default search action
Wenmao Liu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Hongsong Chen, Xingyu Li, Wenmao Liu:
Multivariate time series anomaly detection by fusion of deep convolution residual autoencoding reconstruction model and ConvLstm forecasting model. Comput. Secur. 137: 103581 (2024) - [j15]Yuexin Xiang, Yuchen Lei, Ding Bao, Tiantian Li, Qingqing Yang, Wenmao Liu, Wei Ren, Kim-Kwang Raymond Choo:
BABD: A Bitcoin Address Behavior Dataset for Pattern Analysis. IEEE Trans. Inf. Forensics Secur. 19: 2171-2185 (2024) - [j14]Jian Qu, Xiaobo Ma, Wenmao Liu, Hongqing Sang, Jianfeng Li, Lei Xue, Xiapu Luo, Zhenhua Li, Li Feng, Xiaohong Guan:
On Smartly Scanning of the Internet of Things. IEEE/ACM Trans. Netw. 32(2): 1019-1034 (2024) - [c17]Enze Zhao, Peng Li, Zhang Cheng, Wenmao Liu, Lei Nie, Haizhou Bao, Qin Liu, Kai Zhang:
Masked Transformer-based Multi-GAN for 5G Core Network KPI Anomaly Detection. CSCWD 2024: 2601-2606 - 2023
- [j13]Yong Wu, Binjun Wang, Wei Li, Wenmao Liu:
Signed directed attention network. Computing 105(8): 1647-1671 (2023) - [j12]Jian Qu, Xiaobo Ma, Wenmao Liu:
Who is DNS serving for? A human-software perspective of modeling DNS services. Knowl. Based Syst. 263: 110279 (2023) - [c16]Min Wang, Peng Li, Zhang Cheng, Wenmao Liu, Lei Nie, Haizhou Bao, Qin Liu, Kai Zhang:
Unsupervised Graph-Sequence Anomaly Detection for 5G Core Network Control Plane Traffic. ICPADS 2023: 1645-1652 - 2022
- [j11]Huanran Wang, Hui He, Weizhe Zhang, Wenmao Liu, Peng Liu, Amir Javadpour:
Using honeypots to model botnet attacks on the internet of medical things. Comput. Electr. Eng. 102: 108212 (2022) - [j10]Donghai Tian, Runze Zhao, Rui Ma, Xiaoqi Jia, Qi Shen, Changzhen Hu, Wenmao Liu:
MDCD: A malware detection approach in cloud using deep learning. Trans. Emerg. Telecommun. Technol. 33(11) (2022) - [j9]Jia Liu, Runzi Zhang, Wenmao Liu, Yinghua Zhang, Dujuan Gu, Mingkai Tong, Xingkai Wang, Jianxin Xue, Huanran Wang:
Context2Vector: Accelerating security event triage via context representation learning. Inf. Softw. Technol. 146: 106856 (2022) - [j8]Chong Yuan, Jingxuan Cai, Donghai Tian, Rui Ma, Xiaoqi Jia, Wenmao Liu:
Towards time evolved malware identification using two-head neural network. J. Inf. Secur. Appl. 65: 103098 (2022) - [j7]Yulai Xie, Minpeng Jin, Zhuping Zou, Gongming Xu, Dan Feng, Wenmao Liu, Darrell D. E. Long:
Real-Time Prediction of Docker Container Resource Load Based on a Hybrid Model of ARIMA and Triple Exponential Smoothing. IEEE Trans. Cloud Comput. 10(2): 1386-1401 (2022) - [j6]Xiaobo Ma, Jian Qu, Jianfeng Li, John C. S. Lui, Zhenhua Li, Wenmao Liu, Xiaohong Guan:
Inferring Hidden IoT Devices and User Interactions via Spatial-Temporal Traffic Fingerprinting. IEEE/ACM Trans. Netw. 30(1): 394-408 (2022) - [c15]Qingqing Yang, Yuexin Xiang, Wenmao Liu, Wei Ren:
An Illicit Bitcoin Address Analysis Scheme Based on Subgraph Evolution. HPCC/DSS/SmartCity/DependSys 2022: 679-686 - [c14]Guorui Xu, Zeyu Yuan, Peidong Hu, Wenmao Liu, Weili Li, Yang Zhan, Haisen Zhao:
Influence of Rotor Damping Bars on Rotor Temperature Rise of Synchronous Condenser after Single-Phase Short-Circuit Fault. IAS 2022: 1-7 - [c13]Jian Qu, Xiaobo Ma, Wenmao Liu, Hongqing Sang, Jianfeng Li, Lei Xue, Xiapu Luo, Zhenhua Li, Li Feng, Xiaohong Guan:
Landing Reinforcement Learning onto Smart Scanning of The Internet of Things. INFOCOM 2022: 2088-2097 - [c12]Rui Yu, Fu Chen, Wenmao Liu, Hongqing Sang:
Threat identification model for suspected Internet of Things attack groups. ICSS 2022: 283-288 - [i1]Yuexin Xiang, Yuchen Lei, Ding Bao, Wei Ren, Tiantian Li, Qingqing Yang, Wenmao Liu, Tianqing Zhu, Kim-Kwang Raymond Choo:
BABD: A Bitcoin Address Behavior Dataset for Address Behavior Pattern Analysis. CoRR abs/2204.05746 (2022) - 2021
- [j5]Xiaobo Ma, Jian Qu, Feitong Chen, Wenmao Liu, Jianfeng Li, Jing Tao, Hongshan Jiao, Mawei Shi, Zhi-Li Zhang:
One Host with So Many IPs! On The Security Implications of Dynamic Virtual Private Servers. IEEE Commun. Mag. 59(2): 64-69 (2021) - [j4]Donghai Tian, Qianjin Ying, Xiaoqi Jia, Rui Ma, Changzhen Hu, Wenmao Liu:
MDCHD: A novel malware detection method in cloud using hardware trace and deep learning. Comput. Networks 198: 108394 (2021) - [j3]Huanran Wang, Weizhe Zhang, Hui He, Peng Liu, Daniel Xiapu Luo, Yang Liu, Jiawei Jiang, Yan Li, Xing Zhang, Wenmao Liu, Runzi Zhang, Xing Lan:
An Evolutionary Study of IoT Malware. IEEE Internet Things J. 8(20): 15422-15440 (2021) - [c11]Jian Qu, Xiaobo Ma, Wenmao Liu:
Querent-centric Domain Name System Modeling and Its Application in Passive Software Discovery. DSA 2021: 152-160 - [c10]Didier Frank Isingizwe, Meng Wang, Wenmao Liu, Dongsheng Wang, Tiejun Wu, Jun Li:
Analyzing Learning-based Encrypted Malware Traffic Classification with AutoML. ICCT 2021: 313-322 - [c9]Fu Chen, Rui Yu, Wenmao Liu:
Internet of Things Attack Group Identification Model Combined with Spectral Clustering. ICCT 2021: 778-782 - [c8]Jiyue Tang, Le Yang, Song Liu, Wenmao Liu, Meng Wang, Chonghua Wang, Bo Jiang, Zhigang Lu:
Caps-LSTM: A Novel Hierarchical Encrypted VPN Network Traffic Identification Using CapsNet and LSTM. SciSec 2021: 139-153 - [c7]Yutian Yang, Wenbo Shen, Bonan Ruan, Wenmao Liu, Kui Ren:
Security Challenges in the Container Cloud. TPS-ISA 2021: 137-145 - 2020
- [j2]Wenmao Liu, Weili Li, Shifan Luo, Xuelian Huang, Dan Li, Zhiqiang Li, Guorui Xu:
Influence of a Novel Stator Teeth Internal Ventilation Structure on Air-Cooled Turbo-Generator Parameters and Stator Temperature. IEEE Access 8: 122422-122433 (2020) - [c6]Mingkai Tong, Guo Li, Runzi Zhang, Jianxin Xue, Wenmao Liu, Jiahai Yang:
Far from classification algorithm: dive into the preprocessing stage in DGA detection. TrustCom 2020: 468-474 - [c5]Runzi Zhang, Mingkai Tong, Lei Chen, Jianxin Xue, Wenmao Liu, Feng Xie:
CMIRGen: Automatic Signature Generation Algorithm for Malicious Network Traffic. TrustCom 2020: 736-743
2010 – 2019
- 2019
- [j1]Dou An, Qingyu Yang, Wenmao Liu, Yang Zhang:
Defending Against Data Integrity Attacks in Smart Grid: A Deep Reinforcement Learning-Based Approach. IEEE Access 7: 110835-110845 (2019) - [c4]Ziyu Wang, Jianwei Liu, Zongyang Zhang, Yanting Zhang, Jiayuan Yin, Hui Yu, Wenmao Liu:
A Combined Micro-block Chain Truncation Attack on Bitcoin-NG. ACISP 2019: 322-339 - 2018
- [c3]Wei Jiang, Yuan Tian, Weixin Liu, Wenmao Liu:
An Insider Threat Detection Method Based on User Behavior Analysis. Intelligent Information Processing 2018: 421-429 - 2014
- [c2]Yan Sun, Lihua Yin, Wenmao Liu:
Defending sybil attacks in mobile social networks. INFOCOM Workshops 2014: 163-164 - 2010
- [c1]Wenmao Liu, Lihua Yin, Weizhe Zhang, Hongli Zhang:
A General Distributed Object Locating Architecture in the Internet of Things. ICPADS 2010: 730-735
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-16 22:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint