default search action
Qixu Liu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Xi Xiao, Xiang Zhou, Zhenyu Yang, Le Yu, Bin Zhang, Qixu Liu, Xiapu Luo:
A comprehensive analysis of website fingerprinting defenses on Tor. Comput. Secur. 136: 103577 (2024) - [j17]Chunwen Liu, Ru Tan, Yang Wu, Yun Feng, Ze Jin, Fangjiao Zhang, Yuling Liu, Qixu Liu:
Dissecting zero trust: research landscape and its implementation in IoT. Cybersecur. 7(1): 20 (2024) - [c49]Jianjun Zhao, Ru Tan, Yaqin Cao, Xutong Wang, Qixu Liu, Xiang Cui:
MalPolymer: A Threat Identification System Utilizing Cognate Malicious Login Behavior Detection. CSCWD 2024: 1231-1237 - [c48]Jiaxi Liu, Kezhen Huang, Yun Feng, Canhua Chen, Jinli Zhang, Yuqi Shu, Xing Tian, Qixu Liu:
MemAPIDet: A Novel Memory-resident Malware Detection Framework Combining API Sequence and Memory Features. CSCWD 2024: 2918-2924 - [c47]Shaohui Jin, Qixu Liu, Hao Liu, Mingliang Xu:
TaDFusion: Infrared and Visible Image Fusion Network Based on The Target Detection Task-driven Method. IJCNN 2024: 1-8 - 2023
- [j16]Jiaxi Liu, Yun Feng, Xinyu Liu, Jianjun Zhao, Qixu Liu:
MRm-DLDet: a memory-resident malware detection framework based on memory forensics and deep neural network. Cybersecur. 6(1): 21 (2023) - [j15]Jianjun Zhao, Can Yang, Di Wu, Yaqin Cao, Yuling Liu, Xiang Cui, Qixu Liu:
Detecting compromised email accounts via login behavior characterization. Cybersecur. 6(1): 36 (2023) - [j14]Xi Xiao, Renjie Xiao, Qing Li, Jianhui Lv, Shunyan Cui, Qixu Liu:
BugRadar: Bug localization by knowledge graph link prediction. Inf. Softw. Technol. 162: 107274 (2023) - [c46]Xinyu Liu, Ze Jin, Jiaxi Liu, Wei Liu, Xiaoxi Wang, Qixu Liu:
ANDetect: A Third-party Ad Network Libraries Detection Framework for Android Applications. ACSAC 2023: 98-112 - [c45]Zhenyu Yang, Xi Xiao, Bin Zhang, Guangwu Hu, Qing Li, Qixu Liu:
AAP: Defending Against Website Fingerprinting Through Burst Obfuscation. ADMA (5) 2023: 107-121 - [c44]Yanhui Chen, Yun Feng, Chengchun Wang, Jianjun Zhao, Qixu Liu:
DeepCall: A Fast and Robust Malware Classification System with DGCNN and Function Call Graph. CSCWD 2023: 1402-1408 - [c43]Xingchen Chen, Baizhu Wang, Ze Jin, Yun Feng, Xianglong Li, Xincheng Feng, Qixu Liu:
Tabby: Automated Gadget Chain Detection for Java Deserialization Vulnerabilities. DSN 2023: 179-192 - [c42]Yanhui Chen, Yun Feng, Zhi Wang, Jianjun Zhao, Chengchun Wang, Qixu Liu:
IMaler: An Adversarial Attack Framework to Obfuscate Malware Structure Against DGCNN-Based Classifier via Reinforcement Learning. ICC 2023: 790-796 - [c41]Jinli Zhang, Feng Dai, Yaqin Cao, Ru Tan, Xiang Cui, Qixu Liu:
SWDNet: Stealth Web Shell Detection Technology based on Triplet Network. MSN 2023: 406-414 - [c40]Tiru Wu, Xi Xiao, Qing Li, Qixu Liu, Guangwu Hu, Xiapu Luo, Yong Jiang:
BehavSniffer: Sniff User Behaviors from the Encrypted Traffic by Traffic Burst Graphs. SECON 2023: 456-464 - [c39]Zhutian Lin, Xi Xiao, Guangwu Hu, Bin Zhang, Qixu Liu, Xiapu Luo:
Phish2vec: A Temporal and Heterogeneous Network Embedding Approach for Detecting Phishing Scams on Ethereum. SECON 2023: 501-509 - [c38]Haozhen Zhang, Le Yu, Xi Xiao, Qing Li, Francesco Mercaldo, Xiapu Luo, Qixu Liu:
TFE-GNN: A Temporal Fusion Encoder Using Graph Neural Networks for Fine-grained Encrypted Traffic Classification. WWW 2023: 2066-2075 - [i2]Haozhen Zhang, Le Yu, Xi Xiao, Qing Li, Francesco Mercaldo, Xiapu Luo, Qixu Liu:
TFE-GNN: A Temporal Fusion Encoder Using Graph Neural Networks for Fine-grained Encrypted Traffic Classification. CoRR abs/2307.16713 (2023) - 2022
- [j13]Kun Jia, Chaoge Liu, Qixu Liu, Junnan Wang, Jiazhi Liu, Feng Liu:
A lightweight DDoS detection scheme under SDN context. Cybersecur. 5(1) (2022) - [c37]Ze Jin, Luyi Xing, Yiwei Fang, Yan Jia, Bin Yuan, Qixu Liu:
P-Verifier: Understanding and Mitigating Security Risks in Cloud-based IoT Access Policies. CCS 2022: 1647-1661 - [c36]Zhi Wang, Chaoge Liu, Xiang Cui, Jie Yin, Jiaxi Liu, Di Wu, Qixu Liu:
DeepC2: AI-Powered Covert Command and Control on OSNs. ICICS 2022: 394-414 - [c35]Xinyu Liu, Wu Zhao, Langping Chen, Qixu Liu:
DroidFP: A Zero-Permission Detection Framework for Android Devices Based on Gated Recurrent Unit. SciSec 2022: 364-374 - [c34]Jingqiang Liu, Xiaoxi Zhu, Chaoge Liu, Xiang Cui, Qixu Liu:
CPGBERT: An Effective Model for Defect Detection by Learning Program Semantics via Code Property Graph. TrustCom 2022: 274-282 - 2021
- [c33]Bo Bai, Yun Feng, Baoxu Liu, Xutong Wang, Jiaxi Liu, Qingyue Liu, Qixu Liu, Shuang Zhao:
APT Behaviors Detection Based on Email Business Scenarios. DSC 2021: 171-178 - [c32]Junnan Wang, Qixu Liu, Chaoge Liu, Jie Yin:
GAN-Based Adversarial Patch for Malware C2 Traffic to Bypass DL Detector. ICICS (1) 2021: 78-96 - [c31]Junnan Wang, Qixu Liu, Di Wu, Ying Dong, Xiang Cui:
Crafting Adversarial Example to Bypass Flow-&ML- based Botnet Detector via RL. RAID 2021: 193-204 - [c30]Yun Feng, Baoxu Liu, Yue Zhang, Jinli Zhang, Chaoge Liu, Qixu Liu:
Automated Honey Document Generation Using Genetic Algorithm. WASA (3) 2021: 20-28 - 2020
- [c29]Fangjiao Zhang, Xiang Cui, Zhi Wang, Shaomian Chen, Qixu Liu, Chaoge Liu:
A Systematic Study of AI Applications in Cybersecurity Competitions. BigDataSE 2020: 138-146 - [c28]Jie Yin, Xiang Cui, Chaoge Liu, Qixu Liu, Tao Cui, Zhi Wang:
CoinBot: A Covert Botnet in the Cryptocurrency Network. ICICS 2020: 107-125 - [i1]Zhi Wang, Chaoge Liu, Xiang Cui, Jialong Zhang, Di Wu, Jie Yin, Jiaxi Liu, Qixu Liu, Jinli Zhang:
AI-powered Covert Botnet Command and Control on OSNs. CoRR abs/2009.07707 (2020)
2010 – 2019
- 2019
- [c27]Zhiqiang Wang, Quanqi Li, Yazhe Wang, Biao Liu, Jianyi Zhang, Qixu Liu:
Medical Protocol Security: DICOM Vulnerability Mining Based on Fuzzing Technology. CCS 2019: 2549-2551 - [c26]Zhiqiang Wang, Quanqi Li, Qian Liu, Biao Liu, Jianyi Zhang, Tao Yang, Qixu Liu:
DICOM-Fuzzer: Research on DICOM Vulnerability Mining Based on Fuzzing Technology. ChinaCom (1) 2019: 509-524 - [c25]Zhiqiang Wang, Gefei Li, Yaping Chi, Jianyi Zhang, Qixu Liu, Tao Yang, Wei Zhou:
Honeynet Construction Based on Intrusion Detection. CSAE 2019: 80:1-80:5 - [c24]Zhiqiang Wang, Gefei Li, Yaping Chi, Jianyi Zhang, Tao Yang, Qixu Liu:
Android Malware Detection Based on Convolutional Neural Networks. CSAE 2019: 151:1-151:6 - [c23]Zhiqiang Wang, Hongyu Dong, Yaping Chi, Jianyi Zhang, Tao Yang, Qixu Liu:
DGA and DNS Covert Channel Detection System based on Machine Learning. CSAE 2019: 156:1-156:5 - [c22]Pingchuan Ma, Zhiqiang Wang, Xiali Hei, Xiaoxiang Zou, Jianyi Zhang, Qixu Liu, Xin Lyu, Zihan Zhuo:
A Quantitative Approach for Medical Imaging Device Security Assessment. DSN (Supplements) 2019: 5-6 - [c21]Di Wu, Binxing Fang, Junnan Wang, Qixu Liu, Xiang Cui:
Evading Machine Learning Botnet Detection Models via Deep Reinforcement Learning. ICC 2019: 1-6 - [c20]Zihao Zhao, Qixu Liu, Tiantian Song, Zhi Wang, Xianda Wu:
WSLD: Detecting Unknown Webshell Using Fuzzy Matching and Deep Learning. ICICS 2019: 725-745 - 2018
- [j12]Ying Dong, Yuqing Zhang, Hua Ma, Qianru Wu, Qixu Liu, Kai Wang, Wenjie Wang:
An adaptive system for detecting malicious queries in web attacks. Sci. China Inf. Sci. 61(3): 032114:1-032114:16 (2018) - [c19]Zhaopeng Jia, Xiang Cui, Qixu Liu, Xiaoxi Wang, Chaoge Liu:
Micro-Honeypot: Using Browser Fingerprinting to Track Attackers. DSC 2018: 197-204 - [c18]Zihan Wang, Xu Wu, Chaoge Liu, Qixu Liu, Jialai Zhang:
RansomTracer: Exploiting Cyber Deception for Ransomware Tracing. DSC 2018: 227-234 - [c17]Jingqiang Liu, Zihao Zhao, Xiang Cui, Zhi Wang, Qixu Liu:
A Novel Approach for Detecting Browser-Based Silent Miner. DSC 2018: 490-497 - [c16]Zhi Wang, Jinli Zhang, Qixu Liu, Xiang Cui, Junwei Su:
Practical Metrics for Evaluating Anonymous Networks. SciSec 2018: 3-18 - [c15]Kaili Qiu, Qixu Liu, Jingqiang Liu, Lei Yu, Yiwen Wang:
An Empirical Study of OAuth-Based SSO System on Web. WASA 2018: 400-411 - 2017
- [j11]Zhejun Fang, Qixu Liu, Yuqing Zhang, Kai Wang, Zhiqiang Wang, Qianru Wu:
A static technique for detecting input validation vulnerabilities in Android apps. Sci. China Inf. Sci. 60(5): 052111:1-052111:16 (2017) - [j10]Hongzhou Yue, Yuqing Zhang, Wenjie Wang, Qixu Liu:
Driving Android apps to trigger target API invocations based on activity and GUI filtering. Sci. China Inf. Sci. 60(7): 78102 (2017) - 2016
- [c14]Xiaofeng Liu, Qixu Liu, Xiaoxi Wang, Zhaopeng Jia:
Fingerprinting Web Browser for Tracing Anonymous Web Attackers. DSC 2016: 222-229 - [c13]Qianru Wu, Qixu Liu, Yuqing Zhang, Peng Liu, Guanxing Wen:
A Machine Learning Approach for Detecting Third-Party Trackers on the Web. ESORICS (1) 2016: 238-258 - 2015
- [j9]Yuqing Zhang, Qixu Liu, Qihan Luo, Xiali Wang:
XAS: Cross-API scripting attacks in social ecosystems. Sci. China Inf. Sci. 58(1): 1-14 (2015) - [j8]Qianru Wu, Qixu Liu, Yuqing Zhang, Guanxing Wen:
TrackerDetector: A system to detect third-party trackers through machine learning. Comput. Networks 91: 164-173 (2015) - [c12]Kai Wang, Yuqing Zhang, Qixu Liu, Dan Fan:
A fuzzing test for dynamic vulnerability detection on Android Binder mechanism. CNS 2015: 709-710 - [c11]Zhejun Fang, Qixu Liu, Yuqing Zhang, Kai Wang, Zhiqiang Wang:
IVDroid: Static Detection for Input Validation Vulnerability in Android Inter-component Communication. ISPEC 2015: 378-392 - 2014
- [j7]Zhejun Fang, Yuqing Zhang, Ying Kong, Qixu Liu:
Static detection of logic vulnerabilities in Java web applications. Secur. Commun. Networks 7(3): 519-531 (2014) - [c10]Qixu Liu, Qianru Wu, Yuqing Zhang, Xiali Wang:
POSTER: Recommendation-based Third-Party Tracking Monitor to Balance Privacy with Personalization. CCS 2014: 1472-1474 - [c9]Chen Cao, Yuqing Zhang, Qixu Liu, Kai Wang:
Function Escalation Attack. SecureComm (1) 2014: 481-497 - 2013
- [j6]Zhiqiang Wang, Yuqing Zhang, Qixu Liu:
RPFuzzer: A Framework for Discovering Router Protocols Vulnerabilities Based on Fuzzing. KSII Trans. Internet Inf. Syst. 7(8): 1989-2009 (2013) - [j5]Huan Yang, Yuqing Zhang, Yu-pu Hu, Qixu Liu:
IKE vulnerability discovery based on fuzzing. Secur. Commun. Networks 6(7): 889-901 (2013) - [c8]Guanxing Wen, Yuqing Zhang, Qixu Liu, Dingning Yang:
Fuzzing the ActionScript virtual machine. AsiaCCS 2013: 457-468 - [c7]Qixu Liu, Yuqing Zhang, Huan Yang:
trend of online flash XSS vulnerabilities. CCS 2013: 1421-1424 - 2012
- [j4]Shenlong Chen, Yuqing Zhang, Qixu Liu, Jingyu Feng:
Dealing with dishonest recommendation: The trials in reputation management court. Ad Hoc Networks 10(8): 1603-1618 (2012) - [j3]Qixu Liu, Yuqing Zhang, Ying Kong, Qianru Wu:
Improving VRSS-based vulnerability prioritization using analytic hierarchy process. J. Syst. Softw. 85(8): 1699-1708 (2012) - [c6]Zhiqiang Wang, Yuqing Zhang, Qixu Liu:
A research on vulnerability discovering for router protocols based on fuzzing. CHINACOM 2012: 245-250 - [c5]Dingning Yang, Yuqing Zhang, Qixu Liu:
BlendFuzz: A Model-Based Framework for Fuzz Testing Programs with Grammatical Inputs. TrustCom 2012: 1070-1076 - [c4]Ying Kong, Yuqing Zhang, Zhejun Fang, Qixu Liu:
Static Detection of Logic Vulnerabilities in Java Web Applications. TrustCom 2012: 1083-1088 - 2011
- [j2]Qixu Liu, Yuqing Zhang:
VRSS: A new system for rating and scoring vulnerabilities. Comput. Commun. 34(3): 264-273 (2011) - [c3]Tongtong Chen, Bin Dai, Daxue Liu, Bo Zhang, Qixu Liu:
3D LIDAR-based ground segmentation. ACPR 2011: 446-450 - [c2]Tingbo Hu, Tao Wu, Jinze Song, Qixu Liu, Bo Zhang:
A New Tree Structure for Weighted Dynamic Programming Based Stereo Algorithm. ICIG 2011: 100-105 - 2010
- [c1]Ying Kong, Yuqing Zhang, Qixu Liu:
Eliminating Human Specification in Static Analysis. RAID 2010: 494-495
2000 – 2009
- 2008
- [j1]Qixu Liu, Yuqing Zhang:
TFTP vulnerability finding technique based on fuzzing. Comput. Commun. 31(14): 3420-3426 (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-01 20:48 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint