, Xiaoyu Geng, Yun Li, Cong Dong, Song Liu, Yuling Liu, Bo Jiang, Zhigang Lu:
ProcSAGE: an efficient host threat detection method based on graph representation learning. Cybersecur. 7(1): 51 (2024) - [j57]Chenghao Cui, Yuling Liu, Fubo Zhang, Minan Shi, Longyong Chen, Wenjie Li, Zhenhua Li:
A Novel Automatic Registration Method for Array InSAR Point Clouds in Urban Scenes. Remote. Sens. 16(3): 601 (2024) - [j56]Yuling Liu, Cuilin Wang, Jie Wang, Bo Ou, Xin Liao:
Generative Steganography via Live Comments on Streaming Video Frames. IEEE Trans. Comput. Soc. Syst. 11(3): 4412-4425 (2024) - [c36]Haitao Xiao, Dan Du, Junrong Liu, Song Liu, Yan Zhu, Yuling Liu, Zhigang Lu:
Deep Dive into Insider Threats: Malicious Activity Detection within Enterprise. CSCWD 2024: 1578-1584 - [c35]Kaijiang Li, Yuling Liu, Peisen Wang, XiangQian Liu, Xichen Liu, ChunYi Guo, Bing Zhou:
DFT-3DLaneNet: Dual-Frequency Domain Enhanced Transformer for 3D Lane Detection. ICIC (3) 2024: 215-227 - [c34]Xiaoshuai Wu, Xin Liao, Bo Ou, Yuling Liu, Zheng Qin:
Are Watermarks Bugs for Deepfake Detectors? Rethinking Proactive Forensics. IJCAI 2024: 6089-6097 - [i3]Cong Dong, Jiahai Yang, Yun Li, Yue Wu, Yufan Chen, Chenglong Li, Haoran Jiao, Xia Yin, Yuling Liu:
E-DoH: Elegantly Detecting the Depths of Open DoH Service on the Internet. CoRR abs/2403.12363 (2024) - [i2]Xiaoshuai Wu, Xin Liao, Bo Ou, Yuling Liu, Zheng Qin:
Are Watermarks Bugs for Deepfake Detectors? Rethinking Proactive Forensics. CoRR abs/2404.17867 (2024) - 2023
- [j55]Shuo Xu, Dongdong Wang, Shunlin Liang, Yuling Liu, Aolin Jia:
Assessment of gridded datasets of various near surface temperature variables over Heihe River Basin: Uncertainties, spatial heterogeneity and clear-sky bias. Int. J. Appl. Earth Obs. Geoinformation 120: 103347 (2023) - [j54]Qing Wang, Cong Dong, Shijie Jian, Dan Du, Zhigang Lu, Yinhao Qi, Dongxu Han, Xiaobo Ma, Fei Wang, Yuling Liu:
HANDOM: Heterogeneous Attention Network Model for Malicious Domain Detection. Comput. Secur. 125: 103059 (2023) - [j53]Cong Dong, Jiahai Yang, Song Liu, Zhi Wang, Yuling Liu, Zhigang Lu:
C-BEDIM and S-BEDIM: Lateral movement detection in enterprise network through behavior deviation measurement. Comput. Secur. 130: 103267 (2023) - [j52]Jianjun Zhao, Can Yang, Di Wu, Yaqin Cao, Yuling Liu, Xiang Cui, Qixu Liu:
Detecting compromised email accounts via login behavior characterization. Cybersecur. 6(1): 36 (2023) - [j51]Chuyi Yan, Chen Zhang, Meng Shen, Ning Li, Jinhao Liu, Yinhao Qi, Zhigang Lu, Yuling Liu:
Aparecium: understanding and detecting scam behaviors on Ethereum via biased random walk. Cybersecur. 6(1): 46 (2023) - [j50]Guangyao Lu, Yuling Liu, Jie Wang, Hongping Wu:
CNN-BiLSTM-Attention: A multi-label neural classifier for short texts with a small set of labels. Inf. Process. Manag. 60(3): 103320 (2023) - [j49]Shuo Xu, Dongdong Wang, Shunlin Liang, Yuling Liu, Aolin Jia:
Assessing the Reliability of the MODIS LST Product to Detect Temporal Variability. IEEE Geosci. Remote. Sens. Lett. 20: 1-5 (2023) - [j48]Susu Cui, Cong Dong, Meng Shen, Yuling Liu, Bo Jiang, Zhigang Lu:
CBSeq: A Channel-Level Behavior Sequence for Encrypted Malware Traffic Detection. IEEE Trans. Inf. Forensics Secur. 18: 5011-5025 (2023) - [c33]Changzhi Zhao, Kezhen Huang, Di Wu, Xueying Han, Dan Du, Yutian Zhou, Zhigang Lu, Yuling Liu:
TAElog: A Novel Transformer AutoEncoder-Based Log Anomaly Detection Method. Inscrypt (2) 2023: 37-52 - [c32]Haitao Xiao, Jinzhong Yang, Yuling Liu, Junrong Liu, Dan Du, Zhigang Lu:
A Fast Gradient Boosting Based Approach for Predicting Frags in Tactic Games. ICME Workshops 2023: 6-10 - [c31]Yuling Liu, Yunyue Yu:
Global Daily VIIRS LST Product Quality Evaluation and Applications. IGARSS 2023: 1440-1443 - [i1]Susu Cui, Cong Dong, Meng Shen, Yuling Liu, Bo Jiang, Zhigang Lu:
CBSeq: A Channel-level Behavior Sequence For Encrypted Malware Traffic Detection. CoRR abs/2307.09002 (2023) - 2022
- [j47]Shengting Wu, Yuling Liu, Ziran Zou, Tien-Hsiung Weng:
S_I_LSTM: stock price prediction based on multiple data sources and sentiment analysis. Connect. Sci. 34(1): 44-62 (2022) - [j46]Chuyi Yan, Chen Zhang, Zhigang Lu, Zehui Wang, Yuling Liu, Baoxu Liu:
Blockchain abnormal behavior awareness methods: a survey. Cybersecur. 5(1): 5 (2022) - [j45]Zhaoshan Fan, Qing Wang, Haoran Jiao, Junrong Liu, Zelin Cui, Song Liu, Yuling Liu:
PUMD: a PU learning-based malicious domain detection framework. Cybersecur. 5(1): 19 (2022) - [j44]Xiaoyu Xu, Hao Hu, Yuling Liu, Jinglei Tan, Hongqi Zhang, Haotian Song:
Moving target defense of routing randomization with deep reinforcement learning against eavesdropping attack. Digit. Commun. Networks 8(3): 373-387 (2022) - [j43]Ziyi Ma, Yuling Liu, ZhiBang Yang, Jianye Yang, Kenli Li:
A parameter-free approach to lossless summarization of fully dynamic graphs. Inf. Sci. 589: 376-394 (2022) - [j42]Lingyun Xiang, Rong Wang, Zhongliang Yang, Yuling Liu:
Generative Linguistic Steganography: A Comprehensive Review. KSII Trans. Internet Inf. Syst. 16(3): 986-1005 (2022) - [j41]Yuling Liu, Peng Yu, Heshun Wang, Jingjing Peng, Yunyue Yu:
Ten Years of VIIRS Land Surface Temperature Product Validation. Remote. Sens. 14(12): 2863 (2022) - [j40]Yuling Liu, Jiwei Wen, Xiaoli Luan, Fei Liu:
Finite-frequency self-triggered model predictive control for Markov jump systems subject to actuator saturation. Trans. Inst. Meas. Control 44(12): 2406-2417 (2022) - [j39]Lu Cao, Yuling Liu:
Optimization design and research of simulation system for urban green ecological rainwater by genetic algorithm. J. Supercomput. 78(9): 11318-11344 (2022) - [j38]Ziyi Ma, Yuling Liu, Yikun Hu, Jianye Yang, Chubo Liu, Huadong Dai:
Efficient maintenance for maximal bicliques in bipartite graph streams. World Wide Web 25(2): 857-877 (2022) - [c30]Haitao Xiao, Yuling Liu, Dan Du, Zhigang Lu:
An Approach for Predicting the Costs of Forwarding Contracts using Gradient Boosting. FedCSIS 2022: 451-454 - [c29]Haoran Jiao, Qing Wang, Zhaoshan Fan, Junrong Liu, Dan Du, Ning Li, Yuling Liu:
DGGCN: Dictionary based DGA detection method based on DomainGraph and GCN. ICCCN 2022: 1-10 - [c28]Guolong Zhao, Yuling Liu, Erdun E:
Review on Intelligent Processing Technologies of Legal Documents. ICAIS (1) 2022: 684-695 - [c27]Haitao Xiao, Chen Zhang, Song Liu, Bo Jiang, Zhigang Lu, Fei Wang, Yuling Liu:
CapsITD: Malicious Insider Threat Detection Based on Capsule Neural Network. SecureComm 2022: 57-71 - [c26]Dongxu Han, Pu Dong, Ning Li, Xiang Cui, Jiawen Diao, Qing Wang, Dan Du, Yuling Liu:
DCC-Find: DNS Covert Channel Detection by Features Concatenation-Based LSTM. TrustCom 2022: 307-314 - 2021
- [j37]Yuling Liu, Jiao Wu, Xianyi Chen:
An Improved Coverless Text Steganography Algorithm Based on Pretreatment and POS. KSII Trans. Internet Inf. Syst. 15(4): 1553-1567 (2021) - [j36]Long Chen, Guojiang Xin, Yuling Liu, Junwei Huang:
Driver Fatigue Detection Based on Facial Key Points and LSTM. Secur. Commun. Networks 2021: 5383573:1-5383573:9 (2021) - [j35]Xiaoyu Xu, Hao Hu, Yuling Liu, Hongqi Zhang, Dexian Chang:
An Adaptive IP Hopping Approach for Moving Target Defense Using a Light-Weight CNN Detector. Secur. Commun. Networks 2021: 8848473:1-8848473:17 (2021) - [j34]Gaopeng Xie, Yuling Liu, Guojiang Xin, Qiuwei Yang:
Blockchain-Based Cloud Data Integrity Verification Scheme with High Efficiency. Secur. Commun. Networks 2021: 9921209:1-9921209:15 (2021) - [c25]Haitao Xiao, Yuling Liu, Dan Du, Zhigang Lu:
WP-GBDT: An Approach for Winner Prediction using Gradient Boosting Decision Tree. IEEE BigData 2021: 5691-5698 - [c24]Ziyi Ma, Jianye Yang, Kenli Li, Yuling Liu, Xu Zhou, Yikun Hu:
A Parameter-Free Approach for Lossless Streaming Graph Summarization. DASFAA (1) 2021: 385-393 - [c23]Cong Dong, Yufan Chen, Yunjian Zhang, Yuling Liu, Zhigang Lu, Pu Dong, Baoxu Liu:
BEDIM: Lateral Movement Detection In Enterprise Network Through Behavior Deviation Measurement. HPCC/DSS/SmartCity/DependSys 2021: 391-398 - 2020
- [j33]Yuling Liu, Peng Guo, Chunlin Zhang:
Fleet-Level Selective Dispatch and Imperfect Maintenance Strategy Optimization Based on Evolutionary Co-Petition Game Theory. IEEE Access 8: 148689-148701 (2020) - [j32]Yuling Liu, Jiao Wu, Guojiang Xin:
Multi-keywords carrier-free text steganography method based on Chinese Pinyin. Int. J. Comput. Sci. Eng. 21(2): 202-209 (2020) - [j31]Hao Hu, Jing Liu, Yuchen Zhang, Yuling Liu, Xiaoyu Xu, Jinglei Tan:
Attack scenario reconstruction approach using attack graph and alert data mining. J. Inf. Secur. Appl. 54: 102522 (2020) - [j30]Mao Xu, Jin Hou, Peijun Wu, Yuling Liu, Zhiliang Lv:
基于通信信号时频特性的卷积神经网络调制识别 (Convolutional Neural Networks Based on Time-Frequency Characteristics for Modulation Classification). 计算机科学 47(2): 175-179 (2020) - [j29]Zhangjie Fu, Yangen Liu, Xingming Sun, Yuling Liu, Zuwei Tian:
Confusing-Keyword Based Secure Search over Encrypted Cloud Data. Mob. Networks Appl. 25(1): 125-132 (2020) - [j28]Heshun Wang, Yunyue Yu, Peng Yu, Yuling Liu:
Land Surface Emissivity Product for NOAA JPSS and GOES-R Missions: Methodology and Evaluation. IEEE Trans. Geosci. Remote. Sens. 58(1): 307-318 (2020) - [j27]Chunlin Zhang, Yuling Liu:
A Two-Step Denoising Strategy for Early-Stage Fault Diagnosis of Rolling Bearings. IEEE Trans. Instrum. Meas. 69(9): 6250-6261 (2020) - [j26]Hao Hu, Yuling Liu, Chen Chen, Hongqi Zhang, Yi Liu:
Optimal Decision Making Approach for Cyber Security Defense Using Evolutionary Game. IEEE Trans. Netw. Serv. Manag. 17(3): 1683-1700 (2020) - [c22]Bo Jiang, Zhigang Lu, Yuling Liu, Ning Li, Zelin Cui:
Social Recommendation in Heterogeneous Evolving Relation Network. ICCS (1) 2020: 554-567 - [c21]Yuling Liu, Yunyue Yu, Peng Yu, Heshun Wang:
NOAA20 and S-NPP VIIRS Land Surface Temperature Product Validation and Inter-Comparison. IGARSS 2020: 6129-6132 - [c20]Yaopeng Han, Zhigang Lu, Bo Jiang, Yuling Liu, Chen Zhang, Zhengwei Jiang, Ning Li:
MTLAT: A Multi-Task Learning Framework Based on Adversarial Training for Chinese Cybersecurity NER. NPC 2020: 43-54 - [c19]Xueying Han, Rongchao Yin, Zhigang Lu, Bo Jiang, Yuling Liu, Song Liu, Chonghua Wang, Ning Li:
STIDM: A Spatial and Temporal Aware Intrusion Detection Model. TrustCom 2020: 370-377
2010 – 2019
- 2019
- [j25]Yi Long, Yuling Liu, Yuquan Zhang, Xinshuang Ba, Jiaohua Qin:
Coverless Information Hiding Method Based on Web Text. IEEE Access 7: 31926-31933 (2019) - [j24]Yuling Liu, Peng Guo, Chunlin Zhang:
Transient Dynamics and Electric Power Estimation of Bistable Energy Harvesters Under Impulsive Excitations. IEEE Access 7: 36233-36245 (2019) - [j23]Chunlin Zhang, Yuling Liu, Fangyi Wan, Binqiang Chen, Jie Liu:
Isolation and Identification of Compound Faults in Rotating Machinery via Adaptive Deep Filtering Technique. IEEE Access 7: 139118-139130 (2019) - [j22]Hao Hu, Gang Shen, Yuling Liu, Zhengxin Fu, Bin Yu:
Improved schemes for visual secret sharing based on random grids. Multim. Tools Appl. 78(9): 12055-12082 (2019) - [j21]Yuling Liu, Yunyue Yu, Peng Yu, Heshun Wang, Yuhan Rao:
Enterprise LST Algorithm Development and Its Evaluation with NOAA 20 Data. Remote. Sens. 11(17): 2003 (2019) - [j20]Liang Liu, Wen Chen, Tao Li, Yuling Liu:
Pseudo-Random Encryption for Security Data Transmission in Wireless Sensor Networks. Sensors 19(11): 2452 (2019) - [c18]Gaopeng Xie, Yuling Liu, Guojiang Xin, Peng Yang:
Review on Text Watermarking Resistant to Print-Scan, Screen-Shooting. ICAIS (3) 2019: 140-149 - 2018
- [j19]Hao Hu, Yuling Liu, Hongqi Zhang, Ruixuan Pan:
Optimal Network Defense Strategy Selection Based on Incomplete Information Evolutionary Game. IEEE Access 6: 29806-29821 (2018) - [j18]Chenyang Xia, Yang Zhang, Yuling Liu, Kezhang Lin, Jun Chen:
Path planning and energy flow control of wireless power transfer for sensor nodes in wireless sensor networks. Turkish J. Electr. Eng. Comput. Sci. 26(5): 2618-2632 (2018) - [j17]Hao Hu, Yuling Liu, Hongqi Zhang, Yuchen Zhang:
Security Metric Methods for Network Multistep Attacks Using AMC and Big Data Correlation Analysis. Secur. Commun. Networks 2018: 5787102:1-5787102:14 (2018) - [j16]Guojiang Xin, Yuling Liu, Ting Yang, Yu Cao:
An Adaptive Audio Steganography for Covert Wireless Communication. Secur. Commun. Networks 2018: 7096271:1-7096271:10 (2018) - [j15]Wen Chen, Hui Zhao, Tao Li, Yuling Liu:
Optimal probabilistic encryption for distributed detection in wireless sensor networks based on immune differential evolution algorithm. Wirel. Networks 24(7): 2497-2507 (2018) - [c17]Yi Long, Yuling Liu:
Text Coverless Information Hiding Based on Word2vec. ICCCS (4) 2018: 463-472 - 2017
- [j14]Chenyang Xia, Wei Wang, Yuling Liu, Kezhang Lin, Yanhe Wang, Xiaojie Wu:
A bidirectional wireless power transfer system for an electric vehicle with a relay circuit. Turkish J. Electr. Eng. Comput. Sci. 25: 3037-3051 (2017) - [j13]Hao Hu, Hongqi Zhang, Yuling Liu, Yongwei Wang:
Quantitative Method for Network Security Situation Based on Attack Prediction. Secur. Commun. Networks 2017: 3407642:1-3407642:19 (2017) - [c16]Yuling Liu, Qi Li, Guojiang Xin:
Sentiment Analysis with Improved Adaboost and Transfer Learning Based on Gaussian Process. ICCCS (2) 2017: 672-683 - [c15]Yuling Liu, Jiao Wu, Guojiang Xin:
Multi-keywords carrier-free text steganography based on part of speech tagging. ICNC-FSKD 2017: 2102-2107 - 2016
- [j12]Kai Kang, Yingjun Zhang, Yifeng Lian, Yuling Liu:
一种社交网络Sybil用户检测方法 (Compound Approach for Sybil Users Detection in Social Networks). 计算机科学 43(1): 172-177 (2016) - [j11]Yuling Liu, Xinxin Qu, Guojiang Xin:
A ROI-based reversible data hiding scheme in encrypted medical images. J. Vis. Commun. Image Represent. 39: 51-57 (2016) - [c14]Yingjun Zhang, Kai Chen, Yuling Liu, Yifeng Lian:
A Lattice-Based Access Control Model for Social Networks. CyberC 2016: 54-61 - [c13]Yuling Liu, Yunyue Yu, Peng Yu, Heshun Wang:
Ground validation and uncertainty esitmation of VIIRS land surface temperature product. IGARSS 2016: 6922-6925 - 2015
- [j10]Yuling Liu, Xinxin Qu, Guojiang Xin, Peng Liu:
ROI-Based Reversible Data Hiding Scheme for Medical Images with Tamper Detection. IEICE Trans. Inf. Syst. 98-D(4): 769-774 (2015) - [j9]Wen Chen, Hui Zhao, Tao Li, Yuling Liu:
Intelligent traffic signal controller based on type-2 fuzzy logic and NSGAII. J. Intell. Fuzzy Syst. 29(6): 2611-2618 (2015) - [j8]Yuling Liu, Yunyue Yu, Peng Yu, Frank-M. Göttsche, Isabel F. Trigo:
Quality Assessment of S-NPP VIIRS Land Surface Temperature Product. Remote. Sens. 7(9): 12215-12241 (2015) - [c12]Yuling Liu, Zuhong Liu:
An Improved Method for Reversible Data Hiding in Encrypted Image. ICA3PP (Workshops and Symposiums) 2015: 24-34 - [c11]Alex Bishara, Yuling Liu, Dorna Kashef Haghighi, Ziming Weng, Daniel E. Newburger, Robert B. West, Arend Sidow, Serafim Batzoglou:
Read Clouds Uncover Variation in Complex Regions of the Human Genome. RECOMB 2015: 30-31 - 2014
- [c10]Yingjun Zhang, Kezhen Huang, Yuling Liu, Kai Chen, Liang Huang, Yifeng Lian:
Timing-Based Clone Detection on Android Markets. SecureComm (2) 2014: 375-381 - 2013
- [j7]Dayong Shen, David W. Wong, Fernando Camelli, Yuling Liu:
An ArcScene plug-in for volumetric data conversion, modeling and spatial analysis. Comput. Geosci. 61: 104-115 (2013) - [j6]Yuling Liu, Yunyue Yu, Donglian Sun, Dan Tarpley, Li Fang:
Effect of Different MODIS Emissivity Products on Land-Surface Temperature Retrieval From GOES Series. IEEE Geosci. Remote. Sens. Lett. 10(3): 510-514 (2013) - [c9]Xitong Qi, Yuling Liu:
Cloud Model Based Zero-Watermarking Algorithm for Authentication of Text Document. CIS 2013: 712-715 - [c8]Yuling Liu, Dengguo Feng, Yifeng Lian, Kai Chen, Yingjun Zhang:
Optimal Defense Strategies for DDoS Defender Using Bayesian Game Model. ISPEC 2013: 44-59 - 2012
- [j5]Zhangjie Fu, Xingming Sun, Yuling Liu, Bo Li:
Text split-based steganography in OOXML format documents for covert communication. Secur. Commun. Networks 5(9): 957-968 (2012) - 2011
- [j4]Zhangjie Fu, Xingming Sun, Yuling Liu, Bo Li:
Forensic investigation of OOXML format documents. Digit. Investig. 8(1): 48-55 (2011) - [c7]Eishiro Higo, Norio Okada, Michinori Hatayama, Yuling Liu:
Analysis of self-evacuation to rescuing process under survivability-critical states in underground flooding by vitae system based agent modeling and simulation. SMC 2011: 3056-3063 - 2010
- [j3]Lei Zhang, Peng Liu, Yuling Liu, Fei-hong Yu:
High quality multi-focus polychromatic composite image fusion algorithm based on filtering in frequency domain and synthesis in space domain. J. Zhejiang Univ. Sci. C 11(5): 365-374 (2010) - [c6]Yuling Liu, Norio Okada, Dayong Shen, Shuoqi Li:
Vitae System based agent modeling and simulation of survivability-critical evacuation in underground flooding. SMC 2010: 3133-3138
2000 – 2009
- 2009
- [j2]Yuling Liu, Xingming Sun, Ingemar J. Cox, Hong Wang:
Natural Language Information Hiding Based on Chinese Mathematical Expression. Int. J. Netw. Secur. 8(1): 10-15 (2009) - 2008
- [c5]Yongping Liu, Xingming Sun, Yuling Liu, Rong Xiao:
File-Update Based Steganography for Microsoft PowerPoint Files. IIH-MSP 2008: 11-15 - 2007
- [c4]Yuling Liu, Xingming Sun, Can Gan, Hong Wang:
An Efficient Linguistic Steganography for Chinese Text. ICME 2007: 2094-2097 - 2006
- [j1]Dayong Shen, Kaoru Takara, Yasuto Tachikawa, Yuling Liu:
3D simulation of soft geo-objects. Int. J. Geogr. Inf. Sci. 20(3): 261-271 (2006) - 2005
- [c3]Junfeng Tian, Min Peng, Yuling Liu:
A New Active DDoS Defense System Based on Automatic Learning. ASIAN 2005: 249-250 - [c2]Junfeng Tian, Yuling Liu, Xiao-hui Yang, Ruizhong Du:
Design and Analysis of a Novel Load-Balancing Model Based on Mobile Agent. ICMLC 2005: 70-80 - [c1]Yuling Liu, Xingming Sun, Yong Wu:
A Natural Language Watermarking Based on Chinese Syntax. ICNC (3) 2005: 958-961
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-04 21:40 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint