Transaction-based classification and detection approach for Ethereum smart contract T Hu, X Liu, T Chen, X Zhang, X Huang, W Niu, J Lu, K Zhou, Y Liu Information Processing & Management 58 (2), 102462, 2021 | 112 | 2021 |
Adversarial Samples on Android Malware Detection Systems for IoT Systems X Liu, X Du, X Zhang, Q Zhu, H Wang, M Guizani Sensors 19 (4), 974, 2019 | 63 | 2019 |
An Insider Threat Detection Approach Based on Mouse Dynamics and Deep Learning T Hu, W Niu, X Zhang, X Liu, J Lu, Y Liu Security and Communication Networks 2019, 2019 | 57 | 2019 |
Weighted-sampling audio adversarial example attack X Liu, K Wan, Y Ding, X Zhang, Q Zhu Proceedings of the AAAI Conference on Artificial Intelligence 34 (04), 4908-4915, 2020 | 33* | 2020 |
Evolution-algorithm-based unmanned aerial vehicles path planning in complex environment X Liu, X Du, X Zhang, Q Zhu, M Guizani Computers & Electrical Engineering 80, 106493, 2019 | 18 | 2019 |
A black-box attack on neural networks based on swarm evolutionary algorithm X Liu, T Hu, K Ding, Y Bai, W Niu, J Lu Information Security and Privacy: 25th Australasian Conference, ACISP 2020 …, 2020 | 13 | 2020 |
TLTD: a testing framework for learning-based IoT traffic detection systems X Liu, X Zhang, N Guizani, J Lu, Q Zhu, X Du Sensors 18 (8), 2630, 2018 | 11 | 2018 |
Securing the private key in your blockchain wallet: a continuous authentication approach based on behavioral biometric T Hu, X Liu, W Niu, K Ding, Y Wang, X Zhang Journal of Physics: Conference Series 1631 (1), 012104, 2020 | 9 | 2020 |
Enhanced fireworks algorithm for dynamic deployment of wireless sensor networks X Liu, X Zhang, Q Zhu 2017 2nd International Conference on Frontiers of Sensors Technologies …, 2017 | 9 | 2017 |
A low-query black-box adversarial attack based on transferability K Ding, X Liu, W Niu, T Hu, Y Wang, X Zhang Knowledge-Based Systems 226, 107102, 2021 | 7 | 2021 |
Research on information steganography based on network data stream J Lu, W Zhang, Z Deng, S Zhang, Y Chang, X Liu Neural Computing and Applications 33, 851-866, 2021 | 7 | 2021 |
Integrating Traffics with Network Device Logs for Anomaly Detection Jiazhong Lu, Fengmao Lv, Zhongliu Zhuo, Xiaosong Zhang, Xiaolei Liu, Teng Hu ... Security and Communication Networks, 2019 | 7 | 2019 |
Adversarial Attacks Against Profile HMM Website Fingerprinting Detection Model X Liu, Z Zhuo, X Du, X Zhang, Q Zhu, M Guizani Cognitive Systems Research, 2018 | 7 | 2018 |
Tracking the insider attacker: A blockchain traceability system for insider threats T Hu, B Xin, X Liu, T Chen, K Ding, X Zhang Sensors 20 (18), 5297, 2020 | 5 | 2020 |
HTTP-based APT malware infection detection using URL correlation analysis WN Niu, J Xie, XS Zhang, C Wang, XQ Li, RD Chen, XL Liu Security and Communication Networks 2021, 1-12, 2021 | 3 | 2021 |
分布式布谷鸟算法在无线传感器网络布局优化中的应用 刘小垒, 张小松, 胡腾, 朱清新 计算机应用研究, 2018 | 3 | 2018 |
A Hybrid Association Rule-Based Method to Detect and Classify Botnets Y Huang, L Jiazhong, H Tang, X Liu Security and Communication Networks 2021, 1-9, 2021 | 2 | 2021 |
Research and analysis of electromagnetic Trojan detection based on deep learning J Lu, X Liu, S Zhang, Y Chang Security and Communication Networks 2020, 1-13, 2020 | 2 | 2020 |
Network intrusion feature map node equalization algorithm based on modified variable step-size constant modulus J Lu, X Liu, T Hu, J Zhang, X Zhang International Journal of Pattern Recognition and Artificial Intelligence 33 …, 2019 | 2 | 2019 |
A Lockable Abnormal Electromagnetic Signal Joint Detection Algorithm J Lu, W Niu, X Liu, T Hu, X Zhang International Journal of Pattern Recognition and Artificial Intelligence …, 2019 | 2 | 2019 |