2018 International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec) S Abel, L Xiao, H Wang, TPX Li, N Li, L Li, Y Liu, J Cai, X Wu, Y Liu, J Luo, ... | | |
A comparative study of the class imbalance problem in Twitter spam detection C Li, S Liu Concurrency and computation: practice and experience 30 (5), e4281, 2018 | 56 | 2018 |
A data-driven attack against support vectors of SVM S Liu, J Zhang, Y Wang, W Zhou, Y Xiang, OD Vel Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018 | 10 | 2018 |
A Fuzzing Method for Security Testing of Sensors X Zhu, S Liu, A Jolfaei IEEE Sensors Journal, 2023 | | 2023 |
A hybrid approach to fuzzy risk analysis in stock market S Liu, M Gan, H Dai 2013 10th International Conference on Fuzzy Systems and Knowledge Discovery …, 2013 | 3 | 2013 |
A New Effective Information Decomposition Approach for Missing Data Recovery S Liu, H Dai Proceedings of the International Conference on Data Science (ICDATA), 1, 2014 | | 2014 |
A NEW FKG SYSTEM MODEL AND ITS APPLICATION ON STOCK PRICE K Zou, S Liu INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL 7 (7 A …, 2011 | | 2011 |
A performance evaluation of deep‐learnt features for software vulnerability detection X Ban, S Liu, C Chen, C Chua Concurrency and Computation: Practice and Experience 31 (19), e5103, 2019 | 48 | 2019 |
A study of data pre-processing techniques for imbalanced biomedical data classification S Liu, J Zhang, Y Xiang, W Zhou, D Xiang International Journal of Bioinformatics Research and Applications 16 (3 …, 2020 | 22 | 2020 |
A Survey on IoT Vulnerability Discovery X Ban, M Ding, S Liu, C Chen, J Zhang International Conference on Network and System Security, 267-282, 2022 | 3 | 2022 |
Addressing the class imbalance problem in twitter spam detection using ensemble learning S Liu, Y Wang, J Zhang, C Chen, Y Xiang Computers & Security 69, 35-49, 2017 | 135 | 2017 |
An ensemble learning approach for addressing the class imbalance problem in Twitter spam detection S Liu, Y Wang, C Chen, Y Xiang Information Security and Privacy: 21st Australasian Conference, ACISP 2016 …, 2016 | 16 | 2016 |
An ensemble oversampling model for class imbalance problem in software defect prediction S Huda, K Liu, M Abdelrazek, A Ibrahim, S Alyahya, H Al-Dossari, ... IEEE access 6, 24184-24195, 2018 | 133 | 2018 |
An overview of attacks and defences on intelligent connected vehicles M Dibaei, X Zheng, K Jiang, S Maric, R Abbas, S Liu, Y Zhang, Y Deng, ... arXiv preprint arXiv:1907.07455, 2019 | 49 | 2019 |
Application of a new FKG system model in stock market prediction K Zou, S Liu 2010 International Conference on Computer and Communication Technologies in …, 0 | | |
APPLICATION OF FUZZY GRAPH MAXIMAL TREE CLUSTERING METHOD IN THE ANALYSIS OF CRIME DATA K ZOU, F LIU, S LIU ICIC express letters. Part B, Applications: an international journal of …, 2012 | | 2012 |
ArtChain: Blockchain-enabled platform for art marketplace Z Wang, L Yang, Q Wang, D Liu, Z Xu, S Liu 2019 IEEE international conference on blockchain (blockchain), 447-454, 2019 | 78 | 2019 |
Attacks and defences on intelligent connected vehicles: A survey M Dibaei, X Zheng, K Jiang, R Abbas, S Liu, Y Zhang, Y Xiang, S Yu Digital Communications and Networks 6 (4), 399-421, 2020 | 134 | 2020 |
CD-VulD: Cross-domain vulnerability discovery based on deep domain adaptation S Liu, G Lin, L Qu, J Zhang, O De Vel, P Montague, Y Xiang IEEE Transactions on Dependable and Secure Computing 19 (1), 438-451, 2020 | 67 | 2020 |
Complex Fuzzy Structured Element and Its Properties ZOU Kaiqi, LIU Shigang, Z Xiaoyue Intelligent Information Management 2 (1), 53-57, 2010 | | 2010 |