default search action
Liu Liu 0008
Person information
- affiliation: Swinburne University of Technology, School of Software and Electrical Engineering, Hawthorn, VIC, Australia
Other persons with the same name
- Liu Liu — disambiguation page
- Liu Liu 0001 — Beijing Jiaotong University, Institute of Broadband Wireless Mobile Communications, China
- Liu Liu 0002 — Sichuan Normal University, Chengdu, China
- Liu Liu 0003 — Dalian University of Technology, School of Mathematical Sciences, China
- Liu Liu 0004 — National University of Defense Technology, College of Computer, Changsha, China
- Liu Liu 0005 — Tsinghua University, Department of Computer and Technology, Beijing, China
- Liu Liu 0006 — Fudan University, School of Computer Science, Shanghai, China
- Liu Liu 0007 — Chinese Academy of Sciences, Institute of Computing Technology, Beijing, China
- Liu Liu 0009 — Northwestern Polytechnical University, School of Automation, Xi'an, China
- Liu Liu 0010 — Tongji University, College of Surveying and Geo-Informatics, Shanghai, China (and 1 more)
- Liu Liu 0011 — Nanjing University of Posts and Telecommunications, China
- Liu Liu 0012 — University of Science and Technology of China, Department of Automation, Hefei, China (and 1 more)
- Liu Liu 0013 — China Agricultural University, College of Water Resources and Civil Engineering, Center for Agricultural Water Research in China, Beijing, China
- Liu Liu 0014 — Tencent AI Lab (and 2 more)
- Liu Liu 0015 — Rutgers University, NJ, USA
- Liu Liu 0016 — DOCOMO Beijing Communications Laboratories Co., Ltd, Beijing, China
- Liu Liu 0017 — University of California, Santa Barbara, CA, USA
- Liu Liu 0018 — Massachusetts Institute of Technology, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c3]Liu Liu, Chao Chen, Jun Zhang, Olivier Y. de Vel, Yang Xiang:
Doc2vec-based Insider Threat Detection through Behaviour Analysis of Multi-source Security Logs. TrustCom 2020: 301-309
2010 – 2019
- 2019
- [j3]Liu Liu, Chao Chen, Jun Zhang, Olivier Y. de Vel, Yang Xiang:
Insider Threat Identification Using the Simultaneous Neural Learning of Multi-Source Logs. IEEE Access 7: 183162-183176 (2019) - [c2]Liu Liu, Chao Chen, Jun Zhang, Olivier Y. de Vel, Yang Xiang:
Unsupervised Insider Detection Through Neural Feature Learning and Model Optimisation. NSS 2019: 18-36 - 2018
- [j2]Liu Liu, Olivier Y. de Vel, Qing-Long Han, Jun Zhang, Yang Xiang:
Detecting and Preventing Cyber Insider Threats: A Survey. IEEE Commun. Surv. Tutorials 20(2): 1397-1417 (2018) - [c1]Liu Liu, Olivier Y. de Vel, Chao Chen, Jun Zhang, Yang Xiang:
Anomaly-Based Insider Threat Detection Using Deep Autoencoders. ICDM Workshops 2018: 39-48 - 2012
- [j1]Biming Tian, Song Han, Liu Liu, Saghar Khadem, Sazia Parvin:
Towards enhanced key management in multi-phase ZigBee network architecture. Comput. Commun. 35(5): 579-588 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 20:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint