default search action
Xuchong Liu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Xuchong Liu, Jianqiao Yu, Yi Sun, Xuanheng Li:
Tiny Defect-Oriented Single-View CT Reconstruction Based on a Hybrid Framework. IEEE Trans. Instrum. Meas. 73: 1-14 (2024) - [j10]Wenjie Kang, Qiang Liu, Peidong Zhu, Wei Zhao, Xuchong Liu, Gang Hu:
Coordinated cyber-physical attacks based on different attack strategies for cascading failure analysis in smart grids. Wirel. Networks 30(5): 3821-3836 (2024) - 2022
- [j9]Tianyuan Li, Xin Su, Wei Liu, Wei Liang, Meng-Yen Hsieh, Zhuhui Chen, Xuchong Liu, Hong Zhang:
Memory-augmented meta-learning on meta-path for fast adaptation cold-start recommendation. Connect. Sci. 34(1): 301-318 (2022) - [j8]Ouyang Zhao, Xuchong Liu, Xiong Li, Pitam Singh, Fan Wu:
Privacy-preserving data aggregation scheme for edge computing supported vehicular ad hoc networks. Trans. Emerg. Telecommun. Technol. 33(5) (2022) - [j7]Jiabei He, Xuchong Liu, Fan Wu, Chaoyang Chen, Xiong Li:
A mutual authentication scheme in VANET providing vehicular anonymity and tracking. Telecommun. Syst. 81(2): 175-190 (2022) - [c7]Wei Zhao, Wenjie Kang, Xuchong Liu, Xin Su, Yue Zhang, Hao Jiang:
Social Relationship Mining Based on User Telephone Communication Data for Cooperative Relationship Recommendation. INFOCOM Workshops 2022: 1-6 - 2020
- [j6]Xin Su, Qingbo Gong, Yi Zheng, Xuchong Liu, Kuan-Ching Li:
An Informative and Comprehensive Behavioral Characteristics Analysis Methodology of Android Application for Data Security in Brain-Machine Interfacing. Comput. Math. Methods Medicine 2020: 3658795:1-3658795:14 (2020) - [j5]Xin Su, Weiqi Shi, Xilong Qu, Yi Zheng, Xuchong Liu:
DroidDeep: using Deep Belief Network to characterize and detect android malware. Soft Comput. 24(8): 6017-6030 (2020) - [c6]Wenjie Kang, Jiale Deng, Peidong Zhu, Xuchong Liu, Wei Zhao, Zhi Hang:
Multi-dimensional Security Risk Assessment Model Based on Three Elements in the IoT System. ICCC 2020: 518-523 - [c5]Wenjie Kang, Peidong Zhu, Xuchong Liu:
Integrated Defense Mechanism Based on Attack Goals against Three Attack Strategies in Smart Grid. INFOCOM Workshops 2020: 1027-1032
2010 – 2019
- 2019
- [j4]Xin Su, Yi Zheng, Jiuchuan Lin, Xuchong Liu:
A network traffic-aware mobile application recommendation system based on network traffic cost consideration. Int. J. Comput. Sci. Eng. 19(2): 259-273 (2019) - [j3]Shangde Gao, Xin Liao, Xuchong Liu:
Real-time detecting one specific tampering operation in multiple operator chains. J. Real Time Image Process. 16(3): 741-750 (2019) - [c4]Shaofei Lu, Qian Zeng, Heng Wu, Jinshu Su, Xuchong Liu, Hongliang Tang:
A New Power Load Forecasting Model (SIndRNN): Independently Recurrent Neural Network Based on Softmax Kernel Function. HPCC/SmartCity/DSS 2019: 2305-2310 - [c3]Kun Huang, Xuchong Liu, Weiping Wang, Haodong Wang:
VDetector: Detecting Vulnerability Based on Inter-Component Data Flows in Android Applications. MSN 2019: 321-326 - 2018
- [c2]Jiana Li, Xin Liao, Rongbing Hu, Xuchong Liu:
Detectability of the Image Operation Order: Upsampling and Mean Filtering. APSIPA 2018: 1544-1549 - 2017
- [j2]Xin Su, Xuchong Liu, Jiuchuan Lin, Shiming He, Zhangjie Fu, Wenjia Li:
De-cloaking Malicious Activities in Smartphones Using HTTP Flow Mining. KSII Trans. Internet Inf. Syst. 11(6): 3230-3253 (2017) - [c1]Xin Su, Xuchong Liu, Jiuchuan Lin, Yu Tong:
An Android App Recommendation Approach by Merging Network Traffic Cost. ICCCS (1) 2017: 326-338 - 2012
- [j1]Yong Luo, Yan Zhao, Lei Cheng, Jianxin Wang, Xuchong Liu:
Lossless Visible Three-Dimensional Watermark of Digital Elevation Model Data. Trans. Edutainment 8: 138-147 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint