Chang Liu

Orcid: 0000-0002-4798-0443

Affiliations:
  • Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China
  • Chinese Academy of Sciences, School of Cyber Security, Beijing, China


According to our database1, Chang Liu authored at least 47 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A blind flow fingerprinting and correlation method against disturbed anonymous traffic based on pattern reconstruction.
Comput. Networks, 2024

Let gambling hide nowhere: Detecting illegal mobile gambling apps via heterogeneous graph-based encrypted traffic analysis.
Comput. Networks, 2024

WebPromptM2: A Website Classification Method Leveraging Prompt-Based Learning with Multimodal Features.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

2023
Few-shot encrypted traffic classification via multi-task representation enhanced meta-learning.
Comput. Networks, June, 2023

Zero-relabelling mobile-app identification over drifted encrypted network traffic.
Comput. Networks, June, 2023

BoAu: Malicious traffic detection with noise labels based on boundary augmentation.
Comput. Secur., 2023

FlowTracker: Improved flow correlation attacks with denoising and contrastive learning.
Comput. Secur., 2023

FedMP: Robust and Communication-Efficient Federated Multi-Prototype Intrusion Detection Framework in IoT.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

A Recurrent Self-learning Labeler for Building Network Traffic Ground Truth.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

PTC: Prompt-based Continual Encrypted Traffic Classification.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

TGC: Transaction Graph Contrast Network for Ethereum Phishing Scam Detection.
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
TTAGN: Temporal Transaction Aggregation Graph Network for Ethereum Phishing Scams Detection.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

BSBA: Burst Series Based Approach for Identifying Fake Free-traffic.
Proceedings of the 23rd IEEE International Symposium on a World of Wireless, 2022

TAN: Temporal Attention Enhanced Network for Cellular Traffic Prediction.
Proceedings of the 14th International Conference on Wireless Communications and Signal Processing, 2022

GALG: Linking Addresses in Tracking Ecosystem Using Graph Autoencoder with Link Generation.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2022

Global-Aware Prototypical Network for Few-Shot Encrypted Traffic Classification.
Proceedings of the IFIP Networking Conference, 2022

MTBD: HTTPS Tunnel Detection Based on Multi-dimension Traffic Behaviors Decision.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

2021
Classifying encrypted traffic using adaptive fingerprints with multi-level attributes.
World Wide Web, 2021

Survey of security supervision on blockchain from the perspective of technology.
J. Inf. Secur. Appl., 2021

SiamHAN: IPv6 Address Correlation Attacks on TLS Encrypted Traffic via Siamese Heterogeneous Graph Attention Network.
Proceedings of the 30th USENIX Security Symposium, 2021

TMT-RF: Tunnel Mixed Traffic Classification Based on Random Forest.
Proceedings of the Security and Privacy in Communication Networks, 2021

Multi-granularity Mobile Encrypted Traffic Classification Based on Fusion Features.
Proceedings of the Science of Cyber Security - Third International Conference, 2021

CQNet: A Clustering-Based Quadruplet Network for Decentralized Application Classification via Encrypted Traffic.
Proceedings of the Machine Learning and Knowledge Discovery in Databases. Applied Data Science Track, 2021

A Study on Security Analysis of the Unlinkability in Tor.
Proceedings of the 2021 IEEE Military Communications Conference, 2021

RecGraph: Graph Recovery Attack using Variational Graph Autoencoders.
Proceedings of the IEEE International Performance, 2021

Universal Perturbation for Flow Correlation Attack on Tor.
Proceedings of the IEEE International Performance, 2021

6GAN: IPv6 Multi-Pattern Target Generation via Generative Adversarial Nets with Reinforcement Learning.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

GAP-WF: Graph Attention Pooling Network for Fine-grained SSL/TLS Website Fingerprinting.
Proceedings of the International Joint Conference on Neural Networks, 2021

GMAF: A Novel Gradient-Based Model with ArcFace for Network Traffic Classification.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

MEMG: Mobile Encrypted Traffic Classification With Markov Chains and Graph Neural Network.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

BAPM: Block Attention Profiling Model for Multi-tab Website Fingerprinting Attacks on Tor.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
A Unified Fourth-Order Tensor-Based Smart Community System.
Sensors, 2020

NSA-Net: A NetFlow Sequence Attention Network for Virtual Private Network Traffic Detection.
Proceedings of the Web Information Systems Engineering - WISE 2020, 2020

Not Afraid of the Unseen: a Siamese Network based Scheme for Unknown Traffic Discovery.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

Towards Aggregated Features: A Novel Proxy Detection Method Using NetFlow Data.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

2019
A New Approach for Face Anti-Spoofing Using Handcrafted and Deep Network Features.
Proceedings of the 2019 IEEE International Conference on Service Operations and Logistics, 2019

Malicious Domain Detection via Domain Relationship and Graph Models.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019

A Comprehensive Study of Accelerating IPv6 Deployment.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019

FS-Net: A Flow Sequence Network For Encrypted Traffic Classification.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Vision Information and Laser Module Based UAV Target Tracking.
Proceedings of the IECON 2019, 2019

DLchain: A Covert Channel over Blockchain Based on Dynamic Labels.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

A Multi-View Deep Learning Model for Encrypted Website Service Classification.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Nonlinear Deformation Prediction and Compensation for 3D Printing Based on CAE Neural Networks.
Proceedings of the 15th IEEE International Conference on Automation Science and Engineering, 2019

2018
MaMPF: Encrypted Traffic Classification Based on Multi-Attribute Markov Probability Fingerprints.
Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service, 2018

LaFFT: Length-Aware FFT Based Fingerprinting for Encrypted Network Traffic Classification.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018

2017
Auto-identification of background traffic based on autonomous periodic interaction.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

2015
Detect the reflection amplification attack based on UDP protocol.
Proceedings of the 10th International Conference on Communications and Networking in China, 2015


  Loading...