Остановите войну!
for scientists:
default search action
An Liu
Publications
- 2024
- [j21]An Liu, Ming Gao, Jiafu Tang:
Multi-Mode Instance-Intensive Workflow Task Batch Scheduling in Containerized Hybrid Cloud. IEEE Trans. Cloud Comput. 12(1): 159-173 (2024) - [i6]Zonghan Yang, An Liu, Zijun Liu, Kaiming Liu, Fangzhou Xiong, Yile Wang, Zeyuan Yang, Qingyuan Hu, Xinrui Chen, Zhenhe Zhang, Fuwen Luo, Zhicheng Guo, Peng Li, Yang Liu:
Towards Unified Alignment Between Agents, Humans, and Environment. CoRR abs/2402.07744 (2024) - [i5]An Liu, Zonghan Yang, Zhenhe Zhang, Qingyuan Hu, Peng Li, Ming Yan, Ji Zhang, Fei Huang, Yang Liu:
PANDA: Preference Adaptation for Enhancing Domain-Specific Abilities of LLMs. CoRR abs/2402.12835 (2024) - 2023
- [j20]Suping Zhao, Zhanxia Zhu, Chaobo Chen, Yushuang Du, Xiaohua Song, Kun Yan, Dacheng Jiang, Lin Li, An Liu:
Trajectory Planning of redundant Space manipulators for Multi-Tasks, 344-351. Int. J. Robotics Autom. 38(5) (2023) - [c28]Fengheng Li, An Liu, Wei Feng, Honghe Zhu, Yaoyu Li, Zheng Zhang, Jingjing Lv, Xin Zhu, Junjie Shen, Zhangang Lin, Jingping Shao:
Relation-Aware Diffusion Model for Controllable Poster Layout Generation. CIKM 2023: 1249-1258 - [c27]Huan Zhou, An Liu, Haiyun Li:
UAV Air Combat Situation Assessment Method based on Improved Clustering and Self-Learning Network. EITCE 2023: 1753-1759 - [c26]Jielong Liu, Chang Wu, Tao Guo, Kai Wang, Chengcheng Li, An Liu, Rui Zhou, Zhen Huang, Jiayan Wu, Minhan Mi, Xiaohua Ma:
Millimeter-Wave AlGaN/GaN MIS-HEMTs with Multiple T-Gate Technology. ICTA 2023: 1-2 - [i4]Fengheng Li, An Liu, Wei Feng, Honghe Zhu, Yaoyu Li, Zheng Zhang, Jingjing Lv, Xin Zhu, Junjie Shen, Zhangang Lin, Jingping Shao:
Relation-Aware Diffusion Model for Controllable Poster Layout Generation. CoRR abs/2306.09086 (2023) - [i3]Yang Jin, Kun Xu, Kun Xu, Liwei Chen, Chao Liao, Jianchao Tan, Quzhe Huang, Bin Chen, Chenyi Lei, An Liu, Chengru Song, Xiaoqiang Lei, Di Zhang, Wenwu Ou, Kun Gai, Yadong Mu:
Unified Language-Vision Pretraining in LLM with Dynamic Discrete Visual Tokenization. CoRR abs/2309.04669 (2023) - [i2]Zhaochen Li, Fengheng Li, Wei Feng, Honghe Zhu, An Liu, Yaoyu Li, Zheng Zhang, Jingjing Lv, Xin Zhu, Junjie Shen, Zhangang Lin, Jingping Shao, Zhenglu Yang:
Planning and Rendering: Towards End-to-End Product Poster Generation. CoRR abs/2312.08822 (2023) - 2022
- [i1]Hao Peng, An Liu, Jingcheng Huang, Jikai Liu, Lin Lu:
DH-Net: Deformed Microstructure Homogenization via 3D Convolutional Neural Networks. CoRR abs/2201.09672 (2022) - 2021
- [j19]An Liu, Xia Huang, Yingjie Fan, Zhen Wang:
A control-interval-dependent functional for exponential stabilization of neural networks via intermittent sampled-data control. Appl. Math. Comput. 411: 126494 (2021) - [j18]Peiqing Liu, An Liu, Hao Peng, Lihao Tian, Jikai Liu, Lin Lu:
Mechanical property profiles of microstructures via asymptotic homogenization. Comput. Graph. 100: 106-115 (2021) - 2020
- [j17]Ming Gao, Mingxia Chen, An Liu, Wai-Hung Ip, Kai-Leung Yung:
Optimization of Microservice Composition Based on Artificial Immune Algorithm Considering Fuzziness and User Preference. IEEE Access 8: 26385-26404 (2020) - [j16]Guoming Chen, An Liu, Junhua Hu, Jinfu Feng, Zongcheng Ma:
Attitude and Altitude Control of Unmanned Aerial-Underwater Vehicle Based on Incremental Nonlinear Dynamic Inversion. IEEE Access 8: 156129-156138 (2020) - [j15]Qiang Zhang, Junhua Hu, Jinfu Feng, An Liu:
Multiple criteria decision making method based on the new similarity measures of Pythagorean fuzzy set. J. Intell. Fuzzy Syst. 39(1): 809-820 (2020) - 2019
- [j14]Zongcheng Ma, Junhua Hu, Jinfu Feng, An Liu:
Diving Adaptive Position Tracking Control for Underwater Vehicles. IEEE Access 7: 24602-24610 (2019) - [j13]Qiang Zhang, Junhua Hu, Jinfu Feng, An Liu, Yongli Li:
New Similarity Measures of Pythagorean Fuzzy Sets and Their Applications. IEEE Access 7: 138192-138202 (2019) - [j12]Danyang Li, Yongquan Liang, An Liu:
Modelling user pictures with hierarchical Dirichlet process of P2P lending market. Int. J. Comput. Sci. Math. 10(3): 297-312 (2019) - [j11]Zhang Qiang, Junhua Hu, Jinfu Feng, An Liu:
Air multi-target threat assessment method based on improved GGIFSS. J. Intell. Fuzzy Syst. 36(5): 4127-4139 (2019) - [c25]An Liu, ShaoLin Hu, Ming Wang, Jianguo Song:
Health Supervision Based on Low Rank Analysis for Aerospace Tracking. CAA SAFEPROCESS 2019: 519-522 - 2018
- [j10]Yuanjian Li, Rui Zhao, Lisheng Fan, An Liu:
Antenna Mode Switching for Full-Duplex Destination-Based Jamming Secure Transmission. IEEE Access 6: 9442-9453 (2018) - [c24]Yao Wang, Wei Pan, An Liu, Meng Xu:
A Method of Multi-attribute Group Decision-making Based on Nearness of Triangular Fuzzy Numbers. CSAI/ICIMT 2018: 252-257 - 2016
- [c20]Yi Yuan, Rui Zhao, Hongxin Lin, An Liu:
Secrecy outage probability of cognitive decode-and-forward relay networks. ICC Workshops 2016: 260-265 - 2014
- [c18]Limeng Cui, Fan Meng, Yong Shi, Minqiang Li, An Liu:
A Hierarchy Method Based on LDA and SVM for News Classification. ICDM Workshops 2014: 60-64 - 2013
- [j5]An Liu, Mihui Kim, Leonardo B. Oliveira, Hailun Tan:
Wireless Sensor Network Security. Int. J. Distributed Sens. Networks 9 (2013) - [j4]Dongjie Zhao, Zhongyi Wang, Jun Li, Xing Wen, An Liu, Lan Huang, Xiao-Dong Wang, Ruifeng Hou, Cheng Wang:
Recording extracellular signals in plants: A modeling and experimental study. Math. Comput. Model. 58(3-4): 556-563 (2013) - [j3]Yang Qin, Lan Huang, An Liu, Dongjie Zhao, Zhongyi Wang, Yi-min Liu, Tong-lin Mao:
Visualization of synchronous propagation of plant electrical signals using an optical recording method. Math. Comput. Model. 58(3-4): 661-669 (2013) - [c16]An Liu, Heng Wu, Yongzheng Li:
Gait transition of quadruped robot using rhythm control and stability analysis. ROBIO 2013: 2535-2539 - [c15]Shanglian Peng, Tianrui Li, Hongjun Wang, Jia He, Tiejun Wang, Fan Li, An Liu:
Efficient Complex Event Processing under Boolean Model. WAIM 2013: 631-642 - 2011
- [c14]Sangwon Hyun, Peng Ning, An Liu:
Mitigating Wireless Jamming Attacks via Channel Migration. ICDCS Workshops 2011: 313-322 - 2010
- [c13]An Liu, Peng Ning, Huaiyu Dai, Yao Liu, Cliff Wang:
Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure. ACSAC 2010: 367-376 - [c11]Yao Liu, Peng Ning, Huaiyu Dai, An Liu:
Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication. INFOCOM 2010: 695-703 - [c10]An Liu, Peng Ning, Huaiyu Dai, Yao Liu:
USD-FH: Jamming-resistant wireless communication using Frequency Hopping with Uncoordinated Seed Disclosure. MASS 2010: 41-50 - [c9]Xiaolong Liang, Jinfu Feng, An Liu:
A Modified D-S Decision-Making Algorithm for Multi-sensor Target Identification. ICSI (2) 2010: 343-350 - 2009
- [c8]An Liu, Peng Ning, Chun Wang:
Lightweight Remote Image Management for Secure Code Dissemination in Wireless Sensor Networks. INFOCOM 2009: 1242-1250 - [c7]Kun Sun, An Liu, Roger Xu, Peng Ning, W. Douglas Maughan:
Securing network access in wireless sensor networks. WISEC 2009: 261-268 - 2008
- [j2]Donggang Liu, Peng Ning, An Liu, Cliff Wang, Wenliang Du:
Attack-Resistant Location Estimation in Wireless Sensor Networks. ACM Trans. Inf. Syst. Secur. 11(4): 22:1-22:39 (2008) - [j1]Peng Ning, An Liu, Wenliang Du:
Mitigating DoS attacks against broadcast authentication in wireless sensor networks. ACM Trans. Sens. Networks 4(1): 1:1-1:35 (2008) - [c6]An Liu, Peng Ning:
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks. IPSN 2008: 245-256 - [c5]Sangwon Hyun, Peng Ning, An Liu, Wenliang Du:
Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks. IPSN 2008: 445-456 - [c4]An Liu, Young-Hyun Oh, Peng Ning:
Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks Using Seluge. IPSN 2008: 561-562 - [c3]Rui Guo, Guiran Chang, Yuhai Qin, Baojing Sun, An Liu, Bencheng Zhang, Dan Peng:
DG-Based Active Defense Strategy to Defend against DDoS. MUE 2008: 191-196 - 2007
- [c2]Rui Guo, Guiran Chang, Ruidong Hou, Yuhai Qin, Baojing Sun, An Liu, Yan Jia, Dan Peng:
Research on Counter Bandwidth Depletion DDoS Attacks Based on Genetic Algorithm. ICNC (4) 2007: 155-159 - [c1]Rui Guo, Guiran Chang, Ruidong Hou, Baojing Sun, An Liu, Bencheng Zhang:
Research on Counter Http DDoS Attacks based on Weighted Queue Random Early Drop . WOSIS 2007: 73-81
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-22 20:07 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint