An intelligent blockchain-based system for safe vaccine supply and supervision B Yong, J Shen, X Liu, F Li, H Chen, Q Zhou International Journal of Information Management 52, 102024, 2020 | 250 | 2020 |
Anomaly detection in ad-hoc networks based on deep learning model: A plug and play device F Feng, X Liu, B Yong, R Zhou, Q Zhou Ad Hoc Networks 84, 82-89, 2019 | 98 | 2019 |
Malicious Web traffic detection for Internet of Things environments B Yong, X Liu, Q Yu, L Huang, Q Zhou Computers & Electrical Engineering 77, 260-272, 2019 | 24 | 2019 |
TCN enhanced novel malicious traffic detection for IoT devices L Xin, L Ziang, Z Yingli, Z Wenqiang, L Dong, Z Qingguo Connection Science 34 (1), 1322-1341, 2022 | 21 | 2022 |
Not the end of story: An evaluation of chatgpt-driven vulnerability description mappings X Liu, Y Tan, Z Xiao, J Zhuge, R Zhou Findings of the Association for Computational Linguistics: ACL 2023, 3724-3731, 2023 | 16 | 2023 |
Web behavior detection based on deep neural network B Yong, X Liu, Y Liu, H Yin, L Huang, Q Zhou 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced …, 2018 | 11 | 2018 |
MECGuard: GRU enhanced attack detection in Mobile Edge Computing environment X Liu, W Zhang, X Zhou, Q Zhou Computer Communications 172, 1-9, 2021 | 10 | 2021 |
Owleye: An advanced detection system of web attacks based on hmm X Liu, Q Yu, X Zhou, Q Zhou 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th …, 2018 | 9 | 2018 |
A Logistics Privacy Protection System Based on Cloud Computing X Liu, B Hu, Q Zhou, J Liu Frontier Computing: Theory, Technologies and Applications FC 2016 5, 455-461, 2018 | 3 | 2018 |
PG-VulNet: Detect Supply Chain Vulnerabilities in IoT Devices using Pseudo-code and Graphs X Liu, Y Wu, Q Yu, S Song, Y Liu, Q Zhou, J Zhuge Proceedings of the 16th ACM/IEEE International Symposium on Empirical …, 2022 | 2 | 2022 |
以太坊 Solidity 智能合约漏洞检测方法综述 张潆藜, 马佳利, 刘子昂, 刘新, 周睿 计算机科学 49 (03), 2022 | 2 | 2022 |
Disappeared Coins: Steal Hashrate in Stratum Secretly X Liu, R Chong, Y Huang, Y Zhang, Q Zhou Black Hat Asia 2021, 2021 | 2 | 2021 |
A research of distributed security and QoS testing framework Z Liu, Z Liu, Y Huang, X Liu, X Zhou, R Zhou 2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf …, 2020 | 2 | 2020 |
FalconEye: A High-Performance Distributed Security Scanning System C Wang, X Liu, X Zhou, R Zhou, D Lv, M Wang, Q Zhou 2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf …, 2019 | 2 | 2019 |
SiFDetectCracker: An Adversarial Attack Against Fake Voice Detection Based on Speaker-Irrelative Features X Hai, X Liu, Y Tan, Q Zhou Proceedings of the 31st ACM International Conference on Multimedia, 8552-8560, 2023 | 1 | 2023 |
An Efficient Smart Contract Vulnerability Detector Based on Semantic Contract Graphs Using Approximate Graph Matching Y Zhang, J Ma, X Liu, G Ye, Q Jin, J Ma, Q Zhou IEEE Internet of Things Journal, 2023 | 1 | 2023 |
SmartEagleEye: A Cloud-Oriented Webshell Detection System Based on Dynamic Gray-Box and Deep Learning X Liu, Y Zhang, Q Yu, J Min, J Shen, R Zhou, Q Zhou Tsinghua Science and Technology 29 (3), 766-783, 2024 | | 2024 |
Laser-Based Command Injection Attacks on Voice-Controlled Microphone Arrays H Shi, Y He, Q Wang, J Zhuge, Q Li, X Liu IACR Transactions on Cryptographic Hardware and Embedded Systems 2024 (2 …, 2024 | | 2024 |
Code classification with graph neural networks: Have you ever struggled to make it work? Q Yu, X Liu, Q Zhou, J Zhuge, C Wu Expert Systems with Applications 233, 120978, 2023 | | 2023 |
Novel MITM attack scheme based on built-in negotiation for blockchain-based digital twins X Liu, R Zhou, S Shimizu, R Chong, Q Zhou, X Zhou Digital Communications and Networks, 2023 | | 2023 |