Jiqiang Liu

ORCID: 0000-0003-1147-4327
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Cryptography and Data Security
  • Network Security and Intrusion Detection
  • Blockchain Technology Applications and Security
  • Privacy-Preserving Technologies in Data
  • Adversarial Robustness in Machine Learning
  • Cloud Data Security Solutions
  • Security and Verification in Computing
  • Internet Traffic Analysis and Secure E-voting
  • Spam and Phishing Detection
  • Digital and Cyber Forensics
  • Vehicular Ad Hoc Networks (VANETs)
  • Anomaly Detection Techniques and Applications
  • Advanced Authentication Protocols Security
  • User Authentication and Security Systems
  • Cryptographic Implementations and Security
  • Access Control and Trust
  • IoT and Edge/Fog Computing
  • Traffic Prediction and Management Techniques
  • Traffic control and management
  • Advanced Neural Network Applications
  • Chaos-based Image/Signal Encryption
  • Software Testing and Debugging Techniques
  • Cloud Computing and Resource Management
  • Complexity and Algorithms in Graphs

Beijing Jiaotong University
2016-2025

Hong Kong Baptist University
2024-2025

Universidad del Noreste
2025

Shenzhen Institutes of Advanced Technology
2024-2025

Chinese Academy of Sciences
2025

Southern University of Science and Technology
2024-2025

Xinxiang Medical University
2023-2025

Second Xiangya Hospital of Central South University
2022-2025

Central South University
2013-2025

Beijing Transportation Research Center
2018-2023

The vehicular announcement network is one of the most promising utilities in communications smart vehicles and transportation systems. In general, there are two major issues building an effective network. First, it difficult to forward reliable announcements without revealing users' identities. Second, users usually lack motivation announcements. this paper, we endeavor resolve these through proposing called CreditCoin, a novel privacy-preserving incentive based on Blockchain via efficient...

10.1109/tits.2017.2777990 article EN IEEE Transactions on Intelligent Transportation Systems 2018-01-23

Android has been a major target of malicious applications (malapps). How to detect and keep the malapps out app markets is an ongoing challenge. One central design points security mechanism permission control that restricts access apps core facilities devices. However, it imparts significant responsibility developers with regard accurately specifying requested permissions users fully understanding risk granting certain combinations permissions. by depict app's behavioral patterns. In order...

10.1109/tifs.2014.2353996 article EN IEEE Transactions on Information Forensics and Security 2014-09-08

Train delay prediction is a key technology for intelligent train scheduling and passenger services. We propose model that takes into account the asynchrony of events, dynamics operations, diversity influencing factors. Firstly, we consider operations as discrete sequences events arrival neural temporal point process (TANTPP) framework focused on predicting delays explicitly models events. Secondly, introduce multi-source dynamic spatiotemporal embedding method feature encoder in TANTPP...

10.1109/tits.2024.3430031 article EN cc-by IEEE Transactions on Intelligent Transportation Systems 2024-07-31

While much effort has been made to detect and measure the privacy leakage caused by advertising (ad) libraries integrated in mobile applications, analytics libraries, which are also widely used apps have not systematically studied for their risks. Different from ad main function of is collect users' in-app actions. Hence, design more likely leak private information. In this work, we study what information collected popular Android apps. We implement a framework called "Alde". Given an app,...

10.1109/tmc.2019.2903186 article EN publisher-specific-oa IEEE Transactions on Mobile Computing 2019-03-05

Android platform has dominated the operating system of mobile devices. However, dramatic increase malicious applications (malapps) caused serious software failures to and posed a great threat users. The effective detection malapps thus become an emerging yet crucial issue. Characterizing behaviors (apps) is essential detecting malapps. Most existing works on were mainly based string static features, such as permissions API usage extracted from apps. There also exists work with structural...

10.1109/access.2018.2835654 article EN cc-by-nc-nd IEEE Access 2018-01-01

Reinforcement learning is a core technology for modern artificial intelligence, and it has become workhorse AI applications ranging from Atrai Game to Connected Automated Vehicle System (CAV). Therefore, reliable RL system the foundation security critical in AI, which attracted concern that more than ever. However, recent studies discover interesting attack mode adversarial also be effective when targeting neural network policies context of reinforcement learning, inspired innovative...

10.1186/s42400-019-0027-x article EN cc-by Cybersecurity 2019-03-29

Vulnerability detection is an import issue in information system security. In this work, we propose the deep learning method for vulnerability detection. We present three models, namely, convolution neural network (CNN), long short term memory (LSTM) and - (CNN-LSTM). order to test performance of our approach, collected 9872 sequences function calls as features represent patterns binary programs during their execution. apply models predict vulnerabilities these based on data. The...

10.1109/compcomm.2017.8322752 article EN 2017-12-01

Assisting traffic control is one of the most important applications on Internet Vehicles (IoVs). Traffic information provided by vehicles desired since drivers or vehicle sensors are sensitive in perceiving detecting nuances roads. However, availability and privacy preservation this critical while conflicted with each other vehicular communication. In paper, we propose a semicentralized mode attribute-based blockchain IoVs to balance tradeoff between preservation. mode, method...

10.1109/tcss.2019.2904633 article EN IEEE Transactions on Computational Social Systems 2019-04-03

Ferulic acid (FA) has antioxidative and anti-inflammatory effects, is a promising drug to treat sepsis.To study the therapeutic effect of FA in sepsis-induced acute lung injury (ALI) its underlying mechanisms.The caecal ligation puncture (CLP) manoeuvre was applied establish murine model ALI, female BALB/c mice (6 per group) were subjected 100 mg/kg or 0.8 ferrostatin-1 (Fer-1, ferroptosis inhibitor) treatment clarify role preserving alveolar epithelial barrier function inhibiting...

10.1080/13880209.2022.2147549 article EN cc-by Pharmaceutical Biology 2022-11-25

The blockchain cross-chain is a significant technology for inter-chain interconnection and value transfer among different networks. Cross-chain overcomes the "information island" problem of closed network increasingly applied to multiple critical areas such as finance internet things (IoT). Blockchain can be divided into three main categories networks: public blockchains, private consortium blockchains. However, there are differences in block structures, consensus mechanisms, complex working...

10.1109/jas.2023.123642 article EN IEEE/CAA Journal of Automatica Sinica 2023-07-25

Are Federated Learning (FL) systems free from backdoor poisoning with the arsenal of various defense strategies deployed? This is an intriguing problem significant practical implications regarding utility FL services. Despite recent flourish poisoning-resilient methods, our study shows that carefully tuning collusion between malicious participants can minimize trigger-induced bias poisoned local model poison-free one, which plays key role in delivering stealthy attacks and circumventing a...

10.1609/aaai.v37i7.26083 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2023-06-26

Heterogeneous networks, as a critical component of modern communication technology, have experienced rapid development in recent years [...]

10.3390/electronics14030568 article EN Electronics 2025-01-31

Android platform has become the main target of malware developers in past few years. One Android's defense mechanisms against malicious apps is a permission-based access control mechanism. It feasible approach to detect potential application based on permissions it requested. In this paper, we proposed two-layered permission detection scheme for detecting applications. Comparing with previous researches, consider requested pairs as additional condition, and also used improve accuracy. The...

10.1109/mobilecloud.2014.22 article EN 2014-04-01

Since big data becomes a main impetus to the next generation of IT industry, privacy has received considerable attention in recent years. To deal with challenges, differential been widely discussed and related private mechanisms are proposed as privacy-enhancing techniques. However, today’s techniques, it is difficult generate sanitized dataset that can suit every machine learning task. In order adapt various tasks budgets, different kinds have be implemented, which inevitably incur...

10.1109/tdsc.2020.3015886 article EN IEEE Transactions on Dependable and Secure Computing 2020-08-11

Deep Neural Networks (DNNs) have been gaining state-of-the-art achievement compared with many traditional Machine Learning (ML) models in diverse fields. However, adversarial examples challenge the further deployment and application of DNNs. Analysis has carried out for studying reasons DNNs' vulnerability to perturbation focused on model architecture. No research done investigating impact optimization algorithms (namely, optimizers DNNs) employed training DNN models' sensitivity examples....

10.1109/access.2019.2948658 article EN cc-by IEEE Access 2019-01-01

Meeting the demand for efficient photosensitizers in photodynamic therapy (PDT), a series of iridium(III) complexes decorated with silicane-modified rhodamine (Si-rhodamine) was meticulously designed and synthesized. These demonstrate exceptional PDT potential owing to their strong absorption near-infrared (NIR) spectrum, particularly responsive 808 nm laser stimulation. This feature is pivotal, enabling deep-penetration excitation overcoming depth-related challenges clinical applications....

10.1039/d4tb00075g article EN Journal of Materials Chemistry B 2024-01-01

Pedestrian detection plays a crucial role in autonomous driving by identifying the position, size, orientation, and dynamic features of pedestrians images or videos, assisting vehicles making better decisions controls. It's worth noting that performance pedestrian models largely depends on quality diversity available training data. Current datasets for have limitations terms diversity, scale, quality. In recent years, numerous studies proposed use data augmentation strategies to expand...

10.1109/mnet.2024.3366232 article EN IEEE Network 2024-02-16
Coming Soon ...