Follow
Xiaolei Liu
Xiaolei Liu
Verified email at uestc.edu.cn
Title
Cited by
Cited by
Year
Transaction-based classification and detection approach for Ethereum smart contract
T Hu, X Liu, T Chen, X Zhang, X Huang, W Niu, J Lu, K Zhou, Y Liu
Information Processing & Management 58 (2), 102462, 2021
1732021
An Insider Threat Detection Approach Based on Mouse Dynamics and Deep Learning
T Hu, W Niu, X Zhang, X Liu, J Lu, Y Liu
Security and Communication Networks 2019, 2019
842019
Adversarial Samples on Android Malware Detection Systems for IoT Systems
X Liu, X Du, X Zhang, Q Zhu, H Wang, M Guizani
Sensors 19 (4), 974, 2019
732019
Weighted-sampling audio adversarial example attack
X Liu, K Wan, Y Ding, X Zhang, Q Zhu
Proceedings of the AAAI Conference on Artificial Intelligence 34 (04), 4908-4915, 2020
43*2020
Evolution-algorithm-based unmanned aerial vehicles path planning in complex environment
X Liu, X Du, X Zhang, Q Zhu, M Guizani
Computers & Electrical Engineering 80, 106493, 2019
242019
A black-box attack on neural networks based on swarm evolutionary algorithm
X Liu, T Hu, K Ding, Y Bai, W Niu, J Lu
Information Security and Privacy: 25th Australasian Conference, ACISP 2020 …, 2020
182020
Tracking the insider attacker: A blockchain traceability system for insider threats
T Hu, B Xin, X Liu, T Chen, K Ding, X Zhang
Sensors 20 (18), 5297, 2020
162020
Securing the private key in your blockchain wallet: a continuous authentication approach based on behavioral biometric
T Hu, X Liu, W Niu, K Ding, Y Wang, X Zhang
Journal of Physics: Conference Series 1631 (1), 012104, 2020
142020
Integrating Traffics with Network Device Logs for Anomaly Detection
Jiazhong Lu, Fengmao Lv, Zhongliu Zhuo, Xiaosong Zhang, Xiaolei Liu, Teng Hu ...
Security and Communication Networks, 2019
142019
A low-query black-box adversarial attack based on transferability
K Ding, X Liu, W Niu, T Hu, Y Wang, X Zhang
Knowledge-Based Systems 226, 107102, 2021
122021
TLTD: a testing framework for learning-based IoT traffic detection systems
X Liu, X Zhang, N Guizani, J Lu, Q Zhu, X Du
Sensors 18 (8), 2630, 2018
122018
Adversarial Attacks Against Profile HMM Website Fingerprinting Detection Model
X Liu, Z Zhuo, X Du, X Zhang, Q Zhu, M Guizani
Cognitive Systems Research, 2018
92018
Enhanced fireworks algorithm for dynamic deployment of wireless sensor networks
X Liu, X Zhang, Q Zhu
2017 2nd International Conference on Frontiers of Sensors Technologies …, 2017
92017
Research on information steganography based on network data stream
J Lu, W Zhang, Z Deng, S Zhang, Y Chang, X Liu
Neural Computing and Applications 33, 851-866, 2021
82021
Sparse adversarial attack for video via gradient-based keyframe selection
Y Xu, X Liu, M Yin, T Hu, K Ding
ICASSP 2022-2022 IEEE International Conference on Acoustics, Speech and …, 2022
62022
Sparse black-box inversion attack with limited information
Y Xu, X Liu, T Hu, B Xin, R Yang
ICASSP 2023-2023 IEEE International Conference on Acoustics, Speech and …, 2023
52023
A hybrid association rule-based method to detect and classify botnets
Y Huang, L Jiazhong, H Tang, X Liu
Security and Communication Networks 2021, 1-9, 2021
52021
HTTP-based APT malware infection detection using URL correlation analysis
WN Niu, J Xie, XS Zhang, C Wang, XQ Li, RD Chen, XL Liu
Security and Communication Networks 2021, 1-12, 2021
52021
Research and analysis of electromagnetic trojan detection based on deep learning
J Lu, X Liu, S Zhang, Y Chang
Security and Communication Networks 2020, 1-13, 2020
52020
A novel steganography method for character-level text image based on adversarial attacks
K Ding, T Hu, W Niu, X Liu, J He, M Yin, X Zhang
Sensors 22 (17), 6497, 2022
32022
The system can't perform the operation now. Try again later.
Articles 1–20