​
Login / Signup
Xuchong Liu
ORCID
Publication Activity (10 Years)
Years Active: 2012-2024
Publications (10 Years): 14
Top Topics
Computerized Tomography
Malicious Activities
Data Security
Kernel Function
Top Venues
IEEE Trans. Instrum. Meas.
Int. J. Comput. Sci. Eng.
Wirel. Networks
KSII Trans. Internet Inf. Syst.
</>
Publications
</>
Wenjie Kang
,
Qiang Liu
,
Peidong Zhu
,
Wei Zhao
,
Xuchong Liu
,
Gang Hu
Coordinated cyber-physical attacks based on different attack strategies for cascading failure analysis in smart grids.
Wirel. Networks
30 (5) (2024)
Xuchong Liu
,
Jianqiao Yu
,
Yi Sun
,
Xuanheng Li
Tiny Defect-Oriented Single-View CT Reconstruction Based on a Hybrid Framework.
IEEE Trans. Instrum. Meas.
73 (2024)
Tianyuan Li
,
Xin Su
,
Wei Liu
,
Wei Liang
,
Meng-Yen Hsieh
,
Zhuhui Chen
,
Xuchong Liu
,
Hong Zhang
Memory-augmented meta-learning on meta-path for fast adaptation cold-start recommendation.
Connect. Sci.
34 (1) (2022)
Ouyang Zhao
,
Xuchong Liu
,
Xiong Li
,
Pitam Singh
,
Fan Wu
Privacy-preserving data aggregation scheme for edge computing supported vehicular ad hoc networks.
Trans. Emerg. Telecommun. Technol.
33 (5) (2022)
Jiabei He
,
Xuchong Liu
,
Fan Wu
,
Chaoyang Chen
,
Xiong Li
A mutual authentication scheme in VANET providing vehicular anonymity and tracking.
Telecommun. Syst.
81 (2) (2022)
Xin Su
,
Qingbo Gong
,
Yi Zheng
,
Xuchong Liu
,
Kuan-Ching Li
An Informative and Comprehensive Behavioral Characteristics Analysis Methodology of Android Application for Data Security in Brain-Machine Interfacing.
Comput. Math. Methods Medicine
2020 (2020)
Xin Su
,
Weiqi Shi
,
Xilong Qu
,
Yi Zheng
,
Xuchong Liu
DroidDeep: using Deep Belief Network to characterize and detect android malware.
Soft Comput.
24 (8) (2020)
Shaofei Lu
,
Qian Zeng
,
Heng Wu
,
Jinshu Su
,
Xuchong Liu
,
Hongliang Tang
A New Power Load Forecasting Model (SIndRNN): Independently Recurrent Neural Network Based on Softmax Kernel Function.
HPCC/SmartCity/DSS
(2019)
Kun Huang
,
Xuchong Liu
,
Weiping Wang
,
Haodong Wang
VDetector: Detecting Vulnerability Based on Inter-Component Data Flows in Android Applications.
MSN
(2019)
Shangde Gao
,
Xin Liao
,
Xuchong Liu
Real-time detecting one specific tampering operation in multiple operator chains.
J. Real Time Image Process.
16 (3) (2019)
Xin Su
,
Yi Zheng
,
Jiuchuan Lin
,
Xuchong Liu
A network traffic-aware mobile application recommendation system based on network traffic cost consideration.
Int. J. Comput. Sci. Eng.
19 (2) (2019)
Jiana Li
,
Xin Liao
,
Rongbing Hu
,
Xuchong Liu
Detectability of the Image Operation Order: Upsampling and Mean Filtering.
APSIPA
(2018)
Xin Su
,
Xuchong Liu
,
Jiuchuan Lin
,
Shiming He
,
Zhangjie Fu
,
Wenjia Li
De-cloaking Malicious Activities in Smartphones Using HTTP Flow Mining.
KSII Trans. Internet Inf. Syst.
11 (6) (2017)
Xin Su
,
Xuchong Liu
,
Jiuchuan Lin
,
Yu Tong
An Android App Recommendation Approach by Merging Network Traffic Cost.
ICCCS (1)
(2017)
Yong Luo
,
Yan Zhao
,
Lei Cheng
,
Jianxin Wang
,
Xuchong Liu
Lossless Visible Three-Dimensional Watermark of Digital Elevation Model Data.
Trans. Edutainment
8 (2012)