Liya Su
Orcid: 0009-0000-9499-2298
  According to our database1,
  Liya Su
  authored at least 13 papers
  between 2017 and 2025.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
  2025
Can LLMs deeply detect complex malicious queries? A framework for jailbreaking via obfuscating intent.
    
  
    Comput. J., 2025
    
  
  2024
    Proceedings of the Computer Security - ESORICS 2024, 2024
    
  
The Janus Interface: How Fine-Tuning in Large Language Models Amplifies the Privacy Risks.
    
  
    Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
    
  
  2023
The Janus Interface: How Fine-Tuning in Large Language Models Amplifies the Privacy Risks.
    
  
    CoRR, 2023
    
  
  2021
Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized Applications.
    
  
    Proceedings of the 30th USENIX Security Symposium, 2021
    
  
  2019
STDeepGraph: Spatial-Temporal Deep Learning on Communication Graphs for Long-Term Network Attack Detection.
    
  
    Proceedings of the 18th IEEE International Conference On Trust, 2019
    
  
Understanding the Influence of Graph Kernels on Deep Learning Architecture: A Case Study of Flow-Based Network Attack Detection.
    
  
    Proceedings of the 18th IEEE International Conference On Trust, 2019
    
  
Marrying Graph Kernel with Deep Neural Network: A Case Study for Network Anomaly Detection.
    
  
    Proceedings of the Computational Science - ICCS 2019, 2019
    
  
  2018
    计算机科学, 2018
    
  
Hierarchical Clustering Based Network Traffic Data Reduction for Improving Suspicious Flow Detection.
    
  
    Proceedings of the 17th IEEE International Conference On Trust, 2018
    
  
DeepGFL: Deep Feature Learning via Graph for Attack Detection on Flow-Based Network Traffic.
    
  
    Proceedings of the 2018 IEEE Military Communications Conference, 2018
    
  
A Novel Approach for Identifying Lateral Movement Attacks Based on Network Embedding.
    
  
    Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018
    
  
  2017
    Proceedings of the Information Security and Cryptology - 13th International Conference, 2017