


default search action
Liang Fang 0009
Person information
- affiliation: Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
Other persons with the same name
- Liang Fang — disambiguation page
- Liang Fang 0001
— Shihezi University, Shihezi, Xinjiang, China - Liang Fang 0002
— Nanchang Hangkong University, Nanchang, China - Liang Fang 0003
— Beijing Forestry University, Beijing, China - Liang Fang 0004
— Imperial College London, London, UK - Liang Fang 0005
— Harbin Engineering University, Harbin, Heilongjiang, China - Liang Fang 0006
— Southern Methodist University, Dallas, TX, USA - Liang Fang 0007
— Yanan University, Yanan, China - Liang Fang 0008
— National Key Laboratory for High Performance Computing, Changsha, Hunan, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j7]Yunchuan Guo, Xiao Wang, Mingjie Yu, Fenghua Li, Zhen Pang, Liang Fang:
An on-the-fly framework for usable access control policy mining. Comput. Secur. 150: 104211 (2025)
[j6]Xiao Wang, Yunchuan Guo, Zhe Sun
, Mingjie Yu, Fenghua Li, Liang Fang:
OPMonitor: Continuously monitoring residual over-granted permissions in verified access control policies. Comput. Secur. 158: 104623 (2025)
[j5]Lin Zhang, Yunchuan Guo, Siyuan Leng, Xiaogang Cao, Fenghua Li, Liang Fang:
Defense timing selection for MTD in periodic satellite computing systems: A Markov game approach. J. Comput. Sci. 87: 102583 (2025)
[c22]Yixuan Zhang, Liang Fang, Junhai Yang, Zifu Li, Fenghua Li:
BitInfer: An Automated Field Semantic Inference Method Based on Genetic Algorithm. COMPSAC 2025: 769-777
[c21]Yunchuan Guo, Jing Wang
, Kui Geng, Zifu Li, Fenghua Li, Liang Fang:
SEHAP: Secure and Efficient Handover Authentication Protocol in LEO Satellite Non-Terrestrial Networks. ICASSP 2025: 1-5
[c20]Lin Zhang, Yunchuan Guo, Shoukun Guo, Fenghua Li, Faqun Jiang, Liang Fang:
Dynamically Optimize MTD Strategy in Satellite Computing Systems Using A2C Reinforcement Learning. ICASSP 2025: 1-5- 2024
[c19]Fanfan Hao, Zhu Wang, Yaobing Xu, Siyuan Leng, Liang Fang, Fenghua Li:
Missing Data Completion for Network Traffic with Continuous Mutation Based on Tensor Ring Decomposition. CSCWD 2024: 151-156
[c18]Lin Zhang, Yunchuan Guo, Siyuan Leng, Xiaogang Cao, Fenghua Li, Liang Fang:
Cost-Effective Defense Timing Selection for Moving Target Defense in Satellite Computing Systems. ICCS (1) 2024: 224-239
[i1]Junhai Yang, Fenghua Li, Yixuan Zhang, Junhao Zhang, Liang Fang, Yunchuan Guo:
Automatic State Machine Inference for Binary Protocol Reverse Engineering. CoRR abs/2412.02540 (2024)- 2023
[c17]Lin Zhang, Yunchuan Guo, Siyuan Leng, Zifu Li, Fenghua Li, Liang Fang:
A Moving Target Defense Approach for the Distributed Dynamic Network. ISPA/BDCloud/SocialCom/SustainCom 2023: 336-343
[c16]Siyuan Leng, Fenghua Li, Lin Zhang, Yitong Wen, Yunchuan Guo, Liang Fang:
ProMD: A Proactive Intrusion Response System for Enterprise Network with Multi-Domain. ISPA/BDCloud/SocialCom/SustainCom 2023: 402-409
[c15]Yuming Lu, Fenghua Li, Yitong Wen, Liang Fang, Shoukun Guo, Zifu Li:
Evaluating Indicator Weights for Satellite Internet Security Assessment: an Approach to Combining Rough Set with Fuzzy Hierarchical Analysis. ISPA/BDCloud/SocialCom/SustainCom 2023: 482-490- 2022
[c14]Siyuan Leng, Yingke Xie, Yifan Zhang, Yunchuan Guo, Liang Fang, Fenghua Li:
DICOF: A Distributed and Collaborative Framework for Hybrid DDoS Attack Detection. ISCC 2022: 1-7
[c13]Fenghua Li, Cao Chen, Yunchuan Guo, Liang Fang, Chao Guo, Zifu Li:
Efficiently Constructing Topology of Dynamic Networks. TrustCom 2022: 44-51
[c12]Fanfan Hao, Zhu Wang, Mengyao Shi, Tingting Peng, Liang Fang, Fenghua Li:
Inferring Attack Paths in Networks with Periodic Topology Changes. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 724-731- 2020
[j4]Fenghua Li, Yongjun Li, Siyuan Leng, Yunchuan Guo, Kui Geng, Zhen Wang
, Liang Fang:
Dynamic countermeasures selection for multi-path attacks. Comput. Secur. 97: 101927 (2020)
[j3]Liang Fang, Guozhen Shi, Lianhai Wang, Yongjun Li, Shujiang Xu
, Yunchuan Guo:
Incentive mechanism for cooperative authentication: An evolutionary game approach. Inf. Sci. 527: 369-381 (2020)
[j2]Fenghua Li, Zifu Li, Liang Fang, Yongjun Li, Yaobing Xu, Yunchuan Guo:
Securing instruction interaction for hierarchical management. J. Parallel Distributed Comput. 137: 91-103 (2020)
[c11]Tianzhu Chen, Fenghua Li, Fuzhen Zhuang, Yunchuan Guo, Liang Fang:
The Linear Geometry Structure of Label Matrix for Multi-label Learning. DEXA (2) 2020: 229-244
[c10]Yunchuan Guo, Han Zhang, Zifu Li, Fenghua Li, Liang Fang, Lihua Yin
, Jin Cao:
Decision-Making for Intrusion Response: Which, Where, in What Order, and How Long? ICC 2020: 1-6
2010 – 2019
- 2019
[j1]Yunchuan Guo, Han Zhang, Lingcui Zhang, Liang Fang, Fenghua Li:
A game theoretic approach to cooperative intrusion detection. J. Comput. Sci. 30: 118-126 (2019)
[c9]Yunchuan Guo, Xiao Wang, Liang Fang, Yongjun Li, Fenghua Li, Kui Geng:
Incentive Mechanism for Cooperative Intrusion Response: A Dynamic Game Approach. ICCS (1) 2019: 590-603- 2018
[c8]Yunchuan Guo, Liang Fang, Kui Geng, Lihua Yin, Fenghua Li, Lihua Chen:
Real-Time Data Incentives for IoT Searches. ICC 2018: 1-6
[c7]Yunchuan Guo, Han Zhang, Lingcui Zhang, Liang Fang, Fenghua Li:
Incentive Mechanism for Cooperative Intrusion Detection: An Evolutionary Game Approach. ICCS (1) 2018: 83-97
[c6]Liang Fang, Lihua Yin, Yunchuan Guo, Zhen Wang, Fenghua Li:
Resolving Access Conflicts: An Auction-Based Incentive Approach. MILCOM 2018: 1-6- 2017
[c5]Liang Fang, Lihua Yin, Qiaoduo Zhang, Fenghua Li, Binxing Fang:
Who Is Visible: Resolving Access Policy Conflicts in Online Social Networks. GLOBECOM 2017: 1-6
[c4]Ziwen Liu, Liang Fang, Lihua Yin, Yunchuan Guo, Fenghua Li:
Research on Similarity Record Detection of Device Status Information Based on Multiple Encoding Field. SpaCCS Workshops 2017: 54-63
[c3]Fenghua Li, Jiawen Liu, Liang Fang, Ben Niu, Kui Geng, Hui Li:
Pricing Privacy Leakage in Location-Based Services. WASA 2017: 406-418- 2016
[c2]Lihua Yin, Liang Fang, Ben Niu, Binxing Fang, Fenghua Li:
Hunting abnormal configurations for permission-sensitive role mining. MILCOM 2016: 1004-1009- 2014
[c1]Liang Fang, Yunchuan Guo:
A Survey of Role Mining Methods in Role-Based Access Control System. APWeb Workshophs 2014: 291-300
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-01-15 02:47 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







