Transaction-based classification and detection approach for Ethereum smart contract T Hu, X Liu, T Chen, X Zhang, X Huang, W Niu, J Lu, K Zhou, Y Liu Information Processing & Management 58 (2), 102462, 2021 | 191 | 2021 |
An Insider Threat Detection Approach Based on Mouse Dynamics and Deep Learning T Hu, W Niu, X Zhang, X Liu, J Lu, Y Liu Security and Communication Networks 2019, 2019 | 87 | 2019 |
Adversarial Samples on Android Malware Detection Systems for IoT Systems X Liu, X Du, X Zhang, Q Zhu, H Wang, M Guizani Sensors 19 (4), 974, 2019 | 80 | 2019 |
Weighted-sampling audio adversarial example attack X Liu, K Wan, Y Ding, X Zhang, Q Zhu Proceedings of the AAAI Conference on Artificial Intelligence 34 (04), 4908-4915, 2020 | 50 | 2020 |
Evolution-algorithm-based unmanned aerial vehicles path planning in complex environment X Liu, X Du, X Zhang, Q Zhu, M Guizani Computers & Electrical Engineering 80, 106493, 2019 | 28 | 2019 |
A black-box attack on neural networks based on swarm evolutionary algorithm X Liu, T Hu, K Ding, Y Bai, W Niu, J Lu Information Security and Privacy: 25th Australasian Conference, ACISP 2020 …, 2020 | 19 | 2020 |
Integrating Traffics with Network Device Logs for Anomaly Detection Jiazhong Lu, Fengmao Lv, Zhongliu Zhuo, Xiaosong Zhang, Xiaolei Liu, Teng Hu ... Security and Communication Networks, 2019 | 16 | 2019 |
A low-query black-box adversarial attack based on transferability K Ding, X Liu, W Niu, T Hu, Y Wang, X Zhang Knowledge-Based Systems 226, 107102, 2021 | 15 | 2021 |
Tracking the insider attacker: A blockchain traceability system for insider threats T Hu, B Xin, X Liu, T Chen, K Ding, X Zhang Sensors 20 (18), 5297, 2020 | 15 | 2020 |
Securing the private key in your blockchain wallet: a continuous authentication approach based on behavioral biometric T Hu, X Liu, W Niu, K Ding, Y Wang, X Zhang Journal of Physics: Conference Series 1631 (1), 012104, 2020 | 14 | 2020 |
TLTD: a testing framework for learning-based IoT traffic detection systems X Liu, X Zhang, N Guizani, J Lu, Q Zhu, X Du Sensors 18 (8), 2630, 2018 | 13 | 2018 |
Research on information steganography based on network data stream J Lu, W Zhang, Z Deng, S Zhang, Y Chang, X Liu Neural Computing and Applications 33, 851-866, 2021 | 10 | 2021 |
Adversarial Attacks Against Profile HMM Website Fingerprinting Detection Model X Liu, Z Zhuo, X Du, X Zhang, Q Zhu, M Guizani Cognitive Systems Research, 2018 | 9 | 2018 |
Enhanced fireworks algorithm for dynamic deployment of wireless sensor networks X Liu, X Zhang, Q Zhu 2017 2nd International Conference on Frontiers of Sensors Technologies …, 2017 | 9 | 2017 |
Sparse adversarial attack for video via gradient-based keyframe selection Y Xu, X Liu, M Yin, T Hu, K Ding ICASSP 2022-2022 IEEE International Conference on Acoustics, Speech and …, 2022 | 7 | 2022 |
Compiler-Based Efficient CNN Model Construction for 5G Edge Devices K Wan, X Liu, J Yu, X Zhang, X Du, N Guizani IEEE Transactions on Intelligent Transportation Systems, 2021 | 7 | 2021 |
Sparse black-box inversion attack with limited information Y Xu, X Liu, T Hu, B Xin, R Yang ICASSP 2023-2023 IEEE International Conference on Acoustics, Speech and …, 2023 | 5 | 2023 |
A Hybrid Association Rule‐Based Method to Detect and Classify Botnets Y Huang, L Jiazhong, H Tang, X Liu Security and Communication Networks 2021 (1), 1028878, 2021 | 5 | 2021 |
HTTP‐Based APT Malware Infection Detection Using URL Correlation Analysis WN Niu, J Xie, XS Zhang, C Wang, XQ Li, RD Chen, XL Liu Security and Communication Networks 2021 (1), 6653386, 2021 | 5 | 2021 |
Research and analysis of electromagnetic trojan detection based on deep learning J Lu, X Liu, S Zhang, Y Chang Security and Communication Networks 2020 (1), 6641844, 2020 | 5 | 2020 |