关注
jianyi liu
jianyi liu
在 bupt.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Depth-wise separable convolutions and multi-level pooling for an efficient spatial CNN-based steganalysis
R Zhang, F Zhu, J Liu, G Liu
IEEE Transactions on Information Forensics and Security 15, 1138-1150, 2019
2902019
Invisible steganography via generative adversarial networks
R Zhang, S Dong, J Liu
Multimedia tools and applications 78 (7), 8559-8575, 2019
2212019
Keyword extraction based on pagerank
J Wang, J Liu, C Wang
Pacific-Asia conference on knowledge discovery and data mining, 857-864, 2007
1102007
An Android malware detection method based on AndroidManifest file
X Li, J Liu, Y Huo, R Zhang, Y Yao
2016 4th International Conference on Cloud Computing and Intelligence …, 2016
462016
Efficient feature learning and multi-size image steganalysis based on CNN
R Zhang, F Zhu, J Liu, G Liu
arXiv preprint arXiv:1807.11428, 2018
442018
Constructing APT attack scenarios based on intrusion kill chain and fuzzy clustering
R Zhang, Y Huo, J Liu, F Weng
Security and Communication Networks 2017 (1), 7536381, 2017
372017
A high capacity reversible data hiding scheme for encrypted covers based on histogram shifting
R Zhang, C Lu, J Liu
Journal of Information Security and Applications 47, 199-207, 2019
342019
Underdetermined wideband DOA estimation for off-grid sources with coprime array using sparse Bayesian learning
Y Qin, Y Liu, J Liu, Z Yu
Sensors 18 (1), 253, 2018
282018
Keyword extraction using language network
J Liu, J Wang
2007 International Conference on Natural Language Processing and Knowledge …, 2007
272007
Analysis of message attacks in aviation data-link communication
R Zhang, G Liu, J Liu, JP Nees
IEEE Access 6, 455-463, 2017
242017
Invisible steganography via generative adversarial network
S Dong, R Zhang, J Liu
arXiv preprint arXiv:1807.08571 4 (3), 2018
222018
Multiple-file remote data checking for cloud storage
D Xiao, Y Yang, W Yao, C Wu, J Liu, Y Yang
Computers & Security 31 (2), 192-205, 2012
222012
Research on the comprehensive anti-spam filter
Y Guo, Y Zhang, J Liu, C Wang
2006 4th IEEE International Conference on Industrial Informatics, 1069-1074, 2006
162006
Web document duplicate removal algorithm based on keyword sequences
W Li, JY Liu, C Wang
2005 International Conference on Natural Language Processing and Knowledge …, 2005
162005
Multi-step attack scenarios mining based on neural network and Bayesian network attack graph
J Liu, B Liu, R Zhang, C Wang
Artificial Intelligence and Security: 5th International Conference, ICAIS …, 2019
152019
Relation classification via BERT with piecewise convolution and focal loss
J Liu, X Duan, R Zhang, Y Sun, L Guan, B Lin
Plos one 16 (9), e0257092, 2021
142021
Dynamic data integrity auditing for secure outsourcing in the cloud
J Wei, R Zhang, J Liu, J Li, X Niu, Y Yao
Concurrency and Computation: Practice and Experience 29 (12), e4096, 2017
142017
Phishing sites detection based on Url Correlation
Y Xue, Y Li, Y Yao, X Zhao, J Liu, R Zhang
2016 4th International Conference on Cloud Computing and Intelligence …, 2016
142016
Efficient dynamic replicated data possession checking in distributed cloud storage systems
J Wei, J Liu, R Zhang, X Niu
International Journal of Distributed Sensor Networks 12 (1), 1894713, 2016
132016
Keyword extraction using PageRank on synonym networks
Z Liu, J Liu, W Yao, C Wang
2010 International Conference on E-Product E-Service and E-Entertainment, 1-4, 2010
132010
系统目前无法执行此操作,请稍后再试。
文章 1–20