Follow
Jiqiang Liu
Jiqiang Liu
Professor of Computer Science
Verified email at bjtu.edu.cn
Title
Cited by
Cited by
Year
Creditcoin: A privacy-preserving blockchain-based incentive announcement network for communications of smart vehicles
L Li, J Liu, L Cheng, S Qiu, W Wang, X Zhang, Z Zhang
IEEE Transactions on Intelligent Transportation Systems 19 (7), 2204-2220, 2018
6002018
Exploring permission-induced risk in android applications for malicious application detection
W Wang, X Wang, D Feng, J Liu, Z Han, X Zhang
IEEE Transactions on Information Forensics and Security 9 (11), 1869-1882, 2014
4002014
Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers
W Wang, Y Li, X Wang, J Liu, X Zhang
Future generation computer systems 78, 987-994, 2018
2602018
BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors
W Wang, Y Shang, Y He, Y Li, J Liu
Information Sciences 511, 284-296, 2020
1932020
Adversarial attack and defense in reinforcement learning-from AI security view
T Chen, J Liu, Y Xiang, W Niu, E Tong, Z Han
Cybersecurity 2, 1-22, 2019
1442019
Privacy risk analysis and mitigation of analytics libraries in the android ecosystem
X Liu, J Liu, S Zhu, W Wang, X Zhang
IEEE Transactions on Mobile Computing 19 (5), 1184-1199, 2019
1442019
Vulnerability detection with deep learning
F Wu, J Wang, J Liu, W Wang
2017 3rd IEEE international conference on computer and communications (ICCC …, 2017
1342017
DroidEnsemble: Detecting Android malicious applications with ensemble of string and structural static features
W Wang, Z Gao, M Zhao, Y Li, J Liu, X Zhang
IEEE Access 6, 31798-31807, 2018
1172018
Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack
S Qiu, J Liu, Y Shi, R Zhang
Sci. China Inf. Sci 60 (5), 1-12, 2017
1172017
A two-layered permission-based android malware detection scheme
X Liu, J Liu
2014 2nd IEEE international conference on mobile cloud computing, services …, 2014
1152014
Selecting a trusted cloud service provider for your SaaS program
C Tang, J Liu
Computers & Security 50, 60-73, 2015
1072015
SCTSC: A semicentralized traffic signal control mode with attribute-based blockchain in IoVs
L Cheng, J Liu, G Xu, Z Zhang, H Wang, HN Dai, Y Wu, W Wang
IEEE Transactions on Computational Social Systems 6 (6), 1373-1385, 2019
1032019
Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation
Y Shi, Q Zheng, J Liu, Z Han
Information Sciences 295, 221-231, 2015
992015
Characterizing Android apps’ behavior for effective detection of malapps at large scale
X Wang, W Wang, Y He, J Liu, Z Han, X Zhang
Future generation computer systems 75, 30-45, 2017
932017
Abstracting massive data for lightweight intrusion detection in computer networks
W Wang, J Liu, G Pitsilis, X Zhang
Information Sciences 433, 417-430, 2018
872018
Assessing optimizer impact on DNN model sensitivity to adversarial examples
Y Wang, J Liu, J Mišić, VB Mišić, S Lv, X Chang
IEEE Access 7, 152766-152776, 2019
782019
Constructing important features from massive network traffic for lightweight intrusion detection
W Wang, Y He, J Liu, S Gombault
IET Information Security 9 (6), 374-379, 2015
672015
Efficient and secure outsourcing of differentially private data publishing with multiple evaluators
J Li, H Ye, T Li, W Wang, W Lou, YT Hou, J Liu, R Lu
IEEE Transactions on Dependable and Secure Computing 19 (1), 67-76, 2020
622020
Detecting Android locker-ransomware on chinese social networks
D Su, J Liu, X Wang, W Wang
IEEE Access 7, 20381-20393, 2018
622018
Quantum image encryption algorithm based on quantum key image
J Wang, YC Geng, L Han, JQ Liu
International Journal of Theoretical Physics 58, 308-322, 2019
602019
The system can't perform the operation now. Try again later.
Articles 1–20