default search action
Qingru Li
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Fangwei Wang, Xipeng Shi, Fang Yang, Ruixin Song, Qingru Li, Zhiyuan Tan, Changguang Wang:
MalSort: Lightweight and efficient image-based malware classification using masked self-supervised framework with Swin Transformer. J. Inf. Secur. Appl. 83: 103784 (2024) - [j8]Fangwei Wang, Meiyun Xie, Zhiyuan Tan, Qingru Li, Changguang Wang:
Preserving Differential Privacy in Deep Learning Based on Feature Relevance Region Segmentation. IEEE Trans. Emerg. Top. Comput. 12(1): 307-315 (2024) - 2023
- [c12]Fangwei Wang, Ruixin Song, Qingru Li, Changguang Wang:
Efficient Black-Box Adversarial Attacks with Training Surrogate Models Towards Speaker Recognition Systems. ICA3PP (5) 2023: 257-276 - [c11]Qingru Li, Yufei Zhang, Fangwei Wang, Changguang Wang:
An Android Malware Detection Method Based on Metapath Aggregated Graph Neural Network. ICA3PP (3) 2023: 344-357 - [c10]Fangwei Wang, Man Yan, Qingru Li, Changguang Wang:
A Multivariate Time Series Anomaly Detection Model Based on Spatio-Temporal Dual Features. NaNA 2023: 416-421 - [c9]Fangwei Wang, Ruixin Song, Zhiyuan Tan, Qingru Li, Changguang Wang, Yong Yang:
Self-attention is What You Need to Fool a Speaker Recognition System. TrustCom 2023: 929-936 - [c8]Qingru Li, Yahong Wang, Fangwei Wang, Zhiyuan Tan, Changguang Wang:
A Probability Mapping-Based Privacy Preservation Method for Social Networks. UbiSec 2023: 289-303 - 2022
- [j7]Fangwei Wang, Shaojie Yang, Changguang Wang, Qingru Li, Kehinde O. Babaagba, Zhiyuan Tan:
Toward machine intelligence that learns to fingerprint polymorphic worms in IoT. Int. J. Intell. Syst. 37(10): 7058-7078 (2022) - [j6]Jia Liu, Qingru Li, Chunyan Lin:
Do Listed Companies' Technological Innovations Make Institutional Investors' "Group Holdings" More Favorable?: Based on Network-Clustering. J. Organ. End User Comput. 34(8): 1-27 (2022) - [j5]Fangwei Wang, Guofang Chai, Qingru Li, Changguang Wang:
An Efficient Deep Unsupervised Domain Adaptation for Unknown Malware Detection. Symmetry 14(2): 296 (2022) - [c7]Fangwei Wang, Yuanyuan Lu, Qingru Li, Changguang Wang, Yonglei Bai:
A Co-evolutionary Algorithm-Based Malware Adversarial Sample Generation Method. DSC 2022: 1-8 - [c6]Qingru Li, Xinru Wang, Fangwei Wang, Changguang Wang:
A Label Flipping Attack on Machine Learning Model and Its Defense Mechanism. ICA3PP 2022: 490-506 - [c5]Dongmei Zhao, Yaxing Wu, Qingru Li:
Network Security Situation Prediction Implemented by Attention and BiLSTM. NaNA 2022: 213-219 - 2021
- [j4]Fangwei Wang, Shaojie Yang, Qingru Li, Changguang Wang:
An internet of things malware classification method based on mixture of experts neural network. Trans. Emerg. Telecommun. Technol. 32(5) (2021) - [j3]Changguang Wang, Ziqiu Zhao, Fangwei Wang, Qingru Li:
A Novel Malware Detection and Family Classification Scheme for IoT Based on DEAM and DenseNet. Secur. Commun. Networks 2021: 6658842:1-6658842:16 (2021) - [j2]Fangwei Wang, Yuanyuan Lu, Changguang Wang, Qingru Li:
Binary Black-Box Adversarial Attacks with Evolutionary Learning against IoT Malware Detection. Wirel. Commun. Mob. Comput. 2021: 8736946:1-8736946:9 (2021) - 2020
- [j1]Shixuan Li, Dongmei Zhao, Qingru Li:
A Framework for Predicting Network Security Situation Based on the Improved LSTM. EAI Endorsed Trans. Collab. Comput. 4(13): e5 (2020) - [c4]Fangwei Wang, Shaojie Yang, Changguang Wang, Qingru Li:
A Novel Intrusion Detection System for Malware Based on Time-Series Meta-learning. ML4CS (1) 2020: 50-64 - [c3]Fangwei Wang, Yuanyuan Lu, Qingru Li, Changguang Wang:
A Feature-Based Detection System of Adversarial Sample Attack. ML4CS (2) 2020: 494-500 - [c2]Fangwei Wang, Guofang Chai, Qingru Li, Changguang Wang:
MagNet with Randomization Defense against Adversarial Examples. NaNA 2020: 316-320
2010 – 2019
- 2017
- [c1]Qingru Li, Zhiyuan Tan, Aruna Jamdagni, Priyadarsi Nanda, Xiangjian He, Wei Han:
An Intrusion Detection System Based on Polynomial Feature Correlation Analysis. TrustCom/BigDataSE/ICESS 2017: 978-983
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-10 01:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint