Kai Liu

ORCID: 0000-0001-7252-5939
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Recommender Systems and Techniques
  • Cloud Computing and Resource Management
  • Advanced Graph Neural Networks
  • Caching and Content Delivery
  • Quantum Computing Algorithms and Architecture
  • Blockchain Technology Applications and Security
  • Network Security and Intrusion Detection
  • GNSS positioning and interference
  • Quantum-Dot Cellular Automata
  • Topic Modeling
  • Scientific Computing and Data Management
  • Advanced Frequency and Time Standards
  • IoT and Edge/Fog Computing
  • Network Time Synchronization Technologies
  • Indoor and Outdoor Localization Technologies
  • Web Data Mining and Analysis
  • Quantum Information and Cryptography
  • Information and Cyber Security
  • Service-Oriented Architecture and Web Services
  • Software Engineering Research
  • Advanced Decision-Making Techniques
  • Inertial Sensor and Navigation
  • Advanced Malware Detection Techniques
  • Advancements in PLL and VCO Technologies
  • Digital Marketing and Social Media

National University of Defense Technology
2007-2024

Shanghai Electric (China)
2024

Wuhan University of Technology
2024

Shandong Institute of Business and Technology
2023

Shandong Institute of Commerce & Technology
2023

China State Construction Engineering (China)
2023

Suqian University
2022

Qiannan Normal College For Nationalities
2022

Guizhou University
2022

Tiandi Science & Technology (China)
2021

In today’s dynamic complex cyber environments, Cyber Threat Intelligence (CTI) and the risk of cyberattacks are both increasing. This means that organizations need to have a strong understanding their internal CTI external CTI. The potential for cybersecurity knowledge graphs is evident in ability aggregate represent about threats, as well manage reason with knowledge. While most existing research has focused on how create full graph, utilize graph tackle real-world industrial difficulties...

10.3390/electronics11152287 article EN Electronics 2022-07-22

10.1109/tcsvt.2025.3556749 article EN IEEE Transactions on Circuits and Systems for Video Technology 2025-01-01

Cloud computing is becoming the new generation infrastructure, and many cloud vendors provide different types of services. How to choose best services for specific applications very challenging. Addressing this challenge requires balancing multiple factors, such as business demands, technologies, policies preferences in addition requirements. This paper recommends a mechanism selecting public service at levels Infrastructure Service (IaaS) Platform (PaaS). A systematic framework associated...

10.1371/journal.pone.0105297 article EN cc-by PLoS ONE 2014-08-29

Traditional recommendation systems (RSs) recommend users to personal items according their pre-behaviors infer users' preference. Although researchers have made some improvements, which take time factor into traditional systems, on catching changes of interest, it is difficult always compute the preference fluctuations. Therefore, solve mentioned above problems, we add fluctuations collaborative filtering systems. In this paper, will quantify user's change. Besides, also adapts recommending...

10.1109/icicse52190.2021.9404120 article EN 2021-03-19

10.1007/s10773-018-3813-4 article EN International Journal of Theoretical Physics 2018-07-03

10.1007/s00521-020-05117-w article EN Neural Computing and Applications 2020-07-13

In the era of Internet Things (IoT), increasing numbers applications face challenge using current data management systems to manage massive volume operational gener-ated by sensors and devices. Databases based on time series model, like PI Server, are developed handle such with technology (OT) characteristics (high volume, long lifecycle, simple format). However, while achieving excellent write performance, these database provide limited query capabilities. this paper, we present...

10.1145/2588555.2595638 article EN 2014-06-18

High frequency of network security incidents has also brought a lot negative effects and even huge economic losses to countries, enterprises individuals in recent years. Therefore, more attention been paid the problem security. In order evaluate newly included vulnerability text information accurately, reduce workload experts false rate traditional method. Multiple deep learning methods for classification evaluation are proposed this paper. The standard Cross Site Scripting (XSS) data is...

10.1109/bigdia.2019.8802851 article EN 2019-07-01

Understanding perturbations at the single-cell level is essential for unraveling cellular mechanisms and their implications in health disease. The growing availability of biological data has driven development a variety silico perturbation methods designed analysis, which offer means to address many inherent limitations experimental approaches. However, these computational are often tailored specific scenarios validated on limited datasets metrics, making evaluation comparison challenging....

10.1101/2024.12.20.629581 preprint EN cc-by-nc bioRxiv (Cold Spring Harbor Laboratory) 2024-12-22

10.1007/s10773-017-3455-y article EN International Journal of Theoretical Physics 2017-06-30

In this article, a novel R-convolution kernel, named the fast quantum walk kernel (FQWK), is proposed for unattributed graphs. FQWK, similarity of neighborhood-pair substructure between two nodes measured via superposition amplitude walks those nodes. The interference in kind local substructures provides more information on so that FQWK can capture finer-grained structural features addition, to efficiently compute transition amplitudes multistep discrete-time walks, recursive method...

10.1109/tnnls.2020.3027687 article EN IEEE Transactions on Neural Networks and Learning Systems 2020-10-16

Managing computation resources in a cost-effective way has become the core competence for Cloud provider to win over market because of "pay-as-you-go" business model. Therefore, VM placement more and important research practices management by determining at what condition on which physical server should be placed so that SLA can guaranteed servers' utilization improved. Much existing work simply formulates above issue bin-packing problem, does not take relationships into account. However,...

10.1109/compsac.2013.20 article EN 2013-07-01

On account of the complexity programs, it is a difficult work to recognize all addressable expressions, which one preconditions sound static analysis. This paper introduces an approach recognizing expressions C program. Firstly, we induce grammar patterns mapping each kind them node abstract syntax tree (AST), providing corresponding naming rule and type inference rule. Then, demonstrate that recognizes based on AST. In order validate adequacy our approach, five real-world programs are...

10.1109/qsic.2013.64 article EN 2013-07-01

Cloud computing is becoming a viable solution for scientific research and several open-source cloud solutions are available to support studies. However, little has been done systematically investigate the performance of these in supporting pursuits. Taking dust storm forecasting as an example, we test three popular solutions, namely Eucalyptus, OpenNebula, CloudStack, on same hardware compare against bare cluster. We find that: (1) compared cluster, about 10% virtualization management...

10.1145/2424321.2424408 article EN Proceedings of the 30th International Conference on Advances in Geographic Information Systems 2012-11-06

The isomorphism problem involves judging whether two graphs are topologically the same and producing structure-preserving mapping. It is widely used in various areas. Diverse algorithms have been proposed to solve this polynomial time, with help of quantum walks. Some these algorithms, however, fail find Moreover, most very limited performance on regular which generally difficult deal due their symmetry. We propose IsoMarking discover an mapping effectively, based walk sensitive topological...

10.3390/e20080586 article EN cc-by Entropy 2018-08-08

Time-hopping signal structure is adopted for overcoming the near-far problem in Ground-based Navigation System. The model of TH-CDMA presented. To track pulse signals with pseudorandom active-timeslot, tracking loops time-varying sampling periods are designed. linear second order TVSP-PLL stability analyzed based on First Method Lyapunov system. A transient-response simulation provided as a verification. ranging performance TVSP-DLL evaluated. hardware experiment and MATLAB used to verify...

10.1109/siprocess.2016.7888314 article EN 2016-08-01

Image-based virtual try-on aims to transfer a target clothing onto specific person. A significant challenge is arbitrarily matched and person lack corresponding ground truth supervised learning. recent pioneering work leveraged an improved cycleGAN enable one network generate the desired image for another during training. However, there no difference in result distribution before after changes. Therefore, using two different networks unnecessary may even increase difficulty of convergence....

10.1609/aaai.v38i2.27928 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2024-03-24

In the domain of cybersecurity, available annotated data are often scarce, especially for Chinese cybersecurity datasets, necessitating manual construction datasets. The scarcity samples is one challenges in researching “no-relation” class. Since annotation process typically focuses only on known relation classes, there usually no training This poses a zero-shot classification problem, where during process, tendency to classify into class with relationship. Zero-shot tasks particularly...

10.3390/electronics13122379 article EN Electronics 2024-06-18

Long-endurance unmanned aerial vehicles (LE-UAVs) are extensively used due to their vast coverage and significant payload capacities. However, limited autonomous intelligence necessitates the intervention of ground control resources (GCRs), which include one or more operators, during mission execution. The performance these missions is notably affected by varying effectiveness different GCRs fatigue levels. Current research on multi-UAV planning inadequately addresses critical factors. To...

10.3390/drones8080385 article EN cc-by Drones 2024-08-08
Coming Soon ...