Baoxu Liu

According to our database1, Baoxu Liu authored at least 44 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
AppChainer: investigating the chainability among payloads in android applications.
Cybersecur., December, 2023

Sherlock on Specs: Building LTE Conformance Tests through Automated Reasoning.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
NDFuzz: a non-intrusive coverage-guided fuzzing framework for virtualized network devices.
Cybersecur., 2022

TIM: threat context-enhanced TTP intelligence mining on unstructured threat data.
Cybersecur., 2022

Blockchain abnormal behavior awareness methods: a survey.
Cybersecur., 2022

Modx: Binary Level Partial Imported Third-Party Library Detection through Program Modularization and Semantic Matching.
CoRR, 2022

Malware detection method based on image analysis and generative adversarial networks.
Concurr. Comput. Pract. Exp., 2022

BASNEA: Threat Hunting for Ethereum Smart Contract Based on Backtrackless Aligned-Spatial Network Entity Alignment.
Proceedings of the Science of Cyber Security - 4th International Conference, 2022

ModX: Binary Level Partially Imported Third-Party Library Detection via Program Modularization and Semantic Matching.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

Time Series Attention Based Transformer Neural Turing Machines for Diachronic Graph Embedding in Cyber Threat Intelligence.
Proceedings of the Computational Science - ICCS 2022, 2022

The Hyperbolic Temporal Attention Based Differentiable Neural Turing Machines for Diachronic Graph Embedding in Cyber Threat Intelligence.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

2021
MBTree: Detecting Encryption RATs Communication Using Malicious Behavior Tree.
IEEE Trans. Inf. Forensics Secur., 2021

ESRFuzzer: an enhanced fuzzing framework for physical SOHO router devices to discover multi-Type vulnerabilities.
Cybersecur., 2021

Automated Honey Document Generation Using Genetic Algorithm.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized Applications.
Proceedings of the 30th USENIX Security Symposium, 2021

Bookworm Game: Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Trojan Traffic Detection Based on Meta-learning.
Proceedings of the Computational Science - ICCS 2021, 2021

BEDIM: Lateral Movement Detection In Enterprise Network Through Behavior Deviation Measurement.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

APT Behaviors Detection Based on Email Business Scenarios.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

Producing More with Less: A GAN-based Network Attack Detection Approach for Imbalanced Data.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

Spear Phishing Emails Detection Based on Machine Learning.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

Ghost in the Binder: Binder Transaction Redirection Attacks in Android System Services.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
THS-IDPC: A three-stage hierarchical sampling method based on improved density peaks clustering algorithm for encrypted malicious traffic detection.
J. Supercomput., 2020

Malware classification for the cloud via semi-supervised transfer learning.
J. Inf. Secur. Appl., 2020

MBTree: Detecting Encryption RAT Communication Using Malicious Behavior Tree.
CoRR, 2020

CETAnalytics: Comprehensive effective traffic information analytics for encrypted traffic classification.
Comput. Networks, 2020

RouAlign: Cross-Version Function Alignment and Routine Recovery with Graphlet Edge Embedding.
Proceedings of the ICT Systems Security and Privacy Protection, 2020

2019
Integrated fault propagation model based vulnerability assessment of the electrical cyber-physical system under cyber attacks.
Reliab. Eng. Syst. Saf., 2019

STDeepGraph: Spatial-Temporal Deep Learning on Communication Graphs for Long-Term Network Attack Detection.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Understanding the Influence of Graph Kernels on Deep Learning Architecture: A Case Study of Flow-Based Network Attack Detection.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Marrying Graph Kernel with Deep Neural Network: A Case Study for Network Anomaly Detection.
Proceedings of the Computational Science - ICCS 2019, 2019

An Approach for Scale Suspicious Network Events Detection.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

SRFuzzer: an automatic fuzzing framework for physical SOHO router devices to discover multi-type vulnerabilities.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
网络空间威胁情报共享技术综述 (Overview of Threat Intelligence Sharing Technologies in Cyberspace).
计算机科学, 2018

Hierarchical Clustering Based Network Traffic Data Reduction for Improving Suspicious Flow Detection.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A Quality Evaluation Method of Cyber Threat Intelligence in User Perspective.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A Systematic Method on PDF Privacy Leakage Issues.
Proceedings of the 17th IEEE International Conference On Trust, 2018

New Security Attack and Defense Mechanisms Based on Negative Logic System and Its Applications.
Proceedings of the Science of Cyber Security - First International Conference, 2018

Trusted Secure Accessing Protection Framework Based on Cloud-Channel-Device Cooperation.
Proceedings of the Cyber Security - 15th International Annual Conference, 2018

Research on Identity Authentication Method Based on Negative Logic System.
Proceedings of the Cyber Security - 15th International Annual Conference, 2018

2017
LQR lateral-directional control law design for distributed propulsion layout flying wing.
Proceedings of the 2017 IEEE International Conference on Cybernetics and Intelligent Systems (CIS) and IEEE Conference on Robotics, 2017

State-of-the-Art: Security Competition in Talent Education.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

2016
Framework of Cyber Attack Attribution Based on Threat Intelligence.
Proceedings of the Interoperability, Safety and Security in IoT, 2016

2010
Attack Detection by Rough Set Theory in Recommendation System.
Proceedings of the 2010 IEEE International Conference on Granular Computing, 2010


  Loading...