Search

Your search keyword '"Liu, Jiqiang"' showing total 644 results

Search Constraints

Start Over You searched for: Author "Liu, Jiqiang" Remove constraint Author: "Liu, Jiqiang"
644 results on '"Liu, Jiqiang"'

Search Results

1. Blockchain Takeovers in Web 3.0: An Empirical Study on the TRON-Steem Incident

2. Tactics, Techniques, and Procedures (TTPs) in Interpreted Malware: A Zero-Shot Generation with Large Language Models

3. Lurking in the shadows: Unveiling Stealthy Backdoor Attacks against Personalized Federated Learning

4. A Large-scale Fine-grained Analysis of Packages in Open-Source Software Ecosystems

5. OSS Malicious Package Analysis in the Wild

6. LTRDetector: Exploring Long-Term Relationship for Advanced Persistent Threats Detection

7. CARE: Ensemble Adversarial Robustness Evaluation Against Adaptive Attackers for Security Applications

8. Explainable and Transferable Adversarial Attack for ML-Based Network Intrusion Detectors

10. How Hard is Takeover in DPoS Blockchains? Understanding the Security of Coin-based Voting Governance

13. TBDetector:Transformer-Based Detector for Advanced Persistent Threats with Provenance Graph

14. Knowledge-Driven Backdoor Removal in Deep Neural Networks via Reinforcement Learning

15. Lurking in the Shadows: Imperceptible Shadow Black-Box Attacks Against Lane Detection Models

19. DI-AA: An Interpretable White-box Attack for Fooling Deep Neural Networks

20. AppQ: Warm-starting App Recommendation Based on View Graphs

24. IWA: Integrated Gradient based White-box Attacks for Fooling Deep Neural Networks

25. Generalizing Adversarial Examples by AdaBelief Optimizer

26. CVAR-FL IoV Intrusion Detection Framework

28. 'Are you home alone?' 'Yes' Disclosing Security and Privacy Vulnerabilities in Alexa Skills

29. NF-Crowd: Nearly-free Blockchain-based Crowdsourcing

32. Private Rank Aggregation under Local Differential Privacy

35. Bidirectional RNN-based Few-shot Training for Detecting Multi-stage Attack

36. Adaptive Quantum Image Encryption Method Based on Wavelet Transform

39. Adapting on Road Traffic-Oriented Controlled Optimization of Phases to Heterogeneous Intersections

40. Predicting Congestion Attack of Variable Spoofing Frequency for Reliable Traffic Signal System

41. Security Analysis of Poisoning Attacks Against Multi-agent Reinforcement Learning

43. A Training-based Identification Approach to VIN Adversarial Examples

44. Intrusion Prediction with System-call Sequence-to-Sequence Model

45. Gradient Band-based Adversarial Training for Generalized Attack Immunity of A3C Path Finding

46. Discovering Communities of Malapps on Android-based Mobile Cyber-physical Systems

Catalog

Books, media, physical & digital resources