Chaoge Liu

Orcid: 0000-0002-8023-3941

According to our database1, Chaoge Liu authored at least 29 papers between 2011 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
A lightweight DDoS detection scheme under SDN context.
Cybersecur., December, 2022

EvilModel 2.0: Bringing Neural Network Models into Malware Attacks.
Comput. Secur., 2022

CPGBERT: An Effective Model for Defect Detection by Learning Program Semantics via Code Property Graph.
Proceedings of the IEEE International Conference on Trust, 2022

DeepC2: AI-Powered Covert Command and Control on OSNs.
Proceedings of the Information and Communications Security - 24th International Conference, 2022

Make Data Reliable: An Explanation-powered Cleaning on Malware Dataset Against Backdoor Poisoning Attacks.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
EvilModel 2.0: Hiding Malware Inside of Neural Network Models.
CoRR, 2021

Automated Honey Document Generation Using Genetic Algorithm.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

EvilModel: Hiding Malware Inside of Neural Network Models.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

GAN-Based Adversarial Patch for Malware C2 Traffic to Bypass DL Detector.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

2020
AI-powered Covert Botnet Command and Control on OSNs.
CoRR, 2020

CoinBot: A Covert Botnet in the Cryptocurrency Network.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020

A Systematic Study of AI Applications in Cybersecurity Competitions.
Proceedings of the 14th IEEE International Conference on Big Data Science and Engineering, 2020

2019
A Highly Efficient Remote Access Trojan Detection Method.
Int. J. Digit. Crime Forensics, 2019

2018
Automatically Traceback RDP-Based Targeted Ransomware Attacks.
Wirel. Commun. Mob. Comput., 2018

A Systematic Method on PDF Privacy Leakage Issues.
Proceedings of the 17th IEEE International Conference On Trust, 2018

RansomTracer: Exploiting Cyber Deception for Ransomware Tracing.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

MaliceScript: A Novel Browser-Based Intranet Threat.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Constructing Browser Fingerprint Tracking Chain Based on LSTM Model.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

A Method Based on Statistical Characteristics for Detection Malware Requests in Network Traffic.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Micro-Honeypot: Using Browser Fingerprinting to Track Attackers.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

2014
POSTER: Fingerprinting the Publicly Available Sandboxes.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

POSTER: Abusing URL Shortening Services for Stealthy and Resilient Message Transmitting.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

POSTER: A Lightweight Unknown HTTP Botnets Detecting and Characterizing System.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Botnet Triple-Channel Model: Towards Resilient and Efficient Bidirectional Communication Botnets.
Proceedings of the Security and Privacy in Communication Networks, 2013

Sniffing and propagating malwares through WPAD deception in LANs.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
The Triple-Channel Model: Toward Robust and Efficient Advanced Botnets (Poster Abstract).
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

Advanced triple-channel botnets: model and implementation.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
A recoverable hybrid C&C botnet.
Proceedings of the 6th International Conference on Malicious and Unwanted Software, 2011

Poster: recoverable botnets: a hybrid C&C approach.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011


  Loading...