关注
Xiaolei Liu
Xiaolei Liu
在 uestc.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Transaction-based classification and detection approach for Ethereum smart contract
T Hu, X Liu, T Chen, X Zhang, X Huang, W Niu, J Lu, K Zhou, Y Liu
Information Processing & Management 58 (2), 102462, 2021
1122021
Adversarial Samples on Android Malware Detection Systems for IoT Systems
X Liu, X Du, X Zhang, Q Zhu, H Wang, M Guizani
Sensors 19 (4), 974, 2019
632019
An Insider Threat Detection Approach Based on Mouse Dynamics and Deep Learning
T Hu, W Niu, X Zhang, X Liu, J Lu, Y Liu
Security and Communication Networks 2019, 2019
572019
Weighted-sampling audio adversarial example attack
X Liu, K Wan, Y Ding, X Zhang, Q Zhu
Proceedings of the AAAI Conference on Artificial Intelligence 34 (04), 4908-4915, 2020
33*2020
Evolution-algorithm-based unmanned aerial vehicles path planning in complex environment
X Liu, X Du, X Zhang, Q Zhu, M Guizani
Computers & Electrical Engineering 80, 106493, 2019
182019
A black-box attack on neural networks based on swarm evolutionary algorithm
X Liu, T Hu, K Ding, Y Bai, W Niu, J Lu
Information Security and Privacy: 25th Australasian Conference, ACISP 2020 …, 2020
132020
TLTD: a testing framework for learning-based IoT traffic detection systems
X Liu, X Zhang, N Guizani, J Lu, Q Zhu, X Du
Sensors 18 (8), 2630, 2018
112018
Securing the private key in your blockchain wallet: a continuous authentication approach based on behavioral biometric
T Hu, X Liu, W Niu, K Ding, Y Wang, X Zhang
Journal of Physics: Conference Series 1631 (1), 012104, 2020
92020
Enhanced fireworks algorithm for dynamic deployment of wireless sensor networks
X Liu, X Zhang, Q Zhu
2017 2nd International Conference on Frontiers of Sensors Technologies …, 2017
92017
A low-query black-box adversarial attack based on transferability
K Ding, X Liu, W Niu, T Hu, Y Wang, X Zhang
Knowledge-Based Systems 226, 107102, 2021
72021
Research on information steganography based on network data stream
J Lu, W Zhang, Z Deng, S Zhang, Y Chang, X Liu
Neural Computing and Applications 33, 851-866, 2021
72021
Integrating Traffics with Network Device Logs for Anomaly Detection
Jiazhong Lu, Fengmao Lv, Zhongliu Zhuo, Xiaosong Zhang, Xiaolei Liu, Teng Hu ...
Security and Communication Networks, 2019
72019
Adversarial Attacks Against Profile HMM Website Fingerprinting Detection Model
X Liu, Z Zhuo, X Du, X Zhang, Q Zhu, M Guizani
Cognitive Systems Research, 2018
72018
Tracking the insider attacker: A blockchain traceability system for insider threats
T Hu, B Xin, X Liu, T Chen, K Ding, X Zhang
Sensors 20 (18), 5297, 2020
52020
HTTP-based APT malware infection detection using URL correlation analysis
WN Niu, J Xie, XS Zhang, C Wang, XQ Li, RD Chen, XL Liu
Security and Communication Networks 2021, 1-12, 2021
32021
分布式布谷鸟算法在无线传感器网络布局优化中的应用
刘小垒, 张小松, 胡腾, 朱清新
计算机应用研究, 2018
32018
A Hybrid Association Rule-Based Method to Detect and Classify Botnets
Y Huang, L Jiazhong, H Tang, X Liu
Security and Communication Networks 2021, 1-9, 2021
22021
Research and analysis of electromagnetic Trojan detection based on deep learning
J Lu, X Liu, S Zhang, Y Chang
Security and Communication Networks 2020, 1-13, 2020
22020
Network intrusion feature map node equalization algorithm based on modified variable step-size constant modulus
J Lu, X Liu, T Hu, J Zhang, X Zhang
International Journal of Pattern Recognition and Artificial Intelligence 33 …, 2019
22019
A Lockable Abnormal Electromagnetic Signal Joint Detection Algorithm
J Lu, W Niu, X Liu, T Hu, X Zhang
International Journal of Pattern Recognition and Artificial Intelligence …, 2019
22019
系统目前无法执行此操作,请稍后再试。
文章 1–20