default search action
Caiming Liu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j5]Caiming Liu, Xiaorong Zheng, Zhengyi Bao, Zhiwei He, Mingyu Gao, Wenlong Song:
A Novel Deep Transfer Learning Method for Intelligent Fault Diagnosis Based on Variational Mode Decomposition and Efficient Channel Attention. Entropy 24(8): 1087 (2022) - [j4]Xiaorong Zheng, Zhaojian Gu, Caiming Liu, Jiahao Jiang, Zhiwei He, Mingyu Gao:
Deep Transfer Network with Multi-Space Dynamic Distribution Adaptation for Bearing Fault Diagnosis. Entropy 24(8): 1122 (2022) - [c30]Zhihui Hu, Caiming Liu:
Quantitative matching method for network traffic features. CIS 2022: 394-398 - 2021
- [c29]Yan Zhang, Caiming Liu:
An Immune Algorithm for Network Data Security Detection. CIS 2021: 247-251 - [c28]Caiming Liu, Yan Zhang:
An Intrusion Detection Model Combining Signature-Based Recognition and Two-Round Immune-Based Recognition. CIS 2021: 497-501 - 2020
- [c27]Caiming Liu, Yan Zhang, Qin Li, Luxin Xiao:
Full Coverage Detection of Immune Detector for Public Data Set. CIS 2020: 308-312
2010 – 2019
- 2019
- [c26]Yan Zhang, Caiming Liu:
Architecture of Real-Time and Dynamic Audit for Network Behavior Security. ICNC-FSKD 2019: 539-546 - 2018
- [j3]Siyuan Jing, Gongliang Li, Kai Zeng, Wei Pan, Caiming Liu:
Efficient parallel algorithm for computing rough set approximation on GPU. Soft Comput. 22(22): 7553-7569 (2018) - [c25]Si-Yuan Jing, Rui Sun, Chunming Xie, Peng Jin, Yi Liu, Caiming Liu:
Improved Implementation of Expectation Maximization Algorithm on Graphic Processing Unit. CLSW 2018: 623-629 - 2017
- [c24]Si-Yuan Jing, Caiming Liu, Gongliang Li, Gaorong Yan, Yan Zhang:
An Efficient Algorithm for Parallel Computation of Rough Entropy Using CUDA. CIS 2017: 1-5 - [c23]Zhonghua Li, Liping Jia, Caiming Liu:
An Effective Solution to Nonlinear Bilevel Programming Problems Using Improved Particle Swarm Optimization Algorithm. CIS 2017: 16-19 - 2015
- [c22]Caiming Liu, Yan Zhang, Zhonghua Li, Jiandong Zhang, Hongying Qin, Jinquan Zeng:
Dynamic Defense Architecture for the Security of the Internet of Things. CIS 2015: 390-393 - [c21]Yan Zhang, Caiming Liu, Zhonghua Li, Hongying Qin, Qin Li, Jinquan Zeng:
Immunity-Based Detection for Large-Scale Behavior of Denial of Service. CIS 2015: 437-440 - [c20]Qin Li, Caiming Liu, Jin Yang:
Effective lossless compression of fixed-length data. FSKD 2015: 1913-1918 - [c19]Zhonghua Li, Caiming Liu, Jin Yang, Anping Zhao:
Constructing an Emerging Semantic Supported Intelligence Learning Network for Web-Based Learning. SKG 2015: 49-56 - [c18]Yan Zhang, Caiming Liu, Qin Li, Zhonghua Li, Hongying Qin, Jinquan Zeng:
Clonal Selection-Based Surveillance Algorithm for Transmission Control Protocol Anomaly Network Behavior. SKG 2015: 168-173 - 2013
- [j2]Caiming Liu, Yan Zhang, Zongyin Cai, Jin Yang, Lingxi Peng:
Artificial Immunity-based Security Response Model for the Internet of Things. J. Comput. 8(12): 3111-3118 (2013) - [j1]Jin Yang, Cilin Wang, Caiming Liu, Le Yu:
Cloud Computing for Network Security Intrusion Detection System. J. Networks 8(1): 140-147 (2013) - [c17]Caiming Liu, Yan Zhang, Huaqiang Zhang:
A Novel Approach to IoT Security Based on Immunology. CIS 2013: 771-775 - [c16]Qin Li, Jin Yang, Caiming Liu:
A real-time algorithm for fixed-length short data compression. FSKD 2013: 1045-1049 - [c15]Yan Zhang, Caiming Liu, Hongying Qin:
Artificial immunity-based anomaly detection of network user behavior. ICNC 2013: 644-648 - 2012
- [c14]Caiming Liu, Chunming Xie, Yan Zhang, Qin Li, Lingxi Peng:
An Architecture for Cloud Computing and Human Immunity Based Network Intrusion Detection. AICI 2012: 309-316 - [c13]Jinquan Zeng, Weiwen Tang, Caiming Liu, Jianbin Hu, Lingxi Peng:
Real-Valued Negative Selection Algorithm with Variable-Sized Self Radius. ICICA (LNCS) 2012: 229-235 - [c12]Jin Yang, Cilin Wang, Le Yu, Caiming Liu, Lingxi Peng:
Network Security Evaluation Model Based on Cloud Computing. ICICA (2) 2012: 488-495 - [c11]Jinquan Zeng, Weiwen Tang, Caiming Liu, Jianbin Hu, Lingxi Peng:
Efficient Detect Scheme of Botnet Command and Control Communication. ICICA (1) 2012: 576-581 - [c10]Caiming Liu, Yan Zhang, Jinquan Zeng, Lingxi Peng, Run Chen:
Research on Dynamical Security Risk Assessment for the Internet of Things inspired by immunology. ICNC 2012: 874-878 - 2011
- [c9]Caiming Liu, Run Chen, Yan Zhang, Luxin Xiao, Chao Chen, Jin Yang:
A Distributed Surveillance Model for Network Security Inspired by Immunology. AICI (2) 2011: 53-60 - [c8]Caiming Liu, Jin Yang, Run Chen, Yan Zhang, Jinquan Zeng:
Research on immunity-based intrusion detection technology for the Internet of Things. ICNC 2011: 212-216
2000 – 2009
- 2007
- [c7]Caiming Liu, Tao Li, Hui Zhao, Lingxi Peng, Jinquan Zeng, Yan Zhang:
Exploration of Network Security Information Hid in Web Pages Based on Immunology. FSKD (1) 2007: 587-591 - [c6]Caiming Liu, XiaoJie Liu, Tao Li, Lingxi Peng, Jinquan Zeng, Hui Zhao:
Artificial Immunity-Based Discovery for Popular Information in WEB Pages. International Conference on Computational Science (4) 2007: 166-169 - [c5]Lingxi Peng, Yinqiao Peng, XiaoJie Liu, Caiming Liu, Jinquan Zeng, Feixian Sun, Zhengtian Lu:
A Supervised Classifier Based on Artificial Immune System. International Conference on Computational Science (2) 2007: 355-362 - [c4]Jinquan Zeng, Tao Li, Xiaojie Liu, Caiming Liu, Lingxi Peng, Feixian Sun:
A Feedback Negative Selection Algorithm to Anomaly Detection. ICNC (3) 2007: 604-608 - [c3]Diangang Wang, Tao Li, SunJun Liu, Jianhua Zhang, Caiming Liu:
Dynamical Network Forensics Based on Immune Agent. ICNC (3) 2007: 651-656 - [c2]Lingxi Peng, Zhengde Li, Jinquan Zeng, Jian Zhang, Caiming Liu, ChunLin Liang:
A Computer Forensics Model Based On Danger Theory. IITA 2007: 87-90 - 2006
- [c1]Jinquan Zeng, XiaoJie Liu, Tao Li, Feixian Sun, Lingxi Peng, Caiming Liu:
An Immune-Based Model for Service Survivability. CANS 2006: 354-363
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint