近期论文
查看导师新发文章
(温馨提示:请注意重名现象,建议点开原文通过作者单位确认)
Liang Gang,Rumor Identification in Microblogging Systems Based on Users' Behavior. IEEE Trans. Comput. Social Systems 2(3): 99-108 (2015)
Yang, J., Liu, X., Li, T., Liang, G., & Liu, S. (2009). Distributed agents model for intrusion detection based on AIS. Knowledge-based systems, 22(2), 115-119.
Gong, X., Li, T., Wang, T., Yang, J., Liu, S., & Liang, G. (2006). An immune mobile agent based grid intrusion detection model. In Simulated Evolution and Learning (pp. 112-119). Springer Berlin Heidelberg.
Liu, S., Li, T., Wang, D., Zhao, K., Gong, X., Hu, X., ... & Liang, G. (2006). Immune multi-agent active defense model for network intrusion. In Simulated Evolution and Learning (pp. 104-111). Springer Berlin Heidelberg.
Yang, J., Li, T., Liu, S., Wang, T., Wang, D., & Liang, G. (2007). Computer Forensics System Based on Artificial Immune Systems. J. UCS, 13(9), 1354-1365.
Li, Q., Li, Z., Liang, G., Zhang, J. Y., Chen, L. Y., & Li, B. (2007, August). IDGSC: An Immunity-Based Approach for Dynamic Grid Service Classification. In Fuzzy Systems and Knowledge Discovery, 2007. FSKD 2007. Fourth International Conference on (Vol. 2, pp. 160-165). IEEE.
Gong X, Li T, Liang G, et al. Immunity and mobile agent based grid intrusion detection[M]//Computational Intelligence and Bioinformatics. Springer Berlin Heidelberg, 2006: 651-659.
Liang, G., Li, T., Ni, J., Jiang, Y., Yang, J., & Gong, X. (2006). An immunity-based dynamic multilayer intrusion detection system. In Computational Intelligence and Bioinformatics (pp. 641-650). Springer Berlin Heidelberg.
Yang, J., Li, T., Liu, S. J., & Liang, G. (2007, November). A Novel Network Security Evaluation System Based on Immune Principle. In Data, Privacy, and E-Commerce, 2007. ISDPE 2007. The First International Symposium on(pp. 484-489). IEEE.
Juan, L., Tao, L., & Gang, L. (2009, May). A Network Security Dynamic Situation Forecasting Method. In Information Technology and Applications, 2009. IFITA'09. International Forum on (Vol. 1, pp. 115-118). IEEE.
Gong, X., Li, T., Lu, J., Wang, T., Liang, G., Yang, J., & Sun, F. (2006). Immunity and mobile agent based intrusion detection for grid. In Agent Computing and Multi-Agent Systems (pp. 187-198). Springer Berlin Heidelberg.
Gong, X., Li, T., Wang, T., Yang, J., Liang, G., & Hu, X. (2006). Grid intrusion detection based on immune agent. In Advances in Natural Computation (pp. 73-82). Springer Berlin Heidelberg.
Wang, D. G., Li, T., Liu, S. J., Liang, G., & Zhao, K. (2008). An immune multi-agent system for network intrusion detection. In Advances in Computation and Intelligence (pp. 436-445). Springer Berlin Heidelberg.
Liang, G., Li, T., Gong, X., Jiang, Y., Yang, J., & Ni, J. (2006). NASC: a novel approach for spam classification. In Computational Intelligence and Bioinformatics (pp. 672-681). Springer Berlin Heidelberg.
Wan, Z., Liang, G., & Li, T. (2012). Multi-core processors based network intrusion detection method. Journal of Networks, 7(9), 1327-1333.
Liang G, He W, Xu C, et al. Rumor Identification in Microblogging Systems Based on Users’ Behavior[J]. IEEE Transactions on Computational Social Systems, 2015, 2(3): 99-108.
Wan Z, Liu X, Liang G. A Pipeline Model Based Intrusion Protection Method[C]//Proceedings of the 2012 Second International Conference on Electric Information and Control Engineering-Volume 01. IEEE Computer Society, 2012: 174-177.
Ziqian, W., Tao, L., & Gang, L. (2009, September). A Prediction Method of Network Security Situation. In Management and Service Science, 2009. MASS'09. International Conference on (pp. 1-4). IEEE.