Jiqiang Liu
Jiqiang Liu
Professor of Computer Science
Verified email at bjtu.edu.cn
TitleCited byYear
Exploring permission-induced risk in android applications for malicious application detection
W Wang, X Wang, D Feng, J Liu, Z Han, X Zhang
IEEE Transactions on Information Forensics and Security 9 (11), 1869-1882, 2014
Creditcoin: A privacy-preserving blockchain-based incentive announcement network for communications of smart vehicles
L Li, J Liu, L Cheng, S Qiu, W Wang, X Zhang, Z Zhang
IEEE Transactions on Intelligent Transportation Systems 19 (7), 2204-2220, 2018
A two-layered permission-based android malware detection scheme
X Liu, J Liu
2014 2nd IEEE International Conference on Mobile Cloud Computing, Services …, 2014
Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers
W Wang, Y Li, X Wang, J Liu, X Zhang
Future Generation Computer Systems 78, 987-994, 2018
Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation
Y Shi, Q Zheng, J Liu, Z Han
Information Sciences 295, 221-231, 2015
Selecting a trusted cloud service provider for your SaaS program
C Tang, J Liu
Computers & Security 50, 60-73, 2015
Reducing power consumption in embedding virtual infrastructures
B Wang, X Chang, J Liu, JK Muppala
2012 IEEE Globecom Workshops, 714-718, 2012
Abstracting massive data for lightweight intrusion detection in computer networks
W Wang, J Liu, G Pitsilis, X Zhang
Information Sciences 433, 417-430, 2018
Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack
S Qiu, J Liu, Y Shi, R Zhang
Science China Information Sciences 60 (5), 052105, 2017
Characterizing Android apps’ behavior for effective detection of malapps at large scale
X Wang, W Wang, Y He, J Liu, Z Han, X Zhang
Future generation computer systems 75, 30-45, 2017
Green cloud virtual network provisioning based ant colony optimization
X Chang, B Wang, J Liu, W Wang, J Muppala
Proceedings of the 15th annual conference companion on Genetic and …, 2013
Constructing important features from massive network traffic for lightweight intrusion detection
W Wang, Y He, J Liu, S Gombault
IET Information Security 9 (6), 374-379, 2015
Modeling Active Virtual Machines on IaaS Clouds Using anM/G/m/m+KQueue
X Chang, B Wang, JK Muppala, J Liu
IEEE Transactions on Services Computing 9 (3), 408-420, 2014
The Application of Information Leakage Defendable Model in Enterprise Intranet Security
Z Yong, L Jiqiang, H Zhen, S Changxiang
Journal of Computer Research and Development 5 (44), 761-766, 2007
Towards robust green virtual cloud data center provisioning
Y Yang, X Chang, J Liu, L Li
IEEE Transactions on Cloud Computing 5 (2), 168-181, 2015
Study of Remote Automated Anonymous Attestation in Trusted Computing
Chinese Journal of Computers 7 (32), 1-7, 2009
Congestion control based on priority drop for H. 264/SVC
Y Xiaogang, L Jiqiang, L Ning
2007 International Conference on Multimedia and Ubiquitous Engineering (MUE …, 2007
Attribute-based proxy re-encryption with keyword search
Y Shi, J Liu, Z Han, Q Zheng, R Zhang, S Qiu
PloS one 9 (12), e116325, 2014
Cost-effective traffic assignment for multipath routing in selfish networks
F Wu, S Zhong, J Liu
IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference, 453-457, 2007
Discovering and understanding android sensor usage behaviors with data flow analysis
X Liu, J Liu, W Wang, Y He, X Zhang
World Wide Web 21 (1), 105-126, 2018
The system can't perform the operation now. Try again later.
Articles 1–20