Chao Liu

Affiliations:
  • Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China
  • University of Chinese Academy of Sciences, School of Cyber Security, Beijing, China


According to our database1, Chao Liu authored at least 57 papers between 2016 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
GHGA-Net: Global Heterogeneous Graph Attention Network for Chinese Short Text Classification.
Proceedings of the PRICAI 2023: Trends in Artificial Intelligence, 2023

Intrusion Detection Method for SCADA System Based on Spatio-Temporal Characteristics.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

LADA-Trans-NER: Adaptive Efficient Transformer for Chinese Named Entity Recognition Using Lexicon-Attention and Data-Augmentation.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
A highly reliable cross-domain identity authentication protocol based on blockchain in edge computing environment.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

2021
FakeFilter: A cross-distribution Deepfake detection system with domain adaptation.
J. Comput. Secur., 2021

An end-to-end text spotter with text relation networks.
Cybersecur., 2021

NFDD: A Dynamic Malicious Document Detection Method Without Manual Feature Dictionary.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

Aspect and Opinion Terms Co-extraction Using Position-Aware Attention and Auxiliary Labels.
Proceedings of the Knowledge Science, Engineering and Management, 2021

Landscape-Enhanced Graph Attention Network for Rumor Detection.
Proceedings of the Knowledge Science, Engineering and Management, 2021

Adaptive Smooth L1 Loss: A Better Way to Regress Scene Texts with Extreme Aspect Ratios.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

UTANSA: Static Approach for Multi-Language Malicious Web Scripts Detection.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

A Self-Sovereign Decentralized Identity Platform Based on Blockchain.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

FUNC-ESIM: A Dual Pairwise Attention Network for Cross-version Binary Function Matching.
Proceedings of the International Joint Conference on Neural Networks, 2021

Detecting Malicious PDF Documents Using Semi-Supervised Machine Learning.
Proceedings of the Advances in Digital Forensics XVII, 2021

A Contextual and Content Features-Based Device Behavioral Fingerprinting Method in Smart Grid.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

A Residual Fingerprint-Based Defense Against Adversarial Deepfakes.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

Achieve Better Endorsement Balance on Blockchain Systems.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

A Novel Trojan Attack against Co-learning Based ASR DNN System.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

CallChain: Identity Authentication Based on Blockchain for Telephony Networks.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

2020
Depthwise Separable Convolutional Neural Network for Confidential Information Analysis.
Proceedings of the Knowledge Science, Engineering and Management, 2020

A Robust Representation with Pre-trained Start and End Characters Vectors for Noisy Word Recognition.
Proceedings of the Knowledge Science, Engineering and Management, 2020

SCX-SD: Semi-supervised Method for Contextual Sarcasm Detection.
Proceedings of the Knowledge Science, Engineering and Management, 2020

CES2Vec: A Confidentiality-Oriented Word Embedding for Confidential Information Detection.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

Enhancing the Feature Profiles of Web Shells by Analyzing the Performance of Multiple Detectors.
Proceedings of the Advances in Digital Forensics XVI, 2020

A Machine Learning-Assisted Compartmentalization Scheme for Bare-Metal Systems.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020

A Spatial-Temporal Features Based Fingerprinting Method for Machine tools in DNC Networks.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

HeterSupervise: Package-level Android Malware Analysis Based on Heterogeneous Graph.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

LAPE: A Lightweight Attestation of Program Execution Scheme for Bare-Metal Systems.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

Similarity of Binaries Across Optimization Levels and Obfuscation.
Proceedings of the Computer Security - ESORICS 2020, 2020

CIDetector: Semi-Supervised Method for Multi-Topic Confidential Information Detection.
Proceedings of the ECAI 2020 - 24th European Conference on Artificial Intelligence, 29 August-8 September 2020, Santiago de Compostela, Spain, August 29 - September 8, 2020, 2020

2019
Malicious documents detection for business process management based on multi-layer abstract model.
Future Gener. Comput. Syst., 2019

Anomaly Detection with Graph Convolutional Networks for Insider Threat and Fraud Detection.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

Warder: Online Insider Threat Detection System Using Multi-Feature Modeling and Graph-Based Correlation.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

Machine Tools Fingerprinting for Distributed Numerical Control Systems.
Proceedings of the 44th IEEE Conference on Local Computer Networks, 2019

A Two-Stage Model Based on BERT for Short Fake News Detection.
Proceedings of the Knowledge Science, Engineering and Management, 2019

SwiftFabric: Optimizing Fabric Private Data Transaction Flow TPS.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019

Android Malware Family Classification Based on Sensitive Opcode Sequence.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

EASVD: A Modified Method to Enhance the Authentication for SPICE Virtual Desktop.
Proceedings of the 25th IEEE International Conference on Parallel and Distributed Systems, 2019

Restoration as a Defense Against Adversarial Perturbations for Spam Image Detection.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2019: Image Processing, 2019

A Unified Malicious Documents Detection Model Based on Two Layers of Abstraction.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

WMUD: A Whitelist Method of USB Devices Redirection for Virtual Desktop.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

2018
ALDD: A Hybrid Traffic-User Behavior Detection Method for Application Layer DDoS.
Proceedings of the 17th IEEE International Conference On Trust, 2018

FGFDect: A Fine-Grained Features Classification Model for Android Malware Detection.
Proceedings of the Security and Privacy in Communication Networks, 2018

AdvRefactor: A Resampling-Based Defense Against Adversarial Attacks.
Proceedings of the Advances in Multimedia Information Processing - PCM 2018, 2018

Prediction and Detection of Malicious Insiders' Motivation Based on Sentiment Profile on Webpages and Emails.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

MRDroid: A Multi-act Classification Model for Android Malware Risk Assessment.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018

Sentiment Embedded Semantic Space for More Accurate Sentiment Analysis.
Proceedings of the Knowledge Science, Engineering and Management, 2018

PSDEM: A Feasible De-Obfuscation Method for Malicious PowerShell Detection.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018

MPP: A Join-dividing Method for Multi-table Privacy Preservation.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018

URefFlow: A Unified Android Malware Detection Model Based on Reflective Calls.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018

2017
A New Digital Watermarking Method for Data Integrity Protection in the Perception Layer of IoT.
Secur. Commun. Networks, 2017

FEPDF: A Robust Feature Extractor for Malicious PDF Detection.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

A Deep Learning Based Online Malicious URL and DNS Detection Scheme.
Proceedings of the Security and Privacy in Communication Networks, 2017

A Visualization Scheme for Network Forensics Based on Attribute Oriented Induction Based Frequent Item Mining and Hyper Graph.
Proceedings of the Digital Forensics and Cyber Crime - 9th International Conference, 2017

2016
Lossless and High Robust Watermarking of Electronic Chart for Copyright Protection.
Proceedings of the Social Computing, 2016

A Proactive Forensics Approach for Virtual Machines via Dynamic and Static Analysis.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

SPLM: Security Protection of Live Virtual Machine Migration in Cloud Computing.
Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, 2016


  Loading...