Publications

Research is what I’m doing when I don’t know what I’m doing.

— Wernher von Braun (1912–1977)

Journals

[2019]

  1. Network Intrusion Feature Map Node Equalization Algorithm Based on Modified Variable Step-Size Constant Modulus
    Jiazhong Lu, Xiaolei Liu, Teng Hu, Jianwei Zhang, Xiaosong Zhang
    International Journal of Pattern Recognition and Artificial Intelligence
  2. Evolution-algorithm-based unmanned aerial vehicles path planning in complex environment
    Xiaolei Liu, Xiaojiang Du, Xiaosong Zhang, Qingxin Zhu, Mohsen Guizani
    Computers & Electrical Engineering
  3. Survey of generation, attack and defense of adversarial examples
    Xiaolei Liu,Yuheng Luo,Lin Shao,Xiaosong Zhang,Qingxin Zhu
    Application Research of Computers
  4. Integrating Traffics with Network Device Logs for Anomaly Detection
    Jiazhong Lu, Fengmao Lv, Zhongliu Zhuo, Xiaosong Zhang, Xiaolei Liu, Teng Hu, Wei Deng
    Security and Communication Networks
  5. A Lockable Abnormal Electromagnetic Signal Joint Detection Algorithm
    Jiazhong Lu, Weina Niu, Xiaolei Liu, Teng Hu, Xiaosong Zhang
    International Journal of Pattern Recognition and Artificial Intelligence
  6. An Insider Threat Detection Approach Based on Mouse Dynamics and Deep Learning
    Teng Hu, Weina Niu, Xiaosong Zhang, Xiaolei Liu, Jiazhong Lu, Yuan Liu
    Security and Communication Networks
  7. Adversarial Samples on Android Malware Detection Systems for IoT Systems
    Xiaolei Liu, Xiaojiang Du, Xiaosong Zhang, Qingxin Zhu, Hao Wang, Mohsen Guizani
    Sensors 19 (4), 974

[2018]

  1. Adversarial Attacks Against Profile HMM Website Fingerprinting Detection Model
    Xiaolei Liu, Zhongliu Zhuo, Xiaojiang Du, Xiaosong Zhang, Qingxin Zhu, Mohsen Guizani
    Cognitive Systems Research
  2. TLTD: a testing framework for learning-based IoT traffic detection systems
    Xiaolei Liu, Xiaosong Zhang, Nadra Guizani, Jiazhong Lu, Qingxin Zhu, Xiaojiang Du
    Sensors 18 (8), 2630
  3. Deployment optimization of wireless sensor network based on parallelized cuckoo search algorithm
    Xiaolei Liu, Xiaosong Zhang, Teng Hu, Qingxin Zhu
    Application Research of Computers
  4. Deployment optimization of wireless sensor network base on parallelized fireworks algorithm
    Xiaolei Liu, Xiaosong Zhang, Yiqi Jiang, Qingxin Zhu
    Application Research of Computers

[2016]

  1. Modified t-distribution evolutionary algorithm for dynamic deployment of wireless sensor networks
    Xiaolei Liu, Xiaosong Zhang, Yiqi Jiang, Qingxin Zhu
    IEICE TRANSACTIONS on Information and Systems

Conferences

[2020]

  1. Weighted-Sampling Audio Adversarial Example Attack
    Xiaolei Liu, Kun Wan, Yufei Ding, Xiaosong Zhang, Qingxin Zhu
    Thirty-Fourth AAAI Conference on Artificial Intelligence (AAAI 2020)

[2017]

  1. Enhanced fireworks algorithm for dynamic deployment of wireless sensor networks
    Xiaolei Liu, Xiaosong Zhang, Qingxin Zhu
    2017 2nd International Conference on Frontiers of Sensors Technologies (ICFST 2017)

[2015]

  1. An improvement of Chinese text hierarchical clustering algorithm
    Xiaolei Liu,Zuguo Chen, Baoguo Zeng, Qianbin Chen
    2nd International Conference on Computer, Intelligent and Education Technology (CICET 2015)

Patents

[2020]

  1. A kind of chracter search method based on Sunday algorithms
    Xiaolei Liu,Xiaosong Zhang,Weina Niu,Bin Hu,Zhongqing Wang
    Application granted on 2020-01-31, Publication of CN107220333B

[2019]

  1. A kind of ROP injected based on Simulation Stack and thread attacks stack overflow means of defence
    Xiaolei Liu,Xiaosong Zhang,Weina Niu,Kuang Zhou,Yuzhou Hu
    Application granted on 2019-11-12, Publication of CN107229862B
  2. A kind of safety fusion authentication method of the polymorphic identity of user based on block chain
    Ke Huang,Xiaosong Zhang,Qi Xia,Ruidong Chen,Xiaolei Liu
    Application granted on 2019-08-09, Publication of CN107147652B
  3. A kind of cloud data managing method based on block chain
    Ke Huang,Xiaosong Zhang,Qi Xia,Ruidong Chen,Xiaolei Liu
    Application granted on 2019-05-10, Publication of CN107196934B

[2018]

  1. A kind of intrusion detection method and device based on browser tag attributes
    Xiaosong Zhang,Xiaolei Liu,Weina Niu,Ruidong Chen,etc.
    Application granted on 2018-05-15, Publication of CN104301314B
  2. A kind of method for predicting heavy showers and flood
    Xiaosong Zhang,Hongwei Zhang,Weina Niu,Xiaolei Liu,etc.
    Application granted on 2018-02-13, Publication of CN105046089B
  3. A kind of detection method and device of Android application software similitude
    Ruidong Chen,Xiaosong Zhang,Weina Niu,Zhongyin Dai,Kai Bao,Yanmei Qi,Zhou Yu,Dong Wang,Xiaolei Liu
    Application granted on 2018-01-12, Publication of CN104778409B

[2017]

  1. A kind of insertion of numeric type relational database watermark and extraction verification method
    Xiaolei Liu,Xiaosong Zhang,Tangbi Jiang,Weina Niu,etc.
    Application granted on 2017-11-17, Publication of CN104866735B

扫一扫,分享到微信

微信分享二维码
  • © 2013-2020 Xiaolei
  • PV: UV:

请我喝杯咖啡吧~

支付宝
微信