


default search action
Fengyu Liu
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[j19]Liangguo He
, Menghao Sun
, Fengyu Liu
, Xinfang Ge
:
Piezoelectric Actuator With a Single-Stator and Dual-Mode Operation for Bidirectional No-Backward Motion. IEEE Trans. Ind. Electron. 73(1): 1052-1062 (2026)- 2025
[j18]Yuwei Zheng
, Zijian Gao
, Yuting Shen, Jiadong Zhang
, Ruixi Sun, Daohuai Jiang
, Fengyu Liu
, Xiran Cai
, Feng Gao, Yuan Gao
, Fei Gao
:
Hardware Architecture Design for Iterative Reconstruction Algorithms Toward Palm-Size Photoacoustic Tomography. IEEE Trans. Circuits Syst. I Regul. Pap. 72(12): 7730-7743 (2025)
[j17]Fengyu Liu
, Yi Cao
, Xianghong Cheng
, Jianfeng Wu
, Wendong Gu, Luhui Liu
:
Confidence Factor-Based Robust Localization Algorithm With Visual-Inertial-LiDAR Fusion in Underground Space. IEEE Trans. Circuits Syst. Video Technol. 35(6): 5952-5965 (2025)
[j16]Youkun Shi
, Fengyu Liu
, Guangliang Yang
, Yuan Zhang
, Yinzhi Cao
, Enhao Li
, Xin Tan
, Xiapu Luo
, Min Yang
, Siyi Chen
:
Facilitating Access Control Vulnerability Detection in Modern Java Web Applications With Accurate Permission Check Identification. IEEE Trans. Inf. Forensics Secur. 20: 10683-10698 (2025)
[j15]Jianfeng Wu
, Xianghong Cheng
, Fengyu Liu
, Xingbang Tang
, Wendong Gu
:
Vision-Assisted LiDAR-Inertial SLAM Based on Multiple Segments Under Degenerate Environment. IEEE Trans. Instrum. Meas. 74: 1-13 (2025)
[j14]Jianfeng Wu
, Xianghong Cheng
, Fengyu Liu
, Xingbang Tang
:
LiDAR-Aided Object Visual-Inertial Odometry Using Anchored Residual in Dynamic Scene. IEEE Trans. Intell. Transp. Syst. 26(7): 10146-10159 (2025)
[j13]Youkun Shi
, Yuan Zhang
, Tianhan Luo
, Guangliang Yang
, Shengke Ye
, Chengyu Yang
, Fengyu Liu
, Xiapu Luo
, Min Yang
:
PHPJoy: A Novel Extended Graph-Based PHP Code Analysis Framework. IEEE Trans. Software Eng. 51(12): 3435-3451 (2025)
[j12]Jianfeng Wu
, Xianghong Cheng
, Fengyu Liu
, Xingbang Tang, Wendong Gu:
LiDAR-Aided Visual-Inertial Odometry Using Line and Plane Features for Ground Vehicles. IEEE Trans. Veh. Technol. 74(5): 7313-7326 (2025)
[c25]Fengyu Liu
, Yuan Zhang
, Enhao Li
, Wei Meng
, Youkun Shi
, Qianheng Wang
, Chenlin Wang
, Zihan Lin
, Min Yang
:
BACScan: Automatic Black-Box Detection of Broken-Access-Control Vulnerabilities in Web Applications. CCS 2025: 1320-1333
[c24]Qiyi Zhang
, Fengyu Liu
, Zihan Lin
, Yuan Zhang
:
Be Aware of What You Let Pass: Demystifying URL-based Authentication Bypass Vulnerability in Java Web Applications. CCS 2025: 1874-1888
[c23]Haowen Chen, Fengyu Liu, Qiang Huang, Tatsuo Arai, Xiaoming Liu:
Design of DNA Origami-Engineered Tetrahedral Nanorobots. IROS 2025: 271-276
[c22]Jingjin Ge, Zhuo Chen, Chenhao Bai
, Fengyu Liu, Yuke Li, Masaru Kojima, Qiang Huang, Tatsuo Arai, Xiaoming Liu:
On-Chip Dynamic Mechanical Characterization: from Cells to Nucleus. IROS 2025: 277-282
[c21]Ying Zhao, Christopher Doerr, Fengyu Liu, Sivagururaman Mahadevan, Fatemeh Ghaedi Vanani, Makoto Takeshita:
425-Gbps/λ Dual-polarization IMDD Transceiver. OFC 2025: 1-3
[c20]Jiaqi Shan, Fengyu Liu, Zhuo Chen, Qiang Huang, Tatsuo Arai, Xiaoming Liu:
On-Chip Fabrication and Control of Compartmentalized Hydrogel Microcapsules. RCAR 2025: 553-557
[c19]Fengyu Liu, Youkun Shi, Yuan Zhang, Guangliang Yang, Enhao Li, Min Yang:
MOCGuard: Automatically Detecting Missing-Owner-Check Vulnerabilities in Java Web Applications. SP 2025: 903-919
[c18]Fengyu Liu, Yuan Zhang, Tian Chen, Youkun Shi, Guangliang Yang, Zihan Lin, Min Yang, Junyao He, Qi Li:
Detecting Taint-Style Vulnerabilities in Microservice-Structured Web Applications. SP 2025: 972-990
[c17]Fengyu Liu, Yuan Zhang, Jiaqi Luo, Jiarun Dai, Tian Chen, Letian Yuan, Zhengmin Yu, Youkun Shi, Ke Li, Chengyuan Zhou, Hao Chen, Min Yang:
Make Agent Defeat Agent: Automatic Detection of Taint-Style Vulnerabilities in LLM-based Agents. USENIX Security Symposium 2025: 3767-3786
[c16]Bocheng Xiang, Yuan Zhang, Fengyu Liu, Hao Huang, Zihan Lin, Min Yang:
Pig in a Poke: Automatically Detecting and Exploiting Link Following Vulnerabilities in Windows File Operations. USENIX Security Symposium 2025: 7019-7038
[c15]Youkun Shi, Yuan Zhang, Tianhao Bai, Feng Xue, Jiarun Dai, Fengyu Liu, Lei Zhang, Xiapu Luo, Min Yang:
XSSky: Detecting XSS Vulnerabilities through Local Path-Persistent Fuzzing. USENIX Security Symposium 2025: 8255-8272
[d2]Youkun Shi
, Yuan Zhang
, Tianhao Bai
, Feng Xue
, Jiarun Dai
, Fengyu Liu
, Lei Zhang
, Xiapu Luo
, Min Yang
:
XSSky: Detecting XSS Vulnerabilities through Local Path-Persistent Fuzzing. Zenodo, 2025
[d1]Youkun Shi
, Yuan Zhang
, Tianhan Luo
, Guangliang Yang
, Shengke Ye
, Chengyu Yang
, Fengyu Liu
, Xiapu Luo
, Min Yang
:
PHPJoy Artifact. Zenodo, 2025
- 2024
[j11]Qianying Zou, Yushi Li, Xinyue Jiang, Yuepeng Zan, Fengyu Liu:
Network Intrusion Detection Based on Convolutional Recurrent Neural Network, Random Forest, and Federated Learning. J. Comput. Inf. Technol. 32(2): 97-125 (2024)
[j10]Qianying Zou, Fengyu Liu, Yuan Liao:
Enhancing architectural image processing: A novel 2D to 3D algorithm using improved convolutional neural networks. Comput. Sci. Inf. Syst. 21(4): 1457-1481 (2024)
[j9]Yuxin Wan, Caiyi Wang, Bingao Zhang, Yixuan Liu, Hailong Yang, Fengyu Liu, Jingjing Xu
, Shengyong Xu
:
Biocompatible Electrical and Optical Interfaces for Implantable Sensors and Devices. Sensors 24(12): 3799 (2024)
[j8]Fengyu Liu
, Yi Cao
, Xianghong Cheng
, Xinyi Wu
:
Transformer-Based Local-to-Global LiDAR-Camera Targetless Calibration With Multiple Constraints. IEEE Trans. Instrum. Meas. 73: 1-13 (2024)
[c14]Yunsheng Li, Xiaoming Liu, Zhuo Chen, Xiaoqing Tang, Jiaqi Shan, Fengyu Liu, Qiang Huang, Tatsuo Arai:
Contactless Bioprinting Based on Acoustic Tweezer. CBS 2024: 182-185- 2023
[j7]Liang Fang, Feng Yang, Maoxuan Xu
, Fengyu Liu:
Research on Development 3D Ground Penetrating Radar Acquisition and Control Technology for Road Underground Diseases with Dual-Band Antenna Arrays. Sensors 23(19): 8301 (2023)
[c13]Zhaofeng Zuo, Xiaoming Liu, Xiaoqing Tang, Fengyu Liu, Dan Liu, Yuyang Li, Qiang Huang, Tatsuo Arai:
Probing Local Cellular Mechanics by Atomic Force Microscopy with Modified Spherical Tip. CBS 2023: 306-310
[c12]Fengyu Liu
, Xianghong Cheng
:
A spatial layout method based on feature encoding and GA-BiLSTM. RCVE 2023: 65-70- 2022
[i1]Zijian Gao, Yuting Shen, Daohuai Jiang, Fengyu Liu, Feng Gao, Fei Gao:
FPGA Acceleration of Image Reconstruction for Real-Time Photoacoustic Tomography. CoRR abs/2204.14084 (2022)- 2021
[j6]Rui Yin
, Longdu Liu
, Qingjie Huang
, Lin Lu
, Hongliang Yang
, Fengyu Liu
, Pengcheng Liu
, Wei Ji
, Shouzhen Jiang
, Jingwen Sun
, Xiaojie Yin
, Xiaohua Su
:
Integrated Ultrahigh-Sensitivity Temperature Sensor Based on Asymmetric Mach-Zehnder Interferometer and Stress Deformation of Aluminum-SiO2. IEEE Trans. Instrum. Meas. 70: 1-7 (2021)- 2020
[j5]Wei Zheng, Jialiang Gao, Xiaoxue Wu, Fengyu Liu, Yuxing Xun, Guoliang Liu, Xiang Chen:
The impact factors on the performance of machine learning-based vulnerability detection: A comparative study. J. Syst. Softw. 168: 110659 (2020)
2010 – 2019
- 2018
[c11]Xiaoxuan Cheng, Li Chen, Dongxu Li, Fengyu Liu:
LQ Control during Clutch Engagement for Automatic Transmissions. ACC 2018: 490-495- 2017
[c10]Li Chen, Fengyu Liu:
Stability analysis of motor-driven actuators in dry clutches with nonlinear stiffness element. ACC 2017: 1642-1647- 2012
[j4]Fangbin Liu, Fengyu Liu, Hong Zhang:
An Energy-efficient and Real-time Anonymous Routing Protocol for Ad hoc Networks. J. Comput. 7(4): 900-912 (2012)- 2010
[j3]Jia Xu, Qianmu Li, Hong Zhang, Fengyu Liu:
Model and analysis of path compression for mobile Ad Hoc networks. Comput. Electr. Eng. 36(3): 442-454 (2010)
2000 – 2009
- 2006
[c9]Jiwen Wang, Qingmei Wang, Fengyu Liu:
Proactive maintenance with variant workload under Distributed Multimedia Application Systems. CSCWD 2006: 1441-1443- 2005
[c8]Qian-Mu Li, Man-Wu Xu, Hong Zhang, Fengyu Liu:
Neural Network Based Flow Forecast and Diagnosis. CIS (2) 2005: 542-547
[c7]Jin Shu, Fengyu Liu, Manwu Xu:
Baseline - A Passive Approach to Tolerate and Detect DoS/DDoS Attacks. Security and Management 2005: 104-110
[c6]Kun Zhang, Fengyu Liu, Yi Zhong:
An efficient multicast routing algorithm based on simulated annealing for multimedia communications. SMC 2005: 369-374
[c5]Xuelong Zhao, Qianmu Li, Manwu Xu, Fengyu Liu:
A symmetric cryptography based on extended cellular automata. SMC 2005: 499-503- 2004
[c4]Jin Shu, Fengyu Liu, Manwu Xu:
NSPPM: A Node Sampling Approach to Probabilistic Packet Marking-Based IP Traceback. Security and Management 2004: 305-311
[c3]Xuelong Zhao, Jiwen Wang, Manwu Xu, Fengyu Liu:
High-quality pseudo-random sequence generator based on one-dimensional extended cellular automata. InfoSecu 2004: 222-223
[c2]Lianying Zhou, Fengyu Liu, Jie Wu:
Research on co-operative computer network security technologies. SMC (2) 2004: 1164-1168- 2003
[j2]Xiangjun Sun, Fengyu Liu, Manwu Xu:
Research on interoperability of intelligent mobile agent for DIS. ACM SIGSOFT Softw. Eng. Notes 28(6): 9 (2003)
[c1]Lianying Zhou, Fengyu Liu:
Research on computer network security based on pattern recognition. SMC 2003: 1278-1283- 2000
[j1]Han Yan, Fengyu Liu, Hong Zhang:
An object-oriented model of access control based on role. ACM SIGSOFT Softw. Eng. Notes 25(2): 64-68 (2000)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-02-04 01:07 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID






