default search action
Jiayong Liu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2025
- [j47]Xi Peng, Peng Jia, Ximing Fan, Jiayong Liu:
ENZZ: Effective N-gram coverage assisted fuzzing with nearest neighboring branch estimation. Inf. Softw. Technol. 177: 107582 (2025) - 2024
- [j46]Xiaodi Wang, Zhonglin Liu, Jiayong Liu:
Joint relational triple extraction with enhanced representation and binary tagging framework in cybersecurity. Comput. Secur. 144: 104001 (2024) - [j45]Jiaxuan Han, Cheng Huang, Jiayong Liu:
bjCnet: A contrastive learning-based framework for software defect prediction. Comput. Secur. 145: 104024 (2024) - [j44]Jiamiao Liu, Pengsen Cheng, Jinqiao Dai, Jiayong Liu:
A variational selection mechanism for article comment generation. Expert Syst. Appl. 237(Part C): 121263 (2024) - [j43]Chunwang Wu, Xiaolei Liu, Kangyi Ding, Bangzhou Xin, Jiazhong Lu, Jiayong Liu, Cheng Huang:
Attack detection model for BCoT based on contrastive variational autoencoder and metric learning. J. Cloud Comput. 13(1): 125 (2024) - [j42]Shenglie Zhou, Peisong He, Jiayong Liu, Jie Luo:
Towards robust image watermarking via random distortion assignment based meta-learning. J. Vis. Commun. Image Represent. 103: 104238 (2024) - 2023
- [j41]Shan Liao, Xiaoyang Li, Jiayong Liu, Anmin Zhou, Kai Li, Siqi Peng:
An event-based opinion summarization model for long chinese text with sentiment awareness and parameter fusion mechanism. Appl. Intell. 53(6): 6682-6709 (2023) - [j40]Jie Luo, Peisong He, Jiayong Liu, Hong-Xia Wang, Chunwang Wu, Chao Yuan, Qiang Xia:
Improving security for image steganography using content-adaptive adversarial perturbations. Appl. Intell. 53(12): 16059-16076 (2023) - [j39]Jiaxuan Han, Cheng Huang, Siqi Sun, Zhonglin Liu, Jiayong Liu:
bjXnet: an improved bug localization model based on code property graph and attention mechanism. Autom. Softw. Eng. 30(1): 12 (2023) - [j38]Yan Wang, Peng Jia, Xi Peng, Cheng Huang, Jiayong Liu:
BinVulDet: Detecting vulnerability in binary program via decompiled pseudo code and BiLSTM-attention. Comput. Secur. 125: 103023 (2023) - [j37]Yongyan Guo, Zhengyu Liu, Cheng Huang, Nannan Wang, Hai Min, Wenbo Guo, Jiayong Liu:
A framework for threat intelligence extraction and fusion. Comput. Secur. 132: 103371 (2023) - [j36]Jiangheng Kou, Peng Jia, Jiayong Liu, Jinqiao Dai, Hairu Luo:
Identify influential nodes in social networks with graph multi-head attention regression model. Neurocomputing 530: 23-36 (2023) - [j35]Pengsen Cheng, Jinqiao Dai, Jiamiao Liu, Jiayong Liu, Peng Jia:
Reinforcement learning for few-shot text generation adaptation. Neurocomputing 558: 126689 (2023) - [j34]Peng Jia, Jiangheng Kou, Jiayong Liu, Jinqiao Dai, Hairu Luo:
SRFA-GRL: Predicting group influence in social networks with graph representation learning. Inf. Sci. 638: 118960 (2023) - [j33]Xiaodi Wang, Zhonglin Liu, Jiamiao Liu, Jiayong Liu:
Fraud detection on multi-relation graphs via imbalanced and interactive learning. Inf. Sci. 642: 119153 (2023) - [j32]Jie Luo, Peisong He, Jiayong Liu, Hongxia Wang, Chunwang Wu, Shenglie Zhou:
Reversible adversarial steganography for security enhancement. J. Vis. Commun. Image Represent. 97: 103935 (2023) - [j31]Xiaodi Wang, Jiayong Liu:
A novel feature integration and entity boundary detection for named entity recognition in cybersecurity. Knowl. Based Syst. 260: 110114 (2023) - [j30]Jiamiao Liu, Pengsen Cheng, Jinqiao Dai, Jiayong Liu:
DiffuCom: A novel diffusion model for comment generation. Knowl. Based Syst. 281: 111069 (2023) - 2022
- [j29]Menghua Chen, Peisong He, Jiayong Liu:
HLTD-CSA: Cover selection algorithm based on hybrid local texture descriptor for color image steganography. J. Vis. Commun. Image Represent. 89: 103646 (2022) - [j28]Pengsen Cheng, Jinqiao Dai, Jiayong Liu:
CatVRNN: Generating category texts via multi-task learning. Knowl. Based Syst. 244: 108491 (2022) - [j27]Shan Liao, Shubin Li, Jiayong Liu, Haoen Huang, Xiuchun Xiao:
A zeroing neural dynamics based acceleration optimization approach for optimizers in deep neural networks. Neural Networks 150: 440-461 (2022) - [j26]Shan Liao, Jiayong Liu, Yimeng Qi, Haoen Huang, Rongfeng Zheng, Xiuchun Xiao:
An Adaptive Gradient Neural Network to Solve Dynamic Linear Matrix Equations. IEEE Trans. Syst. Man Cybern. Syst. 52(9): 5913-5924 (2022) - 2021
- [j25]Yongyan Guo, Jiayong Liu, Wenwu Tang, Cheng Huang:
Exsense: Extract sensitive information from unstructured data. Comput. Secur. 102: 102156 (2021) - [j24]Li Li, Jiayong Liu, Peng Jia:
SecTEP: Enabling secure tender evaluation with sealed prices and quality evaluation in procurement bidding systems over blockchain. Comput. Secur. 103: 102188 (2021) - [j23]Liang Liu, Lei Zhang, Shan Liao, Jiayong Liu, Zhenxue Wang:
A generalized approach to solve perfect Bayesian Nash equilibrium for practical network attack and defense. Inf. Sci. 577: 245-264 (2021) - [j22]Yan Ren, Jiayong Liu:
Detection method for stability of microcontroller accessories based on biosensor. J. Comput. Methods Sci. Eng. 21(6): 2093-2106 (2021) - [j21]Xingyue Dang, Shan Liao, Pengsen Cheng, Jiayong Liu:
MF-COTE: A chinese opinion target extraction model based on multiple features. J. Intell. Fuzzy Syst. 41(1): 1611-1626 (2021) - [j20]Juan Tang, Hualu Xu, Pengsen Cheng, Jiayong Liu, Cheng Huang, Xun Tang:
Zombie Follower Recognition Based on Industrial Chain Feature Analysis. Secur. Commun. Networks 2021: 6656470:1-6656470:12 (2021) - [j19]Shan Liao, Haoen Huang, Jiayong Liu, Xiuchun Xiao, Xiaoyang Li, Shubin Li:
Modified Newton Integration Algorithm With Noise Tolerance for Image Deblurring. IEEE Trans. Computational Imaging 7: 1254-1266 (2021) - 2020
- [j18]Jiaxuan Han, Cheng Huang, Fan Shi, Jiayong Liu:
Covert timing channel detection method based on time interval and payload length analysis. Comput. Secur. 97: 101952 (2020) - [j17]Shan Liao, Jiayong Liu, Xiuchun Xiao, Dongyang Fu, Guan-Cheng Wang, Long Jin:
Modified gradient neural networks for solving the time-varying Sylvester equation with adaptive coefficients and elimination of matrix inversion. Neurocomputing 379: 1-11 (2020) - [j16]Li Li, Jiayong Liu:
SecACS: Enabling lightweight secure auditable cloud storage with data dynamics. J. Inf. Secur. Appl. 54: 102545 (2020) - [j15]Xiaomei Qian, Jiayong Liu, Pengsen Cheng:
基于密集连接卷积神经网络的远程监督关系抽取 (Distant Supervised Relation Extraction Based on Densely Connected Convolutional Networks). 计算机科学 47(2): 157-162 (2020) - [j14]Xuemei Gu, Jiayong Liu, Pengsen Cheng, Xiang He:
基于增强BiLSTM-CRF模型的推文恶意软件名称识别 (Malware Name Recognition in Tweets Based on Enhanced BiLSTM-CRF Model). 计算机科学 47(2): 245-250 (2020) - [j13]Zheng Zuo, Liang Liu, Jiayong Liu, Cheng Huang:
Cross-modality earth mover's distance-driven convolutional neural network for different-modality data. Neural Comput. Appl. 32(13): 9581-9592 (2020) - [j12]Jiayong Liu, Yu Su, Shun Lv, Cheng Huang:
Detecting Web Spam Based on Novel Features from Web Page Source Code. Secur. Commun. Networks 2020: 6662166:1-6662166:14 (2020) - [j11]Rongfeng Zheng, Jiayong Liu, Weina Niu, Liang Liu, Kai Li, Shan Liao:
Preprocessing Method for Encrypted Traffic Based on Semisupervised Clustering. Secur. Commun. Networks 2020: 8824659:1-8824659:13 (2020) - [j10]Li Li, Jiayong Liu, Peng Jia:
SPCTR: Sealed Auction-Based Procurement for Closest Pre-Tender with Range Validation. Secur. Commun. Networks 2020: 8872617:1-8872617:12 (2020) - 2019
- [j9]Jiayong Liu, Zhiyi Tian, Rongfeng Zheng, Liang Liu:
A Distance-Based Method for Building an Encrypted Malware Traffic Identification Framework. IEEE Access 7: 100014-100028 (2019) - [j8]Luping Liu, Xiaohai He, Liang Liu, Lingbo Qing, Yong Fang, Jiayong Liu:
Capturing the symptoms of malicious code in electronic documents by file's entropy signal combined with machine learning. Appl. Soft Comput. 82 (2019) - [j7]Ke Wang, Jiayong Liu, Jingyang Wang:
Learning Domain-Independent Deep Representations by Mutual Information Minimization. Comput. Intell. Neurosci. 2019: 9414539:1-9414539:14 (2019) - [j6]Hua Peng, Liang Liu, Jiayong Liu, Johnwb R. Lewis:
Network traffic anomaly detection algorithm using mahout classifier. J. Intell. Fuzzy Syst. 37(1): 137-144 (2019) - [j5]Cheng Huang, Jiaxuan Han, Xing Zhang, Jiayong Liu:
Automatic Identification of Honeypot Server Using Machine Learning Techniques. Secur. Commun. Networks 2019: 2627608:1-2627608:8 (2019) - 2017
- [j4]Ke Wang, Jiayong Liu, Daniel González:
Domain transfer multi-instance dictionary learning. Neural Comput. Appl. 28(S-1): 983-992 (2017) - 2016
- [j3]Cheng Huang, Jiayong Liu, Yong Fang, Zheng Zuo:
A study on Web security incidents in China by analyzing vulnerability disclosure platforms. Comput. Secur. 58: 47-62 (2016) - 2009
- [j2]Yan-yan Wang, Jia-Yong Liu, Feng-xia Xiao, Jing Dan:
A more efficient and secure dynamic ID-based remote user authentication scheme. Comput. Commun. 32(4): 583-585 (2009) - 2008
- [j1]Jia-Yong Liu, An-Min Zhou, Min-Xu Gao:
A new mutual authentication scheme based on nonce and smart cards. Comput. Commun. 31(10): 2205-2209 (2008)
Conference and Workshop Papers
- 2023
- [c4]Jie Luo, Peisong He, Jiayong Liu, Hongxia Wang, Chunwang Wu, Yijing Chen, Wanjie Li, Jiangchuan Li:
Content-adaptive Adversarial Embedding for Image Steganography Using Deep Reinforcement Learning. ICME 2023: 49-54 - [c3]Zhen Yang, Cheng Huang, Jiayong Liu:
Unveiling Cybersecurity Threats from Online Chat Groups: A Triple Extraction Approach. KSEM (4) 2023: 175-188 - 2021
- [c2]Yongyan Guo, Zhengyu Liu, Cheng Huang, Jiayong Liu, Wangyuan Jing, Ziwang Wang, Yanghao Wang:
CyberRel: Joint Entity and Relation Extraction for Cybersecurity Concepts. ICICS (1) 2021: 447-463 - 2017
- [c1]Cheng Huang, Shuang Hao, Luca Invernizzi, Jiayong Liu, Yong Fang, Christopher Kruegel, Giovanni Vigna:
Gossip: Automatically Identifying Malicious Domains from Mailing List Discussions. AsiaCCS 2017: 494-505
Informal and Other Publications
- 2021
- [i5]Pengsen Cheng, Jiayong Liu, Jinqiao Dai:
CatVRNN: Generating Category Texts via Multi-task Learning. CoRR abs/2107.05219 (2021) - [i4]Pengsen Cheng, Jinqiao Dai, Jiayong Liu:
Reinforcement Learning for Few-Shot Text Generation Adaptation. CoRR abs/2111.11030 (2021) - 2019
- [i3]Luping Liu, Xiaohai He, Liang Liu, Lingbo Qing, Yong Fang, Jiayong Liu:
Capturing the symptoms of malicious code in electronic documents by file's entropy signal combined with Machine learning. CoRR abs/1903.10208 (2019) - [i2]Yan Wang, Peng Jia, Luping Liu, Jiayong Liu:
A systematic review of fuzzing based on machine learning techniques. CoRR abs/1908.01262 (2019) - 2016
- [i1]Ke Wang, Jiayong Liu, Daniel González:
Domain Transfer Multi-Instance Dictionary Learning. CoRR abs/1605.08397 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint