关注
Xiaolei Liu
Xiaolei Liu
在 uestc.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Transaction-based classification and detection approach for Ethereum smart contract
T Hu, X Liu, T Chen, X Zhang, X Huang, W Niu, J Lu, K Zhou, Y Liu
Information Processing & Management 58 (2), 102462, 2021
1912021
An Insider Threat Detection Approach Based on Mouse Dynamics and Deep Learning
T Hu, W Niu, X Zhang, X Liu, J Lu, Y Liu
Security and Communication Networks 2019, 2019
872019
Adversarial Samples on Android Malware Detection Systems for IoT Systems
X Liu, X Du, X Zhang, Q Zhu, H Wang, M Guizani
Sensors 19 (4), 974, 2019
802019
Weighted-sampling audio adversarial example attack
X Liu, K Wan, Y Ding, X Zhang, Q Zhu
Proceedings of the AAAI Conference on Artificial Intelligence 34 (04), 4908-4915, 2020
502020
Evolution-algorithm-based unmanned aerial vehicles path planning in complex environment
X Liu, X Du, X Zhang, Q Zhu, M Guizani
Computers & Electrical Engineering 80, 106493, 2019
282019
A black-box attack on neural networks based on swarm evolutionary algorithm
X Liu, T Hu, K Ding, Y Bai, W Niu, J Lu
Information Security and Privacy: 25th Australasian Conference, ACISP 2020 …, 2020
192020
Integrating Traffics with Network Device Logs for Anomaly Detection
Jiazhong Lu, Fengmao Lv, Zhongliu Zhuo, Xiaosong Zhang, Xiaolei Liu, Teng Hu ...
Security and Communication Networks, 2019
162019
A low-query black-box adversarial attack based on transferability
K Ding, X Liu, W Niu, T Hu, Y Wang, X Zhang
Knowledge-Based Systems 226, 107102, 2021
152021
Tracking the insider attacker: A blockchain traceability system for insider threats
T Hu, B Xin, X Liu, T Chen, K Ding, X Zhang
Sensors 20 (18), 5297, 2020
152020
Securing the private key in your blockchain wallet: a continuous authentication approach based on behavioral biometric
T Hu, X Liu, W Niu, K Ding, Y Wang, X Zhang
Journal of Physics: Conference Series 1631 (1), 012104, 2020
142020
TLTD: a testing framework for learning-based IoT traffic detection systems
X Liu, X Zhang, N Guizani, J Lu, Q Zhu, X Du
Sensors 18 (8), 2630, 2018
132018
Research on information steganography based on network data stream
J Lu, W Zhang, Z Deng, S Zhang, Y Chang, X Liu
Neural Computing and Applications 33, 851-866, 2021
102021
Adversarial Attacks Against Profile HMM Website Fingerprinting Detection Model
X Liu, Z Zhuo, X Du, X Zhang, Q Zhu, M Guizani
Cognitive Systems Research, 2018
92018
Enhanced fireworks algorithm for dynamic deployment of wireless sensor networks
X Liu, X Zhang, Q Zhu
2017 2nd International Conference on Frontiers of Sensors Technologies …, 2017
92017
Sparse adversarial attack for video via gradient-based keyframe selection
Y Xu, X Liu, M Yin, T Hu, K Ding
ICASSP 2022-2022 IEEE International Conference on Acoustics, Speech and …, 2022
72022
Compiler-Based Efficient CNN Model Construction for 5G Edge Devices
K Wan, X Liu, J Yu, X Zhang, X Du, N Guizani
IEEE Transactions on Intelligent Transportation Systems, 2021
72021
Sparse black-box inversion attack with limited information
Y Xu, X Liu, T Hu, B Xin, R Yang
ICASSP 2023-2023 IEEE International Conference on Acoustics, Speech and …, 2023
52023
A Hybrid Association Rule‐Based Method to Detect and Classify Botnets
Y Huang, L Jiazhong, H Tang, X Liu
Security and Communication Networks 2021 (1), 1028878, 2021
52021
HTTP‐Based APT Malware Infection Detection Using URL Correlation Analysis
WN Niu, J Xie, XS Zhang, C Wang, XQ Li, RD Chen, XL Liu
Security and Communication Networks 2021 (1), 6653386, 2021
52021
Research and analysis of electromagnetic trojan detection based on deep learning
J Lu, X Liu, S Zhang, Y Chang
Security and Communication Networks 2020 (1), 6641844, 2020
52020
系统目前无法执行此操作,请稍后再试。
文章 1–20