Follow
Jiqiang Liu
Jiqiang Liu
Professor of Computer Science
Verified email at bjtu.edu.cn
Title
Cited by
Cited by
Year
Creditcoin: A privacy-preserving blockchain-based incentive announcement network for communications of smart vehicles
L Li, J Liu, L Cheng, S Qiu, W Wang, X Zhang, Z Zhang
IEEE Transactions on Intelligent Transportation Systems 19 (7), 2204-2220, 2018
5422018
Exploring permission-induced risk in android applications for malicious application detection
W Wang, X Wang, D Feng, J Liu, Z Han, X Zhang
IEEE Transactions on Information Forensics and Security 9 (11), 1869-1882, 2014
3812014
Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers
W Wang, Y Li, X Wang, J Liu, X Zhang
Future generation computer systems 78, 987-994, 2018
2512018
BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors
W Wang, Y Shang, Y He, Y Li, J Liu
Information Sciences 511, 284-296, 2020
1782020
Adversarial attack and defense in reinforcement learning-from AI security view
T Chen, J Liu, Y Xiang, W Niu, E Tong, Z Han
Cybersecurity 2, 1-22, 2019
1272019
Privacy risk analysis and mitigation of analytics libraries in the android ecosystem
X Liu, J Liu, S Zhu, W Wang, X Zhang
IEEE Transactions on Mobile Computing 19 (5), 1184-1199, 2019
1262019
A two-layered permission-based android malware detection scheme
X Liu, J Liu
2014 2nd IEEE international conference on mobile cloud computing, services …, 2014
1112014
Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack
S Qiu, J Liu, Y Shi, R Zhang
Science China Information Sciences 60 (5), 1-12, 2017
1102017
DroidEnsemble: Detecting Android malicious applications with ensemble of string and structural static features
W Wang, Z Gao, M Zhao, Y Li, J Liu, X Zhang
IEEE Access 6, 31798-31807, 2018
1092018
Vulnerability detection with deep learning
F Wu, J Wang, J Liu, W Wang
2017 3rd IEEE international conference on computer and communications (ICCC …, 2017
1092017
Selecting a trusted cloud service provider for your SaaS program
C Tang, J Liu
Computers & Security 50, 60-73, 2015
1012015
Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation
Y Shi, Q Zheng, J Liu, Z Han
Information Sciences 295, 221-231, 2015
982015
Characterizing Android apps’ behavior for effective detection of malapps at large scale
X Wang, W Wang, Y He, J Liu, Z Han, X Zhang
Future generation computer systems 75, 30-45, 2017
932017
SCTSC: A semicentralized traffic signal control mode with attribute-based blockchain in IoVs
L Cheng, J Liu, G Xu, Z Zhang, H Wang, HN Dai, Y Wu, W Wang
IEEE Transactions on Computational Social Systems 6 (6), 1373-1385, 2019
912019
Abstracting massive data for lightweight intrusion detection in computer networks
W Wang, J Liu, G Pitsilis, X Zhang
Information Sciences 433, 417-430, 2018
802018
Assessing optimizer impact on DNN model sensitivity to adversarial examples
Y Wang, J Liu, J Mišić, VB Mišić, S Lv, X Chang
IEEE Access 7, 152766-152776, 2019
692019
Efficient and secure outsourcing of differentially private data publishing with multiple evaluators
J Li, H Ye, T Li, W Wang, W Lou, YT Hou, J Liu, R Lu
IEEE Transactions on Dependable and Secure Computing 19 (1), 67-76, 2020
592020
Constructing important features from massive network traffic for lightweight intrusion detection
W Wang, Y He, J Liu, S Gombault
IET Information Security 9 (6), 374-379, 2015
592015
Towards robust green virtual cloud data center provisioning
Y Yang, X Chang, J Liu, L Li
IEEE Transactions on Cloud Computing 5 (2), 168-181, 2015
522015
Detecting Android locker-ransomware on chinese social networks
D Su, J Liu, X Wang, W Wang
IEEE Access 7, 20381-20393, 2018
512018
The system can't perform the operation now. Try again later.
Articles 1–20