Shigang Liu
标题
引用次数
引用次数
年份
Twitter spam detection based on deep learning
T Wu, S Liu, J Zhang, Y Xiang
Proceedings of the australasian computer science week multiconference, 1-8, 2017
762017
Addressing the class imbalance problem in Twitter spam detection using ensemble learning
S Liu, Y Wang, J Zhang, C Chen, Y Xiang
Computers & Security 69, 35-49, 2017
562017
An ensemble oversampling model for class imbalance problem in software defect prediction
S Huda, K Liu, M Abdelrazek, A Ibrahim, S Alyahya, H Al-Dossari, ...
IEEE access 6, 24184-24195, 2018
512018
Fuzzy-based information decomposition for incomplete and imbalanced data learning
S Liu, J Zhang, Y Xiang, W Zhou
IEEE Transactions on Fuzzy Systems 25 (6), 1476-1490, 2017
282017
Dynamic access point association using software defined networking
K Sood, S Liu, S Yu, Y Xiang
2015 International Telecommunication Networks and Applications Conference …, 2015
282015
Statistical Detection of Online Drifting Twitter Spam
S Liu, J Zhang, Y Xiang
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
252016
A comparative study of the class imbalance problem in Twitter spam detection
C Li, S Liu
Concurrency and Computation: Practice and Experience 30 (5), e4281, 2018
232018
Detecting spamming activities in twitter based on deeplearning technique
T Wu, S Wen, S Liu, J Zhang, Y Xiang, M Alrubaian, MM Hassan
Concurrency and Computation: Practice and Experience 29 (19), e4209, 2017
172017
DeepBalance: Deep-learning and fuzzy oversampling for vulnerability detection
S Liu, G Lin, QL Han, S Wen, J Zhang, Y Xiang
IEEE Transactions on Fuzzy Systems 28 (7), 1329-1343, 2019
142019
Fuzzy-based feature and instance recovery
S Liu, J Zhang, Y Wang, Y Xiang
Asian Conference on Intelligent Information and Database Systems, 605-615, 2016
122016
An ensemble learning approach for addressing the class imbalance problem in Twitter spam detection
S Liu, Y Wang, C Chen, Y Xiang
Australasian Conference on Information Security and Privacy, 215-228, 2016
112016
A performance evaluation of deeplearnt features for software vulnerability detection
X Ban, S Liu, C Chen, C Chua
Concurrency and Computation: Practice and Experience 31 (19), e5103, 2019
102019
An overview of attacks and defences on intelligent connected vehicles
M Dibaei, X Zheng, K Jiang, S Maric, R Abbas, S Liu, Y Zhang, Y Deng, ...
arXiv preprint arXiv:1907.07455, 2019
102019
Cyber vulnerability intelligence for Internet of Things binary
S Liu, M Dibaei, Y Tai, C Chen, J Zhang, Y Xiang
IEEE Transactions on Industrial Informatics 16 (3), 2154-2163, 2019
92019
Decision-based evasion attacks on tree ensemble classifiers
F Zhang, Y Wang, S Liu, H Wang
World Wide Web 23 (5), 2957-2977, 2020
82020
Information-decomposition-model-based missing value estimation for not missing at random dataset
S Liu, H Dai, M Gan
International Journal of Machine Learning and Cybernetics 9 (1), 85-95, 2018
72018
CD-VulD: Cross-domain vulnerability discovery based on deep domain adaptation
S Liu, G Lin, L Qu, J Zhang, O De Vel, P Montague, Y Xiang
IEEE Transactions on Dependable and Secure Computing, 2020
62020
Attacks and defences on intelligent connected vehicles: A survey
M Dibaei, X Zheng, K Jiang, R Abbas, S Liu, Y Zhang, Y Xiang, S Yu
Digital Communications and Networks, 2020
42020
A data-driven attack against support vectors of svm
S Liu, J Zhang, Y Wang, W Zhou, Y Xiang, OD Vel
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
42018
Examination of reliability of missing value recovery in data mining
S Liu, H Dai
2014 IEEE International Conference on Data Mining Workshop, 306-313, 2014
42014
系统目前无法执行此操作,请稍后再试。
文章 1–20