Jiqiang Liu
Jiqiang Liu
Professor of Computer Science
Verified email at bjtu.edu.cn
Cited by
Cited by
Exploring permission-induced risk in android applications for malicious application detection
W Wang, X Wang, D Feng, J Liu, Z Han, X Zhang
IEEE Transactions on Information Forensics and Security 9 (11), 1869-1882, 2014
Creditcoin: A privacy-preserving blockchain-based incentive announcement network for communications of smart vehicles
L Li, J Liu, L Cheng, S Qiu, W Wang, X Zhang, Z Zhang
IEEE Transactions on Intelligent Transportation Systems 19 (7), 2204-2220, 2018
Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers
W Wang, Y Li, X Wang, J Liu, X Zhang
Future generation computer systems 78, 987-994, 2018
A two-layered permission-based android malware detection scheme
X Liu, J Liu
2014 2nd IEEE International Conference on Mobile Cloud Computing, Services …, 2014
Selecting a trusted cloud service provider for your SaaS program
C Tang, J Liu
Computers & Security 50, 60-73, 2015
Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation
Y Shi, Q Zheng, J Liu, Z Han
Information Sciences 295, 221-231, 2015
Polymers as Electrooptical and Photooptical Active Media Polymers as Electrooptical and Photooptical Active Media, 1996
Journal of photochemistry and photobiology. C, Photochemistry reviews 5 (3 …, 2004
Abstracting massive data for lightweight intrusion detection in computer networks
W Wang, J Liu, G Pitsilis, X Zhang
Information Sciences 433, 417-430, 2018
Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack
S Qiu, J Liu, Y Shi, R Zhang
Science China Information Sciences 60 (5), 052105, 2017
Characterizing Android apps’ behavior for effective detection of malapps at large scale
X Wang, W Wang, Y He, J Liu, Z Han, X Zhang
Future generation computer systems 75, 30-45, 2017
Reducing power consumption in embedding virtual infrastructures
B Wang, X Chang, J Liu, JK Muppala
2012 IEEE Globecom Workshops, 714-718, 2012
Constructing important features from massive network traffic for lightweight intrusion detection
W Wang, Y He, J Liu, S Gombault
IET Information Security 9 (6), 374-379, 2015
Modeling Active Virtual Machines on IaaS Clouds Using anM/G/m/m+KQueue
X Chang, B Wang, JK Muppala, J Liu
IEEE Transactions on Services Computing 9 (3), 408-420, 2014
DroidEnsemble: Detecting Android malicious applications with ensemble of string and structural static features
W Wang, Z Gao, M Zhao, Y Li, J Liu, X Zhang
IEEE Access 6, 31798-31807, 2018
Privacy risk analysis and mitigation of analytics libraries in the android ecosystem
X Liu, J Liu, S Zhu, W Wang, X Zhang
IEEE Transactions on Mobile Computing, 2019
Towards robust green virtual cloud data center provisioning
Y Yang, X Chang, J Liu, L Li
IEEE Transactions on Cloud Computing 5 (2), 168-181, 2015
Green cloud virtual network provisioning based ant colony optimization
X Chang, B Wang, J Liu, W Wang, J Muppala
Proceedings of the 15th annual conference companion on Genetic and …, 2013
Discovering and understanding android sensor usage behaviors with data flow analysis
X Liu, J Liu, W Wang, Y He, X Zhang
World Wide Web 21 (1), 105-126, 2018
A new anonymity model for privacy-preserving data publishing
X Huang, J Liu, Z Han, J Yang
China Communications 11 (9), 47-59, 2014
Congestion control based on priority drop for H. 264/SVC
Y Xiaogang, L Jiqiang, L Ning
2007 International Conference on Multimedia and Ubiquitous Engineering (MUE …, 2007
The system can't perform the operation now. Try again later.
Articles 1–20