Books
1.《现代支付系统概论》,副主编,西南财经大学出版社,32.5万字,2010年 2.《C++程序设计基础》,副主编,电子工业出版社,75万字,2003年 Journal Papers 3. Zhijun Ding, Youqing Sun, Junjun Liu, Meiqin Pan, Jiafen Liu*. A Genetic Algorithm Based Approach to Transactional and Qos-Aware Service Selection Enterprise Information Systems, 2015,http://dx.doi.org/10.1080/ 17517575.2015.1048832 4. Yuanzhu Chen, Xu Liu, Jiafen Liu*, et al. Delay-tolerant networks and network coding: Comparative studies on simulated and real-device experiments. Computer Networks 83 (2015): 349–362 5. 刘家芬. 基于串空间理论的安全协议自动验证,计算机应用,2015,35(7):1870-1876. 6. 蒋李灵,刘家芬*.基于键盘行为数据的用户身份识别.计算机应用,2015,35(S1):110-112,129 7. 徐小凤,刘家芬*.基于密度的空间数据聚类的正常用户筛选方法. 计算机应用,2015,35(S1): 43-46 8. 胡芳,徐赟,钟梅,刘家芬. 商盟对网上购物影响的实证分析, 系统管理学报,2015,24 (5): 654-663. 9. Kang Li, Tang XiaoHu, Liu JiaFen. Tight chosen ciphertext attack(CCA)-secure hybrid encryption scheme with full public verifiability,Science China Information Sciences, 57(11):162-175,2014. 10. 康立, 刘家芬. 无线传感器网络中一次性数字签名算法设计, 计算机工程, 40(12):97-103, 2014. 11. Liu Jiafen and Zhou Mingtian .Breaking through the Limitation on Authentication Test, in Journal of Software, 20(10):2799-2809, 2009. 12. Liu Jiafen and Zhou Mingtian.Research and Improvement on Authentication Test’s Limitation, in High technology Letters, 14(2):20-24, 2008. 13. Liu Jiafen and Zhou Mingtian.Research and Taxonomy of Replay Attacks on Security Protocol,in Application Research of Computers,24(3):135-139, 2007. 14. Liu Jiafen and Zhou Mingtian.Verification of X.509 with Authentication Test. in Computer Engineering and Applications, 42(8):23-25, 2006. 15. Liu Jiafen, Liu Bo, She Kun, and Zhou Mingtian.Intrusion Detection System Model Based On Artificial Immunity, in Computer Engineering and Applications, 21(a):119-121, 2004. 16. 吴敬花, 周启海, 刘家芬. 现代支付系统信息安全的反欺诈监测模型研究,计算机科学,37(12):76-80,2010 Conference Papers 17. Nan Li, Jiafen Liu*, et al. Online Signature Verification Based on Biometric Features. HICSS 2016. 18. Yong Liu,Jiafen Liu*, et al. I Know It’s You: Touch Behavioral Characteristics Recognition on Smartphone Based on Pattern Password. PACIS 2015. 19. Jiafen Liu, Qixu Gong, Tiejun Wang, Wen Zhu, Qing Li. Looking For Gold in the Sands: stock market prediction using financial news and social media, PACIS 2013, 2013 20. Xiumeng Han, Jiafen Liu*. Improved Authentication Tests Theory and its Application in E-commerce Protocols, In: the Proc. of 5th International Conference on Management of e-Commerce and e-Government (ICMeCG),2011. 21. Liu Jiafen, Luo Xubin, Han Xiumeng. Formal Verificaiton of Protocols in E-commerce. In: the Proc of 4th International Conference on Management of e-Commerce and e- Government ( ICMeCG) , 2010. 22. Jia Wang, Qing Li, Yuanzhu Peter Chen,Jiafen Liu, Chen Zhang, Zhangxi Lin. News Recommendation in Forum-Based Social Media. In: the Proc. of 24th AAAI Conference on Artificial Intelligence (AAAI), 2010. 23. Xubin Luo, Jie Ma, Qing Li, Jiafen Liu. A Dynamic Wireless Spectrum Allocation Algorithm for Sliding Scheduled Demands. In: the Proc of 4th International Conference on Management of e-Commerce and e- Government ( ICMeCG) , 2010. 24. Liu Jiafen,and Zhou Mingtian. General Authentication Test. In: the Proc of 2008 International Conference on Security and Management(SAM’08), 2008 25. Liu Jiafen,and Zhou Mingtian. Security Protocol Analysis with Improved Authentication Test.In: the 1st International Workshop on Security of Computer Communications and Networks (ICCCN), 2008 26. Liu Jiafen,and Zhou Mingtian. Designing Authentication Protocols via Authentication Test. In:the Proc of IEEE Symposium on Computers and Communications (ISCC), 2007 27. Liu Jiafen, and Zhou Mingtian. Research and Taxonomy of Replay Attacks on Security Protocol. In: the Proc of National Symposiumon Computer Science and Technology (CACIS), 2007
|