default search action
Zenghui Liu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j16]Hao Zhang, Yixiang Sun, Zenghui Liu, Qiyuan Liu, Xiyao Liu, Ming Jiang, Gerald Schaefer, Hui Fang:
Heterogeneous attention based transformer for sign language translation. Appl. Soft Comput. 144: 110526 (2023) - [j15]Changyun Wei, Hao Wang, Haonan Bai, Ze Ji, Zenghui Liu:
PPLC: Data-driven offline learning approach for excavating control of cutter suction dredgers. Eng. Appl. Artif. Intell. 125: 106708 (2023) - 2022
- [j14]Jing Liu, Lihui Liu, Zenghui Liu, Yingxu Lai, Hua Qin, Shiyao Luo:
WSN node access authentication protocol based on trusted computing. Simul. Model. Pract. Theory 117: 102522 (2022) - [c11]Yuncheng Jiang, Zenghui Liu, Danjian Qian, Hao Zuo, Weiliang He, Jun Wang:
Robust Online Path Planning for Autonomous Vehicle Using Sequential Quadratic Programming. IV 2022: 175-182 - [c10]Zenghui Liu:
Navigation System of Coal Mine Rescue Robot Based on Virtual Reality Technology. WAC 2022: 379-383 - 2021
- [j13]Zhiqiang Yin, Zenghui Liu, Zhixiong Zhang, Jucai Chang, Xuelong Hu:
Experiences from a New Project-Driven and Outcome- Based Educational Concept in a Blasting Engineering Study Program. Int. J. Emerg. Technol. Learn. 16(8) (2021) - 2020
- [j12]Zenghui Liu, Yuyang Chen, Xiangyang Zhu, Kai Xu:
Reach to Grasp Planning for a Synergy-Controlled Robotic Hand based on Pesudo-Distance Formulation. Int. J. Humanoid Robotics 17(5): 2050015:1-2050015:20 (2020) - [j11]Zhidong Wang, Yingxu Lai, Zenghui Liu, Jing Liu:
Explaining the Attributes of a Deep Learning Based Intrusion Detection System for Industrial Control Networks. Sensors 20(14): 3817 (2020) - [j10]Wenqian Feng, Yingxu Lai, Zenghui Liu:
Vulnerability mining for Modbus TCP based on exception field positioning. Simul. Model. Pract. Theory 102: 101989 (2020)
2010 – 2019
- 2019
- [j9]Zhanwei Song, Zenghui Liu:
Abnormal detection method of industrial control system based on behavior model. Comput. Secur. 84: 166-178 (2019) - [j8]Hua Qin, Min Yu, Yingxu Lai, Zenghui Liu, Jing Liu:
Cloud resource orchestration optimisation based on ARIMA. Int. J. Simul. Process. Model. 14(5): 420-430 (2019) - [j7]Yingxu Lai, Jingwen Zhang, Zenghui Liu:
Industrial Anomaly Detection and Attack Classification Method Based on Convolutional Neural Network. Secur. Commun. Networks 2019: 8124254:1-8124254:11 (2019) - 2018
- [j6]Yingxu Lai, Zenghui Liu, Tao Ye:
Software behaviour analysis method based on behaviour template. Int. J. Simul. Process. Model. 13(2): 126-134 (2018) - [c9]Zenghui Liu, Zhonghao Wu, Tianlai Dong, Xiangyang Zhu, Kai Xu:
Reach-to-Grasp Planning for a Synergy-Controlled Robotic Hand Based on Grasp Quality Prediction. ROBIO 2018: 778-783 - [c8]Tianlai Dong, Yuyang Chen, Lingyun Zeng, Zenghui Liu, Kai Xu:
Design and Validation of Multi-Layer Brakes for a Lockable Stand for a Surgical Robotic SystemBehaviors. ROBIO 2018: 1244-1249 - 2017
- [c7]Yusheng Wang, Kefeng Fan, Yingxu Lai, Zenghui Liu, Ruikang Zhou, Xiangzhen Yao, Lin Li:
Intrusion Detection of Industrial Control System Based on Modbus TCP Protocol. ISADS 2017: 156-162 - 2016
- [j5]Ruikang Zhou, Yingxu Lai, Zenghui Liu, Yinong Chen, Xiangzhen Yao, Jiezhong Gong:
A Security Authentication Protocol for Trusted Domains in an Autonomous Decentralized System. Int. J. Distributed Sens. Networks 12: 5327949:1-5327949:13 (2016) - [j4]Yingxu Lai, Zenghui Liu, Zhanwei Song, Yusheng Wang, Yiwei Gao:
Anomaly detection in Industrial Autonomous Decentralized System based on time series. Simul. Model. Pract. Theory 65: 57-71 (2016) - 2015
- [j3]Zenghui Liu, Yingxu Lai, Yinong Chen:
Android malware detection based on permission combinations. Int. J. Simul. Process. Model. 10(4): 315-326 (2015) - [j2]Yingxu Lai, Yinong Chen, Zenghui Liu, Zhen Yang, Xiulong Li:
On monitoring and predicting mobile network traffic abnormality. Simul. Model. Pract. Theory 50: 176-188 (2015) - [j1]Yingxu Lai, Yinong Chen, Qichen Zou, Zenghui Liu, Zhen Yang:
Design and analysis on trusted network equipment access authentication protocol. Simul. Model. Pract. Theory 51: 157-169 (2015) - [c6]Kai Xu, Huan Liu, Zenghui Liu, Yuheng Du, Xiangyang Zhu:
A single-actuator prosthetic hand using a continuum differential mechanism. ICRA 2015: 6457-6462 - [c5]Ruikang Zhou, Yingxu Lai, Zenghui Liu, Jing Liu:
Study on Authentication Protocol of SDN Trusted Domain. ISADS 2015: 281-284 - 2014
- [c4]Yingxu Lai, Qiuyue Pan, Zenghui Liu, Yinong Chen, Zhizheng Zhou:
Trust-Based Security for the Spanning Tree Protocol. IPDPS Workshops 2014: 1338-1343 - 2010
- [c3]Zenghui Liu, Liguo Guan:
Attack Simulation and Signature Extraction of Low-Rate DoS. IITSI 2010: 544-548
2000 – 2009
- 2009
- [c2]Zenghui Liu, Yingxu Lai:
A Data Mining Framework for Building Intrusion Detection Models Based on IPv6. ISA 2009: 608-618 - 2008
- [c1]Yingxu Lai, Zenghui Liu:
Unknown Malicious Identification. World Congress on Engineering (Selected Papers) 2008: 301-312
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-19 19:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint