Follow
Liu Xin
Title
Cited by
Cited by
Year
An intelligent blockchain-based system for safe vaccine supply and supervision
B Yong, J Shen, X Liu, F Li, H Chen, Q Zhou
International Journal of Information Management 52, 102024, 2020
2902020
Anomaly detection in ad-hoc networks based on deep learning model: A plug and play device
F Feng, X Liu, B Yong, R Zhou, Q Zhou
Ad Hoc Networks 84, 82-89, 2019
1142019
TCN enhanced novel malicious traffic detection for IoT devices
L Xin, L Ziang, Z Yingli, Z Wenqiang, L Dong, Z Qingguo
Connection Science 34 (1), 1322-1341, 2022
282022
Not the end of story: An evaluation of ChatGPT-driven vulnerability description mappings
X Liu, Y Tan, Z Xiao, J Zhuge, R Zhou
Findings of the Association for Computational Linguistics: ACL 2023, 3724-3731, 2023
262023
Malicious Web traffic detection for Internet of Things environments
B Yong, X Liu, Q Yu, L Huang, Q Zhou
Computers & Electrical Engineering 77, 260-272, 2019
262019
MECGuard: GRU enhanced attack detection in mobile edge computing environment
X Liu, W Zhang, X Zhou, Q Zhou
Computer Communications 172, 1-9, 2021
112021
Web behavior detection based on deep neural network
B Yong, X Liu, Y Liu, H Yin, L Huang, Q Zhou
2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced …, 2018
112018
Owleye: An advanced detection system of web attacks based on hmm
X Liu, Q Yu, X Zhou, Q Zhou
2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th …, 2018
112018
PG-VulNet: Detect Supply Chain Vulnerabilities in IoT Devices using Pseudo-code and Graphs
X Liu, Y Wu, Q Yu, S Song, Y Liu, Q Zhou, J Zhuge
Proceedings of the 16th ACM/IEEE International Symposium on Empirical …, 2022
62022
Overview of vulnerability detection methods for Ethereum solidity smart contracts
Y Zhang, J Ma, Z LIU, X LIU, R ZHOU
Comput. Sci 49 (3), 52-61, 2022
52022
SmartEagleEye: A Cloud-Oriented Webshell Detection System Based on Dynamic Gray-Box and Deep Learning
X Liu, Y Zhang, Q Yu, J Min, J Shen, R Zhou, Q Zhou
Tsinghua Science and Technology 29 (3), 766-783, 2024
42024
SiFDetectCracker: An Adversarial Attack Against Fake Voice Detection Based on Speaker-Irrelative Features
X Hai, X Liu, Y Tan, Q Zhou
Proceedings of the 31st ACM International Conference on Multimedia, 8552-8560, 2023
32023
An Efficient Smart Contract Vulnerability Detector Based on Semantic Contract Graphs Using Approximate Graph Matching
Y Zhang, J Ma, X Liu, G Ye, Q Jin, J Ma, Q Zhou
IEEE Internet of Things Journal, 2023
32023
以太坊 Solidity 智能合约漏洞检测方法综述
张潆藜, 马佳利, 刘子昂, 刘新, 周睿
计算机科学 49 (03), 2022
32022
A logistics privacy protection system based on cloud computing
X Liu, B Hu, Q Zhou, J Liu
Frontier Computing: Theory, Technologies and Applications FC 2016 5, 455-461, 2018
32018
Code classification with graph neural networks: Have you ever struggled to make it work?
Q Yu, X Liu, Q Zhou, J Zhuge, C Wu
Expert Systems with Applications 233, 120978, 2023
22023
Hidden-in-Wave: A Novel Idea to Camouflage AI-Synthesized Voices Based on Speaker-Irrelative Features
X Liu, Y Tan, X Hai, Q Yu, Q Zhou
2023 IEEE 34th International Symposium on Software Reliability Engineering …, 2023
22023
Human or Not: Can You Really Detect the Fake Voices?
X Liu, Y Tan, R Chong, X Zhou, M Zhang, Q Zhou
Black Hat USA 2022, 2022
22022
Disappeared Coins: Steal Hashrate in Stratum Secretly
X Liu, R Chong, Y Huang, Y Zhang, Q Zhou
Black Hat Asia 2021, 2021
22021
A research of distributed security and QoS testing framework
Z Liu, Z Liu, Y Huang, X Liu, X Zhou, R Zhou
2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf …, 2020
22020
The system can't perform the operation now. Try again later.
Articles 1–20