Qixu Liu

Orcid: 0000-0003-0895-9585

According to our database1, Qixu Liu authored at least 62 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A comprehensive analysis of website fingerprinting defenses on Tor.
Comput. Secur., January, 2024

2023
Detecting compromised email accounts via login behavior characterization.
Cybersecur., December, 2023

MRm-DLDet: a memory-resident malware detection framework based on memory forensics and deep neural network.
Cybersecur., December, 2023

BugRadar: Bug localization by knowledge graph link prediction.
Inf. Softw. Technol., 2023

TFE-GNN: A Temporal Fusion Encoder Using Graph Neural Networks for Fine-grained Encrypted Traffic Classification.
Proceedings of the ACM Web Conference 2023, 2023

BehavSniffer: Sniff User Behaviors from the Encrypted Traffic by Traffic Burst Graphs.
Proceedings of the 20th Annual IEEE International Conference on Sensing, 2023

Phish2vec: A Temporal and Heterogeneous Network Embedding Approach for Detecting Phishing Scams on Ethereum.
Proceedings of the 20th Annual IEEE International Conference on Sensing, 2023

IMaler: An Adversarial Attack Framework to Obfuscate Malware Structure Against DGCNN-Based Classifier via Reinforcement Learning.
Proceedings of the IEEE International Conference on Communications, 2023

Tabby: Automated Gadget Chain Detection for Java Deserialization Vulnerabilities.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

DeepCall: A Fast and Robust Malware Classification System with DGCNN and Function Call Graph.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

AAP: Defending Against Website Fingerprinting Through Burst Obfuscation.
Proceedings of the Advanced Data Mining and Applications - 19th International Conference, 2023

ANDetect: A Third-party Ad Network Libraries Detection Framework for Android Applications.
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
A lightweight DDoS detection scheme under SDN context.
Cybersecur., December, 2022

CPGBERT: An Effective Model for Defect Detection by Learning Program Semantics via Code Property Graph.
Proceedings of the IEEE International Conference on Trust, 2022

DroidFP: A Zero-Permission Detection Framework for Android Devices Based on Gated Recurrent Unit.
Proceedings of the Science of Cyber Security - 4th International Conference, 2022

DeepC2: AI-Powered Covert Command and Control on OSNs.
Proceedings of the Information and Communications Security - 24th International Conference, 2022

P-Verifier: Understanding and Mitigating Security Risks in Cloud-based IoT Access Policies.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Automated Honey Document Generation Using Genetic Algorithm.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

Crafting Adversarial Example to Bypass Flow-&ML- based Botnet Detector via RL.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

GAN-Based Adversarial Patch for Malware C2 Traffic to Bypass DL Detector.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

APT Behaviors Detection Based on Email Business Scenarios.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

2020
AI-powered Covert Botnet Command and Control on OSNs.
CoRR, 2020

CoinBot: A Covert Botnet in the Cryptocurrency Network.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020

A Systematic Study of AI Applications in Cybersecurity Competitions.
Proceedings of the 14th IEEE International Conference on Big Data Science and Engineering, 2020

2019
WSLD: Detecting Unknown Webshell Using Fuzzy Matching and Deep Learning.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

Evading Machine Learning Botnet Detection Models via Deep Reinforcement Learning.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

A Quantitative Approach for Medical Imaging Device Security Assessment.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

DGA and DNS Covert Channel Detection System based on Machine Learning.
Proceedings of the 3rd International Conference on Computer Science and Application Engineering, 2019

Android Malware Detection Based on Convolutional Neural Networks.
Proceedings of the 3rd International Conference on Computer Science and Application Engineering, 2019

Honeynet Construction Based on Intrusion Detection.
Proceedings of the 3rd International Conference on Computer Science and Application Engineering, 2019

DICOM-Fuzzer: Research on DICOM Vulnerability Mining Based on Fuzzing Technology.
Proceedings of the Communications and Networking, 2019

Medical Protocol Security: DICOM Vulnerability Mining Based on Fuzzing Technology.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
An adaptive system for detecting malicious queries in web attacks.
Sci. China Inf. Sci., 2018

An Empirical Study of OAuth-Based SSO System on Web.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

Practical Metrics for Evaluating Anonymous Networks.
Proceedings of the Science of Cyber Security - First International Conference, 2018

RansomTracer: Exploiting Cyber Deception for Ransomware Tracing.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

A Novel Approach for Detecting Browser-Based Silent Miner.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Micro-Honeypot: Using Browser Fingerprinting to Track Attackers.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

2017
Driving Android apps to trigger target API invocations based on activity and GUI filtering.
Sci. China Inf. Sci., 2017

A static technique for detecting input validation vulnerabilities in Android apps.
Sci. China Inf. Sci., 2017

2016
A Machine Learning Approach for Detecting Third-Party Trackers on the Web.
Proceedings of the Computer Security - ESORICS 2016, 2016

Fingerprinting Web Browser for Tracing Anonymous Web Attackers.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

2015
TrackerDetector: A system to detect third-party trackers through machine learning.
Comput. Networks, 2015

XAS: Cross-API scripting attacks in social ecosystems.
Sci. China Inf. Sci., 2015

IVDroid: Static Detection for Input Validation Vulnerability in Android Inter-component Communication.
Proceedings of the Information Security Practice and Experience, 2015

A fuzzing test for dynamic vulnerability detection on Android Binder mechanism.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Static detection of logic vulnerabilities in Java web applications.
Secur. Commun. Networks, 2014

Function Escalation Attack.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

POSTER: Recommendation-based Third-Party Tracking Monitor to Balance Privacy with Personalization.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
IKE vulnerability discovery based on fuzzing.
Secur. Commun. Networks, 2013

RPFuzzer: A Framework for Discovering Router Protocols Vulnerabilities Based on Fuzzing.
KSII Trans. Internet Inf. Syst., 2013

Fuzzing the ActionScript virtual machine.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

trend of online flash XSS vulnerabilities.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Improving VRSS-based vulnerability prioritization using analytic hierarchy process.
J. Syst. Softw., 2012

Dealing with dishonest recommendation: The trials in reputation management court.
Ad Hoc Networks, 2012

BlendFuzz: A Model-Based Framework for Fuzz Testing Programs with Grammatical Inputs.
Proceedings of the 11th IEEE International Conference on Trust, 2012

A research on vulnerability discovering for router protocols based on fuzzing.
Proceedings of the 7th International Conference on Communications and Networking in China, 2012

2011
VRSS: A new system for rating and scoring vulnerabilities.
Comput. Commun., 2011

A New Tree Structure for Weighted Dynamic Programming Based Stereo Algorithm.
Proceedings of the Sixth International Conference on Image and Graphics, 2011

3D LIDAR-based ground segmentation.
Proceedings of the First Asian Conference on Pattern Recognition, 2011

2010
Eliminating Human Specification in Static Analysis.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

2008
TFTP vulnerability finding technique based on fuzzing.
Comput. Commun., 2008


  Loading...