An intelligent blockchain-based system for safe vaccine supply and supervision B Yong, J Shen, X Liu, F Li, H Chen, Q Zhou International Journal of Information Management 52, 102024, 2020 | 290 | 2020 |
Anomaly detection in ad-hoc networks based on deep learning model: A plug and play device F Feng, X Liu, B Yong, R Zhou, Q Zhou Ad Hoc Networks 84, 82-89, 2019 | 114 | 2019 |
TCN enhanced novel malicious traffic detection for IoT devices L Xin, L Ziang, Z Yingli, Z Wenqiang, L Dong, Z Qingguo Connection Science 34 (1), 1322-1341, 2022 | 28 | 2022 |
Not the end of story: An evaluation of ChatGPT-driven vulnerability description mappings X Liu, Y Tan, Z Xiao, J Zhuge, R Zhou Findings of the Association for Computational Linguistics: ACL 2023, 3724-3731, 2023 | 26 | 2023 |
Malicious Web traffic detection for Internet of Things environments B Yong, X Liu, Q Yu, L Huang, Q Zhou Computers & Electrical Engineering 77, 260-272, 2019 | 26 | 2019 |
MECGuard: GRU enhanced attack detection in mobile edge computing environment X Liu, W Zhang, X Zhou, Q Zhou Computer Communications 172, 1-9, 2021 | 11 | 2021 |
Web behavior detection based on deep neural network B Yong, X Liu, Y Liu, H Yin, L Huang, Q Zhou 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced …, 2018 | 11 | 2018 |
Owleye: An advanced detection system of web attacks based on hmm X Liu, Q Yu, X Zhou, Q Zhou 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th …, 2018 | 11 | 2018 |
PG-VulNet: Detect Supply Chain Vulnerabilities in IoT Devices using Pseudo-code and Graphs X Liu, Y Wu, Q Yu, S Song, Y Liu, Q Zhou, J Zhuge Proceedings of the 16th ACM/IEEE International Symposium on Empirical …, 2022 | 6 | 2022 |
Overview of vulnerability detection methods for Ethereum solidity smart contracts Y Zhang, J Ma, Z LIU, X LIU, R ZHOU Comput. Sci 49 (3), 52-61, 2022 | 5 | 2022 |
SmartEagleEye: A Cloud-Oriented Webshell Detection System Based on Dynamic Gray-Box and Deep Learning X Liu, Y Zhang, Q Yu, J Min, J Shen, R Zhou, Q Zhou Tsinghua Science and Technology 29 (3), 766-783, 2024 | 4 | 2024 |
SiFDetectCracker: An Adversarial Attack Against Fake Voice Detection Based on Speaker-Irrelative Features X Hai, X Liu, Y Tan, Q Zhou Proceedings of the 31st ACM International Conference on Multimedia, 8552-8560, 2023 | 3 | 2023 |
An Efficient Smart Contract Vulnerability Detector Based on Semantic Contract Graphs Using Approximate Graph Matching Y Zhang, J Ma, X Liu, G Ye, Q Jin, J Ma, Q Zhou IEEE Internet of Things Journal, 2023 | 3 | 2023 |
以太坊 Solidity 智能合约漏洞检测方法综述 张潆藜, 马佳利, 刘子昂, 刘新, 周睿 计算机科学 49 (03), 2022 | 3 | 2022 |
A logistics privacy protection system based on cloud computing X Liu, B Hu, Q Zhou, J Liu Frontier Computing: Theory, Technologies and Applications FC 2016 5, 455-461, 2018 | 3 | 2018 |
Code classification with graph neural networks: Have you ever struggled to make it work? Q Yu, X Liu, Q Zhou, J Zhuge, C Wu Expert Systems with Applications 233, 120978, 2023 | 2 | 2023 |
Hidden-in-Wave: A Novel Idea to Camouflage AI-Synthesized Voices Based on Speaker-Irrelative Features X Liu, Y Tan, X Hai, Q Yu, Q Zhou 2023 IEEE 34th International Symposium on Software Reliability Engineering …, 2023 | 2 | 2023 |
Human or Not: Can You Really Detect the Fake Voices? X Liu, Y Tan, R Chong, X Zhou, M Zhang, Q Zhou Black Hat USA 2022, 2022 | 2 | 2022 |
Disappeared Coins: Steal Hashrate in Stratum Secretly X Liu, R Chong, Y Huang, Y Zhang, Q Zhou Black Hat Asia 2021, 2021 | 2 | 2021 |
A research of distributed security and QoS testing framework Z Liu, Z Liu, Y Huang, X Liu, X Zhou, R Zhou 2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf …, 2020 | 2 | 2020 |