


default search action
Dongjie Liu
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j29]Dongjie Liu
, Dawei Li, Kun Gao, Yuchen Song, Zijie Zhou
:
Context-aware inverse reinforcement learning for modeling individuals' daily activity schedules. Eng. Appl. Artif. Intell. 146: 110279 (2025) - [j28]Yang Cao
, Ziyang Zhang, Xinjiang Xia
, Pengzhe Xin
, Dongjie Liu, Kang Zheng, Mengting Lou
, Jing Jin
, Qixing Wang, Dongming Wang
, Yongming Huang
, Xiaohu You
, Jiangzhou Wang
:
Implementation of a Cell-Free RAN System With Distributed Cooperative Transceivers Under ORAN Architecture. IEEE J. Sel. Areas Commun. 43(3): 765-779 (2025) - 2024
- [j27]Fei-Fan Tu, Dongjie Liu, Zhiwei Yan, Xiao-Bo Jin
, Guang-Gang Geng:
STFT-TCAN: A TCN-attention based multivariate time series anomaly detection architecture with time-frequency analysis for cyber-industrial systems. Comput. Secur. 144: 103961 (2024) - [j26]Dongjie Liu, Jong-Hyouk Lee:
A CNN-Based SIA Screenshot Method to Visually Identify Phishing Websites. J. Netw. Syst. Manag. 32(1): 8 (2024) - [j25]Yuchen Song
, Dawei Li
, Zhenliang Ma
, Tong Zhang
, Dongjie Liu
, Chongqi He:
Dynamic Recursive Logit Model for Vehicle Driving Route Choices and Path Inference With Incomplete Fixed Location Sensor Data. IEEE Trans. Intell. Transp. Syst. 25(12): 19929-19942 (2024) - [j24]Xinchang Zhang
, Maoli Wang
, Yuanjie Zheng, Dongjie Liu:
Link Traffic-Delay Mapping Model Learning Based on Multi-Class Samples in Software-Defined Networks. IEEE Trans. Serv. Comput. 17(6): 3869-3886 (2024) - [c9]Qingtian Wang, Wen Qi, Jing Ling, Jiaying Zong, Yunfei Shen, Dongjie Liu:
Energy-Efficient Resource Allocation in LEO-assisted Open RAN architecture towards 6G. BMSB 2024: 1-6 - [c8]Zexu Li, Zhen Li, Xiong Xiong, Dongjie Liu:
Cross-Domain AI Towards 6G: Requirements, Solution, and Validation. IWCMC 2024: 456-460 - [i6]Zhiying Li, Zhi Liu, Dongjie Liu, Shengda Zhuo, Guanggang Geng, Jian Weng, Shanxiang Lyu, Xiaobo Jin:
Unveiling the Achilles' Heel: Backdoor Watermarking Forgery Attack in Public Dataset Protection. CoRR abs/2411.15450 (2024) - [i5]Yi-Xiang Lu, Xiao-Bo Jin, Jian Chen, Dongjie Liu, Guang-Gang Geng:
F-SE-LSTM: A Time Series Anomaly Detection Method with Frequency Domain Information. CoRR abs/2412.02474 (2024) - 2023
- [j23]Tong Zhang
, Lishan Sun, Yan Xu
, Yingda Chen
, Dewen Kong, Yuchen Song, Dongjie Liu:
Novel empty train return strategy and passenger control strategy to satisfy asymmetric passenger demand: A joint optimization with train timetabling. Comput. Ind. Eng. 181: 109299 (2023) - [j22]Dongming Wang, Xiaohu You
, Yongming Huang, Wei Xu, Jiamin Li, Pengcheng Zhu, Yanxiang Jiang, Yang Cao, Xinjiang Xia, Ziyang Zhang, Qingji Jiang
, Pan Wang, Dongjie Liu, Kang Zheng, Mengting Lou, Jing Jin, Qixing Wang, Jiangzhou Wang:
Full-spectrum cell-free RAN for 6G systems: system design and experimental results. Sci. China Inf. Sci. 66(3) (2023) - [j21]Rui Chen
, Dian Shi
, Xiaoqi Qin
, Dongjie Liu, Miao Pan
, Shuguang Cui
:
Service Delay Minimization for Federated Learning Over Mobile Devices. IEEE J. Sel. Areas Commun. 41(4): 990-1006 (2023) - [j20]Yang Cao
, Pan Wang
, Kang Zheng, Xianghu Liang
, Dongjie Liu, Mengting Lou
, Jing Jin, Qixing Wang, Dongming Wang
, Yongming Huang
, Xiaohu You
, Jiangzhou Wang
:
Experimental Performance Evaluation of Cell-Free Massive MIMO Systems Using COTS RRU With OTA Reciprocity Calibration and Phase Synchronization. IEEE J. Sel. Areas Commun. 41(6): 1620-1634 (2023) - [j19]Xiaohu You, Yongming Huang, Shengheng Liu
, Dongming Wang, Junchao Ma, Chuan Zhang
, Hang Zhan
, Cheng Zhang, Jiao Zhang, Zening Liu, Jin Li, Min Zhu, Jianjie You, Dongjie Liu, Yang Cao, Shiwen He, Guanghui He, Fengyi Yang, Yang Liu, Jianjun Wu, Jianmin Lu, Ge Li, Xiaowu Chen, Wenguang Chen, Wen Gao:
Toward 6G TKμ Extreme Connectivity: Architecture, Key Technologies and Experiments. IEEE Wirel. Commun. 30(3): 86-95 (2023) - [c7]Dongjie Liu
, Jong-Hyouk Lee
:
The Design and Evaluation of an Online Interactive Anti-phishing Training Method. ICEA 2023: 59-65 - [c6]Shi-Han Chen
, Kai-Chuan Kong
, Yi-Xiang Lu
, Dongjie Liu
:
AntiPhishNN: Hybrid neural networks using URL and domain information for phishing website detection. ICEA 2023: 66-71 - [c5]Fei-Fan Tu
, Yan-Ming Huang
, Rong-Hao Hou
, Dongjie Liu
, Xiao-Bo Jin
, Guang-Gang Geng
:
Production Resource Scheduling for Industrial Internet Products Based on Finite State Automata and Critical Locks. ICEA 2023: 115-120 - [i4]Yang Cao, Ziyang Zhang, Xinjiang Xia, Pengzhe Xin, Dongjie Liu, Kang Zheng, Mengting Lou, Jing Jin, Qixing Wang, Dongming Wang, Yongming Huang, Xiaohu You, Jiangzhou Wang:
From ORAN to Cell-Free RAN: Architecture, Performance Analysis, Testbeds and Trials. CoRR abs/2301.12804 (2023) - 2022
- [j18]Dongjie Liu, Y. N. Qiu:
On an adaptive FEM-BEM for nonlinear transmission problem. Appl. Math. Lett. 125: 107785 (2022) - [j17]Yunxiang Guo
, Zhenqi Fan, An Lu, Pan Wang, Dongjie Liu, Xinjiang Xia, Dongming Wang:
Downlink transmission and channel estimation for cell-free massive MIMO-OFDM with DSDs. EURASIP J. Adv. Signal Process. 2022(1): 17 (2022) - [j16]Dongjie Liu
, Guang-Gang Geng
, Xinchang Zhang
:
Multi-scale semantic deep fusion models for phishing website detection. Expert Syst. Appl. 209: 118305 (2022) - [j15]Dongjie Liu
, Jong-Hyouk Lee
:
CFLedger: Preventing chargeback fraud with blockchain. ICT Express 8(3): 352-356 (2022) - [j14]Dongjie Liu, Chein-Shan Liu:
Two-point generalized Hermite interpolation: Double-weight function and functional recursion methods for solving nonlinear equations. Math. Comput. Simul. 193: 317-330 (2022) - [j13]Shi-Jie Xu
, Guang-Gang Geng
, Xiao-Bo Jin
, Dongjie Liu
, Jian Weng
:
Seeing Traffic Paths: Encrypted Traffic Classification With Path Signature Features. IEEE Trans. Inf. Forensics Secur. 17: 2166-2181 (2022) - [c4]Zening Liu, Jie Wu, Wanli Lu, Dongjie Liu, Cheng Zhang, Yongming Huang, Jinri Huang:
A General Downlink Frequency-domain ICIC Framework for Next-generation RAN. GLOBECOM (Workshops) 2022: 980-985 - [i3]Rui Chen, Dian Shi, Xiaoqi Qin, Dongjie Liu, Miao Pan, Shuguang Cui
:
Service Delay Minimization for Federated Learning over Mobile Devices. CoRR abs/2205.09868 (2022) - [i2]Xiaohu You, Yongming Huang, Shengheng Liu
, Dongming Wang, Junchao Ma, Wei Xu, Chuan Zhang
, Hang Zhan, Cheng Zhang, Jiao Zhang, Jin Li, Min Zhu, Jianjie You, Dongjie Liu, Shiwen He, Guanghui He, Fengyi Yang, Yang Liu, Jianjun Wu, Jianmin Lu, Ge Li, Xiaowu Chen, Wenguang Chen, Wen Gao:
Toward 6G TKμ Extreme Connectivity: Architecture, Key Technologies and Experiments. CoRR abs/2208.01190 (2022) - [i1]Yang Cao, Pan Wang, Kang Zheng, Xianghu Liang, Dongjie Liu, Mengting Lou, Jing Jin, Qixing Wang, Dongming Wang, Yongming Huang, Xiaohu You, Jiangzhou Wang:
Experimental Performance Evaluation of Cell-free Massive MIMO Systems Using COTS RRU with OTA Reciprocity Calibration and Phase Synchronization. CoRR abs/2208.14048 (2022) - 2021
- [j12]Dongjie Liu, Guang-Gang Geng
, Xiao-Bo Jin, Wei Wang:
An efficient multistage phishing website detection model based on the CASE feature framework: Aiming at the real web environment. Comput. Secur. 110: 102421 (2021) - [c3]Yan-Ming Huang, Dongjie Liu, Zhiwei Yan, Yan-Ming Zhang, Guang-Gang Geng:
An Abused Webpage Detection Method Based on Screenshots Text Recognition. ICEA 2021: 106-110 - 2020
- [j11]Dongjie Liu
, Jong-Hyouk Lee
:
CNN Based Malicious Website Detection by Invalidating Multiple Web Spams. IEEE Access 8: 97258-97266 (2020) - [c2]Xingxiang Tao, Hao Dang, Danqun Xiong, Ruiqing Liu, Dongjie Liu, Fulin Zhou:
Automated detection of atrial fibrillation based on DenseNet using ECG signals. ISAIMS 2020: 69-73
2010 – 2019
- 2019
- [j10]Guang-Gang Geng
, Zhiwei Yan, Jong-Hyouk Lee, Xiao-Bo Jin, Dongjie Liu:
An Efficient Antiphishing Method to Secure eConsume. IEEE Consumer Electron. Mag. 8(6): 42-46 (2019) - [j9]Carsten Carstensen, Dongjie Liu, Jochen Alberty:
Convergence of \(\text{ dG(1) }\) in elastoplastic evolution. Numerische Mathematik 141(3): 715-742 (2019) - [c1]Dongjie Liu
, Wei Wang, Yang Wang, Yaling Tan:
PhishLedger: A Decentralized Phishing Data Sharing Mechanism. IECC 2019: 84-89 - 2018
- [j8]Chein-Shan Liu
, Dongjie Liu:
Optimal shape parameter in the MQ-RBF by minimizing an energy gap functional. Appl. Math. Lett. 86: 157-165 (2018) - 2017
- [j7]Chein-Shan Liu, Dongjie Liu, Wun-Sin Jhao:
Solving a singular beam equation by using a weak-form integral equation method. Appl. Math. Lett. 64: 51-58 (2017) - [j6]Dongjie Liu, Jiming Wu, Xiaoping Zhang
:
The adaptive composite trapezoidal rule for Hadamard finite-part integrals on an interval. J. Comput. Appl. Math. 325: 165-174 (2017) - [j5]Dongjie Liu, D. D. Jiang, Yang Liu, Q. Q. Xia:
Stabilized FEM for Some Optimal Design Problem. J. Sci. Comput. 73(1): 228-241 (2017) - 2015
- [j4]Carsten Carstensen, Dongjie Liu:
Nonconforming FEMs for an Optimal Design Problem. SIAM J. Numer. Anal. 53(2): 874-894 (2015) - 2013
- [j3]Dongjie Liu, Xiaoping Zhang, Jiming Wu:
A collocation scheme for a certain Cauchy singular integral equation based on the superconvergence analysis. Appl. Math. Comput. 219(10): 5198-5209 (2013) - 2010
- [j2]Dongjie Liu, Jiming Wu, Dehao Yu:
The superconvergence of the Newton-Cotes rule for Cauchy principal value integrals. J. Comput. Appl. Math. 235(3): 696-707 (2010)
2000 – 2009
- 2009
- [j1]Hongying Huang, Dongjie Liu, Dehao Yu:
Solution of exterior problem using ellipsoidal artificial boundary. J. Comput. Appl. Math. 231(1): 434-446 (2009)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-06-17 00:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint