Shigang Liu
Title
Cited by
Cited by
Year
Twitter spam detection based on deep learning
T Wu, S Liu, J Zhang, Y Xiang
Proceedings of the australasian computer science week multiconference, 1-8, 2017
792017
Addressing the class imbalance problem in Twitter spam detection using ensemble learning
S Liu, Y Wang, J Zhang, C Chen, Y Xiang
Computers & Security 69, 35-49, 2017
592017
An ensemble oversampling model for class imbalance problem in software defect prediction
S Huda, K Liu, M Abdelrazek, A Ibrahim, S Alyahya, H Al-Dossari, ...
IEEE access 6, 24184-24195, 2018
542018
Fuzzy-based information decomposition for incomplete and imbalanced data learning
S Liu, J Zhang, Y Xiang, W Zhou
IEEE Transactions on Fuzzy Systems 25 (6), 1476-1490, 2017
292017
Dynamic access point association using software defined networking
K Sood, S Liu, S Yu, Y Xiang
2015 International Telecommunication Networks and Applications Conference …, 2015
292015
A comparative study of the class imbalance problem in Twitter spam detection
C Li, S Liu
Concurrency and Computation: Practice and Experience 30 (5), e4281, 2018
252018
Statistical Detection of Online Drifting Twitter Spam
S Liu, J Zhang, Y Xiang
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
252016
Detecting spamming activities in twitter based on deep‐learning technique
T Wu, S Wen, S Liu, J Zhang, Y Xiang, M Alrubaian, MM Hassan
Concurrency and Computation: Practice and Experience 29 (19), e4209, 2017
172017
DeepBalance: Deep-learning and fuzzy oversampling for vulnerability detection
S Liu, G Lin, QL Han, S Wen, J Zhang, Y Xiang
IEEE Transactions on Fuzzy Systems 28 (7), 1329-1343, 2019
162019
Fuzzy-based feature and instance recovery
S Liu, J Zhang, Y Wang, Y Xiang
Asian Conference on Intelligent Information and Database Systems, 605-615, 2016
132016
A performance evaluation of deep‐learnt features for software vulnerability detection
X Ban, S Liu, C Chen, C Chua
Concurrency and Computation: Practice and Experience 31 (19), e5103, 2019
122019
An overview of attacks and defences on intelligent connected vehicles
M Dibaei, X Zheng, K Jiang, S Maric, R Abbas, S Liu, Y Zhang, Y Deng, ...
arXiv preprint arXiv:1907.07455, 2019
122019
Cyber vulnerability intelligence for Internet of Things binary
S Liu, M Dibaei, Y Tai, C Chen, J Zhang, Y Xiang
IEEE Transactions on Industrial Informatics 16 (3), 2154-2163, 2019
112019
An ensemble learning approach for addressing the class imbalance problem in Twitter spam detection
S Liu, Y Wang, C Chen, Y Xiang
Australasian Conference on Information Security and Privacy, 215-228, 2016
112016
Decision-based evasion attacks on tree ensemble classifiers
F Zhang, Y Wang, S Liu, H Wang
World Wide Web 23 (5), 2957-2977, 2020
82020
CD-VulD: Cross-domain vulnerability discovery based on deep domain adaptation
S Liu, G Lin, L Qu, J Zhang, O De Vel, P Montague, Y Xiang
IEEE Transactions on Dependable and Secure Computing, 2020
82020
Information-decomposition-model-based missing value estimation for not missing at random dataset
S Liu, H Dai, M Gan
International Journal of Machine Learning and Cybernetics 9 (1), 85-95, 2018
72018
Attacks and defences on intelligent connected vehicles: A survey
M Dibaei, X Zheng, K Jiang, R Abbas, S Liu, Y Zhang, Y Xiang, S Yu
Digital Communications and Networks, 2020
62020
A study of data pre-processing techniques for imbalanced biomedical data classification
S Liu, J Zhang, Y Xiang, W Zhou, D Xiang
International Journal of Bioinformatics Research and Applications 16 (3 …, 2020
52020
Examination of reliability of missing value recovery in data mining
S Liu, H Dai
2014 IEEE International Conference on Data Mining Workshop, 306-313, 2014
52014
The system can't perform the operation now. Try again later.
Articles 1–20