Baoxu Liu
Orcid: 0009-0006-9851-5548
According to our database1,
Baoxu Liu
authored at least 48 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
ECNet: Robust Malicious Network Traffic Detection With Multi-View Feature and Confidence Mechanism.
IEEE Trans. Inf. Forensics Secur., 2024
FG-SAT: Efficient Flow Graph for Encrypted Traffic Classification under Environment Shifts.
CoRR, 2024
ContraMTD: An Unsupervised Malicious Network Traffic Detection Method based on Contrastive Learning.
Proceedings of the ACM on Web Conference 2024, 2024
2023
Cybersecur., December, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
2022
NDFuzz: a non-intrusive coverage-guided fuzzing framework for virtualized network devices.
Cybersecur., 2022
Cybersecur., 2022
Modx: Binary Level Partial Imported Third-Party Library Detection through Program Modularization and Semantic Matching.
CoRR, 2022
Malware detection method based on image analysis and generative adversarial networks.
Concurr. Comput. Pract. Exp., 2022
BASNEA: Threat Hunting for Ethereum Smart Contract Based on Backtrackless Aligned-Spatial Network Entity Alignment.
Proceedings of the Science of Cyber Security - 4th International Conference, 2022
ModX: Binary Level Partially Imported Third-Party Library Detection via Program Modularization and Semantic Matching.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022
Time Series Attention Based Transformer Neural Turing Machines for Diachronic Graph Embedding in Cyber Threat Intelligence.
Proceedings of the Computational Science - ICCS 2022, 2022
The Hyperbolic Temporal Attention Based Differentiable Neural Turing Machines for Diachronic Graph Embedding in Cyber Threat Intelligence.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
ESRFuzzer: an enhanced fuzzing framework for physical SOHO router devices to discover multi-Type vulnerabilities.
Cybersecur., 2021
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
Evil Under the Sun: Understanding and Discovering Attacks on Ethereum Decentralized Applications.
Proceedings of the 30th USENIX Security Symposium, 2021
Bookworm Game: Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the Computational Science - ICCS 2021, 2021
BEDIM: Lateral Movement Detection In Enterprise Network Through Behavior Deviation Measurement.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021
Producing More with Less: A GAN-based Network Attack Detection Approach for Imbalanced Data.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021
Ghost in the Binder: Binder Transaction Redirection Attacks in Android System Services.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
THS-IDPC: A three-stage hierarchical sampling method based on improved density peaks clustering algorithm for encrypted malicious traffic detection.
J. Supercomput., 2020
J. Inf. Secur. Appl., 2020
CoRR, 2020
CETAnalytics: Comprehensive effective traffic information analytics for encrypted traffic classification.
Comput. Networks, 2020
RouAlign: Cross-Version Function Alignment and Routine Recovery with Graphlet Edge Embedding.
Proceedings of the ICT Systems Security and Privacy Protection, 2020
2019
Integrated fault propagation model based vulnerability assessment of the electrical cyber-physical system under cyber attacks.
Reliab. Eng. Syst. Saf., 2019
STDeepGraph: Spatial-Temporal Deep Learning on Communication Graphs for Long-Term Network Attack Detection.
Proceedings of the 18th IEEE International Conference On Trust, 2019
Understanding the Influence of Graph Kernels on Deep Learning Architecture: A Case Study of Flow-Based Network Attack Detection.
Proceedings of the 18th IEEE International Conference On Trust, 2019
Marrying Graph Kernel with Deep Neural Network: A Case Study for Network Anomaly Detection.
Proceedings of the Computational Science - ICCS 2019, 2019
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
SRFuzzer: an automatic fuzzing framework for physical SOHO router devices to discover multi-type vulnerabilities.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
计算机科学, 2018
Hierarchical Clustering Based Network Traffic Data Reduction for Improving Suspicious Flow Detection.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
New Security Attack and Defense Mechanisms Based on Negative Logic System and Its Applications.
Proceedings of the Science of Cyber Security - First International Conference, 2018
Trusted Secure Accessing Protection Framework Based on Cloud-Channel-Device Cooperation.
Proceedings of the Cyber Security - 15th International Annual Conference, 2018
Proceedings of the Cyber Security - 15th International Annual Conference, 2018
2017
LQR lateral-directional control law design for distributed propulsion layout flying wing.
Proceedings of the 2017 IEEE International Conference on Cybernetics and Intelligent Systems (CIS) and IEEE Conference on Robotics, 2017
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017
2016
Proceedings of the Interoperability, Safety and Security in IoT, 2016
2010
Proceedings of the 2010 IEEE International Conference on Granular Computing, 2010