Creditcoin: A privacy-preserving blockchain-based incentive announcement network for communications of smart vehicles L Li, J Liu, L Cheng, S Qiu, W Wang, X Zhang, Z Zhang IEEE Transactions on Intelligent Transportation Systems 19 (7), 2204-2220, 2018 | 600 | 2018 |
Exploring permission-induced risk in android applications for malicious application detection W Wang, X Wang, D Feng, J Liu, Z Han, X Zhang IEEE Transactions on Information Forensics and Security 9 (11), 1869-1882, 2014 | 400 | 2014 |
Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers W Wang, Y Li, X Wang, J Liu, X Zhang Future generation computer systems 78, 987-994, 2018 | 260 | 2018 |
BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors W Wang, Y Shang, Y He, Y Li, J Liu Information Sciences 511, 284-296, 2020 | 193 | 2020 |
Adversarial attack and defense in reinforcement learning-from AI security view T Chen, J Liu, Y Xiang, W Niu, E Tong, Z Han Cybersecurity 2, 1-22, 2019 | 144 | 2019 |
Privacy risk analysis and mitigation of analytics libraries in the android ecosystem X Liu, J Liu, S Zhu, W Wang, X Zhang IEEE Transactions on Mobile Computing 19 (5), 1184-1199, 2019 | 144 | 2019 |
Vulnerability detection with deep learning F Wu, J Wang, J Liu, W Wang 2017 3rd IEEE international conference on computer and communications (ICCC …, 2017 | 134 | 2017 |
DroidEnsemble: Detecting Android malicious applications with ensemble of string and structural static features W Wang, Z Gao, M Zhao, Y Li, J Liu, X Zhang IEEE Access 6, 31798-31807, 2018 | 117 | 2018 |
Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack S Qiu, J Liu, Y Shi, R Zhang Sci. China Inf. Sci 60 (5), 1-12, 2017 | 117 | 2017 |
A two-layered permission-based android malware detection scheme X Liu, J Liu 2014 2nd IEEE international conference on mobile cloud computing, services …, 2014 | 115 | 2014 |
Selecting a trusted cloud service provider for your SaaS program C Tang, J Liu Computers & Security 50, 60-73, 2015 | 107 | 2015 |
SCTSC: A semicentralized traffic signal control mode with attribute-based blockchain in IoVs L Cheng, J Liu, G Xu, Z Zhang, H Wang, HN Dai, Y Wu, W Wang IEEE Transactions on Computational Social Systems 6 (6), 1373-1385, 2019 | 103 | 2019 |
Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation Y Shi, Q Zheng, J Liu, Z Han Information Sciences 295, 221-231, 2015 | 99 | 2015 |
Characterizing Android apps’ behavior for effective detection of malapps at large scale X Wang, W Wang, Y He, J Liu, Z Han, X Zhang Future generation computer systems 75, 30-45, 2017 | 93 | 2017 |
Abstracting massive data for lightweight intrusion detection in computer networks W Wang, J Liu, G Pitsilis, X Zhang Information Sciences 433, 417-430, 2018 | 87 | 2018 |
Assessing optimizer impact on DNN model sensitivity to adversarial examples Y Wang, J Liu, J Mišić, VB Mišić, S Lv, X Chang IEEE Access 7, 152766-152776, 2019 | 78 | 2019 |
Constructing important features from massive network traffic for lightweight intrusion detection W Wang, Y He, J Liu, S Gombault IET Information Security 9 (6), 374-379, 2015 | 67 | 2015 |
Efficient and secure outsourcing of differentially private data publishing with multiple evaluators J Li, H Ye, T Li, W Wang, W Lou, YT Hou, J Liu, R Lu IEEE Transactions on Dependable and Secure Computing 19 (1), 67-76, 2020 | 62 | 2020 |
Detecting Android locker-ransomware on chinese social networks D Su, J Liu, X Wang, W Wang IEEE Access 7, 20381-20393, 2018 | 62 | 2018 |
Quantum image encryption algorithm based on quantum key image J Wang, YC Geng, L Han, JQ Liu International Journal of Theoretical Physics 58, 308-322, 2019 | 60 | 2019 |