


default search action
Ting Liu 0002
Person information
- affiliation (PhD 2010): Xi'an Jiaotong University, School of Electronic and Information Engineering, MOEKLINNS, China
Other persons with the same name
- Ting Liu — disambiguation page
- Ting Liu 0001
— Harbin Institute of Technology, Research Center for Social Computing and Information Retrieval, China (and 1 more)
- Ting Liu 0003 — State University of New York at Albany, NY, USA
- Ting Liu 0004 — AUG Signals Ltd., Toronto, ON, Canada
- Ting Liu 0005
— Google, Inc. (and 1 more)
- Ting Liu 0006 — Carnegie Mellon University, School of Computer Science, Pittsburgh, PA, USA
- Ting Liu 0007 — Henri Poincaré University, Nancy, France
- Ting Liu 0008
— Harbin Institute of Technology, Department of Control Science and Engineering, China
- Ting Liu 0009 — Nanyang Technological University, School of Electrical and Electronic Engineering, Singapore
- Ting Liu 0010
— Chinese Academy of Sciences, Academy of Mathematics and Systems Sciences, Key Laboratory of Systems and Control, Beijing, China
- Ting Liu 0011
— Beijing University of Posts and Telecommunications, School of Electronic Engineering, Beijing, China
- Ting Liu 0012
— Beijing Jiaotong University, Institute of Information Science, Beijing, China
- Ting Liu 0013
— Nanjing University of Information Science and Technology, Nanjing, China (and 1 more)
- Ting Liu 0014
— Guangdong University of Technology, Department of Communication Engineering, Guangzhou, China
- Ting Liu 0015 — Tianjin University, Department of Management and Economics, China
- Ting Liu 0016
— Shanghai Jiao Tong University, School of Electronic Information and Electrical Engineering, School of Microelectronics, China
- Ting Liu 0017
— National University of Defense Technology, NUDT, College of Electronic Science and Technology, Changsha, China
- Ting Liu 0018
— Beijing Meitu Home Technology Co., Ltd., China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j67]Sizhe He
, Yuxun Zhou
, Yadong Zhou
, Jiang Wu
, Ting Liu
, Xiaohong Guan
:
Data-Driven Identification Model of Vulnerable Set for Cascading Failure in Power Grid. IEEE Trans Autom. Sci. Eng. 22: 3097-3112 (2025) - [j66]Yujie Yang, Yadong Zhou
, Jiang Wu
, Zhanbo Xu
, Sizhe He
, Ting Liu
, Xiaohong Guan
:
A Failure Tree Model for Cascading Failure in Power Grid With Uncertain Renewable Energy Generation. IEEE Trans Autom. Sci. Eng. 22: 4092-4108 (2025) - [j65]Hanqi Zhou
, Yaling He, Ting Liu
, Yang Liu
, Jinao Shang
, Xiangming Wang:
NEST: Network-Energy-Stress Threat Against Thermal Energy Equipment. IEEE Trans Autom. Sci. Eng. 22: 9622-9635 (2025) - [j64]Xiangming Wang, Yang Liu, Nanpeng Yu, Pengfei Liu, Nanyi Deng, Yanan Li, Ting Liu:
Physical Intrusion Attack Detection in Fieldbus Network With Passive Fail-Safe Biasing. IEEE Trans Autom. Sci. Eng. 22: 14008-14019 (2025) - [j63]Yang Liu
, Long Meng, Xiangming Wang
, Shenjian Qiu, Zhuo Lv
, Pengfei Liu, Ting Liu
:
PIL-MDRS: Physical Intrusion Localization Based on Multidevice Reflection Signals in ICS. IEEE Trans. Ind. Informatics 21(3): 2432-2441 (2025) - [j62]Jiazhou Wang, Jue Tian, Gaoxi Xiao
, Yang Liu
, Hao Huang, Yadong Zhou, Ting Liu
:
On Stealthiness and Effectiveness of Moving Target Defense in Smart Grids. IEEE Trans. Ind. Informatics 21(4): 2987-2996 (2025) - [i20]Jiali Wei, Ming Fan, Xicheng Zhang, Wenjing Jiao, Haijun Wang, Ting Liu:
Stealthy Backdoor Attack to Real-world Models in Android Apps. CoRR abs/2501.01263 (2025) - 2024
- [j61]Yin Wang, Ming Fan, Junjie Tao, Jingyi Lei, Wuxia Jin, Deqiang Han, Ting Liu:
Compliance Detection Method for Mobile Application Privacy Policy Statement. Int. J. Softw. Informatics 14(3): 277-299 (2024) - [j60]Sizhe He
, Yadong Zhou
, Yujie Yang, Ting Liu
, Yuxun Zhou
, Jie Li
, Tong Wu, Xiaohong Guan
:
Cascading Failure in Cyber-Physical Systems: A Review on Failure Modeling and Vulnerability Analysis. IEEE Trans. Cybern. 54(12): 7936-7954 (2024) - [j59]Xiangming Wang
, Yang Liu
, Kexin Jiao
, Pengfei Liu, Xiapu Luo
, Ting Liu
:
Intrusion Device Detection in Fieldbus Networks Based on Channel-State Group Fingerprint. IEEE Trans. Inf. Forensics Secur. 19: 4012-4027 (2024) - [j58]Jiali Wei
, Ming Fan
, Wenjing Jiao
, Wuxia Jin
, Ting Liu
:
BDMMT: Backdoor Sample Detection for Language Models Through Model Mutation Testing. IEEE Trans. Inf. Forensics Secur. 19: 4285-4300 (2024) - [j57]Bowen Hu
, Yadong Zhou
, Jiang Wu
, Ting Liu
:
Estimating Nodal Admittance Matrix for Ill-Posed Inverse Power Flow Problem in Power Grid. IEEE Trans. Ind. Informatics 20(4): 5924-5936 (2024) - [j56]Wentao Jin
, Yadong Zhou
, Yang Liu
, Ting Liu
:
Stealthy Data Integrity Attack Against Consensus-Based Distributed Energy Management Algorithm. IEEE Trans. Ind. Informatics 20(8): 9976-9986 (2024) - [j55]Jingwen Liu
, Wuxia Jin
, Junhui Zhou
, Qiong Feng
, Ming Fan
, Haijun Wang
, Ting Liu
:
3Erefactor: Effective, Efficient and Executable Refactoring Recommendation for Software Architectural Consistency. IEEE Trans. Software Eng. 50(10): 2633-2655 (2024) - [j54]Yin Wang
, Ming Fan
, Junfeng Liu
, Junjie Tao
, Wuxia Jin
, Haijun Wang
, Qi Xiong
, Ting Liu
:
Do as You Say: Consistency Detection of Data Practice in Program Code and Privacy Policy in Mini-App. IEEE Trans. Software Eng. 50(12): 3225-3248 (2024) - [j53]Bowen Hu
, Yadong Zhou
, Yuxun Zhou
, Jiang Wu
, Ting Liu
, Xiaohong Guan
:
Data Protection Method Against Cross-Domain Inference Threat in Cyber-Physical Power Grid. IEEE Trans. Smart Grid 15(4): 4170-4181 (2024) - [j52]Jiazhou Wang
, Jue Tian
, Nanpeng Yu
, Yang Liu
, Haichuan Zhang
, Yadong Zhou
, Ting Liu
:
A Dynamic and Static Combined State Recovery Method Against FDI Attacks in Power Grids. IEEE Trans. Smart Grid 15(6): 6018-6030 (2024) - [c93]Bowen Hu, Ziyi Yu, Yadong Zhou, Sizhe He, Yang Liu, Ting Liu, Xiaohong Guan:
A Positive-Unlabeled Learning Approach for Detecting Malicious In-app Purchases on the App Store. CASE 2024: 239-244 - [c92]Weiwei Tan, Bowen Hu, Yadong Zhou, Sizhe He, Yang Liu, Ting Liu, Xiaohong Guan:
A Virtual Primary Key Generation Scheme Based on Dimensionality Reduction and Encoding for Digital Fingerprinting. CASE 2024: 252-257 - [c91]Wuxia Jin
, Shuo Xu
, Dawei Chen
, Jiajun He
, Dinghong Zhong
, Ming Fan
, Hongxu Chen
, Huijia Zhang
, Ting Liu
:
PyAnalyzer: An Effective and Practical Approach for Dependency Extraction from Python Code. ICSE 2024: 112:1-112:12 - [c90]Ang Jia
, Ming Fan
, Xi Xu
, Wuxia Jin
, Haijun Wang
, Ting Liu
:
Cross-Inlining Binary Function Similarity Detection. ICSE 2024: 223:1-223:13 - [c89]Yi Hou, Wuxia Jin
, Zhijun Wang, Liuming Wang, Shuguang Chen, Yihan Wang
, Lei Sang, Haijun Wang, Ting Liu
:
ERD-CQC : Enhanced Rule and Dependency Code Quality Check for Java. Internetware 2024 - [c88]Yin Wang
, Ming Fan
, Xicheng Zhang
, Jifei Shi
, Zhaoyu Qiu
, Haijun Wang
, Ting Liu
:
LIReDroid: LLM-Enhanced Test Case Generation for Static Sensitive Behavior Replication. Internetware 2024 - [c87]Yin Wu, Haijun Wang, Yuanhui Zhang, Xitao Li, Hao Wu, Ming Fan, Ting Liu:
Business Compliance Detection of Smart Contracts in Electricity and Carbon Trading Scenarios. ISSRE (Workshops) 2024: 177-178 - [c86]Yin Wu
, Xiaofei Xie
, Chenyang Peng, Dijun Liu
, Hao Wu, Ming Fan, Ting Liu
, Haijun Wang:
AdvSCanner: Generating Adversarial Smart Contracts to Exploit Reentrancy Vulnerabilities Using LLM and Static Analysis. ASE 2024: 1019-1031 - [c85]Haijun Wang, Yurui Hu, Hao Wu, Dijun Liu
, Chenyang Peng, Yin Wu
, Ming Fan, Ting Liu
:
Skyeye: Detecting Imminent Attacks via Analyzing Adversarial Smart Contracts. ASE 2024: 1570-1582 - [c84]Ming Fan, Jifei Shi
, Yin Wang
, Le Yu
, Xicheng Zhang, Haijun Wang, Wuxia Jin
, Ting Liu
:
Giving without Notifying: Assessing Compliance of Data Transmission in Android Apps. ASE 2024: 1595-1606 - [c83]Yin Wang
, Ming Fan, Hao Zhou
, Haijun Wang, Wuxia Jin
, Jiajia Li, Wenbo Chen, Shijie Li, Yu Zhang
, Deqiang Han, Ting Liu:
MiniChecker: Detecting Data Privacy Risk of Abusive Permission Request Behavior in Mini-Programs. ASE 2024: 1667-1679 - [c82]Jiawei Lin
, Zhaoyun Jiang
, Jiaqi Guo
, Shizhao Sun
, Ting Liu
, Zijiang Yang
, Jian-Guang Lou
, Dongmei Zhang
:
IconDM: Text-Guided Icon Set Expansion Using Diffusion Models. ACM Multimedia 2024: 156-165 - [i19]Ang Jia, Ming Fan, Xi Xu, Wuxia Jin, Haijun Wang, Ting Liu:
Cross-Inlining Binary Function Similarity Detection. CoRR abs/2401.05739 (2024) - [i18]Yu Wang, Shiwan Zhao, Zhihu Wang, Heyuan Huang, Ming Fan, Yubo Zhang, Zhixing Wang, Haijun Wang, Ting Liu:
Strategic Chain-of-Thought: Guiding Accurate Reasoning in LLMs through Strategy Elicitation. CoRR abs/2409.03271 (2024) - 2023
- [j51]Jiazhou Wang
, Jue Tian
, Yang Liu
, Dong Yang, Ting Liu
:
MMTD: Multistage Moving Target Defense for Security-Enhanced D-FACTS Operation. IEEE Internet Things J. 10(14): 12234-12247 (2023) - [j50]Yadong Zhou, Bowen Hu
, Junjie Zhang, Liyuan Sun, Xingyu Zhu, Ting Liu:
Detecting suspicious transactions in a virtual-currency-enabled online social network. J. Netw. Comput. Appl. 211: 103555 (2023) - [j49]Kaidi Jin
, Tianwei Zhang
, Chao Shen
, Yufei Chen
, Ming Fan
, Chenhao Lin
, Ting Liu
:
Can We Mitigate Backdoor Attack Using Adversarial Detection Methods? IEEE Trans. Dependable Secur. Comput. 20(4): 2867-2881 (2023) - [j48]Pengfei Liu
, Yang Liu
, Xiangming Wang
, Yuanyi Bao, Dong Yang, Wenqing Wang, Tong Wu, Zhuo Lv, Ting Liu:
A Reflection-Based Channel Fingerprint to Locate Physically Intrusive Devices in ICS. IEEE Trans. Ind. Informatics 19(4): 5495-5505 (2023) - [j47]Sizhe He, Yuxun Zhou
, Yadong Zhou
, Jiang Wu, Min Zheng, Ting Liu:
Fast Identification of Vulnerable Set for Cascading Failure Analysis in Power Grid. IEEE Trans. Ind. Informatics 19(4): 5645-5655 (2023) - [j46]Ang Jia
, Ming Fan
, Wuxia Jin
, Xi Xu
, Zhaohui Zhou
, Qiyi Tang
, Sen Nie
, Shi Wu
, Ting Liu
:
1-to-1 or 1-to-n? Investigating the Effect of Function Inlining on Binary Similarity Analysis. ACM Trans. Softw. Eng. Methodol. 32(4): 87:1-87:26 (2023) - [j45]Jianlei Chi
, Yu Qu
, Ting Liu
, Qinghua Zheng, Heng Yin:
SeqTrans: Automatic Vulnerability Fix Via Sequence to Sequence Learning. IEEE Trans. Software Eng. 49(2): 564-585 (2023) - [j44]Wuxia Jin
, Dinghong Zhong, Yuanfang Cai
, Rick Kazman
, Ting Liu
:
Evaluating the Impact of Possible Dependencies on Architecture-Level Maintainability. IEEE Trans. Software Eng. 49(3): 1064-1085 (2023) - [j43]Xi Xu
, Qinghua Zheng, Zheng Yan
, Ming Fan
, Ang Jia
, Zhaohui Zhou
, Haijun Wang
, Ting Liu
:
PatchDiscovery: Patch Presence Test for Identifying Binary Vulnerabilities Based on Key Basic Blocks. IEEE Trans. Software Eng. 49(12): 5279-5294 (2023) - [j42]Zhiyuan Yang
, Shipeng Zhang
, Chee-Wooi Ten
, Ting Liu
, Xueyue Pang, Hao Sun:
Implementation of Risk-Aggregated Substation Testbed Using Generative Adversarial Networks. IEEE Trans. Smart Grid 14(1): 677-689 (2023) - [j41]Wenyuan Kong
, Zhaoyun Jiang
, Shizhao Sun
, Zhuoning Guo
, Weiwei Cui, Ting Liu
, Jianguang Lou, Dongmei Zhang:
Aesthetics++: Refining Graphic Designs by Exploring Design Principles and Human Preference. IEEE Trans. Vis. Comput. Graph. 29(6): 3093-3104 (2023) - [c81]Jiawei Lin, Jiaqi Guo, Shizhao Sun, Weijiang Xu, Ting Liu, Jian-Guang Lou, Dongmei Zhang:
A Parse-Then-Place Approach for Generating Graphic Layouts from Textual Descriptions. ICCV 2023: 23565-23574 - [c80]Wuxia Jin, Yitong Dai, Jianguo Zheng, Yu Qu
, Ming Fan, Zhenyu Huang, Dezhi Huang, Ting Liu:
Dependency Facade: The Coupling and Conflicts between Android Framework and Its Customization. ICSE 2023: 1674-1686 - [c79]Junjie Tao
, Jifei Shi
, Ming Fan
, Yin Wang
, Junfeng Liu
, Ting Liu
:
JSLibD: Reliable and Heuristic Detection of Third-party Libraries in Miniapps. SaTS@CCS 2023: 11-16 - [c78]Ziqiang Yan
, Ming Fan
, Yin Wang
, Jifei Shi
, Haoran Wang
, Ting Liu
:
MUID: Detecting Sensitive User Inputs in Miniapp Ecosystems. SaTS@CCS 2023: 17-21 - [c77]Wuxia Jin, Yuyun Zhang, Jiaowei Shang, Yi Hou, Ming Fan, Ting Liu:
Identifying Code Changes for Architecture Decay via a Metric Forest Structure. TechDebt@ICSE 2023: 62-71 - [i17]Jiali Wei, Ming Fan, Wenjing Jiao, Wuxia Jin, Ting Liu:
BDMMT: Backdoor Sample Detection for Language Models through Model Mutation Testing. CoRR abs/2301.10412 (2023) - [i16]Yin Wang, Ming Fan, Junfeng Liu, Junjie Tao, Wuxia Jin, Qi Xiong, Yuhao Liu, Qinghua Zheng, Ting Liu:
Do as You Say: Consistency Detection of Data Practice in Program Code and Privacy Policy in Mini-App. CoRR abs/2302.13860 (2023) - [i15]Jiawei Lin, Jiaqi Guo, Shizhao Sun, Weijiang Xu, Ting Liu, Jian-Guang Lou, Dongmei Zhang:
A Parse-Then-Place Approach for Generating Graphic Layouts from Textual Descriptions. CoRR abs/2308.12700 (2023) - [i14]You Zhou, Xiujing Lin, Xiang Zhang, Maolin Wang, Gangwei Jiang, Huakang Lu, Yupeng Wu, Kai Zhang, Zhe Yang, Kehang Wang, Yongduo Sui, Fengwei Jia, Zuoli Tang, Yao Zhao, Hongxuan Zhang, Tiannuo Yang
, Weibo Chen, Yunong Mao, Yi Li, De Bao, Yu Li, Hongrui Liao, Ting Liu, Jingwen Liu, Jinchi Guo, Xiangyu Zhao, Ying Wei, Hong Qian, Qi Liu, Xiang Wang, Wai Kin Chan, Chenliang Li, Yusen Li, Shiyu Yang, Jining Yan, Chao Mou, Shuai Han, Wuxia Jin, Guannan Zhang, Xiaodong Zeng:
On the Opportunities of Green Computing: A Survey. CoRR abs/2311.00447 (2023) - 2022
- [j40]Di Cui, Lingling Fan, Sen Chen, Yuanfang Cai, Qinghua Zheng, Yang Liu
, Ting Liu:
Towards characterizing bug fixes through dependency-level changes in Apache Java open source projects. Sci. China Inf. Sci. 65(7): 1-19 (2022) - [j39]Pengfei Liu
, Yang Liu
, Xiangming Wang
, Chao Fang
, Xiaohong Guan, Ting Liu
:
Channel-State-Based Fingerprinting Against Physical Access Attack in Industrial Field Bus Network. IEEE Internet Things J. 9(12): 9557-9573 (2022) - [j38]Shuyue Li
, Jiaqi Guo, Yan Gao, Jian-Guang Lou, Dejian Yang, Yan Xiao, Yadong Zhou, Ting Liu
:
How to manage a task-oriented virtual assistant software project: an experience report. Frontiers Inf. Technol. Electron. Eng. 23(5): 749-762 (2022) - [j37]Yujie Yang, Yadong Zhou, Jiang Wu, Zhanbo Xu
, Sizhe He, Xiaohong Guan
, Ting Liu
:
An Event-Triggered Hybrid System Model for Cascading Failure in Power Grid. IEEE Trans Autom. Sci. Eng. 19(3): 1312-1325 (2022) - [j36]Wei Wang
, Chao Fang
, Ting Liu:
Multiperiod Unmanned Aerial Vehicles Path Planning With Dynamic Emergency Priorities for Geohazards Monitoring. IEEE Trans. Ind. Informatics 18(12): 8851-8859 (2022) - [j35]Yang Liu
, Zisen Xu, Ming Fan
, Yu Hao
, Kai Chen, Hao Chen, Yan Cai, Zijiang Yang, Ting Liu
:
ConcSpectre: Be Aware of Forthcoming Malware Hidden in Concurrent Programs. IEEE Trans. Reliab. 71(2): 1174-1188 (2022) - [c76]Yujie Yang, Yadong Zhou, Jiang Wu, Ting Liu, Zhanbo Xu, Xiaohong Guan:
A Dynamic Cascading Failure Model in Power Grid with Renewable Energy Generation. CASE 2022: 1041-1046 - [c75]Shuyue Li, Jiaqi Guo, Jian-Guang Lou, Ming Fan, Ting Liu, Dongmei Zhang:
Testing Machine Learning Systems in Industry: An Empirical Study. ICSE (SEIP) 2022: 263-272 - [c74]Ming Fan, Wenying Wei, Wuxia Jin, Zijiang Yang, Ting Liu:
Explanation-Guided Fairness Testing through Genetic Algorithm. ICSE 2022: 871-882 - [c73]Ming Fan, Jiali Wei, Wuxia Jin, Zhou Xu, Wenying Wei, Ting Liu:
One step further: evaluating interpreters using metamorphic testing. ISSTA 2022: 327-339 - [i13]Qi Shi, Qian Liu, Bei Chen, Yu Zhang, Ting Liu, Jian-Guang Lou:
LEMON: Language-Based Environment Manipulation via Execution-Guided Pre-training. CoRR abs/2201.08081 (2022) - [i12]Ming Fan, Wenying Wei, Wuxia Jin, Zijiang Yang, Ting Liu:
Explanation-Guided Fairness Testing through Genetic Algorithm. CoRR abs/2205.08335 (2022) - [i11]Jiazhou Wang, Jue Tian, Yang Liu, Xiaohong Guan, Dong Yang, Ting Liu:
Multi-stage Moving Target Defense: A Security-enhanced D-FACTS Implementation Approach. CoRR abs/2206.01051 (2022) - [i10]Ang Jia, Ming Fan, Xi Xu, Wuxia Jin, Haijun Wang, Qiyi Tang, Sen Nie, Shi Wu, Ting Liu:
Comparing One with Many - Solving Binary2source Function Matching Under Function Inlining. CoRR abs/2210.15159 (2022) - 2021
- [j34]Hengshan Zhang
, Yimin Zhou
, Qinghua Zheng, Zhongmin Wang
, Yanping Chen
, Chunru Chen, Ting Liu
:
A Novel Large Group Decision-Making Method via Normalized Alternative Prediction Selection. IEEE Trans. Fuzzy Syst. 29(7): 1992-2005 (2021) - [j33]Ming Fan
, Wenying Wei, Xiaofei Xie
, Yang Liu
, Xiaohong Guan, Ting Liu
:
Can We Trust Your Explanations? Sanity Checks for Interpreters in Android Malware Analysis. IEEE Trans. Inf. Forensics Secur. 16: 838-853 (2021) - [j32]Ming Fan
, Ziliang Si
, Xiaofei Xie
, Yang Liu
, Ting Liu
:
Text Backdoor Detection Using an Interpretable RNN Abstract Model. IEEE Trans. Inf. Forensics Secur. 16: 4117-4132 (2021) - [j31]Yu Qu
, Qinghua Zheng, Jianlei Chi, Yangxu Jin, Ancheng He, Di Cui, Hengshan Zhang, Ting Liu
:
Using K-core Decomposition on Class Dependency Networks to Improve Bug Prediction Model's Practical Performance. IEEE Trans. Software Eng. 47(2): 348-366 (2021) - [j30]Wuxia Jin, Ting Liu
, Yuanfang Cai
, Rick Kazman
, Ran Mo, Qinghua Zheng:
Service Candidate Identification from Monolithic Systems Based on Execution Traces. IEEE Trans. Software Eng. 47(5): 987-1007 (2021) - [j29]Haijun Wang, Yun Lin
, Zijiang Yang, Jun Sun, Yang Liu
, Jin Song Dong, Qinghua Zheng, Ting Liu
:
Explaining Regressions via Alignment Slicing and Mending. IEEE Trans. Software Eng. 47(11): 2421-2437 (2021) - [c72]Jiaqi Guo, Ziliang Si, Yu Wang, Qian Liu, Ming Fan, Jian-Guang Lou, Zijiang Yang, Ting Liu:
Chase: A Large-Scale and Pragmatic Chinese Dataset for Cross-Database Context-Dependent Text-to-SQL. ACL/IJCNLP (1) 2021: 2316-2331 - [c71]Yadong Zhou, Bowen Hu
, Jiang Wu, Zhanbo Xu, Xiaohong Guan, Wei Chen, Ting Liu:
An Estimation Method of Transmission Line Parameters Based on Measurements of Injection Power and Voltage Phasor in Power Grid. CASE 2021: 202-207 - [c70]Tianyi Yue, Yadong Zhou, Bowen Hu, Zhanbo Xu, Xiaohong Guan, Hao Zhou, Ting Liu:
An Unsupervised-Learning Based Method for Detecting Groups of Malicious Web Crawlers in Internet. CASE 2021: 367-372 - [c69]Sizhe He, Yadong Zhou, Jiang Wu, Zhanbo Xu, Xiaohong Guan, Wei Chen, Ting Liu:
Identifying Vulnerable Set of Cascading Failure in Power Grid Using Deep Learning Framework. CASE 2021: 885-890 - [c68]Jiaqi Guo, Jian-Guang Lou, Ting Liu, Dongmei Zhang:
Weakly Supervised Semantic Parsing by Learning from Mistakes. EMNLP (Findings) 2021: 2603-2617 - [c67]Xi Xu, Qinghua Zheng, Zheng Yan, Ming Fan, Ang Jia, Ting Liu:
Interpretation-enabled Software Reuse Detection Based on a Multi-Level Birthmark Model. ICSE 2021: 873-884 - [c66]Wuxia Jin, Dinghong Zhong, Zifan Ding, Ming Fan, Ting Liu:
Where to Start: Studying Type Annotation Practices in Python. ASE 2021: 529-541 - [i9]Ang Jia, Ming Fan, Xi Xu, Di Cui, Wenying Wei, Zijiang Yang, Kai Ye, Ting Liu:
From Innovations to Prospects: What Is Hidden Behind Cryptocurrencies? CoRR abs/2103.08924 (2021) - [i8]Xi Xu, Qinghua Zheng, Zheng Yan, Ming Fan, Ang Jia, Ting Liu:
Interpretation-enabled Software Reuse Detection Based on a Multi-Level Birthmark Model. CoRR abs/2103.10126 (2021) - [i7]Ang Jia, Ming Fan, Wuxia Jin, Xi Xu, Ting Liu:
One-to-One or One-to-many? What function inlining brings to binary2source similarity analysis. CoRR abs/2112.12928 (2021) - 2020
- [j28]Jianlei Chi, Yu Qu
, Qinghua Zheng, Zijiang Yang, Wuxia Jin, Di Cui, Ting Liu:
Relation-based test case prioritization for regression testing. J. Syst. Softw. 163: 110539 (2020) - [j27]Yang Liu
, Ting Liu
, Hong Sun, Kehuan Zhang, Pengfei Liu:
Hidden Electricity Theft by Exploiting Multiple-Pricing Scheme in Smart Grids. IEEE Trans. Inf. Forensics Secur. 15: 2453-2468 (2020) - [j26]Ming Fan
, Xiapu Luo
, Jun Liu, Chunyin Nong
, Qinghua Zheng, Ting Liu
:
CTDroid: Leveraging a Corpus of Technical Blogs for Android Malware Analysis. IEEE Trans. Reliab. 69(1): 124-138 (2020) - [j25]Xiaodong Zhang
, Zijiang Yang, Qinghua Zheng, Yu Hao
, Pei Liu, Ting Liu
:
Tell You a Definite Answer: Whether Your Data is Tainted During Thread Scheduling. IEEE Trans. Software Eng. 46(9): 916-931 (2020) - [j24]Jue Tian
, Rui Tan
, Xiaohong Guan, Zhanbo Xu, Ting Liu:
Moving Target Defense Approach to Detecting Stuxnet-Like Attacks. IEEE Trans. Smart Grid 11(1): 291-300 (2020) - [c65]Yujie Yang, Yadong Zhou, Jiang Wu, Zhanbo Xu, Xiaohong Guan, Wei Chen, Ting Liu:
A Dynamic Cascading Failure Model Integrating Relay Protection in Power Grid. CASE 2020: 1331-1336 - [c64]Jiaqi Guo, Qian Liu, Jian-Guang Lou, Zhenwen Li, Xueqing Liu, Tao Xie, Ting Liu:
Benchmarking Meaning Representations in Neural Semantic Parsing. EMNLP (1) 2020: 1520-1540 - [c63]Pengfei Liu, Chen Wei, Yunan Cai, Ting Liu:
Physical Intrusion Detection against Device-connected Attack in Industrial Control Systems. ICC 2020: 1-6 - [c62]Shuyue Li, Jiaqi Guo
, Ming Fan, Jian-Guang Lou, Qinghua Zheng, Ting Liu:
Automated bug reproduction from user reviews for Android applications. ICSE (SEIP) 2020: 51-60 - [c61]Cheng Wen
, Haijun Wang, Yuekang Li
, Shengchao Qin
, Yang Liu
, Zhiwu Xu, Hongxu Chen, Xiaofei Xie
, Geguang Pu, Ting Liu:
MemLock: memory usage guided fuzzing. ICSE 2020: 765-777 - [c60]Di Cui, Jiaqi Guo
, Ting Liu, Qinghua Zheng:
An Empirical Study of Architectural Changes in Code Commits. Internetware 2020: 11-20 - [c59]Ming Fan, Le Yu, Sen Chen, Hao Zhou, Xiapu Luo, Shuyue Li, Yang Liu
, Jun Liu, Ting Liu:
An Empirical Evaluation of GDPR Compliance Violations in Android mHealth Apps. ISSRE 2020: 253-264 - [c58]Yifei Xu, Zhengzi Xu, Bihuan Chen, Fu Song, Yang Liu
, Ting Liu:
Patch based vulnerability matching for binary programs. ISSTA 2020: 376-387 - [c57]Yun Lin, Jun Sun, Gordon Fraser, Ziheng Xiu, Ting Liu, Jin Song Dong:
Recovering fitness gradients for interprocedural Boolean flags in search-based testing. ISSTA 2020: 440-451 - [c56]Wuxia Jin, Yuanfang Cai, Rick Kazman, Gang Zhang, Qinghua Zheng, Ting Liu:
Exploring the Architectural Impact of Possible Dependencies in Python Software. ASE 2020: 758-770 - [c55]Ang Jia, Ming Fan, Xi Xu, Di Cui, Wenying Wei, Zijiang Yang, Kai Ye
, Ting Liu:
From Innovations to Prospects: What Is Hidden Behind Cryptocurrencies? MSR 2020: 288-299 - [c54]Xi Xu, Ming Fan, Ang Jia, Yin Wang, Zheng Yan
, Qinghua Zheng, Ting Liu:
Revisiting the Challenges and Opportunities in Software Plagiarism Detection. SANER 2020: 537-541 - [i6]Kaidi Jin, Tianwei Zhang, Chao Shen, Yufei Chen, Ming Fan, Chenhao Lin, Ting Liu:
A Unified Framework for Analyzing and Detecting Malicious Examples of DNN Models. CoRR abs/2006.14871 (2020) - [i5]Ming Fan, Le Yu, Sen Chen, Hao Zhou, Xiapu Luo, Shuyue Li, Yang Liu, Jun Liu, Ting Liu:
An Empirical Evaluation of GDPR Compliance Violations in Android mHealth Apps. CoRR abs/2008.05864 (2020) - [i4]Ming Fan, Wenying Wei, Xiaofei Xie, Yang Liu, Xiaohong Guan, Ting Liu:
Can We Trust Your Explanations? Sanity Checks for Interpreters in Android Malware Analysis. CoRR abs/2008.05895 (2020) - [i3]Jianlei Chi, Yu Qu, Ting Liu, Qinghua Zheng, Heng Yin:
SeqTrans: Automatic Vulnerability Fix via Sequence to Sequence Learning. CoRR abs/2010.10805 (2020)
2010 – 2019
- 2019
- [j23]Jue Tian
, Rui Tan
, Xiaohong Guan, Ting Liu:
Enhanced Hidden Moving Target Defense in Smart Grids. IEEE Trans. Smart Grid 10(2): 2208-2223 (2019) - [c53]Jiaqi Guo, Zecheng Zhan, Yan Gao, Yan Xiao, Jian-Guang Lou, Ting Liu, Dongmei Zhang:
Towards Complex Text-to-SQL in Cross-Domain Database with Intermediate Representation. ACL (1) 2019: 4524-4535 - [c52]Yadong Zhou, Xukun Wang, Zhanbo Xu, Ying Su, Ting Liu, Chao Shen, Xiaohong Guan:
A Model-Driven Learning Approach for Predicting the Personalized Dynamic Thermal Comfort in Ordinary Office Environment. CASE 2019: 739-744 - [c51]Hengshan Zhang, Qinghua Zheng, Zhongmin Wang, Yanping Chen, Ting Liu, Tianhua Chen
:
Method Selecting Correct One Among Alternatives Utilizing Intuitionistic Fuzzy Preference Relation Without Consensus Reaching Process. FUZZ-IEEE 2019: 1-6 - [c50]Wuxia Jin, Yuanfang Cai, Rick Kazman, Qinghua Zheng, Di Cui, Ting Liu:
ENRE: a tool framework for extensible eNtity relation extraction. ICSE (Companion Volume) 2019: 67-70 - [c49]Chunyin Nong, Qiao Zhang, Liguo Huang
, Di Cui, Qinghua Zheng, Ting Liu:
FVT: a fragmented video tutor for "dubbing" software development tutorials. ICSE (SEET) 2019: 95-99 - [c48]Di Cui, Ting Liu, Yuanfang Cai, Qinghua Zheng, Qiong Feng, Wuxia Jin, Jiaqi Guo
, Yu Qu
:
Investigating the impact of multiple dependency structures on software defects. ICSE 2019: 584-595 - [c47]Ming Fan, Xiapu Luo, Jun Liu, Meng Wang, Chunyin Nong, Qinghua Zheng, Ting Liu:
Graph embedding based familial analysis of Android malware using unsupervised learning. ICSE 2019: 771-782 - [c46]Jiaqi Guo
, Shuyue Li, Jian-Guang Lou, Zijiang Yang, Ting Liu:
Sara: self-replay augmented record and replay for Android in industrial cases. ISSTA 2019: 90-100 - [c45]Qiong Feng, Yuanfang Cai, Rick Kazman, Di Cui, Ting Liu, Hongzhou Fang:
Active Hotspot: An Issue-Oriented Model to Monitor Software Evolution and Degradation. ASE 2019: 986-997 - [c44]Haijun Wang, Xiaofei Xie
, Shang-Wei Lin
, Yun Lin, Yuekang Li
, Shengchao Qin, Yang Liu
, Ting Liu:
Locating vulnerabilities in binaries via memory layout recovering. ESEC/SIGSOFT FSE 2019: 718-728 - [i2]Jiaqi Guo, Zecheng Zhan, Yan Gao, Yan Xiao, Jian-Guang Lou, Ting Liu, Dongmei Zhang:
Towards Complex Text-to-SQL in Cross-Domain Database with Intermediate Representation. CoRR abs/1905.08205 (2019) - [i1]Ting Liu, Yao Sun:
Preimage Attacks on Round-reduced Keccak-224/256 via an Allocating Approach. IACR Cryptol. ePrint Arch. 2019: 248 (2019) - 2018
- [j22]Xiaodong Zhang
, Zijiang Yang, Qinghua Zheng, Yu Hao
, Pei Liu, Lechen Yu, Ting Liu
:
Debugging Multithreaded Programs as if They Were Sequential. IEEE Access 6: 40024-40040 (2018) - [j21]Zijiang Yang, Ting Liu, Daniel Xiapu Luo, Chao Wang:
Guest editorial: special issue on concurrent software quality. Softw. Qual. J. 26(3): 851-853 (2018) - [j20]Wuxia Jin, Ting Liu, Yu Qu
, Qinghua Zheng, Di Cui, Jianlei Chi:
Dynamic structure measurement for distributed software. Softw. Qual. J. 26(3): 1119-1145 (2018) - [j19]Ming Fan
, Jun Liu, Xiapu Luo
, Kai Chen, Zhenzhou Tian, Qinghua Zheng, Ting Liu
:
Android Malware Familial Classification and Representative Sample Selection via Frequent Subgraph Analysis. IEEE Trans. Inf. Forensics Secur. 13(8): 1890-1905 (2018) - [j18]Zhenzhou Tian
, Ting Liu, Qinghua Zheng, Eryue Zhuang, Ming Fan, Zijiang Yang:
Reviving Sequential Program Birthmarking for Multithreaded Software Plagiarism Detection. IEEE Trans. Software Eng. 44(5): 491-511 (2018) - [c43]Zexuan Zhong, Jiaqi Guo, Wei Yang, Tao Xie, Jian-Guang Lou, Ting Liu, Dongmei Zhang:
Generating Regular Expressions from Natural Language Specifications: Are We There Yet? AAAI Workshops 2018: 791-794 - [c42]Jingyao Fan, Youssef Khazbak, Jue Tian, Ting Liu, Guohong Cao:
Mitigating Stealthy False Data Injection Attacks Against State Estimation in Smart Grid. CNS 2018: 1-9 - [c41]Pengfei Liu, Ting Liu:
Physical Intrusion Detection for Industrial Control System. CNS 2018: 1-2 - [c40]Yifei Xu, Ting Liu, Pengfei Liu, Hong Sun:
A Search-based Firmware Code Analysis Method for IoT Devices. CNS 2018: 1-2 - [c39]Jianlei Chi, Yu Qu
, Qinghua Zheng, Zijiang Yang, Wuxia Jin, Di Cui, Ting Liu:
Test Case Prioritization Based on Method Call Sequences. COMPSAC (1) 2018: 251-256 - [c38]Yangxu Jin, Ting Liu, Ancheng He, Yu Qu
, Jianlei Chi:
Android Malware Detector Exploiting Convolutional Neural Network and Adaptive Classifier Selection. COMPSAC (1) 2018: 833-834 - [c37]Zexuan Zhong, Jiaqi Guo, Wei Yang, Jian Peng, Tao Xie, Jian-Guang Lou, Ting Liu, Dongmei Zhang:
SemRegex: A Semantics-Based Approach for Generating Regular Expressions from Natural Language Specifications. EMNLP 2018: 1608-1618 - [c36]Hengshan Zhang, Qinghua Zheng, Zhongmin Wang, Yanping Chen, Yu Qu
, Ting Liu:
Crowd Intelligence for Decision Making Based on Positive and Negative Comparing With Linguistic Scale. FUZZ-IEEE 2018: 1-8 - [c35]Wuxia Jin, Ting Liu, Qinghua Zheng, Di Cui, Yuanfang Cai:
Functionality-Oriented Microservice Extraction Based on Execution Trace Clustering. ICWS 2018: 211-218 - [c34]Yu Qu
, Ting Liu, Jianlei Chi, Yangxu Jin, Di Cui, Ancheng He, Qinghua Zheng:
node2defect: using network embedding to improve software defect prediction. ASE 2018: 844-849 - 2017
- [j17]Yadong Zhou
, Dae Wook Kim, Junjie Zhang, Lili Liu, Huan Jin, Hongbo Jin, Ting Liu:
ProGuard: Detecting Malicious Accounts in Social-Network-Based Online Promotions. IEEE Access 5: 1990-1999 (2017) - [j16]Ting Liu
, Jue Tian, Yuhong Gui, Yang Liu, Pengfei Liu:
SEDEA: State Estimation-Based Dynamic Encryption and Authentication in Smart Grid. IEEE Access 5: 15682-15693 (2017) - [j15]Siyun Chen, Ting Liu, Feng Gao, Jianting Ji, Zhanbo Xu, Buyue Qian, Hongyu Wu, Xiaohong Guan:
Butler, Not Servant: A Human-Centric Smart Home Energy Management System. IEEE Commun. Mag. 55(2): 27-33 (2017) - [j14]Yadong Zhou, Beibei Zhang, Xiaoxiao Sun, Qinghua Zheng, Ting Liu:
Analyzing and modeling dynamics of information diffusion in microblogging social network. J. Netw. Comput. Appl. 86: 92-102 (2017) - [j13]Ming Fan
, Jun Liu, Wei Wang, Haifei Li, Zhenzhou Tian, Ting Liu
:
DAPASA: Detecting Android Piggybacked Apps Through Sensitive Subgraph Analysis. IEEE Trans. Inf. Forensics Secur. 12(8): 1772-1785 (2017) - [j12]Haijun Wang, Ting Liu
, Xiaohong Guan, Chao Shen
, Qinghua Zheng, Zijiang Yang:
Dependence Guided Symbolic Execution. IEEE Trans. Software Eng. 43(3): 252-271 (2017) - [c33]Siyun Chen, Feng Gao, Ting Liu:
Load identification based on Factorial Hidden Markov Model and online performance analysis. CASE 2017: 1249-1253 - [c32]Jue Tian, Rui Tan, Xiaohong Guan, Ting Liu:
Hidden Moving Target Defense in Smart Grids. SPSR-SG@CPSWeek 2017: 21-26 - [c31]Xiaodong Zhang, Zijiang Yang, Qinghua Zheng, Pei Liu, Jialiang Chang, Yu Hao
, Ting Liu:
Automated Testing of Definition-Use Data Flow for Multithreaded Programs. ICST 2017: 172-183 - 2016
- [j11]Zhenzhou Tian
, Ting Liu, Qinghua Zheng, Ming Fan, Eryue Zhuang, Zijiang Yang:
Exploiting thread-related system calls for plagiarism detection of multithreaded programs. J. Syst. Softw. 119: 136-148 (2016) - [j10]Hengshan Zhang, Qinghua Zheng, Ting Liu, Zijiang Yang, Minnan Luo, Yu Qu
:
Improving Linguistic Pairwise Comparison Consistency via Linguistic Discrete Regions. IEEE Trans. Fuzzy Syst. 24(3): 600-614 (2016) - [c30]Jianting Ji, Ting Liu, Chao Shen
, Hongyu Wu
, Wenyi Liu, Man Su, Siyun Chen, Zhanpei Jia:
A human-centered smart home system with wearable-sensor behavior analysis. CASE 2016: 1112-1117 - [c29]Hengshan Zhang, Qinghua Zheng, Ting Liu, Yu Qu
:
Mixed Intuitionistic Fuzzy Aggregation Operators decreasing results of unusual IFNs. FUZZ-IEEE 2016: 896-903 - [c28]Zhenzhou Tian, Ting Liu, Qinghua Zheng, Feifei Tong, Ming Fan, Zijiang Yang:
A new thread-aware birthmark for plagiarism detection of multithreaded programs. ICSE (Companion Volume) 2016: 734-736 - [c27]Ming Fan, Jun Liu, Xiapu Luo
, Kai Chen, Tianyi Chen
, Zhenzhou Tian, Xiaodong Zhang, Qinghua Zheng, Ting Liu:
Frequent Subgraph Based Familial Classification of Android Malware. ISSRE 2016: 24-35 - [c26]Wuxia Jin, Ting Liu, Yu Qu
, Jianlei Chi, Di Cui, Qinghua Zheng:
Dynamic cohesion measurement for distributed system. SCTDCP@ASE 2016: 20-26 - [c25]Xiaodong Zhang, Zijiang Yang, Qinghua Zheng, Yu Hao, Pei Liu, Lechen Yu
, Ming Fan, Ting Liu:
Debugging Multithreaded Programs as if They Were Sequential. SATE 2016: 78-83 - [e1]Zijiang Yang, Ting Liu, Daniel Xiapu Luo:
Proceedings of the 1st International Workshop on Specification, Comprehension, Testing, and Debugging of Concurrent Programs, SCTDCP@ASE 2016, Singapore, Singapore, September 3, 2016. ACM 2016, ISBN 978-1-4503-4510-1 [contents] - 2015
- [j9]Ting Liu, Yanan Sun, Yang Liu, Yuhong Gui, Yucheng Zhao, Dai Wang, Chao Shen
:
Abnormal traffic-indexed state estimation: A cyber-physical fusion approach for Smart Grid attack detection. Future Gener. Comput. Syst. 49: 94-103 (2015) - [j8]Yu Qu
, Xiaohong Guan, Qinghua Zheng, Ting Liu, Lidan Wang, Yuqiao Hou, Zijiang Yang:
Exploring community structure of software Call Graph and its applications in class cohesion measurement. J. Syst. Softw. 108: 193-210 (2015) - [j7]Yu Qu
, Xiaohong Guan, Qinghua Zheng, Ting Liu, Jianliang Zhou, Jian Li:
Calling Network: A New Method for Modeling Software Runtime Behaviors. ACM SIGSOFT Softw. Eng. Notes 40(1): 1-8 (2015) - [j6]Zhenzhou Tian, Qinghua Zheng, Ting Liu, Ming Fan, Eryue Zhuang, Zijiang Yang:
Software Plagiarism Detection with Birthmarks Based on Dynamic Key Instruction Sequences. IEEE Trans. Software Eng. 41(12): 1217-1235 (2015) - [c24]Hengshan Zhang, Qinghua Zheng, Ting Liu, Xiaojun Cui:
A grade assignment and IFS translation approach based on intensive region searching. FUZZ-IEEE 2015: 1-8 - [c23]Man Su, Jianting Ji, Yulin Che, Ting Liu, Siyun Chen, Zhanbo Xu:
An appliance classification method for residential appliance scheduling. UbiComp/ISWC Adjunct 2015: 1567-1570 - [c22]Siyun Chen, Ting Liu, Yadong Zhou, Chao Shen
, Feng Gao, Yulin Che, Zhanbo Xu:
SHE: Smart home energy management system based on social and motion behavior cognition. SmartGridComm 2015: 859-864 - 2014
- [j5]Ting Liu, Yang Liu, Yashan Mao, Yao Sun, Xiaohong Guan, Weibo Gong, Sheng Xiao:
A Dynamic Secret-Based Encryption Scheme for Smart Grid Wireless Communication. IEEE Trans. Smart Grid 5(3): 1175-1182 (2014) - [c21]Siyun Chen, Feng Gao, Xiaohong Guan, Ting Liu, Yulin Che, Yuqi Liu:
A residential load scheduling approach based on load behavior analysis. CASE 2014: 954-959 - [c20]Yan Nan, Hengshan Zhang, Qinghua Zheng, Di Wang, Ting Liu, Boqin Feng:
IFSDA: An intuitionistic fuzzy set-based data aggregation approach for software maintainability evaluation. FSKD 2014: 237-242 - [c19]Hengshan Zhang, Qinghua Zheng, Ting Liu, Yan Nan:
A new approach to improve the consistency of linguistic pair-wise comparison matrix and derive interval weight vector. FUZZ-IEEE 2014: 1190-1196 - [c18]Ting Liu, Siyun Chen, Yuqi Liu, Zhanbo Xu, Yulin Che, Yufei Duan:
SHE: smart home energy management system for appliance identification and personalized scheduling. UbiComp Adjunct 2014: 247-250 - [c17]Ting Liu, Yulin Che, Yuqi Liu, Zhanbo Xu, Yufei Duan, Siyun Chen:
A user demand and preference profiling method for residential energy management. UbiComp Adjunct 2014: 911-918 - [c16]Haijun Wang, Xiaohong Guan, Qinghua Zheng, Ting Liu, Chao Shen
, Zijiang Yang:
Directed test suite augmentation via exploiting program dependency. CSTVA 2014: 1-6 - [c15]Yu Qu
, Qinghua Zheng, Ting Liu, Jian Li, Xiaohong Guan:
In-depth measurement and analysis on densification power law of software execution. WETSoM 2014: 55-58 - [c14]Zhenzhou Tian
, Qinghua Zheng, Ting Liu, Ming Fan, Xiaodong Zhang, Zijiang Yang:
Plagiarism detection for multithreaded software based on thread-aware software birthmarks. ICPC 2014: 304-313 - [c13]Ting Liu, Yuhong Gui, Yanan Sun, Yang Liu, Yao Sun, Feng Xiao:
SEDE: state estimation-based dynamic encryption scheme for smart grid communication. SAC 2014: 539-544 - [c12]Haijun Wang, Xiaohong Guan, Qinghua Zheng, Ting Liu, Xiangyang Li, Lechen Yu, Zijiang Yang:
Reducing Test Cases with Causality Partitions. SEKE 2014: 223-228 - [c11]Zhenzhou Tian, Qinghua Zheng, Ming Fan, Eryue Zhuang, Haijun Wang, Ting Liu:
DBPD: A Dynamic Birthmark-based Software Plagiarism Detection Tool. SEKE 2014: 740-741 - 2013
- [c10]Hengshan Zhang, Qinghua Zheng, Ting Liu, Zijiang Yang, Jiahe Liu:
A discrete region-based approach to improve the consistency of pair-wise comparison matrix. FUZZ-IEEE 2013: 1-7 - [c9]Zhenzhou Tian
, Qinghua Zheng, Ting Liu, Ming Fan:
DKISB: Dynamic Key Instruction Sequence Birthmark for Software Plagiarism Detection. HPCC/EUC 2013: 619-627 - [c8]Yun Gu, Ting Liu, Dai Wang, Xiaohong Guan, Zhanbo Xu:
Bad data detection method for smart grids based on distributed state estimation. ICC 2013: 4483-4487 - [c7]Ting Liu, Yun Gu, Dai Wang, Yuhong Gui, Xiaohong Guan:
A novel method to detect bad data injection attack in smart grid. INFOCOM Workshops 2013: 49-54 - [c6]Ting Liu, Yun Gu, Dai Wang, Yuhong Gui, Xiaohong Guan:
A novel method to detect bad data injection attack in smart grid. INFOCOM 2013: 3423-3428 - [c5]Yang Liu, Jiahe Liu, Ting Liu, Xiaohong Guan, Yanan Sun:
Security risks evaluation toolbox for smart grid devices. SIGCOMM 2013: 479-480 - 2012
- [j4]Qinghua Zheng, Zhijiang Ou, Ting Liu, Zijiang Yang, Yuqiao Hou, Chao Zheng:
Software structure evaluation based on the interaction and encapsulation of methods. Sci. China Inf. Sci. 55(12): 2816-2825 (2012) - [j3]Ting Liu, Xiaohong Guan, Yu Qu
, Yanan Sun:
A layered classification for malicious function identification and malware detection. Concurr. Comput. Pract. Exp. 24(11): 1169-1179 (2012) - [j2]Ting Liu, Zhiwen Wang, Haijun Wang, Ke Lu:
An Entropy-based Method for Attack Detection in Large Scale Network. Int. J. Comput. Commun. Control 7(3): 509-517 (2012) - [c4]Yanan Sun, Xiaohong Guan, Ting Liu, Yu Qu
:
An Identity Authentication Mechanism Based on Timing Covert Channel. TrustCom 2012: 832-836 - 2011
- [c3]Yanan Sun, Xiaohong Guan, Ting Liu:
A New Method for Authentication Based on Covert Channel. NPC 2011: 160-165 - [c2]Ting Liu, Xiaohong Guan, Yu Qu
, Yanan Sun:
A Layered Detection Method for Malware Identification. NPC 2011: 166-175
2000 – 2009
- 2009
- [j1]Ting Liu, Xiaohong Guan, Qinghua Zheng, Yu Qu
:
A new worm exploiting IPv6 and IPv4-IPv6 dual-stack networks: experiment, modeling, simulation, and defense. IEEE Netw. 23(5): 22-29 (2009) - [c1]Ting Liu, Xiaohong Guan, Qinghua Zheng, Ke Lu, Yuanfeng Song, Weizhan Zhang:
Prototype Demonstration: Trojan Detection and Defense System. CCNC 2009: 1-2
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-08 01:44 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint